Importancia de la seguridad de la información
¿Por qué crear un programa de seguridad de la información?
Objetivos del programa de seguridad de la información
Componentes clave de un programa de seguridad de la información
Componentes clave de un programa de seguridad de la información
Políticas de seguridad
Respuesta a incidentes
Gestión de vulnerabilidades
Gestión de riesgos
¿Qué se entiende por Riesgo?
Gestión del Riesgo
Evaluación del Riesgo
Gestión de Controles
Continuidad del negocio
Definiciones y términos
Análisis de impacto de negocio
Software seguro
Desarrollo o adquisición de software seguro
Introducción a OWASP
OWASP Top 10
Modelo de Madurez para el Aseguramiento del Software
Diseño del equipo
Roles, equipos y modelos de seguridad
Pirámide de crecimiento o criterio de contratación
Caso de estudio Platzi
La experiencia de Platzi con ISO27001
You don't have access to this class
Keep learning! Join and start boosting your career
Business continuity is a key piece of the information security puzzle. In an environment where threats from ransomware and other cyber attacks are frequent, an organization's ability to maintain its critical operations during and after an incident is vital. Organizations must focus their efforts on identifying and protecting their most valuable assets, as well as establishing clear procedures in the event of a catastrophic event. But how do we do this effectively?
The best practice for data backup is the 3-2-1 strategy. This strategy involves maintaining three copies of data:
By following this strategy, organizations can ensure that their data is preserved and available even when they experience significant problems in their infrastructure.
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are two essential metrics for defining how and when an organization can resume normal operations after an incident:
These metrics are part of the service level agreement (SLA) and are crucial in defining an organization's recovery limits and capabilities.
Service Level Agreements (SLAs) and Service Level Objectives (SLOs) are critical components in the relationship between an organization and its service providers. SLAs establish conditions and penalties in the event of outages, while SLOs define specific performance goals, such as desired uptime. These elements help organizations set clear and reliable expectations regarding the performance of their service providers.
Minimizing costs by ensuring secure and efficient backups is a critical challenge. Organizations can consider alternatives such as:
These strategies, although they can be costly, protect the value and operational continuity of the business.
There are several essential plans to ensure continuity, such as:
These plans should be reviewed, tested and updated regularly to ensure their effectiveness and relevance to new threats and operational changes.
Contributions 5
Questions 1
Want to see more contributions, questions and answers from the community?