{"id":9831,"date":"2017-11-15T08:08:00","date_gmt":"2017-11-15T15:08:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/cybersecurity-situational-awareness\/"},"modified":"2023-03-10T09:30:47","modified_gmt":"2023-03-10T16:30:47","slug":"conciencia-situacional-de-ciberseguridad","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/","title":{"rendered":"Lograr la resiliencia cibern\u00e9tica a trav\u00e9s del conocimiento de la situaci\u00f3n"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Overhead view of numerous open books laid flat and overlapping across a surface.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2017-11-15T08:08:00-07:00\">Nov 15, 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Achieving cyber resilience through situational awareness<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Achieving%20cyber%20resilience%20through%20situational%20awareness').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcybersecurity-situational-awareness%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Achieving%20cyber%20resilience%20through%20situational%20awareness&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcybersecurity-situational-awareness%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcybersecurity-situational-awareness%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcybersecurity-situational-awareness%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>&nbsp;<\/h2>\n<p>Incomplete information can be an obstacle to effective cybersecurity. For example, a security operations (SecOps) team gets an alert from a firewall but cannot easily determine if it is a meaningless ping or the start of a major incident. It might be hard to know, especially early on. Missteps can be very costly. At the same time, investing too much energy into false positives is a drag on resources.<\/p>\n<p>Situational awareness offers a solution to this dilemma. Being situationally aware means having timely and accurate knowledge of multiple information streams related to a potential incident. It may involve coordination between security systems. Strong situational awareness helps the team avoid getting bogged down in false positives while remaining keenly aware of serious, but masked, threats. It enables the organization to be resilient in the face of cybersecurity threats.<\/p>\n<h3>Cybersecurity experts agree that cyber resilience is a top priority<\/h3>\n<p>A recent panel discussion of government security officials revealed how today\u2019s leading cybersecurity professionals are responding to the cyber threat environment. The event brought together representatives from the Office of the Director of National Intelligence, the Transportation Security Administration and others.<\/p>\n<p>Cyber resilience is perhaps their most important objective. In day-to-day life, resilience means being able to recover quickly from a setback like an injury. Panelists described cyber resilience as \u201cusing situational awareness to thwart an attack early or to quickly get back to normal following a breach.\u201d The goal, according to the panel, is to \u201cmeet occurrences all along the cyber kill chain from detection of a threat to the eventuality of some sort of damage or loss of data.\u201d<\/p>\n<p>Resilience is holistic. It goes beyond the standard recovery time objective (RTO) defined in service level agreements. While RTOs are necessary and important, they are basically data points that define how well a particular system is being protected.<\/p>\n<p>Resilience reflects an entire organization\u2019s security posture, its ability to sustain an attack and overcome it\u2014or, better, avoid it altogether. Being resilient means being aware of the big picture \u2013 being situationally aware.<\/p>\n<p>In this sense, situational awareness is both local and global. Cybersecurity managers need to be aware of their particular situation but also of the totality of the cyber threat landscape. This may require communicating with other organizations and sharing security information in a structured way.<\/p>\n<blockquote>\n<p>SecOps teams need to have both local and global cybersecurity situational awareness.<\/p>\n<\/blockquote>\n<h3>How top federal government cybersecurity pros build situational awareness<\/h3>\n<p>Situational awareness has to be fast and as close to real time as possible. The panelists discussed how they effected rapid response.<\/p>\n<p>Wally Coggins, director of the Intelligence Community Security Coordination Center at the Office of the Director of National Intelligence, is tackling rapid response through situational awareness in three ways:<\/p>\n<ol>\n<li>He\u2019s automating data flows between his security coordination center and those of other agencies. The goal is to provide information as quickly as possible to everyone regarding vulnerability management, endpoint security and security incidents.<\/li>\n<li>He\u2019s bringing people together from different backgrounds and intelligence functions to focus on cybersecurity. For example, connecting counterintelligence and cybersecurity professionals in an analytical \u201ccell\u201d that collaborates to identify insider threats.<\/li>\n<li>He\u2019s conducting cybersecurity exercises. For example, these include cyber \u201cwar games,\u201d to improve cybersecurity staffers\u2019 response times and capabilities.<\/li>\n<\/ol>\n<p>The goal of these steps is to build a cyber defense capability that delivers resilience through cybersecurity situational awareness.<\/p>\n<h3>Security automation and orchestration (SAO) and cybersecurity situational awareness<\/h3>\n<p>Rapid response is an essential requirement for cyber resilience through situational awareness. This is also true in the orchestration and automation of security processes. Too much reliance on manual incident response tasks will impair situational awareness. This reinforces the need for a solution like <a href=\"https:\/\/swimlane.com\/security-automation-and-orchestration\/\">Security Automation and Orchestration (SAO)<\/a>.<\/p>\n<h4>Automation<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-2374\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2017\/11\/cybersecurity-situational-awareness-SAO.jpg\" alt=\"cybersecurity-situational-awareness-SAO.jpg\" width=\"160\" height=\"544\">All of the government officials on the panel use some sort of SAO tool. These solutions automate the traditionally slow, manual analyst tasks and <a href=\"https:\/\/swimlane.com\/blog\/incident-response-plans\/\">incident response plans<\/a>. The solutions can orchestrate security case management tasks across multiple systems, people and entities. They replace manual processes with machine-speed decision making.<\/p>\n<h4>Detection and analysis<\/h4>\n<p>An SAO solution streamlines threat detection and analysis. For example, it can be configured to react automatically to an alert from an intrusion detection system. Upon receiving the alert, the SAO solution can automatically submit the details of the alert to a threat intelligence system, open a case management ticket in a system, like JIRA, and send emails to relevant stakeholders.