{"id":42866,"date":"2025-02-19T14:47:16","date_gmt":"2025-02-19T14:47:16","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=42866"},"modified":"2025-08-25T15:13:31","modified_gmt":"2025-08-25T15:13:31","slug":"board-training-nis2-nivel-2","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/","title":{"rendered":"Board Training NIS2 Nivel 2"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb bottom_divider_color=\u00bb#0C71C3&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb24vh||10vh|10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb60px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb header_font_size_tablet=\u00bb60px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>Board Training NIS2<br \/>Nivel 2<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Formaci\u00f3n a bordo NIS2 \/ <span style=\"color: #f18a00;\">Nivel 2<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_margin_tablet=\u00bb|||0px|false|false\u00bb custom_margin_phone=\u00bb|0px|||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||8px|0px|false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb100%\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_margin_tablet=\u00bb|||0px|false|false\u00bb custom_margin_phone=\u00bb|||0px|false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb|10%||0px|false|false\u00bb custom_padding_tablet=\u00bb|5%||5%|false|true\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbalign-self:center;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/05\/NIS2_Login_ES-scaled.webp\u00bb alt=\u00bbNIS2_Login_ES\u00bb title_text=\u00bbNIS2_Login_ES\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|||120px|true|false\u00bb custom_padding_tablet=\u00bb50px|||0px|false|false\u00bb custom_padding_phone=\u00bb|10px||10px|true|true\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb custom_css_main_element=\u00bbalign-self:center;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbCyber Guru NIS2&#8243; alt=\u00bbConcienciaci\u00f3n\u00bb icon_placement=\u00bbleft\u00bb image_icon_width=\u00bb100%\u00bb content_max_width=\u00bb60px\u00bb image_last_edited=\u00bboff|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh2&#8243; header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=\u00bb48px\u00bb module_alignment=\u00bbleft\u00bb min_height=\u00bb11.4px\u00bb custom_margin=\u00bb||0px|-18px|false|false\u00bb custom_margin_tablet=\u00bb||0px||false|false\u00bb custom_margin_phone=\u00bb25px||0px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px|0px|false|false\u00bb header_font_size_tablet=\u00bb48px\u00bb header_font_size_phone=\u00bb36px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb custom_css_blurb_image=\u00bbwidth:15%;||\u00bb custom_css_blurb_content=\u00bbmax-width: none !important;||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00bb][\/et_pb_blurb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p><span><span style=\"color: #000000;\">El nivel II del curso NIS2 aborda los retos de la protecci\u00f3n digital, combinando la gobernanza, las tecnolog\u00edas avanzadas y la concienciaci\u00f3n sobre los riesgos cibern\u00e9ticos. Su objetivo es proporcionar habilidades para gestionar las amenazas cibern\u00e9ticas a trav\u00e9s de estrategias de gobernanza, el uso de la Inteligencia Artificial y el an\u00e1lisis de casos del mundo real con un enfoque en las regulaciones, la gesti\u00f3n de riesgos y las t\u00e9cnicas de ataque para fortalecer la resiliencia corporativa. El objetivo del curso es aumentar la concienciaci\u00f3n sobre la seguridad y crear una cultura de seguridad eficaz contra las ciberamenazas en evoluci\u00f3n.<\/span> <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N I\u00bb button_url=\u00bb#section-1&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb min_height=\u00bb223.4px\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>CIBERSEGURIDAD INTEGRADA<\/strong><\/h5>\n<p><strong>3 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N II\u00bb button_url=\u00bb#section-2&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>DE LA GOBERNANZA A LA AI<\/strong><\/h5>\n<p><strong>3 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N III\u00bb button_url=\u00bb#section-3&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb min_height=\u00bb226.4px\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>CASOS