{"id":28733,"date":"2011-03-07T23:00:00","date_gmt":"2011-03-07T22:00:00","guid":{"rendered":"https:\/\/entelgy.com\/entel-proveedor-de-formacion-de-la-escuela-de-excelencia-tecnica-de-telefonica\/"},"modified":"2024-11-06T22:45:58","modified_gmt":"2024-11-06T21:45:58","slug":"entel-proveedor-de-formacion-de-la-escuela-de-excelencia-tecnica-de-telefonica","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/actualidad-es\/entel-proveedor-de-formacion-de-la-escuela-de-excelencia-tecnica-de-telefonica\/","title":{"rendered":"Entel, proveedor de formaci\u00f3n de la Escuela de Excelencia T\u00e9cnica de Telef\u00f3nica"},"content":{"rendered":"<div class=\"post_wp\">\n<p>El pasado mes de Febrero, Entel present\u00f3 una nueva ponencia denominada<strong> <em><span>\u201cDe los muchos triviales a los pocos vitales: la importancia de la gesti\u00f3n de logs\u201d<\/span> <\/em><\/strong>y dirigida en esta ocasi\u00f3n a Responsables de Seguridad, Responsables de Gesti\u00f3n de la Informaci\u00f3n, Responsables de Sistemas y Directores de Operaci\u00f3n, de la C\u00e1tedra de Sistemas de la Escuela de Excelencia T\u00e9cnica de Telef\u00f3nica Espa\u00f1a.<\/p>\n<\/div>\n<p><!--more--><\/p>\n<div class=\"post_wp\">\n<p><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2011\/03\/Excuela-de-Excelencia.png\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"size-full wp-image-4931 aligncenter\" title=\"Excuela de Excelencia\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2011\/03\/Excuela-de-Excelencia.png\" alt=\"\" width=\"198\" height=\"62\" \/><\/a><\/p>\n<p>La ponencia, con una duraci\u00f3n aproximada de 90 minutos, fue presentada por <!--more Leer el resto de la entrada--><em>Rams\u00e9s Gallego<\/em>, (CISM, CGEIT, CISSP, SCPM, ITIL, COBIT, Six Sigma Black Belt Certified), <em>Director General Entel Security &amp; Risk Management<\/em>, y gir\u00f3 en torno a una nueva disciplina llamada LMI (Log Management &amp; Intelligence) que permite establecer un marco y una estrategia para recolectar, almacenar, alertar e informar acerca del uso de los logs y aproximarse a una \u00f3ptima gesti\u00f3n de eventos de sistemas de informaci\u00f3n a nivel corporativo.<\/p>\n<p>La sesi\u00f3n se estructur\u00f3 en los siguientes puntos:<\/p>\n<ul>\n<li>Qu\u00e9 buscar en un log: informaci\u00f3n vital.<\/li>\n<li>LMI o la importancia de aplicar inteligencia a los logs.<\/li>\n<li>Cadena de custodia y retenci\u00f3n de la informaci\u00f3n en forma de logs.<\/li>\n<li>Viabilidad de recolectar el 100% de logs de una compa\u00f1\u00eda.<\/li>\n<\/ul>\n<p>Teniendo en cuenta cuestiones como la cadena de custodia, el cumplimiento normativo, informes en tiempo real para diversas personas dentro de una organizaci\u00f3n y otras cuestiones, esta sesi\u00f3n est\u00e1 orientada a que los asistentes puedan comprender la necesidad de establecer un programa de gesti\u00f3n de logs coherente y alineado con la ley y la pol\u00edtica corporativa.<\/p>\n<blockquote>\n<p><em>Las Escuelas de Excelencia son un modelo de \u00e9xito en la Gesti\u00f3n del Talento corporativo en Espa\u00f1a, vivero de los futuros l\u00edderes del Grupo Telef\u00f3nica, y se orientan a cuatro \u00e1reas de conocimiento: Liderazgo, Comercial, Empresarial y T\u00e9cnica.<\/em><\/p>\n<\/blockquote>\n<p>Otras ponencias de Entel en la Escuela de Excelencia:<\/p>\n<ul>\n<li><a href=\"https:\/\/entelgy.com\/escuela-de-excelencia\/\"><em>Software Libre. Realidades y Mitos<\/em><\/a><strong> <\/strong><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El pasado mes de Febrero, Entel present\u00f3 una nueva ponencia denominada \u201cDe los muchos triviales a los pocos vitales: la [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28732,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,4685],"tags":[5261,4981],"class_list":["post-28733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-resumen-de-eventos-en-es-es","tag-ciberseguridad-es","tag-telecomunicaciones-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/28733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=28733"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/28733\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/28732"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=28733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=28733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=28733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}