Enterprise AI Cybersecurity

6 service lines. 30+ years of real field experience. Custom agentic workflows. No third-party cloud, no intermediaries β€” direct access to the architect who does the work.

🧠

Private LLMs & AI Agents

100% on-premise language model deployment on your infrastructure or mine. No data leaves your perimeter. Zero dependency on OpenAI, Anthropic or Google. Zero inference cost after deployment.

Local fine-tuning

Qwen3.5, DeepSeek, Llama 3, Mistral β€” adapted to your domain: legal, industrial, technical, financial

RAG pipelines

Chroma, Pinecone, Weaviate, FAISS + LlamaIndex/Haystack for secure internal knowledge bases

Multi-agent orchestration

LangChain, LangGraph, CrewAI, n8n β€” with custom security hardening filtering all agent traffic

vLLM / Ollama deployment

Rootless Podman, Rocky Linux, SELinux. Enterprise production from day one

Internal B2B APIs

Secure endpoints to integrate agents into your CRM, ERP, legal or any internal workflow

Zero telemetry

No usage data, no external logs, no third-party API keys in the pipeline

Qwen3.5 DeepSeek Llama 3 Mistral Gemma vLLM Ollama TensorRT-LLM LangChain LangGraph CrewAI AutoGen Chroma Pinecone FAISS LlamaIndex Haystack GGUF Podman Rocky Linux
Typical results
0€
Post-deployment inference cost
100%
Data on your infrastructure
65%
Reduction in SIEM false positives (real case)
35%
Operations efficiency gain (real case)
πŸ›‘οΈ

MLSecOps & Adversarial Defence

AI pipelines are attackable. Data poisoning, prompt injection, model evasion, membership inference, model inversion β€” the OWASP Top 10 for LLMs documents what attackers already know. We secure the complete MLOps lifecycle, from dataset to production endpoint.

AI threat modelling

MITRE ATLAS + OWASP Top 10 LLMs applied to your architecture. Attack vector identification before real attackers find them

MLOps pipeline hardening

Dataset validation, checksums, training environment isolation, granular access control per model

Active adversarial defence

ART (Adversarial Robustness Toolbox), CleverHans, TF Privacy. Robustness testing before production

Post-deployment monitoring

Drift detection, output anomalies, production prompt injection attempts with real-time alerts

NIST AI RMF

Full alignment with the NIST AI Risk Management Framework: Govern, Map, Measure, Manage

EU AI Act audit

AI system risk-level classification, technical documentation, log registry for regulatory audits

MITRE ATLAS OWASP Top 10 LLMs NIST AI RMF ART CleverHans TF Privacy MLflow Seldon BentoML SHAP LIME
Coverage
βœ“ OWASP LLM01: Prompt Injection
βœ“ OWASP LLM02: Insecure Output Handling
βœ“ OWASP LLM03: Training Data Poisoning
βœ“ OWASP LLM06: Sensitive Info Disclosure
βœ“ MITRE ATLAS: Model Evasion
βœ“ MITRE ATLAS: Model Inversion
βœ“ NIST AI RMF: Govern
βœ“ NIST AI RMF: Manage
βš”οΈ

AI-Augmented Red/Blue Team

Attackers already use AI. FraudGPT, WormGPT, automated OSINT, generative phishing, auto-generated exploits. We simulate exactly what they are doing β€” before they do it to you. On the defensive side, we automate threat hunting and SIEM so your team detects in minutes what used to take weeks.

AI-augmented pentesting

Metasploit, Burp Suite, Cobalt Strike augmented with AI agents for automated reconnaissance, privilege escalation and lateral movement

AI-powered OSINT

Automated collection and correlation of public intelligence on your company, employees, suppliers and attack surface

Automated threat hunting

Agents monitoring anomalous behaviour 24/7 with updated RAG threat intelligence. LLM-generated hypotheses, validated by the architect

SIEM optimisation with LLMs

Fine-tuning models on your real logs to reduce noise, prioritise alerts and auto-generate playbooks

MITRE ATT&CK TTP simulation

Red team based on techniques most used in your sector and region. Atomic Red Team + AI agents for maximum coverage

Purple team sessions

Joint offensive-defensive exercises so your team learns to detect in real time. With or without an in-house SOC

Metasploit Burp Suite Cobalt Strike BloodHound Kali Linux MITRE ATT&CK Atomic Red Team Splunk ELK Wazuh XSOAR Cortex XSOAR
Results
35%
Ganancia eficiencia AI-Augmented Red/Blue Team (caso real)
50%
Faster threat detection with RAG TI (real case)
24/7
Automated threat hunting without an internal team
🏭

ICS/OT Industrial Security

Industrial environments are the target of the most sophisticated attackers. Ransomware like LockBit, Colonial Pipeline, Norsk Hydro β€” all started with poor IT/OT segmentation or exposed industrial protocols. With direct experience in 24/7 production ICS/OT environments, we design architectures that guarantee operational continuity and real security.

