SlideShare a Scribd company logo
1 of 19
© Copyright 2012 EMC Corporation. All rights reserved.
Carlos Galeano
EMC2 Regional Storage Specialist
Carlos.galeanocantillo@emc.com
Seguridad en
información digital
© Copyright 2012 EMC Corporation. All rights reserved.
La transformación es continua
MovilidadConsumo masivo Sociabilidad
© Copyright 2012 EMC Corporation. All rights reserved.
La información como fuente de
transformación
• Es siginificativa para el usuario.
• Es el activo mas valioso de una
organización.
• Representa nuevas oportunidades o
ventajas competitivas
© Copyright 2012 EMC Corporation. All rights reserved.
La información como fuente de
transgresión
Puede usarse con fines cuestionables o poco éticos.
Puede divulgarse sin la debida autorización de su
propietario o autor.
Eventualmente puede robarse, sabotearse o
emplearse con fines fraudulentos.
© Copyright 2012 EMC Corporation. All rights reserved.
Principios básicos de seguridad
• Confidencialidad
• Integridad
• Disponibilidad
© Copyright 2012 EMC Corporation. All rights reserved.
Adaptarse a la dinámica actual de la tecnología
Gestion de Acceso a los datos
Application Platform TransportUser App / Data
© Copyright 2012 EMC Corporation. All rights reserved.
Regresando a lo básico
Clasificar los Datos
© Copyright 2012 EMC Corporation. All rights reserved.
Ejemplos de Clasificación y Control
Classification
Preventive
Controls
Auth Monitoring
Sensitive Restricted
DLP, Encryption,
Registered Asset
Data / App / User / Machine
Activity & Access Logs /
Search / posting / content
Confidential
DLP, Encryption,
Registered Asset
App Access Control/ Role
based
Access log / search / posting
/ content
Internal Use Only Host intrusion
App Access Control/ Role
based
Search / posting / content
Registered Public Registered account
App Access Control/ Role
based
Search / posting / content
Public
Uploading executable
content blocked
Anonymous access Search / content
© Copyright 2012 EMC Corporation. All rights reserved.
Regresando a lo básico
Definir Puntos de Control
Clasificar los Datos
© Copyright 2012 EMC Corporation. All rights reserved.
Evolucionar en los puntos de control
Controles a través de todos los niveles
Client
App
App
Container
OS /
Platform Network
Server
App
Authentication     
Posture     
Anti-malware     
Data leakage     
Transport encryption     
At rest encryption    — 
 Tradicional
 Futuro
© Copyright 2012 EMC Corporation. All rights reserved.
Back To Basics
Definir Puntos de Control
Clasificar los Datos
Implementar Controles
© Copyright 2012 EMC Corporation. All rights reserved.
No importa donde se aplican los controles…..
Gestion de Acceso a los datos
Application Platform TransportUser App / Data
© Copyright 2012 EMC Corporation. All rights reserved.
No todo es bueno para todos:
Acceso con base en el riesgo.
 Quién es usted?
 Qué esta usando?
 De donde viene usted?
 Cómo llegó hasta aquí?
 Hacia dónde va usted?
 Cuál es su historia?
© Copyright 2012 EMC Corporation. All rights reserved.
Risk History
Click happy?
Intel
Easy target?
Education &
Awareness
Test performance?
Threat
Score
Modelamiento con base en el riesgo
Who are you?
User Identity
What you have
Device and controls
Where are you
Location
Who are you
Application role
What do you want
Data classification
Where is the data
Data location
Trusted Access
Published Access
Blocked Access
Source
Score
Destination
Score
Level
of Access
© Copyright 2012 EMC Corporation. All rights reserved.
Application
Integration
Cloud
App
Server
Data
Fabric
Monitoring &
Management
Integration,
Batch,
Web Services
Common
Data Model
EMC
PRIVATE CLOUD
Device Security
Enterprise App Store
Authentication
Access Control
Encryption
Anti-Malware
Management
Logging
Monitoring
Cloud Security
Authentication
Access Control
Posture
Data Leakage
Encryption
Device Mgmt
Logging
Monitoring
Legacy
Apps
New
Apps
E N T E R P R I S E A P P L I C A T I O N S
Data
Warehouse
CRMERP
Mobile Experience
© Copyright 2012 EMC Corporation. All rights reserved.
© Copyright 2012 EMC Corporation. All rights reserved.
Network Access Tiers
Functiona
l Apps
Eng
Apps
Corp
Apps
Smart
Device
Windows
Laptop
Windows
Desktop
Apple
Deskto
p
Apple
Laptop
Linux
Laptop
Linux
Deskto
p
Thin
Client
User Role Ownership
Trust Assessment
Roaming Controls
Trusted Access Published Access
Operational
and Security
Intelligence
EnVision
NetWitness
Archer
eGRC
Published Services
Modelo de Acceso con base en niveles
de confianza
© Copyright 2012 EMC Corporation. All rights reserved.
Puntos clave a tomar en cuenta
 Pensar diferente e innovar
 La seguridad es un camino constante
 Impulsar el cambio
 La Seguridad es responsabilidad de todos
http://colombia.emc.com