CIBERN\u00c9TICOS<\/strong><\/h5>\n<p><strong>4 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbSECCI\u00d3N IV\u00bb button_url=\u00bb#section-4&#8243; button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_font=\u00bbInter||||||||\u00bb body_font=\u00bbRubik||||||||\u00bb body_text_align=\u00bbcenter\u00bb body_line_height=\u00bb0.8em\u00bb background_color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=\u00bb#FFFFFF\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb5px\u00bb button_font=\u00bbInter||||||||\u00bb button_use_icon=\u00bboff\u00bb button_custom_padding=\u00bb10px|25px|10px|25px|true|true\u00bb min_height=\u00bb225.4px\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}\u00bb]<\/p>\n<h5><strong>CONCIENCIACI\u00d3N SOBRE SEGURIDAD<\/strong><\/h5>\n<p><strong>6 Lecciones<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb background_enable_image=\u00bboff\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb custom_padding_tablet=\u00bb0px||0px||true|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; <span>CIBERSEGURIDAD INTEGRADA<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; <span>SEGURIDAD DE LA CADENA DE SUMINISTRO<\/span><\/span><br \/><span>La seguridad de la cadena de suministro es crucial en el riesgo cibern\u00e9tico, como subrayan la NIS2 y los marcos de seguridad. La gesti\u00f3n de la cadena de suministro requiere la participaci\u00f3n de la ciberseguridad ya en la selecci\u00f3n de socios y una estrategia que incluya pruebas previas, an\u00e1lisis de vulnerabilidad y pruebas de penetraci\u00f3n antes de la integraci\u00f3n. Los contratos y los acuerdos de confidencialidad deben formalizar los requisitos de seguridad y prever auditor\u00edas continuas.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; <span>CIBERSEGURIDAD INTEGRADA<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; <span>IDENTIDAD DIGITAL<\/span><\/span><br \/><span>La Identidad Digital es el nuevo per\u00edmetro de seguridad de las organizaciones, y el enfoque de Confianza Cero garantiza un acceso seguro autenticando y autorizando cada operaci\u00f3n seg\u00fan los principios de m\u00ednimo privilegio y necesidad de conocer, evitando los riesgos relacionados con la estratificaci\u00f3n tecnol\u00f3gica y el exceso de permisos. Herramientas clave como Directory Service para la gesti\u00f3n de identidades, IAM para los permisos de aplicaciones, PAM para el acceso administrativo y Conditional Access. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N I &#8211; <span>CIBERSEGURIDAD INTEGRADA<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; <span>SEGURIDAD DESDE EL DISE\u00d1O<\/span><\/span><br \/><span>El principio de seguridad desde el dise\u00f1o exige que la seguridad se integre desde la fase de dise\u00f1o del software, la infraestructura y los procesos, salvaguardando la confidencialidad, integridad, disponibilidad y resistencia de los datos. Este planteamiento riguroso y disciplinado es esencial para reducir los ciberriesgos y los costes de las intervenciones posteriores, aplic\u00e1ndose a todas las fases, desde la concepci\u00f3n hasta la entrega, incluidos el an\u00e1lisis del contexto y del riesgo, la definici\u00f3n de los requisitos de seguridad y el tratamiento y la aceptaci\u00f3n del riesgo residual. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-2&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>DE LA GOBERNANZA A LA AI<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; <\/span><span style=\"color: #f18a00;\">EL PUEBLO<\/span><br \/><span>La gesti\u00f3n del ciberriesgo no s\u00f3lo requiere soluciones tecnol\u00f3gicas, sino tambi\u00e9n gobernanza e implicaci\u00f3n de las personas. El Marco de Gobernanza de la Ciberseguridad, compuesto por directrices, pol\u00edticas y procedimientos, organiza las normas para proteger los datos y las infraestructuras. Sin embargo, un comportamiento inadecuado puede poner en peligro las inversiones en seguridad.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>DE LA GOBERNANZA A LA AI<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; <\/span><span style=\"color: #f18a00;\">LA NUBE<\/span><br \/><span>En el pasado, la estrategia de la nube pretend\u00eda reducir costes mediante la desinversi\u00f3n en centros de datos, pero la complejidad tecnol\u00f3gica y econ\u00f3mica ha dejado obsoleto este planteamiento. Hoy, con la transformaci\u00f3n digital, la nube es indispensable por su rapidez y flexibilidad. Las empresas est\u00e1n adoptando una \u201ceconom\u00eda de la nube\u201d basada en componentes modulares y reutilizables, adapt\u00e1ndose al tiempo de comercializaci\u00f3n y dise\u00f1ando servicios \u00e1giles y temporales.