Grupo Hub.
Speciality: Application and network penetration testing
Grupo Hub. is a Mexico-based strategic management services company specializing in cybersecurity and testing, including penetration testing; with 5 employees, founded in 2014, and offering manual and automated testing services supported by certified experts and training programs.
ISO/IEC 27001: Information Security Management System Certification
Origin
ISO/IEC 27001 was developed jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), first published in 2005 and most recently updated in 2022. It evolved from the British Standard BS 7799, which was created in the 1990s by the UK government and industry experts to address growing information security concerns. The standard was developed to provide organizations with a systematic framework for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS), helping them protect sensitive data in an increasingly digital business environment.
Industry Value and Importance
ISO/IEC 27001 is globally recognized as the gold standard for information security management, valued because it demonstrates an organization's commitment to protecting confidential information through risk-based controls and continuous improvement. The certification is particularly important for organizations handling sensitive data, as it helps them comply with legal and regulatory requirements, win contracts (especially with government entities and large enterprises), and build customer trust. Many industries require or strongly prefer vendors with ISO 27001 certification, as it provides independent verification that appropriate security controls are in place, reducing the risk of data breaches and ensuring business continuity in the face of evolving cybersecurity threats.
ISO 31000
Origin
ISO 31000 was developed by the International Organization for Standardization (ISO) and first published in 2009, with subsequent revisions in 2018. The standard was created by ISO Technical Committee 262 (ISO/TC 262) on Risk Management, which brought together risk management experts from various countries and industries. It was developed to provide universal principles and guidelines for risk management that could be applied across all sectors and organizations of any size, replacing earlier risk management standards and establishing a common framework for identifying, assessing, and managing risks systematically.
Industry Value
For penetration testing and cybersecurity companies, ISO 31000 provides a structured approach to identifying and managing the full spectrum of risks involved in security assessments and operations. Penetration testing firms reference or align with ISO 31000 to demonstrate their capability to conduct comprehensive risk-based security evaluations, ensuring that testing scope and priorities are properly determined based on client risk profiles. The standard helps these companies establish credible risk management processes that complement technical security work, providing clients with confidence that the organization can effectively assess threats, vulnerabilities, and business impacts. By adopting ISO 31000 principles, penetration testing companies can better communicate security findings in business risk terms, support clients' broader enterprise risk management programs, and differentiate themselves as mature organizations that view cybersecurity through a holistic risk lens rather than purely technical metrics.
ISO 37001: Anti-Bribery Management Systems
Note: ISO 37001 is not a cybersecurity/IT certification. It is an anti-bribery management system standard.
Origin
ISO 37001 was published in October 2015 by the International Organization for Standardization (ISO), the independent international body that develops voluntary standards. The standard was created in response to growing global concern about corruption and bribery in business transactions. It was developed by ISO's Project Committee ISO/PC 278, which included anti-corruption experts from over 30 countries, to provide organizations with a framework for establishing, implementing, and maintaining an anti-bribery management system.
Industry Value
ISO 37001 is valued because it demonstrates an organization's commitment to preventing, detecting, and addressing bribery. Certification helps organizations reduce the risk of bribery occurring, reassure stakeholders about ethical business practices, and potentially provide a defense in legal proceedings by showing due diligence. The standard is particularly important for companies operating internationally or in high-risk sectors, as it provides a recognized framework for compliance with anti-bribery laws such as the UK Bribery Act and the US Foreign Corrupt Practices Act.
---
*If you're looking for cybersecurity/IT certifications, you may be thinking of standards like ISO/IEC 27001 (Information Security Management) or ISO/IEC 27032 (Cybersecurity).*
ISO 9001 and Cybersecurity/IT
Origin
ISO 9001 is a quality management system standard developed by the International Organization for Standardization (ISO), first published in 1987. However, it's important to note that ISO 9001 itself is not a cybersecurity or IT-specific certification—it's a general quality management standard applicable to any industry. For cybersecurity and IT specifically, ISO created ISO/IEC 27001 in 2005, which focuses on information security management systems. ISO 9001 was created to establish consistent quality management practices across organizations worldwide, while ISO/IEC 27001 was developed to address the growing need for standardized information security controls.
Industry Value
ISO 9001 is valued across industries for demonstrating an organization's commitment to quality, customer satisfaction, and continuous improvement, which can indirectly support IT operations. For actual cybersecurity and IT security certification, ISO/IEC 27001 is the recognized standard, valued because it provides a systematic approach to managing sensitive information, demonstrates due diligence to clients and stakeholders, and is often required for government contracts or business partnerships. ISO/IEC 27001 certification signals that an organization has implemented internationally recognized security controls and risk management processes, making it essential for building trust in an increasingly security-conscious business environment.
Certified Ethical Hacker (CEH) Certification
Origin
The Certified Ethical Hacker (CEH) certification was created by the International Council of E-Commerce Consultants (EC-Council) in 2003. EC-Council developed this certification in response to the growing need for standardized training in ethical hacking and penetration testing. The organization recognized that cybersecurity professionals needed formal credentials that would demonstrate their ability to think like malicious hackers in order to better defend systems and networks. The CEH was designed to establish a baseline of knowledge for security practitioners who assess system vulnerabilities using the same techniques employed by attackers.
Industry Value
The CEH certification is valued in the cybersecurity industry because it validates practical knowledge of security threats, vulnerabilities, and countermeasures. Many organizations, including government agencies and private corporations, recognize CEH as a benchmark for hiring security analysts, penetration testers, and security consultants. The certification covers 20 domains of information security, providing holders with a comprehensive understanding of attack vectors and defensive strategies. For professionals, earning the CEH demonstrates commitment to the field and can lead to career advancement opportunities and increased earning potential in an industry facing significant talent shortages.
Computer Hacking Forensic Investigator (CHFI) Certification
Origin
The CHFI certification was created by the EC-Council (International Council of Electronic Commerce Consultants) in 2003. EC-Council developed this certification to address the growing need for qualified professionals who could conduct computer forensic investigations and handle digital evidence in accordance with legal standards. The certification was designed to train cybersecurity professionals in detecting hacking attacks and properly extracting evidence to report the crime and prosecute cybercriminals.
Industry Value
CHFI is valued in the industry because it provides comprehensive training in digital forensics methodologies, evidence collection, and analysis techniques that meet judicial and industry standards. The certification is recognized by employers worldwide and is particularly important for professionals working in law enforcement, government agencies, and corporate security teams who need to investigate cybercrimes and present findings in legal proceedings. Many organizations require or prefer CHFI certification for roles involving incident response, digital forensics, and security operations, as it demonstrates a professional's ability to handle sensitive investigations while maintaining the integrity of digital evidence.
CISSP Certification Overview
Origin
The Certified Information Systems Security Professional (CISSP) was created by the International Information System Security Certification Consortium, commonly known as (ISC)², in 1994. The certification was developed in response to the growing need for a standardized, vendor-neutral credential that could validate the expertise of information security professionals. (ISC)² designed the CISSP to establish a common body of knowledge for the cybersecurity field and provide a benchmark for measuring professional competence in information security.
Industry Value
The CISSP is widely regarded as one of the most prestigious and recognized certifications in cybersecurity, often required or preferred for senior-level security positions. Its value stems from its comprehensive coverage of eight security domains, including security operations, asset security, and security architecture, which demonstrates a candidate's broad expertise across the entire security landscape. The certification is accredited to ISO/IEC Standard 17024 and meets U.S. Department of Defense Directive 8570 requirements, making it particularly valuable for government contractors and enterprise organizations. Employers value CISSP-certified professionals because the rigorous examination process and experience requirements (minimum five years) ensure holders possess both theoretical knowledge and practical experience in managing and implementing security programs.
CCSP Certification Overview
Origin
The Certified Cloud Security Professional (CCSP) certification was created through a collaboration between (ISC)² (International Information System Security Certification Consortium) and the Cloud Security Alliance (CSA). Launched in 2015, the certification was developed in response to the rapidly growing adoption of cloud computing and the increasing need for security professionals with specialized knowledge in cloud environments. (ISC)² partnered with CSA to ensure the certification addressed real-world cloud security challenges and aligned with industry best practices.
Industry Value
The CCSP is highly valued because it validates expertise in cloud security architecture, governance, risk management, and compliance—critical skills as organizations continue migrating to cloud platforms. It demonstrates that professionals understand how to secure data, applications, and infrastructure across major cloud service models (IaaS, PaaS, SaaS) and can implement security controls specific to cloud environments. Employers recognize CCSP holders as qualified to manage the unique security challenges of cloud computing, making it particularly valuable for security architects, engineers, and IT managers working with AWS, Azure, Google Cloud, and other platforms.