{"id":59544,"date":"2021-02-09T16:53:36","date_gmt":"2021-02-09T15:53:36","guid":{"rendered":"https:\/\/blog.euncet.com\/?p=59544"},"modified":"2024-11-15T18:02:07","modified_gmt":"2024-11-15T17:02:07","slug":"beneficis-pla-estrategic-ciberseguretat","status":"publish","type":"post","link":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/","title":{"rendered":"Estrat\u00e8gia de ciberseguretat: panorama actual i implementaci\u00f3 en l&#8217;empresa"},"content":{"rendered":"<p><span data-contrast=\"none\">Despr\u00e9s de la transformaci\u00f3 digital el pes de la ciberseguretat en les organitzacions ha augmentat exponencialment. \u00c9s un m\u00f3n en constant evoluci\u00f3 i del qual cada vegada les empreses s\u00f3n m\u00e9s conscients de la seva import\u00e0ncia dins de l&#8217;organitzaci\u00f3.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u00cdNDEX DE CONTINGUTS<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #222222;color:#222222\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #222222;color:#222222\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#La_ciberseguretat_a_les_companyies\" >La ciberseguretat a les companyies\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#La_importancia_de_lestrategia\" >La import\u00e0ncia de l&#8217;estrat\u00e8gia\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#El_pla_estrategic_de_ciberseguretat\" >El pla estrat\u00e8gic de ciberseguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Elements_que_componen_el_pla_estrategic_de_ciberseguretat\" >Elements que componen el pla estrat\u00e8gic de ciberseguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Fases_del_Pla_Director_de_Seguretat\" >Fases del Pla Director de Seguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Estandards_mes_comuns_per_elaborar_el_pla_estrategic_de_seguretat\" >Est\u00e0ndards m\u00e9s comuns per elaborar el pla estrat\u00e8gic de seguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Govern_de_la_ciberseguretat\" >Govern de la ciberseguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Rols_funcions_i_processos_de_larea_de_ciberseguretat\" >Rols, funcions i processos de l&#8217;\u00e0rea de ciberseguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Pla_de_ciberseguretat\" >Pla de ciberseguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Generacio_del_Pla_de_Ciberseguretat\" >Generaci\u00f3 del Pla de Ciberseguretat\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#Conclusions_i_beneficis_del_pla_estrategic_de_ciberseguretat\" >Conclusions i beneficis del pla estrat\u00e8gic de ciberseguretat\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n\n<p><a href=\"https:\/\/es.linkedin.com\/in\/guillermo-rodr%C3%ADguez-65568416\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">Guillermo Rodr\u00edguez<\/span><\/b><\/a><span data-contrast=\"none\">, director de l&#8217;\u00e0rea de Cyber Risk Culture de <\/span><a href=\"https:\/\/www.pwc.es\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">PwC Espanya<\/span><\/b><\/a><span data-contrast=\"none\"> i director del <\/span><a href=\"https:\/\/www.euncet.es\/es\/master-online-ciberseguridad\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">m\u00e0ster en Seguretat Inform\u00e0tica i Gesti\u00f3 del Risc Tecnol\u00f2gic<\/span><\/b><\/a><span data-contrast=\"none\">, ha sigut l&#8217;encarregat de presentar el webinar \u00abEstrat\u00e8gia de ciberseguretat: panorama actual i implementaci\u00f3 a l&#8217;empresa\u00bb.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">L\u2019<\/span><b><span data-contrast=\"none\">Euncet Business School i PwC Espanya<\/span><\/b><span data-contrast=\"none\">, firma l\u00edder d&#8217;auditoria i consultoria dins de les considerades Big Four, s&#8217;han aliat per <\/span><b><span data-contrast=\"none\">crear un m\u00e0ster online que capaciti els estudiants per donar resposta als riscos i ciberamenaces que afecten les organitzacions de tot el m\u00f3n<\/span><\/b><span data-contrast=\"none\">. El programa est\u00e0 format per 13 cursos d&#8217;especialitzaci\u00f3 basats en una metodologia 100% pr\u00e0ctica.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">En aquesta sessi\u00f3 informativa, Guillermo Rodr\u00edguez <\/span><b><span data-contrast=\"none\">reflexiona sobre la import\u00e0ncia del pla estrat\u00e8gic en ciberseguretat i com implementar-lo en una empresa<\/span><\/b><span data-contrast=\"none\">, com a bestreta dels continguts que es posaran a disposici\u00f3 dels alumnes del m\u00e0ster.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/1.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/1.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/1-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/1-80x32.jpg 80w\" alt=\"Situaci\u00f3n de la seguridad inform\u00e1tica en la actualidad y ciberseguridad en las compa\u00f1\u00edas.\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"La_ciberseguretat_a_les_companyies\"><\/span><span class=\"TextRun SCXW209068166 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW209068166 BCX0\">La <\/span><span class=\"NormalTextRun SCXW209068166 BCX0\">ciberseguretat<\/span><span class=\"NormalTextRun SCXW209068166 BCX0\"> a les companyies<\/span><\/span><span class=\"EOP SCXW209068166 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">Abans de parlar del pla estrat\u00e8gic en ciberseguretat \u00e9s important contextualitzar la situaci\u00f3 de la seguretat inform\u00e0tica en l&#8217;actualitat.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">L&#8217;informe de riscos del <\/span><a href=\"https:\/\/es.weforum.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">F\u00f2rum Econ\u00f2mic Mundial (WEF),<\/span><\/b><\/a><span data-contrast=\"none\"> destaca des de fa anys la <\/span><b><span data-contrast=\"none\">import\u00e0ncia de considerar els ciberriscos dins de les organitzacions<\/span><\/b><span data-contrast=\"none\">, i <\/span><b><span data-contrast=\"none\">identifica diversos d&#8217;aquests riscos en el top 10 dels m\u00e9s importants en l&#8217;actualitat<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-contrast=\"none\">Segons estad\u00edstiques proporcionades per <\/span><a href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">Varonis<\/span><\/b><\/a><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-contrast=\"none\">El cost mitj\u00e0 d&#8217;una violaci\u00f3 de dades \u00e9s de 3.92 milions de d\u00f2lars<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Es preveu que <\/span><b><span data-contrast=\"none\">la despesa mundial en seguretat cibern\u00e8tica assolir\u00e0 el 2022 els 133.700 milions<\/span><\/b><span data-contrast=\"none\"> de d\u00f2lars.