{"id":52968,"date":"2017-07-09T18:54:18","date_gmt":"2017-07-09T22:54:18","guid":{"rendered":"https:\/\/www.cyberark.com\/cisoview\/"},"modified":"2024-03-19T04:03:41","modified_gmt":"2024-03-19T08:03:41","slug":"cisoview","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/cisoview\/","title":{"rendered":"La visi\u00f3n de los CISO"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text]<\/p>\n<h1>La visi\u00f3n de los CISO<\/h1>\n<h2>Los directores de seguridad de la informaci\u00f3n m\u00e1s importantes del sector ofrecen asesoramiento independiente a sus hom\u00f3logos.<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbDescargar ahora\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fresources%2Fwhite-papers%2Fla-visi%25C3%25B3n-de-los-ciso-protecci%25C3%25B3n-del-acceso-con-privilegios-en-un-modelo-de-confianza-cero-resumen-ejecutivo|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-top text-md-center\u00bb][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">La serie de investigaciones \u2018la visi\u00f3n de los CISO\u2019<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2-pad-btm text-md-center\u00bb][vc_column width=\u00bb2\/3&#8243; offset=\u00bbvc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>La serie de informes &#8216;La visi\u00f3n de los CISO&#8217; se realiza en colaboraci\u00f3n con la empresa de investigaci\u00f3n independiente Robinson Insight y re\u00fane a los principales directores de la seguridad de la informaci\u00f3n para que compartan informaci\u00f3n con sus hom\u00f3logos con el fin de ayudar a los equipos de seguridad a crear programas eficaces de ciberseguridad.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 seesaw cybv2-pad-btm\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove wistia_embed\u00bb][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_aswr8gsmnr videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-right\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>Proteger el acceso con privilegios mientras se realiza la transici\u00f3n a la Zero Trust<\/h4>\n<p>La transformaci\u00f3n digital y la movilidad empresarial est\u00e1n erosionando r\u00e1pidamente el modelo tradicional basado en el per\u00edmetro. A medida que el per\u00edmetro se disuelve, \u00bfc\u00f3mo pueden proteger las organizaciones el acceso a sus recursos m\u00e1s valiosos (datos, aplicaciones e infraestructuras) de forma local o en la nube?<\/p>\n<p>Entrevistamos a un grupo de 12 de los 1000 m\u00e1s importantes CISO del mundo sobre el panorama cambiante del riesgo, incluyendo la evoluci\u00f3n de las t\u00e9cnicas de ataque que tienen como objetivo el acceso con privilegios. Ofrecieron recomendaciones espec\u00edficas para mitigar los riesgos mediante un modelo de Zero Trust. Este informe es uno de los primeros en ofrecer informaci\u00f3n pr\u00e1ctica y operativa para los CISO y sus equipos sobre la implementaci\u00f3n de un modelo de Zero Trust.<\/p>\n<p>Un complemento de este informe es la <a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/the-ciso-view-2021-survey-zero-trust-and-privileged-access\">Encuesta Visi\u00f3n de los CISO 2021: Zero Trust y Acceso con Privilegios<\/a>. Despu\u00e9s de conocer la informaci\u00f3n de nuestro grupo, quisimos saber si la comunidad de la seguridad en general compart\u00eda su perspectiva. Por eso, encuestamos a 100 ejecutivos de seguridad de grandes empresas (ingresos anuales de m\u00e1s de mil millones de d\u00f3lares) para conocer sus perspectivas. Tanto los encuestados como el grupo demuestran un amplio consenso sobre el valor de Zero Trust y un creciente sentido de urgencia para proteger el acceso con privilegios.[\/vc_column_text][vc_btn title=\u00bbLeer informe\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-btm text-md-center\u00bb][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">M\u00e1s informes de la serie<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw cyb-reverse\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-left\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>Proteger el acceso con privilegios en la automatizaci\u00f3n rob\u00f3tica de procesos<\/h4>\n<h6 class=\"vc_custom_heading\">Protecci\u00f3n de los flujos de trabajo de RPA<\/h6>\n<p>La automatizaci\u00f3n rob\u00f3tica de procesos (RPA) permite aumentar r\u00e1pidamente la eficiencia, la productividad y la calidad. Sin embargo, desde el punto de vista de la ciberseguridad, la RPA tambi\u00e9n aporta una atractiva superficie de ataque, para la que la proliferaci\u00f3n de accesos con privilegios es uno de los principales problemas.<\/p>\n<p>Este informe de investigaci\u00f3n de &#8216;La visi\u00f3n de los CISO&#8217; analiza cuestiones como las siguientes: \u00bfQu\u00e9 t\u00e9cnicas pueden usar los atacantes para aprovechar los accesos con privilegios a los sistemas de RPA? \u00bfCu\u00e1les son los riesgos m\u00e1s significativos? \u00bfQu\u00e9 medidas de control son las m\u00e1s \u00fatiles y viables? \u00bfCu\u00e1les son los factores clave para obtener buenos resultados al trabajar con empresas?[\/vc_column_text][vc_btn title=\u00bbLeer informe\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fresources%2Fwhite-papers%2Fla-visi%25C3%25B3n-de-los-cisos-la-protecci%25C3%25B3n-de-los-accesos-privilegiados-en-automatizaci%25C3%25B3n-de-procesos-rob%25C3%25B3ticos|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_n1cxswixdq videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_rl2yohwgz5 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-right\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>Protecci\u00f3n del acceso con privilegios<\/h4>\n<h6 class=\"vc_custom_heading\">Protecci\u00f3n de entornos de nube y DevOps<\/h6>\n<p>Las ventajas del desarrollo r\u00e1pido de software y las operaciones inform\u00e1ticas automatizadas son evidentes: mejoras en el tiempo de comercializaci\u00f3n y reducci\u00f3n de costes. Pero, \u00bfy los riesgos? \u00bfC\u00f3mo se puede garantizar la protecci\u00f3n de los entornos de operaciones de desarrollo y en la nube?