Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Reimaginando la Cyber
Defensa:
De Copilots a Redes de Agentes
Powered by
IR Process
Email Endpoints
Phishing
Email
Open Attachment
Cross Modality Attacks
Click a
URL
Browse to a
website
Exploitation and
installation
Command
and Control
Identities Workloads
User account is
compromised
Attacker collects reconnaissance
and configuration data
Brute force account or use
stolen account credentials
Attacker exfiltrates sensitive
data
Cloud apps
Attacker compromises
a privileged account
Domain is
compromised
Services stopped and
backups deleted
Files encrypted on
additional hosts
Multiple data sources, from multiple providers
Resources and tools can't match
the evolving threat landscape
Understaffed
and Outmatched
New, complex regulations
CISOs personally responsible
Legal, Regulatory, and
Compliance Pressure
AI-powered threats: reinforced,
learned, faster, more
sophisticated, more
destructive, and syndicated
New Era of
Cyber Threats
Data explosion. More complex,
expanding and ever-changing
attack surfaces: AI, cloud, OT/ICS,
and 5G
Digital Tsunami
Security Teams
The New Reality of Security Operations
Re-thinking the
SOC with
AI Agents
The Rise of Agentic AI:
From Collaboration to Autonomous
Intelligence
AI Agent vs Process
AI Agent vs Process
SX Policy Agent for dynamic, AI-
generated detection logic
SX Response Agent for automated alert
triage and remediation
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes

More Related Content

PDF
Cybersecurity AI Assistants – The Future of Digital Defense
PDF
How AI Agents Are Automating Threat Detection and Cybersecurity Response_.pdf
PDF
From Paper to Pixels: The Rise of E-Filing Systems
PPTX
AI and cyber security presentationit is very good
PDF
AI in Cybersecurity: The New Frontier of Defense and Risk | CyberPro Magazine
PDF
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
PDF
Cyber Security Services in India - DigitDefence
PDF
THE FUTURE OF CYBER SECURITY WITH AI.pdf
Cybersecurity AI Assistants – The Future of Digital Defense
How AI Agents Are Automating Threat Detection and Cybersecurity Response_.pdf
From Paper to Pixels: The Rise of E-Filing Systems
AI and cyber security presentationit is very good
AI in Cybersecurity: The New Frontier of Defense and Risk | CyberPro Magazine
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Cyber Security Services in India - DigitDefence
THE FUTURE OF CYBER SECURITY WITH AI.pdf

Similar to Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes (20)

PDF
The Future of Cyber Defense: Top Technologies and Providers
PPTX
AI-in-Cybersecurity AI-in-Cybersecurity.pptx
PDF
Hunting for cyber threats targeting weapon systems
PDF
Digital marketing revolution in 2025 for business people
PDF
DOC-20241116-WA0022._20241120_163723_0000 (1).pdf
PPTX
2019 Cyber Security Trends
PPTX
Impact of Artificial Intelligence on Cybersecurity
PDF
Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®
PPTX
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
PPTX
Cyber Security in AIIIIIII (3 JULY).pptx
PDF
Resiliency-Part One -11-3-2015
PPTX
AI - Driven Cybersecurity algorithms for proactive threat detection_20250106_...
PPTX
Cybersecurity artificial intelligence presentation
PDF
Magazine Febuary-2023-Preview.pdf
PDF
Masters of Cybersecurity Automation Tools_ Defending the Digital Future.pdf
PDF
AI's Role in the Future of Cybersecurity
PDF
AI in Cybersecurity_ Attacks, Protection, and Trends in 2025.pdf
PPTX
Untitled design_20241205_00009_0000.pptx
PPTX
Cybersecurity_in_the_Age_of_AI_Enhanced_Presentation.pptx
PDF
presentazione informatica per sito web scuola
The Future of Cyber Defense: Top Technologies and Providers
AI-in-Cybersecurity AI-in-Cybersecurity.pptx
Hunting for cyber threats targeting weapon systems
Digital marketing revolution in 2025 for business people
DOC-20241116-WA0022._20241120_163723_0000 (1).pdf
2019 Cyber Security Trends
Impact of Artificial Intelligence on Cybersecurity
Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
Cyber Security in AIIIIIII (3 JULY).pptx
Resiliency-Part One -11-3-2015
AI - Driven Cybersecurity algorithms for proactive threat detection_20250106_...
Cybersecurity artificial intelligence presentation
Magazine Febuary-2023-Preview.pdf
Masters of Cybersecurity Automation Tools_ Defending the Digital Future.pdf
AI's Role in the Future of Cybersecurity
AI in Cybersecurity_ Attacks, Protection, and Trends in 2025.pdf
Untitled design_20241205_00009_0000.pptx
Cybersecurity_in_the_Age_of_AI_Enhanced_Presentation.pptx
presentazione informatica per sito web scuola
Ad

