{"id":17162,"date":"2025-03-05T10:00:00","date_gmt":"2025-03-05T09:00:00","guid":{"rendered":"https:\/\/itpatagonia.com\/?p=17162"},"modified":"2026-04-20T14:55:55","modified_gmt":"2026-04-20T12:55:55","slug":"que-es-la-ciberseguridad-y-su-importancia-para-el-negocio","status":"publish","type":"post","link":"https:\/\/itpatagonia.com\/en\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio","title":{"rendered":"Cybersecurity is not the exclusive responsibility of specialists but an essential part of the business"},"content":{"rendered":"<p>In an increasingly digitalized world, cybersecurity has gone from being a technical concern to becoming a strategic priority.<\/p>\n\n\n\n<p>With the sustained increase in cyber threats and the growing sophistication of attacks, <strong>Companies are investing more resources in protecting their data, infrastructure and operations<\/strong>.<\/p>\n\n\n\n<p>What is interesting is that companies&#039; interest in deploying cybersecurity strategies also focuses on their commercial objectives and levels of competitiveness.<\/p>\n\n\n\n<p>Proof of this is that the<a href=\"https:\/\/www.ey.com\/es_co\/insights\/cybersecurity\/panorama-ciberseguridad-latinoamerica-riesgos-enfrentan-empresas#:~:text=52%20%25%20de%20las%20compa%C3%B1%C3%ADas%20latinoamericanas,y%2049%20millones%20de%20d%C3%B3lares\" target=\"_blank\" rel=\"noreferrer noopener\"> 50% of Latin American companies report a total investment in cybersecurity of between 10 and 49 million dollars<\/a>.\u00a0<\/p>\n\n\n\n<p>In Argentina, the <a href=\"https:\/\/www.cac.com.ar\/noticias\/el-63-de-las-empresas-argentinas-implementan-herramientas-de-ciberseguridad\" target=\"_blank\" rel=\"noreferrer noopener\">63% of companies implement cybersecurity tools<\/a>.\u00a0\u00a0<\/p>\n\n\n\n<p>While according to data shared by consultant Victor Ruiz in <a href=\"https:\/\/www.infobae.com\/mexico\/2024\/12\/21\/tras-un-ciberataque-el-80-de-usuarios-dejaria-de-adquirir-productos-o-servicios-de-la-marca-a-la-que-dio-sus-datos\/\" target=\"_blank\" rel=\"noreferrer noopener\">Infobae<\/a>, <strong>80.1% of people would stop purchasing products or services from a brand after a security incident<\/strong>.\u00a0<\/p>\n\n\n\n<p>To understand this context in greater depth, we share an exclusive conversation with <a href=\"https:\/\/www.linkedin.com\/in\/salvadorvial\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salvador Vial<\/a>, Principal Executive Security Advisor and Field CISO of <a href=\"https:\/\/aws.amazon.com\/es\/\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon Web Services (AWS)<\/a>.<\/p>\n\n\n\n<p>Together with him, we analyzed in detail the <strong>Challenges that organizations face in terms of cybersecurity<\/strong>, what are the most common cyberattacks and recommendations to improve resilience to this type of attack.&nbsp;<\/p>\n\n\n\n<p>We also focused on the role that artificial intelligence plays in cybersecurity strategies, and the problem linked to the lack of professionals that the sector is experiencing.<\/p>\n\n\n\n<p>We also discuss the concept of security by design, and share some insights into the interesting career of our interviewee.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A professional journey of multiple experiences with technology&nbsp;<\/strong><\/h2>\n\n\n\n<p>Salvador&#039;s career began and continued over the years as a path of discovery. A multifaceted journey, which would lead to his consolidation as one of the <strong>Latin America&#039;s leading cybersecurity specialists<\/strong>.<\/p>\n\n\n\n<p>In his early youth he chose to study electricity and electronics. At that time - 23 years ago - university courses linked to the field of technology were exclusively computer engineering courses oriented towards programming.&nbsp;<\/p>\n\n\n\n<p>An area of expertise that was not of interest to him. He did not see himself programming all day.<\/p>\n\n\n\n<p>This acquisition of theoretical knowledge and practical skills related to the design of electronic circuits - such as soldering boards - and working with motors and capacitor banks, together with power factor correction, was very useful to him years later, in the <a href=\"https:\/\/itpatagonia.com\/en\/data-centers-en-la-infraestructura-it\/\">data center management<\/a>.<\/p>\n\n\n\n<p>Salvador&#039;s exploration also included CAD design programs for making electrical drawings, automation and control projects, and PLC systems.&nbsp;<\/p>\n\n\n\n<p>All this background gave him a different perspective on how to manage emerging technologies.<\/p>\n\n\n\n<p>The next step was to study network and telecommunications administration. But after completing that degree, he began working in a software quality assurance position. A position that was not related to networks.