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Els <\/span><b><span data-contrast=\"none\">hackers ataquen cada 39 segons<\/span><\/b><span data-contrast=\"none\">, una mitjana de 2.244 vegades al dia.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">El <\/span><b><span data-contrast=\"none\">62 % de les empreses van patir atacs de pishing<\/span><\/b><span data-contrast=\"none\"> i d&#8217;enginyeria social el 2019.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">El <\/span><b><span data-contrast=\"none\">68 % dels l\u00edders empresarials senten que els riscos de seguretat cibern\u00e8tica estan augmentant<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">S&#8217;ha passat del desconeixement absolut sobre la ciberseguretat a rebre not\u00edcies di\u00e0riament sobre aquests riscos tecnol\u00f2gics. Aquest fet ha ajudat a posicionar la ciberseguretat com una de les principals \u00e0rees de desenvolupament dins dels negocis.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Des de l&#8217;any 2018 es creu que la ciberdelinq\u00fc\u00e8ncia mou m\u00e9s diners al m\u00f3n que el narcotr\u00e0fic. <\/span><\/b><span data-contrast=\"none\">Els seus atacs cada vegada s\u00f3n m\u00e9s sofisticats, per la qual cosa les empreses requereixen de treballadors experts per fer-hi front.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">En <\/span><a href=\"https:\/\/www.pwc.es\/es\/publicaciones\/transformacion-digital\/estado-cultura-ciberseguridad.html\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">l&#8217;informe publicat per PwC<\/span><\/b><\/a><b><span data-contrast=\"none\"> s&#8217;estima que el 2021 hi haur\u00e0 3,5 milions de llocs de treball en ciberseguretat sense cobrir<\/span><\/b><span data-contrast=\"none\"> a tot el m\u00f3n, mentre que en <\/span><a href=\"https:\/\/www.isc2.org\/News-and-Events\/Press-Room\/Posts\/2020\/11\/11\/ISC2-Study-Reveals-the-Cybersecurity-Workforce-Has-Grown-Globally\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">l&#8217;informe realitzat per ISC <\/span><\/b><\/a><span data-contrast=\"none\">es diu que <\/span><b><span data-contrast=\"none\">a Europa estem prop dels 350.000 llocs de treball de demanda que no es pot cobrir amb l&#8217;oferta actual<\/span><\/b><span data-contrast=\"none\">. Aquestes dades no fan m\u00e9s que confirmar la demanda creixent que hi ha d&#8217;especialistes en ciberseguretat, i evidencia que aquests especialistes estan entre els perfils professionals m\u00e9s interessants per a les companyies a dia a avui.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/3.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/3.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/3-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/3-80x32.jpg 80w\" alt=\"La importancia de la estrategia empresarial para aprovechar las oportunidades y hacer frente a las amenazas.\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"La_importancia_de_lestrategia\"><\/span><span class=\"TextRun SCXW95878582 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW95878582 BCX0\">La import\u00e0ncia de l&#8217;estrat\u00e8gia<\/span><\/span><span class=\"EOP SCXW95878582 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:708,&quot;335559739&quot;:30,&quot;335559740&quot;:240,&quot;335559991&quot;:708}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">La <\/span><b><span data-contrast=\"none\">improvisaci\u00f3 \u00e9s un dels grans enemics<\/span><\/b><span data-contrast=\"none\"> per a qualsevol empresa. I \u00e9s que,<\/span><b><span data-contrast=\"none\"> l&#8217;estrat\u00e8gia empresarial ens ajuda a aprofitar les oportunitats<\/span><\/b><span data-contrast=\"none\">, fer front a les amenaces, refor\u00e7ar les fortaleses i minimitzar les debilitats o els riscos.\u202fPer a aix\u00f2, es necessita desenvolupar una correcta estrat\u00e8gia amb un coneixement ampli de l&#8217;empresa, tant intern com extern. \u00c9s important comptar amb una visi\u00f3 objectiva i realista de la companyia.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">En l&#8217;\u00e0mbit de la ciberseguretat succeeix el mateix.\u202f<\/span><b><span data-contrast=\"none\">L&#8217;estrat\u00e8gia en ciberseguretat permet aprofitar i focalitzar els recursos disponibles en les \u00e0rees de m\u00e9s risc<\/span><\/b><span data-contrast=\"none\"> perqu\u00e8 siguin m\u00e9s rendibles.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Con\u00e8ixer la part estrat\u00e8gica i de govern \u00e9s essencial per desenvolupar qualsevol pla director de ciberseguretat<\/span><\/b><span data-contrast=\"none\">. Aix\u00f2 s\u00ed, no cal deixar de banda el coneixement m\u00e9s t\u00e8cnic de la ciberseguretat per poder generar un pla complet i realista.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">L&#8217;objectiu de totes les organitzacions hauria de ser la reducci\u00f3 dels seus ciberriscos el m\u00e0xim possible o, almenys, fins<\/span><\/b><span data-contrast=\"none\"> a un llindar assumible pel negoci. No existeix el risc zero, amb la qual cosa, encara que les companyies adoptin tot tipus de controls o mesures de seguretat preventius, han d&#8217; existir plans de detecci\u00f3, resposta i recuperaci\u00f3 per minimitzar l&#8217; impacte en cas d&#8217;incident.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/4.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/4.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/4-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/4-80x32.jpg 80w\" alt=\"El plan estrat\u00e9gico de ciberseguridad, ayuda a reducir los riesgos entorno a la ciberseguridad de una empresa\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"El_pla_estrategic_de_ciberseguretat\"><\/span><span class=\"TextRun SCXW17207776 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW17207776 BCX0\">El pla estrat\u00e8gic de <\/span><span class=\"NormalTextRun SCXW17207776 BCX0\">ciberseguretat<\/span><\/span><span class=\"EOP SCXW17207776 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">El pla estrat\u00e8gic (o director) de ciberseguretat \u00e9s un <\/span><b><span data-contrast=\"none\">projecte que proposa una s\u00e8rie de mesures que ajuden a reduir els riscos entorn de la ciberseguretat d&#8217;una empresa.<\/span><\/b> <span data-contrast=\"none\">Ha de contenir els aspectes t\u00e8cnics, legals i organitzatius que s&#8217;han de dur a terme per reduir els riscos provocats per les amenaces que afecten una companyia fins a un nivell acceptable. