Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join our Content Plan or become a contributor by posting your own personally-authored content into the system via Add Publication or Import Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Jonathan Ariel Rivera Alarcon
Instituto profesional IACC at Instituto profesional IACC
santiago chile, Chile
I'm an IT professional with over 7 years of experience in roles such as teaching, IT management, data analysis, and cybersecurity, having worked as a Cybersecurity Analyst, IT Security Engineer, SOC Operator, Senior Cyber Defense Analyst, and in Cyber Threat Hunting.
I hold certifications in ISO 27001, Scrum Master, ISO 9001, and ISO/IEC 20000 IT Service Management Associate, along with diplomas in Projects, Big Data, Mobile Application Development, Cybersecurity, and more.
I have a Master's degree in Cybersecurity, Cybercrime, and Cyber Delinquency, and an MBA. I have completed a Master's in Information Systems and Technology Management and a Specialization in Artificial Intelligence. Currently, I'm studying for a Technical Degree in Computer Analysis and Programming.
My goal is to improve the efficiency and security of IT operations, facing new challenges, and working in multidisciplinary teams to achieve business success.
Education:
Master's in Cybersecurity and Cybercrime
Master's in Senior Management and Strategic Management
Master's in Business Expert - Business Management and Administration (MBA)
Master's in Information Systems and Technology Management
Master's in Cybersecurity
Master's in Senior Management and Strategic Management
Specialization in Artificial Intelligence
Technical Degree in Computer Analysis and Programming (in progress)
Engineering in Connectivity and Networks
Diplomas:
Projects
Big Data
Mobile Application Development
Cybersecurity
Ethical Hacking
IT Auditing
Business Intelligence
IoT and Cloud
Artificial Intelligence and Deep Learning
Certifications:
ISO 27001
Scrum Master
ISO 9001
Professional Certificate - Expert in Information and Security Systems
ISO/IEC 20000 IT Service Management Associate
Among others
Skills:
Cybersecurity
Data Analysis
IT Management
Cyber Defense
Threat Hunting
Artificial Intelligence
Software Development
Big Data
Ethical Hacking
Contact:
Email: jona1232@outlook.com
LinkedIn: Jonathan Rivera Alarcon
Available For: Consulting, Speaking Travels From: santiago chile
Speaking Topics: cibersegurity , Artificial Intelligence
Jonathan Ariel Rivera Alarcon
Points
Academic
0
Author
50
Influencer
0
Speaker
0
Entrepreneur
0
Total
50
Points based upon Thinkers360 patent-pending algorithm.
"CISO Strategies - Chapter 4: Implementing COBIT 5 for IT Governance and Cybersecurity Management"
LinkedIn
November 22, 2024
The article "CISO Strategies - Chapter 4" explores the implementation of the COBIT 5 framework in IT governance and cybersecurity management. It highlights the importance of the 37 processes within COBIT 5, demonstrating their application in public and private organizations. By aligning IT with business objectives, the framework helps mitigate risks, optimize resources, and ensure stakeholder transparency. The article includes theoretical and practical examples, offering a comprehensive guide for CISOs to strategically address modern cybersecurity challenges while achieving organizational goals.
"Getting Started in Industrial Cybersecurity - Chapter 13: Protocols IS-IS and VTP – Origins, Technical Analysis, and Applications in Industrial Infrastructure"
LinkedIn
November 20, 2024
Chapter 13 explores the critical roles of IS-IS and VTP protocols in industrial networks. This article delves into their origins, technical features, and applications, highlighting how they enable efficient routing and network segmentation. Real-world configurations are provided for routers and switches from leading manufacturers like Cisco, Huawei, Mikrotik, and Juniper. The discussion emphasizes their relevance in securing networks across industries such as mining, power plants, transportation, and large-scale manufacturing, ensuring reliable and robust data flow in critical infrastructures.