More Related Content

Viewers also liked

boletin-yoverde_001
boletin-yoverde_001boletin-yoverde_001
boletin-yoverde_001Mica Sabja
 
Social media the new dna 16 april
Social media the new dna   16 aprilSocial media the new dna   16 april
Social media the new dna 16 aprilTNO
 
Survey results
Survey resultsSurvey results
Survey resultssamasmedia
 
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.Brest Fabian Dario
 
The shallows trailer analysis
The shallows trailer analysis The shallows trailer analysis
The shallows trailer analysis Ryan Bogle
 
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)SCCM
 
Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis. Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis. Ryan Bogle
 
The Shallows Analysis
The Shallows AnalysisThe Shallows Analysis
The Shallows AnalysisDylan Koolman
 
فن الرسم بالرصاص
فن الرسم بالرصاصفن الرسم بالرصاص
فن الرسم بالرصاصSahar Al-siyabi
 
Учебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботовУчебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботовTatiana Kartashova
 

Viewers also liked (13)

boletin-yoverde_001
boletin-yoverde_001boletin-yoverde_001
boletin-yoverde_001
 
Social media the new dna 16 april
Social media the new dna   16 aprilSocial media the new dna   16 april
Social media the new dna 16 april
 
Survey results
Survey resultsSurvey results
Survey results
 
Apresentação 1
Apresentação 1Apresentação 1
Apresentação 1
 
Propagandaplakat
PropagandaplakatPropagandaplakat
Propagandaplakat
 
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
 
L'art nouveau
L'art nouveauL'art nouveau
L'art nouveau
 
The shallows trailer analysis
The shallows trailer analysis The shallows trailer analysis
The shallows trailer analysis
 
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
 
Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis. Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis.
 
The Shallows Analysis
The Shallows AnalysisThe Shallows Analysis
The Shallows Analysis
 
فن الرسم بالرصاص
فن الرسم بالرصاصفن الرسم بالرصاص
فن الرسم بالرصاص
 
Учебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботовУчебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботов
 

Similar to Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist

From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardEMC
 
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDSOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDOpen Networking Summits
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsEMC
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
Identifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the CloudIdentifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the CloudEMC
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
Myths and Realities of Cloud Data Security
Myths and Realities of Cloud Data SecurityMyths and Realities of Cloud Data Security
Myths and Realities of Cloud Data SecurityMichael Krouze
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Daniel Zini
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionSpanning Cloud Apps
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The EnterprisePriyanka Aash
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseEric Vétillard
 

Similar to Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist (20)

