{"id":1322,"date":"2022-02-24T05:02:56","date_gmt":"2022-02-24T05:02:56","guid":{"rendered":"https:\/\/ciberseguridad.situada.online\/index.php\/home\/"},"modified":"2024-09-14T04:02:41","modified_gmt":"2024-09-14T02:02:41","slug":"inicio","status":"publish","type":"page","link":"https:\/\/ciberseguridad.situada.online\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-494c42c4 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-cd2517a4 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h1 class=\"uagb-ifb-title\"><br><br>Cybersecurity<\/h1><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-ccbd037b\"><h2 class=\"uagb-heading-text\">Methodological proposal and practical resources to promote digital protection in public organizations<\/h2><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-5fcee4f8 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-2b5f3149\"><h2 class=\"uagb-heading-text\">Working in Unison for a Safer Cyberspace<\/h2><div class=\"uagb-separator\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-006a9181\"><p class=\"uagb-heading-text\">The project focuses on strengthening cybersecurity in organizations. It proposes a methodology for implementing open-source tools integrated with others. This approach amplifies cybersecurity capabilities without the need to develop new technologies. Instead, it focuses on enhancing existing solutions to ensure a sustainable long-term outcome. Additionally, practical resources are provided, such as a glossary, user manual, and implementation guide.<\/p><\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a13b37e7 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-5de0ed00\">\n<div class=\"wp-block-uagb-image uagb-block-724ea2dc wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_implementacionSIEM-scaled-e1709790632345-901x1024.jpg ,https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_implementacionSIEM-scaled-e1709790632345.jpg 780w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_implementacionSIEM-scaled-e1709790632345.jpg 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_implementacionSIEM-scaled-e1709790632345-901x1024.jpg\" alt=\"\" class=\"uag-image-1940\" width=\"901\" height=\"1024\" title=\"Imagen_implementaci\u00f3nSIEM\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-85462521\">\n<div class=\"wp-block-uagb-info-box uagb-block-af9c2f93 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Implementing a Robust Open-Source SIEM: A Methodology for <strong><strong>Strengthening Public Sector <\/strong><\/strong>Cyber Defense<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">This study proposes a methodology for implementing an open-source tool to improve the cybersecurity posture in public sector organizations. <br>By leveraging the cost-effectiveness and flexibility of open-source software, the methodology incorporates other solutions to expand cybersecurity capabilities, promoting the creation of more efficient and sustainable solutions over time.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/implementacionsiem\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ed2081ea\">\n<div class=\"wp-block-uagb-container uagb-block-4eeee70a\">\n<div class=\"wp-block-uagb-info-box uagb-block-56d081d1 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/escritorio-ordenador-portatil-scaled-e1709867893574.jpg\" alt=\"\" width=\"1698\" height=\"2560\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Resource 1<\/strong>: <strong>Glossary<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">The glossary defines key cybersecurity terms for implementing SIEM (Security Information and Event Management). <br><\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/glosario\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-de9dc289\">\n<div class=\"wp-block-uagb-info-box uagb-block-b483e0d5 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_guia-scaled.jpg\" alt=\"\" width=\"1707\" height=\"2560\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Resource 2<\/strong>: <strong>Manual<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">The user manual provides detailed instructions and case studies for using the open-source SIEM. Its clear and straightforward steps guide users through monitoring and managing the SIEM to strengthen cyber defense.<br><\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/manual\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6edb74a0\">\n<div class=\"wp-block-uagb-info-box uagb-block-09a88236 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/sistema-html-diseno-collages-sitios-web-scaled.jpg\" alt=\"\" width=\"1707\" height=\"2560\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Resource 3<\/strong>: <strong>Guide<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">The practical guide provides a step-by-step approach to implementing Wazuh SIEM in government organizations. From scope definition to integration with other tools, this guide provides detailed guidance to ensure a robust, sustainable, and successful implementation of open-source SIEM.