🌟 Why Choose Hack23 AB?
Sweden's only cybersecurity consultancy with a fully public ISMS, demonstrating transparency and security excellence that accelerates innovation rather than hindering it.
Core Differentiators
🔓 Radical Transparency
Sweden's only fully public Information Security Management System (ISMS) with 93 ISO 27001 controls, redacted risk registers, and complete policy documentation openly available. See exactly how we implement security—no hidden practices, no security theater.
- 70% public / 30% responsibly redacted documentation
- Live security metrics via OpenSSF Scorecard
- Transparent risk assessments and treatment tracking
🎯 Proven Expertise
30+ years of hands-on software development and security architecture experience, backed by industry-leading certifications and real-world enterprise implementations.
- Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) certified security professional
- AWS Security Specialty & Solutions Architect Pro
- Led security programs at Stena AB, Polestar, WirelessCar, and other major enterprises
⚡ Security Accelerates Innovation
Security-enabled development that integrates seamlessly into DevSecOps workflows. We prove that proper security controls accelerate—not block—innovation and time-to-market.
- SLSA Level 3 supply chain security implementations
- Automated compliance validation & CI/CD integration
- Zero-trust architectures with real-world performance
Practical Value
🛠️ Practical Solutions
No security theater—only implementable solutions tested in production. Our open-source projects demonstrate security best practices with measurable outcomes.
- Open-source security tools used in production
- Documented threat models & security architectures
- Real-world AWS multi-region resilience patterns
📊 Measurable Outcomes
Data-driven security with quantifiable risk metrics, automated compliance tracking, and continuous improvement demonstrated through public documentation.
- Quantitative risk assessment methodologies
- Security KPIs aligned to business objectives
- Automated compliance mapping (ISO/NIST/GDPR/NIS2)
🌍 Nordic Innovation Hub
Gothenburg-based cybersecurity expertise combining Swedish innovation culture with international enterprise experience across automotive, logistics, and technology sectors.
- Remote or in-person consulting (Gothenburg)
- English & Swedish service delivery
- GDPR/NIS2 compliance for Nordic market
🛡️ Information Security Governance
Demonstrating security through transparency. Our public Information Security Management System (ISMS) shows how enterprise‑grade controls enable innovation, consulting delivery, and product development. Access the continuously improved documentation set and the governing Information Security Policy covering purpose, principles, roles, and our risk & compliance model.
🔑 Security Services
Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.
🏗️ Security Architecture & Strategy
Enterprise security frameworks, risk assessment, and governance aligned with business objectives.
- Enterprise Security Architecture
- Risk Assessment & Management
- Security Strategy Development
☁️ Cloud Security & DevSecOps
AWS security assessment, Infrastructure as Code security, CI/CD integration.
- Secure Cloud Solutions (AWS Advanced)
- DevSecOps Integration
- Container & Serverless Security
🔧 Secure Development & Compliance
SDLC security integration, ISO 27001, GDPR/NIS2 compliance, OSPO management.
- CI/CD Security Integration
- Regulatory Compliance (GDPR, NIS2, ISO 27001)
- Open Source Security
🚀 Open Source Projects
Demonstrating security best practices through production applications

🥋 Black Trigram
Precision combat simulator with 70 vital points system, 5 archetypes, and authentic Korean martial arts techniques.
🔐 CIA Compliance Manager
Security assessment platform with CIA Triad evaluation and compliance mapping to NIST, ISO 27001, GDPR, HIPAA, SOC2.

🔍 Citizen Intelligence Agency
Swedish political transparency OSINT platform with parliamentary monitoring and accountability metrics.
💼 CEO James Pether Sörling
Leadership & Expertise
Company Leadership & Security Expert

CEO/Founder of Hack23 AB, James brings over 30 years of information technology experience, specializing in security architecture, cloud security, and compliance. Professional certifications include CISSP, CISM, AWS Security Specialty, and AWS Solutions Architect Professional.
