{"id":9926,"date":"2015-07-25T11:34:00","date_gmt":"2015-07-25T17:34:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/cyber-security-talent-gap-extends-to-state-governments\/"},"modified":"2025-01-10T10:13:25","modified_gmt":"2025-01-10T17:13:25","slug":"la-brecha-de-talento-en-ciberseguridad-se-extiende-a-los-gobiernos-estatales","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/","title":{"rendered":"Un nuevo informe muestra que la grave brecha de talento en ciberseguridad se extiende a los gobiernos estatales"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Vista amplia y monocrom\u00e1tica de una enorme c\u00e1mara parlamentaria llena de cientos de funcionarios sentados, que evoca el poder institucional, la vigilancia y el peso silencioso de la toma de decisiones colectiva.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-07-25T11:34:00-06:00\">25 de julio de 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Un nuevo informe muestra que la grave brecha de talento en ciberseguridad se extiende a los gobiernos estatales<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de usuario\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">2 <\/span> Minuto de lectura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correo electr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('New%20report%20shows%20dire%20cybersecurity%20talent%20gap%20extends%20to%20state%20governments').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcyber-security-talent-gap-extends-to-state-governments%2F', '_blank')\" title=\"Correo electr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gorjeo\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=New%20report%20shows%20dire%20cybersecurity%20talent%20gap%20extends%20to%20state%20governments&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcyber-security-talent-gap-extends-to-state-governments%2F\" title=\"Gorjeo\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcyber-security-talent-gap-extends-to-state-governments%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fcyber-security-talent-gap-extends-to-state-governments%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Nadie se consuela con la realidad de que las corporaciones se enfrentan a una incre\u00edble escasez de talento en seguridad de la informaci\u00f3n. Al fin y al cabo, muchas de estas empresas mantienen informaci\u00f3n confidencial de sus clientes, por lo que una filtraci\u00f3n de datos corporativos puede afectar a millones de personas.<\/p>\n<p>Pero la idea de que a los directores de sistemas de informaci\u00f3n de los gobiernos estatales les resulte extremadamente dif\u00edcil identificar e incorporar talento es a\u00fan m\u00e1s desconcertante, ya que estos gobiernos almacenan todo tipo de informaci\u00f3n confidencial. Desafortunadamente, eso es exactamente lo que est\u00e1 sucediendo. De hecho, una encuesta realizada por la Asociaci\u00f3n Nacional de Directores de Sistemas de Informaci\u00f3n Estatales (NASCIO) a principios de este a\u00f1o revel\u00f3 que <a href=\"http:\/\/www.nascio.org\/publications\/documents\/NASCIO_StateITWorkforceSurvey2015_WEB.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">67,3 por ciento<\/a> de los gobiernos incluyeron la seguridad entre las habilidades m\u00e1s dif\u00edciles de encontrar en empleados potenciales, un porcentaje mayor que en cualquier otra \u00e1rea de TI.<\/p>\n<p>No existe una soluci\u00f3n m\u00e1gica para este problema de talento. El informe de NASCIO analiza algunas ideas innovadoras con las que est\u00e1n experimentando algunos directores de inform\u00e1tica estatales, entre ellas:<\/p>\n<ul>\n<li>Crear programas de pasant\u00edas m\u00e1s s\u00f3lidos para desarrollar el talento interno<\/li>\n<li>Contrataci\u00f3n de reclutadores especializados en TI para buscar agresivamente a los mejores talentos<\/li>\n<li>Ofrecer reembolso de matr\u00edcula para graduados universitarios y de academias de TI que trabajan en el sector p\u00fablico<\/li>\n<li>Ofrecer posibilidades de avance profesional r\u00e1pido para trabajadores de TI innovadores<\/li>\n<\/ul>\n<p>Todas estas son ideas ingeniosas que, sin duda, ayudar\u00e1n a los gobiernos a atraer talento que, de otro modo, habr\u00eda optado por una carrera en el sector privado. Sin embargo, la realidad es que es poco probable que algunos de estos esfuerzos rindan frutos durante al menos varios a\u00f1os. Adem\u00e1s, contratar a los mejores y m\u00e1s brillantes talentos en ciberseguridad siempre ser\u00e1 dif\u00edcil para los gobiernos estatales mientras compitan con corporaciones tecnol\u00f3gicas como Facebook y Google, que pueden ofrecer remuneraciones significativamente mayores.<\/p>\n<p>Con esto en mente, los gobiernos estatales deber\u00e1n encontrar maneras de aprovechar mejor el talento y los recursos con los que cuentan actualmente. Aprovechar la respuesta automatizada a incidentes cibern\u00e9ticos, por ejemplo, permite a las organizaciones resolver autom\u00e1ticamente gran parte de las miles de alertas que reciben a diario. Al resolver alertas autom\u00e1ticamente, los gobiernos estatales liberan a su personal experto para que pueda responder manualmente a ataques m\u00e1s complejos y crear procesos innovadores.