{"id":9953,"date":"2015-04-26T12:18:00","date_gmt":"2015-04-26T18:18:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/managing-security-as-a-business-risk-part-2\/"},"modified":"2025-01-10T10:29:27","modified_gmt":"2025-01-10T17:29:27","slug":"gestion-de-la-seguridad-como-riesgo-empresarial-parte-2","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/","title":{"rendered":"Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 2: Da\u00f1o a la reputaci\u00f3n"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Profesionales de negocios reunidos para discutir el riesgo de reputaci\u00f3n corporativa y la estrategia de respuesta a incidentes en el entorno empresarial moderno.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-04-26T12:18:00-06:00\">26 de abril de 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 2: Da\u00f1o a la reputaci\u00f3n<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de usuario\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minuto de lectura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correo electr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%202%3A%20Reputational%20harm').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F', '_blank')\" title=\"Correo electr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gorjeo\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%202%3A%20Reputational%20harm&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F\" title=\"Gorjeo\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk-part-2%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2 class=\"wp-block-heading\" id=\"h-nbsp\">&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-part-2-reputational-harm\">Parte 2: Da\u00f1o a la reputaci\u00f3n<\/h2>\n\n\n\n<p>En <a href=\"https:\/\/swimlane.com\/es\/gestionar-la-seguridad-como-un-riesgo-empresarial\/\">Parte I<\/a> En esta serie, abordamos el impacto financiero directo \u2014como el robo flagrante y la costosa inactividad del sitio web de comercio electr\u00f3nico\u2014 que una crisis de ciberseguridad puede tener en una empresa. Si bien la p\u00e9rdida inmediata de ingresos es la consecuencia m\u00e1s obvia para una organizaci\u00f3n que sufre un ataque, no es la \u00fanica. Una brecha de seguridad puede da\u00f1ar gravemente la reputaci\u00f3n de una organizaci\u00f3n ante el p\u00fablico y tambi\u00e9n la reputaci\u00f3n de un CISO o CIO dentro de su propia empresa.<\/p>\n\n\n\n<p>Examinemos primero c\u00f3mo un incidente de seguridad de la informaci\u00f3n puede erosionar la confianza de los consumidores en una marca. Por ejemplo, la filtraci\u00f3n de datos de Target, descubierta durante la temporada navide\u00f1a de 2013, expuso la informaci\u00f3n personal de 110 millones de clientes y, en las semanas posteriores a la noticia, el gigante minorista experiment\u00f3 una desaceleraci\u00f3n en las ventas. A principios de 2014, cuando Target public\u00f3 su informe de resultados del cuarto trimestre de 2013, el efecto de la filtraci\u00f3n se hizo evidente: las ganancias de la organizaci\u00f3n hab\u00edan disminuido. <a title=\"Las ganancias de Target caen 46% por la filtraci\u00f3n de tarjetas de cr\u00e9dito y los impactos podr\u00edan continuar.\" href=\"http:\/\/www.forbes.com\/sites\/maggiemcgrath\/2014\/02\/26\/target-profit-falls-46-on-credit-card-breach-and-says-the-hits-could-keep-on-coming\/\" target=\"_blank\" rel=\"noreferrer noopener\">46 por ciento<\/a> A\u00f1o tras a\u00f1o. Unos meses despu\u00e9s, el director ejecutivo de la empresa dimiti\u00f3. Target no est\u00e1 solo en su lucha por recuperar la confianza tras una vulneraci\u00f3n de seguridad.; <a title=\"Interactions descubre que el 45 por ciento de los compradores no conf\u00edan en que los minoristas mantengan segura la informaci\u00f3n\" href=\"http:\/\/www.interactionsmarketing.com\/news\/?p=1076\" target=\"_blank\" rel=\"noreferrer noopener\">36 por ciento<\/a> Seg\u00fan una investigaci\u00f3n reciente, los clientes afirman que acudir\u00e1n a un negocio con menos frecuencia despu\u00e9s de una infracci\u00f3n.