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Un pla estrat\u00e8gic de ciberseguretat ha d<\/span><b><span data-contrast=\"none\">&#8216;ajudar a establir l&#8217;estrat\u00e8gia que s&#8217;ha d&#8217;implementar incloent les mesures t\u00e8cniques, legals i organitzatives adequades.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/2.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/2.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/2-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/2-80x32.jpg 80w\" alt=\"Entre los principales componentes de un plan estrat\u00e9gico de ciberseguridad se encuentran: el gobierno de la ciberseguridad y el plan de ciberseguridad.\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Elements_que_componen_el_pla_estrategic_de_ciberseguretat\"><\/span><span class=\"TextRun SCXW148912462 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW148912462 BCX0\">Elements que componen el pla estrat\u00e8gic de <\/span><span class=\"NormalTextRun SCXW148912462 BCX0\">ciberseguretat<\/span><\/span><span class=\"EOP SCXW148912462 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">El pla estrat\u00e8gic de ciberseguretat es compon de dos \u00e0mbits:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Govern de la ciberseguretat.\u202f<\/span><\/b><span data-contrast=\"none\">Consisteix en tota la definici\u00f3 que ens ajuda a estructurar un departament de ciberseguretat i a establir el govern, els rols, les funcions i els procediments que han d&#8217;aplicar en aquest departament de seguretat.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Pla de ciberseguretat. <\/span><\/b><span data-contrast=\"none\">Ajuda a identificar les mesures, a prioritzar-les i a implantar d&#8217; una manera homog\u00e8nia i amb criteri totes aquestes mesures dins de l&#8217; organitzaci\u00f3.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/9.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/9.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/9-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/9-80x32.jpg 80w\" alt=\"Fases del Plan Director de Seguridad\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Fases_del_Pla_Director_de_Seguretat\"><\/span><span class=\"TextRun SCXW203131184 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW203131184 BCX0\">Fases del Pla Director de Seguretat<\/span><\/span><span class=\"EOP SCXW203131184 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3>1. As Is<\/h3>\n<p><span class=\"TextRun SCXW12455738 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW12455738 BCX0\">Permet con\u00e8ixer la situaci\u00f3 actual de la <\/span><span class=\"NormalTextRun SCXW12455738 BCX0\">ciberseguretat<\/span><span class=\"NormalTextRun SCXW12455738 BCX0\"> dins de l&#8217;organitzaci\u00f3. S&#8217;hauran de determinar el nivell dels riscos que t\u00e9 l&#8217;organitzaci\u00f3, i amb aix\u00f2 les amenaces a les quals est\u00e0 exposada.<\/span><\/span><span class=\"EOP SCXW12455738 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<h3>2. To Be<\/h3>\n<p><span class=\"TextRun SCXW66969587 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW66969587 BCX0\">En aquesta fase s&#8217;estableix el nivell objectiu de protecci\u00f3 que desitja l&#8217;organitzaci\u00f3.\u202fAquest nivell objectiu es valora en capacitats de protecci\u00f3 o en reducci\u00f3 del nivell de risc.<\/span><\/span><span class=\"EOP SCXW66969587 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<h3>3. MESURES DE SEGURETAT<\/h3>\n<p><span class=\"TextRun SCXW260013137 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW260013137 BCX0\">Identificar quines s\u00f3n les mesures ajudar\u00e0 l&#8217;organitzaci\u00f3 a passar de l&#8217;estat actual a l&#8217;estat objectiu.<\/span><\/span><span class=\"EOP SCXW260013137 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<h3>4. Pla ESTRAT\u00c8GIC DE CIBERSEGURETAT<\/h3>\n<p><span class=\"TextRun SCXW51568875 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW51568875 BCX0\">Un cop detectades les mesures de seguretat s&#8217;han de classificar i prioritzar. En aquest punt s&#8217;han d&#8217; identificar els costos, prioritats i depend\u00e8ncies de les mesures.<\/span><\/span><span class=\"EOP SCXW51568875 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<h3>5. aPROVACI\u00d3<\/h3>\n<p><span data-contrast=\"none\">L&#8217;Alta Direcci\u00f3 ser\u00e0 l&#8217;encarregada d&#8217;aprovar el Pla Estrat\u00e8gic de Ciberseguretat.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">L&#8217;aprovaci\u00f3 d&#8217;aquest \u00e9s vital per a l&#8217;establiment del pressupost o de la inversi\u00f3 que la companyia est\u00e0 disposada a emprar.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<h3>6. Execuci\u00f3 i seguiment<\/h3>\n<p><span class=\"TextRun SCXW199929692 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW199929692 BCX0\">En aquesta darrera fase, es fa un seguiment per assegurar que es compleix el que estableix el pla estrat\u00e8gic i s&#8217;assoleixen els objectius marcats a l&#8217;inici.<\/span><\/span><span class=\"EOP SCXW199929692 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/5.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/5.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/5-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/5-80x32.jpg 80w\" alt=\"Principales est\u00e1ndares y normativas utilizadas a nivel mundial para elaborar un plan estrat\u00e9gico de seguridad\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Estandards_mes_comuns_per_elaborar_el_pla_estrategic_de_seguretat\"><\/span><span class=\"TextRun SCXW115577484 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW115577484 BCX0\">Est\u00e0ndards m\u00e9s comuns per elaborar el pla estrat\u00e8gic de seguretat<\/span><\/span><span class=\"EOP SCXW115577484 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"TextRun SCXW2589782 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW2589782 BCX0\">Existeixen molts est\u00e0ndards i normatives, tot i que les m\u00e9s utilitzades a nivell mundial s\u00f3n:<\/span><\/span><span class=\"EOP SCXW2589782 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<h3>NISTC CSF<\/h3>\n<p><span data-contrast=\"none\">Est\u00e0ndard americ\u00e0 que estableix cinc dominis a tenir en compte per les organitzacions a l&#8217; hora d&#8217;establir el pla estrat\u00e8gic:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Identificar<\/span><\/b><span data-contrast=\"none\">. Realitzar una an\u00e0lisi de riscos per gestionar els actius. Cal saber quins s\u00f3n els processos i la informaci\u00f3 rellevant per a l\u2019empresa.