SlideShare a Scribd company logo
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 1
CYBER SECURITY
WEBINAR
CYBER SECURITY IN MEXICO: THE BIG PICTURE AND STATUS
5 February 2015
CYBER SECURITY WEBINAR
Guest Speakers
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 2
Agenda
•Cyber Security's Overview
• Gonzalo Espinosa
•Privacy and Personal Data Protection
• Manuel Mejías
•Information Security Management, Business Continuity
and Incident Response
• Jorge Garibay
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 2
Agenda
•Cyber Security's Overview
• Gonzalo Espinosa
•Privacy and Personal Data Protection
• Manuel Mejías
•Information Security Management, Business Continuity
and Incident Response
• Jorge Garibay
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 4
The Federal Government and cyber
security
• The National Development Plan 2013 – 2018
• Deep changes to Mexico in
• Security
• Productivity
• Quality of education and
• Prosperity
Defending networks and disrupting
criminal activity
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 5
Protecting from cyber threats
Investing in cyber security
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 6
References
http://es.slideshare.net/edgbargaye/mint-countries-mexico-indonesia-nigeria-and-turkey
Privacy and Personal Data Protection
Manuel Mejías
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 7
0. The big picture
01. Cyber-attacks • 02. Data breaches
03. Perception & Understanding
01. Cyber-attacks
• Research by foreign enterprises doing
business in Mexico:
• Mexico held worst place in cyber-attack resilience (201201)
• http://www.bbc.co.uk/mundo/noticias/2012/01/120131_ciberataques_paises_mejor_peor_preparados_adz.shtml
• Mexico is target of a cyber-attack every 12 seconds (201404)
• http://eleconomista.com.mx/tecnociencia/2014/04/20/mexico-sufre-12-ataques-ciberneticos-cada-segundo-0
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 8
01. Cyber-attacks
•Research by foreign enterprises doing business
in Mexico:
Mexican businesses neglect cyber-security (201406)
http://eleconomista.com.mx/tecnociencia/2014/06/03/empresas-piensan-medias-seguridad-digital
Increase
2012 → 2013 | 113% • 2013 → 2014 | 300%
Distribution
Academic sector: 39% Public sector: 31%
Private sector: 26% Other entities: 4%
02. Data breaches
•Research by journalists in Mexican media:
Electoral database (INE, formerly IFE) (1999-2002)
http://www.cronica.com.mx/notas/2003/65060.html
Other governmental databases: electoral, vehicle, "driver's
license", police (201004)
http://www.eluniversal.com.mx/nacion/177126.html
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 9
02. Data breaches
•Research by journalists in Mexican media:
Data breach at Liverpool, a major department store, third in
nation in issued credit cards
Analysis of disclosed documents (201501)
http://www.ultimapalabra.mx/radiografia-del-hackeo-a-liverpool/
Monetary loss estimation at $100 million MXN (201501)
http://www.elfinanciero.com.mx/empresas/hackeo-a-liverpool-podria-costarle-mas-de-100-mdp-estiman.html
Paradigm change: Businesses will be exposed!!
03. Perception & Understanding
•Research by foreign enterprises doing business
in Mexico:
1 in every 4 Mexicans distrust info-security industry (201410)
http://www.elitinfraservices.com/index.php/netnews/531-1-de-cada-4-usuarios-mexicanos-no-creen-en-ciberamenazas
The rest does not even understand the problem because of age
and education
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 10
A. Public Sector
A1. Creation of normative instruments
A2. Federal government budget:
Intelligence
A1. Creation of normative
instruments
•Laws & secondary regulations
