CEO/Founder Hack23 | Security & Open Source Expert | Cloud Security Specialist | Information Security Professional
Strong advocate for transparency in organizations, secure software development practices, and innovative open source solutions. Experienced security professional with over 30 years in information technology, specializing in security architecture, cloud security, and compliance. Prior roles including Application Security Officer at Stena,Information Security Officer at Polestar and Senior Security Architect at WirelessCar.
At Hack23 AB, we believe that true security comes through transparency and demonstrable practices. Our Information Security Management System (ISMS) is publicly available, showcasing our commitment to security excellence and organizational transparency.
Our approach to cybersecurity consulting is built on a foundation of transparent practices:
- ๐ Open Documentation: Complete ISMS framework available for review
- ๐ Policy Transparency: Detailed security policies and procedures publicly accessible
- ๐ฏ Demonstrable Expertise: Our own security implementation serves as a live demonstration
- ๐ Continuous Improvement: Public documentation enables community feedback and enhancement
"Our commitment to transparency extends to our security practices - demonstrating that true security comes from robust processes, continuous improvement, and a culture where security considerations are integrated into every business decision."
โ James Pether Sรถrling, CEO/Founder
Explore information security, ISMS policies, and cybersecurity best practices through the unique Discordian lens inspired by the Illuminatus! trilogy. "Think for yourself, question authority."
Featured Content:
- ๐ญ Discordian Manifesto - Everything You Know About Security Is a Lie
- ๐ Complete ISMS Coverage - All 30 posts link directly to ISMS-PUBLIC repository
- ๐ Illuminatus! Style - FNORD detection, Chapel Perilous references, 23 FNORD 5 signatures
All hail Eris! All hail Discordia! ๐
|
Realistic 2D precision combat simulator inspired by traditional Korean martial arts, focusing on precise anatomical targeting, authentic combat techniques, and detailed physics-based interactions. |
|
Political transparency platform monitoring Swedish political activity with data-driven insights, analytics, dashboard visualizations, and accountability metrics. |
|
|
Enterprise-grade multi-region active/active architecture with near-zero recovery time, comprehensive DNS failover, and AWS Resilience Hub policy compliance for mission-critical applications. |
|
|
SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards. |
Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.
| ๐ Availability | Remote or in-person (Gothenburg) |
| ๐ฐ Pricing | Contact for pricing |
| ๐ข Company | Hack23 AB (Org.nr 5595347807) |
| ๐ง Contact |
| Area | Services | Ideal for |
|---|---|---|
| ๐๏ธ Security Architecture & Strategy |
Enterprise Security Architecture: Design and implementation of comprehensive security frameworks Risk Assessment & Management: Systematic identification and mitigation of security risks Security Strategy Development: Alignment of security initiatives with business objectives Governance Framework Design: Policy development and security awareness programs |
Organizations needing strategic security leadership and architectural guidance |
| โ๏ธ Cloud Security & DevSecOps |
Secure Cloud Solutions: AWS security assessment and architecture (Advanced level) DevSecOps Integration: Security seamlessly integrated into agile development processes Infrastructure as Code Security: Secure CloudFormation, Terraform implementations Container & Serverless Security: Modern application security best practices |
Development teams transitioning to cloud-native architectures with security focus |
| ๐ง Secure Development & Code Quality |
Secure SDLC Implementation: Building security into development lifecycles CI/CD Security Integration: Automated security testing and validation Code Quality & Security Analysis: Static analysis, vulnerability scanning Supply Chain Security: SLSA Level 3 compliance, SBOM implementation |
Development teams seeking to embed security without slowing innovation |
| Category | Services | Value |
|---|---|---|
| ๐ Compliance & Regulatory |
Regulatory Compliance: GDPR, NIS2, ISO 27001 implementation ISMS Design & Implementation: Information Security Management Systems AI Governance: Emerging AI risk management frameworks Audit Preparation: Documentation and evidence preparation |
Navigate complex regulatory landscapes with confidence |
| ๐ Open Source Security |
Open Source Program Office: OSPO establishment and management Vulnerability Management: Open source risk assessment and remediation Security Tool Development: Custom security solutions and automation Community Engagement: Open source security best practices |
Leverage open source securely while contributing to security transparency |
| ๐ Security Culture & Training |
Security Awareness Programs: Building organization-wide security culture Developer Security Training: Secure coding practices and methodologies Leadership Security Briefings: Executive-level security understanding Incident Response Training: Preparedness and response capability building |
Transform security from barrier to enabler through education and culture |
Three decades of hands-on experience in software development and security architecture means we understand the real challenges development teams face. We don't just point out problemsโwe provide practical, implementable solutions that enhance security without slowing down innovation.
