Cybersecurity and Digital Transformation
Cybersecurity around the world has changed radically since the pandemic. Covid has acted as a catalyst, multiplying and unleashing digital risks and threats in this new reality.
For the years ahead, not only are traditional cybersecurity solutions (such as antivirus, firewall, DLP, EDR, etc.) required to protect organizations, but they also need to focus on data and digital information privacy protection (encryption programs, physical backups, secure browsing through VPN, etc.).
In the case of Mexico, these risks take on another dimension due to the activity of various organized crime groups -who are increasingly branching into identity theft- which has caused additional debate surrounding the protection of biometric data.
Many Mexican organizations do not take sufficient protocols and continue to be vulnerable to phishing (apocryphal emails) and ransomware (file hijacking). A new generation of sophisticated "Supply Chain" type incidents emerged in 2021, as happened to SolarWinds or Microsoft Exchange.
The main focus of decision-makers in the face of these threats should be Cyber Resilience -maintenance of the entity's ability to deliver despite adverse cyber events- supported by international standards (such as ISO27000 and its 140 Information Security controls), as well as cyber hygiene principles (double authentication, Zero Trust approaches, etc.).

Protocols, IT roadmaps and cybersecurity courses
Outside the financial sphere of banks and brokerage firms, the vast majority of organizations in Mexico do not have a Chief Information Security Officer (CISO). At VESTIGA, we design internal protocols and IT roadmaps for companies that lack a CISO so that internal staff is prepared for a computer incident. We also provide periodic training on new events or changes in the industry.
Digital Forensics and Incident Response (DFIR)
One characteristic of IT assets is their "volatility", i.e., they tend to have brief life cycles, so organizations need to have rapid and automated responses to incidents. This allows them to restore their operations and provide business continuity. VESTIGA can carry out appropriate custody of computer assets, which allows specialized experts to produce IT reports and opinions in the event a legal proceeding arises.
eDiscovery for litigation assistance
Before undertaking a legal proceeding, an organization needs to have expert evidence to document any irregular activity carried out by dishonest internal staff or unfair competition. At VESTIGA, we systematize ("index") all internal information, through "forensic copies" called "images", which allows organizations to enable an internal manager or the law firm itself to perform direct information searches on the evidence.
Computer forensic expert opinions
Our team has the professional licenses and engineers to write Computer Forensic Expert Reports that can be presented before Ministerio Público (Public Prosecutor's Office) authorities, where all the evidence identified in the review process is documented. Our work consists not only of elaborating the complete document and its respective addendum, but also having the document reviewed by engineers who have previously served as licensed experts, as well as providing testimony at hearings.



Technology governance and supplier audit
We conduct a review of the organization's current situation in order to identify how it compares to international levels of cyber maturity. Then we determine what steps are necessary to advance its digital resilience. Based on a risk management approach, we determine if the organization's software and hardware really matches the level of digital threats faced by their industry and advise the organization on possible policies to mitigate cyber risks.
Vulnerability analysis and penetration testing
While banks and financial companies have dedicated more resources to their cybersecurity, over the last five years conducting a Vulnerability Analysis and Penetration Testing (VAPT) has become a necessity for more and more industries, especially if they export or participate in government tenders. Our vulnerability analysis enables organizations to understand which are the key problems to be solved. If results are positive, the analysis enables company executives to document their decisions to boards of directors.
Takeover of Information Technology areas
In Mexico, there is a labor shortage of 2 million engineers and 300,000 computer systems engineers in particular. This is the reason why salaries and compensation of information technology personnel continue to increase. This empowerment of the IT area has led to a lack of controls or supervision of the engineers who are in charge of its operation. When an organization loses of confidence in its technology area, VESTIGA supports senior management by taking over the operation in order to regain control and to carry out an audit in the event of suspected irregularities.



Cyber governance and domestic regulations
In the last decade, the jurisprudence on computer crimes and the handling of personal information issued by Mexico's Supreme Court of Justice has changed significantly. It is expected that in 2021, the first National Cybersecurity Law will be approved, which will open a new era in dispute resolution. VESTIGA has the support of different law firms with expertise in civil, commercial, criminal, labor, family and antitrust matters to provide advice to organizations in order to align their internal regulations with respect to Mexican law as well as international standards, such as ISO2700. All this translates into documents that organizations in Mexico do not normally have, such as agreements regarding Information Monitoring (for all employees), as well as chain-of-custody for IT assets.
Additional support services
Because the cyber field is by nature dynamic and disruptive, our team has the management capability to deploy additional support activities to your organization:
- Post-Mortem Event Analysis
- Secure code evaluation (static and dynamic)
- Reverse programming engineering (debugging)
- Virtual Security Operation Center (SOC) management