Military Cyber Intelligence: A Strategic Tool for National Security
LinkedIn
November 16, 2024
Military cyber intelligence is an essential tool for identifying, analyzing, and neutralizing cyber threats to national security. It focuses on protecting critical infrastructures, preventing cyberattacks, and securing sensitive information. This article explores its theoretical foundations and practical applications, offering real-world examples and strategies for governments and defense organizations to strengthen their cybersecurity frameworks.
CISO Strategies - Chapter 3: Implementing ITIL 4 for CISOs: IT Governance and Cybersecurity Management Strategies
LinkedIn
November 13, 2024
This article delves into the role of ITIL 4 for CISOs in building a robust cybersecurity framework aligned with organizational goals. It explains the 34 ITIL 4 practices with theoretical and practical examples for both public and private sectors. The article also details how each practice enhances IT governance, risk management, and cybersecurity resilience, making ITIL 4 a valuable strategy for addressing today's cyber threats and driving secure digital transformation.
Starting in Industrial Cybersecurity - Chapter 12: Understanding RIP and Spanning Tree Protocols
LinkedIn
November 11, 2024
This article explores RIP and Spanning Tree protocols within the scope of industrial cybersecurity, analyzing their origins, characteristics, and technical applications in networks for critical sectors such as mining, energy, and manufacturing. Practical configurations on Cisco, Huawei, Mikrotik, and Juniper devices are provided to illustrate how these protocols enhance stability and security in industrial networks. The article emphasizes the importance of implementing these protocols to ensure operational continuity and protect industrial infrastructure from potential failures or threats.
The Role of Transformers in Artificial Intelligence: Revolutionizing Generative AI and Beyond
LinkedIn
November 08, 2024
Transformers are a groundbreaking neural network architecture introduced in the 2017 paper "Attention Is All You Need". Unlike traditional models, Transformers utilize an "attention" mechanism that allows the model to focus on important parts of input data, such as specific words in a sentence. This architecture has driven significant advancements in Natural Language Processing (NLP) and generative AI, powering well-known models like BERT and GPT. Beyond NLP, Transformers are applied in fields like computer vision and time-series analysis, transforming industries from IT to healthcare. Their scalability and efficiency mark a pivotal shift in AI's evolution.
CISO Strategies - Chapter 2: Understanding IT Governance Before Creating a Cybersecurity Policy
LinkedIn
November 07, 2024
This article explores essential cybersecurity strategies for CISOs, emphasizing the need to understand IT governance frameworks like COBIT5, ITILv4, and ISO 38500 before implementing a cybersecurity policy. It highlights how aligning security measures with these frameworks and assessing the organization's digital transformation status can strengthen risk management and protect critical data. Aimed at technical and executive professionals, the article underscores the importance of integrating cybersecurity practices within the broader IT governance structure.
Getting Started with Industrial Cybersecurity - Chapter 11
LinkedIn
November 06, 2024
This article explores the critical role of network routing protocols like OSPF (Open Shortest Path First) and static routing in the context of industrial cybersecurity. It discusses the origins, functionalities, and practical applications of OSPF and static routing, with a particular focus on their importance in securing industrial networks. Configuration examples are provided for routers from major brands such as Cisco, Huawei, MikroTik, and Juniper. The article emphasizes the necessity of understanding these protocols to safeguard industrial systems, monitor network traffic, and protect against cyber threats in critical infrastructure.
CISO Strategies: Chapter 1
LinkedIn
November 04, 2024
This article explores essential cybersecurity strategies with a focus on access control and encryption. It covers the fundamentals of building a comprehensive security program, including risk analysis, establishing clear security policies, and implementing access control models like Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and multifactor authentication. Additionally, it highlights the importance of data encryption to safeguard sensitive information in transit and at rest, along with best practices for organizations to enhance their overall security posture.
"The Use of Big Data and Artificial Intelligence in Satellites for Climate and Environmental Monitoring"
LinkedIn
November 03, 2024
This article explores how the combined use of Big Data and Artificial Intelligence (AI) in satellites is transforming climate and environmental monitoring. Through real-time data analysis and sensors, satellites can detect significant patterns and changes on the planet, from water quality variations to the impact of climate change in urban and natural areas. AI enables the rapid and accurate processing of large data volumes, while Big Data stores and organizes this information for large-scale analysis. Practical applications and real examples highlight the essential role these technologies play in environmental protection and conservation.