<\/p>\n\n\n\n<p>Desafortunadamente para los CIO y CISO, cuando surge un problema de seguridad de la informaci\u00f3n, asumir\u00e1n la mayor parte de la culpa, sea justo o no. Probablemente sea en parte razonable., <a title=\"Los tres principales problemas de TI en el lugar de trabajo impiden que los CIO duerman tranquilos en 2015\" href=\"http:\/\/www.prnewswire.com\/news-releases\/top-three-it-workplace-issues-prevent-cios-from-sleeping-easy-in-2015-300026276.html\" target=\"_blank\" rel=\"noreferrer noopener\">m\u00e1s de la mitad<\/a> de los CIO citan las amenazas a la seguridad como su principal preocupaci\u00f3n hoy en d\u00eda. Adem\u00e1s, estos l\u00edderes de TI no son paranoicos; <a title=\"4 razones por las que los CIO pierden sus trabajos\" href=\"http:\/\/learn.sungardas.com\/rs\/sungardavailabilitysvcslp\/images\/business-continuity-plan-why-cios-get-fired-GEN-WPS-078.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">un libro blanco reciente<\/a> El grupo consultor Silverton Consulting Group identific\u00f3 las violaciones de seguridad como la principal raz\u00f3n por la que los CIO pierden sus trabajos.<\/p>\n\n\n\n<p>Incluso cuando los CISO o CIO no son despedidos tras una filtraci\u00f3n, probablemente les costar\u00e1 recuperar la confianza que sus colegas depositaron en ellos. A su vez, esto puede dificultar que los profesionales de seguridad inform\u00e1tica:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mantener di\u00e1logos significativos y productivos con otros miembros de la alta direcci\u00f3n sobre ciberseguridad.<\/li>\n\n\n\n<li>Tener influencia en las decisiones presupuestarias y de contrataci\u00f3n<\/li>\n\n\n\n<li>Prevenir futuros ataques<\/li>\n<\/ul>\n\n\n\n<p>Una de las claves para evitar da\u00f1ar la reputaci\u00f3n de un profesional o una empresa de seguridad es que los CIO y los CISO <a href=\"https:\/\/swimlane.com\/es\/alineando-a-su-soc-y-c-suite-en-materia-de-ciberseguridad\/\">empezar a tener conversaciones<\/a> sobre c\u00f3mo mitigar el riesgo <em>antes <\/em>Se produce una vulneraci\u00f3n significativa. De la misma manera que las partes interesadas elaboran estrategias antes de tomar decisiones importantes de contrataci\u00f3n o asignar recursos significativos a un proyecto, los profesionales de gesti\u00f3n de operaciones de seguridad y otros l\u00edderes empresariales fuera del \u00e1rea de TI deben realizar evaluaciones de riesgos relacionadas con la seguridad de la informaci\u00f3n. Estas conversaciones permitir\u00e1n a las empresas identificar la informaci\u00f3n y las funciones m\u00e1s cr\u00edticas para ellas y crear un plan multicapa, que incluye <a href=\"https:\/\/swimlane.com\/es\/solution\/\">soluciones de seguridad avanzadas<\/a>, educaci\u00f3n del usuario final y protocolos de respuesta a incidentes para proteger estos activos.<\/p>\n\n\n\n<p>Lo cierto es que los altos ejecutivos suelen estar extremadamente ocupados, por lo que es responsabilidad del CIO o CISO adoptar un enfoque proactivo para enfatizar la seguridad de la informaci\u00f3n en una organizaci\u00f3n. Esta t\u00e1ctica puede ser contagiosa, impulsando a otras partes interesadas de la empresa a centrarse tambi\u00e9n m\u00e1s en la seguridad y creando un ambiente donde se prioriza y el personal de seguridad de TI es visto como l\u00edderes dentro de la empresa. Una vez que esto sucede, es mucho m\u00e1s f\u00e1cil asegurar la aceptaci\u00f3n en toda la empresa. En realidad, un enfoque proactivo en seguridad de la informaci\u00f3n es crucial, ya que la velocidad y la complejidad de los ataques actuales significan que su empresa est\u00e1 en una situaci\u00f3n muy dif\u00edcil si no implementa herramientas o protocolos de seguridad actualizados antes de que se produzca una brecha.<\/p>\n\n\n\n<p>Vuelva pronto para ver la tercera y \u00faltima entrega de esta serie en la que abordaremos c\u00f3mo tratar la seguridad de la informaci\u00f3n como un riesgo comercial ayuda a protegerse contra la p\u00e9rdida de propiedad intelectual.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Publicaciones relacionadas<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f274d6cf5f8 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 de mayo de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 3: Propiedad intelectual<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f274d6d0ff5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 1: Impacto financiero<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f274d6d3402 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-security-drivers-security-information-overload\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10 de marzo de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Factores clave en la ciberseguridad (parte 4): Sobrecarga de informaci\u00f3n de seguridad<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">\u00bfInteresado en aprender m\u00e1s?