{"id":9949,"date":"2015-05-12T23:35:00","date_gmt":"2015-05-13T05:35:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/managing-security-as-a-business-risk-part-3\/"},"modified":"2025-01-10T10:29:52","modified_gmt":"2025-01-10T17:29:52","slug":"gestion-de-la-seguridad-como-riesgo-empresarial-parte-3","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/","title":{"rendered":"Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 3: Propiedad intelectual"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Primer plano de una computadora port\u00e1til que muestra an\u00e1lisis de direcciones IP y gr\u00e1ficos de red que representan el monitoreo de ciberseguridad y el an\u00e1lisis de inteligencia de amenazas.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-05-12T23:35:00-06:00\">12 de mayo de 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 3: Propiedad intelectual<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de usuario\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minuto de lectura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correo electr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%203%3A%20Intellectual%20property').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-3%2F', '_blank')\" title=\"Correo electr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gorjeo\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%203%3A%20Intellectual%20property&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-3%2F\" title=\"Gorjeo\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-3%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-3%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<h3>Parte III: Propiedad intelectual<\/h3>\n<p>En las entregas anteriores de esta serie, abordamos el impacto financiero directo y las consecuencias reputacionales, tanto para las organizaciones como para los profesionales de la seguridad de la informaci\u00f3n, que pueden derivar de las filtraciones de datos. Una tercera consecuencia, igualmente perjudicial, de un ataque exitoso es el robo de propiedad intelectual (PI).<\/p>\n<p>En cualquier industria donde la innovaci\u00f3n, la creatividad y los secretos comerciales son valiosos (lo que incluye la mayor\u00eda de los sectores), perder la propiedad exclusiva de un plan o una idea en desarrollo puede ser devastador. Desafortunadamente, los ataques dirigidos a la propiedad intelectual son bastante comunes; una encuesta reciente a casi 4000 gerentes de TI, por ejemplo, revel\u00f3 que m\u00e1s de <a href=\"http:\/\/www.computerweekly.com\/news\/2240226840\/IP-theft-hit-21-of-manufacturers-in-past-year-study-shows\" target=\"_blank\" rel=\"noreferrer noopener\">una quinta parte de los fabricantes<\/a> hab\u00edan sido v\u00edctimas de este tipo de ciberataque en el \u00faltimo a\u00f1o.<\/p>\n<p>En la versi\u00f3n m\u00e1s reciente de su informe sobre el robo de propiedad intelectual estadounidense, la Comisi\u00f3n de Propiedad Intelectual estim\u00f3 que la p\u00e9rdida de secretos comerciales sensibles le cuesta a la econom\u00eda estadounidense m\u00e1s de <a href=\"http:\/\/www.ipcommission.org\/report\/ip_commission_report_052213.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">$300 mil millones anuales<\/a>\u2014una cifra equivalente al valor total de las exportaciones estadounidenses a Asia cada a\u00f1o. Esta cifra es bastante alarmante por s\u00ed sola, pero muchos expertos en la materia creen que el robo de propiedad intelectual puede costarles a las organizaciones significativamente m\u00e1s. Estos expertos argumentan que el alcance del impacto de perder la propiedad de un plan o producto innovador es tan amplio y potencialmente duradero que medir su verdadero costo es extremadamente dif\u00edcil, si no imposible.<\/p>\n<p>El robo de propiedad intelectual no se limita al sector privado. Tomemos, por ejemplo, el <a href=\"http:\/\/www.cnbc.com\/id\/102580878\" target=\"_blank\" rel=\"noreferrer noopener\">noticias recientes<\/a> Los expertos de FireEye Intelligence ahora creen que un grupo de hackers chinos, respaldado por el gobierno chino, ha estado robando inteligencia gubernamental de otras naciones durante al menos una d\u00e9cada. En su informe, la firma de inteligencia de amenazas afirm\u00f3 que el grupo chino, conocido como APT30, ten\u00eda como objetivo \u201casuntos pol\u00edticos, militares y econ\u00f3micos regionales, territorios en disputa, y organizaciones de medios de comunicaci\u00f3n y periodistas que informan sobre temas relacionados con China y la legitimidad del gobierno\u201d. Adem\u00e1s, la posibilidad de que una organizaci\u00f3n terrorista u otro grupo radical descubra informaci\u00f3n sobre la construcci\u00f3n de armas de destrucci\u00f3n masiva es extremadamente aterradora.<\/p>\n<p>Los ataques inform\u00e1ticos exitosos a agencias gubernamentales, grandes corporaciones y bancos probablemente envalentonar\u00e1n a los ciberdelincuentes globales en el futuro. Por esa raz\u00f3n, y dado que las brechas de seguridad pueden ser tan devastadoras cuando ocurren, las organizaciones ya no pueden permitirse encasillar la seguridad de la informaci\u00f3n y considerarla estrictamente un problema de TI. En cambio, deben comenzar a considerarla un aspecto cr\u00edtico de sus operaciones comerciales. Si se detiene a pensar en las tres \u00e1reas que abordamos en esta serie, deber\u00eda quedar meridianamente claro que la seguridad de la informaci\u00f3n representa un riesgo m\u00e1s significativo para la mayor\u00eda de las empresas que casi cualquier otro factor.<\/p>\n<p>Las soluciones de detecci\u00f3n de amenazas de calidad existen en el \u00e1mbito de la ciberseguridad desde hace tiempo, y las herramientas de respuesta automatizada a incidentes tambi\u00e9n est\u00e1n llegando al mercado. Pero las soluciones son solo una parte de la ecuaci\u00f3n de la seguridad. Proteger a su organizaci\u00f3n del peligroso panorama actual de amenazas requiere un cambio de mentalidad y actitud que debe incluir pasos cr\u00edticos como:<\/p>\n<ul>\n<li>Alinear el SOC con la alta direcci\u00f3n para facilitar y fomentar la colaboraci\u00f3n abierta entre los equipos de seguridad de TI y otras partes interesadas del sector. Juntos, estos responsables de la toma de decisiones pueden identificar posibles vulnerabilidades y colaborar para subsanarlas.