{"id":9918,"date":"2016-12-15T09:15:55","date_gmt":"2016-12-15T12:15:55","guid":{"rendered":"http:\/\/www.amchamchile.cl\/?p=149388"},"modified":"2016-12-15T09:15:55","modified_gmt":"2016-12-15T12:15:55","slug":"ciberseguridad-tendencia-que-traspasa-fronteras","status":"publish","type":"news","link":"https:\/\/amchamchile.cl\/en\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/","title":{"rendered":"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:]"},"content":{"rendered":"<p>[:es]<strong><em>Diferentes actores concuerdan que en Chile urge la creaci\u00f3n de una ley que regule el tema, mientras las tendencias empresariales apuntan a integrar sistemas cognitivos para evitar posibles ataques.<\/em><\/strong><\/p>\n<p>Por\u00a0 Alejandra Melo<\/p>\n<p>Hace a\u00f1os, el ex contratista de la CIA, Edward Snowden divulg\u00f3 en The Guardian y The Washington Post los programas de vigilancia utilizados por agencias como la NASA, la CIA y el FBI. Una vez asilado en Rusia, entreg\u00f3 miles de documentos sobre programas utilizados para espiar las comunicaciones de ciudadanos. Por otro lado, en 2010, WikiLeaks hizo p\u00fablicos los documentos del Departamento de Estado norteamericano y antecedentes clasificados de las guerras de Irak y Afganist\u00e1n.<\/p>\n<p>Ambos hechos tienen algo en com\u00fan: pusieron en riesgo la seguridad de las naciones sin necesidad de entrar en un edificio, ni toparse con alguna persona. Esto, porque la seguridad ya no s\u00f3lo es entendida como un ataque f\u00edsico, sino tambi\u00e9n digital y este tipo de eventos han obligado a pa\u00edses y compa\u00f1\u00edas a elevar y modernizar sus est\u00e1ndares de seguridad digital, incurriendo en mayores inversiones en este tema.<\/p>\n<p>En Chile, la ciberseguridad es definida por el Comit\u00e9 Interministerial sobre Ciberseguridad como \u201cun m\u00ednimo de riesgos para el ciberespacio\u201d, especialmente en lo referente a la protecci\u00f3n de la confidencialidad, integridad y disponibilidad de la informaci\u00f3n que circula en este ambiente, tanto del Estado como de los ciudadanos.<\/p>\n<p>Jaime Soto, secretario general de la Asociaci\u00f3n Chilena de Empresas de Tecnolog\u00edas de Informaci\u00f3n, ACTI, explica que la v\u00eda de entrada de los ciberdelitos es por electr\u00f3nico, redes sociales y smartphones. Por otro lado, los datos m\u00e1s susceptibles de robo son informaci\u00f3n personal y claves bancarias.<\/p>\n<p>De acuerdo a la Cumbre Latinoamericana de Analistas de Seguridad, entre agosto de 2015 y agosto de 2016, el continente Latinoamericano alcanz\u00f3 un mill\u00f3n cien mil ataques de <em>malware<\/em> al a\u00f1o, 12 por segundo. En tanto, el Informe de Ciberseguridad desarrollado por el Banco Interamericano de Desarrollo (BID) y la Organizaci\u00f3n de Estados Americanos (OEA), indica que cuatro de cada cinco pa\u00edses de la regi\u00f3n no tienen estrategias de ciberseguridad o planes de protecci\u00f3n de infraestructura; dos de cada tres no cuentan con un centro de comando y control de seguridad cibern\u00e9tica y la gran mayor\u00eda de las fiscal\u00edas carece de capacidad para perseguir los delitos cibern\u00e9ticos.<\/p>\n<p>En la regi\u00f3n, Uruguay, Brasil, M\u00e9xico, Argentina, Colombia y Chile se encuentran en un nivel intermedio de madurez de ciberseguridad, pero lejos de referentes como Estados Unidos, Israel, Estonia y Rep\u00fablica de Corea, donde su protecci\u00f3n es alta y es prioridad para los gobiernos.<\/p>\n<p><strong>Propuesta de ley en Chile<\/strong><\/p>\n<p>\u201cHace unos meses, Chile se adhiri\u00f3 al Convenio Europeo (Budapest) sobre ciberdelincuencia, lo cual implica cambios legales, por ejemplo, el actualizar nuestra legislaci\u00f3n, modificar la Ley 19.223 sobre delitos inform\u00e1ticos, tipificar el <em>pishing<\/em>, establecer responsabilidad penal de las personas por ciberdelitos cometidos, entre otros\u201d, explica Jaime Soto.<\/p>\n<p>En materia digital, hasta 2010 la ciberseguridad carec\u00eda de discusi\u00f3n y no entr\u00f3 al debate pa\u00eds hasta que la administraci\u00f3n de la Presidenta Michelle Bachelet consider\u00f3 en el programa de gobierno 2014-2018, el desarrollo de una estrategia de seguridad digital con la misi\u00f3n de proteger a usuarios privados y p\u00fablicos.<\/p>\n<p>Mediante el\u00a0Decreto Supremo N\u00ba533,\u00a0en 2015 se cre\u00f3 el\u00a0Comit\u00e9 Interministerial sobre Ciberseguridad (CICS), que debe proponer a la Presidenta de la Rep\u00fablica una\u00a0pol\u00edtica nacional, la que se ha basado en seis ejes tem\u00e1ticos: infraestructura de la informaci\u00f3n; prevenci\u00f3n, persecuci\u00f3n y sanci\u00f3n de ciberdelitos; sensibilizaci\u00f3n, formaci\u00f3n y difusi\u00f3n; cooperaci\u00f3n y relaciones internacionales; desarrollo industrial y productivo; e institucionalidad de la ciberseguridad.