{"id":1318,"date":"2022-10-05T17:44:21","date_gmt":"2022-10-05T17:44:21","guid":{"rendered":"https:\/\/isec-infosecurity.com\/vip\/?page_id=1318"},"modified":"2025-11-21T15:19:48","modified_gmt":"2025-11-21T15:19:48","slug":"conferencias","status":"publish","type":"page","link":"https:\/\/isec-infosecurity.com\/vip\/conferencias\/","title":{"rendered":"Conferencias"},"content":{"rendered":"\n<p class=\"has-text-align-center has-luminous-vivid-orange-background-color has-text-color has-background\" style=\"color:#020229;font-size:17px\"><strong>CONFERENCIAS ISEC INFOSECURITY TOUR ANTERIORES<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/03\/logo_EMBEDED.jpg\" alt=\"\" style=\"width:200px\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ISEC INFOSECURITY TOUR 2022 - Eduardo Campos.mp4\" src=\"https:\/\/player.vimeo.com\/video\/759527006?h=4ce4ca3bcb&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\"><strong>J. Eduardo Campos,<\/strong> Embedded-Knowledge, Inc., Presidente &#8211; desde Seattle, USA<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background is-style-wide\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\" id=\"block-05878ee3-f807-4a8c-b323-bfc6a9641c50\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/03\/CyberArk.jpg\" alt=\"La imagen tiene un atributo ALT vac\u00edo; su nombre de archivo es CyberArk.jpg\" style=\"width:300px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" id=\"block-5f546072-dc69-44a2-99c6-8e63953ec34d\" style=\"background-color:#020229\"><a rel=\"noreferrer noopener\" href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-CYBERARK-QueEsSeguridaddelaIdentidad.pdf\" target=\"_blank\">CONSIGA ZERO TRUST CON SEGURIDAD DE LA IDENTIDAD<\/a>  <\/p>\n\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" id=\"block-fff4ab76-fadd-443f-a257-bc93e0fa3ea3\" style=\"background-color:#020229\"><a rel=\"noreferrer noopener\" href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-CyberArk-SISAP.pdf\" target=\"_blank\">GESTI\u00d3N Y SEGURIDAD DE ACCESOS<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background is-style-wide\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/blackberry.png\" alt=\"\" style=\"width:300px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-BLACKBERRY-CYLANCE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Aplicando IA para reducir su superficie de ataque<\/a><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-BLACKBERRY-FRONTERAS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">CIBERSEGURIDAD BASADA EN LA PREVENCI\u00d3N<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-BLACKBERRY-DEVEL-DFIR-y-Threat-Hunting.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">DFIR Y THREAT HUNTING<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-bottom has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/thales.png\" alt=\"\" style=\"width:200px;height:50px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-THALES.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TUS DATOS, SU NUBE<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-bottom has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/04\/logo_darktrace.jpg\" alt=\"\" style=\"width:201px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-DARKTRACE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> IA de Autoaprendizaje<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-bottom has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/04\/logo_malware.jpg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-MALWAREBYTES-Estar-protegido.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u00bfQu\u00e9 HACER PARA ESTAR M\u00c1S PROTEGIDOS?<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-bottom has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/03\/main_SearchInform.jpg\" alt=\"\" style=\"width:200px;height:50px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-SEARCHINFORM.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">RISK &amp; COMPLIANCE MANAGEMENT<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/10\/cloud.png\" alt=\"\" style=\"width:200px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a rel=\"noreferrer noopener\" href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-CLOUDFLARE-T1-2022-DDoS-Attack-Trends-LATAM.pdf\" target=\"_blank\"><strong>Tendencias de ataques DDoS<\/strong> | Francisco Allegro, Territory Account Manager<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-orange-color has-text-color has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a rel=\"noreferrer noopener\" href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-CLOUDFLARE.pdf\" target=\"_blank\"><strong>Tendencias de ataques DDoS<\/strong> | Armando Navarro, Director comercial centroamerica<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/camel.png\" alt=\"\" style=\"width:150px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-CAMEL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">conferencia infosecurity 2022<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"171\" height=\"54\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-15-11-55-55.png\" alt=\"\" class=\"wp-image-1546\" style=\"width:150px\"\/><\/figure>\n<\/div>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-CHECKPOINT-Hacking-Like-a-Disney-Villain-in-Pandemia-Times.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">HAcking like a disney villain<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"305\" height=\"97\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/compulab.png\" alt=\"\" class=\"wp-image-1475\" style=\"width:150px;height:60px\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/compulab.png 305w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/compulab-300x95.png 300w\" sizes=\"auto, (max-width: 305px) 100vw, 305px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-COMPULAB.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">conferencia infosecurity 2022<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/CrystalRoot.png\" alt=\"\" style=\"width:79px;height:40px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-CRYSTAL-ROOT-Un-ataque-es-cuestion-de-tiempo.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">conferencia infosecurity 2022<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"199\" height=\"98\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Devel.png\" alt=\"\" class=\"wp-image-1486\" style=\"width:100px;height:60px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-DEVEL-GROUP.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">conversemos sobre el grupo conti<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/03\/logo_entrust.jpg\" alt=\"\" style=\"width:150px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-ENTRUST.