{"id":39837,"date":"2025-07-18T18:18:16","date_gmt":"2025-07-18T16:18:16","guid":{"rendered":"https:\/\/smartfense.com\/blog\/lo-que-tu-siem-no-ve-y-los-atacantes-si-como-integrar-el-comportamiento-humano-a-tu-estrategia-de-deteccion\/"},"modified":"2025-12-18T14:06:07","modified_gmt":"2025-12-18T13:06:07","slug":"what-your-siem-doesnt-see","status":"publish","type":"post","link":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/","title":{"rendered":"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy"},"content":{"rendered":"<p>In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls, EDRs, or traditional monitoring. Modern security management requires an approach that integrates technology with human behavior. <strong>And this is where SIEM (Security Information and Event Management) and awareness converge in a critical<\/strong>, yet still underutilized, way.<\/p>\n<h3 data-start=\"693\" data-end=\"716\"><strong data-start=\"697\" data-end=\"716\">What Is a SIEM?<\/strong><\/h3>\n<p><strong>SIEM (Security Information and Event Management)<\/strong> systems are platforms designed to collect, correlate, analyze, and visualize security events generated by different systems and devices across an organization\u2019s technology infrastructure: firewalls, servers, applications, endpoints, domain controllers, and more. Among other capabilities, SIEMs allow organizations to:<\/p>\n<ul>\n<li><strong>Gain a centralized<\/strong>, <strong>real-time view<\/strong> of what is happening across the entire digital ecosystem.<\/li>\n<li><strong>Detect incidents<\/strong> <strong>early<\/strong> by identifying anomalous behavior patterns, unauthorized access, and other indicators.<\/li>\n<li><strong>Automate responses<\/strong> to certain events, reduce reaction times, and contain incidents more quickly.<\/li>\n<\/ul>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-37894\" src=\"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg\" alt=\"SIEM\" width=\"1200\" height=\"630\" srcset=\"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg 1200w, https:\/\/smartfense.com\/file\/2025\/07\/SIEM-300x158.jpg 300w, https:\/\/smartfense.com\/file\/2025\/07\/SIEM-1024x538.jpg 1024w, https:\/\/smartfense.com\/file\/2025\/07\/SIEM-768x403.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h3>The Missing Link: User Behavior<\/h3>\n<p>Imagine the following scenario: a user repeatedly fails phishing simulations, accesses suspicious content in awareness modules, or ignores warnings about weak passwords. Today, in most organizations, these events remain isolated within e-learning platforms or HR reports. <strong>They never reach the SIEM. They don\u2019t trigger alerts. They don\u2019t activate preventive controls.<\/strong><\/p>\n<p>This is a problem.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-37899\" src=\"https:\/\/smartfense.com\/file\/2025\/07\/Firefly_una-persona-pulsando-un-boton-rojo-461653.jpg\" alt=\"Boton de reporte\" width=\"1920\" height=\"1493\" \/><\/p>\n<h3>Interventions: Human Behavior That Feeds SIEM Intelligence<\/h3>\n<p>Having an awareness platform that can integrate with an organization\u2019s security ecosystem allows us not only to detect cybersecurity-related events and actively coach people, but also to directly intervene in the <strong>most critical cases<\/strong>.<\/p>\n<p>To enable this, we developed <strong>Interventions<\/strong>: automated actions that are executed when a triggering event occurs and allow our platform to communicate with external security tools.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-37904\" src=\"https:\/\/smartfense.com\/file\/2025\/07\/Sin-titulo-4.jpg\" alt=\"Intervencion\" width=\"1920\" height=\"1280\" srcset=\"https:\/\/smartfense.com\/file\/2025\/07\/Sin-titulo-4.jpg 1920w, https:\/\/smartfense.com\/file\/2025\/07\/Sin-titulo-4-300x200.jpg 300w, https:\/\/smartfense.com\/file\/2025\/07\/Sin-titulo-4-1024x683.jpg 1024w, https:\/\/smartfense.com\/file\/2025\/07\/Sin-titulo-4-768x512.jpg 768w, https:\/\/smartfense.com\/file\/2025\/07\/Sin-titulo-4-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<p>For example, if a user clicks on a malicious URL, we can go beyond sending a notification or delivering additional training. We can also apply a conditional access policy in the directory service to temporarily disable that user\u2019s access to critical applications.<\/p>\n<p>Or, if someone sends a message containing sensitive information via Slack, it\u2019s possible not only to alert the user but also to automatically delete the message through an intervention.<\/p>\n<p>In this context, the range of possibilities is enormous.<\/p>\n<h3>Why Is This a Paradigm Shift?<\/h3>\n<p>Because it moves us from passive awareness\u2014where we expect users to behave correctly after training\u2014to active awareness, fully integrated into the organization\u2019s cybersecurity ecosystem. Interventions transform learning signals into concrete risk indicators, powerful enough to dynamically adjust the security posture in real time.<\/p>\n<h3>Toward Adaptive, Behavior-Based Response<\/h3>\n<p>Attackers evolve\u2014and our defenses must evolve with them. Integrating user behavior events into SIEM systems enables security responses that are more accurate, faster, and more personalized.