{"id":49290,"date":"2025-08-26T10:19:46","date_gmt":"2025-08-26T10:19:46","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=49290"},"modified":"2025-08-26T10:25:49","modified_gmt":"2025-08-26T10:25:49","slug":"compliance-training","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/es\/compliance-training\/","title":{"rendered":"Compliance Training"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb bottom_divider_color=\u00bb#0C71C3&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb24vh||10vh|10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb60px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb header_font_size_tablet=\u00bb60px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>Compliance Training<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb global_colors_info=\u00bb{}\u00bb]Plataforma de Formaci\u00f3n \/ <span style=\"color: #f18a00;\">Compliance Training<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f8f8f8&#8243; background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00bb custom_padding=\u00bb||39px||false|false\u00bb custom_padding_tablet=\u00bb||||false|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb background_last_edited=\u00bbon|phone\u00bb background_position_tablet=\u00bbcenter_left\u00bb background_position_phone=\u00bbcenter_left\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb|10%||10%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin_tablet=\u00bb30px||||false|false\u00bb custom_margin_phone=\u00bb20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2>Normativas de Privacidad y Seguridad<\/h2>\n<p>Un desaf\u00edo cultural<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb custom_padding=\u00bb|94px||||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">En el panorama digital actual, cada vez m\u00e1s complejo y en r\u00e1pida evoluci\u00f3n, las organizaciones se enfrentan a una presi\u00f3n constante: proteger la informaci\u00f3n, preservar la confianza y cumplir con las normativas. Para ser conformes hoy no basta con dotarse de las tecnolog\u00edas adecuadas o adherirse formalmente a listas de verificaci\u00f3n, hay que construir una cultura de seguridad y responsabilidad compartida en todos los niveles empresariales. <br \/><\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter||||||||\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb|-34px||||\u00bb custom_padding=\u00bb|||0px||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\">En este escenario, la <em>Formaci\u00f3n de Concienciaci\u00f3n<\/em> se convierte en una pieza esencial para cerrar la brecha entre las pol\u00edticas y la pr\u00e1ctica correcta, transformando a las personas en protagonistas activos de la estrategia de defensa de la organizaci\u00f3n. <\/span><\/p>\n<p><span style=\"color: #000000;\">Reglamentos como el <strong>RGPD<\/strong>, el <strong>PCI DSS<\/strong> y otros est\u00e1ndares en materia de privacidad y seguridad, requieren mucho m\u00e1s que simples sistemas inform\u00e1ticos robustos. Exigen a las organizaciones garantizar que todos los empleados comprendan c\u00f3mo gestionar los datos de manera responsable y act\u00faen teniendo en cuenta la seguridad.  <\/span><\/p>\n<p><span style=\"color: #000000;\">Esto significa tambi\u00e9n formar a quienes tienen mayores responsabilidades para difundir la cultura de protecci\u00f3n de datos y hacer comprender el impacto real de los comportamientos cotidianos en el cumplimiento normativo. <\/span><\/p>\n<p><span style=\"color: #000000;\">Es por esta raz\u00f3n que la formaci\u00f3n sobre riesgos cibern\u00e9ticos desempe\u00f1a un papel fundamental, <\/span><span style=\"color: #000000; font-size: 16px;\">transformando la obligaci\u00f3n normativa en un compromiso activo y consciente, y convirtiendo el comportamiento seguro y responsable en parte integral de las rutinas diarias de cada persona.<\/span> <\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb|-34px||||\u00bb custom_padding=\u00bb|||0px||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f8f8f8&#8243; use_background_color_gradient=\u00bbon\u00bb background_color_gradient_direction=\u00bb360deg\u00bb background_color_gradient_stops=\u00bb#010512 0%|#071036 100%\u00bb background_enable_image=\u00bboff\u00bb custom_padding=\u00bb||39px||false|false\u00bb custom_padding_tablet=\u00bb||||false|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb background_last_edited=\u00bbon|phone\u00bb background_position_tablet=\u00bbcenter_left\u00bb background_position_phone=\u00bbcenter_left\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb|10%||10%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin_tablet=\u00bb30px||||false|false\u00bb custom_margin_phone=\u00bb20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #ffffff;\">NIS2 y DORA: del cumplimiento al liderazgo en seguridad inform\u00e1tica<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px|-44px|20px||false|false\u00bb