{"id":9961,"date":"2015-03-17T13:16:00","date_gmt":"2015-03-17T19:16:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/aligning-your-soc-and-c-suite-on-cyber-security\/"},"modified":"2025-01-10T08:36:04","modified_gmt":"2025-01-10T15:36:04","slug":"alineando-a-su-soc-y-c-suite-en-materia-de-ciberseguridad","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/","title":{"rendered":"Por qu\u00e9 es fundamental alinear al SOC y a la alta direcci\u00f3n en materia de ciberseguridad"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Reuni\u00f3n de negocios con participantes reunidos alrededor de una mesa.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg 1280w, https:\/\/swimlane.com\/wp-content\/uploads\/board-300x169.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/board-1024x576.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/board-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-03-17T13:16:00-06:00\">17 de marzo de 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Por qu\u00e9 es fundamental alinear al SOC y a la alta direcci\u00f3n en materia de ciberseguridad<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de usuario\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minuto de lectura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correo electr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20aligning%20your%20SOC%20and%20C-suite%20on%20cybersecurity%20is%20critical').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F', '_blank')\" title=\"Correo electr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Gorjeo\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20aligning%20your%20SOC%20and%20C-suite%20on%20cybersecurity%20is%20critical&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F\" title=\"Gorjeo\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Faligning-your-soc-and-c-suite-on-cyber-security%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Adoptar las soluciones de seguridad de la informaci\u00f3n adecuadas y contar con un equipo de TI que sepa usarlas eficazmente es fundamental para proteger a su organizaci\u00f3n de hackers maliciosos y ciberataques. Sin embargo, un conjunto avanzado de herramientas por s\u00ed solo no es suficiente, ya que la desconexi\u00f3n entre su SOC y la alta direcci\u00f3n puede obstaculizar gravemente las iniciativas de ciberseguridad.<\/p>\n<p>Por ejemplo, la formaci\u00f3n del usuario final es un componente fundamental de cualquier plan integral de seguridad de la informaci\u00f3n; los empleados deben estar informados sobre temas como la protecci\u00f3n de la informaci\u00f3n confidencial de la empresa en un entorno BYOD o la detecci\u00f3n de un ataque de phishing selectivo en un correo electr\u00f3nico. Los profesionales de la seguridad de la informaci\u00f3n necesitan la plena aceptaci\u00f3n de la organizaci\u00f3n para que las iniciativas de formaci\u00f3n tengan \u00e9xito, y todo esto comienza con la aceptaci\u00f3n colectiva de la alta direcci\u00f3n para que la confianza y el compromiso se transmitan a todos los niveles. Al fin y al cabo, si el director de operaciones y el director general, por ejemplo, no priorizan la ciberseguridad, es probable que la mayor\u00eda de los empleados de base tampoco lo hagan.<\/p>\n<p>Desafortunadamente para los CIO, CISO y otros funcionarios de seguridad de alto rango, existe una brecha cultural entre una <a href=\"https:\/\/swimlane.com\/es\/blog\/que-es-un-centro-de-operaciones-de-seguridad-soc\/\">SOC<\/a> El problema con los altos ejecutivos es demasiado com\u00fan. Por ejemplo, en una encuesta reciente encargada por la contratista de defensa Raytheon a 1006 directores de sistemas de informaci\u00f3n (CIO), directores de seguridad de la informaci\u00f3n (CISO) y otros ejecutivos de tecnolog\u00eda, el 78 % afirm\u00f3 que sus juntas directivas no hab\u00edan recibido informaci\u00f3n sobre la estrategia de ciberseguridad de su organizaci\u00f3n en los \u00faltimos 12 meses. Adem\u00e1s, solo el 42 % de los encuestados por PwC afirm\u00f3 que su junta directiva participa activamente en la estrategia general de seguridad, y solo el 25 % afirm\u00f3 que sus juntas directivas participaban en la revisi\u00f3n de los riesgos para la privacidad de sus organizaciones.<\/p>\n<p>Si tiene dificultades para lograr que los principales ejecutivos de su empresa presten a la ciberseguridad la atenci\u00f3n que merece, tal vez sea momento de adoptar un enfoque m\u00e1s agresivo utilizando t\u00e1cticas como:<\/p>\n<ul>\n<li><strong>Presentaci\u00f3n de datos financieros concretos<\/strong>Nada capta la atenci\u00f3n colectiva de los ejecutivos como la informaci\u00f3n fiscal convincente. As\u00ed que, la pr\u00f3xima vez que tenga la oportunidad, comparta informaci\u00f3n convincente, como el hecho de que el coste promedio de una brecha de seguridad para una empresa es de 11,6 millones de d\u00f3lares, seg\u00fan el director ejecutivo de Intel, Brian Krzanich. Estas cifras impactantes dejan claro que todos en la alta direcci\u00f3n tienen un inter\u00e9s particular en crear una estrategia s\u00f3lida de seguridad de la informaci\u00f3n.<\/li>\n<\/ul>\n<ul>\n<li><strong>Recibir informes mensuales en el calendario<\/strong>:Insista en una reuni\u00f3n mensual con los ejecutivos de su empresa en la que pueda proporcionar una descripci\u00f3n general de la pol\u00edtica de la empresa y presentar informaci\u00f3n relevante. <a href=\"https:\/\/swimlane.com\/es\/blog\/metricas-de-seguridad-de-soar\/\">m\u00e9tricas de seguridad <\/a>y sugerir posibles ajustes estrat\u00e9gicos. Incluso puede aprovechar este tiempo para debatir noticias del sector y as\u00ed generar inter\u00e9s. Proporcionar informes de progreso ayuda a mantener a los ejecutivos involucrados en el proceso de seguridad de la informaci\u00f3n, y esa participaci\u00f3n se difundir\u00e1 al resto de la empresa.