{"id":711197,"date":"2021-04-28T22:28:18","date_gmt":"2021-04-28T22:28:18","guid":{"rendered":"https:\/\/vestigaconsultores.com\/?page_id=711197"},"modified":"2021-12-10T17:31:26","modified_gmt":"2021-12-10T17:31:26","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/vestigaconsultores.com\/en\/soluciones\/ciberseguridad\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1620363265942 vc_row-stretch vc_row-o-equal-height vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-6 col-has-padding col-padding-2 col-padding-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_video_widget wpb_content_element vc_clearfix   vc_video-aspect-ratio-169 vc_video-el-width-100 vc_video-align-left\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t\t<div class=\"wpb_video_wrapper\"><iframe title=\"Vestiga Ciberseguridad\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/5mFfiU_xO-Q?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 col-has-padding col-padding-2 col-padding-right\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  font-size-medium\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3><\/h3>\n<h3>Cybersecurity and Digital Transformation<\/h3>\n<p>Cybersecurity around the world has changed radically since the pandemic. Covid has acted as a catalyst, multiplying and unleashing digital risks and threats in this new reality.<\/p>\n<p>For the years ahead, not only are traditional cybersecurity solutions (such as antivirus, firewall, DLP, EDR, etc.) required to protect organizations, but they also need to focus on data and digital information privacy protection (encryption programs, physical backups, secure browsing through VPN, etc.).<\/p>\n<p>In the case of Mexico, these risks take on another dimension due to the activity of various organized crime groups -who are increasingly branching into identity theft- which has caused additional debate surrounding the protection of biometric data.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1620363289102 vc_row-stretch vc_row-o-equal-height vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12 col-has-padding col-padding-2 col-padding-left\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element  font-size-medium\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Many Mexican organizations do not take sufficient protocols and continue to be vulnerable to phishing (apocryphal emails) and ransomware (file hijacking). A new generation of sophisticated \"Supply Chain\" type incidents emerged in 2021, as happened to SolarWinds or Microsoft Exchange.<\/p>\n<p>The main focus of decision-makers in the face of these threats should be Cyber Resilience -maintenance of the entity's ability to deliver despite adverse cyber events-  supported by international standards (such as ISO27000 and its 140 Information Security controls), as well as cyber hygiene principles (double authentication, Zero Trust approaches, etc.).<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1619919777264 bg-color-1 vc_row-has-fill vc_row-stretch\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img class=\"vc_single_image-img\" src=\"https:\/\/vestigaconsultores.com\/wp-content\/uploads\/2021\/05\/Vestiga-024-800x800.png\" width=\"800\" height=\"800\" alt=\"Vestiga Consultores - Seguridad Cibern\u00e9tica y Transformaci\u00f3n Digital\" title=\"Vestiga 024\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>Protocols, IT roadmaps and cybersecurity courses<\/h5>\n<p>Outside the financial sphere of banks and brokerage firms, the vast majority of organizations in Mexico do not have a Chief Information Security Officer (CISO). At VESTIGA, we design internal protocols and IT roadmaps for companies that lack a CISO so that internal staff is prepared for a computer incident. We also provide periodic training on new events or changes in the industry.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>Digital Forensics and Incident Response (DFIR)<\/h5>\n<p>One characteristic of IT assets is their \"volatility\", i.e., they tend to have brief life cycles, so organizations need to have rapid and automated responses to incidents. This allows them to restore their operations and provide business continuity. VESTIGA can carry out appropriate custody of computer assets, which allows specialized experts to produce IT reports and opinions in the event a legal proceeding arises.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" data-vc-parallax=\"1.3\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1494860920894 vc_row-has-fill vc_row-stretch vc_row-o-equal-height vc_row-o-content-middle vc_row-flex vc_general vc_parallax vc_parallax-content-moving\"><div class=\"wpb_column vc_column_container vc_col-sm-4 col-has-padding col-padding-2 col-padding-right\"><div class=\"vc_column-inner vc_custom_1495542874381\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>eDiscovery for litigation assistance<\/h5>\n<p>Before undertaking a legal proceeding, an organization needs to have expert evidence to document any irregular activity carried out by dishonest internal staff or unfair competition. At VESTIGA, we systematize (\"index\") all internal information, through \"forensic copies\" called \"images\", which allows organizations to enable an internal manager or the law firm itself to perform direct information searches on the evidence.