1.Personal data protection, Public sector (LFTAIPG) 2002
2.Personal data protection, Private sector (LFPDPPP) 2010
3.Telecommunications (Mass surveillance chapter), Private
sector (LFTR) 2014
•Mandatory framework
1.Governance · Strategy · Service delivery · Support
(MAAGTIC) 2010
2.Governance + Information security · Strategy · Service
delivery · Support (MAAGTIC-SI) 2011
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 11
A2. Federal government budget:
Intelligence
•Federal government budget - Intelligence
http://sipse.com/mexico/cisen-triplico-intervencion-comunicaciones-gobierno-pena-nieto-130054.html
http://eleconomista.com.mx/sociedad/2014/12/23/vigilancia-telefonica-cisen-crecio-2000-tres-anos
A2. Federal government budget:
Intelligence
•Federal government budget - Intelligence
http://sipse.com/mexico/cisen-triplico-intervencion-comunicaciones-gobierno-pena-nieto-130054.html
http://eleconomista.com.mx/sociedad/2014/09/14/cisen-tendra-7616-mdp-2015
http://www.cisen.gob.mx/pdfs/doc_desclasificados/17_2008_PRESUPUESTO_DICIEMBRE_2006_JULIO_2008.pdf
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 12
A2. Federal government budget:
Intelligence
•Federal government budget - Intelligence
http://sipse.com/mexico/presupuesto-cisen-nueva-tecnologia-mexico-grafica-111235.html
B. Private Sector
B1. R&D (startups)
B2. Compliance with personal data
protection
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 13
B1. R&D (startups)
•Hardware: Firewall technologies
•Software: Safe Web navigation for kids
•Core technologies
1. Fraud detection
Suitable for financial institutions • One patent • Founders sold enterprise to another,
larger firm • One of its founders moved to Silicon Valley to open a venture capital firm
2. Software hygiene
Methodology based on a paradigm that substantially differs from the traditional
detection paradigm • 8 patents • Able to stop data breaches in 3 of the 7 stages of
the Lockheed Martin cyber-attack kill chain model • Proven effectiveness by Swedish
and Spanish security experts
B2. Compliance with PDP
Secretaría de Economía (the Mexican ministry of
economy) Survey (2013):
–5.1 million registered businesses | 0.2% are large
enterprises
27%
73%
Yes
No
53%
45%
Electronic
Paper
Other
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 14
C. Academic Sector
C1. Info-security curriculum
C1. Info-security curriculum
•Incorporation of information security courses in
IT-related curricula:
1. MASTERS and DIPLOMA level
Tec de Monterrey • Universidad Iberoamericana
2. BACHELOR level
UNAM
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 15
D. Social Sector
D1. Exercise of granted rights
D1. Exercise of granted rights
• Already exercising rights
• Personal data protection, Public sector (LFTAIPG) 2002
• Incipient
• Personal data protection, Private sector (LFPDPPP) 2010
• Not yet
• Telecommunications (Mass surveillance chapter), Private
sector (LFTR) 2014
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 16
Information Security Management,
Business Continuity and Incident Response
Jorge Garibay
Information Security Management
• Current Situation
• Requirements
• Future
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 17
Business Continuity
• Current Situation
• Requirements
• Future
Incident Response
• Current Situation
• Requirements
• Future
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 18
CYBER SECURITY WEBINAR
Guest Speakers
CYBER SECURITY
WEBINAR
CYBER SECURITY IN MEXICO: THE BIG PICTURE AND STATUS
5 February 2015
Asociación Latinoamericana de Profesionales en
Seguridad Informática A.C.
Cyber Security Webinar
February 5, 2015 www.alapsi.org 19

