{"id":28299,"date":"2012-12-17T23:00:00","date_gmt":"2012-12-17T22:00:00","guid":{"rendered":"https:\/\/entelgy.com\/innotec-entelgy-participa-en-las-principales-citas-del-ambito-de-seguridad\/"},"modified":"2024-11-06T22:43:48","modified_gmt":"2024-11-06T21:43:48","slug":"innotec-entelgy-participa-en-las-principales-citas-del-ambito-de-seguridad","status":"publish","type":"post","link":"https:\/\/entelgy.com\/pt-br\/actualidad-es\/innotec-entelgy-participa-en-las-principales-citas-del-ambito-de-seguridad\/","title":{"rendered":"Participamos en las principales citas de seguridad"},"content":{"rendered":"<img decoding=\"async\" class=\" size-full wp-image-28295\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/cca96200f40a0bb29452494fc20f7474.jpg\" alt=\"\" class=\"caption\" title=\"Participamos en las principales citas de seguridad\" width=\"314\" height=\"82\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/cca96200f40a0bb29452494fc20f7474.jpg 314w, https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/cca96200f40a0bb29452494fc20f7474-300x78.jpg 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" \/>\n<div class=\"post_wp\">\n<p ><strong><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2014\/10\/Logo-Innotec-Entelgy.jpg\" rel=\"noopener\"><img decoding=\"async\" class=\"alignleft wp-image-8531\" title=\"Logo Innotec Entelgy\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2014\/10\/Logo-Innotec-Entelgy.jpg\" alt=\"\" width=\"112\" height=\"55\" \/><\/a><span >InnoTec, la empresa del grupo Entelgy especialista en Seguridad, ha estado presente estos d\u00edas en las\u00a0principales citas del \u00e1mbito de seguridad<\/span><\/strong><\/p>\n<h3 ><span ><strong>VI Jornadas STIC<\/strong><\/span><\/h3>\n<p ><span ><strong><span ><em><span ><strong><span ><strong><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/Logotipo-VI-Jornadas-STIC-CNN-CERT1.png\" rel=\"noopener\"><img decoding=\"async\" class=\"alignright wp-image-8710\" title=\"Logotipo VI Jornadas STIC - CNN -CERT\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/Logotipo-VI-Jornadas-STIC-CNN-CERT1.png\" alt=\"\" width=\"193\" height=\"60\" \/><\/a><\/strong><\/span><\/strong><\/span><\/em><\/span>\u201cLa gesti\u00f3n de la Ciberseguridad en las Administraciones P\u00fablicas\u201d<\/strong><\/span><\/p>\n<p ><span ><em>11 y 12 de Diciembre, Madrid<\/em><\/span><\/p>\n<p >El Equipo de Respuesta ante Incidentes del Centro Criptol\u00f3gico Nacional, CCN-CERT, celebr\u00f3 sus VI Jornadas STIC en el Auditorio de la F\u00e1brica Nacional de la Moneda y Timbre \u2013 Real Casa de la Moneda, en Madrid.<\/p>\n<p ><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/InnoTec-Entelgy-VI-Jornadas-STIC.png\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8711\" title=\"InnoTec Entelgy - VI Jornadas STIC\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/InnoTec-Entelgy-VI-Jornadas-STIC.png\" alt=\"\" width=\"213\" height=\"223\" \/><\/a>Al evento estuvieron invitados todos los <strong>responsables de ciberseguridad de las distintas administraciones p\u00fablicas espa\u00f1olas<\/strong> (General, Auton\u00f3mica y Local), as\u00ed como de <strong>organizaciones privadas <\/strong>pertenecientes a<strong> sectores estrat\u00e9gicos <\/strong>y de infraestructuras cr\u00edticas.<\/p>\n<p >Las jornadas contaron con la colaboraci\u00f3n especial y patrocinio de las principales empresas que operan en Espa\u00f1a en materia de ciberseguridad, entre las que se encuentra <strong>InnoTec<\/strong>.<\/p>\n<p ><strong>Adem\u00e1s de patrocinar el evento, <!--more Leer el resto de la entrada--><\/strong><strong>Juan Garrido<\/strong> (Consultor Senior Seguridad, MVP Enterprise Security) imparti\u00f3 la <strong>ponencia<\/strong> titulada <strong>Ejemplo de funcionamiento APT<\/strong><strong> y se entreg\u00f3 documentaci\u00f3n especializada a todos los asistentes<\/strong>.<\/p>\n<p ><strong>La asistencia fue un \u00e9xito<\/strong>.<strong> M\u00e1s de 500 asistentes\u00a0<\/strong>a lo largo de los dos d\u00edas, <strong>corroboran el nivel y conocimiento de las ponencias all\u00ed presentadas.