{"id":2821,"date":"2023-08-01T10:47:00","date_gmt":"2023-08-01T15:47:00","guid":{"rendered":"https:\/\/www.itechsas.com\/blog\/?p=2821"},"modified":"2023-08-01T11:03:08","modified_gmt":"2023-08-01T16:03:08","slug":"eset-security-day-2023","status":"publish","type":"post","link":"https:\/\/www.itechsas.com\/blog\/eventos\/eset-security-day-2023\/","title":{"rendered":"ESET Security Day 2023"},"content":{"rendered":"\n<p>El evento m\u00e1s esperado del a\u00f1o que vincula Expertos Internacionales en Ciberseguridad mostrando lo \u00faltimo en ataques de malware, inteligencia artificial, tendencias de Ciberseguridad y protecci\u00f3n corporativa. <\/p>\n\n\n\n<p>El ESET Security Day se realiza en diferentes pa\u00edses de Latinoam\u00e9rica desde hace 13 a\u00f1os <strong><em>Con el prop\u00f3sito de fomentar la concientizaci\u00f3n sobre Seguridad Inform\u00e1tica a nivel empresarial.<\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\"><img data-opt-id=1039422234  fetchpriority=\"high\" decoding=\"async\" width=\"776\" height=\"443\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image.png\" alt=\"\" class=\"wp-image-3665\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:776\/h:443\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image.png 776w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:171\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:438\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image.png 768w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image-1.png\"><img data-opt-id=1346571492  fetchpriority=\"high\" decoding=\"async\" width=\"740\" height=\"570\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image-1.png\" alt=\"\" class=\"wp-image-3666\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:740\/h:570\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image-1.png 740w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:231\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2023\/08\/image-1.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/figure>\n\n\n\n<p>En los \u00faltimos a\u00f1os, el desarrollo de las tecnolog\u00edas permiti\u00f3 expandir el horizonte de posibilidades, pero tambi\u00e9n abri\u00f3 las puertas a los ciberdelincuentes con nuevas t\u00e9cnicas de ataque. Como expertos en ciberseguridad, tenemos herramientas y soluciones que lo pueden ayudar a detectar comportamientos maliciosos y proteger su empresa.<\/p>\n\n\n\n<p><strong>Agenda<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>16:00 hs.<\/strong><\/td><td>Bienvenida<\/td><\/tr><tr><td><strong>16:10 hs.<\/strong><\/td><td>Desmitificando la Inteligencia Artificial en ciberseguridad<\/td><\/tr><tr><td><strong>16:55 hs.<\/strong><\/td><td>Break<\/td><\/tr><tr><td><strong>17:15 hs.<\/strong><\/td><td>Tecnolog\u00edas de ciberseguridad con aprendizaje autom\u00e1tico<\/td><\/tr><tr><td><strong>17:40 hs.<\/strong><\/td><td>No todo es Intiligencia Artificial<\/td><\/tr><tr><td><strong>17:55 hs.<\/strong><\/td><td>Ciberseguridad Inteligente: Desde la visi\u00f3n de&nbsp;ESET<\/td><\/tr><tr><td><strong>18:15 hs.<\/strong><\/td><td>Sorteo y cierre de transmisi\u00f3n<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-black-color has-vivid-green-cyan-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.esetlive.com\/securitydays-colombia2023online\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Registro sin Costo<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El evento m\u00e1s esperado del a\u00f1o que vincula Expertos Internacionales en Ciberseguridad mostrando lo \u00faltimo en ataques de malware, inteligencia artificial, tendencias de Ciberseguridad y protecci\u00f3n corporativa. El ESET Security Day se realiza en diferentes pa\u00edses de Latinoam\u00e9rica desde hace 13 a\u00f1os Con el prop\u00f3sito de fomentar la concientizaci\u00f3n sobre Seguridad Inform\u00e1tica a nivel empresarial.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3676,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[53,34,334,19,18,33,91],"class_list":["post-2821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eventos","tag-ciberataque","tag-ciberseguridad","tag-eset-security-day","tag-malware","tag-ransomware","tag-seguridad-informatica","tag-vulnerabilidad"],"_links":{"self":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/2821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/comments?post=2821"}],"version-history":[{"count":6,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/2821\/revisions"}],"predecessor-version":[{"id":3678,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/2821\/revisions\/3678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media\/3676"}],"wp:attachment":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media?parent=2821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/categories?post=2821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/tags?post=2821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}