{"id":1920,"date":"2024-03-07T06:17:12","date_gmt":"2024-03-07T05:17:12","guid":{"rendered":"https:\/\/ciberseguridad.situada.online\/?page_id=1920"},"modified":"2024-04-27T08:23:16","modified_gmt":"2024-04-27T06:23:16","slug":"implementacionsiem","status":"publish","type":"page","link":"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/implementacionsiem\/","title":{"rendered":"Implementing a Robust Open-Source SIEM: A Methodology for Strengthening Public Sector Cyber Defense"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-3ad17e27 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a1eebc0\"><h1 class=\"uagb-heading-text\"><strong>Implementing a Robust Open-Source SIEM: A Methodology for Strengthening Public Sector Cyber Defense<\/strong><\/h1><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f8ec2bd3 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4220334d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">This study presents a methodology for implementing an open-source tool to strengthen cyber defense in response to growing cybersecurity challenges in public administration. It highlights the advantages of open-source software in terms of cost and flexibility, especially given the budgetary constraints and lengthy administrative processes that hinder technology adoption in many LAC countries. In addition to implementation, other open-source solutions are integrated to extend cybersecurity capabilities, thus providing a holistic approach to addressing threats in the digital environment.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b59ff7ed alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image aligncenter uagb-block-f5222877 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/en-progreso.png 500w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/en-progreso-300x300.png 300w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/en-progreso-150x150.png 150w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/en-progreso-12x12.png 12w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/en-progreso.png\" alt=\"\" class=\"uag-image-2133\" width=\"500\" height=\"500\" title=\"in_progress\" loading=\"lazy\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-75e5dba5\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-06be232d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-53aba445 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Descarga en Espa\u00f1ol<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-bbde84e2\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-0a45d0e0 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Download in English<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-b9ead133\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-879b59fa alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image aligncenter uagb-block-1677c98e wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1.png 1587w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1-212x300.png 212w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1-724x1024.png 724w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1-768x1086.png 768w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1-1086x1536.png 1086w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1-1448x2048.png 1448w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1-8x12.png 8w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity.situada.online1.png\" alt=\"\" class=\"uag-image-2087\" width=\"720\" height=\"1018\" title=\"ciberseguridad.situada.online(1)\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-39b1a2e3\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-31af2d26 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-82b50b32 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Reference<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Trabajo de Fin de M\u00e1ster (TFM) del Master en Ciberseguridad, titulado \u201cMetodolog\u00eda para la implementaci\u00f3n de un SIEM open-source robusto en organizaciones de la Administraci\u00f3n P\u00fablica\u00bb.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-9bf3dc1b\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Implementing a Robust Open-Source SIEM: A Methodology for Strengthening Public Sector Cyber Defense<\/p>","protected":false},"author":1,"featured_media":0,"parent":1324,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"ximenamar04","author_link":"https:\/\/ciberseguridad.situada.online\/en\/author\/ximenamar04\/"},"uagb_comment_info":0,"uagb_excerpt":"Implementaci\u00f3n de un SIEM Robusto de C\u00f3digo Abierto: Una Metodolog\u00eda para reforzar la Ciberdefensa del Sector P\u00fablico","_links":{"self":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1920"}],"collection":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/comments?post=1920"}],"version-history":[{"count":25,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1920\/revisions"}],"predecessor-version":[{"id":2155,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1920\/revisions\/2155"}],"up":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/media?parent=1920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}