{"id":60055,"date":"2019-06-26T10:00:28","date_gmt":"2019-06-26T08:00:28","guid":{"rendered":"http:\/\/e3mag.com\/?p=60055"},"modified":"2020-02-09T00:20:13","modified_gmt":"2020-02-08T23:20:13","slug":"convergencia-de-la-ciberseguridad-y-la-continuidad-del-negocio","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/convergencia-de-la-ciberseguridad-y-la-continuidad-del-negocio\/","title":{"rendered":"Convergencia de la ciberseguridad y la continuidad empresarial"},"content":{"rendered":"<p>\u00bfCu\u00e1l es el potencial de amenaza de la inteligencia artificial y el aprendizaje autom\u00e1tico? \u00bfPor qu\u00e9 el uso de la nube sigue generando una necesidad de seguridad nada desde\u00f1able? Qu\u00e9 significan los conceptos para asegurar nubes y redes h\u00edbridas?<\/p>\n<p>\u00bfA qu\u00e9 escenarios de amenaza se enfrenta la mayor aerol\u00ednea alemana? \u00bfC\u00f3mo garantizar la seguridad de las infraestructuras cr\u00edticas? \u00bfCu\u00e1l es el estado de la ciberseguridad nacional e internacional? \u00bfHacia d\u00f3nde conducen la fusi\u00f3n y convergencia de la ciberseguridad, la seguridad f\u00edsica, la gesti\u00f3n de la continuidad de las actividades y la gesti\u00f3n de crisis?<\/p>\n<p>Ponentes de la industria y la ciencia aportar\u00e1n sus propios informes de experiencia al escenario: adem\u00e1s de Lufthansa y RWE, responsables de seguridad inform\u00e1tica de Volkswagen Sachsen, Ritter Sport, DATEV y DEKRA, entre otros, responder\u00e1n a las preguntas del p\u00fablico experto en conferencias y talleres.<\/p>\n<p>Las sesiones de networking coordinadas individualmente y la exclusiva cena de networking de la noche del primer d\u00eda de la cumbre ofrecen un amplio espacio para debatir temas en profundidad cara a cara y establecer contactos con ponentes, participantes y socios.<\/p>\n<p><a href=\"https:\/\/www.project-networks.com\" target=\"_blank\" rel=\"noopener noreferrer\">www.project-networks.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Los d\u00edas 2 y 3 de julio, expertos de toda Alemania, Austria y Suiza se reunir\u00e1n en Berl\u00edn para intercambiar puntos de vista sobre los problemas actuales de la seguridad inform\u00e1tica.<\/p>","protected":false},"author":38,"featured_media":60057,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,30555],"tags":[10807],"coauthors":[19920],"class_list":["post-60055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-1906","tag-datev","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/06\/shutterstock_394552096-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Am 2. und 3. Juli kommen Experten aus ganz Deutschland, \u00d6sterreich und der Schweiz in Berlin zusammen, um sich \u00fcber aktuelle Problemstellungen aus der IT-Sicherheit auszutauschen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/categoria\/noticias-sap\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/mag-1906\/\" rel=\"category tag\">MAG 19-06<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/60055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=60055"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/60055\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/60057"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=60055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=60055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=60055"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=60055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}