ISA/IEC 62443 assessment

Full audit of current state against the ISA/IEC 62443 standard. GAP analysis, Security Levels (SL), prioritised remediation plan

IT/OT Purdue segmentation

Design and implementation of the Purdue model: security zones, conduits, industrial DMZ. Firewalls, managed switches, VLANs

OT anomaly detection with AI

Baselining of normal industrial behaviour + AI agents detecting deviations in real time. Compatible with Claroty, Nozomi

Industrial protocol hardening

Modbus, DNP3, OPC-UA, Profinet, EtherNet/IP β€” traffic analysis, encryption where possible, access control

OT incident response

ICS-specific playbooks. Containment without affecting production. Validated recovery. Communication with SCADA/DCS vendors

Isolated test lab

Proxmox + OPNsense infrastructure to simulate OT topologies without risk to real production

ISA/IEC 62443 MITRE ATT&CK ICS Modbus DNP3 OPC-UA Profinet SCADA DCS Claroty Nozomi Purdue Model IEC 61850
Guaranteed SLA
99.95%
ICS/OT uptime guaranteed (real case, 18 months)
500+
CAD/CAM stations managed at 99%+ uptime (OPTIX Co.)
0
Production stoppages due to security incidents
πŸ“‹

AI-Automated Compliance

Manual compliance does not scale. Hundreds of controls, scattered evidence, annual audits that turn into months of manual work. We implement compliance with AI: automated audits, real-time evidence collection, CISO dashboards, and we pass audits on the first attempt.

Full ISO 27001

Gap analysis, ISMS design, control implementation, training, internal audit and support through to certification. Internal Lead Auditor

NIS2 (EU Directive)

Criticality assessment, implementation of the 10 NIS2 minimum requirements, incident notification, supply chain management

GDPR + supervisory authority

Processing registry, DPIA, legal basis, data subject rights, breach management. DPO certification available

EU AI Act

AI system risk-level classification, required technical documentation, EU AI Act registry, conformity for high-risk systems

Automated audits

AI agents continuously collecting evidence, detecting deviations and automatically generating auditable reports

CISO dashboard

Real-time control panel: control status, evidence, KRIs, notifications, full traceability for leadership

ISO 27001 NIS2 GDPR EU AI Act NIST ENS SOC2 AEPD ENISA BSI
Track record
βœ“ ISO 27001 β€” certified on 1st attempt (Widoit Group)
βœ“ NIS2 β€” full implementation before EU deadline
βœ“ GDPR β€” certified DPO
βœ“ EU AI Act β€” classification + AI system documentation
βœ“ 60% fewer incidents post Zero Trust implementation
βœ“ 40% OpEx reduction post cloud migration
πŸ‘€

CISO as a Service / Senior Architect

Not every company needs a full-time CISO. But every company needs someone who understands real risk, speaks the board's language, and knows what to do when the alarm goes off. With 30+ years of real experience as de facto CISO in companies of 40+ employees, we offer that role β€” as vCISO, temporary in-house or senior B2B consultant.

vCISO (Virtual CISO)

Senior security direction part-time. Bi-weekly or monthly meetings with leadership. Strategic security decision-making

Strategy and roadmap

12–24 month security plan. Risk-based prioritisation. Budget, priorities, communication to investors and regulators

Incident management

Availability for critical incidents. Technical coordination and communication with leadership, clients and regulators. Pre-defined playbooks

CTO / in-house Architect

Available for temporary or permanent senior in-house positions. Secure digital transformation, cloud migration, DevSecOps

Security due diligence

Security assessment for M&A, investor audits, supplier certifications or public tender processes

C-level training

Awareness sessions for leadership and board. AI risk, NIS2, sector cyberattacks. No technical jargon β€” business impact focus

CISO vCISO DPO CTO ISO 27001 Lead Auditor CISSP (In Progress) CEH v13 AI (In Progress) OSCP (Q3 2026)
CISO Experience
Widoit Group S.L. (2019–2024)

De facto CISO, 40+ employees. ISO 27001, NIS2, Zero Trust, ML SIEM, DevSecOps CI/CD, DPO AEPD

ILERNA Online (2018–2019)

De facto CISO, national education platform. Cloud migration, GDPR student data, €4K/month saved AWSβ†’GCP

PROTISEC (2021–present)

Founder and senior architect. B2B clients Spain and Europe. MLSecOps, private LLMs, ICS/OT, compliance

PACKS

Packs by Company Size

Pre-defined combinations for the most common scenarios. All packs are customisable. Price on request β€” scope is defined in the first free technical meeting.

STARTER PACK

SMEs Β· 10–50 employees

Companies without an internal security team. First certification. NIS2/GDPR regulatory pressure.

  • β€Ί Initial security audit (GAP analysis)
  • β€Ί Basic NIS2 implementation (10 minimum requirements)
  • β€Ί GDPR: processing registry + breach management
  • β€Ί Basic local LLM (Ollama + Llama/Mistral) for 1 use case
  • β€Ί Basic endpoint + network hardening
  • β€Ί 1 C-level / leadership awareness session
  • β€Ί Simplified CISO dashboard
  • β€Ί Email support 3 months post-implementation
Request price β†’
MOST POPULAR
GROWTH PACK

Mid-market Β· 50–200 employees

Companies with high regulatory pressure, sensitive data or AI ambition without data risk.