<\/p>\n<p>Para Ra\u00fal Arrieta, presidente del Instituto Chileno de Derecho y Tecnolog\u00edas y gerente de Guti\u00e9rrez &amp; Arrieta Abogados, la propuesta y creaci\u00f3n de esta ley es urgente, porque se relaciona \u201ccon todos quienes participan de un pa\u00eds\u201d, de ah\u00ed que considera necesario estructurar una pol\u00edtica nacional con medidas en el corto plazo.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-149390 \" src=\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg\" alt=\"untitled\" width=\"571\" height=\"376\" \/><\/p>\n<p>Explica que hoy, el principal activo de la sociedad del conocimiento es la informaci\u00f3n y, por lo tanto, hay que resguardarla. Por ello, plantea que el pa\u00eds debe generar grandes inversiones en infraestructura de telecomunicaciones, pues de lo contrario, los servicios que dependen de ella, como datos y voz, podr\u00edan verse afectados, en caso de cat\u00e1strofes naturales, hasta llegar a un <em>blackout<\/em>, poniendo en riesgo el resguardo de la informaci\u00f3n de todos.<\/p>\n<p>En paralelo, considera que deber\u00eda haber una discusi\u00f3n sobre los datos de tr\u00e1fico. \u201c\u00bfPor cu\u00e1nto tiempo se guardan?, \u00bfpara qu\u00e9 se guardan? y \u00bfqui\u00e9n accede a ellos? \u00bfTiene sentido que una empresa guarde los datos de tr\u00e1fico m\u00e1s all\u00e1 del per\u00edodo en el cual el cliente puede reclamar por su facturaci\u00f3n?, \u00bfqu\u00e9 significa guardarlos?, \u00bfqu\u00e9 guardo?\u201d, estas interrogantes, explica Arrieta, son s\u00f3lo algunas de las que hay que plantearse, y a ellas agregar que hoy la informaci\u00f3n de tr\u00e1fico tambi\u00e9n implica datos de geolocalizaci\u00f3n, conectividad en aplicaciones m\u00f3viles (app), datos de Internet y m\u00e1s.<\/p>\n<p>Para hacer frente a estos flancos, propone generar una modificaci\u00f3n a la Ley 16.628 sobre delito inform\u00e1tico en el C\u00f3digo Procesal Penal, en torno a la persecuci\u00f3n de los delitos.<\/p>\n<p><strong>Sectores vulnerables<\/strong><\/p>\n<p>Danic Maldonado, comisario de la Brigada de Cibercrimen de la Polic\u00eda de Investigaciones (PDI) afirma que el sector m\u00e1s afectado por el delito cibern\u00e9tico es el financiero y dentro de \u00e9l, la banca.<\/p>\n<p>Se\u00f1ala que es com\u00fan la entrada de correos electr\u00f3nicos infectados, bajo la metodolog\u00eda de <em>phishing <\/em>para estafar y obtener informaci\u00f3n confidencial de forma fraudulenta, que apunta principalmente, a la obtenci\u00f3n de contrase\u00f1as y datos bancarios. Maldonado explica que las denuncias por este tipo de delito, aumentan en temporada de pagos servicios masivos, por ejemplo, para los Permisos de Circulaci\u00f3n y Operaci\u00f3n Renta.<\/p>\n<p>Indica que si bien los ciberdelitos econ\u00f3micos son los m\u00e1s denunciados, no existen cifras al respecto, ya que la carencia de una ley que obligue a denunciar estos hechos, no permiten obtener m\u00e9tricas de an\u00e1lisis.<\/p>\n<p>Varios actores reconocen que tanto para evitar fraudes bancarios por internet, as\u00ed como para crear una la ley y mejorar la infraestructura de telecomunicaciones, es necesaria una alianza p\u00fablico-privada.<\/p>\n<p>\u201cEn este proceso es fundamental que todos nos involucremos. Tanto ciudadanos como organizaciones debemos comprender el valor que aportar\u00eda una alianza de este tipo en pro de la protecci\u00f3n de nuestra privacidad de datos y que \u00e9sta sea amparada y protegida\u201d, comenta Soto.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-149391 \" src=\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/Ciberseguridad_2-1024x367.jpg\" alt=\"untitled\" width=\"681\" height=\"244\" \/><\/p>\n<p><strong>Inversiones en seguridad<\/strong><\/p>\n<p>Pese a los constantes intentos de ataques cibern\u00e9ticos y la falta de una ley que regule estos delitos, Nicol\u00e1s Corrado, socio de Ciberseguridad de Deloitte, comenta que a nivel corporativo, Chile posee buenas tecnolog\u00edas de protecci\u00f3n que permiten incrementar los niveles de seguridad. Pero, al igual que en el resto de Latinoam\u00e9rica, las debilidades en el monitoreo inteligente y el capital humano especializado son siempre los \u201cpendientes\u201d de la ecuaci\u00f3n, que permita mejorar la detecci\u00f3n y r\u00e1pida respuesta.