From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDSOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Identifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the CloudIdentifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the Cloud
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
Myths and Realities of Cloud Data Security
Myths and Realities of Cloud Data SecurityMyths and Realities of Cloud Data Security
Myths and Realities of Cloud Data Security
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data Protection
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The Enterprise
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-Enterprise
 

More from Ministerio TIC Colombia

Avanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHzAvanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHzMinisterio TIC Colombia
 
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 MhzAudiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 MhzMinisterio TIC Colombia
 
Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019Ministerio TIC Colombia
 
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
 ComparTIC junio de 2019| ¡Así quedó la Ley TIC! ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!Ministerio TIC Colombia
 
El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018Ministerio TIC Colombia
 
TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018Ministerio TIC Colombia
 
8° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 20188° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 2018Ministerio TIC Colombia
 
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...Ministerio TIC Colombia
 

More from Ministerio TIC Colombia (20)

Presentación - ComparTIC Octubre 2019
Presentación - ComparTIC Octubre 2019Presentación - ComparTIC Octubre 2019
Presentación - ComparTIC Octubre 2019
 
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHzAvanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHz
 
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 MhzAudiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
 
Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019
 
Presentación - ComparTIC Agosto 2019
Presentación - ComparTIC Agosto 2019Presentación - ComparTIC Agosto 2019
Presentación - ComparTIC Agosto 2019
 
Reglamentación Ley 1978 de 2019
Reglamentación Ley 1978 de 2019Reglamentación Ley 1978 de 2019
Reglamentación Ley 1978 de 2019
 
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
 ComparTIC junio de 2019| ¡Así quedó la Ley TIC! ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
 
ComparTIC de abril
ComparTIC de abril ComparTIC de abril
ComparTIC de abril
 
ComparTIC, marzo 15 de 2019
ComparTIC, marzo 15 de 2019ComparTIC, marzo 15 de 2019
ComparTIC, marzo 15 de 2019
 
ComparTIC: Logros año 2018
ComparTIC: Logros año 2018ComparTIC: Logros año 2018
ComparTIC: Logros año 2018
 
ComparTIC: Logros Octubre de 2018
ComparTIC: Logros Octubre de 2018ComparTIC: Logros Octubre de 2018
ComparTIC: Logros Octubre de 2018
 
ComparTIC: Logros Septiembre de 2018
ComparTIC: Logros Septiembre de 2018ComparTIC: Logros Septiembre de 2018
ComparTIC: Logros Septiembre de 2018
 
El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018
 
TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018
 
8° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 20188° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 2018
 
Estrategia Contra Hurto de Celulares
Estrategia Contra Hurto de CelularesEstrategia Contra Hurto de Celulares
Estrategia Contra Hurto de Celulares
 
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
 
Derechos de Autor - DNDA
Derechos de Autor - DNDADerechos de Autor - DNDA
Derechos de Autor - DNDA
 
Regulación para Operadores - CRC
Regulación para Operadores - CRCRegulación para Operadores - CRC
Regulación para Operadores - CRC
 
Espectro para Operadores - ANE
Espectro para Operadores - ANEEspectro para Operadores - ANE
Espectro para Operadores - ANE
 

Recently uploaded

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 

Recently uploaded (20)

