{"id":911,"date":"2022-07-21T16:35:41","date_gmt":"2022-07-21T16:35:41","guid":{"rendered":"https:\/\/isec-infosecurity.com\/icoaching\/?page_id=911"},"modified":"2022-07-21T19:47:10","modified_gmt":"2022-07-21T19:47:10","slug":"exposiciones-de-los-eventos","status":"publish","type":"page","link":"https:\/\/isec-infosecurity.com\/icoaching\/exposiciones-de-los-eventos\/","title":{"rendered":"Exposiciones de los eventos"},"content":{"rendered":"\n<p class=\"has-text-align-center has-white-color has-vivid-cyan-blue-background-color has-text-color has-background has-large-font-size\"><strong>ISEC INFOSECURITY  Tour 2019<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns has-light-green-cyan-color has-text-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/19.06.26_SITEPRO_InfoSecurity.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SITEPRO &#8211; Sistemas y tecnolog\u00edas de Protecci\u00f3n<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">P<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">r<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">e<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">s<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">e<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">n<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">t<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">a<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">c<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">i<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">\u00f3<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">n<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\"> <\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">I<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">n<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">f<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">o<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">s<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">e<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">c<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">u<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">r<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">i<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">t<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">y <\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">A<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">Y<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">U<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">D<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/ENTRE TODOS PODEMOS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\">A<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-light-green-cyan-color has-text-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/F5 - ISEC INFOSECURITY PANAMA TOUR 2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">F5 &#8211; ADVANCED WAF<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/GDATA - ISEC INFOSECURITY SANTIAGO TOUR 2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>GDATA &#8211; Demo de productos<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-light-green-cyan-color has-text-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/NCIPHER - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>N CIPHER &#8211; Cifrado en tiempos del cybersecurity<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/PAESSLER SDC - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>PAESSLER &#8211; \u00bfEst\u00e1 realmente segura su red?<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-light-green-cyan-color has-text-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/SELTIKA - ISEC INFOSECURITY SAN JOSE TOUR 2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SELTIKA &#8211;  Estrategia en seguridad<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/SOLARWINDS - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SOLARWINDS &#8211; Best Practices and Tools for Reducing Threats<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-light-green-cyan-color has-text-color is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/THALES - ISEC INFOSECURITY MEGAEVENTO BUENOS AIRES 2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">THALES  &#8211;  C\u00f3mo sentirme protegido en la nube segura su red?<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-white-color has-vivid-cyan-blue-background-color has-text-color has-background has-large-font-size\"><strong>ISEC INFOSECURITY  Tour 2018<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/2018 ISEC INFOSECURITY TOUR 2018 LAS 10 VERDADES O MENTIRAS DE LA SEGURIDAD - MARTIN VILA WEB.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ISEC &#8211; Las 10 Verdades (o mentiras) de la Ciberseguridad<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2019\/2018 ISEC INFOSECURITY TOUR 2018 WATCHGUARD - INTRO.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">WATCHGUARD &#8211; Intelligent Protection<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY ASUNCION 2018 - ITCS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ITCS &#8211; Seguridad en la nube<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY BARRANQUILLA - SCIOTEC WATCHGUARD.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">SCIOTEC &#8211; WIFI Security<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY BOGOTA 2018 - IPSWITCH - SEGURIDAD EN TRANSFERNCIA DE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ISWITCH -Seguridad para Transferencias de Datos<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY BOGOTA 2018 - KINGSTON - COMO MINIIMIZAR RIESGOS EN EL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">WATCHGUARD &#8211; Como minimizar los riesgos en el transporte de informaci\u00f3n<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY BOGOTA 2018 - SAMSUNG KNOX - SEGURIDAD EN MOVILIDAD.PDF\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SAMSUNG KNOX &#8211; Seguridad en ambientes m\u00f3viles<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY CALI - ISS - CISCO.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">CISCO &#8211; Defensa antiransonware<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY CALI - SOPHOS.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">SOPHOS Intercept X<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY CARTAGENA - SEARCHINFORM.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">SEARCHINFORM &#8211; Money Loss Prevention<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY CARTAGENA ARUBA HPE.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">ARUBA HPE &#8211; #Unplugged, Aruba Security Framework<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY CENTROAMERICA TOUR 2018 - GRUPO INTELECTOR.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">INTELECTOR &#8211; Protecci\u00f3n contra Denegaciones de Servicio<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><strong><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY CARTAGENA ARUBA HPE.PDFISEC INFOSECURITY GUATEMALA 2018 - RICOH - La seguridad de la informaci\u00f3....pdf\" target=\"_blank\" rel=\"noreferrer noopener\">RICOH &#8211; Gesti\u00f3n Documental ISO 30300<\/a><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY GUAYAQUIL 2018 - PANEL EXPERTOS IT AHORA.PDF\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ITAHORA &#8211; Panel de expertos<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a rel=\"noreferrer noopener\" href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY CARTAGENA ARUBA HPE.PDFISEC INFOSECURITY LIMA 2018 - ARUBA HPE -Secure_Fabric_Presentation_smau....pdf\" target=\"_blank\"><strong>ARUBA HPE &#8211; Aruba 360 Secure Fabric<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY LIMA 2018 - WATCHGUARD.PDF\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>WATGUARD &#8211; Portfolio de ciberseguridad<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY MEDELLIN 2018 - BEYONDTRUST- SEVEN STEPS TO COMPLETE P.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>BEYONTRUST &#8211;  Seven Steps to Complete Privileged Access Management<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-background-color has-background\"><a href=\"https:\/\/www.isec-infosecurity.com\/vip\/exposiciones\/2018\/ISEC INFOSECURITY MEDELLIN 2018 - KRONUX - PORQUE HACKEAN LAS EMPRESAS.PDF\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>KRONUX &#8211; Porqu\u00e9 hackean la empresas<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-text-align-center\">Prohibida su distribuci\u00f3n &#8211; todos los derechos reservados \u00ae ISEC Global Inc.  Cada una de las partes proteger\u00e1 la informaci\u00f3n obtenida durante el desarrollo del curso de la misma manera en que protege su propia informaci\u00f3n confidencial, haci\u00e9ndose responsable por cualquier da\u00f1o\/perjuicio que se pudiera ocasionar por el uso indebido de la informaci\u00f3n accedida. <strong>Nuestros documentos entregables y papeles de trabajo ser\u00e1n de acceso exclusivo para el alumno<\/strong>, quien podr\u00e1 disponer para su uso de todos los entregables, que no incluyen metodolog\u00eda ni software utilizado. <strong>PROHIBIDA SU REPRODUCCI\u00d3N PARCIAL O TOTAL DEL MATERIAL<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISEC INFOSECURITY Tour 2019 SITEPRO &#8211; Sistemas y tecnolog\u00edas de Protecci\u00f3n Presentaci\u00f3n Infosecurity AYUDA F5 &#8211; ADVANCED WAF GDATA &#8211; Demo de productos N CIPHER &#8211; Cifrado en tiempos del cybersecurity PAESSLER &#8211; \u00bfEst\u00e1 realmente segura su red? SELTIKA &#8211;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-911","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/comments?post=911"}],"version-history":[{"count":17,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/911\/revisions"}],"predecessor-version":[{"id":938,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/911\/revisions\/938"}],"wp:attachment":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/media?parent=911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}