<\/p>\n<p>Este informe de investigaci\u00f3n de  &#8216;La visi\u00f3n de los CISO&#8217; se basa en la experiencia de directores de seguridad de la informaci\u00f3n de empresas de la lista Global 1000, profesionales de la seguridad y expertos t\u00e9cnicos que se han encargado de adaptar y proteger entornos de operaciones de desarrollo.[\/vc_column_text][vc_btn title=\u00bbLeer informe\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecci%25C3%25B3n-del-acceso-privilegiado-en-entornos-devops-y-en-la-nube|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw cyb-reverse\u00bb][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-left\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>R\u00e1pida reducci\u00f3n de riesgos<\/h4>\n<h6 class=\"vc_custom_heading\">Un esprint de 30 d\u00edas para proteger las credenciales con privilegios<\/h6>\n<p>\u00bfC\u00f3mo se pueden evitar las violac\u00edones de datos? B\u00e1sicamente es necesario conocer las t\u00e9cnicas de los atacantes y los controles de seguridad que pueden frenarlos. Este informe de investigaci\u00f3n de  &#8216;La visi\u00f3n de los CISO&#8217;  ofrece una visi\u00f3n interna de las lecciones que se han aprendido de algunas de las filtraciones de datos m\u00e1s sonadas, recomendaciones y un marco para hacer un esprint de 30 d\u00edas que sirve de gu\u00eda para implementar los controles clave.[\/vc_column_text][vc_btn title=\u00bbLeer informe\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fresources%2Fwhite-papers%2Fr%25C3%25A1pida-reducci%25C3%25B3n-de-riesgos-un-sprint-de-30-d%25C3%25ADas-para-proteger-las-credenciales-privilegiadas|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131862\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" alt=\"Rapid Risk Reduction\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 seesaw\u00bb][vc_column width=\u00bb5\/12&#8243; el_class=\u00bbabove\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131870\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg\" alt=\"The Balancing Act\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=\u00bb7\/12&#8243; el_class=\u00bbbelow-right\u00bb][vc_column_text el_class=\u00bbdark\u00bb]<\/p>\n<h4>El n\u00famero de equilibrismo<\/h4>\n<h6 class=\"vc_custom_heading\">El informe de  &#8216;La visi\u00f3n de los CISO&#8217;  para mejorar los controles del acceso con privilegios.<\/h6>\n<p>Este informe ofrece directrices pr\u00e1cticas para que los directores de seguridad de la informaci\u00f3n mejoren los controles del acceso con privilegios bas\u00e1ndose en los conocimientos de primera mano de grandes organizaciones. Incluye recomendaciones para alcanzar un equilibrio entre permitir y limitar altos niveles de acceso a los activos de informaci\u00f3n.[\/vc_column_text][vc_btn title=\u00bbLeer informe\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-balancing-act-the-ciso-view-on-improving-privileged-access-controls|\u00bb el_class=\u00bbcybv2-button-solid\u00bb][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 plp-overview-more-col\u00bb][vc_column width=\u00bb5\/6&#8243; el_class=\u00bbtext-md-center heading\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6\">El enfoque de las investigaciones de \u2018la visi\u00f3n de los CISO\u2019 y los expertos<\/h3>\n<p class=\"vc_custom_heading\">En la actualidad, las organizaciones se enfrentan a ciberamenazas cada vez m\u00e1s sofisticadas y complejas. En CyberArk creemos que el intercambio de conocimientos y consejos entre toda la comunidad de directores de seguridad de la informaci\u00f3n contribuir\u00e1 a reforzar las estrategias de seguridad y a mejorar la protecci\u00f3n de las organizaciones.<\/p>\n<p class=\"vc_custom_heading\">CyberArk ha encargado a la empresa de investigaci\u00f3n independiente Robinson Insight el desarrollo de &#8216;La visi\u00f3n de los CISO&#8217;, una serie de informes en los que se analizan temas relacionados con la mejora de los controles del acceso con privilegios. Esta iniciativa re\u00fane a directores de seguridad de la informaci\u00f3n de grandes empresas de todo el mundo para que compartan sus conocimientos sobre los problemas m\u00e1s importantes a los que se enfrentan los responsables de la seguridad con el objetivo de promover el asesoramiento y entablar un di\u00e1logo de gran valor entre iguales. Entre los colaboradores de los informes actuales y pasados y los miembros del grupo de investigaci\u00f3n de &#8216;La visi\u00f3n de los CISO&#8217; se encuentran las siguientes personas.