More Related Content

Similar to 20150204 state of cyber security in mexico public release

Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
Kristian Alisasis Pura
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
Cyphort
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Dulanja Liyanage
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
Gwanhoo Lee
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
fmi_igf
 
Sholove cyber security 101 28 june 2015
Sholove cyber security 101 28 june 2015Sholove cyber security 101 28 june 2015
Sholove cyber security 101 28 june 2015
SHOLOVE INTERNATIONAL LLC
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
Brian Pichman
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
GlobalSign
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
Dawn Yankeelov
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
Priyanka Aash
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
CapitolTechU
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
Cyber Threat Intelligence Network
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
Rahul Neel Mani
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
Kyle Brown
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
CloudCamp Chicago
 
#LatamDigital Tech in Latin America
#LatamDigital Tech in Latin America#LatamDigital Tech in Latin America
#LatamDigital Tech in Latin America
Brad Michaels
 

Similar to 20150204 state of cyber security in mexico public release (20)

Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Sholove cyber security 101 28 june 2015
Sholove cyber security 101 28 june 2015Sholove cyber security 101 28 june 2015
Sholove cyber security 101 28 june 2015
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
#LatamDigital Tech in Latin America
#LatamDigital Tech in Latin America#LatamDigital Tech in Latin America
#LatamDigital Tech in Latin America
 

More from Gonzalo Espinosa

Vicepresidencia de Relaciones Públicas - Informe 2017-2018
Vicepresidencia de Relaciones Públicas - Informe 2017-2018Vicepresidencia de Relaciones Públicas - Informe 2017-2018
Vicepresidencia de Relaciones Públicas - Informe 2017-2018
Gonzalo Espinosa
 
Sólo para líderes
Sólo para líderesSólo para líderes
Sólo para líderes
Gonzalo Espinosa
 
Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018
Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018
Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018
Gonzalo Espinosa
 
P10 Tu vendedor interior 20181104
P10 Tu vendedor interior 20181104P10 Tu vendedor interior 20181104
P10 Tu vendedor interior 20181104
Gonzalo Espinosa
 
Informe relaciones públicas mayo 2016 jun2017
Informe relaciones públicas mayo 2016 jun2017Informe relaciones públicas mayo 2016 jun2017
Informe relaciones públicas mayo 2016 jun2017
Gonzalo Espinosa
 
Medidas para el seguro del terremoto
Medidas para el seguro del terremotoMedidas para el seguro del terremoto
Medidas para el seguro del terremoto
Gonzalo Espinosa
 
Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017
Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017
Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017
Gonzalo Espinosa
 
Plantilla 2017-2018 Toastmasters Club Reforma
Plantilla 2017-2018 Toastmasters Club ReformaPlantilla 2017-2018 Toastmasters Club Reforma
Plantilla 2017-2018 Toastmasters Club Reforma
Gonzalo Espinosa
 
Caso Práctico - Guía para Organizar un Discurso 5 a 7 minutos
Caso Práctico - Guía para Organizar un Discurso 5 a 7 minutosCaso Práctico - Guía para Organizar un Discurso 5 a 7 minutos
Caso Práctico - Guía para Organizar un Discurso 5 a 7 minutos
Gonzalo Espinosa
 
Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?
Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?
Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?
Gonzalo Espinosa
 
Club Session Template-Editable
Club Session Template-EditableClub Session Template-Editable
Club Session Template-Editable
Gonzalo Espinosa
 
Guía para organizar un discurso
 Guía para organizar un discurso Guía para organizar un discurso
Guía para organizar un discurso
Gonzalo Espinosa
 
Portafolio-Informe de rendimiento del portafolio de proyectos
Portafolio-Informe de rendimiento del portafolio de proyectosPortafolio-Informe de rendimiento del portafolio de proyectos
Portafolio-Informe de rendimiento del portafolio de proyectos
Gonzalo Espinosa
 
Portafolio-Informe de rendimiento del programa
Portafolio-Informe de rendimiento del programaPortafolio-Informe de rendimiento del programa
Portafolio-Informe de rendimiento del programa
Gonzalo Espinosa
 
Portafolio-Informe de seguimiento y control
Portafolio-Informe de seguimiento y controlPortafolio-Informe de seguimiento y control
Portafolio-Informe de seguimiento y control
Gonzalo Espinosa
 
Portafolio-Cronograma ejecutivo para el programa de proyectos
Portafolio-Cronograma ejecutivo para el programa de proyectosPortafolio-Cronograma ejecutivo para el programa de proyectos
Portafolio-Cronograma ejecutivo para el programa de proyectos
Gonzalo Espinosa
 
