{"id":3833,"date":"2019-04-19T20:12:29","date_gmt":"2019-04-19T23:12:29","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=3833"},"modified":"2019-04-19T20:12:29","modified_gmt":"2019-04-19T23:12:29","slug":"las-empresas-de-infraestructura-critica-y-la-amenaza-de-las-ciberseguridad-global","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=3833","title":{"rendered":"Las empresas de infraestructura cr\u00edtica y la amenaza de las ciberseguridad global"},"content":{"rendered":"<div class=\"gmail_default\">Las industrias de Energ\u00eda, miner\u00eda y materiales deben enfrentar desaf\u00edos \u00fanicos para protegerse en un mundo digital.<\/div>\n<p><!--more--><\/p>\n<p><strong>Whether they generate or distribute power,<\/strong>\u00a0or extract or refine oil, gas, or minerals, heavy industrial companies comprise critical infrastructure for the global economy. As a result, they are attractive targets for cyber crimes. Already by 2018 nearly 60 percent of relevant surveyed organizations had experienced a breach in their industrial control (ICS) or supervisory control and data-acquisition (SCADA) systems.<a class=\"link-footnote\" rel=\"#sbArticlefootnote1\"><sup>1<\/sup><\/a><\/p>\n<p>Heavy industrials face unique cybersecurity challenges, given their distributed, decentralized governance structures and large operational technology (OT) environment\u2014an environment that does not lend itself readily to traditional cybersecurity controls.<a class=\"link-footnote\" rel=\"#sbArticlefootnote2\"><sup>2<\/sup><\/a>\u00a0Furthermore, many heavy industrials have invested in becoming \u201ccyber mature,\u201d as have other at-risk industries, such as financial services and healthcare. The investment gap has left most heavy industrials insufficiently prepared for the mounting threats.<\/p>\n<p>As awareness of the threat environment grows, however, many top executives at these companies are now sharpening their\u00a0<a href=\"https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/cyber-risk-measurement-and-the-holistic-cybersecurity-approach\" target=\"_blank\" rel=\"noopener noreferrer\">focus on cybersecurity<\/a>. They are asking important questions like: What does it take to transform our cybersecurity capabilities? What investments will address the most risk? How much should we be spending? Leading companies are now rethinking their cybersecurity organizations and governance models. Some are taking advantage of new security tools for OT offered by innovative start-ups. Most are adopting a risk-based approach to security\u2014identifying their critical assets and seeking appropriate controls based on risk levels (see sidebar, \u201cA cybersecurity transformation in oil and gas\u201d).<\/p>\n<p><strong>Fuente:\u00a0<\/strong><em><a href=\"https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/critical-infrastructure-companies-and-the-global-cybersecurity-threat\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.mckinsey.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Las industrias de Energ\u00eda, miner\u00eda y materiales deben enfrentar desaf\u00edos \u00fanicos para protegerse en un mundo digital.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[37,23,29,24],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/3833"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3833"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/3833\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}