Home Sectors Cybersecurity We cover the entire cybersecurity life cycle: identify, protect, detect, respond, and recover Print Contact https://www.youtube.com/watch?v=Lub9mHOCMUE Overview Global handling of cyber risks At GMV, we provide protection against advanced cyber threats for our clients and their most critical assets. We apply a comprehensive approach based on the five main elements of cybersecurity: identify, protect, detect, respond, and recover. We offer a broad range of services, including everything from protecting technological infrastructure to developing our own innovative solutions for operational resilience, regulatory compliance, and cyberdefense.Our cybersecurity model is designed for compliance with European initiatives, as well as regulatory frameworks such as NIS 2, CRA, DORA, and the Spanish National Security Scheme (ENS), while addressing the need to build resilient organizations that can anticipate, resist, and recover from all types of cyber threats. + 30 years of experience in cybersecurity for critical industries such as space, finance, healthcare, and industrial production Milestones Use of the Checker ATM Security solution to protect more than 350,000 ATMs in nearly 40 countries and prevent physical and digital attacks on banking networks. Cybersecurity responsibility and leadership for protecting the ground control segment of Europe’s satellite navigation system (Galileo) against critical cyber threats Operation of the CyberSOC for the Spanish public-sector organization red.es, with the GMV‑CERT Center of Excellence providing services to strengthen cyber resilience in compliance with the National Cybersecurity Plan Awarding of the cybersecurity contract for Spain’s ports and port authorities, including aspects such as managed security services, regulatory compliance, and incident response in critical environments. Acceptance of GMV-CERT as a member of Europe’s Trusted Introducer Network (TF‑CSIRT), enhancing the company’s response and collaboration capabilities in the context of Europe’s incident response center ecosystem Coordination of the Luis del Valle R&D and Innovation Program (INCIBE), which is developing a sovereign digital identity solution and an SOC focused on the space industry, as part of the Spain’s Strategic Initiative for Innovative Public Procurement. Recognition as Imperva’s only Premier Partner in Spain, after more than 15 years of collaboration on data protection, applications, and digital identities in compliance with European regulations. Recognition as Imperva’s only Premier Partner in Spain, after more than 15 years of collaboration on data protection, applications, and digital identities in compliance with European regulations. Solutions and Services Cybersecurity Cybersecure Infrastructures Visibility In cybersecurity, you can’t manage what you don't know. A lack of knowledge is generally due to a lack of vision of what is happening. It is possible to anticipate most cyber incidents by accurately analyzing many sources of information and if both the technology and professionals are prepared to manage it in real time or after the fact. If you have access to your organization’s cybersecurity activity information, do you just store it or do you use it to make the best decisions? Data Data has become one an organization's most valuable assets, and thus boosting their appeal to criminals. The digital transformation depends on data, so cybersecurity must be present by design and by default. Data are generated, obtained, exploited, stored, transmitted… What cybersecurity and privacy controls do you apply in each of these stages? Cloud The cloud is here to stay in all sectors, handling data and running business-specific applications as a any other part of corporate infrastructure, though sometimes it is underused. It offers a new, faster, larger-scale, and more robust way of providing cybersecurity services. Do you leverage all of the capabilities offered by the cloud to detect advanced malware or stop denial of service attacks? DevSecOps DevOps is the new paradigm that is taking hold because of the benefits it offers when developing and rolling out corporate applications, which requires a working method.DevSecOps incorporates cybersecurity controls into the different phases of the DevOps iterative cycle, integrating fully into that cycle.How can the interests of the development, operations, and cybersecurity departments be aligned? Anti-fraud Detecting and preventing fraud requires the best talent working with the best technology on multidisciplinary teams, however managing these teams is a real challenge. Artificial intelligence is a reliable method that can be fully customized to the type of fraud to be fought. Do you make a positive contribution to the bottom line by fighting fraud effectively? Incident, Role, and Access Management Identity