&nbsp;<\/p>\n\n\n\n<p>\u201cHaving a broader knowledge can be a differentiator, but you have to be lucky enough to be able to exploit it,\u201d he says.&nbsp;<\/p>\n\n\n\n<p>In fact, he did not have the opportunity to apply his electrical knowledge until 15 years after having acquired it, when he began working for an electrical distribution company.<\/p>\n\n\n\n<p>\u201cObviously everything is useful, it gives you another perspective. But you won&#039;t necessarily have to do a degree or study something and apply it directly,\u201d he points out.<\/p>\n\n\n\n<p>Today, Salvador, who defines himself as a restless person who likes to do different things, is happy with his career and his present. Especially with the possibility of getting involved in various projects, which are being developed in different countries.<\/p>\n\n\n\n<p>In the future, he is interested in delving deeper into international business based on the versatility that comes from interacting with actors from all over Latin America.&nbsp;<\/p>\n\n\n\n<p>Now that we have met our protagonist, let&#039;s move on to the analysis of his area of expertise in which he stands out today at Amazon Web Services (AWS).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--1024x389.png\" alt=\"Las estad\u00edsticas no mienten: tarde o temprano, es muy probable que una organizaci\u00f3n sufra un ataque a su seguridad.\" class=\"wp-image-17164\" srcset=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--1024x389.png 1024w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--300x114.png 300w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--768x291.png 768w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--1536x583.png 1536w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--2048x777.png 2048w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--18x7.png 18w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen1--720x273.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Statistics don&#039;t lie: sooner or later, an organization is very likely to suffer a security attack.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is a cyber attack?<\/strong><\/h2>\n\n\n\n<p>A cyber attack can be carried out in many ways, using a variety of tactics or techniques. These include blocking access routes to a system to prevent users from operating it.&nbsp;<\/p>\n\n\n\n<p>The purpose of denying access may be to obtain secret, classified or commercial information, or even to extort an organisation so that it can regain access to its data by paying a ransom.<\/p>\n\n\n\n<p>The range of cyber attacks is wide and <strong>As technology evolves rapidly, so do digital criminal gangs.<\/strong>.&nbsp;<\/p>\n\n\n\n<p>\u201cMuch faster than private companies, and obviously faster than governments,\u201d says Salvador. In this regard, he points out that cybercriminals do not carry out bidding processes to buy tools.&nbsp;<\/p>\n\n\n\n<p>\u201cThey don\u2019t spend six months buying a tool to help them defend themselves. They just pay a few dollars or cryptocurrency, get tools, and attack you.&nbsp;<\/p>\n\n\n\n<p>It is much faster, much more agile the process they use. Whereas, <strong>On the side of those who defend, there are many administrative barriers that complicate<\/strong>&quot;, he warns.&nbsp;&nbsp;<\/p>\n\n\n\n<p>At the end of the day, what matters comes down to three factors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The <strong>adaptability <\/strong>that organizations have through their processes.<\/li>\n\n\n\n<li>The <a href=\"https:\/\/itpatagonia.com\/en\/ciberseguridad-y-proteccion-de-datos\/\">current legislation<\/a>, which can <a href=\"https:\/\/itpatagonia.com\/en\/ciberseguridad-y-proteccion-de-datos\/\">facilitate or obstruct cybersecurity work<\/a>.\u00a0<\/li>\n\n\n\n<li>The <strong>organizational culture<\/strong> developed in relation to cyber attacks, which consists of general knowledge and leadership exercised to improve cybersecurity standards.<\/li>\n<\/ul>\n\n\n\n<p>This set of factors shows the speed and pace of how a company is defending its technology assets and digital business processes.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What are the most common cyber attacks?&nbsp;<\/strong><\/h2>\n\n\n\n<p>There are three major cyber threats or cyber attacks, which are the most common and frequent:&nbsp;<\/p>\n\n\n\n<p>1) <strong>Phishing<\/strong>: It affects both corporations and users. It eventually leads to theft of information and subsequently to extortion.&nbsp;<\/p>\n\n\n\n<p>2) <strong>Ransomware<\/strong>: carries out a destructive process targeting an organization&#039;s data. It can lead to extortion and ransom demands.&nbsp;&nbsp;<\/p>\n\n\n\n<p>3) <strong>Denial of services<\/strong>: Block portals or applications so that they cannot be accessed.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the purpose of cyber attacks?