{"id":9826,"date":"2017-11-21T08:27:00","date_gmt":"2017-11-21T15:27:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/it-incident-response-plan\/"},"modified":"2025-12-09T22:47:34","modified_gmt":"2025-12-10T05:47:34","slug":"plan-de-respuesta-a-incidentes-de-ti","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/","title":{"rendered":"Elaboraci\u00f3n de un plan de respuesta a incidentes de TI"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Federal IT incident response plan guide for public sector security teams.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2017-11-21T08:27:00-07:00\">Nov 21, 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Building an IT incident response plan<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Building%20an%20IT%20incident%20response%20plan').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fit-incident-response-plan%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Building%20an%20IT%20incident%20response%20plan&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fit-incident-response-plan%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fit-incident-response-plan%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fit-incident-response-plan%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2><\/h2>\n<p>The lock is going to get picked. Maybe not today, but it\u2019s coming soon. In fact, it may be occurring right now\u2026 and you just haven\u2019t seen the evidence of it yet. This scenario is playing out against some of the best cybersecurity teams on earth. That\u2019s not a knock on you or your security team but research finds that security incidents are becoming increasingly common. What will you do when the time comes?<\/p>\n<p>This was the topic of discussion at a recent panel of government security officials that included representatives from the Office of the Director of National Intelligence, the Transportation Security Administration (TSA) and others. They offered insights and lessons learned in dealing with the escalating global threat environment.<\/p>\n<h3>How federal government cybersecurity teams prepare for incidents<\/h3>\n<p>The panel discussed that it is essential to have a clear IT incident response plan in place before the trouble starts. Of course, some plans are better than others. Nearly every IT organization has <em>some<\/em> kind of incident response plan. However, for those defending the United States against state-sponsored cyber warfare, the plans are required to be much more robust.<\/p>\n<h3>Devising an effective IT incident response plan<\/h3>\n<p>What does it take to create an effective IT incident response plan? It goes far beyond just an academic exercise. It takes live practice. The Intelligence Community Coordination Center, which is part of the Office of the Director of National Intelligence, conducts cyber \u201cwar games\u201d with its team. They simulate real cyberattacks and rehearse previously worked out responses to test reaction times and skills.<\/p>\n<p>Of course, not everyone has the time and resources for this level of incident response planning but the principles involved are universal. According to the panelists, two elements most essential to effective incident response are speed and orchestration. To get ahead of a security incident, the response team has to be able to move quickly and efficiently to coordinate actions\u2014something only possible with automation and orchestration of response workflows and systems.<\/p>\n<blockquote>\n<p>Speed and orchestration are the two essential elements of an effective response plan.<\/p>\n<\/blockquote>\n<p>Awareness is a main component of speed in incident response. The time that elapses between noticing (and correctly interpreting) an alert and acting on it can make a critical difference in outcomes.<\/p>\n<p>At the TSA, for example, their security operations center (SOC) is in constant contact with peer teams across the Department of Homeland Security. As Paul Morris, CISO of TSA noted, \u201cIf something happens, we know about it fairly quickly.\u201d His SOC claims that they can scan their systems and <a href=\"https:\/\/federalnewsradio.com\/in-focus-incident-response-in-government\/2017\/07\/tsas-paul-morris-incident-response-is-all-about-speed-speed-speed\/\" target=\"_blank\" rel=\"noreferrer noopener\">discover any newly identified threat on TSA systems within five minutes<\/a>.<\/p>\n<p>The key task of any IT response plan is orchestrating people, processes and security systems. This is a task best performed with the assistance of a specialized <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> and <a href=\"https:\/\/swimlane.com\/blog\/security-orchestration\/\">orchestration<\/a> (SAO) tool. An SAO solution like Swimlane automates IT incident response tasks.<\/p>\n<h3>How security automation and orchestration solutions enable effective IT incident response<\/h3>\n<p>A <a href=\"https:\/\/swimlane.com\/security-automation-and-orchestration\/\">security automation and orchestration<\/a> solution can be configured to quickly execute steps in a response plan that require orchestration between systems. For instance, a security team can \u201cteach\u201d the SAO solution how to respond to specific types of alerts. Speed and orchestration join forces with SAO.<\/p>\n<p>Imagine that a security incident and event management (SIEM) tool correlates suspicious log activities on firewalls and network appliances and sends an alert. The SAO solution can be configured to receive and react to the SIEM alert on an automated basis. It can submit the alert information to a threat intelligence platform for assessment while opening a JIRA case management ticket. It can then automatically notify the right people in real time.<\/p>\n<blockquote>\n<p>Security automation and orchestration doesn\u2019t replace team members in the IT incident response plan, but rather frees up their time for other high-level tasks.<\/p>\n<\/blockquote>\n<p>As the panelists pointed out, though, orchestration does not take people out of the incident response workflow. Rather, security automation and orchestration frees team members for higher level tasks that require more expertise and analytical focus. The SAO solution keeps the team informed of the response plan execution steps. With Swimlane, the security analyst has a single interface presenting multiple incident case management information feeds for maximum context and decision-making efficiency.