Portafolio-Bitácora de cambios al portafolio
Portafolio-Bitácora de cambios al portafolioPortafolio-Bitácora de cambios al portafolio
Portafolio-Bitácora de cambios al portafolio
Gonzalo Espinosa
 
Portafolio-Evaluación de iniciativas
Portafolio-Evaluación de iniciativasPortafolio-Evaluación de iniciativas
Portafolio-Evaluación de iniciativas
Gonzalo Espinosa
 
Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)
Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)
Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)
Gonzalo Espinosa
 
Invitación informe 2013 2016 - Elecciones 2016-2019
Invitación informe 2013 2016 - Elecciones 2016-2019Invitación informe 2013 2016 - Elecciones 2016-2019
Invitación informe 2013 2016 - Elecciones 2016-2019
Gonzalo Espinosa
 

More from Gonzalo Espinosa (20)

Vicepresidencia de Relaciones Públicas - Informe 2017-2018
Vicepresidencia de Relaciones Públicas - Informe 2017-2018Vicepresidencia de Relaciones Públicas - Informe 2017-2018
Vicepresidencia de Relaciones Públicas - Informe 2017-2018
 
Sólo para líderes
Sólo para líderesSólo para líderes
Sólo para líderes
 
Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018
Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018
Manual de bienvenida Toastmasters Club Reforma May 2017 Jun 2018
 
P10 Tu vendedor interior 20181104
P10 Tu vendedor interior 20181104P10 Tu vendedor interior 20181104
P10 Tu vendedor interior 20181104
 
Informe relaciones públicas mayo 2016 jun2017
Informe relaciones públicas mayo 2016 jun2017Informe relaciones públicas mayo 2016 jun2017
Informe relaciones públicas mayo 2016 jun2017
 
Medidas para el seguro del terremoto
Medidas para el seguro del terremotoMedidas para el seguro del terremoto
Medidas para el seguro del terremoto
 
Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017
Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017
Toastmaster de la noche Lecciones de Liderazgo Aprendidas 16ago2017
 
Plantilla 2017-2018 Toastmasters Club Reforma
Plantilla 2017-2018 Toastmasters Club ReformaPlantilla 2017-2018 Toastmasters Club Reforma
Plantilla 2017-2018 Toastmasters Club Reforma
 
Caso Práctico - Guía para Organizar un Discurso 5 a 7 minutos
Caso Práctico - Guía para Organizar un Discurso 5 a 7 minutosCaso Práctico - Guía para Organizar un Discurso 5 a 7 minutos
Caso Práctico - Guía para Organizar un Discurso 5 a 7 minutos
 
Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?
Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?
Soy PyME, luego requiero de Seguridad... ¿Por dónde empiezo?
 
Club Session Template-Editable
Club Session Template-EditableClub Session Template-Editable
Club Session Template-Editable
 
Guía para organizar un discurso
 Guía para organizar un discurso Guía para organizar un discurso
Guía para organizar un discurso
 
Portafolio-Informe de rendimiento del portafolio de proyectos
Portafolio-Informe de rendimiento del portafolio de proyectosPortafolio-Informe de rendimiento del portafolio de proyectos
Portafolio-Informe de rendimiento del portafolio de proyectos
 
Portafolio-Informe de rendimiento del programa
Portafolio-Informe de rendimiento del programaPortafolio-Informe de rendimiento del programa
Portafolio-Informe de rendimiento del programa
 
Portafolio-Informe de seguimiento y control
Portafolio-Informe de seguimiento y controlPortafolio-Informe de seguimiento y control
Portafolio-Informe de seguimiento y control
 
Portafolio-Cronograma ejecutivo para el programa de proyectos
Portafolio-Cronograma ejecutivo para el programa de proyectosPortafolio-Cronograma ejecutivo para el programa de proyectos
Portafolio-Cronograma ejecutivo para el programa de proyectos
 