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Protegir<\/span><\/b><span data-contrast=\"none\">. Prendre totes les mesures necess\u00e0ries per protegir: control d&#8217;acc\u00e9s, conscienciaci\u00f3 i entrenament, seguretat de les dades, manteniment i tecnologies de protecci\u00f3.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Detectar<\/span><\/b><span data-contrast=\"none\">. Descobrir anomalies i esdeveniments monitoritzant de forma cont\u00ednua la seguretat i activant processos de detecci\u00f3.\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Resposta.\u202f<\/span><\/b><span data-contrast=\"none\">Cal saber respondre davant els atacs al m\u00e9s aviat possible i de la millor manera per mitigar els efectes i recuperar els sistemes i actius que hagin estat atacats.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Recuperaci\u00f3.\u202f<\/span><\/b><span data-contrast=\"none\">Un cop s&#8217;ha donat resposta s&#8217;han de crear plans de recuperaci\u00f3 per establir millores per al futur.\u00a0<\/span><\/li>\n<\/ul>\n<h3>ISO\/IEC 27001<\/h3>\n<p><span data-contrast=\"none\">L&#8217;est\u00e0ndard ISO\/IEC 27001 \u00e9s un est\u00e0ndard certificable que es basa en el cicle del PDCA (Pla-Do-Check-Act). Les fases del cicle en qu\u00e8 es basa aquest est\u00e0ndard s\u00f3n:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Planifica (Pla).\u00a0<\/span><\/b><span data-contrast=\"none\"> Identifica els actius, ent\u00e9n els processos i el negoci, i realitza una an\u00e0lisi de riscos segons l&#8217;estat actual en ciberseguretat de la companyia.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Fes (Do)<\/span><\/b><span data-contrast=\"none\">. Identifica els controls i implanta les mesures de seguretat segons els riscos identificats.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Verifica (Check)<\/span><\/b><span data-contrast=\"none\">. Verificar que els controls que estan implantats s&#8217;estan executant correctament. Per a aix\u00f2 ser\u00e0 necessari mesurar, auditar i verificar.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Actua<\/span><\/b><span data-contrast=\"none\">. Tots els sistemes s\u00f3n millorables. S&#8217;han de detectar els problemes, les debilitats i les millores, a fi d&#8217;establir les iniciatives que corregeixin aquestes desviacions.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:0,&quot;335559685&quot;:975,&quot;335559737&quot;:255,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3>ISO\/IEC 27002<\/h3>\n<p><span class=\"TextRun SCXW260274437 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW260274437 BCX0\">L&#8217;<\/span><span class=\"NormalTextRun SCXW260274437 BCX0\">est\u00e0ndard ISO\/IEC 27002 permet identificar els dominis i diferents controls que ajuden a mitigar els riscos. Aquests s\u00f3n alguns dels dominis i controls:<\/span><\/span><span class=\"EOP SCXW260274437 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>5 &#8211; <span class=\"TextRun SCXW138542270 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW138542270 BCX0\">Pol\u00edtiques de seguretat de la informaci\u00f3<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>6 &#8211; <span class=\"TextRun SCXW120628689 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW120628689 BCX0\">Organitzaci\u00f3 de la seguretat de la informaci\u00f3<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>7 &#8211; <span class=\"TextRun SCXW61938276 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW61938276 BCX0\">Seguretat relativa als recursos humans<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>8 &#8211; <span class=\"TextRun SCXW143844959 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW143844959 BCX0\">Gesti\u00f3 d&#8217;actius<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>9 &#8211; <span class=\"TextRun SCXW120452058 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW120452058 BCX0\">Control d&#8217;acc\u00e9s<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>10 &#8211; <span class=\"TextRun SCXW99234462 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW99234462 BCX0\">Criptografia<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>11 &#8211; <span class=\"TextRun SCXW190410612 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW190410612 BCX0\">Seguretat f\u00edsica i de l&#8217;entorn<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>12 &#8211; <span class=\"TextRun SCXW122562139 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW122562139 BCX0\">Seguretat de les operacions<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>13 &#8211; <span class=\"TextRun SCXW210611721 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW210611721 BCX0\">Seguretat de les comunicacions<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>14 &#8211; <span class=\"TextRun SCXW105702849 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW105702849 BCX0\">Adquisici\u00f3, desenvolupament i manteniment de sistemes d&#8217;informaci\u00f3<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>15 &#8211; <span class=\"TextRun SCXW174102437 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW174102437 BCX0\">Relaci\u00f3 amb prove\u00efdors<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>16 &#8211; <span class=\"TextRun SCXW180876689 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW180876689 BCX0\">Gesti\u00f3 d&#8217;incidents de seguretat de la informaci\u00f3<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>17 &#8211; <span class=\"TextRun SCXW146481070 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW146481070 BCX0\">Gesti\u00f3 de la continu\u00eftat del negoci<\/span><\/span><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>18 &#8211; <span class=\"TextRun SCXW231248644 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW231248644 BCX0\">Compliment<\/span><\/span><\/b><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/14.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/14.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/14-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/14-80x32.jpg 80w\" alt=\"El gobierno de la ciberseguridad va a condicionar el funcionamiento del departamento.