Cuáles son los peligros a los que se enfrenta su sistema informático

Every year, the challenge of protecting our IT assets from growing threats and cyber attacks is growing.

Once some malicious application is in our network and later can quickly move with traffic and produce a big impact in our the network.

These attacks can be devastating.

I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish):

Cloud Computing, IoT, BYOD. Our perimeter is gone, so what?

In times when Cloud Computing, Internet of Things, mobile devices (including environments BYOD) are an increasingly widespread reality (and unstoppable future), thereby opening backdoors to our corporate network (and their respective threats), which place touches the IT security officer to manage an increasingly large number of hits and risks? Where is our corporate perimeter?

Block accesses can talk or we have only to settle for being resilient to attacks due to a lack of control visibility and access control?

Many doubts are raised, the market has responded and there are technological and non-technological solutions that seek to remedy the growing risk are suffering the organizations with new access technologies and cloud storage finally have access to our network.

I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish):
http://www.slideshare.net/RamiroCid/cloud-computing-iot-byod-ha-muerto-el-permetro-corporativo-y-ahora-qu

Lean Six Sigma Methodology

Lean Six Sigma is a process improvement methodology that relies on a collaborative team effort to improve performance by systematically removing waste, combining Lean and Six Sigma to eliminate the eight kinds of waste

Lean Six Sigma projects comprise aspects of Lean’s waste elimination and the Six Sigma focus on reducing defects.

Lean Six Sigma utilizes the DMAIC (Define, Measure, Analyze, Improve and Control) phases similar to that of Six Sigma. Lean Six Sigma projects comprise aspects of Lean’s waste elimination and the Six Sigma focus on reducing defects, based on critical to quality (CTQ) characteristics.

Six Sigma use statistics tools for characterization and study of the processes, this is the reason of the name, as sigma is the standard deviation which gives an idea of the variability in a process and the goal of Six Sigma is to reduce it so that the process is always within the limits set by customer requirements.

Note: DPMO means Defects per million opportunities

1 sigma = 690,000 DPMO = 32% efficiency
2 sigma = 308,538 DPMO = 69% efficiency
3 sigma = 66,807 DPMO = 93.3% efficiency
4 sigma = 6.210 DPMO = 99.38% efficiency
5 sigma = 233 DPMO = 99.977% efficiency
6 sigma = 3.4 DPMO = 99.99966% efficiency
7 sigma = 0.019 DPMO = 99.9999981% efficiency

Lean is a systematic method for the elimination of waste (“Muda”) within a manufacturing system. Lean also takes into account waste created through overburden (“Muri”) and waste created through unevenness in work loads (“Mura”).

The eight muda are:

1.Transport (moving products that are not actually required to perform the processing
2.Inventory (all components, work in process, and finished product not being processed
3.Motion (people or equipment moving or walking more than is required to perform the processing
4.Waiting (waiting for the next production step, interruptions of production during shift change
5.Overproduction (production ahead of demand
6.Over Processing (resulting from poor tool or product design creating activity
7.Defects (the effort involved in inspecting for and fixing defects
8.Skills (waste of Skills, referred to as “under-utilizing capabilities and delegating tasks with inadequate training)

I created a presentation where I explain in details this topic, you can see my presentation here:

 

IT Governance & ISO 38500

IT Governance or Corporate governance of information technology is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management.

The interest in IT governance is due to the ongoing need within organizations to focus value creation efforts on an organization’s strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders.

I created a presentation where I explain in details this topic, you can see my presentation here:

 

Cyber Security Resilience & Risk Aggregation

Cyber Security Resilience & Risk Aggregation concepts have a near relationship because Risk aggregation refers to efforts done by firms to develop quantitative risk measures that incorporate multiple types or sources of risk.

Cyber Security Resilience is the capacity to have different Cyber controls which can provide the organization an adequate resilience according the organization risk appetite by doing risk management of the aggregation of multiple types or sources of risk.

One interesting topic is Internet of Things (IoT) which is increasing in our personal and professional life. The more assets are “shared” (including Critical Infrastructures and Smart Cities IT assets) the more risk we are assuming in our organization. All these risk is added using Risk Aggregation, so more effort we will need to do to improve our security to get an adequate Cyber Security Resilience level.

I created a presentation where I explain in details this topic, you can see my presentation here: