{"id":145929,"date":"2024-09-18T10:54:42","date_gmt":"2024-09-18T08:54:42","guid":{"rendered":"http:\/\/e3mag.com\/?post_type=tribe_events&#038;p=145929"},"modified":"2024-09-18T10:54:42","modified_gmt":"2024-09-18T08:54:42","slug":"cumbre-sobre-estrategia-de-ciberseguridad-2024","status":"publish","type":"tribe_events","link":"https:\/\/e3mag.com\/es\/event\/strategiegipfel-cyber-security-2024\/","title":{"rendered":"Cumbre sobre estrategia de ciberseguridad"},"content":{"rendered":"<p>La ciberdelincuencia como servicio, el uso selectivo de la IA y la fusi\u00f3n de la delincuencia organizada con los \"intereses estatales\" pueden llevar a empresas enteras al borde de la extinci\u00f3n y convertir el reto de proteger la empresa en un asunto muy importante, pero tambi\u00e9n costoso. Si quisi\u00e9ramos agotar todas las opciones de protecci\u00f3n, en realidad ser\u00eda imposible financiarlo. Hay demasiada oferta de apoyo externo.<\/p>\n<p>Por tanto, hay que preguntarse qu\u00e9 uso de los fondos traer\u00e1 m\u00e1s \u00e9xito y cu\u00e1l s\u00f3lo aportar\u00e1 beneficios muy limitados. Al mismo tiempo, muchas normativas de la UE dejan poco margen de maniobra en el proceso de toma de decisiones. Por eso es cada vez m\u00e1s importante debatir qu\u00e9 tiene sentido y adem\u00e1s es aceptado por las autoridades.<\/p>\n<p>\u00bfC\u00f3mo protegerse del creciente n\u00famero y calidad de los ataques?<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber Crime-as-a-service, der gezielte Einsatz von AI und das Verschmelzen von organisierter Kriminalit\u00e4t mit \u201estaatlicher Interessen\u201c k\u00f6nnen ganze Unternehmen an den Rand der Existenzgrundlage treiben und macht die Herausforderung das Unternehmen zu sch\u00fctzen zu einer sehr wichtigen aber auch teuren Angelegenheit. Wollten wir alle Schutzm\u00f6glichkeiten aussch\u00f6pfen w\u00e4re das tats\u00e4chlich nicht zu finanzieren. Zu gro\u00df ist [&hellip;]<\/p>\n","protected":false},"author":2368,"featured_media":145930,"template":"","meta":{"_acf_changed":false,"pmpro_default_level":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[42124],"coauthors":[39720],"class_list":["post-145929","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tribe_events_cat-event","pmpro-has-access","cat_event"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2.jpg",1920,1080,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-400x225.jpg",400,225,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-768x432.jpg",768,432,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x675.jpg",1200,675,true],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-100x56.jpg",100,56,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-480x270.jpg",480,270,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-640x360.jpg",640,360,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-720x405.jpg",720,405,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-960x540.jpg",960,540,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1168x657.jpg",1168,657,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1440x810.jpg",1440,810,true],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2.jpg",1920,1080,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1536x864.jpg",1536,864,true],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2.jpg",1920,1080,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-18x10.jpg",18,10,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x675.jpg",1200,675,true],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x675.jpg",1200,675,true],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-1200x1080.jpg",1200,1080,true],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-600x338.jpg",600,338,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-600x600.jpg",600,600,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/09\/Cyber-Security-2-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Cyber Crime-as-a-service, der gezielte Einsatz von AI und das Verschmelzen von organisierter Kriminalit\u00e4t mit \u201estaatlicher Interessen\u201c k\u00f6nnen ganze Unternehmen an den Rand der Existenzgrundlage treiben und macht die Herausforderung das Unternehmen zu sch\u00fctzen zu einer sehr wichtigen aber auch teuren Angelegenheit. Wollten wir alle Schutzm\u00f6glichkeiten aussch\u00f6pfen w\u00e4re das tats\u00e4chlich nicht zu finanzieren. Zu gro\u00df ist das Angebot an externer Unterst\u00fctzung. Die Frage, welcher Mitteleinsatz die gr\u00f6\u00dften Erfolge bringt \u2013 und was nur sehr begrenzten Nutzen bringt, muss also gestellt werden. Gleichzeitig lassen viele EU-Vorgaben wenig Spielraum bei der eigenen Entscheidungsfindung. Daher wird es immer wichtiger, sich dar\u00fcber auszutauschen, was sinnvoll&hellip;<\/p>\n","category_list_v2":"","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/es\/author\/e3_magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tribe_events\/145929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/2368"}],"version-history":[{"count":3,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tribe_events\/145929\/revisions"}],"predecessor-version":[{"id":145933,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tribe_events\/145929\/revisions\/145933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/145930"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=145929"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=145929"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tribe_events_cat?post=145929"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=145929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}