{"id":42525,"date":"2025-02-09T15:59:42","date_gmt":"2025-02-09T15:59:42","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=42525"},"modified":"2025-08-25T14:57:03","modified_gmt":"2025-08-25T14:57:03","slug":"board-training-nis2-nivel-1","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/","title":{"rendered":"Board Training NIS2 Nivel 1"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb bottom_divider_color=\u00bb#0C71C3&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb24vh||10vh|10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb60px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb header_font_size_tablet=\u00bb60px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>Board Training NIS2<br \/>Nivel 1<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Formaci\u00f3n a bordo NIS2 \/ <span style=\"color: #f18a00;\">Nivel 1<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_margin_tablet=\u00bb|||0px|false|false\u00bb custom_margin_phone=\u00bb|0px|||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||8px|0px|false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb100%\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_margin_tablet=\u00bb|||0px|false|false\u00bb custom_margin_phone=\u00bb|||0px|false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb|10%||0px|false|false\u00bb custom_padding_tablet=\u00bb|5%||5%|false|true\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbalign-self:center;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/05\/Lesson_NIS2_ES.webp\u00bb alt=\u00bbLesson_NIS2_ES\u00bb title_text=\u00bbLesson_NIS2_ES\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||120px|true|false\u00bb custom_padding_tablet=\u00bb50px|||0px|false|false\u00bb custom_padding_phone=\u00bb|10px||10px|true|true\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb custom_css_main_element=\u00bbalign-self:center;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbCyber Guru NIS2&#8243; alt=\u00bbConcienciaci\u00f3n\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb100%\u00bb content_max_width=\u00bb60px\u00bb image_last_edited=\u00bboff|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh2&#8243; header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=\u00bb48px\u00bb module_alignment=\u00bbleft\u00bb min_height=\u00bb11.4px\u00bb custom_margin=\u00bb||0px|-18px|false|false\u00bb custom_margin_tablet=\u00bb||0px||false|false\u00bb custom_margin_phone=\u00bb25px||0px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px|0px|false|false\u00bb header_font_size_tablet=\u00bb48px\u00bb header_font_size_phone=\u00bb36px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb custom_css_blurb_image=\u00bbwidth:15%;||\u00bb custom_css_blurb_content=\u00bbmax-width: none !important;||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22%93}\u00bb][\/et_pb_blurb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb hover_enabled=\u00bb0&#8243; sticky_enabled=\u00bb0&#8243;]<\/p>\n<p><span style=\"color: #000000;\">El curso sobre la Directiva NIS2 de la UE aborda el ciberriesgo, un problema sist\u00e9mico que amenaza la estabilidad de las infraestructuras digitales. Su objetivo es proporcionar conocimientos y habilidades de gesti\u00f3n para mitigar los riesgos, con especial atenci\u00f3n a la regulaci\u00f3n, la gesti\u00f3n de riesgos, la prevenci\u00f3n de ataques y los impactos de las tecnolog\u00edas emergentes como la nube y la IA. El curso est\u00e1 dirigido a empresas del per\u00edmetro NIS2 y de la cadena de suministro de grandes grupos industriales. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N I\u00bb button_url=\u00bb#section-1&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>MARCO NORMATIVO<\/strong><\/h5>\n<p><strong>6 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N II\u00bb button_url=\u00bb#section-2&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>RIESGOS CIBERN\u00c9TICOS<\/strong><\/h5>\n<p><strong>5 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N III\u00bb button_url=\u00bb#section-3&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>CIBERATAQUES<\/strong><\/h5>\n<p><strong>4 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N IV\u00bb button_url=\u00bb#section-4&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>CASOS CIBERN\u00c9TICOS<\/strong><\/h5>\n<p><strong>4 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb background_enable_image=\u00bboff\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb custom_padding_tablet=\u00bb0px||0px||true|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; MARCO REGLAMENTARIO<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; <span>EL MARCO NORMATIVO<\/span><\/span><br \/>\n<span>Esta conferencia explora la evoluci\u00f3n del marco regulador de la ciberseguridad desde 2010 hasta la reciente directiva NIS2. Analiza las etapas clave de la regulaci\u00f3n en Italia y destaca el paso de la protecci\u00f3n de las infraestructuras cr\u00edticas a la salvaguarda de todo el sistema productivo europeo, ilustrando las principales diferencias entre NIS y NIS2 y las nuevas obligaciones para los agentes cr\u00edticos del mercado.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; MARCO REGLAMENTARIO<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; LA DIRECTIVA NIS2 (PARTE I)<\/span><br \/>\nEn esta lecci\u00f3n se analiza el contenido de la Directiva NIS2, que introduce nuevas obligaciones para las empresas y los organismos p\u00fablicos. Tambi\u00e9n se definen las razones por las que la UE intervino para superar algunas de las limitaciones de la anterior Directiva NIS, a menudo relacionadas con la extrema discrecionalidad que se dejaba a los Estados miembros. Tambi\u00e9n se ofrece una visi\u00f3n general de las entidades reguladas, con una distinci\u00f3n entre entidades esenciales e importantes.   <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; MARCO REGLAMENTARIO<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; LA DIRECTIVA NIS2 (PARTE II)<\/span><br \/>\nEsta lecci\u00f3n introduce el tema de la responsabilidad de los \u00f3rganos de direcci\u00f3n. Con la gesti\u00f3n de riesgos, la notificaci\u00f3n de incidentes y las medidas de supervisi\u00f3n, la legislaci\u00f3n muestra c\u00f3mo los \u00f3rganos de direcci\u00f3n de las empresas desempe\u00f1an un papel clave en la ciberseguridad. Esta lecci\u00f3n aborda las medidas de seguridad espec\u00edficas para la gesti\u00f3n del ciberriesgo, refiri\u00e9ndose en particular a las pol\u00edticas de riesgo, la gesti\u00f3n de incidentes, la continuidad de las actividades y la seguridad de la cadena de suministro.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; MARCO REGLAMENTARIO<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 4 &#8211; LA DIRECTIVA NIS2 (PARTE III)<\/span><br \/>\nEsta lecci\u00f3n proporciona antecedentes sobre el enfoque de riesgos m\u00faltiples, que incluye los riesgos f\u00edsicos, humanos y tecnol\u00f3gicos. A continuaci\u00f3n, se hace hincapi\u00e9 en c\u00f3mo notificar incidentes. Por \u00faltimo, se presta especial atenci\u00f3n al marco de sanciones, que es especialmente severo, y ello tanto para los agentes esenciales como para los importantes.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; MARCO REGLAMENTARIO<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 5 &#8211; <\/span><span style=\"color: #f18a00;\">TRANSPOSICI\u00d3N DE LA NIS2<\/span><br \/>\nEsta lecci\u00f3n est\u00e1 dedicada al estudio en profundidad de las disposiciones del Decreto Legislativo 138\/2024, como legislaci\u00f3n de transposici\u00f3n de la Directiva NIS2. La lecci\u00f3n analiza los elementos de especificidad introducidos por el legislador italiano, esboza las funciones y responsabilidades de los actores implicados e ilustra las consecuencias en caso de incumplimiento, incluidas las sanciones administrativas previstas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; MARCO REGLAMENTARIO<\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 6 &#8211; EL<\/span><span style=\"color: #f18a00;\">MODELO ORGANIZATIVO DE NIS2<\/span><br \/>\nEsta lecci\u00f3n aborda los cambios organizativos que deben aplicar las realidades perimetrales de NIS2, identifica las nuevas medidas organizativas y de gesti\u00f3n, y aclara las funciones y responsabilidades precisas de todos los actores implicados en el nuevo modelo.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-2&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>CIBERRIESGOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; EL CIBERRIESGO<\/span><br \/>La gesti\u00f3n del ciberriesgo, parte integrante de las operaciones empresariales, requiere evaluar y mitigar los riesgos derivados de las vulnerabilidades digitales explotadas intencionadamente por agentes malintencionados. La reducci\u00f3n del riesgo se basa en dos dimensiones: disminuir la probabilidad de un ataque mediante la prevenci\u00f3n y la concienciaci\u00f3n, y limitar el impacto mediante activos resistentes y mejores pr\u00e1cticas tecnol\u00f3gicas. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>CIBERRIESGOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; AN\u00c1LISIS DE LOS RIESGOS CIBERN\u00c9TICOS<\/span><br \/>El an\u00e1lisis de riesgos es fundamental para comprender las amenazas, sus probabilidades e impactos, y definir contramedidas. Siguiendo normas como ISO o NIST, consta de seis pasos: identificaci\u00f3n del contexto y los riesgos, an\u00e1lisis de los mismos, definici\u00f3n de prioridades, preparaci\u00f3n de respuestas y supervisi\u00f3n continua. El principal resultado es el Registro de Riesgos, que establece un mapa de los riesgos cibern\u00e9ticos y no cibern\u00e9ticos, esencial para las estrategias de seguridad multirriesgo exigidas por la NIS2.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>CIBERRIESGOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; <\/span><span style=\"color: #f18a00;\">MEDIR EL RIESGO<\/span><br \/>La evaluaci\u00f3n del riesgo consiste en analizar la probabilidad y el impacto de un acontecimiento adverso para tomar decisiones con conocimiento de causa. Los an\u00e1lisis pueden ser cualitativos, m\u00e1s sencillos pero subjetivos, o cuantitativos, m\u00e1s complejos pero precisos y \u00fatiles para justificar las inversiones en mitigaci\u00f3n. Medir el riesgo ayuda a elegir las mejores estrategias de tratamiento, reduciendo la incertidumbre y superando las distorsiones relacionadas con la percepci\u00f3n personal.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>CIBERRIESGOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 4 &#8211; CONTROLES DE SEGURIDAD<\/span><br \/>La gesti\u00f3n de incidentes de seguridad se basa en el an\u00e1lisis de los registros generados por las infraestructuras digitales para identificar y prevenir situaciones cr\u00edticas. El Centro de Operaciones de Seguridad (SOC) procesa las alertas a trav\u00e9s de un flujo operativo estructurado que consta de tres fases: an\u00e1lisis preliminar, an\u00e1lisis detallado y definici\u00f3n de acciones de contenci\u00f3n y remediaci\u00f3n. El uso de Inteligencia Artificial (IA) ayuda a reducir los falsos positivos, mejorando la eficiencia operativa.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>CIBERRIESGOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 5 &#8211; DA\u00d1OS<\/span><br \/><span>El impacto representa el da\u00f1o causado por un evento adverso, que puede clasificarse en directo, responsabilidad, indirecto y consecuente. En el riesgo cibern\u00e9tico, los da\u00f1os se dividen en propios (interrupci\u00f3n del negocio, restauraci\u00f3n del sistema, gesti\u00f3n de incidentes) y de terceros (litigios, violaci\u00f3n de datos). Mientras que los da\u00f1os materiales son m\u00e1s f\u00e1ciles de estimar, los inmateriales requieren evaluaciones complejas.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CIBERATAQUES <\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; <span>LA DIN\u00c1MICA DE UN ATAQUE<\/span><\/span><br \/><span>La din\u00e1mica del riesgo cibern\u00e9tico sigue un patr\u00f3n en el que una amenaza explota un vector y una t\u00e9cnica para atacar una vulnerabilidad, generando da\u00f1os. Comprender las amenazas, los vectores y las t\u00e9cnicas es crucial: las amenazas van desde individuos a organizaciones complejas; los vectores incluyen el correo electr\u00f3nico, las aplicaciones maliciosas o las redes de bots; las t\u00e9cnicas var\u00edan desde el phishing al malware. El correo electr\u00f3nico es el vector m\u00e1s com\u00fan, mientras que los botnets, compuestos por dispositivos comprometidos, se utilizan para ataques como los DDoS.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CIBERATAQUES <\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; <span>LAS PRINCIPALES T\u00c9CNICAS DE ATAQUE<\/span><\/span><br \/><span>Las t\u00e9cnicas de ciberataque incluyen el malware, la explotaci\u00f3n de vulnerabilidades y los ataques distribuidos de denegaci\u00f3n de servicio (DDoS). El malware, incluido el de d\u00eda cero, explota vulnerabilidades desconocidas, mientras que las vulnerabilidades expuestas en Internet permiten robar datos y obtener acceso privilegiado, a menudo mediante ingenier\u00eda social. Los DDoS sobrecargan infraestructuras o aplicaciones, dej\u00e1ndolas inutilizables.