<\/p>\n<h4>Threat intelligence<\/h4>\n<p><em>Having greater <\/em>threat intelligence<em> improves cybersecurity situational awareness and resiliency against threats.<\/em> As it automatically responds to alerts, the SAO solution keeps the security team informed about what it\u2019s doing. In this way, it enables the team to be situationally aware and respond rapidly to threats. The solution can also execute broader tasks needed for situational awareness. These include comprehensive data gathering, standardization and workflow analysis. Some SAO solutions can \u201clearn\u201d to emulate security team practices for different threat responses. The tool captures the knowledge and best practices demonstrated by the security team. This capability leverages the team\u2019s skillset and gives them more time to focus on complex issues rather than repetitive administrative work.<\/p>\n<h4>Logs and reports<\/h4>\n<p>SAO solutions generate logs of their activities. These logs can be subsequently analyzed and shared amongst teams and entities. With interpretations of logs and past case management histories, it is possible to improve aspects of security management that advance situational awareness, rapid response and resiliency.<\/p>\n<h3>Improve cybersecurity situational awareness with Swimlane<\/h3>\n<p>Swimlane delivers <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> and <a href=\"https:\/\/swimlane.com\/blog\/security-orchestration\/\">orchestration<\/a> to drive situational awareness and enrich the situational information presented to analysts. Easy to implement, use, manage and scale, it uses object-oriented methods that enables a security operations team to leverage the capabilities of their existing security solutions.<\/p>\n<p>Are you interested in learning more about how security automation and orchestration can help your organization? Download our e-book \u2013 <a href=\"https:\/\/swimlane.com\/sao-use-cases-ebook\/\">8 Real-World Use Cases for Security Orchestration, Automation and Response<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0ff8b01ef3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/using-situational-awareness-improve-threat-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mar 30, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Using situational awareness to improve threat response effectiveness<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0ff8b03003 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/achieving-public-private-coordination-and-collaboration-on-a-national-scale\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mar 18, 2021<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Achieving Public-Private Coordination and Collaboration on a National Scale<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0ff8b04337 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-threat-hunting\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Sep 8, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What is Cyber Threat Hunting? Methods, Tools, and Tips<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9832,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9831","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Achieving cyber resilience through situational awareness today<\/title>\n<meta name=\"description\" content=\"Cybersecurity situational awareness gives you resilience, with the added capacity to automate and orchestrate incident response workflows.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/conciencia-situacional-de-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving cyber resilience through situational awareness\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity situational awareness gives you resilience, with the added capacity to automate and orchestrate incident response workflows.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/conciencia-situacional-de-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T16:30:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/\",\"name\":\"Achieving cyber resilience through situational awareness today\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png\",\"datePublished\":\"2017-11-15T15:08:00+00:00\",\"dateModified\":\"2023-03-10T16:30:47+00:00\",\"description\":\"Cybersecurity situational awareness gives you resilience, with the added capacity to automate and orchestrate incident response workflows.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png\",\"width\":1120,\"height\":696,\"caption\":\"Overhead view of numerous open books laid flat and overlapping across a surface.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving cyber resilience through situational awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"C\u00f3mo lograr la resiliencia cibern\u00e9tica a trav\u00e9s del conocimiento de la situaci\u00f3n hoy","description":"El conocimiento de la situaci\u00f3n de ciberseguridad le brinda resiliencia, con la capacidad adicional de automatizar y orquestar flujos de trabajo de respuesta a incidentes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/conciencia-situacional-de-ciberseguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Achieving cyber resilience through situational awareness","og_description":"Cybersecurity situational awareness gives you resilience, with the added capacity to automate and orchestrate incident response workflows.","og_url":"https:\/\/swimlane.com\/es\/blog\/conciencia-situacional-de-ciberseguridad\/","og_site_name":"AI Security Automation","article_modified_time":"2023-03-10T16:30:47+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/","url":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/","name":"C\u00f3mo lograr la resiliencia cibern\u00e9tica a trav\u00e9s del conocimiento de la situaci\u00f3n hoy","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png","datePublished":"2017-11-15T15:08:00+00:00","dateModified":"2023-03-10T16:30:47+00:00","description":"El conocimiento de la situaci\u00f3n de ciberseguridad le brinda resiliencia, con la capacidad adicional de automatizar y orquestar flujos de trabajo de respuesta a incidentes.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/11.15.17-Cyber-Resilience-and-Information.png","width":1120,"height":696,"caption":"Overhead view of numerous open books laid flat and overlapping across a surface."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/cybersecurity-situational-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Achieving cyber resilience through situational awareness"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9831\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9832"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9831"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9831"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9831"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9831"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9831"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}