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>Computer forensic expert opinions<\/h5>\n<p>Our team has the professional licenses and engineers to write Computer Forensic Expert Reports that can be presented before Ministerio P\u00fablico (Public Prosecutor's Office) authorities, where all the evidence identified in the review process is documented. Our work consists not only of elaborating the complete document and its respective addendum, but also having the document reviewed by engineers who have previously served as licensed experts, as well as providing testimony at hearings.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img class=\"vc_single_image-img\" src=\"https:\/\/vestigaconsultores.com\/wp-content\/uploads\/2021\/05\/Vestiga-010.png\" width=\"700\" height=\"700\" alt=\"Vestiga l Transformaci\u00f3n Digital y Ciberseguridad\" title=\"Vestiga 010\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1619920378416 bg-color-1 vc_row-has-fill vc_row-stretch\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>Technology governance and supplier audit<\/h5>\n<p>We conduct a review of the organization's current situation in order to identify how it compares to international levels of cyber maturity. Then we determine what steps are necessary to advance its digital resilience. Based on a risk management approach, we determine if the organization's software and hardware really matches the level of digital threats faced by their industry and advise the organization on possible policies to mitigate cyber risks.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>Vulnerability analysis and penetration testing<\/h5>\n<p>While banks and financial companies have dedicated more resources to their cybersecurity, over the last five years conducting a Vulnerability Analysis and Penetration Testing (VAPT) has become a necessity for more and more industries, especially if they export or participate in government tenders. Our vulnerability analysis enables organizations to understand which are the key problems to be solved. If results are positive, the analysis enables company executives to document their decisions to boards of directors.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5><em>Takeover<\/em> of Information Technology areas<\/h5>\n<p>In Mexico, there is a labor shortage of 2 million engineers and 300,000 computer systems engineers in particular. This is the reason why salaries and compensation of information technology personnel continue to increase. This empowerment of the IT area has led to a lack of controls or supervision of the engineers who are in charge of its operation. When an organization loses of confidence in its technology area, VESTIGA supports senior management by taking over the operation in order to regain control and to carry out an audit in the event of suspected irregularities.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1619921109486 vc_row-stretch\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left  vc_custom_1620106494688\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img class=\"vc_single_image-img\" src=\"https:\/\/vestigaconsultores.com\/wp-content\/uploads\/2021\/05\/Vestiga-011-700x500.png\" width=\"700\" height=\"500\" alt=\"Ciberseguridad o Seguridad Inform\u00e1tica\" title=\"Vestiga 011\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>Cyber governance and domestic regulations<\/h5>\n<p>In the last decade, the jurisprudence on computer crimes and the handling of personal information issued by Mexico's Supreme Court of Justice has changed significantly. It is expected that in 2021, the first National Cybersecurity Law will be approved, which will open a new era in dispute resolution. VESTIGA has the support of different law firms with expertise in civil, commercial, criminal, labor, family and antitrust matters to provide advice to organizations in order to align their internal regulations with respect to Mexican law as well as international standards, such as ISO2700. All this translates into documents that organizations in Mexico do not normally have, such as agreements regarding Information Monitoring (for all employees), as well as chain-of-custody for IT assets.