{"id":26257,"date":"2017-12-04T23:00:00","date_gmt":"2017-12-04T22:00:00","guid":{"rendered":"https:\/\/entelgy.com\/ciberseguridad-industrial-congreso-cybersecurity-mining-energy-de-peru\/"},"modified":"2024-11-06T22:35:24","modified_gmt":"2024-11-06T21:35:24","slug":"ciberseguridad-industrial-congreso-cybersecurity-mining-energy-de-peru","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/actualidad-es\/ciberseguridad-industrial-congreso-cybersecurity-mining-energy-de-peru\/","title":{"rendered":"Nuestro experto en ciberseguridad industrial ponente en el 3\u00ba Congreso Cybersecurity Mining &#038; Energy de Per\u00fa"},"content":{"rendered":"<img fetchpriority=\"high\" decoding=\"async\" class=\" size-full wp-image-26253\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/d993ab749ee01f3522f710236c0c84e9.jpg\" alt=\"\" class=\"caption\" title=\"Nuestro experto en ciberseguridad industrial ponente en el 3\u00ba Congreso Cybersecurity Mining &#038; Energy de Per\u00fa\" width=\"300\" height=\"204\" \/>\n<div class=\"post_wp\">\n<p><b>David Marco<\/b><span>, Industrial CyberSecurity Manager, ofreci\u00f3 las ponencias \u201cCiberseguridad en el ciclo de vida de un proyecto Industrial\u201d e &#8220;Industria 4.0&#8221; durante el <strong>3\u00ba Congreso Cybersecurity Mining &amp; Energy<\/strong> que se celebr\u00f3 el pasado 23 de noviembre en Lima (Per\u00fa).<\/span><\/p>\n<div align=\"center\"><\/div>\n<\/div>\n<p><!--more--><\/p>\n<div class=\"post_wp\">\n<h1><b>David Marco<\/b><span>, Industrial CyberSecurity Manager, ofreci\u00f3 las ponencias \u201cCiberseguridad en el ciclo de vida de un proyecto Industrial\u201d e &#8220;Industria 4.0&#8221; durante el <strong>3\u00ba Congreso Cybersecurity Mining &amp; Energy<\/strong> que se celebr\u00f3 el pasado 23 de noviembre en Lima (Per\u00fa).<\/span><\/h1>\n<div><img decoding=\"async\" class=\" size-full wp-image-26254\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/mining2.jpg\" width=\"597\" height=\"309\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/mining2.jpg 597w, https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/mining2-300x155.jpg 300w\" sizes=\"(max-width: 597px) 100vw, 597px\" \/> <span>Nuestro experto en Ciberseguridad Industrial,<strong> David Marco<\/strong>, fue el ponente de la conferencia \u201c<a href=\"http:\/\/miningreport.pe\/la-importancia-de-la-ciberseguridad-en-el-ciclo-de-vida-de-un-proyecto-industrial\/\" target=\"_blank\" rel=\"noopener\"><strong>Ciberseguridad en el ciclo de vida de un proyecto Industrial<\/strong><\/a>\u201d, donde hizo especial hincapi\u00e9 en la importancia al papel determinante de la gesti\u00f3n eficaz de los <strong>incidentes de ciberseguridad<\/strong> en la continuidad de negocio de este tipo de sectores. <\/span> Puedes leer la entrevista completa que el medio <strong>Miningreport <\/strong> hizo a nuestro experto pinchando en el siguiente <a href=\"http:\/\/miningreport.pe\/la-importancia-de-la-ciberseguridad-en-el-ciclo-de-vida-de-un-proyecto-industrial\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>enlace<\/strong><\/a><span><span>.<\/span><\/span>En este congreso, <span>Entelgy<\/span> en Per\u00fa tuvo un destacado papel, ya que adem\u00e1s fue patrocinador, contando con un espacio de di\u00e1logo entre profesionales de seguridad de la informaci\u00f3n y ciberseguridad que desarrollan su actividad en los sectores minero y de energ\u00eda.<\/div>\n<div><img decoding=\"async\" class=\"aligncenter size-full wp-image-22173\" src=\"media\/k2\/items\/src\/Entelgy\/2017\/12\/Entelgy-en-Per\u00fa-3\u00b0-Congreso-Cybersecurity-Mining-Energy-3-1.jpg\" alt=\"\" width=\"628\" height=\"294\" \/><\/div>\n<div>\n<hr \/>\n<\/div>\n<h2><strong>Otras noticias\u00a0relacionadas<\/strong>:<\/h2>\n<div align=\"center\">\n<table class=\"tablaP\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-26035\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2018\/05\/faldon-1-1.jpg\" alt=\"Entelgy en Per\u00fa participa en el 3\u00b0 Congreso Cybersecurity Mining &amp; Energy\" width=\"374\" height=\"200\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2018\/05\/faldon-1-1.jpg 374w, https:\/\/entelgy.com\/wp-content\/uploads\/2018\/05\/faldon-1-1-300x160.jpg 300w\" sizes=\"(max-width: 374px) 100vw, 374px\" \/><a href=\"https:\/\/entelgy.com\/entelgy-cybersecurity-mining-energy\/\" target=\"_blank\" rel=\"noopener noreferrer\">Entelgy en Per\u00fa participa en el 3\u00b0 Congreso Cybersecurity Mining &amp; Energy<\/a><\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-26255\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/Charla-de-InnoTec-sobre-Ciberseguridad-en-el-encuentro-del-CCI.jpg\" alt=\"Ciberseguridad, clave en la resiliencia industrial: charla de InnoTec en el encuentro del CCI\" width=\"374\" height=\"200\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/Charla-de-InnoTec-sobre-Ciberseguridad-en-el-encuentro-del-CCI.jpg 374w, https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/Charla-de-InnoTec-sobre-Ciberseguridad-en-el-encuentro-del-CCI-300x160.jpg 300w\" sizes=\"(max-width: 374px) 100vw, 374px\" \/><a href=\"https:\/\/entelgy.com\/ciberseguridad-innotec-cci\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ponencia de David Marco: Ciberseguridad, clave en la resiliencia industrial<\/a><\/td>\n<td><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-26256\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/peru.jpg\" alt=\"Entelgy y per\u00fa, creciendo juntos\" width=\"374\" height=\"200\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/peru.jpg 374w, https:\/\/entelgy.com\/wp-content\/uploads\/2017\/12\/peru-300x160.jpg 300w\" sizes=\"(max-width: 374px) 100vw, 374px\" \/><a href=\"https:\/\/entelgy.com\/entelgy-y-peru\/\" target=\"_blank\" rel=\"noopener noreferrer\">Entelgy y Per\u00fa, creciendo juntos<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>David Marco, Industrial CyberSecurity Manager, ofreci\u00f3 las ponencias \u201cCiberseguridad en el ciclo de vida de un proyecto Industrial\u201d e &#8220;Industria [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26253,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,4685],"tags":[5261,6487,5145,4891],"class_list":["post-26257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-resumen-de-eventos-en-es-es","tag-ciberseguridad-es","tag-cybersecurity-mining-es","tag-internacionalizacion-es","tag-sector-industria-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/26257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=26257"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/26257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/26253"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=26257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=26257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=26257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}