custom_padding=\u00bb|94px||||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">En un contexto normativo cada vez m\u00e1s riguroso e interconectado, la seguridad inform\u00e1tica se ha convertido en una responsabilidad directa para la alta direcci\u00f3n. Las normativas europeas como <strong>NIS2<\/strong> y <strong>DORA<\/strong> atribuyen a los directivos de las organizaciones obligaciones precisas en materia de ciberseguridad, gesti\u00f3n del riesgo TIC y resistencia operativa. Para ser realmente eficaces y conformes, ya no basta con delegar: se necesita concienciaci\u00f3n en la c\u00fapula y competencias extendidas. Los itinerarios formativos de <em>Formaci\u00f3n en Cumplimiento<\/em> est\u00e1n dise\u00f1ados para guiar \u201cla evoluci\u00f3n cultural de las organizaciones y transformar la\u201d obligaci\u00f3n normativa en una palanca estrat\u00e9gica para la gobernanza digital. Las formaciones se dirigen a:    <\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_blurb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb|-34px||||\u00bb custom_padding=\u00bb|||0px||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #ffffff;\">Administradores, directivos y alta direcci\u00f3n de organizaciones p\u00fablicas y privadas<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #ffffff;\">Entidades incluidas en los per\u00edmetros normativos de NIS2 y DORA<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #ffffff;\">Responsables de la gobernanza, la ciberresistencia y el cumplimiento normativo<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #ffffff;\">Proveedores y socios involucrados en las cadenas de suministro<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb min_height=\u00bb1350px\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_padding=\u00bb0px||53px|0px|false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb module_alignment=\u00bbcenter\u00bb min_height=\u00bb715px\u00bb custom_margin=\u00bb21px|auto||auto||\u00bb custom_padding=\u00bb0px|||10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|8%|||false|false\u00bb custom_padding_tablet=\u00bb|8%|||false|false\u00bb custom_padding_phone=\u00bb|2%||2%|false|true\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb width=\u00bb87.6%\u00bb width_tablet=\u00bb80%\u00bb width_phone=\u00bb\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_margin_tablet=\u00bb||25px||false|false\u00bb custom_margin_phone=\u00bb||25px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb module_alignment_tablet=\u00bbleft\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2>Formaci\u00f3n para Consejos NIS2<\/h2>\n<h3>Seguridad digital como responsabilidad de gobernanza<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\">El programa formativo en e-learning dedicado a la <em>Directiva NIS2<\/em> responde a las obligaciones previstas para los \u00f3rganos de gesti\u00f3n de las organizaciones esenciales e importantes, tanto p\u00fablicas como privadas, con un enfoque en:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"color: #000000;\">Papel del consejo en la gesti\u00f3n del riesgo cibern\u00e9tico<\/span><\/li>\n<li><span style=\"color: #000000;\">Obligaciones formativas y responsabilidades legales<\/span><\/li>\n<li><span style=\"color: #000000;\">Estrategias de prevenci\u00f3n, respuesta y resistencia<\/span><\/li>\n<li><span style=\"color: #000000;\">Escenarios, t\u00e9cnicas de ataque y contramedidas<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Este programa formativo proporciona a los miembros del consejo las herramientas para tomar decisiones conscientes e informadas, en l\u00ednea con las obligaciones de la Directiva NIS2.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQyMzE5In19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbPARA SABER M\u00c1S\u00bb button_alignment=\u00bbleft\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][dipl_button _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/dipl_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/05\/Dashboard_NIS2_ES.webp\u00bb alt=\u00bbDashboard_NIS2_ES\u00bb title_text=\u00bbDashboard_NIS2_ES\u00bb align=\u00bbcenter\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_padding=\u00bb32px||||false|true\u00bb custom_padding_tablet=\u00bb|5%||5%|false|true\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/Lesson_DORA_SP_2x-scaled.webp\u00bb alt=\u00bbLesson_DORA_ES\u00bb title_text=\u00bbLesson_DORA_ES\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|8%|||false|false\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb width=\u00bb87.6%\u00bb width_tablet=\u00bb80%\u00bb width_phone=\u00bb\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_margin_tablet=\u00bb||25px||false|false\u00bb custom_margin_phone=\u00bb||25px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb module_alignment_tablet=\u00bbleft\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: left;\">Formaci\u00f3n para Consejos DORA<\/h2>\n<h3 style=\"text-align: left;\">Gobernanza de la resistencia operativa digital<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\">El <em>Reglamento DORA<\/em> (Digital Operational Resilience Act) impone requisitos estrictos al sector financiero para gestionar los riesgos TIC y garantizar la continuidad operativa en caso de amenazas sist\u00e9micas.