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131879\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg\" alt=\"Alissa Adbullah\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Alissa (Dr. Jay) Abdullah<\/h4>\n<p>Vicepresidente s\u00e9nior y directora adjunta de Seguridad de Mastercard[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131887\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg\" alt=\"Brad Arkin\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Brad Arkin<\/h4>\n<p>Vicepresidente s\u00e9nior, director de Seguridad y Confianza de Cisco[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131895\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg\" alt=\"Tim Bengson\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Tim Bengson<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Chief Information Security Officer, Kellogg Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131903\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg\" alt=\"Dawn Cappelli\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dawn Cappelli<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Security and Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131911\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg\" alt=\"Melissa Carvalho\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Melissa Carvalho<\/h4>\n<p>Vicepresidente, Gesti\u00f3n de Acceso e Identidades de Clientes y Empresas<br \/>\nde Royal Bank of Canada (RBC)[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131919\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg\" alt=\"Dave Estlick\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dave Estlick<\/h4>\n<p>Chief Information Security Officer, Chipotle[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131927\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg\" alt=\"Peter Fizelle\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Peter Fizelle<\/h4>\n<p>Director de Seguridad de la Iinformaci\u00f3n de Asian Development Bank[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131935\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg\" alt=\"Mike Gordon\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Gordon<\/h4>\n<p class=\"vc_custom_heading\">VP and Chief Information Security Officer, Lockheed Martin Corporation (LMC)<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131943\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg\" alt=\"Omar Khawaja\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Omar Khawaja<\/h4>\n<p>Vicepresidente y director de Seguridad de la Informaci\u00f3n de Highmark Health[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131951\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg\" alt=\"Olivier Perrault\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Olivier Perrault<\/h4>\n<p>Director de Ciberseguridad de Orange Business Services[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131959\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg\" alt=\"Emma Smith\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Emma Smith<\/h4>\n<p>Directora de Seguridad Global de Vodafone[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/4&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131967\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg\" alt=\"Daniel Tse\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Daniel Tse<\/h4>\n<p>Director de Riesgos de Tecnolog\u00eda, Informaci\u00f3n y Ciberseguridad (CSITR) de GIC Private Limited[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=\u00bbyes\u00bb el_class=\u00bbcybv2 plp-overview-more-col\u00bb][vc_column width=\u00bb5\/6&#8243; el_class=\u00bbtext-md-center heading\u00bb offset=\u00bbvc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3>Algunas de las personas que colaboraron en los informes anteriores son<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Rob Bening<\/h4>\n<p class=\"vc_custom_heading\">Director em\u00e9rito de Seguridad de la Informaci\u00f3n de ING Bank<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">David Bruyea<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &#038; Chief Information Security Officer, CIBC<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Connelly<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Lockheed Martin<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Khadir Fayaz<\/h4>\n<p class=\"vc_custom_heading\">Vicepresidente de Arquitectura, Ingenier\u00eda y Estrategia de Seguridad Global de Pearson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Gelinne<\/h4>\n<p class=\"vc_custom_heading\">Director general de Servicios de Riesgos Inform\u00e1ticos de Asesor\u00eda de Deloitte &#038; Touche<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">JD Rogers<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, American Financial Group<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Charles Gillman<\/h4>\n<p class=\"vc_custom_heading\">Director de Seguridad de NTT Communications &#8211; Cloud Infrastructure Services<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Steve Glynn<\/h4>\n<p class=\"vc_custom_heading\">Director global de Seguridad de la Informaci\u00f3n de ANZ<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mark Grant<\/h4>\n<p class=\"vc_custom_heading\">PhD, CIPP Chief Information Security Officer, CSX Corporation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Gary Harbison<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, Monsanto Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Motes<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Kathy Orner<\/h4>\n<p class=\"vc_custom_heading\">Directora de Riesgos de CWT<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Wilson<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, McKesson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">JD Rogers<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, American Financial Group<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Schramm<\/h4>\n<p class=\"vc_custom_heading\">CISA, CISSP, CIRO y vicepresidente global de Gesti\u00f3n del Riesgo de la Informaci\u00f3n de Manulife<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Chun Meng Tee<\/h4>\n<p class=\"vc_custom_heading\">Vicepresidente y director de Seguridad de la Informaci\u00f3n de Singapore Exchange<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Thomas Tschersich<\/h4>\n<p class=\"vc_custom_heading\">Vicepresidente s\u00e9nior de Seguridad Interna y Ciberdefensa de T-Systems International<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00bb1\/6&#8243; el_class=\u00bbcta-box\u00bb][vc_column_text el_class=\u00bblink-arrow-right\u00bb]<\/p>\n<h4 class=\"vc_custom_heading medium\">Munawar Valiji<\/h4>\n<p class=\"vc_custom_heading\">Director de Seguridad de la Informaci\u00f3n de News UK<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00bbcybv2 cybv2-pad-btm text-center\u00bb][vc_column][vc_column_text]*Cargo en el momento de la colaboraci\u00f3n.