{"id":2079,"date":"2020-08-06T10:41:19","date_gmt":"2020-08-06T15:41:19","guid":{"rendered":"https:\/\/www.itechsas.com\/blog\/?p=2079"},"modified":"2020-08-08T13:45:55","modified_gmt":"2020-08-08T18:45:55","slug":"%f0%9f%91%89-webinar-ciberataques-que-pueden-afectar-fisicamente-a-las-personas","status":"publish","type":"post","link":"https:\/\/www.itechsas.com\/blog\/recursos\/%f0%9f%91%89-webinar-ciberataques-que-pueden-afectar-fisicamente-a-las-personas\/","title":{"rendered":"\ud83d\udc49 WEBINAR: Ciberataques que pueden afectar f\u00edsicamente a las personas"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img data-opt-id=1390198787  fetchpriority=\"high\" decoding=\"async\" width=\"709\" height=\"299\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2020\/08\/image.png\" alt=\"\" class=\"wp-image-2080\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:709\/h:299\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2020\/08\/image.png 709w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:127\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2020\/08\/image.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Nos encontramos ante una&nbsp;<strong>incipiente modalidad de ataque<\/strong>: aquella que apunta a infraestructuras cr\u00edticas,&nbsp;<strong>poniendo en peligro el funcionamiento de sistemas o servicios, tanto f\u00edsicos como virtuales<\/strong>, que son esenciales para el funcionamiento de la vida social de un pa\u00eds y que en caso de que su continuidad se vea afectada, podr\u00eda generar un impacto negativo en la seguridad, salud y econom\u00eda de una comunidad.<\/td><\/tr><tr><td>Conozca los distintos tipos de&nbsp;<strong>ciberataques dirigidos a infraestructuras cr\u00edticas<\/strong><br>y c\u00f3mo estos pueden afectar la seguridad f\u00edsica, econ\u00f3mica, p\u00fablica, sanitaria, o<br>cualquier combinaci\u00f3n de estas,&nbsp;<strong>cuando el mundo digital se integra con<br>la vida f\u00edsica<\/strong>.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-opt-id=1983977491  fetchpriority=\"high\" decoding=\"async\" width=\"708\" height=\"173\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2020\/08\/image-1.png\" alt=\"\" class=\"wp-image-2081\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:708\/h:173\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2020\/08\/image-1.png 708w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:73\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2020\/08\/image-1.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/register.gotowebinar.com\/register\/5370823339200737039\" target=\"_blank\" rel=\"noreferrer noopener\">Iink de acceso, aqu\u00ed <\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nos encontramos ante una&nbsp;incipiente modalidad de ataque: aquella que apunta a infraestructuras cr\u00edticas,&nbsp;poniendo en peligro el funcionamiento de sistemas o servicios, tanto f\u00edsicos como virtuales, que son esenciales para el funcionamiento de la vida social de un pa\u00eds y que en caso de que su continuidad se vea afectada, podr\u00eda generar un impacto negativo en&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[179,208,207,206],"class_list":["post-2079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-recursos","tag-ciberataques","tag-criticas","tag-infraestructura","tag-webinar"],"_links":{"self":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/2079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/comments?post=2079"}],"version-history":[{"count":0,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/2079\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media\/2080"}],"wp:attachment":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media?parent=2079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/categories?post=2079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/tags?post=2079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}