management is probably the key pillar of cybersecurity on all levels and, paradoxically, it tends to be pushed aside due to how difficult it is to define and implement. It can be covered by the corporate scope, e.g., making it part of the entire organization's identity, specifically, e.g., managing privileged users, or globally, e.g., identity on the cloud for cases requiring mobility. How are you going to manage your identity in the face of the imminent avalanche of IoT devices? ATM Security Checker ATM Security® is a world-class cybersecurity product specifically designed for ATMs and kiosks. Checker® will help you protect your ATMs from logical fraud while meeting applicable PCI-DSS requirements quickly and effectively, even for unsupported versions of the ATM operating system. Products Checker ATM Security® Comprehensive and Effective Solution Designed for ATMs Partners Consultancy Vulnerability Management Behind every cyberattack is an unresolved vulnerability that is taken advantage of by criminals. It is not only a matter of discovering vulnerabilities in your systems, but also ensuring that they are resolved. Would you know how to manage the vulnerabilities of thousands of assets in your organization? Products Gestvul Vulnerability Management Compliance There is a growing number of laws and regulations that demand certain levels of cybersecurity and privacy, in addition to those previously on the books. In addition to being mandatory, compliance is an opportunity to evolve the level of cybersecurity and privacy in your organization. Would you be able to demonstrate that your organization has implemented the measures required by current legislation in the event of a reported cyber incident? Forensic Analysis The truth is that negligent behaviors must be from organized groups or even people from your organization must be organized. Reconstructing past actions that have caused damage to the organization is a very effective improvement and learning method, determining the who, what, when, why, and how. If your organization is the victim of data theft, how would you gather the evidence you need to determine liability? GMV-CERT Computer Security Incident Response Team Cyberintelligence GMV CERT is GMV’s Computer Security Incident Response Team (CSIRT).GMV CERT is a comercial CSIRT that provides managed security services to its customer base. Services Reactive servicesProactive servicesIncident handlingSecurity audits and assessmentsVulnerability handlingPen Testing and ethical hackingForensics, artifact & evidence handlingConfiguration and maintenance of security tools, applications, and infrastructures Intrusion detection services Security intelligence Certificates Contact (+34) 902 46 46 01 Generic [email protected] Incidents [email protected] PGP Key ID (Generic) 0x6542DA75 PGP Key ID (Incidents) 0x350850F0 Products Biolock User Control Access System Checker ATM Security® Comprehensive and Effective Solution Designed for ATMs CosmicGuard Safeguarding Space Mission Ground Segments Gestvul Vulnerability Management GMV Penbot AI-driven automated pentesting resQit Remote Recovery The enterprise-class solution for remote recovery of Windows systems uTile Welcome to information exchange 2.0 Success Stories Media Video Experiences and challenges for recruiting and retaining cybersecurity talent | #18ENISE Video Digital identity and space cybersecurity innovation, key elements of the Luis Valle Program Video Quantumania: Hopes and realities | GMV Video 45th Spanish Logistics Center (CEL) Conference - Javier Hidalgo, Solutions Architect and Cybersecurity Expert at GMV Video Quantum technologies applied to cybersecurity - Enrique Crespo (GMV) Video 2nd ICT Security (STIC) Workshops - Colombia Chapter | Cybersecurity in the post-quantum era - Óscar Gaspar Video Presentation on GMV and the Innovative Public Procurement Cyber Scale project - Precommercial public procurement and cybersecurity Video Incorporating cybersecurity into the industrial supply chain (Spain’s Industrial Cybersecurity Center) Video Key principles for cryptographic migration (Enrique Crespo, GMV) More media News Cybersecurity 15th Cloud Security Alliance Summit 18 Sep Cybersecurity GMV shares expert insights on space cybersecurity challenges at the University of Málaga Cybersecurity Digital Economy and Telecommunications Forum 01 Sep - 03 Sep More news
Video 45th Spanish Logistics Center (CEL) Conference - Javier Hidalgo, Solutions Architect and Cybersecurity Expert at GMV
Video 2nd ICT Security (STIC) Workshops - Colombia Chapter | Cybersecurity in the post-quantum era - Óscar Gaspar
Video Presentation on GMV and the Innovative Public Procurement Cyber Scale project - Precommercial public procurement and cybersecurity
Video Incorporating cybersecurity into the industrial supply chain (Spain’s Industrial Cybersecurity Center)