<\/span><\/p>\n<p><span style=\"color: #000000;\">El programa dedicado al Reglamento DORA ayuda a los \u00f3rganos directivos a comprender y gestionar los riesgos TIC, promoviendo una cultura de resistencia digital. El programa se centra en: <\/span><\/p>\n<p><span style=\"color: #000000;\"><\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"color: #000000;\">Gesti\u00f3n del riesgo TIC y responsabilidad del consejo<\/span><\/li>\n<li><span style=\"color: #000000;\">Amenazas inform\u00e1ticas e impacto sist\u00e9mico<\/span><\/li>\n<li><span style=\"color: #000000;\">Resistencia operativa en el sector financiero<\/span><\/li>\n<li><span style=\"color: #000000;\">Terceros y proveedores de servicios cr\u00edticos<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f8f8f8&#8243; background_enable_image=\u00bboff\u00bb custom_padding=\u00bb||39px||false|false\u00bb custom_padding_tablet=\u00bb||||false|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb background_last_edited=\u00bbon|phone\u00bb background_position_tablet=\u00bbcenter_left\u00bb background_position_phone=\u00bbcenter_left\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb|10%||10%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin_tablet=\u00bb30px||||false|false\u00bb custom_margin_phone=\u00bb20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2>Un modelo formativo<\/h2>\n<h2>adaptado a las necesidades<\/h2>\n<h2>normativas<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb custom_padding=\u00bb|94px||||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">En el contexto digital actual, el cumplimiento normativo no puede limitarse a la adopci\u00f3n de tecnolog\u00edas o al respeto formal de requisitos: requiere una cultura compartida de seguridad y responsabilidad. <\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb98.5%\u00bb module_alignment=\u00bbleft\u00bb min_height=\u00bb34.2px\u00bb custom_margin=\u00bb|||154px||\u00bb custom_padding=\u00bb||0px|||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\"><strong>Aprendizaje progresivo<\/strong><\/span><br \/><span style=\"color: #000000;\">Microlecciones breves y focalizadas para optimizar la carga cognitiva y favorecer la comprensi\u00f3n<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\"><strong>Experiencia modular<\/strong><\/span><br \/><span style=\"color: #000000;\">Itinerarios dise\u00f1ados para adaptarse a los diferentes roles y niveles de responsabilidad<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\"><strong>Contenidos siempre actualizados y conformes a las obligaciones normativas<\/strong><\/span><br \/><span style=\"color: #000000;\">Alineaci\u00f3n constante con las normativas y las evoluciones del panorama cibern\u00e9tico<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\"><strong>Informes y seguimiento<\/strong><\/span><br \/><span style=\"color: #000000;\">Panel de control de monitorizaci\u00f3n para verificar finalizaci\u00f3n, avance y resultados<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb|-34px||||\u00bb custom_padding=\u00bb|||0px||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb50px||50px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00bb alt=\u00bbM\u00e1s\u00bb title_text=\u00bbM\u00e1s\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-200px\u00bb horizontal_offset=\u00bb85px\u00bb vertical_offset_tablet=\u00bb-55px\u00bb vertical_offset_phone=\u00bb-90px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-55px\u00bb horizontal_offset_phone=\u00bb-50px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb position_origin_a_tablet=\u00bbtop_left\u00bb position_origin_a_phone=\u00bbtop_left\u00bb position_origin_a_last_edited=\u00bbon|phone\u00bb position_origin_f_tablet=\u00bb\u00bb position_origin_f_phone=\u00bb\u00bb position_origin_f_last_edited=\u00bbon|phone\u00bb position_origin_r_tablet=\u00bb\u00bb position_origin_r_phone=\u00bb\u00bb position_origin_r_last_edited=\u00bbon|phone\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb||||false|false\u00bb positioning_tablet=\u00bbabsolute\u00bb positioning_phone=\u00bbabsolute\u00bb positioning_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbL\u00ednea\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb70px|170px|0px|170px|false|true\u00bb custom_padding_tablet=\u00bb|100px||100px|false|true\u00bb custom_padding_phone=\u00bb70px|20px|0px|20px|false|true\u00bb border_radii=\u00bboff|10px|10px||\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">\u00bfQuiere saber m\u00e1s?