"Artificial Intelligence Regulations in Latin America: An Imperative for Citizen Protection and Corporate Responsibility."
medium
November 03, 2024
The publication analyzes the urgent need to regulate the use of artificial intelligence (AI) in Latin America to prevent issues such as misinformation, bias, and the irresponsible use of this technology. By incorporating international standards like ISO 42001:2023 and the AI Risk Management Framework, it emphasizes the role of governments and corporations in ensuring transparency, security, and ethics in the implementation of AI systems. The publication proposes oversight measures and corporate responsibility to promote the safe and beneficial development of AI in the region, advocating for a regulatory framework tailored to the needs of citizens.
Chapter 10: Introduction to Industrial Cybersecurity Networks and Protocols: OSI and TCP/IP Models in Industrial Environments
LinkedIn
November 02, 2024
This article provides an in-depth overview of the OSI and TCP/IP network models, detailing their historical origins, structural layers, and technical applications in industrial settings. It also covers essential routing protocols, such as EIGRP, RIP, OSPF, MPLS, BGP, and IS-IS, explaining their role in device connectivity within networks. Additionally, configuration examples for Cisco, Huawei, Mikrotik, and Juniper routers are included. Understanding these protocols is crucial in industrial cybersecurity for creating firewall rules and network structures that protect organizational systems.
"Artificial Intelligence in Enhancing Research in Science and Engineering"
LinkedIn
October 29, 2024
The article discusses the transformative role of artificial intelligence (AI) in scientific and engineering research, highlighting its capacity to revolutionize various fields of knowledge. AI's ability to analyze and process large volumes of data makes it an invaluable ally for researchers seeking new discoveries and innovative solutions.
Key Themes:
Data Cleaning and Analysis: One of the significant challenges in research is ensuring data quality. AI assists in cleaning and structuring both quantitative and qualitative data, removing inconsistencies and biases that could impact results. In fields like medicine, AI utilizes machine learning techniques to identify patterns and anomalies in datasets, allowing researchers to focus on relevant information with tools like Python and libraries such as pandas and scikit-learn.
Support for New Scientific Discoveries: Beyond data quality improvement, AI facilitates new discoveries by identifying correlations and trends that may be overlooked by researchers. This capability is crucial in biomedicine, where drug development relies on understanding complex interactions between chemical compounds and biological targets. Deep learning algorithms can analyze large chemical databases to predict the efficacy of new compounds, thereby streamlining the drug development process.
Mitigating Biases and Research Flaws: Research biases can lead to erroneous conclusions and undermine the validity of results. AI can help detect and mitigate these biases by analyzing data from multiple perspectives and applying algorithms that adjust findings based on confounding variables. Training AI effectively involves collecting diverse data, continuous evaluation, and fostering interdisciplinary collaboration.
Applications in Academic and Non-Academic Research: AI is applicable in various contexts, both academic and commercial. In academia, it enhances the robustness and precision of research, while in the business sector, it drives innovation and operational efficiency. For instance, the pharmaceutical industry can leverage AI to predict health trends and medication demand, improving planning and distribution.
Conclusion:
Artificial intelligence represents a unique opportunity to enhance the quality and effectiveness of research across diverse fields of science and engineering. Through data cleaning, support for new discoveries, and bias elimination, AI serves as a valuable resource for researchers and enterprises. To maximize its potential, it is essential to train AI models adequately and encourage interdisciplinary collaboration, paving the way for a future filled with possibilities in science and engineering.
