SlideShare a Scribd company logo
© Copyright 2012 EMC Corporation. All rights reserved.
Carlos Galeano
EMC2 Regional Storage Specialist
Carlos.galeanocantillo@emc.com
Seguridad en
información digital
© Copyright 2012 EMC Corporation. All rights reserved.
La transformación es continua
MovilidadConsumo masivo Sociabilidad
© Copyright 2012 EMC Corporation. All rights reserved.
La información como fuente de
transformación
• Es siginificativa para el usuario.
• Es el activo mas valioso de una
organización.
• Representa nuevas oportunidades o
ventajas competitivas
© Copyright 2012 EMC Corporation. All rights reserved.
La información como fuente de
transgresión
Puede usarse con fines cuestionables o poco éticos.
Puede divulgarse sin la debida autorización de su
propietario o autor.
Eventualmente puede robarse, sabotearse o
emplearse con fines fraudulentos.
© Copyright 2012 EMC Corporation. All rights reserved.
Principios básicos de seguridad
• Confidencialidad
• Integridad
• Disponibilidad
© Copyright 2012 EMC Corporation. All rights reserved.
Adaptarse a la dinámica actual de la tecnología
Gestion de Acceso a los datos
Application Platform TransportUser App / Data
© Copyright 2012 EMC Corporation. All rights reserved.
Regresando a lo básico
Clasificar los Datos
© Copyright 2012 EMC Corporation. All rights reserved.
Ejemplos de Clasificación y Control
Classification
Preventive
Controls
Auth Monitoring
Sensitive Restricted
DLP, Encryption,
Registered Asset
Data / App / User / Machine
Activity & Access Logs /
Search / posting / content
Confidential
DLP, Encryption,
Registered Asset
App Access Control/ Role
based
Access log / search / posting
/ content
Internal Use Only Host intrusion
App Access Control/ Role
based
Search / posting / content
Registered Public Registered account
App Access Control/ Role
based
Search / posting / content
Public
Uploading executable
content blocked
Anonymous access Search / content
© Copyright 2012 EMC Corporation. All rights reserved.
Regresando a lo básico
Definir Puntos de Control
Clasificar los Datos
© Copyright 2012 EMC Corporation. All rights reserved.
Evolucionar en los puntos de control
Controles a través de todos los niveles
Client
App
App
Container
OS /
Platform Network
Server
App
Authentication     
Posture     
Anti-malware     
Data leakage     
Transport encryption     
At rest encryption    — 
 Tradicional
 Futuro
© Copyright 2012 EMC Corporation. All rights reserved.
Back To Basics
Definir Puntos de Control
Clasificar los Datos
Implementar Controles
© Copyright 2012 EMC Corporation. All rights reserved.
No importa donde se aplican los controles…..
Gestion de Acceso a los datos
Application Platform TransportUser App / Data
© Copyright 2012 EMC Corporation. All rights reserved.
No todo es bueno para todos:
Acceso con base en el riesgo.
 Quién es usted?
 Qué esta usando?
 De donde viene usted?
 Cómo llegó hasta aquí?
 Hacia dónde va usted?
 Cuál es su historia?
© Copyright 2012 EMC Corporation. All rights reserved.
Risk History
Click happy?
Intel
Easy target?
Education &
Awareness
Test performance?
Threat
Score
Modelamiento con base en el riesgo
Who are you?
User Identity
What you have
Device and controls
Where are you
Location
Who are you
Application role
What do you want
Data classification
Where is the data
Data location
Trusted Access
Published Access
Blocked Access
Source
Score
Destination
Score
Level
of Access
© Copyright 2012 EMC Corporation. All rights reserved.
Application
Integration
Cloud
App
Server
Data
Fabric
Monitoring &
Management
Integration,
Batch,
Web Services
Common
Data Model
EMC
PRIVATE CLOUD
Device Security
Enterprise App Store
Authentication
Access Control
Encryption
Anti-Malware
Management
Logging
Monitoring
Cloud Security
Authentication
Access Control
Posture
Data Leakage
Encryption
Device Mgmt
Logging
Monitoring
Legacy
Apps
New
Apps
E N T E R P R I S E A P P L I C A T I O N S
Data
Warehouse
CRMERP
Mobile Experience
© Copyright 2012 EMC Corporation. All rights reserved.
© Copyright 2012 EMC Corporation. All rights reserved.
Network Access Tiers
Functiona
l Apps
Eng
Apps
Corp
Apps
Smart
Device
Windows
Laptop
Windows
Desktop
Apple
Deskto
p
Apple
Laptop
Linux
Laptop
Linux
Deskto
p
Thin
Client
User Role Ownership
Trust Assessment
Roaming Controls
Trusted Access Published Access
Operational
and Security
Intelligence
EnVision
NetWitness
Archer
eGRC
Published Services
Modelo de Acceso con base en niveles
de confianza
© Copyright 2012 EMC Corporation. All rights reserved.
Puntos clave a tomar en cuenta
 Pensar diferente e innovar
 La seguridad es un camino constante
 Impulsar el cambio
 La Seguridad es responsabilidad de todos
http://colombia.emc.com

