{"id":9957,"date":"2015-04-09T22:12:00","date_gmt":"2015-04-10T04:12:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/managing-security-as-a-business-risk\/"},"modified":"2025-01-10T10:28:52","modified_gmt":"2025-01-10T17:28:52","slug":"gestionar-la-seguridad-como-un-riesgo-empresarial","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/","title":{"rendered":"Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 1: Impacto financiero"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Billetes de d\u00f3lares estadounidenses dispersos que ilustran el riesgo financiero, el impacto del fraude y las consideraciones de costos en las operaciones de ciberseguridad.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-04-09T22:12:00-06:00\">9 de abril de 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 1: Impacto financiero<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de usuario\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minuto de lectura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correo electr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%201%3A%20Financial%20impact').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk%2F', '_blank')\" title=\"Correo electr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gorjeo\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%201%3A%20Financial%20impact&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Gorjeo\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>&nbsp;<\/h2>\n<h3>Parte I: Impacto financiero directo<\/h3>\n<p>Uno de los desaf\u00edos m\u00e1s importantes que enfrentan los profesionales de TI hoy en d\u00eda es una mentalidad de silos persistente que los mantiene separados de iniciativas empresariales cruciales para la organizaci\u00f3n, como la gesti\u00f3n de riesgos. El problema de los silos es particularmente frecuente en lo que respecta a la seguridad de la informaci\u00f3n; un estudio reciente de la contratista de defensa Raytheon, realizado a 1006 ejecutivos de tecnolog\u00eda, por ejemplo, revel\u00f3 que <a href=\"http:\/\/investor.raytheon.com\/mobile.view?c=84193&amp;v=203&amp;d=1&amp;id=2018124\" target=\"_blank\" rel=\"noopener\">66 por ciento<\/a> No creen que los altos l\u00edderes de su organizaci\u00f3n consideren la seguridad inform\u00e1tica como una prioridad estrat\u00e9gica.<\/p>\n<p>Pero el problema es multifac\u00e9tico. En algunos casos, los profesionales de seguridad de la informaci\u00f3n pueden dudar en compartir informaci\u00f3n y colaborar con otros departamentos por diversas razones, desde la preocupaci\u00f3n por las limitaciones de tiempo hasta el temor a la falta de compromiso de los empleados. En esta serie de tres partes, examinaremos por qu\u00e9 es tan crucial que los profesionales de seguridad inform\u00e1tica y otras partes interesadas cambien su mentalidad colectiva y comiencen a considerar la gesti\u00f3n de operaciones de seguridad como un riesgo empresarial crucial, en lugar de un problema estrictamente tecnol\u00f3gico.<\/p>\n<p>Conseguir varios departamentos y el <a title=\"Por qu\u00e9 es fundamental alinear al SOC y a los altos ejecutivos en materia de ciberseguridad\" href=\"https:\/\/swimlane.com\/es\/alineando-a-su-soc-y-c-suite-en-materia-de-ciberseguridad\/\">Altos ejecutivos<\/a> Adem\u00e1s, trabajar juntos es crucial para desarrollar una estrategia de seguridad integral y eficaz. La colaboraci\u00f3n y el intercambio de informaci\u00f3n entre departamentos facilitan la capacitaci\u00f3n del usuario final, y el di\u00e1logo continuo entre el SOC y las partes interesadas clave aumenta la probabilidad de que la organizaci\u00f3n destine recursos financieros a la adopci\u00f3n de medidas eficaces. <a title=\"Mejore la seguridad. Reduzca costos. Swimlane automatiza las operaciones de seguridad.\" href=\"https:\/\/swimlane.com\/es\/solution\/\">soluciones de seguridad automatizadas<\/a>.<\/p>\n<p>Pero la realidad para los CISO y otros miembros del SOC es que, cuando se produce una brecha de seguridad, ser\u00e1n responsables en \u00faltima instancia. De hecho, la presi\u00f3n sobre los CISO es tan grande que ha dado paso a una tendencia de estos profesionales. <a title=\"\u00bfQu\u00e9 impulsa la rotaci\u00f3n ejecutiva de los CISO?\" href=\"http:\/\/searchsecurity.techtarget.com\/answer\/Whats-driving-executive-turnover-for-CISOs\" target=\"_blank\" rel=\"noreferrer noopener\">abandonando el mundo corporativo<\/a> Para el proveedor del negocio. Y nada pone a un l\u00edder de seguridad en problemas m\u00e1s r\u00e1pido que un problema de seguridad que le cuesta dinero directamente.<\/p>\n<p>El ejemplo m\u00e1s claro de c\u00f3mo un incidente de seguridad inform\u00e1tica afecta las finanzas de una empresa es el robo descarado. Hasta hace poco, se cre\u00eda que los bancos y otras instituciones financieras estaban mejor preparados para defenderse de las intrusiones, pero esa ilusi\u00f3n se ha desvanecido. Algunas noticias de alto perfil recientes se han centrado en ciberdelincuentes que roban informaci\u00f3n confidencial de clientes, pero algunos profesionales de seguridad inform\u00e1tica pueden desconocer que los hackers han encontrado formas de... <a title=\"Los piratas inform\u00e1ticos bancarios roban millones mediante malware\" href=\"http:\/\/www.nytimes.com\/2015\/02\/15\/world\/bank-hackers-steal-millions-via-malware.html\" target=\"_blank\" rel=\"noreferrer noopener\">robar directamente millones<\/a> De bancos que utilizan software malicioso. Los ataques se llevaron a cabo contra m\u00e1s de 100 bancos en 30 pa\u00edses y es pr\u00e1cticamente seguro que muchos CISO y otros profesionales de seguridad de esas instituciones sufrir\u00e1n, como m\u00ednimo, un da\u00f1o a su reputaci\u00f3n y, en el peor de los casos, el despido.<\/p>\n<p>El comercio electr\u00f3nico es otro ejemplo. A estas alturas, casi todos los que est\u00e1n familiarizados con la seguridad de la informaci\u00f3n o el comercio electr\u00f3nico comprenden que una intrusi\u00f3n que provoca la inactividad del sitio web afecta negativamente los ingresos. La sorpresa, especialmente para las grandes empresas, puede ser precisamente... <em>cu\u00e1nto <\/em>Se puede perder dinero en poco tiempo. Por ejemplo, Mike Azevedo, director ejecutivo de Clustrix, proveedor de soluciones de bases de datos, afirm\u00f3 que la inactividad de un sitio web puede costar a las organizaciones de comercio electr\u00f3nico una cantidad asombrosa. <a title=\"El 43% de los consumidores experimentaron problemas de rendimiento en sus sitios web de comercio electr\u00f3nico durante la temporada navide\u00f1a de 2014.