{"id":26897,"date":"2016-09-14T22:00:00","date_gmt":"2016-09-14T20:00:00","guid":{"rendered":"https:\/\/entelgy.com\/cuadernos-seguridad-infraestructuras-criticas\/"},"modified":"2024-11-06T21:14:29","modified_gmt":"2024-11-06T20:14:29","slug":"cuadernos-seguridad-infraestructuras-criticas","status":"publish","type":"post","link":"https:\/\/entelgy.com\/pt-br\/actualidad-es\/cuadernos-seguridad-infraestructuras-criticas\/","title":{"rendered":"Nuevo art\u00edculo de InnoTec publicado en Cuadernos de Seguridad sobre \u201cInfraestructuras cr\u00edticas\u201d"},"content":{"rendered":"<img fetchpriority=\"high\" decoding=\"async\" class=\" size-full wp-image-26896\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/09\/433b44ac07b69aee9de9d3f0c3e72bd0.jpg\" alt=\"\" class=\"caption\" title=\"Nuevo art\u00edculo de InnoTec publicado en Cuadernos de Seguridad sobre \u201cInfraestructuras cr\u00edticas\u201d\" width=\"303\" height=\"456\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2016\/09\/433b44ac07b69aee9de9d3f0c3e72bd0.jpg 303w, https:\/\/entelgy.com\/wp-content\/uploads\/2016\/09\/433b44ac07b69aee9de9d3f0c3e72bd0-199x300.jpg 199w\" sizes=\"(max-width: 303px) 100vw, 303px\" \/>\n<p><strong>\u00bfProtege su organizaci\u00f3n de forma eficiente sus Infraestructuras cr\u00edticas? Este es el t\u00edtulo del nuevo art\u00edculo publicado por <a href=\"http:\/\/www.puntoseguridad.com\/cuadernos-de-seguridad\/revista\/313\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cuadernos de Seguridad<\/a> y escrito por nuestros expertos en Seguridad.<\/strong><\/p>\n<p><!--more--><\/p>\n<div class=\"post_wp\">\n<p><strong><em>Puedes leer el <a href=\"media\/k2\/items\/src\/Entelgy\/2016\/09\/Cuadernos-de-Seguridad_Infraestructuras-cr\u00edticas_articulo-edici\u00f3n-Julio-2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">art\u00edculo completo de Cuadernos de Seguridad pinchando aqu\u00ed<\/a><\/em><\/strong><\/p>\n<p>Marta Dom\u00ednguez, Enrique Dom\u00ednguez y Clara Baonza, del <strong>equipo de Seguridad de <\/strong><a href=\"https:\/\/www.entelgy.com\/oferta-diferencial\/areas-de-especializacion\/security-risk-management-3\/?lang=es\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>InnoTec (Grupo Entelgy)<\/strong><\/a>, son los autores de este interesante art\u00edculo sobre Infraestructuras cr\u00edticas publicado en el n\u00famero de julio de <strong>Cuadernos de Seguridad<\/strong>.<\/p>\n<p><strong>\u201c<em>\u00bfProtege su organizaci\u00f3n de forma eficiente sus infraestructuras cr\u00edticas?\u201d<\/em><\/strong><\/p>\n<blockquote>\n<p><em>\u201cPor su enorme transcendencia, las infraestructuras cr\u00edticas o estrat\u00e9gicas de una organizaci\u00f3n deben tener asegurada su disponibilidad y correcto funcionamiento. Lo contrario podr\u00eda derivar en una p\u00e9rdida de control sobre el proceso, con los riesgos que ello implicar\u00eda tanto en la seguridad del sistema como incluso en la seguridad f\u00edsica de las personas o el entorno. La seguridad en entornos industriales, por tanto, requiere de una atenci\u00f3n y medidas de protecci\u00f3n especiales, que contemplen la gesti\u00f3n integral de la seguridad\u201d.<\/em><\/p>\n<\/blockquote>\n<p>A lo largo del art\u00edculo nos explican qu\u00e9 se consideran hoy en d\u00eda infraestructuras cr\u00edticas y c\u00f3mo en Espa\u00f1a<\/p>\n<blockquote>\n<p><em>\u201chasta la fecha se han nombrado 93 operadores cr\u00edticos y se han identificado a m\u00e1s de 300 infraestructuras cr\u00edticas de sectores como la energ\u00eda, la industria nuclear, el sistema financiero, el transporte y el agua\u201d<\/em>.<\/p>\n<\/blockquote>\n<p>Como cada vez son m\u00e1s numerosas las amenazas e incidentes de ciberseguridad en entornos industriales, las tradicionales estrategias y controles de seguridad IT ya no son suficientes por lo que<\/p>\n<blockquote>\n<p><em>\u201cen la protecci\u00f3n de las infraestructuras cr\u00edticas es preciso aplicar el pensamiento lateral y ponerse en el lugar del atacante\u201d.<\/em><\/p>\n<\/blockquote>\n<p>A lo largo del art\u00edculo, los autores nos cuentan cu\u00e1les son los principales desaf\u00edos en Seguridad OT (<em>Operational Technology<\/em>) y qu\u00e9 <strong>propuesta de valor proporciona InnoTec<\/strong>: a trav\u00e9s de sus alianzas con empresas l\u00edderes en la seguridad de OT, ofrece una <strong>soluci\u00f3n para la provisi\u00f3n y gesti\u00f3n centralizada de seguridad OT<\/strong>, a trav\u00e9s de un acceso remoto seguro.<\/p>\n<p><a href=\"media\/k2\/items\/src\/Entelgy\/2016\/09\/Cuadernos-de-Seguridad-Infraestructuras-cr\u00edticas-Desaf\u00edos-Seguridad-OT.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-18800 size-full\" title=\"Cuadernos de Seguridad - Infraestructuras cr\u00edticas - Desafios Seguridad OT\" src=\"media\/k2\/items\/src\/Entelgy\/2016\/09\/Cuadernos-de-Seguridad-Infraestructuras-cr\u00edticas-Desaf\u00edos-Seguridad-OT.jpg\" alt=\"Cuadernos de Seguridad - Infraestructuras cr\u00edticas - Desafios Seguridad OT\" width=\"457\" height=\"245\" \/><\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfProtege su organizaci\u00f3n de forma eficiente sus Infraestructuras cr\u00edticas? Este es el t\u00edtulo del nuevo art\u00edculo publicado por Cuadernos de [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,4703],"tags":[5261,5557],"class_list":["post-26897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-en-los-medios-es","tag-ciberseguridad-es","tag-infraestructuras-criticas-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/26897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=26897"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/26897\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media\/26896"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=26897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=26897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=26897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}