Cyber threats are a constant for any person or company, and they carry significant economic, operational, legal, and reputational risks. Our multidisciplinary team adds value to our clients by leveraging its legal knowledge, proven experience, and capabilities to assist in cyber preparedness and incident response.

How and when do we assist you?

Our team is comprised of lawyers with expertise in different fields of law, and we partner with top-level operational consultants to work in tandem so that our clients receive advice through the following stages:

  • Preparedness and prevention
  • Reaction and control
  • Post-incident - evaluation
We assist in the prevention, reaction, and remediation phase of cybersecurity incidents that affect your organization.
Portfolio of services
Prevention

We assist our clients by designing strategies and protocols to mitigate risks derived from cybersecurity incidents.

  1. Assessment of legal and technological vulnerabilities.
  2. Design and implementation of legal and technological policies, procedures, and protocols.
  3. Contract administration.
  4. Advice on cyber insurance.
  5. Monitoring or periodic evaluations of the cybersecurity program from a legal and technical point of view.
  6. Internal qualification and training.
Reaction and control

We support our clients during a crisis.

  1. Development of a strategy for crisis management of cybersecurity incidents with the support of technical experts.
  2. Implementation of a business continuity plan.
  3. Strategic reporting before relevant authorities.
  4. Strategy for review, forensic analysis, and evidence collection.
  5. Strategic, timely, relevant, and effective communication to third parties about the incident.
post-incident – Evaluation

Together with the support of a team of technical experts, we will assess the causes of the incident, and how we can do better in the future.

  1. Defense in the context of possible civil and criminal litigation, and administrative sanctioning processes that derive from a cyberattack.
  2. Investigation with a forensic approach to identify the causes of the incident.
  3. Support in the case of raids or inspections from relevant authorities.
  4. Strategy to close gaps to mitigate future risks.

OUR TEAM