<\/p>\n<p>\u201cUna compa\u00f1\u00eda estadounidense viene realizando hace varios a\u00f1os an\u00e1lisis globales del costo promedio de p\u00e9rdidas que se producen por ciberataques. En 2015 arroj\u00f3 que a nivel mundial, el costo anual de p\u00e9rdidas por compa\u00f1\u00eda es de US$ 7,7 millones, alrededor de US$ 400 mil millones por a\u00f1o. Durante 2016 el monto se ha elevado 23 % y trep\u00f3 a US$ 9,5 millones\u201d, explica Corrado y agrega que la proyecci\u00f3n a 2019 de los costos por el cibercrimen asciende a US$ 2 billones (millones de millones).<\/p>\n<p>En el detalle, precisa que el robo de credenciales de usuario tiene un impacto promedio de US$ 232 por incidente; el <em>ransomware<\/em> <em>(programa inform\u00e1tico que restringe el acceso a determinados archivos del sistema infectado y pide un rescate a cambio de quitar la restricci\u00f3n)<\/em>, de US$ 157 y que el costo de tarjetas e inclusos datos personales de pacientes hoy tienen una valoraci\u00f3n mejor en la <em>deep web<\/em> o web profunda (lo que no conocemos de internet).\u00a0 40% de dicho costo se debe a p\u00e9rdida o fuga de informaci\u00f3n.<\/p>\n<p>Por otro lado, advierte que los impactos de no contar con adecuadas medidas a nivel personal y empresarial son muchos y van m\u00e1s all\u00e1 de lo econ\u00f3mico. \u201cMientras que el costo promedio de una filtraci\u00f3n de seguridad puede estar bien documentado, los efectos a largo plazo\u00a0 sobre la reputaci\u00f3n de la compa\u00f1\u00eda y la marca pueden incrementar las p\u00e9rdidas\u201d, explica Corrado.<\/p>\n<p>En el mundo, explica Marcelo Zanotti, socio\u00a0de consultor\u00eda en Gesti\u00f3n y Tecnolog\u00eda de EY, el sector que m\u00e1s invierte en seguridad es el financiero, ya que la ciberseguridad est\u00e1 tomando tal nivel de preponderancia, que no basta con el actuar de los departamentos de tecnolog\u00eda de las empresas, sino que ha pasado a ser un \u201ctema de alta administraci\u00f3n y directores\u201d.<\/p>\n<p>De acuerdo a la encuesta de ciberseguridad de EY 2015, 89% de las empresas a nivel mundial ha aumentado su presupuesto en seguridad en los \u00faltimos 12 meses y este mismo porcentaje planea hacer lo mismo durante los 12 meses subsiguientes (2016). Ante este panorama, el ejecutivo de EY anticipa que es importante no recortar el presupuesto en seguridad en momentos de restricci\u00f3n econ\u00f3mica, pues frente a cualquier ataque se pone en riesgo la continuidad operativa del negocio, y esto puede tener consecuencias m\u00e1s graves a mediano y largo plazo. En la misma encuesta se consigna que 62% de los entrevistados considera que la reducci\u00f3n presupuestaria es el principal obst\u00e1culo para garantizar la seguridad de la informaci\u00f3n en las empresas.<\/p>\n<p><strong>Tendencias contra el ciberdelito<\/strong><\/p>\n<p>Para enfrentar esta problem\u00e1tica que no respeta fronteras, diferentes compa\u00f1\u00edas han comenzado a investigar y crear soluciones. Para Google, la seguridad es parte fundamental de todas sus herramientas y productos, y para ello han cuidado mantener un equipo de ingenieros de seguridad de alto nivel trabajando a tiempo completo dedicado este fin. En Chile, por ejemplo, realiza actividades locales sobre prevenci\u00f3n e incluso ha trabajado en campa\u00f1as junto a la PDI en contra del ciberdelito.<\/p>\n<p>En vista de la elevada cantidad de ataques cibern\u00e9ticos que ha tra\u00eddo consigo la transformaci\u00f3n digital, a partir de 2014 diferentes compa\u00f1\u00edas alrededor del mundo han optado por crear centros de investigaci\u00f3n y ciberinteligencia. \u00c9stos intentan detectar de manera temprana amenazas web y buscan c\u00f3mo combatirlas, creando incluso espacios de prueba.<\/p>\n<p>Deloitte fue uno de los pioneros en la creaci\u00f3n de estos centros. Hace un a\u00f1o inauguraron sus propios centros de Cyber-Inteligencia, que desplegados por todo el mundo, incluido uno en Santiago, comparten informaci\u00f3n de ataques y permiten la protecci\u00f3n, el monitoreo y la resiliencia de las organizaciones.<\/p>\n<p>\u201cLos centros de Cyber-Inteligencia ofrecen una soluci\u00f3n personalizada y 24\/7, para prevenir, detectar y responder a las ciberamenazas. Tambi\u00e9n brindan capacidades cibern\u00e9ticas perfeccionadas a partir de la administraci\u00f3n e interpretaci\u00f3n de informaci\u00f3n relacionada con la seguridad de la industria y negocio en particular para responder a una amenaza en tiempo real\u201d, explica Nicol\u00e1s Corrado.