<\/p>\n<p>With <strong>Interventions<\/strong>, we close the loop: from <strong>awareness<\/strong>, to detection, to concrete action across the infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls, EDRs, or traditional monitoring. Modern security [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":37911,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[686],"tags":[2105,2132,1577,2104,2135,849,1139,2133,2131,2134],"class_list":["post-39837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-behavioral-security","tag-cybersecurity-detection","tag-human-behavior","tag-human-risk","tag-incident-response","tag-phishing-en","tag-security-awareness","tag-security-operations","tag-siem","tag-threat-detection"],"acf":[],"yoast_head":" \n<title>What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy - SMARTFENSE - Awareness in Cyber Security<\/title>\n<meta name=\"description\" content=\"behavioral security, cybersecurity detection, human behavior, human risk, incident response, phishing, Security Awareness, security operations, SIEM, threat detection - In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls,What your SIEM doesn\u2019t see can still put your organization at risk. Learn how integrating human behavior and awareness signals improves detection, response, and security outcomes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy - SMARTFENSE - Awareness in Cyber Security\" \/>\n<meta property=\"og:description\" content=\"behavioral security, cybersecurity detection, human behavior, human risk, incident response, phishing, Security Awareness, security operations, SIEM, threat detection - In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls,What your SIEM doesn\u2019t see can still put your organization at risk. Learn how integrating human behavior and awareness signals improves detection, response, and security outcomes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/\" \/>\n<meta property=\"og:site_name\" content=\"SMARTFENSE - Awareness in Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-18T16:18:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-18T13:06:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"645\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Pablo Abratte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@carolina\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pablo Abratte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/\"},\"author\":{\"name\":\"Pablo Abratte\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/person\\\/8ff5c1b5478353f46788598b0dcfa353\"},\"headline\":\"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy\",\"datePublished\":\"2025-07-18T16:18:16+00:00\",\"dateModified\":\"2025-12-18T13:06:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/\"},\"wordCount\":479,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SIEM.jpg-1.webp\",\"keywords\":[\"behavioral security\",\"cybersecurity detection\",\"human behavior\",\"human risk\",\"incident response\",\"phishing\",\"Security Awareness\",\"security operations\",\"SIEM\",\"threat detection\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/\",\"name\":\"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy - SMARTFENSE - Awareness in Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SIEM.jpg-1.webp\",\"datePublished\":\"2025-07-18T16:18:16+00:00\",\"dateModified\":\"2025-12-18T13:06:07+00:00\",\"description\":\"behavioral security, cybersecurity detection, human behavior, human risk, incident response, phishing, Security Awareness, security operations, SIEM, threat detection - In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls,What your SIEM doesn\u2019t see can still put your organization at risk. Learn how integrating human behavior and awareness signals improves detection, response, and security outcomes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#primaryimage\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SIEM.jpg-1.webp\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SIEM.jpg-1.webp\",\"width\":1000,\"height\":645,\"caption\":\"SIEM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/blog\\\/what-your-siem-doesnt-see\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\",\"name\":\"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/smartfense.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\",\"name\":\"SMARTFENSE\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"width\":241,\"height\":40,\"caption\":\"SMARTFENSE\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/person\\\/8ff5c1b5478353f46788598b0dcfa353\",\"name\":\"Pablo Abratte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6e1ecad57268a55f91dd11a1b9d227dd1eb22e04a3a299f9feb1026777cb8afc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6e1ecad57268a55f91dd11a1b9d227dd1eb22e04a3a299f9feb1026777cb8afc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6e1ecad57268a55f91dd11a1b9d227dd1eb22e04a3a299f9feb1026777cb8afc?s=96&d=mm&r=g\",\"caption\":\"Pablo Abratte\"},\"description\":\"Experto en Gamificaci\u00f3n. Con m\u00e1s de 15 a\u00f1os de experiencia en docencia y desarrollo de software, Pablo combina una mirada pedag\u00f3gica profunda con un s\u00f3lido dominio t\u00e9cnico. A lo largo de su carrera, ha explorado m\u00faltiples estrategias de ense\u00f1anza, incluyendo el uso del juego y los videojuegos como herramientas para facilitar el aprendizaje y el cambio de comportamiento.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/carolina\"],\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/author\\\/pablo\\\/\"}]}<\/script>\n ","yoast_head_json":{"title":"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy - SMARTFENSE - Awareness in Cyber Security","description":"behavioral security, cybersecurity detection, human behavior, human risk, incident response, phishing, Security Awareness, security operations, SIEM, threat detection - In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls,What your SIEM doesn\u2019t see can still put your organization at risk. Learn how integrating human behavior and awareness signals improves detection, response, and security outcomes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/","og_locale":"en_US","og_type":"article","og_title":"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy - SMARTFENSE - Awareness in Cyber Security","og_description":"behavioral security, cybersecurity detection, human behavior, human risk, incident response, phishing, Security Awareness, security