<\/p>\n<p>\u00bfQuieres saber m\u00e1s sobre la respuesta automatizada a incidentes cibern\u00e9ticos? Consulta mis recientes... <a href=\"http:\/\/www.networkworld.com\/article\/2932283\/network-security\/closing-the-security-loop-with-automated-incident-response.html\" target=\"_blank\" rel=\"noreferrer noopener\">Art\u00edculo en Network World<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/es\/tag\/research\/'><span class='tag-content'>Investigaci\u00f3n<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Publicaciones relacionadas<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ecd141b9512 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>2 de septiembre de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>La filtraci\u00f3n de datos de Ashley Madison muestra el lado feo del hackeo<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69ecd141ba75b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-security-drivers-talent-shortage\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>6 de febrero de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Factores clave en la ciberseguridad (parte 2): La escasez de talento<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ecd141bb623 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-shortage\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>28 de mayo de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>C\u00f3mo la escasez de talento en ciberseguridad nos afecta a todos<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">\u00bfInteresado en aprender m\u00e1s?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Suscr\u00edbete hoy para mantenerte informado y recibir actualizaciones peri\u00f3dicas de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Antecedentes de SecOps moderno: un gr\u00e1fico geom\u00e9trico degradado que representa el flujo de datos fluido y la agilidad nativa de la nube.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"es\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9927,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9926","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New report shows dire cybersecurity talent gap extends to state\u2026<\/title>\n<meta name=\"description\" content=\"The idea that CIOs of state governments are finding it extremely difficult to identify and onboard cyber security talent is disconcerting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/la-brecha-de-talento-en-ciberseguridad-se-extiende-a-los-gobiernos-estatales\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New report shows dire cybersecurity talent gap extends to state governments\" \/>\n<meta property=\"og:description\" content=\"The idea that CIOs of state governments are finding it extremely difficult to identify and onboard cyber security talent is disconcerting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/la-brecha-de-talento-en-ciberseguridad-se-extiende-a-los-gobiernos-estatales\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:13:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/\",\"name\":\"New report shows dire cybersecurity talent gap extends to state\u2026\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-state-government.png\",\"datePublished\":\"2015-07-25T17:34:00+00:00\",\"dateModified\":\"2025-01-10T17:13:25+00:00\",\"description\":\"The idea that CIOs of state governments are finding it extremely difficult to identify and onboard cyber security talent is disconcerting.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-state-government.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-state-government.png\",\"width\":1120,\"height\":696,\"caption\":\"Wide, monochrome view of a vast parliamentary chamber filled with hundreds of seated officials, evoking institutional power, surveillance, and the quiet weight of collective decision-making\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/cyber-security-talent-gap-extends-to-state-governments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New report shows dire cybersecurity talent gap extends to state governments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Un nuevo informe muestra que la grave brecha de talento en ciberseguridad se extiende a los estados...","description":"La idea de que a los CIO de los gobiernos estatales les resulte extremadamente dif\u00edcil identificar e incorporar talentos en materia de ciberseguridad es desconcertante.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/la-brecha-de-talento-en-ciberseguridad-se-extiende-a-los-gobiernos-estatales\/","og_locale":"es_ES","og_type":"article","og_title":"New report shows dire cybersecurity talent gap extends to state governments","og_description":"The idea that CIOs of state governments are finding it extremely difficult to identify and onboard cyber security talent is disconcerting.","og_url":"https:\/\/swimlane.com\/es\/blog\/la-brecha-de-talento-en-ciberseguridad-se-extiende-a-los-gobiernos-estatales\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:13:25+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/","url":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/","name":"Un nuevo informe muestra que la grave brecha de talento en ciberseguridad se extiende a los estados...","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government.png","datePublished":"2015-07-25T17:34:00+00:00","dateModified":"2025-01-10T17:13:25+00:00","description":"La idea de que a los CIO de los gobiernos estatales les resulte extremadamente dif\u00edcil identificar e incorporar talentos en materia de ciberseguridad es desconcertante.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-state-government.png","width":1120,"height":696,"caption":"Wide, monochrome view of a vast parliamentary chamber filled with hundreds of seated officials, evoking institutional power, surveillance, and the quiet weight of collective decision-making"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/cyber-security-talent-gap-extends-to-state-governments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"New report shows dire cybersecurity talent gap extends to state governments"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9926\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9927"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9926"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9926"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9926"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9926"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9926"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}