<\/li>\n<\/ul>\n<ul>\n<li><strong>Proporcionar actualizaciones sobre las \u00faltimas tendencias y soluciones de seguridad.<\/strong>Si puede programar las reuniones mencionadas, considere dedicar tiempo a detallar algunas de las t\u00e1cticas m\u00e1s recientes que utilizan los ciberdelincuentes y las medidas de ciberseguridad disponibles, como la respuesta automatizada a incidentes o la seguridad definida por software, que pueden ayudar a combatirlos. Mantener a la alta direcci\u00f3n informada sobre los \u00faltimos avances en seguridad de la informaci\u00f3n permite a los ejecutivos contribuir de forma m\u00e1s significativa a las discusiones sobre pol\u00edticas y compras, lo que facilita la vida de un CISO o CIO.<\/li>\n<\/ul>\n<p>Como cualquier proyecto importante, conseguir la aprobaci\u00f3n de la alta direcci\u00f3n en materia de ciberseguridad requiere una inversi\u00f3n inicial considerable de tiempo. Pero, como con cualquier inversi\u00f3n que valga la pena, el resultado final compensa con creces el esfuerzo.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Publicaciones relacionadas<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ddfbe1b7fb8 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 1: Impacto financiero<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ddfbe1b8fff bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 2: Da\u00f1o a la reputaci\u00f3n<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ddfbe1b9e6a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 de mayo de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 es fundamental gestionar la seguridad de la informaci\u00f3n como un riesgo empresarial, parte 3: Propiedad intelectual<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">\u00bfInteresado en aprender m\u00e1s?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Suscr\u00edbete hoy para mantenerte informado y recibir actualizaciones peri\u00f3dicas de Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Antecedentes de SecOps moderno: un gr\u00e1fico geom\u00e9trico degradado que representa el flujo de datos fluido y la agilidad nativa de la nube.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"es\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":38827,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9961","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why aligning your SOC and C-suite on is critical<\/title>\n<meta name=\"description\" content=\"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/alineando-a-su-soc-y-c-suite-en-materia-de-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why aligning your SOC and C-suite on cybersecurity is critical\" \/>\n<meta property=\"og:description\" content=\"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/alineando-a-su-soc-y-c-suite-en-materia-de-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T15:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/\",\"name\":\"Why aligning your SOC and C-suite on is critical\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg\",\"datePublished\":\"2015-03-17T19:16:00+00:00\",\"dateModified\":\"2025-01-10T15:36:04+00:00\",\"description\":\"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg\",\"width\":1280,\"height\":720,\"caption\":\"People at a round table discuss different issues. Focus on hand\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why aligning your SOC and C-suite on cybersecurity is critical\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Por qu\u00e9 es fundamental alinear el SOC y la alta direcci\u00f3n","description":"Automatizaci\u00f3n de seguridad, SOAR, automatizaci\u00f3n de SOC, plataforma SOAR, automatizaci\u00f3n de inteligencia sobre amenazas, automatizaci\u00f3n de respuesta a incidentes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/alineando-a-su-soc-y-c-suite-en-materia-de-ciberseguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Why aligning your SOC and C-suite on cybersecurity is critical","og_description":"security automation,SOAR,SOC automation,SOAR platform,threat intelligence automation,incident response automation","og_url":"https:\/\/swimlane.com\/es\/blog\/alineando-a-su-soc-y-c-suite-en-materia-de-ciberseguridad\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T15:36:04+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/","url":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/","name":"Por qu\u00e9 es fundamental alinear el SOC y la alta direcci\u00f3n","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","datePublished":"2015-03-17T19:16:00+00:00","dateModified":"2025-01-10T15:36:04+00:00","description":"Automatizaci\u00f3n de seguridad, SOAR, automatizaci\u00f3n de SOC, plataforma SOAR, automatizaci\u00f3n de inteligencia sobre amenazas, automatizaci\u00f3n de respuesta a incidentes","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/board.jpg","width":1280,"height":720,"caption":"People at a round table discuss different issues. Focus on hand"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why aligning your SOC and C-suite on cybersecurity is critical"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9961\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/38827"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9961"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9961"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9961"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9961"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9961"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}