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N II &#8211; <span>DE LA GOBERNANZA A LA AI<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; <span>AI Y CIBERSEGURIDAD<\/span><\/span><br \/><span>La inteligencia artificial est\u00e1 revolucionando la ciberseguridad, con herramientas de aprendizaje autom\u00e1tico y modelos de lenguaje (LLM) que analizan grandes vol\u00famenes de datos, reducen los falsos positivos y apoyan tareas como la selecci\u00f3n de controles de seguridad, la redacci\u00f3n de pol\u00edticas y la navegaci\u00f3n normativa. Los agentes de IA pueden apoyar o sustituir a los equipos de primer nivel en los Centros de Operaciones de Seguridad, acelerando la respuesta a las amenazas, y mejorar la inteligencia sobre amenazas para prevenir ataques.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; <span>DEEPFAKE Y MANIPULACI\u00d3N<\/span><\/span><br \/><span>Un deepfake ultrarrealista del CEO aparece en un v\u00eddeo, anunciando una falsa adquisici\u00f3n. Las acciones de la empresa caen en picado y el Consejo se ve obligado a tomar medidas r\u00e1pidas. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; <span>ATAQUE A DISPOSITIVOS PERSONALES<\/span><\/span><br \/><span>Un miembro de la junta directiva accede a la red de la empresa desde su anticuada tableta personal. Un malware se infiltra en los sistemas, permitiendo a los hackers espiar reuniones estrat\u00e9gicas. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; <span>PHISHING SELECTIVO<\/span><\/span><br \/><span>Un miembro de la Junta Directiva recibe un correo electr\u00f3nico bien estructurado, aparentemente de un socio estrat\u00e9gico, con un archivo adjunto infectado. Al abrir el archivo, los hackers obtienen acceso a documentos confidenciales de la Junta Directiva. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N III &#8211; <span>CASOS CIBERN\u00c9TICOS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 4 &#8211; <span>AMENAZAS INTERNAS<\/span><\/span><br \/><span>Un alto ejecutivo empieza a comportarse de forma sospechosa. Poco despu\u00e9s, se descubre que ha exfiltrado datos sensibles sobre estrategias empresariales y los ha vendido a un competidor o a un agente estatal hostil. La empresa sufre un grave perjuicio competitivo y se arriesga a repercusiones legales.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CONCIENCIACI\u00d3N EN MATERIA DE SEGURIDAD<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 1 &#8211; <span>SPEAR PHISHING AVANZADO<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">El spear phishing es una t\u00e9cnica avanzada de ciberataque que se dirige a personas concretas mediante correos electr\u00f3nicos o mensajes muy personalizados. Los piratas inform\u00e1ticos recopilan informaci\u00f3n sobre las v\u00edctimas a partir de redes sociales, sitios web o filtraciones de datos, lo que hace que las comunicaciones sean extremadamente cre\u00edbles. El objetivo es inducir al objetivo a hacer clic en enlaces maliciosos, descargar malware o facilitar credenciales confidenciales.  <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CONCIENCIACI\u00d3N EN MATERIA DE SEGURIDAD<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 2 &#8211; <span>AI Y PROTECCI\u00d3N DE DATOS<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">La Inteligencia Artificial est\u00e1 transformando la gesti\u00f3n y protecci\u00f3n de datos, pero tambi\u00e9n plantea retos cruciales en materia de privacidad y seguridad. Los algoritmos de IA analizan enormes vol\u00famenes de informaci\u00f3n, optimizando la ciberseguridad con la detecci\u00f3n avanzada de amenazas, la reducci\u00f3n de falsos positivos y la automatizaci\u00f3n de la respuesta a los ataques.   <\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb module_id=\u00bbsection-4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CONCIENCIACI\u00d3N EN MATERIA DE SEGURIDAD<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 3 &#8211; <span>INGENIER\u00cdA SOCIAL<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">La ingenier\u00eda social es una t\u00e9cnica de ataque que utiliza la manipulaci\u00f3n psicol\u00f3gica para acceder a informaci\u00f3n confidencial, sistemas de la empresa o recursos sensibles. Los piratas inform\u00e1ticos no atacan directamente a la tecnolog\u00eda, sino que se infiltran en las organizaciones aprovechando la confianza, la falta de atenci\u00f3n o la presi\u00f3n psicol\u00f3gica de los empleados&#8230;. <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CONCIENCIACI\u00d3N EN MATERIA DE SEGURIDAD<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 4 &#8211; <span>TRAE TU PROPIO DISPOSITIVO (BYOD)<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">BYOD permite utilizar dispositivos personales para acceder a redes y datos corporativos, mejorando la flexibilidad y la productividad. Sin embargo, esta pr\u00e1ctica introduce importantes riesgos de ciberseguridad, ya que los port\u00e1tiles, smartphones y tabletas personales no suelen cumplir las normas de seguridad corporativas. Sin los controles adecuados, BYOD puede exponer a la empresa a malware, robo de datos y accesos no autorizados.    <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CONCIENCIACI\u00d3N EN MATERIA DE SEGURIDAD<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 5 &#8211; <span>AUTENTICACI\u00d3N <\/span> <\/span><br \/><span>Los sistemas de autenticaci\u00f3n protegen el acceso a las redes, datos y aplicaciones corporativas, garantizando que s\u00f3lo los usuarios autorizados puedan utilizarlos. Los m\u00e9todos tradicionales basados en contrase\u00f1as son cada vez m\u00e1s vulnerables a la suplantaci\u00f3n de identidad, la fuerza bruta y el relleno de credenciales, lo que hace necesario un enfoque m\u00e1s seguro. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb20px|20px|20px|20px|true|true\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>SECCI\u00d3N IV &#8211; <span>CONCIENCIACI\u00d3N EN MATERIA DE SEGURIDAD<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LECCI\u00d3N 6 &#8211; <span>ATAQUE ADVERSARIO<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Los ataques adversarios son ataques sofisticados que manipulan modelos de Inteligencia Artificial (IA) introduciendo datos enga\u00f1osos para alterar su comportamiento. Estos ataques aprovechan las vulnerabilidades de los algoritmos de aprendizaje autom\u00e1tico, induciendo errores en los sistemas de reconocimiento facial, an\u00e1lisis de amenazas o ciberseguridad automatizada. <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_image=\u00bboff\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb50px||50px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00bb alt=\u00bbM\u00e1s\u00bb title_text=\u00bbM\u00e1s\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-200px\u00bb horizontal_offset=\u00bb85px\u00bb vertical_offset_tablet=\u00bb-55px\u00bb vertical_offset_phone=\u00bb-90px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-55px\u00bb horizontal_offset_phone=\u00bb-50px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb position_origin_a_tablet=\u00bbtop_left\u00bb position_origin_a_phone=\u00bbtop_left\u00bb position_origin_a_last_edited=\u00bbon|phone\u00bb position_origin_f_tablet=\u00bb\u00bb position_origin_f_phone=\u00bb\u00bb position_origin_f_last_edited=\u00bbon|phone\u00bb position_origin_r_tablet=\u00bb\u00bb position_origin_r_phone=\u00bb\u00bb position_origin_r_last_edited=\u00bbon|phone\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb||||false|false\u00bb positioning_tablet=\u00bbabsolute\u00bb positioning_phone=\u00bbabsolute\u00bb positioning_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbL\u00ednea\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb70px|170px|0px|170px|false|true\u00bb custom_padding_tablet=\u00bb|100px||100px|false|true\u00bb custom_padding_phone=\u00bb70px|20px|0px|20px|false|true\u00bb border_radii=\u00bboff|10px|10px||\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">\u00bfQuiere saber m\u00e1s?