T I C   D E F E N S E


Specialized Cybersecurity

  • Cloud computing security
  • Implementation of DevSecOps systems
  • Security strategies to face advanced threats to "OT" Operational Technologies
  • Internet of Things Security "IoT" and Data Protection
  • Security in the Industrial Internet of Things "IIoT"
  • Cybersecurity to Mobile ecosystems (voice and data encryption, protection against targeted attacks)
  • BIGDATA for predictive analysis of cyber incidents
  • Generation of simulations for prevention through Deep Learning and Artificial Intelligence
  • Blockchain systems for the detection of horizontal and vertical fraud
  • Kubernetes Network Security

Awareness and Training

  • Organizational Awareness Program
  • Virtual University (educational cybersecurity content with a strategic, tactical, and operational focus)

Specialized Training in Cybersecurity (Seminars, Courses, Workshops, Diplomas)

Cyber Attack Simulators (APT, Phishing, Malware, Ransomware, Critical Infrastructure)

Intelligence, Control and Cyber Command Center

  • Cybersecurity Operations Center "CYBERSOC" with Detection, Analysis and Managed Response "MDR"
  • Machine Learning for the detection of anomalies and the identification of cognitive vulnerabilities
  • BIGDATA for the analysis and processing of more than 800 million logs per minute
  • Live Attack Intelligence: Where? Geolocation. Why? Context. What? Attack impact. How? Attack vector and forensic. Who? Identification. When? Attention window
  • Threat Hunting
  • Computer Emergency Response Team "CERT"
  • Source intelligence: OSINT, SIGINT, Humint.
  • Behavioral analysis to control cybersecurity
  • Digital Protection of Corporate Identity Through the Analysis of Cyber Threats
  • Security Administration of: Applications, Information, ENDPOINT, Mobile, Cloud, Perimeter, Data Network and Servers

Government, Risks and Compliance "GRC"

  • Analysis and Risk Management for Institutional Digital Resilience "Cyber Risk Assessment"
  • Regulatory compliance
  • Implementation and Management of the Information Security Government
  • Design of the Global Safety Master Plan
  • Business Impact Analysis (BIA)
  • Business Continuity Plan (BCP)
  • Contingency and disaster recovery plan (DRP)
  • Crisis Management Methodology and Criteria and conditions for activating a BCP
  • Risk Analysis in IT Infrastructure
  • Personal data protection
  • Healthacare Security
  • PCI Services
  • Supply Chain Security

Cybersecurity Service Center

  • Ethical Hacking and Vulnerability Analysis
  • Security audit and internal and external intrusion tests
  • Social engineering
  • Fraud and cybercrime management
  • Source Code Audit and Secure Development Life Cycle "SDLC"
  • Static and Dynamic Analysis of Web & Mobile Applications
  • Digital Forensic
  • Security Hardening
  • Review of control system infrastructures: SCADA, MPLS, etc
  • Security Review Mainframes, SOs, BBDD, Network, etc
  • Analysis of communication technologies: Wi-Fi, NFC, VoIP, etc
  • Analysis of environments: SAP, Navision, ERP, etc