More Related Content

Viewers also liked

boletin-yoverde_001
boletin-yoverde_001boletin-yoverde_001
boletin-yoverde_001
Mica Sabja
 
Social media the new dna 16 april
Social media the new dna   16 aprilSocial media the new dna   16 april
Social media the new dna 16 april
TNO
 
Survey results
Survey resultsSurvey results
Survey results
samasmedia
 
Apresentação 1
Apresentação 1Apresentação 1
Apresentação 1
Ricardo Gonçalves Tavares
 
Propagandaplakat
PropagandaplakatPropagandaplakat
Propagandaplakat
Lukasz_Toporkiewicz
 
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
Brest Fabian Dario
 
L'art nouveau
L'art nouveauL'art nouveau
L'art nouveau
Agostinho.Gouveia
 
The shallows trailer analysis
The shallows trailer analysis The shallows trailer analysis
The shallows trailer analysis
Ryan Bogle
 
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
SCCM
 
Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis. Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis.
Ryan Bogle
 
The Shallows Analysis
The Shallows AnalysisThe Shallows Analysis
The Shallows Analysis
Dylan Koolman
 
فن الرسم بالرصاص
فن الرسم بالرصاصفن الرسم بالرصاص
فن الرسم بالرصاص
Sahar Al-siyabi
 
Учебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботовУчебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботовTatiana Kartashova
 

Viewers also liked (13)

boletin-yoverde_001
boletin-yoverde_001boletin-yoverde_001
boletin-yoverde_001
 
Social media the new dna 16 april
Social media the new dna   16 aprilSocial media the new dna   16 april
Social media the new dna 16 april
 
Survey results
Survey resultsSurvey results
Survey results
 
Apresentação 1
Apresentação 1Apresentação 1
Apresentação 1
 
Propagandaplakat
PropagandaplakatPropagandaplakat
Propagandaplakat
 
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
347 hdc-2012. Mantenimiento calle Luis Piedrabuena.
 
L'art nouveau
L'art nouveauL'art nouveau
L'art nouveau
 
The shallows trailer analysis
The shallows trailer analysis The shallows trailer analysis
The shallows trailer analysis
 
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
Presentatie webinar fysieke belasting (tillen, dragen, duwen, trekken)
 
Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis. Suicide Squad Poster Analysis.
Suicide Squad Poster Analysis.
 