\" href=\"https:\/\/www.internetretailer.com\/2015\/03\/10\/43-consumers-had-e-commerce-website-performance-issues\" target=\"_blank\" rel=\"noreferrer noopener\">$500,000 por hora<\/a>. A ese ritmo, incluso una sola filtraci\u00f3n de datos podr\u00eda afectar las cifras trimestrales de una empresa y poner en grave peligro el trabajo de un CISO.<\/p>\n<p>Lamentablemente, las p\u00e9rdidas financieras directas no son la \u00fanica forma en que las organizaciones y sus CISO pueden verse perjudicados por los ciberataques. Vuelva la pr\u00f3xima semana para obtener m\u00e1s informaci\u00f3n. <a title=\"10 datos que todo profesional de la ciberseguridad deber\u00eda saber\" href=\"https:\/\/swimlane.com\/es\/10-datos-que-todo-profesional-de-la-ciberseguridad-debe-saber\/\">Parte 2<\/a> de esta serie en la que examinamos c\u00f3mo las empresas y los profesionales de seguridad inform\u00e1tica pueden ver da\u00f1ada su reputaci\u00f3n cuando se produce una infracci\u00f3n.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Publicaciones relacionadas<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d2e605585dd bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 2: Da\u00f1o a la reputaci\u00f3n<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d2e60559870 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 de mayo de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 3: Propiedad intelectual<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69d2e6055a7e5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-security-drivers-security-information-overload\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10 de marzo de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Factores clave en la ciberseguridad (parte 4): Sobrecarga de informaci\u00f3n de seguridad<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">\u00bfInteresado en aprender m\u00e1s?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Suscr\u00edbete hoy para mantenerte informado y recibir actualizaciones peri\u00f3dicas de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Antecedentes de SecOps moderno: un gr\u00e1fico geom\u00e9trico degradado que representa el flujo de datos fluido y la agilidad nativa de la nube.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"es\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9958,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9957","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Managing information security as a critical business risk<\/title>\n<meta name=\"description\" content=\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/gestionar-la-seguridad-como-un-riesgo-empresarial\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why managing information security as a business risk is critical, part 1: Financial impact\" \/>\n<meta property=\"og:description\" content=\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/gestionar-la-seguridad-como-un-riesgo-empresarial\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:28:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/\",\"name\":\"Managing information security as a critical business risk\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\",\"datePublished\":\"2015-04-10T04:12:00+00:00\",\"dateModified\":\"2025-01-10T17:28:52+00:00\",\"description\":\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\",\"width\":1120,\"height\":696,\"caption\":\"U.S. dollar bills scattered illustrating financial risk, fraud impact and cost considerations in cybersecurity operations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why managing information security as a business risk is critical, part 1: Financial impact\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial cr\u00edtico","description":"Uno de los principales desaf\u00edos que enfrentan hoy los profesionales de TI es una mentalidad compartimentada que los mantiene separados de las iniciativas comerciales cr\u00edticas de la organizaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/gestionar-la-seguridad-como-un-riesgo-empresarial\/","og_locale":"es_ES","og_type":"article","og_title":"Why managing information security as a business risk is critical, part 1: Financial impact","og_description":"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.","og_url":"https:\/\/swimlane.com\/es\/blog\/gestionar-la-seguridad-como-un-riesgo-empresarial\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:28:52+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/","url":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/","name":"Gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial cr\u00edtico","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","datePublished":"2015-04-10T04:12:00+00:00","dateModified":"2025-01-10T17:28:52+00:00","description":"Uno de los principales desaf\u00edos que enfrentan hoy los profesionales de TI es una mentalidad compartimentada que los mantiene separados de las iniciativas comerciales cr\u00edticas de la organizaci\u00f3n.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","width":1120,"height":696,"caption":"U.S. dollar bills scattered illustrating financial risk, fraud impact and cost considerations in cybersecurity operations"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why managing information security as a business risk is critical, part 1: Financial impact"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9957\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9958"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9957"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9957"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9957"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9957"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9957"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}