
{"id":482,"date":"2009-02-23T14:24:10","date_gmt":"2009-02-23T17:24:10","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=482"},"modified":"2009-02-23T14:24:10","modified_gmt":"2009-02-23T17:24:10","slug":"1st-security-blogger-summit","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/","title":{"rendered":"1st Security Blogger Summit"},"content":{"rendered":"<p>Uno de los temas que posiblemente gener\u00c3\u00b3 m\u00c3\u00a1s debate durante el <strong>1st Security Blogger Summit<\/strong> fue el papel que deb\u00c3\u00adan jugar las Empresas, las administraciones p\u00c3\u00bablicas y los usuarios, ya que finalmente todos estamos expuestos diariamente a ataques inform\u00c3\u00a1ticos y virus, por lo que la seguridad nos compete a todos.<br \/>\nSe habl\u00c3\u00b3 de la rapidez con la que avanza el medio (Internet)\u00c2\u00a0 y la dificultad de aprender de forma inmediata.<br \/>\nAlgunas de las frases m\u00c3\u00a1s destacadas que se escucharon fueron las siguientes:<br \/>\n<strong>Sebasti\u00c3\u00a1n Muriel:<em>\u00e2\u20ac\u009dEl 80% de los problemas se solucionar\u00c3\u00adan con sentido com\u00c3\u00ban\u00e2\u20ac\u009d. <\/em><\/strong><br \/>\n<strong>Bruce Schneier: <\/strong><em>\u00e2\u20ac\u0153Hay problemas de adaptaci\u00c3\u00b3n generacional. No se puede educar a mucha gente porque los riesgos son m\u00c3\u00b3viles, cuando has educado a uno, los riesgos han cambiado\u00e2\u20ac\u009d.<br \/>\n\u00e2\u20ac\u0153En el caso de las tarjetas de cr\u00c3\u00a9dito el gobierno no educ\u00c3\u00b3 a los usuarios, traslad\u00c3\u00b3 el problema a las empresas y \u00c3\u00a9stas investigaron. Hay que hacer lo mismo: no se puede trasladar el problema s\u00c3\u00b3lo a los usuarios, sino tambi\u00c3\u00a9n a los bancos y a otras empresas, por ejemplo.\u00e2\u20ac\u009d<\/em><\/p>\n<p><em> <\/em><br \/>\n<strong>Byron Acohido: <\/strong><em>\u00e2\u20ac\u0153El 90% del problema no es del usuario. Si un sistema con errores se pone en el mercado no es problema del usuario\u00e2\u20ac\u009d.<\/em><br \/>\n<strong>Antonio Ortiz:<\/strong> <em>\u00e2\u20ac\u0153No hay que extender el miedo hacia Internet, porque cuando hay miedo hacia algo se legisla para prohibir y ser\u00c3\u00ada muy peligroso legislar sobre Internet\u00e2\u20ac\u009d<\/em><br \/>\n<strong>Javier Villaca\u00c3\u00b1as:<\/strong> <em>\u00e2\u20ac\u0153la responsabilidad deber\u00c3\u00ada ser compartida entre empresas, usuarios y organismos p\u00c3\u00bablicos. No s\u00c3\u00b3lo es cosa del usuario. El usuario es quien conduce y quien paga las consecuencias si tiene un accidente de tr\u00c3\u00a1fico y, sin embargo, se exige a los gobiernos que hagan campa\u00c3\u00b1as, que mejoren infraestructuras, etc.\u00e2\u20ac\u009d.<\/em><\/p>\n<p><em><\/em><br \/>\n<strong>Andy Willingham: <\/strong><em>\u00e2\u20ac\u0153La educaci\u00c3\u00b3n ha sido un gran fracaso, pero no hay que rendirse porque la tecnolog\u00c3\u00ada por s\u00c3\u00ad sola no puede resolverlos (los problemas de seguridad). Pero hay que educar de manera que la gente nos entienda\u00e2\u20ac\u009d<\/em><br \/>\n<strong>Sobre el papel de la ley y de los organismos policiales:<\/strong><\/p>\n<p><strong>Bruce Schneier: <\/strong>\u00e2\u20ac\u0153Es un problema internacional, lo que hace m\u00c3\u00a1s dif\u00c3\u00adcil perseguirlo, recoger pruebas, etc. Somos buenos en robos locales, pero no en los transnacionales\u00e2\u20ac\u009d.<\/p>\n<p><strong>C\u00c3\u00a9sar Lorenzana: <\/strong><em>\u00e2\u20ac\u0153Es muy dif\u00c3\u00adcil seguir las pistas, ya que la mayor\u00c3\u00ada de las veces las autoridades de un pa\u00c3\u00ads tienen que pedir permiso a las de otro, \u00c3\u00a9stas \u00c3\u00b3rdenes judiciales, etc. Cuando se consigue por fin una IP relacionada con el cibercriminal, esa IP ya no existe. El tiempo es cr\u00c3\u00adtico en los delitos cibern\u00c3\u00a9ticos y ahora no se es tan r\u00c3\u00a1pido\u00e2\u20ac\u009d. <\/em><\/p>\n<p><strong>C\u00c3\u00a9sar Lorenzana:<\/strong> <em>\u00e2\u20ac\u0153Nunca habr\u00c3\u00a1 una seguridad al 100%. Hay que asumir que miles de personas est\u00c3\u00a1n trabajando para derribar los sistemas de seguridad\u00e2\u20ac\u009d<\/em><\/p>\n<p><strong>Steve Ragan:<\/strong> <em>\u00e2\u20ac\u0153En Estados Unidos se han propuesto algunas leyes, pero en cuanto los usuarios empiezan a ver que esas leyes se entrometen en su intimidad, las rechazan. Esto hace muy dif\u00c3\u00adcil legislar\u00e2\u20ac\u009d.<\/em><\/p>\n<p><em>Fuente: www.securitybloggersummit.com<br \/>\n<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Uno de los temas que posiblemente gener\u00c3\u00b3 m\u00c3\u00a1s debate durante el 1st Security Blogger Summit fue el papel que deb\u00c3\u00adan jugar las Empresas, las administraciones p\u00c3\u00bablicas y los usuarios, ya que finalmente todos estamos expuestos diariamente a ataques inform\u00c3\u00a1ticos y virus, por lo que la seguridad nos compete a todos. Se habl\u00c3\u00b3 de la rapidez [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-482","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - 1st Security Blogger Summit<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"1st Security Blogger Summit\",\"datePublished\":\"2009-02-23T17:24:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/\"},\"wordCount\":506,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - 1st Security Blogger Summit\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-02-23T17:24:10+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 1st Security Blogger Summit","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"1st Security Blogger Summit","datePublished":"2009-02-23T17:24:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/"},"wordCount":506,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/","url":"https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 1st Security Blogger Summit","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-02-23T17:24:10+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/1st-security-blogger-summit\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=482"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/482\/revisions"}],"predecessor-version":[{"id":483,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/482\/revisions\/483"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}