<\/li>\n<\/ul>\n<ul>\n<li>Estandarizar procesos de seguridad que sirvan de modelo para los miembros m\u00e1s j\u00f3venes del equipo y los nuevos empleados. Registrar y registrar estos procesos cruciales ayuda a las organizaciones a conservar el capital humano y el conocimiento institucional, incluso en caso de rotaci\u00f3n de personal.<\/li>\n<\/ul>\n<ul>\n<li>Pensar cr\u00edticamente sobre el valor que los profesionales de seguridad pueden obtener de las herramientas de ciberseguridad antes de su adopci\u00f3n, evitando as\u00ed gastos innecesarios, superposici\u00f3n de capacidades y mayor complejidad.<\/li>\n<\/ul>\n<ul>\n<li>Trabajamos para asegurar la aceptaci\u00f3n de todas las divisiones y niveles de la organizaci\u00f3n. Educar a los empleados sobre la importancia de la ciberseguridad para el bienestar de toda la empresa y capacitarlos para reconocer las amenazas ayuda a reducir el riesgo general.<\/li>\n<\/ul>\n<p>\u00bfBusca una perspectiva m\u00e1s amplia sobre el estado actual de la ciberseguridad? Si es as\u00ed, consulte nuestra serie anterior sobre los temas m\u00e1s destacados de la actualidad. <a href=\"https:\/\/swimlane.com\/es\/factores-clave-de-la-ciberseguridad-primera-parte-el-internet-de-las-cosas\/\" rel=\"noreferrer noopener\">Factores impulsores de la ciberseguridad<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Publicaciones relacionadas<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f7954fd2d42 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 2: Da\u00f1o a la reputaci\u00f3n<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f7954fd3d6a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 1: Impacto financiero<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f7954fd4c49 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-security-drivers-security-information-overload\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10 de marzo de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Factores clave en la ciberseguridad (parte 4): Sobrecarga de informaci\u00f3n de seguridad<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">\u00bfInteresado en aprender m\u00e1s?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Suscr\u00edbete hoy para mantenerte informado y recibir actualizaciones peri\u00f3dicas de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Antecedentes de SecOps moderno: un gr\u00e1fico geom\u00e9trico degradado que representa el flujo de datos fluido y la agilidad nativa de la nube.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"es\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9950,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9949","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Managing Security Information<\/title>\n<meta name=\"description\" content=\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO standing within his or her own company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-3\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why managing information security as a business risk is critical, part 3: Intellectual property\" \/>\n<meta property=\"og:description\" content=\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO standing within his or her own company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-3\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:29:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/\",\"name\":\"Managing Security Information\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-ip.png\",\"datePublished\":\"2015-05-13T05:35:00+00:00\",\"dateModified\":\"2025-01-10T17:29:52+00:00\",\"description\":\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \\\/ CIO standing within his or her own company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-ip.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-ip.png\",\"width\":1120,\"height\":696,\"caption\":\"Close-up of laptop showing IP address analytics and network charts representing cybersecurity monitoring and threat intelligence analysis\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why managing information security as a business risk is critical, part 3: Intellectual property\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gesti\u00f3n de la informaci\u00f3n de seguridad","description":"Una violaci\u00f3n de seguridad puede da\u00f1ar gravemente la reputaci\u00f3n de una organizaci\u00f3n ante el p\u00fablico y tambi\u00e9n puede perjudicar la reputaci\u00f3n de un CISO\/CIO dentro de su propia empresa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-3\/","og_locale":"es_ES","og_type":"article","og_title":"Why managing information security as a business risk is critical, part 3: Intellectual property","og_description":"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO standing within his or her own company.","og_url":"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-3\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:29:52+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/","url":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/","name":"Gesti\u00f3n de la informaci\u00f3n de seguridad","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip.png","datePublished":"2015-05-13T05:35:00+00:00","dateModified":"2025-01-10T17:29:52+00:00","description":"Una violaci\u00f3n de seguridad puede da\u00f1ar gravemente la reputaci\u00f3n de una organizaci\u00f3n ante el p\u00fablico y tambi\u00e9n puede perjudicar la reputaci\u00f3n de un CISO\/CIO dentro de su propia empresa.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ip.png","width":1120,"height":696,"caption":"Close-up of laptop showing IP address analytics and network charts representing cybersecurity monitoring and threat intelligence analysis"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why managing information security as a business risk is critical, part 3: Intellectual property"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9950"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9949"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9949"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9949"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9949"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9949"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}