Blog of the GRITS Research Group. Next-generation networks for the Internet of the future, Fog Computing and the Internet of things to implement custom designs in hybrid cybersecurity clouds, in large-scale storage systems and long-distance communications.

02 May 2024 | Posted by angela.tuduri

Strengthening the commitment to Cybersecurity | La Salle-URL

Introducing the new cybersecurity coordinator at La Salle Campus Barcelona.

The increasing dependence on information and communication technologies (ICT), coupled with the growing sophistication of cyber threats, has created a complex and challenging landscape.  

Cybersecurity is not a local problem, but a global challenge that affects all countries and sectors. It is not a one-off task, but an ongoing process that requires constant commitment from professionals and organizations. Loss of sensitive data, business disruption and reputational damage are just some of the risks associated with these attacks.  

In this article, we will explore in depth the current state of cybersecurity, analyzing the main threats, the most effective protection measures and the challenges that lie ahead from Alejandro Guasch, new coordinator of the cybersecurity area at La Salle-URL. Read on!  

Confronting the sophistication of cyberattacks | Alignment, innovation and talent  

In the current cybersecurity landscape, characterized by an exponential increase in cyberattacks and the sophistication of the techniques employed, alignment between cybersecurity operation and governance is crucial. This synergy is essential to strengthen protection, detection and response strategies, ensuring the operational continuity and resilience of organizations.  

2024 looks set to be a year of technological disruptions that will propel cybersecurity to new horizons. Artificial Intelligence (AI) and the Managed Detection and Response Extended Response Model (MXDR) emerge as allied tools to improve protection and incident management. These innovations will enable organizations to automate repetitive tasks, analyze large volumes of data more efficiently and adapt to evolving threats.  

However, the sophistication of the landscape also presents significant challenges. Third-party management in the supply chain becomes a critical point, where visibility and control over risks must be strengthened. Additionally, the shortage of cybersecurity talent requires recruitment, retention and professional development strategies to ensure the availability of highly qualified personnel.  

"Technological evolution requires an adaptation of the cybersecurity strategy and implement new measures that strengthen the cybersecurity posture of organizations, a pending aspect in many companies." César Martín Lara, Risk Advisory partner in charge of the cybersecurity practice

With more than 18 years of experience in large companies and positions as Security Manager and now as Cybersecurity Specialist Sales, Alejandro Guasch offers us a perspective on the current state of cybersecurity. Including a Master's Degree in Cybersecurity Management and ISACA's CISA, CISM and CSX Fundamentals certifications, this solid background, together with his professional experience, allows for a complete view of the challenges and opportunities in the sector.  

What do you consider the main challenges and challenges of cybersecurity today?  

Alejandro highlights three pillars to address today's cybersecurity:  

1. Holistic integration of cybersecurity governance 

In the digital age, cybersecurity demands a unified vision. It is critical that cybersecurity governance is integrated into security operations (SOC) and that all SOC services are integrated to work holistically. The complexity of today's cyber threats demands this integration for effective response.  

As an example, in the past, a Switch was for networking and a Firewall (FW) was for security. Today, a FW can instruct a Switch port to isolate the connection or move it to a different segment, demonstrating the need for seamless collaboration between different security elements.  

2. Automation for agile response  

Automation becomes an indispensable tool for rationalizing resources and streamlining incident response. This makes it possible to contain the damage and minimize the repercussions of a cyber attack quickly and efficiently.  

3. Awareness and ongoing training  

While user awareness and training are important, they must be complemented by robust protection measures. Users will always be a vulnerable link, so it is necessary to have tools that block infections even in the face of human error.  

In short, these three pillars - holistic integration, automation and continuous awareness - are key to meeting today's cybersecurity challenges and protecting organizations effectively. 

What role does cybersecurity awareness and training play today?  

Cybersecurity awareness is critical, as users remain the most vulnerable link in the protection chain. However, educating users to a level of absolute immunity is a complex task, especially in an environment where Artificial Intelligence (AI) allows cybercriminals to create increasingly sophisticated and deceptive attacks.  

Indeed, cybercriminals are using AI to develop the most effective phishing and malware attacks ever seen. These attacks can perfectly mimic legitimate emails, websites and applications, fooling even the most experienced users. 

What tools and technologies do you consider to be the most important when it comes to combating current cyber threats?  

If we focus on operational tools and knowing the importance of good governance without any doubt I would indicate the following:   

EDR/XDR: Essential weapons against cyber threats at endpoints  

In the field of cybersecurity operational tools, and always under the premise of good cybersecurity governance, EDR/XDR (Endpoint Detection & Response and Extended Detect and Response) solutions are positioned as essential weapons to combat cyber threats on endpoints (end devices).  

Efficiency and accuracy:  

To maximize their effectiveness, these tools must be properly tuned to the system on which they are installed. In addition, it is crucial that all Use Cases (UoC) are configured in "locked down" mode for immediate threat containment. 

Why is immediate blocking vital?  

The speed of blocking is a determining factor in preventing the spread of an attack in the organization. Timely blocking can contain the damage and minimize the repercussions of the incident.  

What is your opinion on the importance of collaboration between educational institutions and companies in the cybersecurity sector?  

Alejandro Guasch believes that collaboration between educational institutions and companies in the cybersecurity sector is critical for a number of reasons:  

  • Bridging the talent gap: adapting training to the needs of the sector. In the case of cybersecurity, this is complicated by the need for knowledge in Systems and Networking.  

  • Encourage innovation: Bringing together practical experience and research for new solutions. 

  • Improve preparedness: Students better equipped to meet real-world challenges.  

Cybersecurity leads the current business needs in charge of improving digital transformation processes; and getting to a connected and secure environment is the next big challenge for professionals in the technology and ICT sector.   

Discover, from the hand of Alejandro Guasch the Master in Cybersecurity Management of La Salle-URL that will allow you to acquire knowledge in the management and direction of the complex problems facing the digital world, such as security architecture, network defense, data protection, risk management, legal aspects and methods preferred by criminals. 




Add new comment

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
14 + 2 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.