{"id":1324,"date":"2022-02-24T05:03:32","date_gmt":"2022-02-24T05:03:32","guid":{"rendered":"https:\/\/ciberseguridad.situada.online\/index.php\/about\/"},"modified":"2024-04-06T05:55:28","modified_gmt":"2024-04-06T03:55:28","slug":"proyecto","status":"publish","type":"page","link":"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/","title":{"rendered":"About the Project"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-3ad17e27 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a1eebc0\"><h1 class=\"uagb-heading-text\">About the Project<\/h1><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f8ec2bd3 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4220334d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Project description<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Este proyecto surge del Trabajo de Fin de M\u00e1ster (TFM) del Master en Ciberseguridad, titulado \u00abMetodolog\u00eda para la implementaci\u00f3n de un SIEM open-source robusto en organizaciones de la Administraci\u00f3n P\u00fablica\u00bb<br><br>The main objective of the research is to develop a detailed methodology for implementing a robust open-source SIEM (Security Information and Event Manager) in government organizations. Using innovative approaches and open-source tools, it seeks to improve public sector entities' cybersecurity posture and protect critical infrastructures and citizens' data.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ce2067a9 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-4da686b4\"><h2 class=\"uagb-heading-text\"><strong>Background<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-f0ec92f4 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">These studies are essential because they explore how implementing open-source tools in public organizations with budget constraints and limited resources can be critical to addressing cybersecurity challenges in Latin America and the Caribbean (LAC). Given technology's growing role in government management, understanding how these tools can strengthen cyber defenses and protect critical data is essential to ensuring security and trust in digital services.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-a8e1d5d0\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-0c36951d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-74adb86a\">\n<div class=\"wp-block-uagb-info-box uagb-block-c4110c50 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong><strong>Implementing a Robust Open-Source SIEM: A Methodology for Strengthening Public Sector Cyber Defense<\/strong><\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">This study presents a methodology for implementing an open-source tool to strengthen cyber defense in response to growing cybersecurity challenges in public administration. It highlights the advantages of open-source software in terms of cost and flexibility, especially given the budgetary constraints and lengthy administrative processes that hinder technology adoption in many LAC countries. In addition to implementation, other open-source solutions are integrated to extend cybersecurity capabilities, thus providing a holistic approach to addressing threats in the digital environment.<br><\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/implementacionsiem\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7db8e90d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-f27dfacf\">\n<div class=\"wp-block-uagb-info-box uagb-block-8dff0045 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Resource 1<\/strong>: <strong>Glossary<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">The glossary defines key cybersecurity terms for implementing SIEM (Security Information and Event Management).&nbsp;<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/glosario\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-73d86314 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Resource 2<\/strong>: <strong>Manual<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">The user manual provides detailed instructions and case studies for using the open-source SIEM. Its clear and straightforward steps guide users through monitoring and managing the SIEM to strengthen cyber defense.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/manual\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-5c673780\">\n<div class=\"wp-block-uagb-info-box uagb-block-4685891f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Resource 3: Guide<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">The practical guide provides a step-by-step approach to implementing Wazuh SIEM in government organizations. From scope definition to integration with other tools, this guide provides detailed guidance to ensure a robust, sustainable, and successful implementation of open-source SIEM.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/guia\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">Read more<\/span><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-b9ead133\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e580f515 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-79ceeba2\">\n<div class=\"wp-block-uagb-info-box uagb-block-4da52caf uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>General Objective<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">This project aims to improve organizations' cybersecurity posture for detection, response, and protection against cyber threats by creating a methodology for implementing an effective open-source SIEM tool.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-652fcd17\">\n<div class=\"wp-block-uagb-info-box uagb-block-023aff07 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Specific Objectives<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">1. Research current best practices and approaches to implementing SIEM systems, including using resources such as a glossary to ensure an understanding of key terms.<br><br>2. Design a detailed methodology that covers the entire process, from planning and integration to ongoing management of an open-source SIEM in organizations. The methodology should include developing resources such as a user manual and a guide to facilitate the tool's operation and configuration.