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_tablet=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_phone=\u00bb0px|0px|70px|0px|false|true\u00bb border_radii=\u00bboff|||15px|15px\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb1px\u00bb box_shadow_vertical=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bbhttps:\/\/www.cyberguru.it\/es\/contacto\/\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbCONT\u00c1CTANOS\u00bb button_alignment=\u00bbcenter\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQxMjUzIn19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbPERFIL DE LA EMPRESA\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbSOLICITAR DEMO\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00bb alt=\u00bb\u00bfQuiere saber\u00bb title_text=\u00bb\u00bfQuiere saber\u00bb align=\u00bbright\u00bb disabled_on=\u00bbon|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-20px\u00bb horizontal_offset=\u00bb-100px\u00bb vertical_offset_tablet=\u00bb-20px\u00bb vertical_offset_phone=\u00bb-80px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-100px\u00bb horizontal_offset_phone=\u00bb-130px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb width=\u00bb25%\u00bb width_tablet=\u00bb25%\u00bb width_phone=\u00bb25%\u00bb width_last_edited=\u00bbon|phone\u00bb custom_margin=\u00bb||||false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compliance TrainingPlataforma de Formaci\u00f3n \/ Compliance TrainingNormativas de Privacidad y Seguridad Un desaf\u00edo culturalEn el panorama digital actual, cada vez m\u00e1s complejo y en r\u00e1pida evoluci\u00f3n, las organizaciones se enfrentan a una presi\u00f3n constante: proteger la informaci\u00f3n, preservar la confianza y cumplir con las normativas. Para ser conformes hoy no basta con dotarse de las [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-49290","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Compliance Training - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Descubre la importancia de la Formaci\u00f3n en Cumplimiento para garantizar una cultura de seguridad y responsabilidad en la empresa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/compliance-training\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance Training\" \/>\n<meta property=\"og:description\" content=\"Descubre la importancia de la Formaci\u00f3n en Cumplimiento para garantizar una cultura de seguridad y responsabilidad en la empresa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/compliance-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T10:25:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/compliance-training\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/compliance-training\\\/\",\"name\":\"Compliance Training - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"datePublished\":\"2025-08-26T10:19:46+00:00\",\"dateModified\":\"2025-08-26T10:25:49+00:00\",\"description\":\"Descubre la importancia de la Formaci\u00f3n en Cumplimiento para garantizar una cultura de seguridad y responsabilidad en la empresa.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/compliance-training\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/compliance-training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/compliance-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Compliance Training - Cyber Guru","description":"Descubre la importancia de la Formaci\u00f3n en Cumplimiento para garantizar una cultura de seguridad y responsabilidad en la empresa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/compliance-training\/","og_locale":"es_ES","og_type":"article","og_title":"Compliance Training","og_description":"Descubre la importancia de la Formaci\u00f3n en Cumplimiento para garantizar una cultura de seguridad y responsabilidad en la empresa.","og_url":"https:\/\/www.cyberguru.it\/es\/compliance-training\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-08-26T10:25:49+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/compliance-training\/","url":"https:\/\/www.cyberguru.it\/es\/compliance-training\/","name":"Compliance Training - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"datePublished":"2025-08-26T10:19:46+00:00","dateModified":"2025-08-26T10:25:49+00:00","description":"Descubre la importancia de la Formaci\u00f3n en Cumplimiento para garantizar una cultura de seguridad y responsabilidad en la empresa.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/compliance-training\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/compliance-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/compliance-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Compliance Training"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/49290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=49290"}],"version-history":[{"count":21,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/49290\/revisions"}],"predecessor-version":[{"id":49438,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/49290\/revisions\/49438"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=49290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}