More from Cristian Garcia G. (20)

PDF
Reduciendo el Ciber Riesgo en Entornos Financieros
PDF
Gestión Unificada de los Riegos Externos
PPTX
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente
PPTX
Desarrollo Seguro en un mundo multi-stack con Pruebas de Seguridad de Forma A...
PDF
Ciberataques, Normativas y Protección: Ayudando a las Entidades Financieras a...
PDF
Control total para proteger tus activos en base al riesgo
PDF
Más Allá de la Autenticación: Gestión Moderna de Identidad en el sector Finan...
PDF
Gtd Infraestructura Digital de Misión Critica
PPTX
Gestión de la exposición, cómo anticiparse a los ciberataques
PPTX
Más Allá del SOC Tradicional: IA y Automatización para Cumplimiento y Respues...
PDF
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
PPTX
El imperativo de la seguridad de la identidad
PPTX
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
PPTX
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
PPTX
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
PPTX
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
PPTX
La Brecha Silenciosa: ¿Estás Realmente Protegido?
PPTX
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
PPTX
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
PPTX
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
Reduciendo el Ciber Riesgo en Entornos Financieros
Gestión Unificada de los Riegos Externos
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente
Desarrollo Seguro en un mundo multi-stack con Pruebas de Seguridad de Forma A...
Ciberataques, Normativas y Protección: Ayudando a las Entidades Financieras a...
Control total para proteger tus activos en base al riesgo
Más Allá de la Autenticación: Gestión Moderna de Identidad en el sector Finan...
Gtd Infraestructura Digital de Misión Critica
Gestión de la exposición, cómo anticiparse a los ciberataques
Más Allá del SOC Tradicional: IA y Automatización para Cumplimiento y Respues...
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
El imperativo de la seguridad de la identidad
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
La Brecha Silenciosa: ¿Estás Realmente Protegido?
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
Ad

Recently uploaded (20)

PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PPTX
Presentation - Principles of Instructional Design.pptx
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Human Computer Interaction Miterm Lesson
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Ensemble model-based arrhythmia classification with local interpretable model...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Advancing precision in air quality forecasting through machine learning integ...
NewMind AI Weekly Chronicles – August ’25 Week IV
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
EIS-Webinar-Regulated-Industries-2025-08.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Auditboard EB SOX Playbook 2023 edition.
A symptom-driven medical diagnosis support model based on machine learning te...
Presentation - Principles of Instructional Design.pptx
SGT Report The Beast Plan and Cyberphysical Systems of Control
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
4 layer Arch & Reference Arch of IoT.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Human Computer Interaction Miterm Lesson

Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes

  • 2. Reimaginando la Cyber Defensa: De Copilots a Redes de Agentes Powered by
  • 4. Email Endpoints Phishing Email Open Attachment Cross Modality Attacks Click a URL Browse to a website Exploitation and installation Command and Control Identities Workloads User account is compromised Attacker collects reconnaissance and configuration data Brute force account or use stolen account credentials Attacker exfiltrates sensitive data Cloud apps Attacker compromises a privileged account Domain is compromised Services stopped and backups deleted Files encrypted on additional hosts Multiple data sources, from multiple providers
  • 5. Resources and tools can't match the evolving threat landscape Understaffed and Outmatched New, complex regulations CISOs personally responsible Legal, Regulatory, and Compliance Pressure AI-powered threats: reinforced, learned, faster, more sophisticated, more destructive, and syndicated New Era of Cyber Threats Data explosion. More complex, expanding and ever-changing attack surfaces: AI, cloud, OT/ICS, and 5G Digital Tsunami Security Teams The New Reality of Security Operations
  • 7. The Rise of Agentic AI: From Collaboration to Autonomous Intelligence
  • 8. AI Agent vs Process
  • 9. AI Agent vs Process SX Policy Agent for dynamic, AI- generated detection logic SX Response Agent for automated alert triage and remediation

Editor's Notes

  • #3: Recordemos los elementos de un proceso general de gestión de incidentes
  • #4: Los ataques son una cadena sucesiva de eventos. No eventos aislados
  • #5: La problemática así como el proceso sigue siendo el mismo. La diferencia es el entorno y las exigencias asociadas
  • #7: Recordemos los elementos de un proceso general de gestión de incidentes
  • #8: Recordemos los elementos de un proceso general de gestión de incidentes
  • #9: Recordemos los elementos de un proceso general de gestión de incidentes