<\/p>\n<p>Similar trabajo est\u00e1 haciendo IBM mediante el IBM X-Force Command Cyber Range, que permite la inmersi\u00f3n de los usuarios en ataques cibern\u00e9ticos simulados para ense\u00f1arles c\u00f3mo prepararse, responder y administrar una variedad de amenazas. Para ello utilizan un <em>malware<\/em> en vivo, <em>ransomware <\/em>y otras herramientas de <em>hackers<\/em> del mundo real, extra\u00eddas de la <em>dark web<\/em>.<\/p>\n<p>Ya hacia fines de 2015 y principalmente inicios de 2016, la tendencia que comenz\u00f3 a tomar m\u00e1s fuerza en el \u00e1mbito del cibercrimen, fue la incorporaci\u00f3n de inteligencia cognitiva. Las razones que la han posicionado como herramienta eficaz para la ciberseguridad son que logra recolectar mayor cantidad de informaci\u00f3n, permite contrastar con registros de ciberataques previos, reduce el tiempo en que lo hace y permite mayor asertividad.<\/p>\n<p>\u201cActualmente se habla que para obtener resultados similares, un operador deber\u00eda leer 10 mil documentos s\u00f3lo para entender los ciberataques, lo que resulta imposible para un humano, pero no para un sistema computacional\u201d, revela Diego Marcor, gerente de IBM Security en Chile.<\/p>\n<p>Explica que IBM lanz\u00f3 Watson For Cyber Security. \u201cWatson \u2013el sistema de inteligencia artificial de la compa\u00f1\u00eda- busca informaci\u00f3n no estructurada en sitios web -que representa 75% de Internet-, donde los sistemas de seguridad no llegan como los blogs, y la relaciona con el ataque que sufri\u00f3 en una determinada compa\u00f1\u00eda. De esta forma, Watson sugiere cu\u00e1les son las posibles respuestas para el ataque y lograr evitarlo\u201d, afirma Marcor.<\/p>\n<p><strong>Blockchain, \u00bfimpenetrable?<\/strong><\/p>\n<p>Por otro lado, el encadenamiento de bloques o <em>blockchain<\/em>, conocida como la base tecnol\u00f3gica del funcionamiento del <em>bitcoin<\/em> u otras criptodivisas, consiste en una base de datos compartida y encriptada que funciona como un libro de registro de operaciones de compra-venta o cualquier otra transacci\u00f3n, ha comenzado a tomar fuerza, especialmente por el sector financiero.<\/p>\n<p>Justamente, por operar en forma colectiva \u2013con m\u00faltiples verificadores de informaci\u00f3n-, los expertos esperan que sea una forma m\u00e1s segura para realizar transacciones en todo el mundo.<\/p>\n<p>Si bien su avance ha sido r\u00e1pido, hasta ahora, s\u00f3lo est\u00e1 presente en Estados Unidos y algunos pa\u00edses europeos, pero las perspectivas son altas. Seg\u00fan Accenture, en el \u00faltimo tiempo, la inversi\u00f3n mundial en <em>Blockchain<\/em> pas\u00f3 de US$ 30 millones en 2015 a US$ 75 millones en 2016, asociados a crear casos de \u00e9xitos.<\/p>\n<p>Ignacio Vera, gerente de la Divisi\u00f3n Operaciones y Tecnolog\u00eda del Banco de Chile, se\u00f1ala que en esta instituci\u00f3n \u201cactualmente se est\u00e1 evaluando su uso en la trazabilidad y seguridad de nuestras transacciones monetarias\u201d.<\/p>\n<p>El tiempo dir\u00e1 si esta nueva plataforma ser\u00e1 a prueba de ciberataques.[:en]<strong><em>Different actors agree on the pressing need in Chile for a law to regulate cybersecurity, while there is a growing tendency in the business sector to begin integrating cognitive systems to guard against possible attacks.\u00a0<\/em><\/strong><strong><em>\u00a0<\/em><\/strong><\/p>\n<p>By Alejandra Melo<\/p>\n<p>In 2013, the former CIA contractor Edward Snowden leaked information about surveillance programs used by US government agencies including NASA, the CIA and FBI to The Guardian and The Washington Post newspapers. Once he had secured political asylum in Russia, Snowden then released thousands of documents related to more programs utilized to spy on the communications of citizens. Prior to the Snowden files, in 2010, WikiLeaks leaked a series of US Department of State documents and classified records about the wars in Iraq and Afghanistan.<\/p>\n<p>Both of these events share one thing in common: they endangered the security of countries without the need to enter a building, or even come up against another person. This is because security is no longer simply conceived of as a physical attack, but also a digital one. The types of events involving Snowden and WikiLeaks mean that governments and companies have had to increase and modernize their standards of digital security, incurring greater investment costs as a result.<\/p>\n<p>In Chile, cybersecurity is defined by the Interministerial Committee on Cybersecurity as, \u201ca minimum of risks for cyberspace\u201d, especially in relation to the protection of the confidentiality, integrity and availability of information circulating in the online environment, whether this pertains to the State or to private citizens.