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_tablet=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_phone=\u00bb0px|0px|70px|0px|false|true\u00bb border_radii=\u00bboff|||15px|15px\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb1px\u00bb box_shadow_vertical=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbCONTACTO\u00bb button_alignment=\u00bbcenter\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ1NDU2In19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbFICHA T\u00c9CNICA\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQyNzMxIn19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbSOLICITAR DEMOSTRACI\u00d3N\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00bb alt=\u00bbQuieres saber\u00bb title_text=\u00bbQuieres saber\u00bb align=\u00bbright\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-20px\u00bb horizontal_offset=\u00bb-100px\u00bb vertical_offset_tablet=\u00bb-20px\u00bb vertical_offset_phone=\u00bb-80px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-100px\u00bb horizontal_offset_phone=\u00bb-130px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb width=\u00bb25%\u00bb width_tablet=\u00bb25%\u00bb width_phone=\u00bb25%\u00bb width_last_edited=\u00bbon|phone\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Board Training NIS2Nivel 2Formaci\u00f3n a bordo NIS2 \/ Nivel 2El nivel II del curso NIS2 aborda los retos de la protecci\u00f3n digital, combinando la gobernanza, las tecnolog\u00edas avanzadas y la concienciaci\u00f3n sobre los riesgos cibern\u00e9ticos. Su objetivo es proporcionar habilidades para gestionar las amenazas cibern\u00e9ticas a trav\u00e9s de estrategias de gobernanza, el uso de la [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-42866","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Board Training NIS2 Nivel 2 - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Descubra el curso de formaci\u00f3n para directivos NIS2 para afrontar los retos de la protecci\u00f3n digital y mejorar la seguridad de las empresas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Board Training NIS2 Nivel 2\" \/>\n<meta property=\"og:description\" content=\"Descubra el curso de formaci\u00f3n para directivos NIS2 para afrontar los retos de la protecci\u00f3n digital y mejorar la seguridad de las empresas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T15:13:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-2\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-2\\\/\",\"name\":\"Board Training NIS2 Nivel 2 - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"datePublished\":\"2025-02-19T14:47:16+00:00\",\"dateModified\":\"2025-08-25T15:13:31+00:00\",\"description\":\"Descubra el curso de formaci\u00f3n para directivos NIS2 para afrontar los retos de la protecci\u00f3n digital y mejorar la seguridad de las empresas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-2\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/board-training-nis2-nivel-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Board Training NIS2 Nivel 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Board Training NIS2 Nivel 2 - Cyber Guru","description":"Descubra el curso de formaci\u00f3n para directivos NIS2 para afrontar los retos de la protecci\u00f3n digital y mejorar la seguridad de las empresas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/","og_locale":"es_ES","og_type":"article","og_title":"Board Training NIS2 Nivel 2","og_description":"Descubra el curso de formaci\u00f3n para directivos NIS2 para afrontar los retos de la protecci\u00f3n digital y mejorar la seguridad de las empresas.","og_url":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-08-25T15:13:31+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/","url":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/","name":"Board Training NIS2 Nivel 2 - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"datePublished":"2025-02-19T14:47:16+00:00","dateModified":"2025-08-25T15:13:31+00:00","description":"Descubra el curso de formaci\u00f3n para directivos NIS2 para afrontar los retos de la protecci\u00f3n digital y mejorar la seguridad de las empresas.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/board-training-nis2-nivel-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Board Training NIS2 Nivel 2"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/42866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=42866"}],"version-history":[{"count":18,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/42866\/revisions"}],"predecessor-version":[{"id":49391,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/42866\/revisions\/49391"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=42866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}