Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Other literature type . 2025
License: CC BY
Data sources: ZENODO
ZENODO
Research . 2025
License: CC BY
Data sources: Datacite
ZENODO
Research . 2025
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Riesgos de Seguridad de las Personas VIP en Entornos Financieros y Gubernamentales

Authors: Cuervo Vanegas, Armando;

Riesgos de Seguridad de las Personas VIP en Entornos Financieros y Gubernamentales

Abstract

Este documento presenta un análisis integral de los riesgos de seguridad que enfrentan las personas VIP en entornos financieros y gubernamentales. Examina las dificultades en la aplicación de políticas de seguridad a altos directivos, los vacíos de concientización, las amenazas generadas por el entorno familiar y la exposición propia del trabajo híbrido. El informe incluye un estudio detallado de amenazas avanzadas como Pegasus y Predator, así como técnicas de espionaje móvil dirigidas a ejecutivos y autoridades públicas. Asimismo, se profundiza en la necesidad de realizar revisiones periódicas y forenses en dispositivos móviles VIP, se explica el papel crítico que desempeñan los Centros de Operaciones de Seguridad (SOC) en la protección ejecutiva y se evalúan las consecuencias organizacionales de una brecha que afecte a un VIP. El documento ofrece medidas de mitigación personalizadas, estrategias diferenciadas de protección y una revisión de las tendencias emergentes, incluyendo el uso de inteligencia artificial, deepfakes y ataques a dispositivos IoT asociados a líderes de alto perfil. El informe está dirigido a profesionales de ciberseguridad, analistas SOC, directivos del sector financiero y gubernamental, asesores de seguridad digital y responsables de políticas corporativas orientadas a la protección de figuras estratégicas.

Keywords

Ciberamenazas emergentes, Estrategias de proteccion ejecutiva

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green