Our Team – About Us | LexCyberAI

TRUST • EXPERTS • COMPLIANCE

LexCyberAI – Your trusted partner for cybersecurity and data protection management

At LexCyberAI, we help organizations effectively and comprehensively protect their key information assets. Our interdisciplinary team combines legal expertise with advanced technical knowledge, delivering full support across data protection, cybersecurity, and regulatory/industry compliance—in Poland, the European Union, and the United States.

Our Credentials

Certifications: ISO 27001 Lead Auditor • ISO 22301 • CISSO • CISSM • CCSK • CCZT

Experience: Google • Samsung • T‑Mobile • McKinsey & Company • Wolters Kluwer • NCBR • Ministry of Infrastructure • Ministry of Funds and Regional Policy • SoftSystem Sp. z o.o. • ING Bank S.A. • Bank Pekao S.A. • Sharp Electronics • T‑Mobile Polska • British Embassy

Leadership with 20+ years of experience in cybersecurity and data protection. International industry certifications.

Who we are

Marek Rębisz leads the LexCyberAI team—an expert with 20+ years of experience in data protection and cybersecurity, specializing in implementing NIS 2 requirements for essential and important entities. He has delivered advisory and technology projects for Google, Samsung, Sharp Electronics (Europe) GmbH, T‑Mobile Polska, McKinsey & Company, and Wolters Kluwer.

He holds international certifications and accreditations including: Lead Auditor – Information Security Management System ISO/IEC 27001:2022, Lead Auditor – Business Continuity Management System ISO 22301, CISSO (Certified Information Systems Security Officer, Mile2), CISSM (Certified Information Systems Security Manager, Mile2), CCSK (Certificate of Cloud Security Knowledge, Cloud Security Alliance), and CCZT (Certificate of Competence in Zero Trust, Cloud Security Alliance). His experience blends knowledge of European regulations with practical expertise in risk management, business continuity, and security architecture.

Legal Team

Experienced lawyers and attorneys specializing in data‑protection regulations (including GDPR, NIS 2, DORA). They build cohesive information‑security procedures and policies and ensure compliance with national and international regulations.

Certified Cybersecurity Leaders & Managers

Our experts hold world‑class certifications (e.g., CISM, CISA, CISSP), enabling them to manage IT risk, design cloud‑security strategies (AWS, Azure), and conduct security audits. We also serve as a virtual v‑CISO across Poland, the EU, and the U.S.

DPOs & Lead Auditors

Qualified lead auditors (ISO 27001:2022, ISO 22301) and experienced Data Protection Officers ensure adherence to key standards and regulations, safeguarding continuity and proper cybersecurity management in the context of NIS 2 and DORA.

Cybersecurity Engineers & IT Specialists

Our engineers and IT experts hold certifications from leading organizations (e.g., Microsoft, EC‑Council, Mile2, ISACA). They design and implement advanced security solutions, deliver training, and provide consultations on the latest technologies.

NIS 2 Compliance Management System – Product & Engineering Team

A team of seasoned experts responsible for the development and deployment of our proprietary NIS 2 Compliance Management System. It includes GRC analysts, system‑architecture designers, DevSecOps engineers, and compliance specialists.

This team is responsible for, among others:

  • designing application logic aligned to the requirements of NIS 2, KSC, DORA, and the ISO 27001/22301 standards
  • mapping regulatory requirements to system functionality and user interfaces
  • ensuring technical alignment with guidance from ENISA, the European Commission, and the draft National Cybersecurity System (KSC) Act
  • implementing advanced capabilities for risk, incident, policy, and business‑continuity management
  • integrations with AWS infrastructure to ensure high availability, scalability, and data security

Thanks to their work, our platform provides real support to essential and important entities in effectively meeting obligations arising from NIS 2 and related legislation.

NIS 2 Compliance Management System – our proprietary GRC Compliance Management System

In response to rising requirements placed on Essential and Important Entities, we developed the NIS 2 Compliance Management System—a comprehensive, scalable, and user‑friendly platform that supports implementing and maintaining compliance with key regulations such as NIS 2, KSC, DORA, and the ISO 27001/ISO 22301 standards.

Our solution enables efficient risk, business‑continuity, and cybersecurity management—all in one place. With an intuitive UI and well‑designed modules, the NIS 2 Compliance Management System streamlines the work of information‑security and compliance teams.