🎯 Key Qualifications:
🏢 Recent Leadership Roles:
- Jun 2025-Present: CEO / Founder, Hack23 AB
- Oct 2024-Jul 2025: Application Security Officer, Stena AB
- Mar 2022-Sep 2024: Information Security Officer, Polestar
- Jan 2018-Mar 2022: Senior Security Architect, WirelessCar
Recent Professional Experience
Extensive leadership experience in enterprise security and cloud architecture across major organizations:
- Jun 2025-Present: Chief Executive Officer, Hack23 AB - Swedish Innovation Hub Leadership, Game Development Strategy
- Oct 2024-Jul 2025: Application Security Officer, Stena AB - Risk Assessment, Cloud Security, AI Governance
- Mar 2022-Sep 2024: Information Security Officer, Polestar - ISMS Implementation, Security Compliance, OSPO Lead
Martial Arts Background
James has extensive experience in traditional Korean martial arts, bringing authentic knowledge to the Black Trigram project:
- 1999: Black Belt Song Moo Kwan Korea - Traditional Taekwondo certification
- 2024: 3rd Dan Kukkiwon - World Taekwondo Headquarters certification
- 2015-2017: Taekwondo Instructor, Tor Taekwondo klub - Teaching children's classes
- 2002-2003: Taekwondo Instructor, Haga Taekwondo club - Community instruction
- 1994-1996: Taekwondo Instructor, Hworangi Taekwondo - Early teaching experience
Martial Arts Philosophy: This deep understanding of Korean martial arts traditions directly influences the authentic techniques, cultural respect, and educational value integrated into Black Trigram's combat system.
Career History
Enterprise Architecture Experience
Security architecture and consulting roles at leading technology companies:
- Jan 2018-Mar 2022: Senior Security Architect, WirelessCar - Security Architecture, AWS Security, Secure Development
- Jan 2018-Nov 2018: Consultant, Omegapoint - Security Architect role at WirelessCar
- Mar 2017-Jan 2018: Consultant, Consid AB - Open Source Development, CI/CD, AWS
- 2010-Mar 2017: Cloud Architect, Keypasco - Cloud Security Solutions, Multi-Tier Architecture
Key Achievements: Founded Hack23 AB in 2025, led Open Source Program Office at Polestar, implemented enterprise security architectures, spoke at Javaforum Göteborg, featured in Computer Sweden.
Software Development Background
Foundation experiences in software engineering and system development:
- 2008-2009: Consultant, Redpill Linpro - Technical support and client assignments across Sweden, Norway, Denmark
- 2007-2008: Consultant, Singlegrid (London) - Continuous integration and build management solutions
- 2006-2007: System Developer, Sky (London) - J2EE projects using XP/Agile development
- 2003-2005: J2EE Developer, Glu Mobile (London) - Mobile service products development
- 2000-2002: Software Engineer, Volantis Systems (London) - Multi-channel server product design and implementation
Early Career & Military Service
Foundation experiences that shaped leadership and technical expertise:
- 1999-2003: Unix Helpdesk/Teaching Assistant, Chalmers University of Technology - System administration and tutorial teaching
- Jun-Aug 1999: Visual C++ Programmer, IETV AB - Production control system development
- 1996-1997: NBC-Defence Group Leader, Swedish Armed Forces - Leadership and security responsibilities
- 1993-1996: Founder, Equal Rites BBS - Early networking and system administration (Fidonet node 2:203/454)
🎤 Technical Talks & Presentations
🎙️ Javaforum Göteborg
Presentation on secure architecture patterns and best practices for enterprise Java applications.
▶️ Watch Presentation🎙️ Shift Left Like A Boss
Security podcast guest appearance discussing DevSecOps practices and supply chain security.
🎧 Listen to PodcastPress Coverage
Computer Sweden
This article highlights the innovative use of technology in revealing the activities of politicians. It features James Pether Sörling's work in leveraging data-driven insights to promote transparency in political processes.
Read ArticleRiksdag och Departement
A Swedish publication that discusses the role of Citizen Intelligence Agency in monitoring politicians. It underscores James Pether Sörling's commitment to fostering accountability in politics through the strategic use of technology.
Read ArticleNational Democratic Institute
A comprehensive survey report that underscores the importance of parliamentary monitoring organizations in Sweden. It acknowledges James Pether Sörling's significant contributions to these organizations, reinforcing his commitment to strengthening democratic processes.