<\/strong><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/NP8-VI-Jornadas-STIC-201212172.pdf\" rel=\"noopener\">Nota de Prensa del CNI &#8211; CNN<\/a><\/p>\n<p ><a href=\"https:\/\/www.ccn-cert.cni.es\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ccn-cert.cni.es\/<\/a><\/p>\n<h3 ><span ><strong><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2013\/10\/Logotipo-Navaja-Negra.png\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8712\" title=\"Logotipo Navaja Negra\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2013\/10\/Logotipo-Navaja-Negra.png\" alt=\"\" width=\"197\" height=\"45\" \/><\/a>II Conferencia Navaja Negra<\/strong><\/span><\/h3>\n<p ><span ><em>30 de Noviembre y 1 de Diciembre, Albacete<\/em><\/span><\/p>\n<p >Tras el \u00e9xito de las anteriores conferencias de Navaja Negra, los organizadores de estas jornadas volvieron a convocar a <strong>12 ponentes<\/strong> <strong>de excepci\u00f3n<\/strong> que impartieron <strong>8 charlas<\/strong> y que no dejaron indiferentes a los asistentes.<\/p>\n<p ><a target=\"_blank\" href=\"\/media\/k2\/items\/src\/Entelgy\/2012\/12\/Ponentes-y-Organizaci\u00f3n-Navaja-Negra1.jpg\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8714\" title=\"Ponentes y Organizaci\u00f3n Navaja Negra\" src=\"\/media\/k2\/items\/src\/Entelgy\/2012\/12\/Ponentes-y-Organizaci\u00f3n-Navaja-Negra1.jpg\" alt=\"\" width=\"191\" height=\"150\" \/><\/a>Entre los ponentes, un <strong>grupo de voluntarios<\/strong> apasionados de la seguridad y con ganas de compartir sus conocimientos, estaba <strong>Aladdin Gurbanov<\/strong>, <em>Consultor Senior de Seguridad de InnoTec<\/em>, que imparti\u00f3 la <strong>ponencia Crimeware and Malware researcher and Analyst<\/strong>.<\/p>\n<p >La conferencia se celebr\u00f3 en el Sal\u00f3n de Actos del <strong>CEEI (Centro Europeo de Empresas e Innovaci\u00f3n) de Albacete.<\/strong><\/p>\n<p ><a href=\"http:\/\/navajanegra.com\/Default.aspx\" target=\"_blank\" rel=\"noopener\">http:\/\/navajanegra.com\/Default.aspx<\/a><\/p>\n<p>&nbsp;<\/p><\/div>\n<p><!--more--><\/p>\n<div class=\"post_wp\">\n<p ><strong><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2014\/10\/Logo-Innotec-Entelgy.jpg\" rel=\"noopener\"><img decoding=\"async\" class=\"alignleft wp-image-8531\" title=\"Logo Innotec Entelgy\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2014\/10\/Logo-Innotec-Entelgy.jpg\" alt=\"\" width=\"112\" height=\"55\" \/><\/a><span >InnoTec, la empresa del grupo Entelgy especialista en Seguridad, ha estado presente estos d\u00edas en las\u00a0principales citas del \u00e1mbito de seguridad<\/span><\/strong><\/p>\n<h3 ><span ><strong>VI Jornadas STIC<\/strong><\/span><\/h3>\n<p ><span ><strong><span ><em><span ><strong><span ><strong><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/Logotipo-VI-Jornadas-STIC-CNN-CERT1.png\" rel=\"noopener\"><img decoding=\"async\" class=\"alignright wp-image-8710\" title=\"Logotipo VI Jornadas STIC - CNN -CERT\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/Logotipo-VI-Jornadas-STIC-CNN-CERT1.png\" alt=\"\" width=\"193\" height=\"60\" \/><\/a><\/strong><\/span><\/strong><\/span><\/em><\/span>\u201cLa gesti\u00f3n de la Ciberseguridad en las Administraciones P\u00fablicas\u201d<\/strong><\/span><\/p>\n<p ><span ><em>11 y 12 de Diciembre, Madrid<\/em><\/span><\/p>\n<p >El Equipo de Respuesta ante Incidentes del Centro Criptol\u00f3gico Nacional, CCN-CERT, celebr\u00f3 sus VI Jornadas STIC en el Auditorio de la F\u00e1brica Nacional de la Moneda y Timbre \u2013 Real Casa de la Moneda, en Madrid.<\/p>\n<p ><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/InnoTec-Entelgy-VI-Jornadas-STIC.png\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8711\" title=\"InnoTec Entelgy - VI Jornadas STIC\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/InnoTec-Entelgy-VI-Jornadas-STIC.png\" alt=\"\" width=\"213\" height=\"223\" \/><\/a>Al evento estuvieron invitados todos los <strong>responsables de ciberseguridad de las distintas administraciones p\u00fablicas espa\u00f1olas<\/strong> (General, Auton\u00f3mica y Local), as\u00ed como de <strong>organizaciones privadas <\/strong>pertenecientes a<strong> sectores estrat\u00e9gicos <\/strong>y de infraestructuras cr\u00edticas.