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 cybv2_talk_to_an_expert\u00bb css=\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00bb][vc_column][vc_column_text el_class=\u00bbextra-space\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Comenzar<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=\u00bbnew_hpstyle_section9_text\u00bb]<\/p>\n<p style=\"text-align: center;\">Aproveche la experiencia de los CISO m\u00e1s innovadores del sector para ayudarle a crear hoy mismo un programa de ciberseguridad eficaz.<\/p>\n<p>[\/vc_column_text][vc_btn title=\u00bbDescargar ahora\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb shape=\u00bbsquare\u00bb align=\u00bbcenter\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model%2F|\u00bb el_class=\u00bbcybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text] La visi\u00f3n de los CISO Los directores de seguridad de la informaci\u00f3n m\u00e1s importantes del sector ofrecen asesoramiento independiente a sus hom\u00f3logos. [\/vc_column_text][vc_btn title=\u00bbDescargar ahora\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-52968","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Informes para CISO: gesti\u00f3n del acceso con privilegios para los CISO<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/es\/cisoview\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La visi\u00f3n de los CISO\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text] La visi\u00f3n de los CISO Los directores de seguridad de la informaci\u00f3n m\u00e1s importantes del sector ofrecen asesoramiento independiente a sus hom\u00f3logos. [\/vc_column_text][vc_btn title=\u00bbDescargar ahora\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/es\/cisoview\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-19T08:03:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/es\/cisoview\/\",\"url\":\"https:\/\/www.cyberark.com\/es\/cisoview\/\",\"name\":\"Informes para CISO: gesti\u00f3n del acceso con privilegios para los CISO\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/cisoview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/cisoview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"datePublished\":\"2017-07-09T22:54:18+00:00\",\"dateModified\":\"2024-03-19T08:03:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/cisoview\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/es\/cisoview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/cisoview\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/es\/cisoview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La visi\u00f3n de los CISO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#website\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Informes para CISO: gesti\u00f3n del acceso con privilegios para los CISO","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/es\/cisoview\/","og_locale":"es_ES","og_type":"article","og_title":"La visi\u00f3n de los CISO","og_description":"[vc_row full_width=\u00bbstretch_row\u00bb el_class=\u00bbcybv2 int-hero-noimg dark\u00bb][vc_column width=\u00bb3\/4&#8243; el_class=\u00bbcolumn-1&#8243;][vc_column_text] La visi\u00f3n de los CISO Los directores de seguridad de la informaci\u00f3n m\u00e1s importantes del sector ofrecen asesoramiento independiente a sus hom\u00f3logos. [\/vc_column_text][vc_btn title=\u00bbDescargar ahora\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb\u00bb...","og_url":"https:\/\/www.cyberark.com\/es\/cisoview\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-03-19T08:03:41+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"13 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/es\/cisoview\/","url":"https:\/\/www.cyberark.com\/es\/cisoview\/","name":"Informes para CISO: gesti\u00f3n del acceso con privilegios para los CISO","isPartOf":{"@id":"https:\/\/www.cyberark.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/es\/cisoview\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/cisoview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","datePublished":"2017-07-09T22:54:18+00:00","dateModified":"2024-03-19T08:03:41+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/es\/cisoview\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/es\/cisoview\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/cisoview\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/es\/cisoview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/es\/"},{"@type":"ListItem","position":2,"name":"La visi\u00f3n de los CISO"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/es\/#website","url":"https:\/\/www.cyberark.com\/es\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/es\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/52968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=52968"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/52968\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=52968"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=52968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}