View ReportPast Projects
Sonar-CloudFormation-Plugin
SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards.
CIA Dashboard
Political activity dashboard for Sweden, offering comprehensive visualizations of parliamentary activity and political performance metrics.
View DocumentationFrequently Asked Questions
Common questions about Hack23's cybersecurity services, public ISMS, and approach to security consulting.
What makes Hack23 different from other cybersecurity consultancies?
Hack23 AB operates Sweden's only fully public ISMS (Information Security Management System), with all policies, threat models, and security documentation available on GitHub. This radical transparency demonstrates our expertise while providing clients with proven, battle-tested frameworks. We combine 30+ years of hands-on experience with CISSP/CISM certifications and current practitioner status (Application Security Officer at Stena Group IT), ensuring practical, implementable security advice—not just theory.
How much does cybersecurity consulting cost in Sweden?
Cybersecurity consulting costs vary by engagement scope. Typical ranges: (1) Security Assessment: €5,000-€15,000 for 2-4 week comprehensive review; (2) ISO 27001 Implementation: €15,000-€30,000 for 3-6 month project; (3) DevSecOps Integration: €10,000-€25,000 for CI/CD security setup; (4) Hourly Consulting: €150-€250/hour for advisory services. We provide transparent pricing with no hidden fees. Contact us for a customized quote based on your organization's needs.
Do you work remotely or require on-site presence in Gothenburg?
We offer both remote and in-person cybersecurity consulting. Remote services are available globally via video conferencing, screen sharing, and collaborative documentation tools—ideal for distributed teams and cost-effective engagements. In-person consulting is available in Gothenburg, Sweden, for clients preferring face-to-face interaction, hands-on workshops, or sensitive discussions requiring physical presence. Hybrid models combining remote and occasional on-site visits work well for many clients.
What is a public ISMS and why does it matter?
A public ISMS (Information Security Management System) is an open, transparent framework where security policies, procedures, threat models, and risk assessments are publicly available—unlike traditional ISMSs kept confidential. Hack23's public ISMS on GitHub (https://github.com/Hack23/ISMS-PUBLIC) demonstrates our security expertise through actual implementation, not just claims. This transparency: (1) Proves we follow our own recommendations, (2) Allows prospects to evaluate our methodology before engagement, (3) Provides free templates and examples for the security community, (4) Demonstrates confidence in our security posture. It's security through transparency, not security through obscurity.
What certifications do Hack23 consultants have?
Hack23 consultants hold industry-recognized certifications: (1) CISSP (Certified Information Systems Security Professional) - global standard for security expertise, (2) CISM (Certified Information Security Manager) - management-focused security certification, (3) AWS Certified Security - Specialty - cloud security expertise, (4) AWS Certified Solutions Architect - Professional - infrastructure design. Beyond certifications, our team brings 30+ years of hands-on experience, current practitioner roles (Application Security Officer positions), and active open-source security contributions. We believe practical experience + continuous learning > certifications alone.
How long does an ISO 27001 implementation take?
ISO 27001 implementation typically takes 3-6 months for small-to-medium Swedish organizations (10-50 employees). Timeline breakdown: (1) Scoping & Gap Analysis: 2-4 weeks, (2) ISMS Design & Risk Assessment: 3-4 weeks, (3) Control Implementation: 8-12 weeks, (4) Internal Audit & Management Review: 2-3 weeks, (5) Certification Audit Preparation: 1-2 weeks. Larger organizations (50+ employees) may require 6-12 months. Factors affecting timeline: existing security maturity, resource availability, organizational complexity, and consultant involvement. Our public ISMS provides proven templates to accelerate implementation by 30-40%.
What industries do you serve?
Hack23 serves diverse industries with cybersecurity consulting: (1) Technology & SaaS companies - DevSecOps, cloud security, secure SDLC, (2) Financial Services - GDPR, PSD2, MAS cybersecurity compliance, (3) Healthcare & Pharmaceuticals - ISO 27001, GDPR, patient data protection, (4) Manufacturing & Industrial - OT security, supply chain risk, ISO 27001, (5) E-commerce & Retail - PCI DSS, data protection, fraud prevention, (6) Professional Services - client data security, compliance frameworks. Industry-agnostic security principles apply universally, with sector-specific regulatory knowledge where needed.