<\/p>\n<p >Las jornadas contaron con la colaboraci\u00f3n especial y patrocinio de las principales empresas que operan en Espa\u00f1a en materia de ciberseguridad, entre las que se encuentra <strong>InnoTec<\/strong>.<\/p>\n<p ><strong>Adem\u00e1s de patrocinar el evento, <!--more Leer el resto de la entrada--><\/strong><strong>Juan Garrido<\/strong> (Consultor Senior Seguridad, MVP Enterprise Security) imparti\u00f3 la <strong>ponencia<\/strong> titulada <strong>Ejemplo de funcionamiento APT<\/strong><strong> y se entreg\u00f3 documentaci\u00f3n especializada a todos los asistentes<\/strong>.<\/p>\n<p ><strong>La asistencia fue un \u00e9xito<\/strong>.<strong> M\u00e1s de 500 asistentes\u00a0<\/strong>a lo largo de los dos d\u00edas, <strong>corroboran el nivel y conocimiento de las ponencias all\u00ed presentadas.<\/strong><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2012\/12\/NP8-VI-Jornadas-STIC-201212172.pdf\" rel=\"noopener\">Nota de Prensa del CNI &#8211; CNN<\/a><\/p>\n<p ><a href=\"https:\/\/www.ccn-cert.cni.es\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ccn-cert.cni.es\/<\/a><\/p>\n<h3 ><span ><strong><a target=\"_blank\" href=\"https:\/\/entelgy.com\/wp-content\/uploads\/2013\/10\/Logotipo-Navaja-Negra.png\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8712\" title=\"Logotipo Navaja Negra\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2013\/10\/Logotipo-Navaja-Negra.png\" alt=\"\" width=\"197\" height=\"45\" \/><\/a>II Conferencia Navaja Negra<\/strong><\/span><\/h3>\n<p ><span ><em>30 de Noviembre y 1 de Diciembre, Albacete<\/em><\/span><\/p>\n<p >Tras el \u00e9xito de las anteriores conferencias de Navaja Negra, los organizadores de estas jornadas volvieron a convocar a <strong>12 ponentes<\/strong> <strong>de excepci\u00f3n<\/strong> que impartieron <strong>8 charlas<\/strong> y que no dejaron indiferentes a los asistentes.<\/p>\n<p ><a target=\"_blank\" href=\"\/media\/k2\/items\/src\/Entelgy\/2012\/12\/Ponentes-y-Organizaci\u00f3n-Navaja-Negra1.jpg\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8714\" title=\"Ponentes y Organizaci\u00f3n Navaja Negra\" src=\"\/media\/k2\/items\/src\/Entelgy\/2012\/12\/Ponentes-y-Organizaci\u00f3n-Navaja-Negra1.jpg\" alt=\"\" width=\"191\" height=\"150\" \/><\/a>Entre los ponentes, un <strong>grupo de voluntarios<\/strong> apasionados de la seguridad y con ganas de compartir sus conocimientos, estaba <strong>Aladdin Gurbanov<\/strong>, <em>Consultor Senior de Seguridad de InnoTec<\/em>, que imparti\u00f3 la <strong>ponencia Crimeware and Malware researcher and Analyst<\/strong>.<\/p>\n<p >La conferencia se celebr\u00f3 en el Sal\u00f3n de Actos del <strong>CEEI (Centro Europeo de Empresas e Innovaci\u00f3n) de Albacete.<\/strong><\/p>\n<p ><a href=\"http:\/\/navajanegra.com\/Default.aspx\" target=\"_blank\" rel=\"noopener\">http:\/\/navajanegra.com\/Default.aspx<\/a><\/p>\n<p>&nbsp;<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>InnoTec, la empresa del grupo Entelgy especialista en Seguridad, ha estado presente estos d\u00edas en las\u00a0principales citas del \u00e1mbito de [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28295,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,4685],"tags":[5261,5269],"class_list":["post-28299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-resumen-de-eventos-en-es-es","tag-ciberseguridad-es","tag-seguridad-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/28299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/comments?post=28299"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/posts\/28299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media\/28295"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/media?parent=28299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/categories?post=28299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/pt-br\/wp-json\/wp\/v2\/tags?post=28299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}