The Shallows Analysis
The Shallows AnalysisThe Shallows Analysis
The Shallows Analysis
 
فن الرسم بالرصاص
فن الرسم بالرصاصفن الرسم بالرصاص
فن الرسم بالرصاص
 
Учебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботовУчебные цели при конструировании Лего-роботов
Учебные цели при конструировании Лего-роботов
 

Similar to Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist

From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
EMC
 
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDSOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
Open Networking Summits
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
EMC
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
EMC
 
Identifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the CloudIdentifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the Cloud
EMC
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
Nicholas Chia
 
Myths and Realities of Cloud Data Security
Myths and Realities of Cloud Data SecurityMyths and Realities of Cloud Data Security
Myths and Realities of Cloud Data Security
Michael Krouze
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Daniel Zini
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data Protection
Spanning Cloud Apps
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The Enterprise
Priyanka Aash
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
HP Enterprise Italia
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-Enterprise
Eric Vétillard
 

Similar to Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist (20)

From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDSOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Identifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the CloudIdentifying the Value of Informational Assets Before You Move Them to the Cloud
Identifying the Value of Informational Assets Before You Move Them to the Cloud
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
Myths and Realities of Cloud Data Security
Myths and Realities of Cloud Data SecurityMyths and Realities of Cloud Data Security
Myths and Realities of Cloud Data Security
 
Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...Fast & Big Data - the journey from innovative ideas to the creation of real v...
Fast & Big Data - the journey from innovative ideas to the creation of real v...
 
What You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data ProtectionWhat You Need to Know About SaaS Application Data Protection
What You Need to Know About SaaS Application Data Protection
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The Enterprise
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-Enterprise
 

More from Ministerio TIC Colombia

Presentación - ComparTIC Octubre 2019
Presentación - ComparTIC Octubre 2019Presentación - ComparTIC Octubre 2019
Presentación - ComparTIC Octubre 2019
Ministerio TIC Colombia
 
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHzAvanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Ministerio TIC Colombia
 
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 MhzAudiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Ministerio TIC Colombia
 
Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019
Ministerio TIC Colombia
 
Presentación - ComparTIC Agosto 2019
Presentación - ComparTIC Agosto 2019Presentación - ComparTIC Agosto 2019
Presentación - ComparTIC Agosto 2019
Ministerio TIC Colombia
 
Reglamentación Ley 1978 de 2019
Reglamentación Ley 1978 de 2019Reglamentación Ley 1978 de 2019
Reglamentación Ley 1978 de 2019
Ministerio TIC Colombia
 
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
 ComparTIC junio de 2019| ¡Así quedó la Ley TIC! ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
Ministerio TIC Colombia
 
ComparTIC de abril
ComparTIC de abril ComparTIC de abril
ComparTIC de abril
Ministerio TIC Colombia
 
ComparTIC, marzo 15 de 2019
ComparTIC, marzo 15 de 2019ComparTIC, marzo 15 de 2019
ComparTIC, marzo 15 de 2019
Ministerio TIC Colombia
 
ComparTIC: Logros año 2018
ComparTIC: Logros año 2018ComparTIC: Logros año 2018
ComparTIC: Logros año 2018
Ministerio TIC Colombia
 
ComparTIC: Logros Octubre de 2018
ComparTIC: Logros Octubre de 2018ComparTIC: Logros Octubre de 2018
ComparTIC: Logros Octubre de 2018
Ministerio TIC Colombia
 
ComparTIC: Logros Septiembre de 2018
ComparTIC: Logros Septiembre de 2018ComparTIC: Logros Septiembre de 2018
ComparTIC: Logros Septiembre de 2018
Ministerio TIC Colombia
 
El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018
Ministerio TIC Colombia
 
TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018
Ministerio TIC Colombia
 
8° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 20188° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 2018
Ministerio TIC Colombia
 
Estrategia Contra Hurto de Celulares
Estrategia Contra Hurto de CelularesEstrategia Contra Hurto de Celulares
Estrategia Contra Hurto de Celulares
Ministerio TIC Colombia
 
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
Ministerio TIC Colombia
 
Derechos de Autor - DNDA
Derechos de Autor - DNDADerechos de Autor - DNDA
Derechos de Autor - DNDA
Ministerio TIC Colombia
 
Regulación para Operadores - CRC
Regulación para Operadores - CRCRegulación para Operadores - CRC
Regulación para Operadores - CRC
Ministerio TIC Colombia
 
Espectro para Operadores - ANE
Espectro para Operadores - ANEEspectro para Operadores - ANE
Espectro para Operadores - ANE
Ministerio TIC Colombia
 