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 

Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist

  • 1. © Copyright 2012 EMC Corporation. All rights reserved. Carlos Galeano EMC2 Regional Storage Specialist Carlos.galeanocantillo@emc.com Seguridad en información digital
  • 2. © Copyright 2012 EMC Corporation. All rights reserved. La transformación es continua MovilidadConsumo masivo Sociabilidad
  • 3. © Copyright 2012 EMC Corporation. All rights reserved. La información como fuente de transformación • Es siginificativa para el usuario. • Es el activo mas valioso de una organización. • Representa nuevas oportunidades o ventajas competitivas
  • 4. © Copyright 2012 EMC Corporation. All rights reserved. La información como fuente de transgresión Puede usarse con fines cuestionables o poco éticos. Puede divulgarse sin la debida autorización de su propietario o autor. Eventualmente puede robarse, sabotearse o emplearse con fines fraudulentos.
  • 5. © Copyright 2012 EMC Corporation. All rights reserved. Principios básicos de seguridad • Confidencialidad • Integridad • Disponibilidad
  • 6. © Copyright 2012 EMC Corporation. All rights reserved. Adaptarse a la dinámica actual de la tecnología Gestion de Acceso a los datos Application Platform TransportUser App / Data
  • 7. © Copyright 2012 EMC Corporation. All rights reserved. Regresando a lo básico Clasificar los Datos
  • 8. © Copyright 2012 EMC Corporation. All rights reserved. Ejemplos de Clasificación y Control Classification Preventive Controls Auth Monitoring Sensitive Restricted DLP, Encryption, Registered Asset Data / App / User / Machine Activity & Access Logs / Search / posting / content Confidential DLP, Encryption, Registered Asset App Access Control/ Role based Access log / search / posting / content Internal Use Only Host intrusion App Access Control/ Role based Search / posting / content Registered Public Registered account App Access Control/ Role based Search / posting / content Public Uploading executable content blocked Anonymous access Search / content
  • 9. © Copyright 2012 EMC Corporation. All rights reserved. Regresando a lo básico Definir Puntos de Control Clasificar los Datos
  • 10. © Copyright 2012 EMC Corporation. All rights reserved. Evolucionar en los puntos de control Controles a través de todos los niveles Client App App Container OS / Platform Network Server App Authentication      Posture      Anti-malware      Data leakage      Transport encryption      At rest encryption    —   Tradicional  Futuro
  • 11. © Copyright 2012 EMC Corporation. All rights reserved. Back To Basics Definir Puntos de Control Clasificar los Datos Implementar Controles
  • 12. © Copyright 2012 EMC Corporation. All rights reserved. No importa donde se aplican los controles….. Gestion de Acceso a los datos Application Platform TransportUser App / Data
  • 13. © Copyright 2012 EMC Corporation. All rights reserved. No todo es bueno para todos: Acceso con base en el riesgo.  Quién es usted?  Qué esta usando?  De donde viene usted?  Cómo llegó hasta aquí?  Hacia dónde va usted?  Cuál es su historia?
  • 14. © Copyright 2012 EMC Corporation. All rights reserved. Risk History Click happy? Intel Easy target? Education & Awareness Test performance? Threat Score Modelamiento con base en el riesgo Who are you? User Identity What you have Device and controls Where are you Location Who are you Application role What do you want Data classification Where is the data Data location Trusted Access Published Access Blocked Access Source Score Destination Score Level of Access
  • 15. © Copyright 2012 EMC Corporation. All rights reserved. Application Integration Cloud App Server Data Fabric Monitoring & Management Integration, Batch, Web Services Common Data Model EMC PRIVATE CLOUD Device Security Enterprise App Store Authentication Access Control Encryption Anti-Malware Management Logging Monitoring Cloud Security Authentication Access Control Posture Data Leakage Encryption Device Mgmt Logging Monitoring Legacy Apps New Apps E N T E R P R I S E A P P L I C A T I O N S Data Warehouse CRMERP Mobile Experience
  • 16. © Copyright 2012 EMC Corporation. All rights reserved.
  • 17. © Copyright 2012 EMC Corporation. All rights reserved. Network Access Tiers Functiona l Apps Eng Apps Corp Apps Smart Device Windows Laptop Windows Desktop Apple Deskto p Apple Laptop Linux Laptop Linux Deskto p Thin Client User Role Ownership Trust Assessment Roaming Controls Trusted Access Published Access Operational and Security Intelligence EnVision NetWitness Archer eGRC Published Services Modelo de Acceso con base en niveles de confianza
  • 18. © Copyright 2012 EMC Corporation. All rights reserved. Puntos clave a tomar en cuenta  Pensar diferente e innovar  La seguridad es un camino constante  Impulsar el cambio  La Seguridad es responsabilidad de todos