Our approach: Security should be seamlessly integrated into your existing processes, not bolted on afterward. We help organizations build a culture of security awareness where protection becomes a natural part of how teams work, not an obstacle to overcome.
Passionate about transparency: As advocates for open source security, we believe in sharing knowledge and building community. Our solutions are designed to be understandable, maintainable, and aligned with industry best practices.
| Project | Current Architecture | Security Architecture | Future Vision |
|---|---|---|---|
| ๐๏ธ Architecture | ๐ Security | ๐ฎ Future | |
| ๐๏ธ Architecture | ๐ Security | ๐ฎ Future |
| Project | Process Flows | State Diagrams | Mindmaps |
|---|---|---|---|
| ๐ Flowcharts | ๐ States | ๐ง Mindmaps | |
| ๐ Flowcharts | ๐ States | ๐ง Mindmaps |
mindmap
root)๐จโ๐ผ James Pether Sรถrling(
๐ Information Security
๐ก๏ธ Risk Assessment & Management
๐ CISSP / CISM Certified
๐๏ธ Security Architecture Design
๐ Zero Trust
๐ก๏ธ Defense-in-Depth
โ๏ธ Compliance Frameworks
ISO 27001
NIST 800-53
VDA-ISA
CIS Controls
GDPR
๐จ Security Operations
Incident Response
Vulnerability Management
Security Monitoring
โ๏ธ Cloud Security
๐ Multi-Cloud: AWS, Azure
๐๏ธ Enterprise Architecture
High Availability
Multi-Region
Resilience
๐ ๏ธ Infrastructure as Code
CloudFormation
Terraform
๐ Secure Cloud Services
Security Hub
GuardDuty
KMS
WAF
๐๏ธ Leadership & Governance
๐จโ๐ผ Information Security Officer
๐๏ธ Security Architect
๐ Policy Development
โ๏ธ IT Governance
๐ฅ Team Leadership
๐ Open Source Program Office
๐ค AI Governance
๐ป Software Engineering
๐ ๏ธ Secure Development (SSDLC)
๐ฑ Java / Spring / React
โ๏ธ Automated Testing
๐ CI/CD Pipelines
๐ Code Quality
SLSA Level 3
SonarQube
๐ Open Source Leadership
๐จโ๐ฌ Project Maintainer
๐ค Community Contributor
๐ก๏ธ Security Tooling
๐ Code Review
mindmap
root((๐จโ๐ผ James Pether Sรถrling))
๐ Information & Security Leadership
๐จโ๐ผ CISO / ISO Roles
๐ก๏ธ Security Architecture
๐งฉ CIA Triad Implementation
๐ ๏ธ Policy Development & Governance
๐ Risk Management
๐ Audit & Compliance Oversight
๐ค AI Governance
๐ Open Source Program Office
๐๏ธ Frameworks & Compliance
๐ ISO 27001
๐ NIST 800-53
๐ VDA-ISA
๐ CIS Controls
๐ท๏ธ Data Protection / GDPR
๐ ISMS Implementation
๐งช Continuous Improvement
โ๏ธ Cloud & Platform Security
๐ Multi-Cloud (AWS / Azure)
๐๏ธ Enterprise & Reference Architectures
๐ Multi-Region Design
๐ Resilience & Failover
โป๏ธ High Availability Patterns
๐ Secure Cloud Services
Security Hub
GuardDuty
KMS
WAF
๐งฑ Network & VPC Security
๐ IAM / Least Privilege
๐ ๏ธ Infrastructure as Code
๐งพ CloudFormation
๐ ๏ธ Terraform
๐ GitOps / Pipelines
๐ Template Scanning
๐ฆ Supply Chain (SLSA Level 3)
๐ป Software Engineering
โ Java / Spring
โ๏ธ React / TypeScript
๐ PostgreSQL
๐ CI/CD Automation
๐งช Automated Testing
๐งต Secure SDLC (SSDLC)
๐ Code Quality (SonarQube)
๐ฌ Security Operations & Assurance
๐จ Incident Response
๐ต๏ธ Vulnerability Management
๐ Security Monitoring
๐งช Threat Modeling
๐ Logging & SIEM Use
๐ Open Source Leadership
๐ CIA Compliance Manager
๐๏ธ Citizen Intelligence Agency
๐งฉ Sonar-CloudFormation-Plugin
๐ง cfn-nag Contributions
๐ค Community Engagement
๐ Code Review / Security Tooling
๐ Certifications & Recognition
๐ CISSP
๐ CISM
๐ฅ AWS Security Specialty
๐ฅ AWS Solutions Architect Professional
๐ก๏ธ SLSA Level 3 Attestations
๐ Strategic Impact
๐ Transparency Advocacy
๐งญ Security-by-Design Enablement
๐ง Knowledge Sharing / Speaking
๐ข Public Policy & Civic Tech
%%{
init: {
'theme': 'base',
'themeVariables': {
'primaryColor': '#d1c4e9',
'primaryTextColor': '#1a1a1a',
'primaryBorderColor': '#9575cd',
'lineColor': '#9575cd',
'secondaryColor': '#bbdefb',
'tertiaryColor': '#c8e6c9'
}
}
}%%
timeline
title Professional Journey
section Enterprise Security
2024 : Application Security Officer, Stena Group IT
: Risk Assessment, Cloud Security, Microsoft Azure, AI Governance
2022 - 2024 : Information Security Officer, Polestar
: ISMS Implementation, Security Compliance, Risk Management, OSPO Lead
2018 - 2022 : Senior Security Architect, WirelessCar
: Security Architecture, AWS Security, Secure Development Practices
section Cloud & Security Engineering
2017 - 2018 : Consultant, Consid AB
: Open Source Development, CI/CD, Docker, AWS
2010 - 2017 : Cloud Architect, Keypasco
: Cloud Security Solutions, Multi-Tier Architecture, AWS Infrastructure
section Software Development
2008 - 2009 : Consultant, Redpill Linpro
: Technical Support, System Administration, Development
2006 - 2007 : System Developer, Sky
: J2EE Projects, Agile Development, Test-Driven Development
2003 - 2005 : J2EE Developer, Glu Mobile
: Mobile Services, Integration
2000 - 2002 : Software Engineer, Volantis Systems
: Multi-Channel Server Product Development
- Information Security Officer at Polestar, leading security practices and the Open Source Program Office
- Senior Security Architect at WirelessCar, supporting secure delivery practices and security risk management
- Open source contributor for cfn-nag, developing integration with SonarQube for CloudFormation security analysis
- Speaker at Javaforum Gรถteborg on secure architecture patterns
- Guest on Shift Left Like A Boss security podcast
- Featured in Computer Sweden and Riksdag och Departement for political transparency work
- Mentioned in National Democratic Institute survey on parliamentary monitoring organizations
- Operated Equal Rites BBS in the 1990s, part of Fidonet (Node 2:203/454)
Hack23.com is a static, multi-language HTML/CSS site deployed to AWS S3 + CloudFront.