<\/p>\n<p>Jaime Soto, Secretary General of the Chilean Association of Information Technology Companies (ACTI) explains that cybercrimes are committed committed via email, social media and smartphones. The type of data most vulnerable to theft is personal information and bank passwords.<\/p>\n<p>According to the latest Latin American Security Analysts Summit, Latin America was subject to 1,100,000 malware attacks between August 2015 and August 2016, which is equivalent to 12 attacks per second. Similarly, the 2016 Cybersecurity Report compiled by the Inter-American Development Bank and the Organization of American States provides a number of important findings: four out of five countries in the region have no cybersecurity strategy or infrastructure protection plan; two out of three have no central command and control center for cyber security; and the vast majority of prosecutors lack the capacity to prosecute cybercrimes.<\/p>\n<p>In the region, Uruguay, Brazil, Mexico, Argentina, Colombia and Chile are at an intermediate level in terms of cybersecurity maturity, but a long way behind the United States, Israel, Estonia and South Korea, where protection levels are high and the issue is a government priority.<\/p>\n<p><strong>Proposed law in Chile<\/strong><\/p>\n<p>Jaime Soto explains that, \u201ca few months ago, Chile adhered to the European Convention (Budapest) on Cybercrime, which requires certain legal changes, for example, updating current legislation, amending Law 19.223 on information crimes, the legal categorization of phishing, and establishing legal responsibility for people committing cybercrimes, among other aspects\u201d.<\/p>\n<p>Regarding the digital arena, cybersecurity was not widely discussed in Chile until 2010. Furthermore, it did not form part of the official agenda until the administration of President Michelle Bachelet from 2014-2018, which began developing a digital security strategy with the mission to protect both public and private users.<\/p>\n<p>By means of Supreme Decree 533, the Interministerial Committee on Cybersecurity (CICS) was created in 2015. The Committee is tasked with advising the Chilean president in regard to a new national policy, based on six core thematic areas: information infrastructure; the prevention, prosecution and sanction of cybercrimes; awareness raising, training and dissemination; cooperation and international relations; industrial and productive development; and cybersecurity institutions.<\/p>\n<p>According to Ra\u00fal Arrieta, President of the Chilean Law and Technology Institute and Head of Guti\u00e9rrez &amp; Arrieta Abogados legal firm, the proposal and creation of this type of law is essential because it relates, \u201cto everyone who plays a role in a country\u201d. For that reason, he says that it is necessary to devise a national policy which includes certain short-term measures.<\/p>\n<p>He explains that the main asset of any modern knowledge-based society is information. This information, therefore, must be safeguarded. Consequently, Arrieta claims that the country needs to generate large investments in telecommunications infrastructure. Failing to follow through in this regard could jeopardize the services that depend on this architecture, such as data and voice applications, in the event of natural disasters, potentially leading to a blackout and consequently endangering the safeguarding of everyone\u2019s information.<\/p>\n<p>Simultaneously, he believes discussions should be held in relation to internet traffic data. \u201cFor how long is it stored? Why is it stored? Who has access to it? Does it make sense for a company to store internet traffic data for longer than the period in which customers can lodge a complaint about their billing? What does it mean to store it? What is stored exactly?\u201d These questions are, Arrieta says, just some of the aspects to consider, in addition to acknowledgment of the fact that internet traffic data now includes a wide range of information such as geolocation, connectivity via mobile apps, general internet data, and more.<\/p>\n<p>To confront these challenges, he suggests an amendment to Law 16.628 on information crime, as laid out in the Criminal Procedure Code, regarding the prosecution of related offenses.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-149390 \" src=\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg\" alt=\"untitled\" width=\"571\" height=\"376\" \/><\/p>\n<p><strong>Vulnerable sectors<\/strong><\/p>\n<p>Danic Maldonado, Commissioner of the Cybercrime Unit of the Investigations Police of Chile (PDI) explains that the industry most affected by cybercrime is the finance sector, particularly banking.