More from Ministerio TIC Colombia (20)

Presentación - ComparTIC Octubre 2019
Presentación - ComparTIC Octubre 2019Presentación - ComparTIC Octubre 2019
Presentación - ComparTIC Octubre 2019
 
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHzAvanza la subasta del espectro de 700, 1.900 y 2.500 MHz
Avanza la subasta del espectro de 700, 1.900 y 2.500 MHz
 
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 MhzAudiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
Audiencia Pública de la subasta del espectro de las bandas 700, 1900 y 2500 Mhz
 
Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019Presentación de la Ministra TIC en Andicom 2019
Presentación de la Ministra TIC en Andicom 2019
 
Presentación - ComparTIC Agosto 2019
Presentación - ComparTIC Agosto 2019Presentación - ComparTIC Agosto 2019
Presentación - ComparTIC Agosto 2019
 
Reglamentación Ley 1978 de 2019
Reglamentación Ley 1978 de 2019Reglamentación Ley 1978 de 2019
Reglamentación Ley 1978 de 2019
 
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
 ComparTIC junio de 2019| ¡Así quedó la Ley TIC! ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
ComparTIC junio de 2019| ¡Así quedó la Ley TIC!
 
ComparTIC de abril
ComparTIC de abril ComparTIC de abril
ComparTIC de abril
 
ComparTIC, marzo 15 de 2019
ComparTIC, marzo 15 de 2019ComparTIC, marzo 15 de 2019
ComparTIC, marzo 15 de 2019
 
ComparTIC: Logros año 2018
ComparTIC: Logros año 2018ComparTIC: Logros año 2018
ComparTIC: Logros año 2018
 
ComparTIC: Logros Octubre de 2018
ComparTIC: Logros Octubre de 2018ComparTIC: Logros Octubre de 2018
ComparTIC: Logros Octubre de 2018
 
ComparTIC: Logros Septiembre de 2018
ComparTIC: Logros Septiembre de 2018ComparTIC: Logros Septiembre de 2018
ComparTIC: Logros Septiembre de 2018
 
El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018El Futuro Digital es de Todos #Andicom2018
El Futuro Digital es de Todos #Andicom2018
 
TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018TIC Day: Logros Final de Gobierno 2010-2018
TIC Day: Logros Final de Gobierno 2010-2018
 
8° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 20188° Summit de Transformación Digital 2018
8° Summit de Transformación Digital 2018
 
Estrategia Contra Hurto de Celulares
Estrategia Contra Hurto de CelularesEstrategia Contra Hurto de Celulares
Estrategia Contra Hurto de Celulares
 
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
VI Conferencia Ministerial sobre la Sociedad de la Información de América Lat...
 
Derechos de Autor - DNDA
Derechos de Autor - DNDADerechos de Autor - DNDA
Derechos de Autor - DNDA
 
Regulación para Operadores - CRC
Regulación para Operadores - CRCRegulación para Operadores - CRC
Regulación para Operadores - CRC
 
Espectro para Operadores - ANE
Espectro para Operadores - ANEEspectro para Operadores - ANE
Espectro para Operadores - ANE
 

Recently uploaded

一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
Any kyc Account
 

Recently uploaded (20)