\" width=\"600\" height=\"240\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Govern_de_la_ciberseguretat\"><\/span><span class=\"TextRun SCXW144068976 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW144068976 BCX0\">Govern de la <\/span><span class=\"NormalTextRun SCXW144068976 BCX0\">ciberseguretat<\/span><\/span><span class=\"EOP SCXW144068976 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">El govern de la ciberseguretat \u00e9s una<\/span><b><span data-contrast=\"none\"> \u00e0rea molt important que condicionar\u00e0 el funcionament del departament.<\/span><\/b> <span data-contrast=\"none\">S&#8217;ha de definir l&#8217;estructura d&#8217;aquest departament, i s&#8217;ha d&#8217;establir les depend\u00e8ncies organitzatives en l&#8217;organigrama de la companyia.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Les estructures dependents del CIO m\u00e9s comunes s\u00f3n:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama-1.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama-1.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama-1-300x200.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama-1-80x53.jpg 80w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama-1-391x260.jpg 391w\" alt=\"Organigrama de las estructuras dependientes m\u00e1s comunes del CIO\" width=\"750\" height=\"500\" \/><\/p>\n<p><span class=\"TextRun SCXW201408324 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW201408324 BCX0\">Aquest tipus d&#8217;organitzaci\u00f3 sol donar-se en empreses petites. A poc a poc aquesta estructura ha anat evolucionant i se li ha anat donant m\u00e9s pes la figura del CISO. En el seg\u00fcent organigrama, el responsable de seguretat dep\u00e8n directament del CIO, <\/span><span class=\"NormalTextRun SCXW201408324 BCX0\">equiparant-se amb la resta de responsables de les \u00e0rees d&#8217; IT. Aquest organigrama, que encara \u00e9s com\u00fa trobar-lo en moltes organitzacions, lliga profundament la funci\u00f3 de la ciberseguretat amb el m\u00f3n IT de la companyia.<\/span><\/span><span class=\"EOP SCXW201408324 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama2.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama2.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama2-300x200.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama2-80x53.jpg 80w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama2-391x260.jpg 391w\" alt=\"Evoluci\u00f3n de la estructura del organigrama que da lugar al CISO\" width=\"600\" height=\"400\" \/><\/p>\n<p><span data-contrast=\"none\">Aquestes estructures poden reportar inconvenients ja que dep\u00e8n completament del CIO.\u202fLa depend\u00e8ncia directa amb el CIO sol generar problemes de govern i operatives en l&#8217;\u00e0rea de ciberseguretat.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">En els darrers anys la tend\u00e8ncia ha estat la de migrar cap a tipus d&#8217;organitzacions basades en estructures independents de l&#8217;\u00e0rea d\u2019IT o del CIO:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama3.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama3.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama3-300x200.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama3-80x53.jpg 80w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama3-391x260.jpg 391w\" alt=\"Migraci\u00f3n hacia tipos de organizaciones basadas en estructuras independientes\" width=\"600\" height=\"400\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama4.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama4.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama4-300x200.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama4-80x53.jpg 80w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/organigrama4-391x260.jpg 391w\" alt=\"Migraci\u00f3n hacia tipos de organizaciones basadas en estructuras independientes\" width=\"600\" height=\"400\" \/><\/p>\n<blockquote><p><strong><span class=\"TextRun SCXW47181661 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW47181661 BCX0\">&#8220;L&#8217;impacte dels ciberatacs cada \u00e9s m\u00e9s gran, i s&#8217;evidencia en les dificultats que tenen les companyies per continuar amb les operacions despr\u00e9s que es produeixin&#8221; Guillermo Rodr\u00edguez<\/span><\/span><span class=\"EOP SCXW47181661 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:360}\">\u00a0<\/span><\/strong><\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/11c.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/11c.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/11c-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/11c-80x32.jpg 80w\" alt=\"Principales roles, funciones y procesos que permitir\u00e1n gobernar y gestionar la funci\u00f3n de ciberseguridad de la compa\u00f1\u00eda.\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Rols_funcions_i_processos_de_larea_de_ciberseguretat\"><\/span><span class=\"TextRun SCXW196214248 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW196214248 BCX0\">Rols, funcions i processos de l&#8217;\u00e0rea de <\/span><span class=\"NormalTextRun SCXW196214248 BCX0\">ciberseguretat<\/span><\/span><span class=\"EOP SCXW196214248 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">Un cop establert l&#8217;\u00e0rea de ciberseguretat<\/span><b><span data-contrast=\"none\"> s&#8217;ha de definir els rols, funcions i processos que permetran governar i gestionar la funci\u00f3 de ciberseguretat a la companyia.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\"> La mida de les organitzacions ser\u00e0 un dels factors que condicioni la definici\u00f3 de rols i funcions.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">La definici\u00f3 dels rols que existiran en l&#8217;\u00e0rea de ciberseguretat, juntament amb les responsabilitats que tindr\u00e0 cadascun d&#8217;ells, \u00e9s <\/span><b><span data-contrast=\"none\">important per evitar llacunes en el govern o la protecci\u00f3 de la companyia<\/span><\/b><span data-contrast=\"none\">. Per a cadascun dels rols, s&#8217;hauran de <\/span><b><span data-contrast=\"none\">definir les funcions que permetran a aquest rol, assumir les responsabilitats establertes.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Finalment, <\/span><b><span data-contrast=\"none\">\u00e9s important\u00edssim definir correctament els processos d&#8217;operaci\u00f3 del departament de ciberseguretat<\/span><\/b><span data-contrast=\"none\">, establint la forma de relaci\u00f3 amb altres \u00e0rees de la companyia, aix\u00ed com els processos interns que seran utilitzats en les operacions d&#8217;aquesta \u00e0rea.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/12.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/12.