For the authoritative, always up-to-date sitemap, use the live page:
- ๐ Live Sitemap: https://hack23.com/sitemap.html
The sections below mirror the structure of sitemap.html with direct, HTTPS links and icons aligned with the ISMS Style Guide.
Mission, values, company details, and CIA Triad foundations.
- ๐ Homepage: https://hack23.com/index.html
- ๐งญ Why Hack23?: https://hack23.com/why-hack23.html
- ๐ CIA Triad FAQ (Confidentiality, Integrity, Availability):
https://hack23.com/cia-triad-faq.html
Professional cybersecurity consulting focused on security architecture, cloud security, DevSecOps, and compliance โ with evidence-based practices and public ISMS.
- ๐ All Services (overview): https://hack23.com/services.html
- ๐๏ธ Security Architecture & Strategy:
https://hack23.com/services.html#security-architecture - โ๏ธ Cloud Security & DevSecOps:
https://hack23.com/services.html#cloud-security - ๐ Compliance & Regulatory:
https://hack23.com/services.html#compliance
- ๐๏ธ Security Architecture & Strategy:
- ๐งพ Security Assessment Checklist:
https://hack23.com/security-assessment-checklist.html
Open-source and reference projects used as live demonstrations of secure architecture, transparency, and practical security.
Realistic 2D precision combat simulator based on traditional Korean martial arts, used as a security-aware game and educational platform.
- ๐ฎ Overview: https://hack23.com/black-trigram.html
- โญ Features: https://hack23.com/black-trigram-features.html
- ๐ Documentation: https://hack23.com/black-trigram-docs.html
Open-source parliamentary monitoring and OSINT platform analyzing Swedish politics.
- ๐๏ธ Overview: https://hack23.com/cia-project.html
- โญ Features: https://hack23.com/cia-features.html
- ๐ Documentation: https://hack23.com/cia-docs.html
Browser-based compliance and CIA-triad assessment tool with no backend, focused on risk, impact, and framework mapping.
- ๐ Overview: https://hack23.com/compliance-manager.html
- โญ Features: https://hack23.com/cia-compliance-manager-features.html
- ๐ Documentation: https://hack23.com/cia-compliance-manager-docs.html
All blog content is centrally indexed here:
- ๐ All Blog Posts: https://hack23.com/blog.html
The blog blends ISMS-aligned policies with a Discordian, Illuminatus!-style narrative, making complex security concepts accessible while still professionally mapped to the public ISMS.
- ๐ญ Discordian Cybersecurity Manifesto:
https://hack23.com/discordian-cybersecurity.html
Representative themes (see blog.html for the full list and latest updates):
- ๐ง Everything You Know About Security Is a Lie
- ๐๏ธ The Security-Industrial Complex
- ๐ Question Authority: Crypto Approved By Spies
- ๐ท๏ธ Think For Yourself: Classification & Data Handling
Architecture, security, and financial/operational views of the Citizen Intelligence Agency platform:
- ๐๏ธ CIA Architecture: https://hack23.com/blog-cia-architecture.html
- ๐ก๏ธ CIA Security (Defense Through Transparency):
https://hack23.com/blog-cia-security.html - ๐ CIA Workflows (CI/CD & State Machines):
https://hack23.com/blog-cia-workflows.html - ๐ง CIA Mindmaps (Conceptual Sacred Geometry):
https://hack23.com/blog-cia-mindmaps.html - ๐ CIA OSINT Intelligence:
https://hack23.com/blog-cia-osint-intelligence.html - ๐ฎ CIA Future Security (Post-quantum & AI):