Application security guaranteed by AWS infrastructure

Our solutions—including the NIS 2 Compliance Management System—run on Amazon Web Services (AWS), one of the most advanced and certified cloud platforms in the world. This allows us to meet the highest standards of security, availability, and continuity, satisfying even the most demanding organizations.

AWS holds key information‑security certifications that directly translate into the guaranteed protection level of our clients’ environments, including:

ISO/IEC 27001

information security management

ISO/IEC 27017

security in cloud services

ISO/IEC 27018

protection of personal data in the cloud

ISO/IEC 27701

privacy information management extension

SOC 1, SOC 2, SOC 3

attestation reports on system and data controls

PCI DSS

payment card industry data security standard

CSA STAR

Cloud Security Alliance certification for cloud services

ENS High & C5

public‑sector cybersecurity compliance (Spain & Germany)

AWS provides advanced encryption, data segmentation, DDoS protection, backup, and full redundancy. Our clients gain confidence in a platform that satisfies both the technical and formal requirements of NIS 2, ISO 27001, and guidance from ENISA and the European Commission.

DPO & v‑CISO as a Service – flexible support for NIS 2 and the National Cybersecurity System (KSC)

We specialize in supporting Essential and Important Entities under NIS 2 and the draft National Cybersecurity System (KSC) Act. We offer DPO as a Service and v‑CISO as a Service, ensuring continuity, compliance, and operational security for organizations subject to new EU regulations.

Our support includes:

  • Managing compliance with NIS 2 and the draft National Cybersecurity System Act based on European Commission, ENISA, and implementing guidance
  • Ongoing oversight of formal and technical obligations, including preparation and maintenance of documentation, policies, procedures, and registers required by NIS 2
  • Implementation and oversight of an Information Security Management System (ISMS) in a v‑CISO model tailored to your organizational structure and regulatory scope
  • Risk identification and monitoring, and vulnerability analysis supporting regulator‑required risk‑management methodologies
  • Representation in interactions with competent cybersecurity authorities, including audit readiness and incident reporting

With our service model, you access a highly qualified team of experts without creating new full‑time positions. We ensure your organization’s compliance with applicable and upcoming EU and Polish legal requirements—effectively, clearly, and securely.

Mile2 certifications—recognized across the U.S. public and defense sectors

Our experts hold Mile2 certifications, among the most respected in the U.S. cybersecurity industry. Credentials such as CISSO (Certified Information Systems Security Officer) and CISSM (Certified Information Systems Security Manager) are officially used by government agencies and the military (including the U.S. Air Force and National Guard), and appear on FBI and NSA certification lists.

Mile2 programs meet rigorous NIST, NICCS, and CNSS standards, making them a de facto benchmark of competence across U.S. public institutions and strategic sectors. Their international recognition translates into real value for our clients—assuring the highest substantive and practical quality of our services.

Why work with us

1

Years of experience and unique competencies

We combine legal, technical, and business expertise to deliver tailored services.

2

Regulatory and standards compliance

We help organizations meet NIS 2, DORA, KSC, GDPR, and U.S. federal/state requirements.

3

Comprehensive support and flexible engagement

Expert advisory, audits, implementations, v‑CISO, and DPO as a Service—tailored to your needs.

4

State‑of‑the‑art cybersecurity solutions

Backed by certifications recognized across U.S. federal sectors and participation in TechEx Events, we implement modern, proven solutions.

5

Continuous improvement

We invest in research, development, and training to deliver the most current, effective, and future‑ready solutions.

Trust the experts
LexCyberAI is more than an advisory firm—we are a comprehensive partner for cybersecurity and data‑protection management. With our support, you can focus on business growth while professionals handle security and compliance.

Our platform by the numbers

100%

Documentation automation

Full automation of NIS 2‑required documentation

30 days

Time to audit

Cut preparation time from months to 30 days

500h+

Team work saved

500+ hours saved annually across compliance processes

80%

Cost reduction

Clients reduce compliance costs by 80%

NIS 2 compliance

Full alignment with NIS 2, EC and ENISA guidance, and the draft KSC Act

Request a demo and see how easily NIS 2 becomes a market advantage

Book a free consultation with ISO 27001/22301 auditors and cybersecurity experts