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/12-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/12-80x32.jpg 80w\" alt=\"El plan Estrat\u00e9gico de Ciberseguridad contempla las medidas e iniciativas que ayudar\u00e1n a proteger la compa\u00f1\u00eda.\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Pla_de_ciberseguretat\"><\/span><span class=\"TextRun SCXW65575225 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW65575225 BCX0\">Pla de <\/span><span class=\"NormalTextRun SCXW65575225 BCX0\">ciberseguretat<\/span><\/span><span class=\"EOP SCXW65575225 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">El <\/span><b><span data-contrast=\"none\">Pla Estrat\u00e8gic de Ciberseguretat<\/span><\/b><span data-contrast=\"none\">, a m\u00e9s d&#8217;establir el govern de la ciberseguretat, ha de definir el Pla de Seguretat. Aquest Pla de Seguretat <\/span><b><span data-contrast=\"none\">contempla les mesures i iniciatives que ajudaran a protegir la companyia<\/span><\/b><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Les fases per a la generaci\u00f3 d&#8217; un pla de ciberseguretat s\u00f3n les seg\u00fcents:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<h3>AS IS<\/h3>\n<p><span class=\"TextRun SCXW223241749 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW223241749 BCX0\">Aquesta primera fase requereix de l&#8217;entesa dels processos i del negoci en general. Cal identificar els comptes significatius que generen ingressos i valor dins de l&#8217;organitzaci\u00f3, aix\u00ed com els actius cr\u00edtics, importants i necessaris que ho suporten. Cal detectar els processos que s&#8217;han de refor\u00e7ar per ser m\u00e9s susceptibles a possibles atacs.<\/span><\/span><span class=\"EOP SCXW223241749 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/activos-empresa-1.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/activos-empresa-1.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/activos-empresa-1-300x147.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/activos-empresa-1-80x39.jpg 80w\" alt=\"Importancia de realizar un an\u00e1lisis de riesgos en la generaci\u00f3n de un Plan de Ciberseguridad.\" width=\"600\" height=\"294\" \/><\/p>\n<p><span data-contrast=\"none\">Com a pe\u00e7a fonamental en la generaci\u00f3 d&#8217;un Pla de Ciberseguretat s&#8217;ha de <\/span><b><span data-contrast=\"none\">realitzar una an\u00e0lisi de riscos amb la finalitat d&#8217;identificar quins s\u00f3n els actius d&#8217; informaci\u00f3 i quines s\u00f3n les seves amenaces i vulnerabilitats<\/span><\/b><span data-contrast=\"none\">. L&#8217;an\u00e0lisi de riscos t\u00e9 uns elements a considerar.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Els actius, les amenaces que afecten els actius i es materialitzen mitjan\u00e7ant vulnerabilitats, la probabilitat de materialitzaci\u00f3 i l&#8217;impacte que genera l\u2019amena\u00e7a<\/span><\/b><span data-contrast=\"none\"> un cop materialitzada.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><span data-contrast=\"none\">Amb tots aquests valors <\/span><b><span data-contrast=\"none\">es pot calcular el risc intr\u00ednsec que t\u00e9 l&#8217;organitzaci\u00f3.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\">A partir d&#8217; aquest moment, es podran identificar els controls que permetran reduir aquest risc fins que quedi un risc residual assumible per l&#8217;Alta Direcci\u00f3.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Riesgos.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Riesgos.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Riesgos-300x280.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Riesgos-80x75.jpg 80w\" alt=\"Resultado del an\u00e1lisis de riesgo activo-amenaza que determinar\u00e1 la prioridad a reducir\" width=\"600\" height=\"560\" \/><\/p>\n<p><span class=\"TextRun SCXW228217983 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW228217983 BCX0\">El resultat de l&#8217;an\u00e0lisi de risc determinar\u00e0 quins riscos de cada dupla actiu-amena\u00e7a \u00e9s m\u00e9s prioritari reduir.<\/span><\/span><span class=\"EOP SCXW228217983 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Matriz-riesgo-ciberdefensa.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Matriz-riesgo-ciberdefensa.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Matriz-riesgo-ciberdefensa-300x200.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Matriz-riesgo-ciberdefensa-80x53.jpg 80w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/Matriz-riesgo-ciberdefensa-391x260.jpg 391w\" alt=\"Matriz de Riesgo que permitir\u00e1 la identificaci\u00f3n y an\u00e1lisis del estado de seguridad de la compa\u00f1\u00eda\" width=\"600\" height=\"400\" \/><\/p>\n<p><span class=\"TextRun SCXW4556437 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW4556437 BCX0\">En paral\u00b7lel, i <\/span><\/span><strong><span class=\"TextRun SCXW4556437 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW4556437 BCX0\">per identificar les vulnerabilitats s&#8217;analitzar\u00e0 l&#8217;estat de seguretat de la companyia<\/span><\/span><\/strong><span class=\"TextRun SCXW4556437 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW4556437 BCX0\">. Aquesta an\u00e0lisi pot realitzar<\/span><\/span><strong><span class=\"TextRun SCXW4556437 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW4556437 BCX0\"> mitjan\u00e7ant an\u00e0lisis t\u00e8cniques de vulnerabilitats, obtenci\u00f3 de m\u00e8triques, observaci\u00f3 i altres tasques que puguin ajudar-nos a establir el nivell de seguretat actual.\u00a0<\/span><\/span><span class=\"EOP SCXW4556437 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/riesgos-dominios.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/riesgos-dominios.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/riesgos-dominios-300x180.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/riesgos-dominios-80x48.jpg 80w\" alt=\"Comparativa del sector para obtener informaci\u00f3n en la toma de decisi\u00f3n.\" width=\"600\" height=\"360\" \/><\/p>\n<h3>TO BE<\/h3>\n<p><span data-contrast=\"none\">Amb la situaci\u00f3 actual de seguretat coneguda, estem en disposici\u00f3 d&#8217; establir el nivell objectiu de protecci\u00f3 que volem.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Per establir el nivell objectiu hem de tenir en compte molts factors, ja que el nivell de recursos i esfor\u00e7 \u00e9s limitat.\u202f<\/span><b><span data-contrast=\"none\">En aquesta segona fase recomanem realitzar una comparativa del sector per obtenir informaci\u00f3 \u00fatil en la presa de decisi\u00f3. Aix\u00f2 no limita que s&#8217; obtinguin altres fonts d&#8217; informaci\u00f3 que ajudin a decidir aquest nivell.