<\/p>\n<p>He claims that infected emails are especially common. This particular approach works according to the phishing methodology of cheating people out of confidential information in a fraudulent manner, primarily by means of obtaining users\u2019 passwords and bank details.<\/p>\n<p>Maldonado states that reporting of this type of crime increases significantly during periods of large-scale service-related payments, including the purchase of vehicle circulation permits and the income declaration season.<\/p>\n<p>He stresses that while economic cybercrimes are the most widely reported, there are no formal statistics relating to the phenomenon. This is due to the lack of legislation that would make the reporting of these crimes mandatory. Without such a law, there is no basis from which to collect metrics for analysis purposes.<\/p>\n<p>A range of actors recognize the need for public-private partnerships to combat internet banking fraud, as well as the importance of devising suitable legislation and enhancing telecommunications infrastructure.<\/p>\n<p>\u201cThe key is for everyone to form part of this process. Both the general public and organizations must understand the value of partnerships of this type in protecting our private information and ensuring that it is safeguarded and secure\u201d, says Jaime Soto.<strong>\u00a0<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-149391 \" src=\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/Ciberseguridad_2-1024x367.jpg\" alt=\"untitled\" width=\"681\" height=\"244\" \/><\/p>\n<p><strong>Investing in security<\/strong><\/p>\n<p>Despite continuous attempts to carry out cyberattacks and the lack of regulations to legislate against these crimes, Nicol\u00e1s Corrado, Cybersecurity partner at Deloitte, states that at the corporate level, Chile possesses strong protection technology that helps it to raise security levels. However, as in the rest of Latin America, weaknesses in intelligence monitoring and specialized human capital are constantly \u201cunresolved\u201d, whereas rectifying these shortfalls would enable enhanced detection and rapid response.<\/p>\n<p>\u201cA US company has spent the last few years conducting global analyses of the average financial cost of losses caused by cyberattacks. In 2015, it found that at the global level the annual cost of losses per company was US$7.7 million, which is equivalent to US$400 billion per year. During 2016, this amount has increased by 23%, to US$9.5 million\u201d, says Corrado. He adds that the projection to 2019 for the cost of cybercrime is US$2 trillion.<\/p>\n<p>Specific findings from the report show that the average cost of user identity theft is US$232 per incident. In terms of ransomware (a computer program that restricts access to certain files of an infected system and requests a ransom in exchange for removing the restriction), the average cost is US$157. The cost of cards and even personal details of users is even more highly valued in the deep web (parts of the internet that remain hidden). Approximately 40% of this cost is due to information losses or leaks.<\/p>\n<p>On the other hand, Corrado warns that the impact of the lack of suitable measures at the personal and business levels are considerable and go beyond just economic factors. \u201cWhile the average cost of information leaks are well documented, the long-term negative effects on company and brand reputation can mean that losses last far longer\u201d, he notes.<\/p>\n<p>Marcelo Zanotti, Management and Technology partner at the consultancy firm EY explains that at the global level the biggest investor in security is the financial sector. Cybersecurity has now become such an important factor that it is no longer considered sufficient to oversee the area from the technology departments of businesses. Rather, he says, it has become, \u201can issue of senior management and company directors\u201d.<\/p>\n<p>According to EY\u2019s 2015 cybersecurity survey, 89% of companies at the international level had increased their security budgets over the preceding 12-month period, and the same percentage planned to follow suit during the subsequent 12 months (i.e., 2016). With this context in mind, Zanotti says that it is important not to reduce security budgets during periods of economic contraction; in the case of a cyberattack, this would jeopardize the operational continuity of the business and could have serious medium- to long-term consequences. Accordingly, 62% of respondents of the aforementioned EY survey said that budget cuts were the main obstacle to guaranteeing the security of company information.