Ask us a question

You are here

Approach pentest contest during Infosecurity Belgium 2019

During Infosecurity Belgium on March 20th and 21st at Brussels Expo, we will be organizing a pentest contest at our booth (08.C110).   

Do you want to get a chance to win 1 of our 2 free pentests perfomed by our ethical hacking experts ?  Visit us at Infosecurity and learn more about the contest conditions below.  

Test description
The test will focus on the most common vulnerabilities (OWASP top 10, etc.).
The test results will be formalised in a professional report contextualised and written by a security expert. Compared to our paid reports, this one will not contain all sections, like management summary, priorities roadmap, etc., but will contain all technical information relevant for the underlying technologies.

Eligible applications
The winner (or his representative) must have the authority to approve the test of the application and all infrastructure supporting it. The application must be installed in a test environment that can be potentially damaged without any impact on business and cannot contain personal nor sensitive information.
The web application must be accessible from Approach office (fixed IP address).
The application must have a HTML interface.
The infrastructure must not block or slow down the test (IPS, throttling, etc.).

Participation conditions
The contest is open to all visitors inserting their participation form into the box on our booth (08.C110) on 20 & 21 March 2019 between 10:00 and 16:40. People affiliated with Approach are excluded from this contest.
The winner will be drawn by lot every day around 16:45. All participants will be notified of the results. Only one form per visitor is allowed.
By participating, the visitors accept these general conditions and to be contacted by Approach about the contest result and their intrusion testing interests. The winner accepts to testify about the quality of the intrusion test (no technical information will be disclosed).
Before the test, the winner (or his representative) will fill and sign our Rules of Engagement describing the scope of the test and the process around it.
Approach is not responsible for incorrect or inaccurate entry information which may affect a person’s ability to participate in the contest or be awarded a prize.
Approach reserves the right, in their sole discretion, to declare any participation form invalid if it’s forged, falsified, altered or tampered with in any way. Approach won’t accept any liability of any kind in case this contest is cancelled.
The contact information collected during the contest will only be used by Approach contest organisers and commercial services and not be transmitted to third parties. Read our privacy statement.


If you have any question about the contest, please contact us by email at

We hope to see you there, and good luck !

The Approach Team

Our approach to cyber-security

Our customers benefit from the expertise and talent of our people, combined with pragmatic and proven methods and the efficiency brought by our assets:


Expertise and talent

Since 2001 we have applied our experience in cyber-security gained in various industries, from small to large businesses. Our people are seasoned, certified professionals who continuously improve and extend their knowledge.


Pragmatic and proven methods

We rely on most recognised, easily auditable and adopted standards and good practices and apply them pragmatically. We always tailor our approach to your particular context, needs and organisation culture.


Asset-based approach

We make use of the most advanced and reliable tools and solutions to support our services. This enables us to be more efficient during delivery, enforce the use of standard auditable methods and provide transparency about our achievements and your results.

Certified professionals
Success stories
Year of establishment
+ 0%
Average annual growth