operations, SIEM, threat detection - In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls,What your SIEM doesn\u2019t see can still put your organization at risk. Learn how integrating human behavior and awareness signals improves detection, response, and security outcomes.","og_url":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/","og_site_name":"SMARTFENSE - Awareness in Cyber Security","article_published_time":"2025-07-18T16:18:16+00:00","article_modified_time":"2025-12-18T13:06:07+00:00","og_image":[{"width":1000,"height":645,"url":"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg-1.webp","type":"image\/webp"}],"author":"Pablo Abratte","twitter_card":"summary_large_image","twitter_creator":"@carolina","twitter_misc":{"Written by":"Pablo Abratte","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#article","isPartOf":{"@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/"},"author":{"name":"Pablo Abratte","@id":"https:\/\/smartfense.com\/en\/#\/schema\/person\/8ff5c1b5478353f46788598b0dcfa353"},"headline":"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy","datePublished":"2025-07-18T16:18:16+00:00","dateModified":"2025-12-18T13:06:07+00:00","mainEntityOfPage":{"@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/"},"wordCount":479,"commentCount":0,"publisher":{"@id":"https:\/\/smartfense.com\/en\/#organization"},"image":{"@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#primaryimage"},"thumbnailUrl":"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg-1.webp","keywords":["behavioral security","cybersecurity detection","human behavior","human risk","incident response","phishing","Security Awareness","security operations","SIEM","threat detection"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/","url":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/","name":"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy - SMARTFENSE - Awareness in Cyber Security","isPartOf":{"@id":"https:\/\/smartfense.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#primaryimage"},"image":{"@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#primaryimage"},"thumbnailUrl":"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg-1.webp","datePublished":"2025-07-18T16:18:16+00:00","dateModified":"2025-12-18T13:06:07+00:00","description":"behavioral security, cybersecurity detection, human behavior, human risk, incident response, phishing, Security Awareness, security operations, SIEM, threat detection - In a digital ecosystem saturated with threats\u2014where human error remains the most common attack vector\u2014it is no longer enough to rely solely on firewalls,What your SIEM doesn\u2019t see can still put your organization at risk. Learn how integrating human behavior and awareness signals improves detection, response, and security outcomes.","breadcrumb":{"@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#primaryimage","url":"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg-1.webp","contentUrl":"https:\/\/smartfense.com\/file\/2025\/07\/SIEM.jpg-1.webp","width":1000,"height":645,"caption":"SIEM"},{"@type":"BreadcrumbList","@id":"https:\/\/smartfense.com\/en\/blog\/what-your-siem-doesnt-see\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/smartfense.com\/en\/"},{"@type":"ListItem","position":2,"name":"What Your SIEM Doesn\u2019t See (But Attackers Do): How to Integrate Human Behavior into Your Detection Strategy"}]},{"@type":"WebSite","@id":"https:\/\/smartfense.com\/en\/#website","url":"https:\/\/smartfense.com\/en\/","name":"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad","description":"","publisher":{"@id":"https:\/\/smartfense.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartfense.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/smartfense.com\/en\/#organization","name":"SMARTFENSE","url":"https:\/\/smartfense.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartfense.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","contentUrl":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","width":241,"height":40,"caption":"SMARTFENSE"},"image":{"@id":"https:\/\/smartfense.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/smartfense.com\/en\/#\/schema\/person\/8ff5c1b5478353f46788598b0dcfa353","name":"Pablo Abratte","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6e1ecad57268a55f91dd11a1b9d227dd1eb22e04a3a299f9feb1026777cb8afc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6e1ecad57268a55f91dd11a1b9d227dd1eb22e04a3a299f9feb1026777cb8afc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e1ecad57268a55f91dd11a1b9d227dd1eb22e04a3a299f9feb1026777cb8afc?s=96&d=mm&r=g","caption":"Pablo Abratte"},"description":"Experto en Gamificaci\u00f3n. Con m\u00e1s de 15 a\u00f1os de experiencia en docencia y desarrollo de software, Pablo combina una mirada pedag\u00f3gica profunda con un s\u00f3lido dominio t\u00e9cnico. A lo largo de su carrera, ha explorado m\u00faltiples estrategias de ense\u00f1anza, incluyendo el uso del juego y los videojuegos como herramientas para facilitar el aprendizaje y el cambio de comportamiento.","sameAs":["https:\/\/x.com\/carolina"],"url":"https:\/\/smartfense.com\/en\/author\/pablo\/"}]}},"_links":{"self":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts\/39837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/comments?post=39837"}],"version-history":[{"count":2,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts\/39837\/revisions"}],"predecessor-version":[{"id":39839,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/posts\/39837\/revisions\/39839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/media\/37911"}],"wp:attachment":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/media?parent=39837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/categories?post=39837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/tags?post=39837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}