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1620396559962 bg-color-1 vc_row-has-fill vc_row-stretch\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h5>Additional support services<\/h5>\n<p>Because the cyber field is by nature dynamic and disruptive, our team has the management capability to deploy additional support activities to your organization:<\/p>\n<ul>\n<li>Post-Mortem Event Analysis<\/li>\n<li>Secure code evaluation (static and dynamic)<\/li>\n<li>Reverse programming engineering (debugging)<\/li>\n<li>Virtual Security Operation Center (SOC) management<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img class=\"vc_single_image-img\" src=\"https:\/\/vestigaconsultores.com\/wp-content\/uploads\/2021\/05\/Vestiga-005-800x450.png\" width=\"800\" height=\"450\" alt=\"Vestiga Consultores Sitio Web 2011\" title=\"Vestiga 005\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" data-vc-stretch-content=\"true\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1619922419190 color-scheme-white bg-color-accent-2 vc_row-has-fill vc_row-stretch vc_row-no-padding bg-overlay bg-overlay-accent\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vntd-cta cta-text-color-white bg-color-none cta-align-left\"><div class=\"container\"><div class=\"row\"><div class=\"cta-texts col-md-8 col-sm-12\"><h2 class=\"cta-heading\"><span>Get to know us<\/span><\/h2><p class=\"cta-subtitle\">Find out how VESTIGA can help your organization.<\/p><\/div><div class=\"cta-buttons col-md-4 col-sm-12\"><a href=\"https:\/\/vestigaconsultores.com\/en\/contacto\/\" title=\"CONTACT\" class=\"btn cta-btn1 btn-solid btn-white btn-hover-dark\">CONTACT US<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div>","protected":false},"excerpt":{"rendered":"Ciberseguridad y Transformaci\u00f3n Digital La Ciberseguridad en el mundo cambi\u00f3 radicalmente a partir de la pandemia, debido a que el catalizador de la Covid y esta nueva realidad multiplicaron y potenciaron los riesgos y amenazas digitales. Para estos a\u00f1os por venir no s\u00f3lo se requieren soluciones tradicionales de Ciberseguridad para [...]","protected":false},"author":1,"featured_media":0,"parent":198,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mi_skip_tracking":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberseguridad - Vestiga Consultores<\/title>\n<meta name=\"description\" content=\"Ya no basta con soluciones tradicionales de Ciberseguridad como antivirus, las organizaciones requieren proteger datos e informaci\u00f3n digital.\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vestigaconsultores.com\/en\/soluciones\/ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad - Vestiga Consultores\" \/>\n<meta property=\"og:description\" content=\"Ya no basta con soluciones tradicionales de Ciberseguridad como antivirus, las organizaciones requieren proteger datos e informaci\u00f3n digital.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vestigaconsultores.com\/en\/soluciones\/ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Vestiga Consultores\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-10T17:31:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vestigaconsultores.com\/#website\",\"url\":\"https:\/\/vestigaconsultores.com\/\",\"name\":\"Vestiga Consultores\",\"description\":\"Consultor&iacute;a de Riesgo\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/vestigaconsultores.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vestigaconsultores.com\/soluciones\/ciberseguridad\/#webpage\",\"url\":\"https:\/\/vestigaconsultores.com\/soluciones\/ciberseguridad\/\",\"name\":\"Ciberseguridad - Vestiga Consultores\",\"isPartOf\":{\"@id\":\"https:\/\/vestigaconsultores.com\/#website\"},\"datePublished\":\"2021-04-28T22:28:18+00:00\",\"dateModified\":\"2021-12-10T17:31:26+00:00\",\"description\":\"Ya no basta con soluciones tradicionales de Ciberseguridad como antivirus, las organizaciones requieren proteger datos e informaci\\u00f3n digital.\",\"breadcrumb\":{\"@id\":\"https:\/\/vestigaconsultores.com\/soluciones\/ciberseguridad\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vestigaconsultores.com\/soluciones\/ciberseguridad\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vestigaconsultores.com\/soluciones\/ciberseguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vestigaconsultores.com\/\",\"url\":\"https:\/\/vestigaconsultores.com\/\",\"name\":\"Portada\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vestigaconsultores.com\/soluciones\/\",\"url\":\"https:\/\/vestigaconsultores.com\/soluciones\/\",\"name\":\"Soluciones\"}},{\"@type\":\"ListItem\",\"position\":3,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vestigaconsultores.com\/soluciones\/ciberseguridad\/\",\"url\":\"https:\/\/vestigaconsultores.com\/soluciones\/ciberseguridad\/\",\"name\":\"Ciberseguridad\"}}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/pages\/711197"}],"collection":[{"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/comments?post=711197"}],"version-history":[{"count":13,"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/pages\/711197\/revisions"}],"predecessor-version":[{"id":712101,"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/pages\/711197\/revisions\/712101"}],"up":[{"embeddable":true,"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/pages\/198"}],"wp:attachment":[{"href":"https:\/\/vestigaconsultores.com\/en\/wp-json\/wp\/v2\/media?parent=711197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}