Portafolio-Bitácora de cambios al portafolio
Portafolio-Bitácora de cambios al portafolioPortafolio-Bitácora de cambios al portafolio
Portafolio-Bitácora de cambios al portafolio
 
Portafolio-Evaluación de iniciativas
Portafolio-Evaluación de iniciativasPortafolio-Evaluación de iniciativas
Portafolio-Evaluación de iniciativas
 
Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)
Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)
Informe ALAPSI A.C. 2013-2016 (9 Jun 2016)
 
Invitación informe 2013 2016 - Elecciones 2016-2019
Invitación informe 2013 2016 - Elecciones 2016-2019Invitación informe 2013 2016 - Elecciones 2016-2019
Invitación informe 2013 2016 - Elecciones 2016-2019
 

Recently uploaded

Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
Taste
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 

20150204 state of cyber security in mexico public release

  • 1. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 1 CYBER SECURITY WEBINAR CYBER SECURITY IN MEXICO: THE BIG PICTURE AND STATUS 5 February 2015 CYBER SECURITY WEBINAR Guest Speakers
  • 2. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 2 Agenda •Cyber Security's Overview • Gonzalo Espinosa •Privacy and Personal Data Protection • Manuel Mejías •Information Security Management, Business Continuity and Incident Response • Jorge Garibay
  • 3. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 2 Agenda •Cyber Security's Overview • Gonzalo Espinosa •Privacy and Personal Data Protection • Manuel Mejías •Information Security Management, Business Continuity and Incident Response • Jorge Garibay
  • 4. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 4 The Federal Government and cyber security • The National Development Plan 2013 – 2018 • Deep changes to Mexico in • Security • Productivity • Quality of education and • Prosperity Defending networks and disrupting criminal activity
  • 5. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 5 Protecting from cyber threats Investing in cyber security
  • 6. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 6 References http://es.slideshare.net/edgbargaye/mint-countries-mexico-indonesia-nigeria-and-turkey Privacy and Personal Data Protection Manuel Mejías
  • 7. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 7 0. The big picture 01. Cyber-attacks • 02. Data breaches 03. Perception & Understanding 01. Cyber-attacks • Research by foreign enterprises doing business in Mexico: • Mexico held worst place in cyber-attack resilience (201201) • http://www.bbc.co.uk/mundo/noticias/2012/01/120131_ciberataques_paises_mejor_peor_preparados_adz.shtml • Mexico is target of a cyber-attack every 12 seconds (201404) • http://eleconomista.com.mx/tecnociencia/2014/04/20/mexico-sufre-12-ataques-ciberneticos-cada-segundo-0
  • 8. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 8 01. Cyber-attacks •Research by foreign enterprises doing business in Mexico: Mexican businesses neglect cyber-security (201406) http://eleconomista.com.mx/tecnociencia/2014/06/03/empresas-piensan-medias-seguridad-digital Increase 2012 → 2013 | 113% • 2013 → 2014 | 300% Distribution Academic sector: 39% Public sector: 31% Private sector: 26% Other entities: 4% 02. Data breaches •Research by journalists in Mexican media: Electoral database (INE, formerly IFE) (1999-2002) http://www.cronica.com.mx/notas/2003/65060.html Other governmental databases: electoral, vehicle, "driver's license", police (201004) http://www.eluniversal.com.mx/nacion/177126.html
  • 9. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 9 02. Data breaches •Research by journalists in Mexican media: Data breach at Liverpool, a major department store, third in nation in issued credit cards Analysis of disclosed documents (201501) http://www.ultimapalabra.mx/radiografia-del-hackeo-a-liverpool/ Monetary loss estimation at $100 million MXN (201501) http://www.elfinanciero.com.mx/empresas/hackeo-a-liverpool-podria-costarle-mas-de-100-mdp-estiman.html Paradigm change: Businesses will be exposed!! 03. Perception & Understanding •Research by foreign enterprises doing business in Mexico: 1 in every 4 Mexicans distrust info-security industry (201410) http://www.elitinfraservices.com/index.php/netnews/531-1-de-cada-4-usuarios-mexicanos-no-creen-en-ciberamenazas The rest does not even understand the problem because of age and education