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CIBERATAQUES <\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; <span>VULNERABILIDADES<\/span><\/span><br \/><span>Las vulnerabilidades s\u00f3lo suponen un riesgo si no se mitigan mediante controles t\u00e9cnicos o de procedimiento. Su ciclo de vida pasa por cuatro fases: descubrimiento, divulgaci\u00f3n, identificaci\u00f3n de contramedidas y aplicaci\u00f3n, siendo las dos primeras especialmente cr\u00edticas. Una gesti\u00f3n eficaz de las vulnerabilidades requiere un proceso industrializado basado en actualizaciones constantes, inventarios exhaustivos de activos y una estrategia priorizada.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CIBERATAQUES <\/span> <\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 4 &#8211; <span>INCIDENTES DE SEGURIDAD<\/span><\/span><br \/><span>La gesti\u00f3n de incidentes de seguridad se basa en el an\u00e1lisis de los registros producidos por las infraestructuras digitales, que se utilizan para identificar y prevenir situaciones cr\u00edticas. El Centro de Operaciones de Seguridad (SOC) procesa las alarmas a trav\u00e9s de un flujo de trabajo en tres etapas: an\u00e1lisis preliminar, an\u00e1lisis detallado y definici\u00f3n de acciones de contenci\u00f3n y remediaci\u00f3n. El uso de Inteligencia Artificial reduce los falsos positivos, mejorando la eficiencia.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; <span>ESTAFA AL DIRECTOR GENERAL<\/span><\/span><br \/><span>Un ciberdelincuente compromete o falsifica el correo electr\u00f3nico del director general o de otro miembro del consejo de administraci\u00f3n y env\u00eda un correo urgente al director financiero o a un ejecutivo financiero, ordenando una transferencia de millones de euros a una cuenta extranjera.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; <span>ATAQUE RANSOMWARE CON CHANTAJE<\/span><\/span><br \/><span>Una empresa energ\u00e9tica l\u00edder sufre un ataque de ransomware que bloquea los sistemas inform\u00e1ticos y paraliza las operaciones. Los delincuentes amenazan con publicar datos sensibles de la Junta si no se paga el rescate. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; <span>ATAQUE A LA CADENA DE SUMINISTRO<\/span><\/span><br \/><span>Un proveedor de servicios en la nube utilizado por la empresa sufre un ataque. Los hackers utilizan sus credenciales para acceder a datos confidenciales del Consejo y de clientes estrat\u00e9gicos. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\"><span>LECCI\u00d3N 4 &#8211; VIOLACI\u00d3N DE DATOS<\/span> <\/span><br \/><span>Un ataque dirigido roba datos financieros y personales de miembros del consejo de administraci\u00f3n. La prensa se entera y la empresa sufre da\u00f1os en su reputaci\u00f3n, as\u00ed como riesgos por incumplimiento de las normas NIS2 y GDPR.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_image=\u00bboff\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb50px||50px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00bb alt=\u00bbM\u00e1s\u00bb title_text=\u00bbM\u00e1s\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-200px\u00bb horizontal_offset=\u00bb85px\u00bb vertical_offset_tablet=\u00bb-55px\u00bb vertical_offset_phone=\u00bb-90px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-55px\u00bb horizontal_offset_phone=\u00bb-50px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb position_origin_a_tablet=\u00bbtop_left\u00bb position_origin_a_phone=\u00bbtop_left\u00bb position_origin_a_last_edited=\u00bbon|phone\u00bb position_origin_f_tablet=\u00bb\u00bb position_origin_f_phone=\u00bb\u00bb position_origin_f_last_edited=\u00bbon|phone\u00bb position_origin_r_tablet=\u00bb\u00bb position_origin_r_phone=\u00bb\u00bb position_origin_r_last_edited=\u00bbon|phone\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb||||false|false\u00bb positioning_tablet=\u00bbabsolute\u00bb positioning_phone=\u00bbabsolute\u00bb positioning_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbL\u00ednea\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb70px|170px|0px|170px|false|true\u00bb custom_padding_tablet=\u00bb|100px||100px|false|true\u00bb custom_padding_phone=\u00bb70px|20px|0px|20px|false|true\u00bb border_radii=\u00bboff|10px|10px||\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">\u00bfQuiere saber m\u00e1s?