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Un cop establert el nivell objectiu, caldr\u00e0 establir <\/span><b><span data-contrast=\"none\">la forma en qu\u00e8 s&#8217; anir\u00e0 aconseguint els resultats al llarg del temps.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\"> D&#8217;aquesta manera, \u00e9s recomanable posar-se objectius parcials a curt, mitj\u00e0 i llarg termini.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/15.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/15.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/15-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/15-80x32.jpg 80w\" alt=\"Medidas e iniciativas con prioridad en base al beneficio, para la Generaci\u00f3n del Plan de Ciberseguridad.\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Generacio_del_Pla_de_Ciberseguretat\"><\/span><span class=\"TextRun SCXW244752516 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW244752516 BCX0\">Generaci\u00f3 del Pla de <\/span><span class=\"NormalTextRun SCXW244752516 BCX0\">Ciberseguretat<\/span><\/span><span class=\"EOP SCXW244752516 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"none\">Un cop establert el nivell objectiu s&#8217; identificaran els controls, mesures de seguretat i iniciatives que ens permetin passar d&#8217; un nivell a un altre.\u202f<\/span><b><span data-contrast=\"none\">Aquestes mesures o iniciatives tindran una prioritat en base al benefici que aporten segons la reducci\u00f3 de risc que provoquen, el cost, la complexitat d&#8217; implantaci\u00f3 o manteniment,<\/span><\/b><span data-contrast=\"none\"> i per suposat la seva depend\u00e8ncia respecte a la resta d&#8217; iniciatives o mesures de seguretat.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Totes aquestes mesures, aix\u00ed com la projecci\u00f3 des de l&#8217;estat actual a l&#8217;objectiu ens <\/span><b><span data-contrast=\"none\">permet generar el Pla de Ciberseguretat, que ser\u00e0 presentat a la Direcci\u00f3 de la companyia per a la seva aprovaci\u00f3.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:30,&quot;335559740&quot;:338}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/13.jpg\" sizes=\"(max-width: 750px) 100vw, 750px\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/13.jpg 750w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/13-300x120.jpg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/02\/13-80x32.jpg 80w\" alt=\"Principales conclusiones y beneficios del plan estrat\u00e9gico de ciberseguridad\" width=\"750\" height=\"300\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusions_i_beneficis_del_pla_estrategic_de_ciberseguretat\"><\/span><span class=\"TextRun SCXW168087403 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW168087403 BCX0\">Conclusions i beneficis del pla estrat\u00e8gic de <\/span><span class=\"NormalTextRun SCXW168087403 BCX0\">ciberseguretat<\/span><\/span><span class=\"EOP SCXW168087403 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:30,&quot;335559740&quot;:240}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><span data-contrast=\"none\">L<\/span><b><span data-contrast=\"none\">&#8216;estrat\u00e8gia<\/span><\/b><span data-contrast=\"none\"> ens <\/span><b><span data-contrast=\"none\">permet focalitzar els esfor\u00e7os<\/span><\/b><span data-contrast=\"none\"> on realment \u00e9s necessari dins de l&#8217;organitzaci\u00f3.<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Open Sans,Times New Roman\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Permet<\/span><b><span data-contrast=\"none\"> unir esfor\u00e7os entenent els objectius de les mesures de seguretat que implementem.\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:2,&quot;335559685&quot;:495,&quot;335559739&quot;:0,&quot;335559740&quot;:330}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Open Sans,Times New Roman\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">L&#8217;an\u00e0lisi de riscos ens permet identificar les amenaces i prioritzar-les segons el seu risc<\/span><\/b><span data-contrast=\"none\">. \u00c9s la pe\u00e7a central de l&#8217;estrat\u00e8gia.\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:2,&quot;335559685&quot;:495,&quot;335559739&quot;:0,&quot;335559740&quot;:330}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Open Sans,Times New Roman\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">No es pot establir una estrat\u00e8gia sense entendre el negoci i els seus processos.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;201341983&quot;:2,&quot;335559685&quot;:495,&quot;335559739&quot;:30,&quot;335559740&quot;:330}\">\u00a0<\/span><\/li>\n<\/ol>\n<p>Si necessites informaci\u00f3 sobre el tema, et recomano visualitzar aquest <a href=\"https:\/\/youtu.be\/YdoCTkCIXSA\" target=\"_blank\" rel=\"noopener noreferrer\">webinar sobre l&#8217;estrat\u00e8gia de ciberseguretat.\u00a0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despr\u00e9s de la transformaci\u00f3 digital el pes de la ciberseguretat en les organitzacions ha augmentat exponencialment. \u00c9s un m\u00f3n en constant evoluci\u00f3 i del qual cada vegada les empreses s\u00f3n m\u00e9s conscients de la seva import\u00e0ncia dins de l&#8217;organitzaci\u00f3.\u00a0\u00a0 Guillermo Rodr\u00edguez, director de l&#8217;\u00e0rea de Cyber Risk Culture de PwC Espanya i director del m\u00e0ster [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":48239,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[452],"tags":[],"class_list":["post-59544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovacio-i-tecnologia"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Estrat\u00e8gia de ciberseguretat: plans i mesures | Blog Euncet<\/title>\n<meta name=\"description\" content=\"Sabies que els hackers ataquen de mitjana cada 39 segons? Descobreix com protegir la teva empresa amb un pla estrat\u00e8gic de ciberseguretat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estrat\u00e8gia de ciberseguretat: plans i mesures | Blog Euncet\" \/>\n<meta property=\"og:description\" content=\"Sabies que els hackers ataquen de mitjana cada 39 segons? Descobreix com protegir la teva empresa amb un pla estrat\u00e8gic de ciberseguretat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/\" \/>\n<meta property=\"og:site_name\" content=\"Euncet Business School\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/euncet\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-09T15:53:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-15T17:02:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/02\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"euncet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@euncet\" \/>\n<meta