{"id":76605,"date":"2025-10-06T08:00:00","date_gmt":"2025-10-06T06:00:00","guid":{"rendered":"https:\/\/entelgy.com\/?p=76605"},"modified":"2026-02-23T16:39:10","modified_gmt":"2026-02-23T15:39:10","slug":"webinar-latam-seguridad-de-aplicaciones-con-enfoque-zero-trust","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/actualidad-es\/webinar-latam-seguridad-de-aplicaciones-con-enfoque-zero-trust\/","title":{"rendered":"\u00bfEst\u00e1s preparado para mitigar riesgos en el desarrollo de software con Zero Trust?"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">En un entorno digital cada vez m\u00e1s interconectado, la seguridad del software es un responsabilidad t\u00e9cnica y una prioridad estrat\u00e9gica para las organizaciones. Cada librer\u00eda de c\u00f3digo abierto, actualizaci\u00f3n autom\u00e1tica o plugin integrado en tus aplicaciones puede convertirse en un punto de entrada para ataques sofisticados. Seg\u00fan el informe &#8220;State of Software Supply Chain Security 2024&#8221; de Sonatype, el n\u00famero de ataques detectados en la cadena de suministro de software se duplic\u00f3 nuevamente en 2024, indicando que la industria a\u00fan est\u00e1 mayormente indefensa ante estos riesgos crecientes<\/h4>\n\n\n\n<p>Esta evoluci\u00f3n de amenazas ha llevado a que Gartner prediga que, para 2025, el <strong>45%<\/strong> de las organizaciones a nivel mundial habr\u00e1n experimentado ataques en sus cadenas de suministro de software<\/p>\n\n\n\n<p>Para abordar estos desaf\u00edos, <strong>Entelgy<\/strong>, en colaboraci\u00f3n con <strong>Checkmarx<\/strong>, organiza el webinar \u201cZero Trust en acci\u00f3n: mitigando riesgos en la cadena de suministro de las aplicaciones\u201d, dirigido a profesionales de <strong>Chile, Colombia, Per\u00fa y Brasil<\/strong>. Este evento es una oportunidad \u00fanica para aprender c\u00f3mo implementar un enfoque de seguridad integral que no asuma confianza en ninguna parte del ciclo de vida del desarrollo y producci\u00f3n.<\/p>\n\n\n\n<p><strong>Lo que descubrir\u00e1s en este webinar:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Buenas pr\u00e1cticas para gestionar dependencias de c\u00f3digo abierto y artefactos firmados.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Estrategias para medir y responder ante incidentes en la cadena de suministro.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementaci\u00f3n de controles Zero Trust en DevSecOps, incluyendo:<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SBOM y verificaci\u00f3n de firmas<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SAST\/SCA en tiempo real<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Endurecimiento del pipeline CI\/CD<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsegmentaci\u00f3n, MFA, accesos JIT\/JEA<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitoreo continuo de la infraestructura y aplicaciones<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2025\/10\/54508_og-1-1024x538.png\" alt=\"webinar Zero trust\" class=\"wp-image-76645\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2025\/10\/54508_og-1-1024x538.png 1024w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/10\/54508_og-1-300x158.png 300w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/10\/54508_og-1-768x403.png 768w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/10\/54508_og-1.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Horarios por pa\u00eds:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Per\u00fa &amp; Colombia: 9:00 a. m. (GMT-5)<\/li>\n\n\n\n<li>Chile: 11:00 a. m. (GMT-3)<\/li>\n\n\n\n<li>Brasil (S\u00e3o Paulo): 11:00 a. m. (GMT-3)<\/li>\n<\/ul>\n\n\n\n<p>Este <strong>webinar <\/strong>tendr\u00e1s la oportunidad de entender la teor\u00eda de <strong>Zero Trust<\/strong>, y verla aplicada en la pr\u00e1ctica, aprender de expertos y descubrir c\u00f3mo proteger tu cadena de suministro de software antes de que los riesgos se conviertan en problemas.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/events.teams.microsoft.com\/event\/f13de11d-d7aa-4af4-8dcb-9a5e438d8626@0dde42e5-5611-482f-b5bf-c67228a199cd\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a1Reg\u00edstrate y participa!<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En un entorno digital cada vez m\u00e1s interconectado, la seguridad del software es un responsabilidad t\u00e9cnica y una prioridad estrat\u00e9gica [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":76642,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,87],"tags":[4857,4097],"class_list":["post-76605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-eventos-es","tag-entelgy-en-peru-es","tag-entelgy-security-america"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/76605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=76605"}],"version-history":[{"count":7,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/76605\/revisions"}],"predecessor-version":[{"id":76653,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/76605\/revisions\/76653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/76642"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=76605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=76605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=76605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}