<\/strong><\/h2>\n\n\n\n<p>In the case of cyberattacks that result in extortion, the objective is the promise to stop the attack if the criminals meet a demand, which may consist of the payment of a ransom.&nbsp;<\/p>\n\n\n\n<p>Another motivation may be to undermine a company&#039;s ability to generate loss of trust and undermine its image.&nbsp;<\/p>\n\n\n\n<p>For example, if a bank is suffering a cyber attack, those who use its platforms and applications will be unable to make money transfers and transactions. It could even impact the institution&#039;s credit cards or other systems.<\/p>\n\n\n\n<p>It can also happen with a government or other type of company.<\/p>\n\n\n\n<p>The key is to understand that the question is not whether an organization will suffer a cyber attack, <strong>but when and how you will experience it<\/strong>. And even more importantly, how prepared it is to withstand it and respond to its consequences.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-1024x389.png\" alt=\"Los ciberataques m\u00e1s comunes. Infograf\u00eda. IT Patagonia.\" class=\"wp-image-17166\" srcset=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-1024x389.png 1024w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-300x114.png 300w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-768x291.png 768w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-1536x583.png 1536w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-2048x777.png 2048w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-18x7.png 18w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD-720x273.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">The most common cyber attacks. <\/figcaption><\/figure>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the volume of cyberattacks?<\/strong><\/h2>\n\n\n\n<p>In recent years, Latin America has been gaining relevance in the cyber threat landscape.&nbsp;<\/p>\n\n\n\n<p>In 2023 it was positioned as the <a href=\"https:\/\/forbes.co\/2024\/02\/28\/tecnologia\/colombia-es-el-pais-con-mas-ataques-de-ciberseguridad-en-latinoamerica\/\" target=\"_blank\" rel=\"noreferrer noopener\">fourth most attacked region worldwide<\/a>, with Brazil leading at the regional level with 68% of cyberattacks, followed by Colombia (17%) and Chile (8%).\u00a0<\/p>\n\n\n\n<p>The information comes from the report <a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">IBM X-Force Threat Intelligence Index 2024<\/a>, where it is reported that the cyber attacks with the greatest impact were the <strong>Data theft and data leakage, with 32% of incidents<\/strong>.<\/p>\n\n\n\n<p>In fact, according to the report <a href=\"https:\/\/www.ey.com\/es_co\/insights\/cybersecurity\/panorama-ciberseguridad-latinoamerica-riesgos-enfrentan-empresas#:~:text=52%20%25%20de%20las%20compa%C3%B1%C3%ADas%20latinoamericanas,y%2049%20millones%20de%20d%C3%B3lares\" target=\"_blank\" rel=\"noreferrer noopener\">EY Global Cybersecurity Leadership Insights Study<\/a>, <strong>62% of Latin American companies suffered some type of data breach<\/strong> over the past year.<\/p>\n\n\n\n<p>Definitely, <strong>The level of cyber attacks that occur daily around the world is very high<\/strong>But the intensity varies according to the sectors.<\/p>\n\n\n\n<p>In the case of financial institutions, which are the most commonly attacked organizations because they are big brands and process a lot of money, <strong>They can suffer 300 thousand attacks a month. All day, 24 hours a day.<\/strong>.&nbsp;<\/p>\n\n\n\n<p>\u201cCriminals create automated robots that attack without resting, without blinking, and without eating,\u201d says Salvador.<\/p>\n\n\n\n<p>To combat these threats, it is necessary<strong>They need technical tools, trained professionals and the money needed to acquire cybersecurity solutions.<\/strong>.<\/p>\n\n\n\n<p>If we were to view the security strategy as a pyramid, all of these items would be at the base.&nbsp;<\/p>\n\n\n\n<p>However, although it may be unnatural, what should be built first is not the base of the pyramid, but its head, based on two fundamental factors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How the <strong>company culture<\/strong> permeates cybersecurity concepts and puts them into practice.\u00a0<\/li>\n\n\n\n<li>What is the <strong>leadership<\/strong> which is exercised from the top management of an organization, to put into practice the activities that need to be carried out.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>In short, <strong>the key is the people<\/strong> And while corporate leadership is moving forward in raising awareness of the critical role it must play in the face of cyber threats, the pace is still not optimal.