CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-NJ3Hld1EvEf4ucGZmKXPlA' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Sun, 05 Oct 2025 16:45:35 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 12:15:48 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210098-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759752947.307083,VS0,VE1340
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8456
CSIRT-GMS
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
CSIRT-GMS
Team Information | |
---|---|
Team name | CSIRT-GMS |
Official team name | CSIRT-GMS |
Member since | April 25, 2022 |
Host organization | GMS |
Country of team | Ecuador EC |
Other countries of team | Colombia, Peru CO PE |
Date of establishment | 2016-01-04 |
Website | https://gmsseguridad.com/csirt-quienes-somos/ |
Business Hours | |
---|---|
Timezone | América/Bogota |
Description of business hours | Monday to Friday, 08:00 a 18:00 |
How to contact outside business hours | +593 23993000 op. 4 |
Constituency | |
---|---|
Type of Constituency | Government, Private and Public sectors |
Source of Constituency | External to host |
Description of Constituency | The CSIRT-GMS is constituted as a mixed commercial CSIRT, whose purposes are based on the following points: • Support its members in the implementation of preventive and proactive measures in matters of information security, to avoid risks associated with their critical information assets. • Support its members in forensic investigation and incident response upon request. • Support other information security teams as a point of contact with national and international intelligence sources of information in response to incident scenarios The CSIRT team have a constituency external with paying customer base |
Country of Constituency | Colombia, Ecuador, Peru CO EC PE |
Cryptography | |
---|---|
PGP key id | 0xABB8D48FEF8E0613 |
PGP fingerprint | 2866C3A0EE746232A7F91A17ABB8D48FEF8E0613 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=Qv5K
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.