{"id":50024,"date":"2018-08-22T08:00:37","date_gmt":"2018-08-22T06:00:37","guid":{"rendered":"http:\/\/e3mag.com\/?p=50024"},"modified":"2022-05-01T10:16:08","modified_gmt":"2022-05-01T08:16:08","slug":"conexion-en-red-sin-factor-aleatorio","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/conexion-en-red-sin-factor-aleatorio\/","title":{"rendered":"Trabajo en red sin el factor aleatorio"},"content":{"rendered":"<p>Las respuestas a estas y otras muchas preguntas se dar\u00e1n en las presentaciones y rondas de debate de la Cumbre sobre Estrategia de TI y Seguridad de la Informaci\u00f3n. El evento ofrece la oportunidad de debatir precisamente estos temas con colegas especialistas a la altura de las circunstancias.<\/p>\n<p>Adem\u00e1s, las empresas presentar\u00e1n sus estrategias, lo que, en combinaci\u00f3n con los talleres, proporcionar\u00e1 la informaci\u00f3n adecuada para desarrollar nuevas ideas y soluciones. Entre los temas a tratar figuran el cifrado de datos de ciberseguridad en la nube y la ciberseguridad como componente esencial de la resiliencia empresarial y en los sistemas de control industrial.<\/p>\n<p>La mesa redonda abordar\u00e1 la cuesti\u00f3n de c\u00f3mo deben responder las OSC a las exigencias de la digitalizaci\u00f3n y las amenazas externas.<\/p>","protected":false},"excerpt":{"rendered":"<p>IT &amp; Information Security Strategy Summit, 4 y 5 de julio de 2018, Berl\u00edn.<br \/>\n\u00bfC\u00f3mo hacer frente a situaciones de amenaza complejas? \u00bfC\u00f3mo determinar qui\u00e9n est\u00e1 autorizado a acceder a qu\u00e9? \u00bfCu\u00e1les son sus puntos d\u00e9biles? \u00bfPor qu\u00e9 supone un riesgo la nube y por qu\u00e9 no?<\/p>","protected":false},"author":38,"featured_media":50025,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,23656],"tags":[39,4780,601],"coauthors":[19920],"class_list":["post-50024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-1807","tag-cloud","tag-cyber-security","tag-digitalisierung","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/shutterstock_1006041127-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Strategiegipfel IT &#038; Information Security, 4. und 5. Juli 2018, Berlin.<br \/>\nWie geht man mit komplexen Bedrohungssituationen um? Wie bestimmt man, wem man Zugriff auf was gestattet? Wo die eigenen Schwachstellen? Warum stellt Cloud ein Risiko dar und warum gerade nicht?<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/categoria\/noticias-sap\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/mag-1807\/\" rel=\"category tag\">MAG 18-07<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/50024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=50024"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/50024\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/50025"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=50024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=50024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=50024"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=50024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}