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_tablet=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_phone=\u00bb0px|0px|70px|0px|false|true\u00bb border_radii=\u00bboff|||15px|15px\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb1px\u00bb box_shadow_vertical=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbCONTACTO\u00bb button_alignment=\u00bbcenter\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ1NDU2In19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbFICHA T\u00c9CNICA\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQyNzMxIn19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbSOLICITAR DEMOSTRACI\u00d3N\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00bb alt=\u00bbQuieres saber\u00bb title_text=\u00bbQuieres saber\u00bb align=\u00bbright\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-20px\u00bb horizontal_offset=\u00bb-100px\u00bb vertical_offset_tablet=\u00bb-20px\u00bb vertical_offset_phone=\u00bb-80px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-100px\u00bb horizontal_offset_phone=\u00bb-130px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb width=\u00bb25%\u00bb width_tablet=\u00bb25%\u00bb width_phone=\u00bb25%\u00bb width_last_edited=\u00bbon|phone\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Board Training NIS2Nivel 1Formaci\u00f3n a bordo NIS2 \/ Nivel 1El curso sobre la Directiva NIS2 de la UE aborda el ciberriesgo, un problema sist\u00e9mico que amenaza la estabilidad de las infraestructuras digitales. Su objetivo es proporcionar conocimientos y habilidades de gesti\u00f3n para mitigar los riesgos, con especial atenci\u00f3n a la regulaci\u00f3n, la gesti\u00f3n de riesgos, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-42525","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Board Training NIS2 Nivel 1 - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Descubra las lecciones de NIS2 Board Training para afrontar los retos digitales y mejorar la resistencia de las empresas frente a las ciberamenazas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Board Training NIS2 Nivel 1\" \/>\n<meta property=\"og:description\" content=\"Descubra las lecciones de NIS2 Board Training para afrontar los retos digitales y mejorar la resistencia de las empresas frente a las ciberamenazas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T14:57:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-1\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-1\\\/\",\"name\":\"Board Training NIS2 Nivel 1 - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"datePublished\":\"2025-02-09T15:59:42+00:00\",\"dateModified\":\"2025-08-25T14:57:03+00:00\",\"description\":\"Descubra las lecciones de NIS2 Board Training para afrontar los retos digitales y mejorar la resistencia de las empresas frente a las ciberamenazas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-1\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-1\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Board Training NIS2 Nivel 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Board Training NIS2 Nivel 1 - Cyber Guru","description":"Descubra las lecciones de NIS2 Board Training para afrontar los retos digitales y mejorar la resistencia de las empresas frente a las ciberamenazas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/","og_locale":"es_ES","og_type":"article","og_title":"Board Training NIS2 Nivel 1","og_description":"Descubra las lecciones de NIS2 Board Training para afrontar los retos digitales y mejorar la resistencia de las empresas frente a las ciberamenazas.","og_url":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-08-25T14:57:03+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/","url":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/","name":"Board Training NIS2 Nivel 1 - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"datePublished":"2025-02-09T15:59:42+00:00","dateModified":"2025-08-25T14:57:03+00:00","description":"Descubra las lecciones de NIS2 Board Training para afrontar los retos digitales y mejorar la resistencia de las empresas frente a las ciberamenazas.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Board Training NIS2 Nivel 1"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/42525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=42525"}],"version-history":[{"count":18,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/42525\/revisions"}],"predecessor-version":[{"id":49377,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/42525\/revisions\/49377"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=42525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}