https://hack23.com/blog-cia-future-security.html - ๐ฐ CIA Financial Strategy โ โ$24.70/Day Democracyโ:
https://hack23.com/blog-cia-financial-strategy.html - ๐ CIA Business Case โ Global News:
https://hack23.com/blog-cia-business-case-global-news.html - ๐ฐ CIA Swedish Media Election 2026:
https://hack23.com/blog-cia-swedish-media-election-2026.html - ๐ข CIA Alternative Media Discordian 2026:
https://hack23.com/blog-cia-alternative-media-discordian-2026.html
Deep dives into the architecture, biomechanics, and future roadmap of Black Trigram:
- ๐๏ธ Architecture: https://hack23.com/blog-trigram-architecture.html
- ๐ฅ Combat & Vital Points:
https://hack23.com/blog-trigram-combat.html - ๐ฎ Future (VR & Immersive Training):
https://hack23.com/blog-trigram-future.html
Applies the CIA triad, STRIDE, and adaptive defense to real-world compliance tooling:
- ๐๏ธ Compliance Architecture:
https://hack23.com/blog-compliance-architecture.html - ๐ก๏ธ Compliance Security (STRIDE Through Five Dimensions):
https://hack23.com/blog-compliance-security.html - ๐ฎ Compliance Future (Context-Aware Defense):
https://hack23.com/blog-compliance-future.html
Evidence-based code reviews based on the actual cloned repositories, not just documentation:
- ๐ CIA Code Analysis:
https://hack23.com/blog-george-dorn-cia-code.html - ๐ Compliance Manager Code Analysis:
https://hack23.com/blog-george-dorn-compliance-code.html - ๐ Black Trigram Code Analysis:
https://hack23.com/blog-george-dorn-trigram-code.html
- ๐งฌ Automated Convergence (Security, Cloud, DevSecOps):
https://hack23.com/blog-automated-convergence.html - ๐ง Information Hoarding Destroys Data Integrity:
https://hack23.com/blog-information-hoarding.html - ๐ก๏ธ Public ISMS Benefits:
https://hack23.com/blog-public-isms-benefits.html - ๐ณ๏ธ Swedish Election 2026 โ Data-Driven Analysis:
https://hack23.com/swedish-election-2026.html
For the full and current list of posts, see:
๐ https://hack23.com/blog.html
The โDiscordianโ documents on hack23.com mirror and explain the formal ISMS-PUBLIC repository in a more narrative, accessible style.
Key entry points:
- ๐ Information Security Policy:
https://hack23.com/discordian-info-sec-policy.html - ๐ ISMS Transparency (What is Public vs. Redacted):
https://hack23.com/discordian-isms-transparency.html - ๐ ISMS Review & Continuous Improvement:
https://hack23.com/discordian-isms-review.html - ๐ Compliance Overview:
https://hack23.com/discordian-compliance.html - ๐งญ Compliance Frameworks (ISO 27001, NIST, CIS, etc.):
https://hack23.com/discordian-compliance-frameworks.html
Representative domains (see sitemap.html for the complete tree):
-
๐ Risk Management:
https://hack23.com/discordian-risk-assessment.html
https://hack23.com/discordian-risk-register.html
https://hack23.com/discordian-threat-modeling.html -
๐ Access & Identity:
https://hack23.com/discordian-access-control.html
https://hack23.com/discordian-remote-access.html
https://hack23.com/discordian-acceptable-use.html -
๐ท๏ธ Data Protection & Classification:
https://hack23.com/discordian-data-protection.html
https://hack23.com/discordian-data-classification.html
https://hack23.com/discordian-classification.html
https://hack23.com/discordian-privacy.html
https://hack23.com/discordian-crypto.html -
๐ Technical Security:
https://hack23.com/discordian-network-security.html
https://hack23.com/discordian-cloud-security.html
https://hack23.com/discordian-email-security.html
https://hack23.com/discordian-mobile-device.html
https://hack23.com/discordian-vuln-mgmt.html -
๐ ๏ธ Development & AI:
https://hack23.com/discordian-secure-dev.html
https://hack23.com/discordian-ai-policy.html
https://hack23.com/discordian-llm-security.html
https://hack23.com/discordian-open-source.html -
โ๏ธ Operations:
https://hack23.com/discordian-change-mgmt.html
https://hack23.com/discordian-asset-mgmt.html
https://hack23.com/discordian-monitoring-logging.html
https://hack23.com/discordian-backup-recovery.html -
๐ Business Continuity & Incident Response:
https://hack23.com/discordian-business-continuity.html
https://hack23.com/discordian-disaster-recovery.html
https://hack23.com/discordian-incident-response.html -
๐๏ธ Governance & Stakeholders:
https://hack23.com/discordian-security-strategy.html
https://hack23.com/discordian-security-metrics.html
https://hack23.com/discordian-security-training.html
https://hack23.com/discordian-stakeholders.html
https://hack23.com/discordian-business-value.html -
๐ค Third Party & Supply Chain:
https://hack23.com/discordian-third-party.html
https://hack23.com/discordian-supplier-reality.html -
๐ข Physical & Facilities:
https://hack23.com/discordian-physical-security.html -
โ๏ธ Regulatory (e.g., EU Cyber Resilience Act):
https://hack23.com/discordian-cra.html
https://hack23.com/discordian-cra-conformity.html
For the canonical policy set and machine-verifiable versions, see the public ISMS repository:
๐ https://github.com/Hack23/ISMS-PUBLIC
Hack23.com supports multiple languages, following the _sv / _ko conventions and language-specific sitemap pages.
- ๐บ๏ธ Sitemap (EN): https://hack23.com/sitemap.html
- ๐ Homepage (SV): https://hack23.com/index_sv.html
- ๐บ๏ธ Sitemap (SV): https://hack23.com/sitemap_sv.html
- ๐ Services (SV): https://hack23.com/services_sv.html
- ๐งญ Why Hack23 (SV): https://hack23.com/why-hack23_sv.html
- ๐ CIA Triad FAQ (SV): https://hack23.com/cia-triad-faq_sv.html
- ๐๏ธ CIA Features / Docs (SV):
https://hack23.com/cia-features_sv.html
https://hack23.com/cia-docs_sv.html - ๐ CIA Compliance Manager Features / Docs (SV):
https://hack23.com/cia-compliance-manager-features_sv.html
https://hack23.com/cia-compliance-manager-docs_sv.html - ๐ Selected Blog Translations (SV):
https://hack23.com/blog-public-isms-benefits_sv.html
https://hack23.com/blog-cia-swedish-media-election-2026_sv.html
https://hack23.com/swedish-election-2026_sv.html
- ๐ Homepage (KO): https://hack23.com/index_ko.html
- ๐บ๏ธ Sitemap (KO): https://hack23.com/sitemap_ko.html
- ๐ Services (KO): https://hack23.com/services_ko.html
- ๐ฎ Black Trigram Features / Docs (KO):
https://hack23.com/black-trigram-features_ko.html
https://hack23.com/black-trigram-docs_ko.html
- ๐บ๏ธ Sitemap (NL): https://hack23.com/sitemap_nl.html
- ๐บ๏ธ Sitemap (DE): https://hack23.com/sitemap_de.html
- ๐บ๏ธ Sitemap (FR): https://hack23.com/sitemap_fr.html
- ๐บ๏ธ Sitemap (JA): https://hack23.com/sitemap_ja.html
- ๐บ๏ธ Sitemap (ZH): https://hack23.com/sitemap_zh.html
Technical endpoints and repositories powering the public site:
- ๐บ๏ธ XML Sitemap (for crawlers): https://hack23.com/sitemap.xml
- ๐ค robots.txt: https://hack23.com/robots.txt
GitHub Repositories:
- ๐ Public ISMS: https://github.com/Hack23/ISMS-PUBLIC
- ๐ฅ๏ธ Homepage Source: https://github.com/Hack23/homepage