  • β€Ί Everything in Starter Pack +
  • β€Ί Full ISO 27001 (through to certification)
  • β€Ί MLSecOps: hardening of existing AI pipelines
  • β€Ί Private LLMs: 3 use cases with RAG
  • β€Ί Basic Red Team (1 exercise/year)
  • β€Ί SIEM optimisation with fine-tuned LLMs
  • β€Ί Monthly vCISO (4h/month security direction)
  • β€Ί EU AI Act: classification + documentation
  • β€Ί Priority support 6 months
Request price β†’
CRITICAL PACK

Critical infrastructure Β· ICS/OT

Industrial, utilities, critical logistics, healthcare. Environments where failure is unacceptable.

  • β€Ί Everything in Growth Pack +
  • β€Ί Full ISA/IEC 62443 assessment
  • β€Ί IT/OT Purdue segmentation design
  • β€Ί OT anomaly detection with AI (real time)
  • β€Ί Specialised ICS/OT Red/Blue Team
  • β€Ί OT incident response playbooks
  • β€Ί Isolated test lab
  • β€Ί 99.95% architect availability SLA
  • β€Ί On-site OT technical team training
  • β€Ί Weekly vCISO included
Request price β†’

Packs are indicative. Each engagement is defined in a first free technical meeting (30 min) with no commitment. Book a meeting β†’

Quick Wins

Fixed-Price Security Services

No long contracts. No complex scope. One deliverable, one price, one day. Each service is a standalone engagement β€” and each one reveals where the real risk is.

Exposure Compliance Hardening Awareness
EXPOSURE QW-01

OSINT Exposure Scan

What does an attacker see about your company right now? Leaked credentials, exposed infrastructure, employee data β€” all indexed and available to anyone who knows where to look.

€290 1 day Β· PDF report
Get started β†’
EXPOSURE QW-02

Dark Web Search

Are your employees' passwords already for sale? We scan dark web databases for your corporate domain and alert you to every compromised account before an attacker uses it.

€190 2h Β· PDF report
Get started β†’
EXPOSURE QW-03

Web Vulnerability Scan

Your website is your most visible attack surface. We scan for SQL injection, XSS, broken authentication, outdated plugins and misconfigured SSL β€” exactly as an attacker would.

€390 1 day Β· PDF report
Get started β†’
HARDENING QW-04

Access & Password Audit

80% of breaches start with a compromised password. We audit your password policy, MFA status, shared accounts, inactive users and over-privileged access.

€290 1 day Β· action list
Get started β†’
HARDENING QW-05

WordPress Hardening

43% of the web runs on WordPress. Attackers know every vulnerability of every plugin by heart. Full hardening of your installation, attack surface reduction and admin access locked β€” same day.

€490 1 day Β· before/after report
Get started β†’
HARDENING QW-06

Corporate Email Security

Without SPF, DKIM and DMARC, anyone can send emails impersonating you. We configure your DNS records correctly, verify deliverability and close the door on spoofing β€” in under 3 hours.

€290 3h Β· configured and verified
Get started β†’
HARDENING QW-07

Microsoft 365 Security Audit

Microsoft 365 ships insecure by default and most SMEs never change it. We audit your tenant: MFA, conditional access, Exchange, security alerts and Teams β€” and apply the approved changes the same day.

€490 1 day Β· report + changes applied
Get started β†’
HARDENING QW-08

Backup Audit

Most companies discover their backup does not work when they need it most β€” after a ransomware attack. We verify your backup policy, run a real restore test and fix what fails before it costs you everything.

€390 1 day Β· test report
Get started β†’
COMPLIANCE QW-09

GDPR Express Review

Fines reach €20M or 4% of global turnover. Most SMBs are not compliant β€” they just haven't been inspected yet. We review your processing records, consent flows and breach procedure in 3 focused hours.

€390 3h Β· gap list + next steps
Get started β†’
COMPLIANCE QW-10

Does NIS2 Apply to You?

NIS2 is mandatory in Spain since October 2024. Penalties up to €10M. Many companies in energy, transport, manufacturing and digital infrastructure are affected and don't know it. Find out in 2 hours.

€290 2h Β· applicability report
Get started β†’
AWARENESS QW-11

Phishing Simulation

91% of cyberattacks start with a phishing email. We send a realistic simulated campaign to your team (up to 20 users), measure the click rate and show you exactly where the human risk lies.

€490 3 days Β· click rate report
Get started β†’
AWARENESS QW-12

Incident Response Kit

Do you know what to do Monday 8am if you're told you were hacked Friday at 6pm? We create a real, usable incident response plan: who calls who, what to disconnect first, how to notify clients and regulators. A 1-page document your team can follow under pressure.

€590 2 days Β· playbook + decision tree
Get started β†’

Fixed prices. No contract. Each Quick Win is a standalone engagement. Questions? Book a free 15-min call β†’