Acerca de
Experiencia y educación
Licencias y certificaciones
-
ATT&CK Purple Teaming Methodology Certification
MITRE Engenuity
-
-
-
-
Curso de Ciberseguridad
Fundación Telefónica
Expedición: -
-
-
-
-
Publicaciones
-
Educación en ciberseguridad mediante estrategias de Gamificación
CONAIISI 2024
Este trabajo plantea un enfoque educativo para la ciberseguridad basado en estrategias de gamificación, entendida como la integración por diseño de componentes lúdicos en el proceso de aprendizaje. Mediante la revisión de la literatura, se categorizaron conjuntos de dinámicas según las aproximaciones y sus cualidades, lo que constituye nuestro primer aporte. Luego se realizó un mapeo entre las categorías propuestas, un conjunto de temáticas propias de la ciberseguridad y habilidades laborales…
Este trabajo plantea un enfoque educativo para la ciberseguridad basado en estrategias de gamificación, entendida como la integración por diseño de componentes lúdicos en el proceso de aprendizaje. Mediante la revisión de la literatura, se categorizaron conjuntos de dinámicas según las aproximaciones y sus cualidades, lo que constituye nuestro primer aporte. Luego se realizó un mapeo entre las categorías propuestas, un conjunto de temáticas propias de la ciberseguridad y habilidades laborales relevantes para el sector, lo que permite identificar en qué ámbitos tiene más sentido implementarlas, lo que constituye el segundo aporte. Por último, se describen tres categorías de gamificación poco exploradas en el ambiente y con potencial desarrollo.
Otros autoresVer publicación -
Proposal for the implementation of minimalistic cyber deception strategies
CONAIISI 2024
This work presents a methodical and minimalist approach for the implementation of cyber deception strategies that, without compromising effectiveness, seeks to limit its impact on operations, derived from the limitations of its integration in productive infrastructures and the complexity of the subject. To this end, a cyclical and continuous process is proposed, adaptable to environments of different sizes, which allows obtaining most of the benefits associated with complete cyber deception…
This work presents a methodical and minimalist approach for the implementation of cyber deception strategies that, without compromising effectiveness, seeks to limit its impact on operations, derived from the limitations of its integration in productive infrastructures and the complexity of the subject. To this end, a cyclical and continuous process is proposed, adaptable to environments of different sizes, which allows obtaining most of the benefits associated with complete cyber deception operations, using the least number of elements and through flexible tactics. This approach arose in response to observations detected in experiences working with organizations. To facilitate the implementation of this proposal, and as an additional contribution, a free software tool created for this purpose is provided, which allows its open experimentation and use in production, both for professional and educational environments.
Otros autoresVer publicación -
Cybersecurity exposure management
JAIIO 2024
The field of exposure management in cybersecurity represents a novel area of study within the discipline of active cyber defense. Its objective is to apply the concept of exposure from the domain of organizational risk management. The approach extends the ideas and practices of vulnerability and threat management to provide a more generalized and comprehensive approach, which allows for the interpretation of the whole through the lens of risks. This paper examines the current state of the art…
The field of exposure management in cybersecurity represents a novel area of study within the discipline of active cyber defense. Its objective is to apply the concept of exposure from the domain of organizational risk management. The approach extends the ideas and practices of vulnerability and threat management to provide a more generalized and comprehensive approach, which allows for the interpretation of the whole through the lens of risks. This paper examines the current state of the art of concepts and applications of exposure management in cybersecurity and presents an approach for their applicability in organizations. The proposed contribution addresses the paucity of academic content on the subject, given its recent emergence.
Otros autoresVer publicación -
Model for quantifying the effects of tabletop simulation exercises for cybersecurity incident response
CONAIISI
This paper proposes a model for the development and quantification of improvements in cybersecurity incident response preparedness in organizations based on tabletop simulation exercises. It consists of a progressive process of four stages: initial evaluation, exercise, work on results, and final evaluation to contrast indicators. The proposed model is based on the "Maturity Assessment Methodology for CSIRTs" (ENISA) whose parameters are weighted according to the "Cybersecurity Incident…
This paper proposes a model for the development and quantification of improvements in cybersecurity incident response preparedness in organizations based on tabletop simulation exercises. It consists of a progressive process of four stages: initial evaluation, exercise, work on results, and final evaluation to contrast indicators. The proposed model is based on the "Maturity Assessment Methodology for CSIRTs" (ENISA) whose parameters are weighted according to the "Cybersecurity Incident Management Guide" (NIST). Simulation exercises are designed based on the parameters, according to the mapping proposed in this work.
Otros autoresVer publicación -
Methodology for cybersecurity incident response tabletop exercises
JAIIO
This paper presents a methodology for cybersecurity incident response tabletop exercises. It is based on a combination of industry best practices, and experience in conducting these exercises. The objective is to allow organizations of any size and complexity to plan, design, and execute simulations in an orderly, repeatable, and efficient manner, allowing them to assess their ability to respond to incidents, identify areas for improvement, and develop action plans to increase their response…
This paper presents a methodology for cybersecurity incident response tabletop exercises. It is based on a combination of industry best practices, and experience in conducting these exercises. The objective is to allow organizations of any size and complexity to plan, design, and execute simulations in an orderly, repeatable, and efficient manner, allowing them to assess their ability to respond to incidents, identify areas for improvement, and develop action plans to increase their response capacities. The methodology is divided into several stages that go from planning and preparation to the execution and evaluation of the activity. Additionally, practical guidance is provided on how to approach each stage effectively, and a proposal for metrics aimed at continuous improvement.
Otros autoresVer publicación
Cursos
-
ACTIVE CYBER DEFENSE - Ekoparty
-
-
Curso de Informatica Forense (Copitec)
-
-
Curso de ciberseguridad para micropymes y autónomos | INCIBE
-
-
Especialista en Seguridad Informatica (CCAT)
-
-
Ethical Hacking (It College)
-
-
Introduction to Security | Stratosphere Research Laboratory
-
-
PAE (Primeros Auxilios - R)
-
-
Respaldos y Continuidad de Necocios ( CA Arcserve)
-
-
Virtualización (Vmware vSphere-Op.Man-View)
-
Idiomas
-
Español
Competencia bilingüe o nativa
-
Ingles
Competencia profesional completa
Perfiles similares
-
Victor Laguna
Conectar -
Tomas Casaccia
Co Fundador de Teoint SA
Conectar -
Felix Campos
Conectar -
Luiscarl Jordán
Technical Architect | x6 Salesforce Certified
Conectar -
Alejandro Figurelli
Conectar -
Cristian Rosa
Conectar -
Gabriel Simona
SW Tech Sales Manager at IBM
Conectar -
Federico Miskinich
Conectar -
Gonzalo Iglesias Molli
Consultor de gestión de servicios de TI
Conectar -
Angel Jara
de infraestructura en Banco Industrial
Conectar