name=\"twitter:site\" content=\"@euncet\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"euncet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/\"},\"author\":{\"name\":\"euncet\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\"},\"headline\":\"Estrat\u00e8gia de ciberseguretat: panorama actual i implementaci\u00f3 en l&#8217;empresa\",\"datePublished\":\"2021-02-09T15:53:36+00:00\",\"dateModified\":\"2024-11-15T17:02:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/\"},\"wordCount\":2558,\"image\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg\",\"articleSection\":[\"Innovaci\u00f3 i Tecnologia\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/\",\"name\":\"Estrat\u00e8gia de ciberseguretat: plans i mesures | Blog Euncet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg\",\"datePublished\":\"2021-02-09T15:53:36+00:00\",\"dateModified\":\"2024-11-15T17:02:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\"},\"description\":\"Sabies que els hackers ataquen de mitjana cada 39 segons? Descobreix com protegir la teva empresa amb un pla estrat\u00e8gic de ciberseguretat.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg\",\"contentUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg\",\"width\":750,\"height\":482,\"caption\":\"Estrategia de ciberseguridad: panorama actual e implementaci\u00f3n en la empresa\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/beneficis-pla-estrategic-ciberseguretat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Estrat\u00e8gia de ciberseguretat: panorama actual i implementaci\u00f3 en l&#8217;empresa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/\",\"name\":\"Euncet Business School\",\"description\":\"Escuela de negocios\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\",\"name\":\"euncet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"caption\":\"euncet\"},\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/author\\\/euncet\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estrat\u00e8gia de ciberseguretat: plans i mesures | Blog Euncet","description":"Sabies que els hackers ataquen de mitjana cada 39 segons? Descobreix com protegir la teva empresa amb un pla estrat\u00e8gic de ciberseguretat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/","og_locale":"ca_ES","og_type":"article","og_title":"Estrat\u00e8gia de ciberseguretat: plans i mesures | Blog Euncet","og_description":"Sabies que els hackers ataquen de mitjana cada 39 segons? Descobreix com protegir la teva empresa amb un pla estrat\u00e8gic de ciberseguretat.","og_url":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/","og_site_name":"Euncet Business School","article_publisher":"https:\/\/www.facebook.com\/euncet","article_published_time":"2021-02-09T15:53:36+00:00","article_modified_time":"2024-11-15T17:02:07+00:00","og_image":[{"width":750,"height":482,"url":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/02\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg","type":"image\/jpeg"}],"author":"euncet","twitter_card":"summary_large_image","twitter_creator":"@euncet","twitter_site":"@euncet","twitter_misc":{"Escrit per":"euncet","Temps estimat de lectura":"12 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#article","isPartOf":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/"},"author":{"name":"euncet","@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268"},"headline":"Estrat\u00e8gia de ciberseguretat: panorama actual i implementaci\u00f3 en l&#8217;empresa","datePublished":"2021-02-09T15:53:36+00:00","dateModified":"2024-11-15T17:02:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/"},"wordCount":2558,"image":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/02\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg","articleSection":["Innovaci\u00f3 i Tecnologia"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/","url":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/","name":"Estrat\u00e8gia de ciberseguretat: plans i mesures | Blog Euncet","isPartOf":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#primaryimage"},"image":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/02\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg","datePublished":"2021-02-09T15:53:36+00:00","dateModified":"2024-11-15T17:02:07+00:00","author":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268"},"description":"Sabies que els hackers ataquen de mitjana cada 39 segons? Descobreix com protegir la teva empresa amb un pla estrat\u00e8gic de ciberseguretat.","breadcrumb":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#primaryimage","url":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/02\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg","contentUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/02\/Estrategia-de-ciberseguridad-panorama-actual-e-implementacion-en-la-empresa.jpg","width":750,"height":482,"caption":"Estrategia de ciberseguridad: panorama actual e implementaci\u00f3n en la empresa"},{"@type":"BreadcrumbList","@id":"https:\/\/www.euncet.com\/blog\/ca\/beneficis-pla-estrategic-ciberseguretat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.euncet.com\/blog\/ca\/"},{"@type":"ListItem","position":2,"name":"Estrat\u00e8gia de ciberseguretat: panorama actual i implementaci\u00f3 en l&#8217;empresa"}]},{"@type":"WebSite","@id":"https:\/\/www.euncet.com\/blog\/ca\/#website","url":"https:\/\/www.euncet.com\/blog\/ca\/","name":"Euncet Business School","description":"Escuela de negocios","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.euncet.com\/blog\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Person","@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268","name":"euncet","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","caption":"euncet"},"url":"https:\/\/www.euncet.com\/blog\/ca\/author\/euncet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts\/59544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/comments?post=59544"}],"version-history":[{"count":0,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts\/59544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/media\/48239"}],"wp:attachment":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/media?parent=59544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/categories?post=59544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/tags?post=59544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}