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-1024x389.png\" alt=\"Las entidades financieras son las organizaciones m\u00e1s com\u00fanmente atacadas. Pueden sufrir 300 mil ataques al mes.\" class=\"wp-image-17163\" srcset=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-1024x389.png 1024w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-300x114.png 300w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-768x291.png 768w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-1536x583.png 1536w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-2048x777.png 2048w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-18x7.png 18w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen3-copia-6-720x273.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Financial institutions are the most commonly attacked organizations. They can suffer 300 thousand attacks per month.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>At this point it is also worth mentioning the importance of considering in cybersecurity strategies the <a href=\"https:\/\/itpatagonia.com\/en\/ciberseguridad-y-proteccion-de-datos\/\">Legal aspects related to cybersecurity and data protection<\/a>.&nbsp;<\/p>\n\n\n\n<p>Just like the <a href=\"https:\/\/itpatagonia.com\/en\/data-governance\/\">data governance<\/a>, as the set of processes, policies, standards and metrics, which focus on <a href=\"https:\/\/itpatagonia.com\/en\/gobernanza-de-datos-desafios\/\">ensure the quality, availability, integrity and security of data<\/a> in an organization.&nbsp;<\/p>\n\n\n\n<p>Even more so considering, as expressed in the whitepaper, <a href=\"https:\/\/www.weforum.org\/publications\/cybersecurity-futures-2030-new-foundations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Futures 2030: New Foundations<\/a>, that cyber security will go from being about <strong>the protection of confidentiality and availability of the information to be protected<\/strong>, its integrity and origin.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Who is leading the way in terms of cybersecurity?&nbsp;<\/strong><\/h2>\n\n\n\n<p>Large corporations and business conglomerates are the organizations that today have the most developed defense capabilities against cyber attacks.&nbsp;<\/p>\n\n\n\n<p>In particular, <strong>The financial industry, retail and mining companies stand out.<\/strong>.<\/p>\n\n\n\n<p>There are other types of industries that have been left behind, such as airlines and hotels.<\/p>\n\n\n\n<p>While relevant sectors such as health and education also need to significantly improve their protection.<\/p>\n\n\n\n<p>As for people, there are two very important drivers that are not being well developed today:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Resources and recommendations on the proper use of technology should be offered in the educational field.\u00a0\u00a0<\/li>\n\n\n\n<li>Governments could launch campaigns to raise awareness about how to operate safely in the digital world. For example, in relation to digital procedures.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security by design: How to make cybersecurity-friendly user experiences compatible?<\/strong><\/h2>\n\n\n\n<p>In some organizations, there are leaders who believe that user experience and security are opposites. But it is quite the opposite. With Juan, we discovered that they do not need to be on opposite sides.&nbsp;<\/p>\n\n\n\n<p>\u201cThe practice that should be used today in any institution that creates technology is the practice that in cybersecurity is known as security by design,\u201d he says.&nbsp;<\/p>\n\n\n\n<p>Because, if an organizational culture includes security by design in all its processes, <strong>Cybersecurity factors will be included in the user experience roadmap<\/strong>.<\/p>\n\n\n\n<p>However, there is a discussion among leaders about how to implement security by design, because in practice, different teams perform both functions.<\/p>\n\n\n\n<p>So there are many issues of coordination, leadership and communication to be resolved. But the methodology exists and <strong>the key to how to put it into practice<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"389\" src=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--1024x389.png\" alt=\"La tecnolog\u00eda evoluciona r\u00e1pido, pero los hackers tambi\u00e9n avanzan con mucha velocidad.\" class=\"wp-image-17165\" srcset=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--1024x389.png 1024w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--300x114.png 300w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--768x291.png 768w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--1536x583.png 1536w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--2048x777.png 2048w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--18x7.png 18w, https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/02\/CIBERSEGURIDAD_imagen4--720x273.