{"id":40,"date":"2024-10-05T04:12:44","date_gmt":"2024-10-05T04:12:44","guid":{"rendered":"https:\/\/itnegtechnology.com\/?page_id=40"},"modified":"2024-10-05T06:08:15","modified_gmt":"2024-10-05T06:08:15","slug":"detalles-del-proyecto","status":"publish","type":"page","link":"https:\/\/itnegtechnology.com\/index.php\/detalles-del-proyecto\/","title":{"rendered":"Asistencia"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\" style=\"min-height:320px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-site-bg-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-left has-neve-text-color-color has-text-color\">Orientaci\u00f3n Cyber<\/h1>\n\n\n\n<p class=\"has-neve-text-color-color has-text-color\" style=\"font-size:22px\">Como empezar a implementar el modelo de ciberseguridad y\/o seguridad y privacidad de datos.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:30%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:600px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-light-bg-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-cover alignwide has-custom-content-position is-position-bottom-left\" style=\"border-radius:32px;padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60);min-height:500px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-neve-link-color-background-color has-background-dim\"><\/span><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-746\" alt=\"\" src=\"https:\/\/itnegtechnology.com\/wp-content\/themes\/neve\/assets\/img\/starter-content\/neve-marketing-agency-22.jpg\" style=\"object-position:50% 0%\" data-object-fit=\"cover\" data-object-position=\"50% 0%\"\/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30);flex-basis:67%\">\n<p class=\"has-neve-text-color-color has-text-color\">Los ciberdelincuentes a trav\u00e9s de habilidades como t\u00e9cnicas y t\u00e1cticas identifican y descubren vulnerabilidades en soluciones, sistemas y servicios tecnol\u00f3gicos que impactan la operaci\u00f3n de las organizaciones y atentan contra activos cr\u00edticos.<\/p>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size has-small-font-size is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-font-size is-style-default\" style=\"font-size:16px\"><a class=\"wp-block-button__link has-nv-text-dark-bg-color has-neve-link-color-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/itnegtechnology.com\/project-details\/\">Visit Website<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30);flex-basis:34%\">\n<p class=\"has-neve-text-color-color has-text-color\">\u201cObservamos un aumento significativo en la organizaci\u00f3n sobre la importancia de la ciberseguridad .\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized is-style-rounded\"><img decoding=\"async\" src=\"https:\/\/itnegtechnology.com\/wp-content\/themes\/neve\/assets\/img\/starter-content\/neve-marketing-agency-04.jpg\" alt=\"\" style=\"width:80px;height:80px\"\/><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-neve-text-color-color has-text-color has-small-font-size\"><strong>JANET MORRIS<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:600px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-nv-site-bg-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-neve-text-color-color has-text-color\">Otras ayudas<\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30);flex-basis:50%\">\n<figure class=\"wp-block-image size-full has-custom-border\"><a href=\"#\"><img decoding=\"async\" src=\"https:\/\/itnegtechnology.com\/wp-content\/themes\/neve\/assets\/img\/starter-content\/neve-marketing-agency-15.jpg\" alt=\"\" style=\"border-radius:24px\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-text-align-center has-neve-text-color-color has-text-color\">Valoraci\u00f3n de capacidades<\/h3>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30);flex-basis:50%\">\n<figure class=\"wp-block-image size-full has-custom-border\"><a href=\"#\"><img decoding=\"async\" src=\"https:\/\/itnegtechnology.com\/wp-content\/themes\/neve\/assets\/img\/starter-content\/neve-marketing-agency-12.jpg\" alt=\"\" style=\"border-radius:24px\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-text-align-center has-neve-text-color-color has-text-color\">Escaneo de Vulnerabilidades<\/h3>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30);flex-basis:50%\">\n<figure class=\"wp-block-image size-full has-custom-border\"><a href=\"#\"><img decoding=\"async\" src=\"https:\/\/itnegtechnology.com\/wp-content\/themes\/neve\/assets\/img\/starter-content\/neve-marketing-agency-17.jpg\" alt=\"\" style=\"border-radius:24px\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-text-align-center has-neve-text-color-color has-text-color\">Escenarios de Ingenier\u00eda Social<\/h3>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"min-height:300px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-neve-link-color-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:140px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-nv-text-dark-bg-color has-text-color\">Trabajemos juntos en su modelo de seguridad digital<\/h2>\n\n\n\n<p class=\"has-text-align-center has-nv-text-dark-bg-color has-text-color has-link-color wp-elements-311ac9ae6a59c73123f2ab3284717986\">La disciplina encargada de proteger la infraestructura tecnolog\u00eda critica de una organizaci\u00f3n, as\u00ed como la informaci\u00f3n que contiene, frente a posibles ataques u otro tipo de riesgos similares.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link has-neve-link-color-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/itnegtechnology.com\/contact\/\" style=\"background-color:#ffffff\">Empezar<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:140px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"on","footnotes":""},"class_list":["post-40","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/pages\/40","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":3,"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/pages\/40\/revisions"}],"predecessor-version":[{"id":125,"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/pages\/40\/revisions\/125"}],"wp:attachment":[{"href":"https:\/\/itnegtechnology.com\/index.php\/wp-json\/wp\/v2\/media?parent=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}