Tags: AI, Digital Transformation, Predictive Analytics
"Getting Started in Industrial Cybersecurity: Chapter 9"
LinkedIn
October 26, 2024
This article, "Getting Started in Industrial Cybersecurity: Chapter 9," examines the critical role of network segmentation in protecting industrial infrastructure in sectors like mining, energy, transportation, and large-scale manufacturing. Segmentation enhances security by isolating operational areas and reducing the spread of cyber threats. The article also covers the Ethernet protocol, its evolution in industrial networks, firewall configuration, IPS/IDS systems, and VLAN setup examples on leading routers. This theoretical and practical guide equips cybersecurity professionals with essential tools and strategies to safeguard control and communication systems, ensuring operational security and continuity in critical environments.
"Introduction to Industrial Cybersecurity: Chapter 8 - Monitoring and Security in Critical Infrastructure: Focus on CMM and Industrial Protocols"
https://www.linkedin.com/pulse/iniciando-en-ciberseguridad-industrial-cap%25C3%25ADtulo-8-y-rivera-a-msc-x3-w8kue/
October 19, 2024
This article delves into the configuration and security of the Siemens S7 protocol in routers, with a focus on protecting critical infrastructure in industries such as mining, energy, transportation, and large-scale manufacturing. It explains how to securely manage Siemens S7 traffic through firewall, ACL, and VPN configurations to safeguard programmable logic controllers (PLCs) used in industrial automation systems. Additionally, it covers essential cybersecurity practices to ensure operational continuity and outlines contingency plans for incidents that may impact industrial plant production.
The Use of Machine Learning and Deep Learning for Climate Prediction: Optimization of Climatological Models
LinkedIn
October 19, 2024
This article explores the application of machine learning and deep learning in climate prediction, emphasizing how artificial intelligence can enhance the accuracy and optimization of climatological models. Key applications such as predicting temperature, humidity, and air pollution levels are discussed, leveraging large datasets (big data) and advanced AI techniques. Practical examples of implementation in Python and R are provided, along with the use of platforms like Google DeepMind to develop more precise and efficient models for predicting extreme weather events.
Tags: Big Data, Climate Change, Predictive Analytics
Getting Started with Industrial Cybersecurity: Chapter 7 - Securing Siemens S7 with VPN SSL
LinkedIn
October 05, 2024
The article "Getting Started with Industrial Cybersecurity: Chapter 7" focuses on the configuration and protection of industrial monitoring tools like PLC and SCADA systems, particularly through the use of VPN SSL to secure communications over the Siemens S7 protocol. It highlights the most recognized router brands, such as Cisco, Huawei, MikroTik, and Juniper, and provides detailed steps for configuring a VPN SSL on each. The article also emphasizes the importance of firmware updates, asset inventory management, and adhering to ISO 22301 for business continuity in key industries like mining, energy, transportation, and manufacturing.
"Implementing Student Support Plans and Enhancing Academic Performance through Artificial Intelligence"
LinkedIn
October 05, 2024
This article explores the application of artificial intelligence, specifically through machine learning and deep learning models, to measure and improve students' academic performance. It outlines practical strategies for collecting and preprocessing relevant data and applying predictive models to identify students at risk of underperforming.
The article emphasizes the importance of implementing personalized support plans, including tutoring, emotional counseling, and additional resources, aimed at addressing each student's specific needs. It also proposes a continuous monitoring system to assess student progress and adjust interventions as necessary.
With code examples in Python, R, and SPSS, the article provides concrete tools for educational institutions to apply these models in their daily operations, facilitating continuous improvement in teaching and optimizing the learning experience for all students. In summary, the article advocates for a more personalized, data-driven approach to education, supporting teachers in designing effective plans that promote academic success.
Big Data and Data Analysis in Education: Transforming Academic Performance with Lirmi."
LinkedIn
September 28, 2024
The article "Big Data and Data Analysis in Education: Transforming Academic Performance with Lirmi" examines how the use of Big Data and data analysis tools can enhance educational quality in primary, secondary, and higher education institutions. It highlights the Lirmi platform as an effective solution for collecting and analyzing academic data, enabling educators to streamline administrative processes and focus on teaching.
Through practical examples, the article illustrates how gathering data on student performance allows for the identification of patterns and the design of personalized strategies that positively impact student grades and motivation. It also addresses the importance of these tools in universities, where data analysis helps adjust academic programs and improve student retention.