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Technology is evolving fast, but hackers are also advancing very quickly.<\/figcaption><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Recommendations to improve resilience to attacks<\/strong><\/h2>\n\n\n\n<p>Cybersecurity strategies must be led by the corporate management of organizations.&nbsp;<\/p>\n\n\n\n<p>You can have a great team of cybersecurity specialists, but, <strong>If the drive does not come from the top and if there is no solid plan, the company will not be able to meet its objectives.<\/strong>.<\/p>\n\n\n\n<p>\u201cOften, specialists and middle managers have very good technical ideas about cybersecurity, about how to implement controls in different systems and processes, but they do not have the strength to be able to execute them,\u201d says Salvador.<\/p>\n\n\n\n<p>Even if you have very good ideas, they will not be enough if you cannot obtain the appropriate budgets and ensure that all the teams in the organization are involved in the project.&nbsp;<\/p>\n\n\n\n<p>In this context, <strong>It is important to have cybersecurity specialists who have the ability to implement the plan promoted by the management<\/strong>.&nbsp;<\/p>\n\n\n\n<p>Always remembering that cybersecurity is not just a matter for the technical team. It obviously has to do with the technology area of an organization, but also with its business units.&nbsp;<\/p>\n\n\n\n<p>Without this layer of articulation, technical teams would be disconnected from the reality of the company.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What role does AI play in cybersecurity strategies?&nbsp;<\/strong><\/h2>\n\n\n\n<p>The <a href=\"https:\/\/itpatagonia.com\/en\/es_es\/como-liberar-el-potencial-de-la-inteligencia-artificial\/\">artificial intelligence<\/a> can help speed up the <a href=\"https:\/\/itpatagonia.com\/en\/es_es\/aiops-que-es-y-por-que-utilizarla-en-tecnologia\/\">process automation<\/a>For example, situations that previously had to be controlled by a person can now be validated automatically by robots.<\/p>\n\n\n\n<p>An AI robot can be asked to review documentation or a specific process, among other tasks. It can even provide a report in real time, a task that would take a person several hours of work.<\/p>\n\n\n\n<p>AI can help automate those types of tasks and <strong>collaborate to alleviate the lack of professionals that exists in the field of cybersecurity<\/strong>.<\/p>\n\n\n\n<p>These automations will give teams more time to focus on tasks where they can add greater value, instead of reviewing routine processes.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Is there a shortage of cybersecurity professionals?<\/strong><\/h2>\n\n\n\n<p>There is a shortage of tens of thousands of cybersecurity specialists worldwide. This is a very large scale of unmet labour demand, and there is no way to fill the gap quickly.&nbsp;<\/p>\n\n\n\n<p>&quot;If we stick to the traditional way, for example, of training people in universities, it will probably take us 15 years to close the gap, and when we reach those 15 years we will have another gap, perhaps larger,&quot; warns Salvador.<\/p>\n\n\n\n<p>One of the ways to alleviate this shortage of professionals is to focus on the methodological aspect.&nbsp;<\/p>\n\n\n\n<p><strong>In processes, in security by design and in organizational culture<\/strong>.&nbsp;<\/p>\n\n\n\n<p>In contributing to ensuring that security issues are not perceived as matters exclusive to specialists but rather as an essential part of the business.<\/p>\n\n\n\n<p>With the aim of reducing the technological talent gap, <a href=\"https:\/\/itpatagonia.com\/en\/servicios\/digitaltalent\/\">from IT Patagonia, together with our academic partner Codeki<\/a>, one of the most relevant educational technology companies in the market, <a href=\"https:\/\/itpatagonia.com\/en\/ser-una-buena-empresa-para-trabajar\/\">We promote the development of multigenerational talent<\/a> to meet the needs of the industry.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion&nbsp;<\/strong><\/h2>\n\n\n\n<p>The security approach must be shared by the entire organization.&nbsp;<\/p>\n\n\n\n<p><strong>Teams must have the same direction, the same goals, and even be measured by the same yardstick.<\/strong>Something that does not happen in many organizations, where cybersecurity KPIs are aimed only at the team of specialists, when they should involve business managers, so that they are the ones who drive the security methodology.<\/p>\n\n\n\n<p>In this sense, we agree with Salvador in the <a href=\"https:\/\/itpatagonia.com\/en\/es_es\/desafios-de-formar-talento-it\/\">Importance of continuous training and education<\/a> to be prepared for cyber attacks, which, far from stopping, will continue to increase.