  • 10. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 10 A. Public Sector A1. Creation of normative instruments A2. Federal government budget: Intelligence A1. Creation of normative instruments •Laws & secondary regulations 1.Personal data protection, Public sector (LFTAIPG) 2002 2.Personal data protection, Private sector (LFPDPPP) 2010 3.Telecommunications (Mass surveillance chapter), Private sector (LFTR) 2014 •Mandatory framework 1.Governance · Strategy · Service delivery · Support (MAAGTIC) 2010 2.Governance + Information security · Strategy · Service delivery · Support (MAAGTIC-SI) 2011
  • 11. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 11 A2. Federal government budget: Intelligence •Federal government budget - Intelligence http://sipse.com/mexico/cisen-triplico-intervencion-comunicaciones-gobierno-pena-nieto-130054.html http://eleconomista.com.mx/sociedad/2014/12/23/vigilancia-telefonica-cisen-crecio-2000-tres-anos A2. Federal government budget: Intelligence •Federal government budget - Intelligence http://sipse.com/mexico/cisen-triplico-intervencion-comunicaciones-gobierno-pena-nieto-130054.html http://eleconomista.com.mx/sociedad/2014/09/14/cisen-tendra-7616-mdp-2015 http://www.cisen.gob.mx/pdfs/doc_desclasificados/17_2008_PRESUPUESTO_DICIEMBRE_2006_JULIO_2008.pdf
  • 12. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 12 A2. Federal government budget: Intelligence •Federal government budget - Intelligence http://sipse.com/mexico/presupuesto-cisen-nueva-tecnologia-mexico-grafica-111235.html B. Private Sector B1. R&D (startups) B2. Compliance with personal data protection
  • 13. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 13 B1. R&D (startups) •Hardware: Firewall technologies •Software: Safe Web navigation for kids •Core technologies 1. Fraud detection Suitable for financial institutions • One patent • Founders sold enterprise to another, larger firm • One of its founders moved to Silicon Valley to open a venture capital firm 2. Software hygiene Methodology based on a paradigm that substantially differs from the traditional detection paradigm • 8 patents • Able to stop data breaches in 3 of the 7 stages of the Lockheed Martin cyber-attack kill chain model • Proven effectiveness by Swedish and Spanish security experts B2. Compliance with PDP Secretaría de Economía (the Mexican ministry of economy) Survey (2013): –5.1 million registered businesses | 0.2% are large enterprises 27% 73% Yes No 53% 45% Electronic Paper Other
  • 14. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 14 C. Academic Sector C1. Info-security curriculum C1. Info-security curriculum •Incorporation of information security courses in IT-related curricula: 1. MASTERS and DIPLOMA level Tec de Monterrey • Universidad Iberoamericana 2. BACHELOR level UNAM
  • 15. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 15 D. Social Sector D1. Exercise of granted rights D1. Exercise of granted rights • Already exercising rights • Personal data protection, Public sector (LFTAIPG) 2002 • Incipient • Personal data protection, Private sector (LFPDPPP) 2010 • Not yet • Telecommunications (Mass surveillance chapter), Private sector (LFTR) 2014
  • 16. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 16 Information Security Management, Business Continuity and Incident Response Jorge Garibay Information Security Management • Current Situation • Requirements • Future
  • 17. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 17 Business Continuity • Current Situation • Requirements • Future Incident Response • Current Situation • Requirements • Future
  • 18. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 18 CYBER SECURITY WEBINAR Guest Speakers CYBER SECURITY WEBINAR CYBER SECURITY IN MEXICO: THE BIG PICTURE AND STATUS 5 February 2015
  • 19. Asociación Latinoamericana de Profesionales en Seguridad Informática A.C. Cyber Security Webinar February 5, 2015 www.alapsi.org 19