We’re a diverse group of cybersecurity professionals, investigators, analysts, and consultants with real-world experience in digital threats, legal discovery, and enterprise security. Each member of our team brings unique skills to deliver smart, effective, and compliant solutions
Specialties: Digital Forensics, eDiscovery, InfoSec Strategy
With a background in cybersecurity consulting, incident response, and forensic investigations, Yasmina brings a hands-on, investigative mindset to every engagement. She has supported law firms, businesses, and individuals through high-stakes cyber events and compliance challenges.
Combining hands-on experience in digital forensics, cybersecurity strategy, penetration testing, and eDiscovery. With a background supporting businesses, legal teams, and individuals, We offer the depth of a full security team with the flexibility and personalized attention of a dedicated consultant. When needed, we also collaborate with trusted network of industry professionals to deliver tailored solutions for more complex or large-scale projects.
We also collaborate with a vetted network of incident response specialists, compliance consultants, and cloud security architects — allowing us to scale our services without sacrificing quality or expertise.
At DEHTA, we bring together a dynamic blend of expertise across cybersecurity, digital forensics, and legal tech. While I lead most engagements personally, our approach is backed by a network of trusted professionals who specialize in everything from incident response and penetration testing to compliance and cloud security. This flexible team model allows us to deliver full-spectrum cybersecurity solutions — tailored, scalable, and always aligned with your unique needs.
Handles forensic imaging, analysis of breached systems, evidence preservation, and reporting for legal use.
Performs vulnerability assessments, simulated attacks, and red-team exercises to test system defenses.
Manages real-time breach situations, containment strategies, root cause analysis, and remediation.
Assists law firms and corporate legal departments with compliant data collection, review, and production.
Provides expertise in regulatory requirements (HIPAA, GDPR, NIST, CMMC, etc.) and policy development.
Secures cloud infrastructure (AWS, Azure, GCP) — identity management, encryption, access control.
Develops and delivers customized training programs, phishing simulations, and security culture initiatives.
Acts as a part-time CISO for organizations — overseeing security strategy, board-level reporting, and team leadership.
Monitors emerging threats, dark web activity, and provides proactive threat modeling and mitigation plans.
If you're interested in one of our open positions, start by applying here and attaching your resume.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.