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Suscr\u00edbete hoy para mantenerte informado y recibir actualizaciones peri\u00f3dicas de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Antecedentes de SecOps moderno: un gr\u00e1fico geom\u00e9trico degradado que representa el flujo de datos fluido y la agilidad nativa de la nube.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"es\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9954,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9953","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why managing information security as a business risk is critical,\u2026<\/title>\n<meta name=\"description\" content=\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO&#039;s standing within his or her own company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why managing information security as a business risk is critical, part 2: Reputational harm\" \/>\n<meta property=\"og:description\" content=\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO&#039;s standing within his or her own company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:29:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/\",\"name\":\"Why managing information security as a business risk is critical,\u2026\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-reputation.png\",\"datePublished\":\"2015-04-26T18:18:00+00:00\",\"dateModified\":\"2025-01-10T17:29:27+00:00\",\"description\":\"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \\\/ CIO's standing within his or her own company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-reputation.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-reputation.png\",\"width\":1120,\"height\":696,\"caption\":\"Business professionals in meeting discussing corporate reputation risk and incident response strategy in modern enterprise environment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/blog\\\/managing-security-as-a-business-risk-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why managing information security as a business risk is critical, part 2: Reputational harm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial\u2026","description":"Una violaci\u00f3n de seguridad puede da\u00f1ar gravemente la reputaci\u00f3n de una organizaci\u00f3n ante el p\u00fablico y tambi\u00e9n puede da\u00f1ar la reputaci\u00f3n de un CISO\/CIO dentro de su propia empresa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-2\/","og_locale":"es_ES","og_type":"article","og_title":"Why managing information security as a business risk is critical, part 2: Reputational harm","og_description":"A security breach can severely damage an organization\u2019s reputation with the public and can also harm a CISO \/ CIO's standing within his or her own company.","og_url":"https:\/\/swimlane.com\/es\/blog\/gestion-de-la-seguridad-como-riesgo-empresarial-parte-2\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:29:27+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/","url":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/","name":"Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial\u2026","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","datePublished":"2015-04-26T18:18:00+00:00","dateModified":"2025-01-10T17:29:27+00:00","description":"Una violaci\u00f3n de seguridad puede da\u00f1ar gravemente la reputaci\u00f3n de una organizaci\u00f3n ante el p\u00fablico y tambi\u00e9n puede da\u00f1ar la reputaci\u00f3n de un CISO\/CIO dentro de su propia empresa.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-reputation.png","width":1120,"height":696,"caption":"Business professionals in meeting discussing corporate reputation risk and incident response strategy in modern enterprise environment"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why managing information security as a business risk is critical, part 2: Reputational harm"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9953\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9954"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9953"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9953"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9953"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9953"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9953"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}