{"id":72770,"date":"2025-04-28T08:00:00","date_gmt":"2025-04-28T06:00:00","guid":{"rendered":"https:\/\/entelgy.com\/?p=72770"},"modified":"2026-02-23T11:59:32","modified_gmt":"2026-02-23T10:59:32","slug":"entelgy-security-america-celebra-el-webinar-de-la-pantalla-a-la-realidad-el-verdadero-mundo-del-hacking","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/actualidad-es\/entelgy-security-america-celebra-el-webinar-de-la-pantalla-a-la-realidad-el-verdadero-mundo-del-hacking\/","title":{"rendered":"Entelgy Security Am\u00e9rica celebra el webinar: \u201cDe la pantalla a la realidad, el verdadero mundo del hacking\u201d\u00a0"},"content":{"rendered":"\n<p>El pasado jueves 10 de abril se llev\u00f3 a cabo el evento virtual \u201cDe la pantalla a la realidad: el verdadero mundo del hacking\u201d, donde los expertos en ciberseguridad ofensiva Rafael Mart\u00ednez, Darwin Zea, Aldo Chabur y Santiago Castro de Entelgy Security Am\u00e9rica exploraron c\u00f3mo el cine ha influido en la percepci\u00f3n p\u00fablica del hacking y qu\u00e9 diferencias existen entre la ficci\u00f3n y las amenazas digitales reales.&nbsp;<\/p>\n\n\n\n<p>Durante el evento, se mostraron escenas conocidas de pel\u00edculas que representan a hackers y ciberataques de forma espectacular, y se compararon con t\u00e9cnicas reales utilizadas actualmente por atacantes en el entorno corporativo. El <strong>objetivo<\/strong> fue claro: mostrar qu\u00e9 hay de cierto, qu\u00e9 est\u00e1 exagerado y qu\u00e9 es completamente inventado.\u00a0<\/p>\n\n\n\n<p>Tambi\u00e9n se presentaron casos reales de ciberataques que han afectado a empresas y organizaciones, destacando los m\u00e9todos utilizados, los errores que los hicieron posibles y las lecciones que pueden extraerse de cada incidente. Adem\u00e1s, se ofrecieron consejos concretos para mejorar la postura de seguridad y reducir riesgos.&nbsp;<\/p>\n\n\n\n<p>Se abord\u00f3 c\u00f3mo la narrativa del <strong>\u201chacker solitario<\/strong>\u201d o del <strong>\u201cgenio en una habitaci\u00f3n oscura\u201d<\/strong> muchas veces desv\u00eda la atenci\u00f3n de los verdaderos desaf\u00edos que enfrentan las empresas en materia de ciberseguridad. Por ello, adem\u00e1s de invertir en tecnolog\u00eda, resulta fundamental comprender c\u00f3mo se construye el imaginario colectivo alrededor de estos temas.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2025\/04\/IMG-5648-1-1024x576.jpg\" alt=\"\" class=\"wp-image-72777\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2025\/04\/IMG-5648-1-1024x576.jpg 1024w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/04\/IMG-5648-1-300x169.jpg 300w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/04\/IMG-5648-1-768x432.jpg 768w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/04\/IMG-5648-1-1536x864.jpg 1536w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/04\/IMG-5648-1-2048x1152.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El pasado jueves 10 de abril se llev\u00f3 a cabo el evento virtual \u201cDe la pantalla a la realidad: el [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":72771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,8331],"tags":[4857,4097],"class_list":["post-72770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-entelgy-security-america","tag-entelgy-en-peru-es","tag-entelgy-security-america"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/72770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=72770"}],"version-history":[{"count":1,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/72770\/revisions"}],"predecessor-version":[{"id":79629,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/72770\/revisions\/79629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/72771"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=72770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=72770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=72770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}