HLB M2 is a group of entities with an established market position, ranked among the TOP 10 largest audit firms in Poland.
The HLB M2 team comprises 80 professionals, including 20 holders of statutory auditor, CIA, FCCA and tax adviser qualifications.
For nearly 20 years, we have been supporting Polish and international clients across various sectors of the economy, providing professional audit, accounting and advisory services.
HLB M2 is a group of entities with an established market position, ranked among the TOP 10 largest audit firms in Poland.
The HLB M2 team comprises 80 professionals, including 20 holders of statutory auditor, CIA, FCCA and tax adviser qualifications.
For nearly 20 years, we have been supporting Polish and international clients across various sectors of the economy, providing professional audit, accounting and advisory services.
Development of information security strategies and advisory on the selection of a target IT operating model.
Pentests, vulnerability assessments, compliance audits and evaluation of network architecture, systems and applications security.
We support clients from concept and technical design, through hardware and software delivery, integration, hardening, testing and handover to operations.
IT support — 2nd line support with 1h SLA for critical incidents.
Practical training and workshops with live demonstrations — real attack scenarios.
Comprehensive IT crisis management that minimises financial and reputational losses.
Threat classification based on the STRIDE model — a structural approach to threat analysis:
| S | Spoofing Identity | Impersonating another person or system |
| T | Tampering with Data | Unauthorised modification of data |
| R | Repudiation | Denying actions performed (no audit trail) |
| I | Information Disclosure | Unauthorised disclosure of information |
| D | Denial of Service | Preventing use of resources |
| E | Elevation of Privilege | Gaining higher privileges than assigned |
Virtual Chief Information Security Officer (vCISO) and “Your Hacker” in an hourly package — flexible support tailored to your company’s needs.
Available monthly packages:
Cybersecurity Directive
Objective: Verification of the resilience of key and important entities (e.g. energy, transport, healthcare, manufacturing) to cyber threats.
Scope: Risk management assessment, supply chain security, incident handling and business continuity.
IT support role: Assessment of infrastructure alignment with stringent legal requirements.
Digital Operational Resilience Act
Objective: Ensuring full operational resilience of the financial sector to ICT disruptions.
Scope: Penetration testing, third-party risk management (TPRM), service continuity assurance during system failures.
IT support role: Audit of critical systems and processes.
Reducing the risk of breaches caused by human error and data leaks.
Reducing susceptibility to phishing, fraud and business email compromise (BEC).
Raising awareness of new threats and AI-powered fraud.
Better preparation for incidents and minimisation of downtime and financial losses.
More effective protection of employee identities and organisational reputation.
Immediate threat isolation to stop data leaks or malware spread (e.g. ransomware).
Precise identification of the attack source (“patient zero”) and the vulnerability exploited by criminals, to prevent recurrence.
Safe restoration of data from backups and verification of system integrity before relaunch.
Assistance in preparing documentation required by NIS2 or DORA, and support in reporting incidents to the relevant authorities (e.g. CSIRT, KNF, UODO).
Expert Team Leader
Graduate of the Faculty of Telecommunications at Gdańsk University of Technology, IT security specialist — Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP).
Experienced IT security specialist combining over 20 years of unique experience in IT security audits and projects, as well as project management.
He has participated in the creation and implementation of numerous information security strategies. He conducts information security governance audits and IT audits (qualitative and quantitative) that help identify savings, realign or correct IT processes to business needs, and secure the company’s confidential information.
He gained professional experience in Germany, where he spent five years conducting application and infrastructure security audits and risk analysis. Since 2016, he has been collaborating with the HLB M2 group.
PTC ERA, Digi Malaysia, Ergo Hestia S.A, Gmina Czersk, Powiat Piotrków Trybunalski, Dellner Couplers Polska, Nicols Poland, Wydawnictwo C.H. Beck, BPS TFI, Liberty Bank Georgia, HK Finance, INFARMA, Cartu Bank Georgia
Each of the individual and independent member firms of HLB Poland have a dedicated HLB Contact Partners.
Start the conversationMarch 15th, 2021
On the one hand, 2020 was a difficult and unpredictable year and on the other hand, it showed that modern technologies…
Learn moreOctober 21st, 2020
Recently Amazon announced that they are targeting Northern Europe and following on from that an Amazon marketplace in Sweden within the next year. Currently, Swed…
Learn moreOctober 12th, 2020
HLB is proud to announce that it has been named ‘Network of the Year’ at the 2020 Digital Accountancy Awards…
Learn more