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>In this article we meet Salvador Vial, a cybersecurity expert at AWS, and we talk to him about the challenges that organizations face in terms of cybersecurity, recommendations to improve resilience to this type of attack, the role of AI, the perspective of security by design, and how to solve the lack of professionals in the sector.<\/p>","protected":false},"author":3,"featured_media":17448,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[125,173],"tags":[124],"class_list":["post-17162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-inspirational-voices","category-modernizacion-core","tag-inspirational-voices"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad: claves para que sea esencial en los negocios<\/title>\n<meta name=\"description\" content=\"Analizamos los desaf\u00edos que impone la ciberseguridad, el rol de la IA, la seguridad por dise\u00f1o y c\u00f3mo resolver la falta de profesionales.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itpatagonia.com\/en\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad: claves para que sea esencial en los negocios\" \/>\n<meta property=\"og:description\" content=\"Analizamos los desaf\u00edos que impone la ciberseguridad, el rol de la IA, la seguridad por dise\u00f1o y c\u00f3mo resolver la falta de profesionales.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itpatagonia.com\/en\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Patagonia\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T12:55:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/03\/Portada-ciberseguridad_imagen2-copia-3-1024x389.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Valeria Frick\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Valeria Frick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\"},\"author\":{\"name\":\"Valeria Frick\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/person\\\/ac8661c9cfc3e2a5a865f0fe97c9e1bb\"},\"headline\":\"La ciberseguridad no es una responsabilidad exclusiva de especialistas sino parte esencial del negocio\",\"datePublished\":\"2025-03-05T09:00:00+00:00\",\"dateModified\":\"2026-04-20T12:55:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\"},\"wordCount\":2813,\"publisher\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Portada-ciberseguridad_imagen2-copia-3.png\",\"keywords\":[\"Inspirational voices\"],\"articleSection\":[\"Inspirational voices\",\"Modernizaci\u00f3n Core\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\",\"name\":\"Ciberseguridad: claves para que sea esencial en los negocios\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Portada-ciberseguridad_imagen2-copia-3.png\",\"datePublished\":\"2025-03-05T09:00:00+00:00\",\"dateModified\":\"2026-04-20T12:55:55+00:00\",\"description\":\"Analizamos los desaf\u00edos que impone la ciberseguridad, el rol de la IA, la seguridad por dise\u00f1o y c\u00f3mo resolver la falta de profesionales.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Portada-ciberseguridad_imagen2-copia-3.png\",\"contentUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Portada-ciberseguridad_imagen2-copia-3.png\",\"width\":3334,\"height\":1265,\"caption\":\"Ciberseguridad: la importancia para los negocios.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/blog\\\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/itpatagonia.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La ciberseguridad no es una responsabilidad exclusiva de especialistas sino parte esencial del negocio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#website\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/\",\"name\":\"IT Patagonia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/itpatagonia.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#organization\",\"name\":\"IT Patagonia\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/IT-Patagonia-logo-web.png\",\"contentUrl\":\"https:\\\/\\\/itpatagonia.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/IT-Patagonia-logo-web.png\",\"width\":350,\"height\":100,\"caption\":\"IT Patagonia\"},\"image\":{\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itpatagonia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/itpatagonia.com\\\/#\\\/schema\\\/person\\\/ac8661c9cfc3e2a5a865f0fe97c9e1bb\",\"name\":\"Valeria Frick\",\"url\":\"https:\\\/\\\/itpatagonia.com\\\/en\\\/blog\\\/author\\\/vfrick\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: Keys to Making It Essential in Business","description":"We analyze the challenges posed by cybersecurity, the role of AI, security by design, and how to address the shortage of professionals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itpatagonia.com\/en\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\/","og_locale":"en_US","og_type":"article","og_title":"Ciberseguridad: claves