<\/p>\n<p>Swimlane\u2018s SAO solution can be adapted to the requirements of even the most demanding IT incident response plan. Easy-to-implement, use, manage and scale, it enables a security operations team to easily leverage the capabilities of their existing security solutions. In addition to pre-built integrations with most common security and project tracking tools, SecOps teams can also quickly develop their own integrations using common scripting languages and a RESTful API.<\/p>\n\n\n\n<div class=\"bs-div bs-div-7a808f68ae365f833d3dc7caf0282fc5e0fb134e bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-7a808f68ae365f833d3dc7caf0282fc5e0fb134e {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/8-Real-World-Use-Cases-for-SOAR-e-book-thumbnail.png' class='img-fluid'   alt='Swimlane SOAR use cases graphic with abstract network design' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-real-world-use-cases-for-soar-e-book\">Real-World Use Cases for SOAR e-book<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Want to learn more about how the you can use the Swimlane SOAR solution in your security operations? Download our 8 Real-World Use Cases for Security Orchestration, Automation and Response e-book to see how. <\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-3d0f23fabab98ba042530d7e43248db52a89ff79\"><style>.bs-pro-button-p-btn-3d0f23fabab98ba042530d7e43248db52a89ff79 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Now<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/es\/tag\/incident-response\/'><span class='tag-content'>Incident Response<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e351b60464d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/incident-response-plan\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Nov 7, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How to Create a Cybersecurity Incident Response Plan<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e351b605be4 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/business-continuity-plan\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Oct 9, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How to Create a Business Continuity Plan<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e351b60709e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/no-code-capabilities-cut-soc-playbook-building-in-half\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Sep 28, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>No-Code Capabilities Cut Playbook Building in Half<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9827,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[225],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9826","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-incident-response","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Building an IT incident response plan Today<\/title>\n<meta name=\"description\" content=\"The best cybersecurity teams have prepared an IT incident response plan in advance, leveraging speed and orchestration to minimize faults.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/plan-de-respuesta-a-incidentes-de-ti\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building an IT incident response plan\" \/>\n<meta property=\"og:description\" content=\"The best cybersecurity teams have prepared an IT incident response plan in advance, leveraging speed and orchestration to minimize faults.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/plan-de-respuesta-a-incidentes-de-ti\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T05:47:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/\",\"name\":\"Building an IT incident response plan Today\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png\",\"datePublished\":\"2017-11-21T15:27:00+00:00\",\"dateModified\":\"2025-12-10T05:47:34+00:00\",\"description\":\"The best cybersecurity teams have prepared an IT incident response plan in advance, leveraging speed and orchestration to minimize faults.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png\",\"width\":1120,\"height\":696,\"caption\":\"Federal IT incident response plan guide for public sector security teams.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Building an IT incident response plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Construyendo un plan de respuesta a incidentes de TI hoy","description":"Los mejores equipos de ciberseguridad han preparado con antelaci\u00f3n un plan de respuesta a incidentes de TI, aprovechando la velocidad y la orquestaci\u00f3n para minimizar las fallas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/plan-de-respuesta-a-incidentes-de-ti\/","og_locale":"es_ES","og_type":"article","og_title":"Building an IT incident response plan","og_description":"The best cybersecurity teams have prepared an IT incident response plan in advance, leveraging speed and orchestration to minimize faults.","og_url":"https:\/\/swimlane.com\/es\/blog\/plan-de-respuesta-a-incidentes-de-ti\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-10T05:47:34+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/","url":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/","name":"Construyendo un plan de respuesta a incidentes de TI hoy","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png","datePublished":"2017-11-21T15:27:00+00:00","dateModified":"2025-12-10T05:47:34+00:00","description":"Los mejores equipos de ciberseguridad han preparado con antelaci\u00f3n un plan de respuesta a incidentes de TI, aprovechando la velocidad y la orquestaci\u00f3n para minimizar las fallas.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/11.21.17-Federal-IT-Incident-Response-Plan.png","width":1120,"height":696,"caption":"Federal IT incident response plan guide for public sector security teams."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/it-incident-response-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Building an IT incident response plan"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9827"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9826"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9826"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9826"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9826"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9826"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}