一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
 

Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist

  • 1. © Copyright 2012 EMC Corporation. All rights reserved. Carlos Galeano EMC2 Regional Storage Specialist Carlos.galeanocantillo@emc.com Seguridad en información digital
  • 2. © Copyright 2012 EMC Corporation. All rights reserved. La transformación es continua MovilidadConsumo masivo Sociabilidad
  • 3. © Copyright 2012 EMC Corporation. All rights reserved. La información como fuente de transformación • Es siginificativa para el usuario. • Es el activo mas valioso de una organización. • Representa nuevas oportunidades o ventajas competitivas
  • 4. © Copyright 2012 EMC Corporation. All rights reserved. La información como fuente de transgresión Puede usarse con fines cuestionables o poco éticos. Puede divulgarse sin la debida autorización de su propietario o autor. Eventualmente puede robarse, sabotearse o emplearse con fines fraudulentos.
  • 5. © Copyright 2012 EMC Corporation. All rights reserved. Principios básicos de seguridad • Confidencialidad • Integridad • Disponibilidad
  • 6. © Copyright 2012 EMC Corporation. All rights reserved. Adaptarse a la dinámica actual de la tecnología Gestion de Acceso a los datos Application Platform TransportUser App / Data
  • 7. © Copyright 2012 EMC Corporation. All rights reserved. Regresando a lo básico Clasificar los Datos
  • 8. © Copyright 2012 EMC Corporation. All rights reserved. Ejemplos de Clasificación y Control Classification Preventive Controls Auth Monitoring Sensitive Restricted DLP, Encryption, Registered Asset Data / App / User / Machine Activity & Access Logs / Search / posting / content Confidential DLP, Encryption, Registered Asset App Access Control/ Role based Access log / search / posting / content Internal Use Only Host intrusion App Access Control/ Role based Search / posting / content Registered Public Registered account App Access Control/ Role based Search / posting / content Public Uploading executable content blocked Anonymous access Search / content
  • 9. © Copyright 2012 EMC Corporation. All rights reserved. Regresando a lo básico Definir Puntos de Control Clasificar los Datos
  • 10. © Copyright 2012 EMC Corporation. All rights reserved. Evolucionar en los puntos de control Controles a través de todos los niveles Client App App Container OS / Platform Network Server App Authentication      Posture      Anti-malware      Data leakage      Transport encryption      At rest encryption    —   Tradicional  Futuro
  • 11. © Copyright 2012 EMC Corporation. All rights reserved. Back To Basics Definir Puntos de Control Clasificar los Datos Implementar Controles
  • 12. © Copyright 2012 EMC Corporation. All rights reserved. No importa donde se aplican los controles….. Gestion de Acceso a los datos Application Platform TransportUser App / Data
  • 13. © Copyright 2012 EMC Corporation. All rights reserved. No todo es bueno para todos: Acceso con base en el riesgo.  Quién es usted?  Qué esta usando?  De donde viene usted?  Cómo llegó hasta aquí?  Hacia dónde va usted?  Cuál es su historia?
  • 14. © Copyright 2012 EMC Corporation. All rights reserved. Risk History Click happy? Intel Easy target? Education & Awareness Test performance? Threat Score Modelamiento con base en el riesgo Who are you? User Identity What you have Device and controls Where are you Location Who are you Application role What do you want Data classification Where is the data Data location Trusted Access Published Access Blocked Access Source Score Destination Score Level of Access
  • 15. © Copyright 2012 EMC Corporation. All rights reserved. Application Integration Cloud App Server Data Fabric Monitoring & Management Integration, Batch, Web Services Common Data Model EMC PRIVATE CLOUD Device Security Enterprise App Store Authentication Access Control Encryption Anti-Malware Management Logging Monitoring Cloud Security Authentication Access Control Posture Data Leakage Encryption Device Mgmt Logging Monitoring Legacy Apps New Apps E N T E R P R I S E A P P L I C A T I O N S Data Warehouse CRMERP Mobile Experience
  • 16. © Copyright 2012 EMC Corporation. All rights reserved.
  • 17. © Copyright 2012 EMC Corporation. All rights reserved. Network Access Tiers Functiona l Apps Eng Apps Corp Apps Smart Device Windows Laptop Windows Desktop Apple Deskto p Apple Laptop Linux Laptop Linux Deskto p Thin Client User Role Ownership Trust Assessment Roaming Controls Trusted Access Published Access Operational and Security Intelligence EnVision NetWitness Archer eGRC Published Services Modelo de Acceso con base en niveles de confianza
  • 18. © Copyright 2012 EMC Corporation. All rights reserved. Puntos clave a tomar en cuenta  Pensar diferente e innovar  La seguridad es un camino constante  Impulsar el cambio  La Seguridad es responsabilidad de todos