Can you help with GDPR and NIS2 compliance?
Yes, Hack23 provides comprehensive GDPR (General Data Protection Regulation) and NIS2 (Network and Information Security Directive 2) compliance consulting. GDPR services: data protection impact assessments (DPIA), privacy-by-design integration, consent management, data subject rights implementation, breach notification procedures. NIS2 services: essential/important entity classification, risk management frameworks, incident reporting procedures (24-hour notification), supply chain security, governance structure alignment. We integrate GDPR/NIS2 requirements into ISO 27001 implementations for unified compliance management. Practical, implementable solutions—not checkbox compliance.
What is your approach to DevSecOps?
Our DevSecOps approach: 'Security that enables, not blocks, innovation.' We integrate security into CI/CD pipelines without slowing development velocity. Key elements: (1) Automated Security Scanning: SAST/DAST/SCA tools in GitHub Actions/GitLab CI, (2) Infrastructure as Code Security: Terraform/CloudFormation scanning, policy-as-code, (3) Container Security: Image scanning, runtime protection, Kubernetes security policies, (4) Secret Management: HashiCorp Vault integration, no hardcoded credentials, (5) Security Gates: Non-blocking for low/medium findings, blocking for critical/high, (6) Developer Training: Security champions program, secure coding workshops. Result: faster, more secure releases with measurable risk reduction.
Do you provide security architecture reviews?
Yes, Hack23 conducts comprehensive security architecture reviews covering: (1) Cloud Architecture: AWS/Azure/GCP security assessment, IAM review, network segmentation, secure configuration, (2) Application Architecture: Threat modeling (STRIDE analysis), authentication/authorization design, data flow security, API security, (3) Infrastructure Architecture: Zero-trust principles, defense-in-depth, attack surface analysis, security monitoring, (4) Compliance Alignment: ISO 27001, NIST CSF, CIS Controls mapping. Deliverables: detailed security architecture document, threat model, prioritized remediation roadmap, and implementation guidance. Reviews typically take 2-4 weeks depending on complexity.
What is included in a security consultation?
A Hack23 security consultation includes: (1) Initial Assessment: 30-60 minute discovery call to understand your security needs, challenges, and objectives, (2) Gap Analysis: Review of current security posture against industry standards (ISO 27001, NIST, CIS), (3) Threat Landscape: Identification of relevant threats specific to your industry and technology stack, (4) Recommendations: Prioritized, actionable security improvements with cost/benefit analysis, (5) Roadmap: Implementation timeline with milestones and resource requirements, (6) Follow-Up: Written report with findings and next steps. Free initial consultations available for qualified prospects. No obligation to proceed.
How do I get started with Hack23?
Getting started is simple: (1) Contact Us: Email info@hack23.com, (2) Initial Call: 30-minute discovery call to discuss your security needs (free, no obligation), (3) Proposal: Custom proposal outlining scope, timeline, deliverables, and pricing, (4) Kickoff: Once approved, we begin with stakeholder interviews and documentation review, (5) Execution: Regular check-ins, transparent communication, and deliverable reviews throughout engagement. Typical response time: 24-48 hours for initial inquiry, 1 week for proposal delivery. Ready to improve your security posture? Reach out today.
🔍 Free Security Assessment Checklist
Download our comprehensive 95-point security assessment guide. Evaluate your organization's security posture across 7 critical domains: Architecture, Access Control, Data Protection, Network Security, Vulnerability Management, Incident Response, and Compliance.
Based on ISO 27001, NIST CSF, and CIS Controls • Used by Enterprise Security Teams
Get Your Free Checklist📧 Get in Touch
Have a question about our services or want to discuss your security needs? We'd love to hear from you!
Ways to Contact Us
- Email: info@hack23.com
- LinkedIn: Hack23 Company Page
- LinkedIn: CEO
- GitHub: Open Source Projects