{"id":2902,"date":"2021-07-19T12:26:13","date_gmt":"2021-07-19T17:26:13","guid":{"rendered":"https:\/\/www.itechsas.com\/blog\/?p=2902"},"modified":"2021-07-19T18:49:07","modified_gmt":"2021-07-19T23:49:07","slug":"webinar-panorama-de-la-ciberseguridad-en-latinoamerica","status":"publish","type":"post","link":"https:\/\/www.itechsas.com\/blog\/eventos\/webinar-panorama-de-la-ciberseguridad-en-latinoamerica\/","title":{"rendered":"WEBINAR: Panorama de la Ciberseguridad en Latinoam\u00e9rica"},"content":{"rendered":"\n<p>Conozca las \u00faltimas y m\u00e1s interesantes amenazas cibern\u00e9ticas en Latinoam\u00e9rica y qu\u00e9 pol\u00edticas y buenas pr\u00e1cticas pueden implementar las compa\u00f1\u00edas para mitigar los riesgos en materia de seguridad.<\/p>\n\n\n\n<p>Nuestros especialistas analizar\u00e1n los datos de telemetr\u00eda de&nbsp;ESET&nbsp;y los incidentes reportados en la regi\u00f3n para determinar qu\u00e9 controles implementar a fin de proteger las redes corporativas y c\u00f3mo estos datos se relacionan con las preocupaciones que los profesionales de la tecnolog\u00eda en torno a la protecci\u00f3n de sus activos inform\u00e1ticos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-12.png\"><img data-opt-id=476693855  fetchpriority=\"high\" decoding=\"async\" width=\"676\" height=\"434\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-12.png\" alt=\"\" class=\"wp-image-2903\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:676\/h:434\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-12.png 676w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:193\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-12.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-13.png\"><img data-opt-id=732085499  fetchpriority=\"high\" decoding=\"async\" width=\"688\" height=\"363\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-13.png\" alt=\"\" class=\"wp-image-2904\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:688\/h:363\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-13.png 688w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:158\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2021\/07\/image-13.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><a href=\"https:\/\/register.gotowebinar.com\/rt\/1242397977976539915\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>QUIERO REGISTRARME<\/strong><\/a><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Conozca las \u00faltimas y m\u00e1s interesantes amenazas cibern\u00e9ticas en Latinoam\u00e9rica y qu\u00e9 pol\u00edticas y buenas pr\u00e1cticas pueden implementar las compa\u00f1\u00edas para mitigar los riesgos en materia de seguridad. Nuestros especialistas analizar\u00e1n los datos de telemetr\u00eda de&nbsp;ESET&nbsp;y los incidentes reportados en la regi\u00f3n para determinar qu\u00e9 controles implementar a fin de proteger las redes corporativas y&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[233,347,34,116,346,206],"class_list":["post-2902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eventos","tag-amenazas","tag-buenas-practicas","tag-ciberseguridad","tag-latinoamerica","tag-panorama","tag-webinar"],"_links":{"self":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/2902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/comments?post=2902"}],"version-history":[{"count":0,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/2902\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media\/2908"}],"wp:attachment":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media?parent=2902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/categories?post=2902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/tags?post=2902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}