{"id":6627,"date":"2021-11-05T07:33:44","date_gmt":"2021-11-05T06:33:44","guid":{"rendered":"https:\/\/immune.institute\/?p=6627"},"modified":"2021-11-05T07:33:44","modified_gmt":"2021-11-05T06:33:44","slug":"miguel-rego-estudiar-ciberseguridad","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/miguel-rego-estudiar-ciberseguridad\/","title":{"rendered":"Interview with Miguel Rego- Computer security expert"},"content":{"rendered":"<h2>How is our country doing in terms of cybersecurity?<\/h2>\n<p><b>Miguel Rego is a true computer security expert.<\/b><span style=\"font-weight: 400;\">. In addition to his military career (he is a Lieutenant Colonel in the Army Quartermaster Corps), he has a long career in the field of cybersecurity.\u00a0<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">He has been an executive at major brands such as Deloitte and EY, as well as working in public organisations.<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">In this way, between 2013-2016 he held the position of Director General of INCIBE (National Institute of Cybersecurity) and, for some years now, he has been a teacher. Currently, he holds the post of <\/span><b>IMMUNE's cybersecurity area director<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today we are going to talk to him in depth about this field of work, which is in full expansion due to the boom in cyberattacks in our country in recent times. In 2020, Spain was the third country to suffer attacks of this type.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Firstly, in your opinion, is Spanish society aware of the dangers of the net?<\/span><\/h3>\n<p><b>Spanish society should be made aware of the dangers of the net.<\/b><span style=\"font-weight: 400;\"> Spain is a country in which 94% of the population uses the internet systematically and more than 30 million use social networks on a daily basis. Therefore, we are digital users and we must be aware of what measures we should incorporate in our daily lives to be protected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A lot of effort has been made in recent years at the National Cyber Security Institute through media campaigns; but <\/span><b>we are only at the beginning of this journey<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How is our country doing in terms of cybersecurity?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Big business puts a lot of effort and concern into cyber-security and in <\/span><b>how to protect yourself against cyber risks<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case of SMEs it depends a bit: it goes by sector and maybe by size. Those that would be in a situation of <\/span><b>micro-SMEs would be the most vulnerable<\/b><span style=\"font-weight: 400;\"> In contrast, medium-sized companies with a more technological component would be comparable to large companies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As for citizens, they are progressively incorporating these self-protection measures.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">So, should any company devote part of its budget to IT security?\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Companies have to devote a percentage of their spending to cyber security, <\/span><b>in relation to the investment they devote to digitisation<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is no magic formula for how much to spend on CIBERs in relation to IT investment; but in general terms best practice advises <\/span><b>between 10 and 14% <\/b><span style=\"font-weight: 400;\">of what they spend on digitisation should be spent on cyber security.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Can we say that \"cybersecurity\" is synonymous with \"investment\"?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Sometimes we try to give cyber security a different focus than the other risks a company faces, but in reality it has to be treated in the same way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What needs to be done is to normalise this situation and <\/span><b>incorporating cyber risks as part of operational risks<\/b><span style=\"font-weight: 400;\">within the same model. Devote the same effort and budget proportional to the impact, the damage, that the materialisation of these risks may have on the company's activity.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">What measures should an organisation take to work on its IT security?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The first thing that any company considering improving its cybersecurity level has to do - it is very obvious - is to know how it is doing. Knowing how it is from the point of view of its processes, its organisation and also its technology. <\/span><b>You need to know what your maturity level is and where you should be, depending on your business activity.<\/b><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Once that exercise is done, a series of measures have to be incorporated, ranging from developing policies and procedures, to investing in technology and, very importantly, people.<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">In the end, no matter how smart technology is, no matter how much we are moving towards artificial intelligence and <\/span><i><span style=\"font-weight: 400;\">machine learning<\/span><\/i><span style=\"font-weight: 400;\">People are fundamental.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is therefore necessary to <\/span><b>equipping companies with a cybersecurity department<\/b><span style=\"font-weight: 400;\">The right talent, matching your specific needs.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How is the job market for cybersecurity and are these experts in demand?<\/span><\/h3>\n<p><b>Cybersecurity is a highly demanding market<\/b><span style=\"font-weight: 400;\">Why is this a long way from maturity? Because companies continue to digitise, and not only companies: states, governments, public institutions, the personal sphere...\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We are increasingly digital, and as we are increasingly digital, cyber risks are increasingly present. Therefore, <\/span><b>the more digitisation, the more risk and the greater the need for professionals.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">At the moment, we are not able to meet the current need with professionals. <\/span><b>Therefore, if I were to go back to school, I would do the same as I have done so far: focus on the world of cybersecurity.<\/b><\/p>\n<h3><span style=\"font-weight: 400;\">What kind of professional can specialise in cybersecurity?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The great advantage that cybersecurity has is that, although we associate it with the hacker (that person with deep technical knowledge), we can say that it is <\/span><b>multidisciplinary<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is true that the 'cybersecurity edifice' cannot only be built with lawyers, sociologists, economists... because without the hacker piece, that edifice would fall down.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That said, <\/span><b>the scope of cyber security is very broad<\/b><span style=\"font-weight: 400;\">. There are issues related to social engineering (how people's lack of knowledge or weaknesses can be exploited to initiate an attack), where sociologists have an important field. Regulation is also very important: lawyers on the issues of <\/span><i><span style=\"font-weight: 400;\">compliance <\/span><\/i><span style=\"font-weight: 400;\">have a very important role to play.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I, in the end, throughout my professional career, continue to see <\/span><b>different profiles together with computer or telecommunication engineers.<\/b><span style=\"font-weight: 400;\">I see industrial engineers, naval engineers, civil engineers, physicists, mathematicians, sociologists, economists... it is such a complicated and extensive field that, in the end, any background from any career (even humanities) has a chance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So when you start working in cyber security, you have 2 initial components: if you come from a very technical world, I would say the <\/span><b>analyst career<\/b><span style=\"font-weight: 400;\"> would be a very good way out; whereas, if one comes from a less technical background, the <\/span><b>consulting career<\/b><span style=\"font-weight: 400;\"> can be very interesting.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Finally, why study a master's degree in cybersecurity like the one we offer at IMMUNE?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">There is one fundamental thing: <\/span><b>IMMUNE's clear orientation towards the professional outlets that IMMUNE has in its <\/b><b><i>core<\/i><\/b><b>in the deepest part of the world<\/b><span style=\"font-weight: 400;\">. In other words, training must clearly serve to help young - and perhaps not so young - people to find a professional opportunity in the digital field and also in cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IMMUNE's cybersecurity proposal seeks to, in a modular way, <\/span><b>offer different itineraries<\/b><span style=\"font-weight: 400;\"> The role of a consultant, analyst or engineer really fits very well with what both public and private organisations are asking for.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to become a computer security professional like Miguel Rego, at IMMUNE we have this <\/span><a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\"><span style=\"font-weight: 400;\">Cybersecurity Master<\/span><\/a><span style=\"font-weight: 400;\"> for your specialisation.\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00bfC\u00f3mo se encuentra nuestro pa\u00eds a nivel de ciberseguridad? Miguel Rego es un verdadero experto en seguridad inform\u00e1tica. Adem\u00e1s de su carrera militar (es Teniente Coronel del Cuerpo de Intendencia de la Armada), cuenta con una larga trayectoria en el \u00e1mbito de la ciberseguridad.\u00a0 Ha sido directivo en grandes marcas como Deloitte y EY, adem\u00e1s [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8082,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-6627","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=6627"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6627\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/8082"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=6627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=6627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=6627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}