<\/p>\n<p><strong>Counter-cybercrime trends<\/strong><\/p>\n<p>To combat this danger that transcends borders, different companies have begun to research and create their own solutions. For example, security is a fundamental part of all Google\u2019s tools and products. That is why the company has maintained a full-time team of highly trained security engineers to work towards this end. In Chile, Google conducts local activities on prevention and has even worked with the PDI on counter-cybercrime measures.<\/p>\n<p>In light of the increasing numbers of cyberattacks brought about by digital transformation, since 2014 different companies around the world have chosen to create research and cyberintelligence centers. The aim behind these centers is to detect and combat early web threats, facilitated by the design of test spaces.<\/p>\n<p>Deloitte was one of the pioneers in creating these centers. In 2015, the company inaugurated its own Cyberintelligence centers which were deployed all over the world, including one in Santiago. The centers share information about attacks in order to improve the protection, monitoring and resilience of organizations.<\/p>\n<p>Nicol\u00e1s Corrado states that, \u201cthe Cyberintelligence centers offer a personalized, 24\/7 solution for preventing, detecting and responding to cyber threats. They also provide improved cyber performance by managing and interpreting information relating to the particular industry and business in question in order to provide a real-time response\u201d.<\/p>\n<p>IBM is undertaking similar work through the IBM X-Force Command Cyber Range. This space allows users to immerse themselves in simulated cyberattacks to train participants on how to prepare, respond to, and manage a variety of threats. The Range involves the use of live malware, ransomware and other tools utilized by hackers from the real world, extracted from the dark web.<\/p>\n<p>By the end of 2015 and the beginning of 2016, the trend that really began to gain traction in the field of cybercrime was the incorporation of cognitive systems. The reasons why this approach has become an effective cybersecurity tool is due to its ability to collect large amounts of data, to compare this data against registries of previous cyberattacks, to reduce the time in which these actions are undertaken, and to allow for greater assertiveness.<\/p>\n<p>\u201cCurrently, it is said that to achieve the same kinds of results (as a cognitive system), an operator would have to read ten thousand documents just to understand the cyberattack, which is impossible for a human but not a computer system\u201d, explains Diego Marcor, Head of IBM Security in Chile.<\/p>\n<p>He continues by explaining that IMB has launched an initiative called Watson For Cyber Security. \u201cWatson, the company\u2019s artificial intelligence system, looks for unstructured information on websites, which account for 75% of the internet, in which the security systems do not arrive as blogs, and (Watson subsequently) links this information with the attack experienced by the relevant company. In this way, Watson suggests possible responses to the attack and how to avoid it\u201d, says Marcor.<\/p>\n<p><strong>The impenetrable blockchain?<\/strong><\/p>\n<p>Alternatively, there is the blockchain, which is the technological basis behind the workings of Bitcoin and other crypto-currencies. The blockchain consists of a shared and encrypted database that works like a registry of purchases and sales trades or other transactions. It is growing in popularity, particularly in the financial sector.<\/p>\n<p>Precisely because it operates on a collective basis, with multiple information verifiers, experts believe it to be a more secure way of conducting transactions around the world.<\/p>\n<p>Despite its fast rise to prominence, it is only currently available in the United States and certain European countries, although the outlook in terms of its dissemination to other parts of the world is positive. According to Accenture, investment in the blockchain has risen from US$30 million in 2015 to US$75 million in 2016, due to a number of success stories.<\/p>\n<p>In reference to the blockchain, Ignacio Vera, Head of the Operations and Technology Division at Banco de Chile, says that the bank is, \u201ccurrently evaluating its use in the traceability and security of our monetary transactions\u201d.<\/p>\n<p>Only time will tell if this new platform will be cyberattack-proof.