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PROTEGIENDO M\u00c1S ALL\u00c1 DEL PER\u00cdMETRO<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"79\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/esconsulting.png\" alt=\"\" class=\"wp-image-1491\" style=\"width:100px;height:44px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;letter-spacing:-0.8px;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-ES-CONSULTING-Cyber-Srategy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">estrategia de ciberseguridad<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"133\" height=\"70\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-14-12-01-04.png\" alt=\"\" class=\"wp-image-1494\" style=\"width:100px;height:60px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-ETHICAL-SHIELDS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">CIS Controls aplicado a Endpoint<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/Everbridge.png\" alt=\"\" style=\"width:100px;height:30px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-EVERBRIDGE.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Critical Event management<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/forcepoint-1024x218.png\" alt=\"\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-FORCEPOINT-Forcepoint-Corporate-Overview-Seguridad-Simplificada.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Seguridad simplificada<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/maestre-1024x282.png\" alt=\"\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-GRUPO-MAESTRE-End-of-Ransomware-2022.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIN DEL RANSONWARE 2022<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-small-font-size\" style=\"text-transform:uppercase\"><strong>Carlos Mujica<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-ISO27001-CARLOS-MUGICA-Presentacion-de-Consultoria-de-Seguridad.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">consultorias de seguridad<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2022\/03\/juristelseg-1.jpg\" alt=\"\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-JURISTELSEG-LEGAL-Expo-Blochchain-Contratos-Inteligentes.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">BlockChain &#8211; Contratos Inteligentes<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/03\/LOGO_LNX.jpg\" alt=\"\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a rel=\"noreferrer noopener\" href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-LNX-SentinelOne.pdf\" target=\"_blank\">PROTECCI\u00d3N autonomA del endpoint<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"292\" height=\"240\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-14-12-39-05.png\" alt=\"\" class=\"wp-image-1518\" style=\"width:72px;height:59px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-NetReady-Blackberry.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PREVENTION FIRST<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-small-font-size\" style=\"letter-spacing:-1px;text-transform:uppercase\"><strong>Mateo Mart\u00edNEZ<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;letter-spacing:-0.8px;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-MATEO-MARTINEZ-Tendencias-de-Ciberseguridad-2022-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Tendencias de Ciberseguridad 2022-2023<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"177\" height=\"68\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/image-1.png\" alt=\"\" class=\"wp-image-1522\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-QUEST-ALTA-TECNOLOGIA-PANAMA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Descubra &#8211; Controle &#8211; Proteja<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/03\/logo_softron.jpg\" alt=\"\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#020229;font-size:11px;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-SOFTRON-NETWRIX-Netwrix-Data-Access-Governance.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">C\u00f3mo minimizar los riesgos en torno a los datos confidenciales<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2021\/11\/LOGOTIPOSS_HORIZONTAL_20Y_PNG-1024x332.png\" alt=\"\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#020229;font-size:11px;text-transform:uppercase\"><a rel=\"noreferrer noopener\" href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-SOLUCIONES-SEGURAS.pdf\" target=\"_blank\">Consideraciones de Ciberseguridad en el 2022<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"214\" height=\"67\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-14-12-47-19.png\" alt=\"\" class=\"wp-image-1525\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-SOTI.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Una Plataforma todo conectado<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"335\" height=\"74\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-17-10-14-57.png\" alt=\"\" class=\"wp-image-1591\" style=\"width:100px\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-17-10-14-57.png 335w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-17-10-14-57-300x66.png 300w\" sizes=\"auto, (max-width: 335px) 100vw, 335px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#020229;font-size:11px;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-TECNOAV.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Ciberseguridad Postura y Monitoreo<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"54\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-14-12-52-20.png\" alt=\"\" class=\"wp-image-1531\" style=\"width:100px\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-VLATAM-presentacio%CC%81n-cybersoc.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersoc<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"302\" height=\"95\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-14-12-54-59.png\" alt=\"\" class=\"wp-image-1533\" style=\"width:100px\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-14-12-54-59.png 302w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/Captura-desde-2022-10-14-12-54-59-300x94.png 300w\" sizes=\"auto, (max-width: 302px) 100vw, 302px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-background has-small-font-size\" style=\"background-color:#020229;text-transform:uppercase\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/10\/ISEC-INFOSECURITY-TOUR-2022-ZYPROTECT.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Protegiendo el eslab\u00f3n m\u00e1s d\u00e9bil<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-alpha-channel-opacity has-black-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"has-text-align-center\">Copyright \u00a9 2004\/2023&nbsp;ISEC Global Inc. Todos los derechos reservados &#8211;&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/isec-infosecurity.com\/virtualtour\/politica\/\" target=\"_blank\">Pol\u00edtica de privacidad<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CONFERENCIAS ISEC INFOSECURITY TOUR ANTERIORES CONSIGA ZERO TRUST CON SEGURIDAD DE LA IDENTIDAD GESTI\u00d3N Y SEGURIDAD DE ACCESOS Aplicando IA para reducir su superficie de ataque CIBERSEGURIDAD BASADA EN LA PREVENCI\u00d3N DFIR Y THREAT HUNTING TUS DATOS, SU NUBE IA<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1318","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages\/1318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/comments?post=1318"}],"version-history":[{"count":123,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages\/1318\/revisions"}],"predecessor-version":[{"id":2534,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages\/1318\/revisions\/2534"}],"wp:attachment":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/media?parent=1318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}