<br><\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/guia\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-fb32e4bf alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-testimonial uagb-slick-carousel uagb-tm__arrow-outside uagb-block-9c9f7caf uagb-post__carousel_notset uagb-post__carousel_notset-tablet uagb-post__carousel_notset-mobile\"><div class=\"is-carousel uagb-tm__columns-1 uagb-tm__items\"><div class=\"uagb-testimonial__wrap  uagb-tm__imgicon-style-circle uagb-tm__image-position-top uagb-tm__bg-type-none\"><div class=\"uagb-tm__content\"><div class=\"uagb-tm__overlay\"><\/div><div class=\"uagb-tm__image-content\"><div class=\"uagb-tm__image\"><img decoding=\"async\" class=\"uagb-tm-img-src\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/cropped-cropped-Logo_ciberseguridad-150x150.png\" alt=\"\" width=\"80\" height=\"80\" loading=\"lazy\"\/><\/div><\/div><div class=\"uagb-tm__text-wrap\"><div class=\"uagb-tm__desc\">Empowering Public Sector Cybersecurity with Open-Source Tools and Practical Methodologies<\/div><div class=\"uagb-tm__meta-inner\"><div class=\"uagb-testimonial-details\"><span class=\"uagb-tm__author-name\"><\/span><span class=\"uagb-tm__company\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f3942af0 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-bcac75b1\">\n<div class=\"wp-block-uagb-info-box uagb-block-a01009d9 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\">About the Project<\/span><h4 class=\"uagb-ifb-title\"><strong>Strengthening Cybersecurity in Public Administration<\/strong><\/h4><\/div><p class=\"uagb-ifb-desc\">This project is fundamental to addressing current challenges in public sector cybersecurity. It enables government organizations to strengthen their cybersecurity capabilities against cyberspace threats. <br>Its implementation is crucial to protecting critical infrastructures and sensitive data, thus ensuring citizens' trust and security in the digital environment.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-0408e4b0\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-db147eec wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_proyecto-scaled-e1709870381351-1024x997.jpg ,https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_proyecto-scaled-e1709870381351.jpg 780w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_proyecto-scaled-e1709870381351.jpg 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/03\/Imagen_proyecto-scaled-e1709870381351-1024x997.jpg\" alt=\"\" class=\"uag-image-2000\" width=\"1024\" height=\"997\" title=\"Imagen_proyecto\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-05a4a518 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-9a97965e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h1 class=\"uagb-ifb-title\">situada.online<\/h1><\/div><p class=\"uagb-ifb-desc\">Platform dedicated to research and production of knowledge located in Latin America and the Caribbean, exploring the intersection between women, technology, and the environment<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/situada.online\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_blank\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Propuesta metodol\u00f3gica y recursos pr\u00e1cticos para promover la protecci\u00f3n digital en las organizaciones p\u00fablicas Uniendo esfuerzos por un ciberespacio m\u00e1s seguro El proyecto se centra en fortalecer la ciberseguridad en las organizaciones. Proporciona una propuesta metodol\u00f3gica para implementar herramientas de c\u00f3digo abierto integradas con otras, fortaleciendo as\u00ed las capacidades de ciberseguridad sin la necesidad de [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"ximenamar04","author_link":"https:\/\/ciberseguridad.situada.online\/en\/author\/ximenamar04\/"},"uagb_comment_info":0,"uagb_excerpt":"Propuesta metodol\u00f3gica y recursos pr\u00e1cticos para promover la protecci\u00f3n digital en las organizaciones p\u00fablicas Uniendo esfuerzos por un ciberespacio m\u00e1s seguro El proyecto se centra en fortalecer la ciberseguridad en las organizaciones. Proporciona una propuesta metodol\u00f3gica para implementar herramientas de c\u00f3digo abierto integradas con otras, fortaleciendo as\u00ed las capacidades de ciberseguridad sin la necesidad de&hellip;","_links":{"self":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1322"}],"collection":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/comments?post=1322"}],"version-history":[{"count":84,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1322\/revisions"}],"predecessor-version":[{"id":2170,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1322\/revisions\/2170"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/media?parent=1322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}