[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:es]Diferentes actores concuerdan que en Chile urge la creaci\u00f3n de una ley que regule el tema, mientras las tendencias empresariales apuntan a integrar sistemas cognitivos para evitar posibles ataques. Por\u00a0 Alejandra Melo Hace a\u00f1os, el ex contratista de la CIA, Edward Snowden divulg\u00f3 en The Guardian y The Washington Post los programas de vigilancia utilizados [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"template":"","news_tax":[],"user_type":[],"class_list":["post-9918","news","type-news","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:] - AmCham Chile<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:] - AmCham Chile\" \/>\n<meta property=\"og:description\" content=\"[:es]Diferentes actores concuerdan que en Chile urge la creaci\u00f3n de una ley que regule el tema, mientras las tendencias empresariales apuntan a integrar sistemas cognitivos para evitar posibles ataques. Por\u00a0 Alejandra Melo Hace a\u00f1os, el ex contratista de la CIA, Edward Snowden divulg\u00f3 en The Guardian y The Washington Post los programas de vigilancia utilizados [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/\" \/>\n<meta property=\"og:site_name\" content=\"AmCham Chile\" \/>\n<meta property=\"og:image\" content=\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/\",\"url\":\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/\",\"name\":\"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:] - AmCham Chile\",\"isPartOf\":{\"@id\":\"https:\/\/amchamchile.cl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg\",\"datePublished\":\"2016-12-15T12:15:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#primaryimage\",\"url\":\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg\",\"contentUrl\":\"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/amchamchile.cl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/amchamchile.cl\/#website\",\"url\":\"https:\/\/amchamchile.cl\/\",\"name\":\"AmCham Chile\",\"description\":\"C\u00e1mara Chilena Norteamericana de Comercio\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/amchamchile.cl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:] - AmCham Chile","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/","og_locale":"en_US","og_type":"article","og_title":"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:] - AmCham Chile","og_description":"[:es]Diferentes actores concuerdan que en Chile urge la creaci\u00f3n de una ley que regule el tema, mientras las tendencias empresariales apuntan a integrar sistemas cognitivos para evitar posibles ataques. Por\u00a0 Alejandra Melo Hace a\u00f1os, el ex contratista de la CIA, Edward Snowden divulg\u00f3 en The Guardian y The Washington Post los programas de vigilancia utilizados [&hellip;]","og_url":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/","og_site_name":"AmCham Chile","og_image":[{"url":"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/","url":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/","name":"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:] - AmCham Chile","isPartOf":{"@id":"https:\/\/amchamchile.cl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#primaryimage"},"image":{"@id":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#primaryimage"},"thumbnailUrl":"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg","datePublished":"2016-12-15T12:15:55+00:00","breadcrumb":{"@id":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#primaryimage","url":"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg","contentUrl":"http:\/\/amchamchile.cl\/wp-content\/uploads\/2016\/12\/ciber-1-1024x674.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/amchamchile.cl\/noticia\/ciberseguridad-tendencia-que-traspasa-fronteras\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amchamchile.cl\/en\/"},{"@type":"ListItem","position":2,"name":"[:es]Ciberseguridad, tendencia que traspasa fronteras[:en]Cybersecurity, a trend that transcends borders[:]"}]},{"@type":"WebSite","@id":"https:\/\/amchamchile.cl\/#website","url":"https:\/\/amchamchile.cl\/","name":"AmCham Chile","description":"C\u00e1mara Chilena Norteamericana de Comercio","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amchamchile.cl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/news\/9918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/news\/9918\/revisions"}],"wp:attachment":[{"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/media?parent=9918"}],"wp:term":[{"taxonomy":"news_tax","embeddable":true,"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/news_tax?post=9918"},{"taxonomy":"user_type","embeddable":true,"href":"https:\/\/amchamchile.cl\/en\/wp-json\/wp\/v2\/user_type?post=9918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}