Cybersegurity
Cybersecurity strategy

The Information Technology and Systems Department designs and implements our cybersecurity strategy based on the NIST Cybersecurity Framework (National Institute of Standards and Technology). This framework sets out a methodology focused on reducing risks associated with cyber threats that could compromise data security and operational continuity.
Our Cybersecurity Framework is structured around a set of core functions organised hierarchically. These functions provide a high-level framework for organising essential cybersecurity activities and reducing risk to acceptable levels.
Cybersecurity governance
Leadership in these matters shall be the responsibility of the Director/Manager of the respective Business Unit within Aleatica, who shall observe and fully comply with the Cybersecurity Framework.
SCC
Strategic Cybersecurity Committee
Cybersecurity Officer
TCIT
Tactical Cybersecurity Incident Team
CIRG
Cybersecurity Incident Response Group
Cybersecurity training
In 2024, using Aleatica Mexico’s institutional videoconferencing system, we delivered three webinars to all employees on the following topics:
The webinar explored the evolution of these threats, the importance of protecting credentials to prevent cyberattacks, and how oversharing on social media can facilitate identity theft.
Participants learned about the attackers’ strategies and why scepticism and vigilance were key defences.
This session examined the importance of solid information management policies and cultivating a security-aware culture.
Cybersecurity incident notification process
If a possible violation of data protection guidelines is identified or suspected, the Data Protection Department is notified so that it can act within its management and responsibility.
Cybersecurity Contingency / Business Continuity Plans (BCP)
In 2024, we verified that all Business Units and corporate centres correctly managed their DRPs.
In the event of a cyber incident, we follow standardised protocols,
supported by a tiered communication matrix, operational guides, and tools that help classify the severity and impact of the incident, define the appropriate treatment, determine reporting requirements and escalation protocols, and log incidents via the IT Help Desk (MAS for its acronym in Spanish). These protocols and tools are tested and improved after every incident or threat to ensure their effectiveness.
Cybersecurity vulnerability analysis
We have partnered with CYE, a cybersecurity firm and strategic ally of our controlling shareholder, to implement four key services: Cyber resilience, incident response, attack simulations and infrastructure defence, and threat identification. These services involve ethical hacking (penetration testing) to:
In addition, we conduct quarterly proactive vulnerability scans on all IT-managed resources that support key administrative systems, such as email, corporate and Business Unit websites, database servers, antivirus tools, and digital credential management systems.
Cybersecurity performance
We conducted five cybersecurity webinars
with a total of 590 team members participating, totaling 1,627 hours of training.
We successfully completed a cybersecurity certification course
for 100% of non-operational administrative positions in the Business Units and corporate offices. A total of 407 team members were certified.
87% of Business Units increased or maintained
their cybersecurity maturity level.