During October, the national government announced the passage of Bill 655, through which everything related to the protection of personal data is regulated.
[Read More]
Application of Threat Management
Recently, Banesco invited me as a speaker at their internal security event, SecuriCon. I think it is a good initiative, both for raising awareness among the bank’s internal staff and for sharing current topics with peers.
[Read More]
Threat Ecosystem (Connecting the Dots)
I think I got ahead of myself a bit with the previous article on threat modeling. When I revisited the topic, I realized that there are many other topics associated with the threat model, as well as many commercial concepts that we hear all the time.
[Read More]
Threat Management
The threat management process in the cybersecurity field is more an art than a science, despite the existence of multiple theoretical models that can be applied to determine whether or not a risk exists for organizations.
[Read More]
Report on Critical Infrastructure Protection in Latin America and the Caribbean 2018
Last year, I had the opportunity to contribute to this annual report produced by the Organization of American States (OAS), this year in cooperation with Microsoft.
[Read More]