<br><br>3. Test and validate the proposed methodology in simulated and real-world environments to evaluate its effectiveness and feasibility in different organizational contexts, using resources such as a comprehensive guide to orient the process.<br><br>4. Provide specific recommendations to improve the implementation and management of open-source SIEM, emphasizing resource optimization and leveraging existing resources.<\/p><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-39b1a2e3\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-09fa7746 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8f7a7d96\"><h2 class=\"uagb-heading-text\"><strong><strong>Findings and Results Achieved<\/strong><\/strong><\/h2><\/div>\n\n\n\n<p style=\"font-size:25px\"><strong>Implementing a Robust Open-Source SIEM: A Methodology for <strong><strong>Strengthening Public Sector <\/strong><\/strong>Cyber Defense<\/strong><\/p>\n\n\n\n<ul>\n<li>The project proposes a sound methodology for implementing a robust open-source SIEM in public organizations, highlighting Wazuh as the most suitable tool.<\/li>\n\n\n\n<li>The proposed methodology prioritizes defining the scope and requirements for deploying the tool within any organization's infrastructure.<\/li>\n\n\n\n<li>Se destaca la optimizaci\u00f3n del SIEM Wazuh como una \u00abherramienta robusta\u00bb mediante la integraci\u00f3n de otras soluciones de c\u00f3digo abierto que a\u00f1aden capacidades adicionales de ciberseguridad. Esta estrategia enfatiza la importancia de mejorar sistemas existentes en lugar de crear nuevos, lo que contribuye a una soluci\u00f3n m\u00e1s sostenible a largo plazo.<\/li>\n\n\n\n<li>The importance of training the cybersecurity team for proactive detection and response is stressed.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c60afe56 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-b0ba3d31\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-aa95c713 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-7dd59022\">\n<p style=\"font-size:25px\"><strong>Resource 1: Glossary<\/strong><\/p>\n\n\n\n<ul>\n<li>The glossary clarifies technical cybersecurity terms, making them accessible to all users.<\/li>\n\n\n\n<li>It promotes a common language within the project, facilitating collaboration and information sharing.<\/li>\n\n\n\n<li>The digital format of the glossary makes it easily accessible to all users, anytime, anywhere.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-8b8b9fd7\">\n<p style=\"font-size:25px\"><strong>Resource 2: Manual<\/strong><\/p>\n\n\n\n<ul>\n<li>The user manual covers all functionalities of the open-source SIEM, guiding users on its correct operation.<\/li>\n\n\n\n<li>Use case examples to help users understand how to apply SIEM functionalities in real situations.<\/li>\n\n\n\n<li>The manual presents clear and concise instructions, facilitating its use by users with different levels of technical experience.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f1ef4370\">\n<p style=\"font-size:25px\"><strong>Resource 3: Guide<\/strong><\/p>\n\n\n\n<ul>\n<li>It facilitates fast and efficient implementation of the open-source SIEM, even for users with limited technical experience.<\/li>\n\n\n\n<li>The guide equips users to configure a robust SIEM that can be adapted to address their organization's specific security challenges.<\/li>\n\n\n\n<li>The guide facilitates the integration of the SIEM with other existing security tools, maximizing its potential.<\/li>\n<\/ul>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-bf743774\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-31af2d26 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-5a176410\"><h2 class=\"uagb-heading-text\"><strong><strong><strong><strong>Impact and Conclusions<\/strong><\/strong><\/strong><\/strong><\/h2><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-3866c074 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-a0fa8156 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">The research findings demonstrate that the proposed methodology for implementing an open-source SIEM, supported by complementary resources, can significantly improve cybersecurity in public sector organizations.<br><br>By highlighting the importance of collaboration and efficient use of resources, the proposed methodology avoids duplication of effort and fosters the creation of long-term sustainable solutions.<br><br>The resources provided, such as the glossary of terms, user manual, and practical guide, facilitate the understanding and use of SIEM, enabling organizations to take full advantage of its capabilities.<br><br>This study empowers public organizations by offering a comprehensive roadmap to successfully implement an open-source SIEM, bolstering their defenses against cyber threats and enhancing the protection of critical information.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-9bf3dc1b\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Proyecto Antecedentes Hallazgos y Resultados Alcanzados Implementaci\u00f3n de un SIEM Robusto de C\u00f3digo Abierto: Una Metodolog\u00eda para reforzar la Ciberdefensa del Sector P\u00fablico Recurso 1: Glosario Recurso 2: Manual Recurso 3: Gu\u00eda Impacto y Conclusiones<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"ximenamar04","author_link":"https:\/\/ciberseguridad.situada.online\/en\/author\/ximenamar04\/"},"uagb_comment_info":0,"uagb_excerpt":"Proyecto Antecedentes Hallazgos y Resultados Alcanzados Implementaci\u00f3n de un SIEM Robusto de C\u00f3digo Abierto: Una Metodolog\u00eda para reforzar la Ciberdefensa del Sector P\u00fablico Recurso 1: Glosario Recurso 2: Manual Recurso 3: Gu\u00eda Impacto y Conclusiones","_links":{"self":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324"}],"collection":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/comments?post=1324"}],"version-history":[{"count":44,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324\/revisions"}],"predecessor-version":[{"id":2095,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324\/revisions\/2095"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/media?parent=1324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}