In conclusion, the use of Big Data and data analysis in education offers significant opportunities to transform teaching and ensure more effective learning tailored to students' needs.
Chapter 6: Industrial Cybersecurity - Monitoring Tools and Critical Infrastructure Protection
LinkedIn
September 27, 2024
This article explores the configuration of VPN and IPsec on industrial routers from brands like Cisco, Huawei, Mikrotik, and Juniper to secure communications using the BACnet protocol, commonly employed in automation systems for production plants, mining, energy, and more. It provides technical details for setting up encrypted tunnels to protect critical infrastructure from cyberattacks, including ransomware threats. Additionally, it highlights the importance of security tools like SIEM, XDR, and EDR to ensure the protection of industrial networks.
Artificial Intelligence in Astrophysics: Optimizing Scientific Discoveries
LinkedIn
September 22, 2024
This article explores the use of artificial intelligence (AI) in astrophysics, focusing on how technologies like Deep Learning, Machine Learning, neural networks, linear regressions, and clustering techniques are transforming data analysis. It highlights applications in the search for exoplanets, black holes, stars, and supernovae, optimizing scientific discoveries. The article also provides practical examples of Python and R code, demonstrating how these tools can enhance research accuracy and efficiency, reduce bias, and open new avenues for exploring the universe, including the search for dark matter and habitable planets.
Use of Artificial Intelligence in Firewalls: Deep Learning and Machine Learning for Threat Detection
LinkedIn
September 22, 2024
This article explores the use of artificial intelligence (AI) in firewalls to enhance the detection and mitigation of cyber threats such as malware and ransomware. It discusses how machine learning and deep learning models have transformed tools like Palo Alto Networks NGFW, FortiGate, Sophos XG, and Cisco Secure Firewall. Through practical examples of configurations and commands, the article illustrates how these advanced solutions enable proactive identification of unknown attacks and automate responses. AI not only improves the protection of organizational infrastructures but also continuously adapts to new attacker tactics, ensuring more robust cybersecurity.
Starting with Industrial Cybersecurity – Chapter 5: Securing MES in Industry
LinkedIn
September 21, 2024
Title: Starting with Industrial Cybersecurity – Chapter 5: Securing MES in Industry
Review: This article delves into the Manufacturing Execution System (MES), a critical tool for monitoring and managing processes in industries such as mining, energy, transportation, and large-scale manufacturing. It emphasizes the importance of safeguarding these systems against cyberattacks and ransomware using security measures like VLAN segmentation, next-generation firewalls (NGFW), and intrusion detection systems (IDS).
The article also provides a technical analysis of the Niagara Fox Protocol, focusing on how to secure communications through TLS encryption, network monitoring, and access control, with practical configuration examples. It highlights the need to protect critical infrastructure and the potential risks of not implementing proper cybersecurity solutions.
Use Case: IP Blacklisting and URL Blocking on Endpoint Security Platforms
LinkedIn
September 12, 2024
This article explores the use of IP blacklisting and URL blocking on endpoint security platforms such as Apex One, Vision One (Trend Micro), Smart Protection Server 3.0, Kaspersky, Fortinet, ESET, and Microsoft Defender. It details how these solutions enable administrators to block real-time threats, prevent malicious access, and mitigate cybersecurity risks. Practical examples are provided to demonstrate how to implement these features, effectively protecting corporate networks and reducing the attack surface.
"Application of Artificial Intelligence in the Search for New Quantum Particles and the Study of Dark Matter"
LinkedIn
September 10, 2024
The article discusses the application of Artificial Intelligence (AI), including machine learning, deep learning, and neural networks, in the field of quantum calculations to optimize the search for new particles and states of matter. It explores how these technologies can identify hidden patterns in CERN data, improve data cleaning, and accelerate scientific discoveries, such as dark matter. The article also includes a practical Python and Qiskit code example, leveraging supercomputers' capabilities to perform more precise quantum simulations.
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?