Cybersecurity Consulting

Vaclav Dovnar

Hands-on security leadership. From strategy to implementation.

12+ years in cybersecurity · Built and led a 40-person security team

Securing products, teams, and infrastructure for companies operating at global scale. Built security programs from scratch, led red team transformations, and delivered compliance across 46 countries.

Vaclav Dovnar — Cybersecurity Expert

About

I'm a hands-on security leader with deep experience across Application Security, Infrastructure Security, SOC/SIEM, DevSecOps, and fraud prevention. I've built security programs from zero twice and delivered a major turnaround of a stalled security program.

As CISO at inDrive, I built and led a 20-person security organization responsible for an ecosystem processing 3.5 million deals per day across 46 countries. I launched Bug Bounty, SOC, and achieved ISO 27001.

Currently serving as deputy CISO at 01.Tech, leading a 40-person security department. I rebooted the AppSec program, transformed the penetration testing function into a red teaming model, and built an anti-fraud capability from scratch.

I'm a frequent conference speaker with 18 public talks on secure development, DevSecOps, and security team management. I share practical knowledge — no marketing, no fluff.

01.TechinDriveCity-MobilRBK.MoneyErnst & YoungAT Consulting
12+
Years of Experience
18
Conference Talks
40+
Team Members Led
46
Countries Covered
3x
Built security from scratch twice and improved processes in an existing team
5
Companies prepared for ISO 27001 certification
3–10x
Security metrics growth in teams under my leadership
1,000+
Engineers across development teams where security processes were scaled

Services

Expert cybersecurity services tailored to your business needs

Offensive Security & Testing

Identify vulnerabilities before attackers do

Web Application Penetration Testing
Comprehensive testing of web applications for OWASP Top 10 and beyond
Social Engineering Assessments
Evaluate your team's resilience against phishing, pretexting, and other social attacks
Perimeter Vulnerability Assessment
Discover exposed services and vulnerabilities on your external attack surface
Leak Detection & OSINT
Find leaked credentials, exposed data, and open-source intelligence about your organization
Internal Penetration Testing
Simulate insider threats and lateral movement within your network
Source Code Audit & Backdoor Detection
Manual review of source code for vulnerabilities, backdoors, and security flaws
Web3, DeFi & Smart Contract Security
Security assessment of blockchain applications, DeFi protocols, and smart contracts
Red Team Operations
Full-scope adversary simulation with realistic attack paths and business-critical scenarios

Compliance & Governance

Meet regulatory requirements with practical approaches

Certification Preparation & Support
End-to-end guidance for ISO 27001, PCI DSS, SOX and other compliance frameworks
GDPR Compliance Program
Build and implement a practical GDPR compliance program for your organization
Security Process Audit
Evaluate the maturity and effectiveness of your existing security processes
Anti-Fraud System Audit
Assess your anti-fraud controls, detection logic, and operational efficiency

Strategic Advisory

Expert guidance for critical security decisions

Executive Security Consulting
Strategic advice for C-level executives on cybersecurity priorities and investments
Security Architecture Review
Expert review of your system architecture for security risks and design flaws
Security Team Building & CISO Assessment
Help forming security teams, evaluating technical and leadership qualities of CISO candidates
Trusted Vendor Selection
Independent evaluation and selection of security vendors and contractors
Independent Security Opinion
Third-party expert perspective on your cybersecurity questions and challenges
Anti-Insider Threat Program
Design and implement insider threat detection without disrupting business operations

Engineering & Operations

Security integrated into your development and operations

Secure Development Lifecycle
Implement security practices without creating blockers for your development teams
Perimeter Monitoring
Continuous monitoring of your external attack surface for changes and threats

What People Say

Vaclav advised us on security for our iGaming platform. He's one of the few security experts I've met who can go deep into technical details and then zoom out to design processes that scale across a 500-person engineering org. What made him particularly effective in our case is his combination of security expertise and real anti-fraud experience — in iGaming that overlap is critical and hard to find. He understood our threat landscape without lengthy explanations and gave us a clear, actionable plan.
Igor Poltorak
Igor Poltorak
Vice President of iGaming
Client
Vaclav helped xAID as an independent advisor right after our pivot — we needed ISO 27001 readiness and to pass KYC to expand the business. He took ownership of the compliance project, moved fast, and guided our leadership through every key decision. For a startup with no in-house security team, having someone who combines deep expertise with a practical, no-overhead approach was exactly what we needed. Happy to recommend.
Kirill Lopatin
Kirill Lopatin
Founder & CEO, xAID
Client
As CTO, I worked with Vaclav when he led security. He is highly proactive: he spots issues early, brings concrete options, and moves things forward without needing constant input. Vaclav is also fully autonomous in building security processes from scratch — he can align stakeholders, make pragmatic trade-offs, and deliver real improvements in how security works with engineering. On a personal note, it was genuinely great working with him — clear, reliable, and easy to partner with.
Michil Androsov
Michil Androsov
CTO, inDrive
Colleague

How I Work

1

Discovery

Understanding your business, assets, and threat landscape

2

Execution

Hands-on security improvements with minimal disruption

3

Results

Measuring outcomes and continuous improvement

Public Talks

Conference presentations and industry talks

2025
Security by Design — Novi Sad, Serbia
Mature Automation Practices in AppSec
2024
Saint HighLoad++ — Saint Petersburg
Shift Left Security Guide for Architects and Developers
CodeFest — Novosibirsk
Application Architecture Security Review

Let's Talk Security

Share your project details and I will get back to you with next steps.

Projects of Interest

Select one or more project types. Your choices from above are synced automatically.

Additional details optional

By submitting this form, you agree to our Privacy Policy. We use your information only to respond to your inquiry. We do not sell your data or use it for marketing.

Follow my Telegram channel for practical cybersecurity insights: Product Security

What Sets Us Apart

Vetted Professionals

Every team member has 5+ years of hands-on industry experience. No juniors learning on your systems.

Focused Practice

We take on a limited number of clients by design. We're not building a large firm, so there's no pressure to over-scale — your budget funds expertise, not corporate overhead.

Reliability

Clear communication, defined deliverables, and accountability at every stage of the engagement.

Made with Care

Every engagement is approached with genuine expertise and dedication. Security crafted by people who care.

Frequently Asked Questions

How is pricing determined?
How long does a typical engagement take?
What deliverables will I receive?
What makes your approach different from large consulting firms?
Do you work with startups or only enterprises?
Let's Talk