para que sea esencial en los negocios","og_description":"Analizamos los desaf\u00edos que impone la ciberseguridad, el rol de la IA, la seguridad por dise\u00f1o y c\u00f3mo resolver la falta de profesionales.","og_url":"https:\/\/itpatagonia.com\/en\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio\/","og_site_name":"IT Patagonia","article_published_time":"2025-03-05T09:00:00+00:00","article_modified_time":"2026-04-20T12:55:55+00:00","og_image":[{"width":1024,"height":389,"url":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/03\/Portada-ciberseguridad_imagen2-copia-3-1024x389.png","type":"image\/png"}],"author":"Valeria Frick","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Valeria Frick","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#article","isPartOf":{"@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio"},"author":{"name":"Valeria Frick","@id":"https:\/\/itpatagonia.com\/#\/schema\/person\/ac8661c9cfc3e2a5a865f0fe97c9e1bb"},"headline":"La ciberseguridad no es una responsabilidad exclusiva de especialistas sino parte esencial del negocio","datePublished":"2025-03-05T09:00:00+00:00","dateModified":"2026-04-20T12:55:55+00:00","mainEntityOfPage":{"@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio"},"wordCount":2813,"publisher":{"@id":"https:\/\/itpatagonia.com\/#organization"},"image":{"@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage"},"thumbnailUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/03\/Portada-ciberseguridad_imagen2-copia-3.png","keywords":["Inspirational voices"],"articleSection":["Inspirational voices","Modernizaci\u00f3n Core"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio","url":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio","name":"Cybersecurity: Keys to Making It Essential in Business","isPartOf":{"@id":"https:\/\/itpatagonia.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage"},"image":{"@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage"},"thumbnailUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/03\/Portada-ciberseguridad_imagen2-copia-3.png","datePublished":"2025-03-05T09:00:00+00:00","dateModified":"2026-04-20T12:55:55+00:00","description":"We analyze the challenges posed by cybersecurity, the role of AI, security by design, and how to address the shortage of professionals.","breadcrumb":{"@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#primaryimage","url":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/03\/Portada-ciberseguridad_imagen2-copia-3.png","contentUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2025\/03\/Portada-ciberseguridad_imagen2-copia-3.png","width":3334,"height":1265,"caption":"Ciberseguridad: la importancia para los negocios."},{"@type":"BreadcrumbList","@id":"https:\/\/itpatagonia.com\/blog\/que-es-la-ciberseguridad-y-su-importancia-para-el-negocio#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/itpatagonia.com\/"},{"@type":"ListItem","position":2,"name":"La ciberseguridad no es una responsabilidad exclusiva de especialistas sino parte esencial del negocio"}]},{"@type":"WebSite","@id":"https:\/\/itpatagonia.com\/#website","url":"https:\/\/itpatagonia.com\/","name":"IT Patagonia","description":"","publisher":{"@id":"https:\/\/itpatagonia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itpatagonia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itpatagonia.com\/#organization","name":"IT Patagonia","url":"https:\/\/itpatagonia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itpatagonia.com\/#\/schema\/logo\/image\/","url":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2023\/11\/IT-Patagonia-logo-web.png","contentUrl":"https:\/\/itpatagonia.com\/wp-content\/uploads\/2023\/11\/IT-Patagonia-logo-web.png","width":350,"height":100,"caption":"IT Patagonia"},"image":{"@id":"https:\/\/itpatagonia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itpatagonia\/"]},{"@type":"Person","@id":"https:\/\/itpatagonia.com\/#\/schema\/person\/ac8661c9cfc3e2a5a865f0fe97c9e1bb","name":"Valeria Frick","url":"https:\/\/itpatagonia.com\/en\/blog\/author\/vfrick"}]}},"_links":{"self":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts\/17162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/comments?post=17162"}],"version-history":[{"count":2,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts\/17162\/revisions"}],"predecessor-version":[{"id":30311,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/posts\/17162\/revisions\/30311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/media\/17448"}],"wp:attachment":[{"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/media?parent=17162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/categories?post=17162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itpatagonia.com\/en\/wp-json\/wp\/v2\/tags?post=17162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}