{"id":2541,"date":"2018-10-11T10:58:42","date_gmt":"2018-10-11T16:58:42","guid":{"rendered":"https:\/\/encuentro-tic.anuies.mx\/2018\/?page_id=2541"},"modified":"2018-11-14T14:43:37","modified_gmt":"2018-11-14T20:43:37","slug":"estrategias-de-colaboracion-en-ciberseguridad","status":"publish","type":"page","link":"https:\/\/encuentro-tic.anuies.mx\/2018\/estrategias-de-colaboracion-en-ciberseguridad\/","title":{"rendered":"Estrategias de Colaboraci\u00f3n en Ciberseguridad"},"content":{"rendered":"<div id=\"pl-2541\"  class=\"panel-layout\" ><div id=\"pg-2541-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-2541-0\" style=\"padding: 100px 0; \" data-stretch-type=\"full-stretched-padded\" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-2541-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-2541-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-2541-0-1-0\" class=\"so-panel widget widget_media_image panel-first-child panel-last-child\" data-index=\"0\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2541-0-1-0\" ><a href=\"https:\/\/encuentro-tic.anuies.mx\/wp-content\/uploads\/2018\/10\/4-01-Estrategias-de-Colaboraci\u00f3n-en-Ciberseguridad.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"275\" height=\"183\" src=\"https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/rosalinda.jpg\" class=\"image wp-image-2551  attachment-full size-full\" alt=\"\" style=\"max-width: 100%; height: auto;\" srcset=\"https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/rosalinda.jpg 275w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/rosalinda-230x153.jpg 230w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/rosalinda-272x182.jpg 272w\" sizes=\"auto, (max-width: 275px) 100vw, 275px\" \/><\/a><\/div><\/div><\/div><div id=\"pgc-2541-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-2541-0-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"1\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2541-0-2-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Estrategias de Colaboraci\u00f3n en Ciberseguridad<\/strong><\/p>\n<p><strong>Dra. Patricia Rosalinda Trujillo Mariel<\/strong><br \/>\nTitular de la Divisi\u00f3n Cient\u00edfica. Polic\u00eda Federal<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-2541-0-2-1\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"2\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2541-0-2-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><a href=\"https:\/\/encuentro-tic.anuies.mx\/wp-content\/uploads\/2018\/10\/4-01-Estrategias-de-Colaboraci\u00f3n-en-Ciberseguridad.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-2453\" src=\"https:\/\/encuentro-tic.anuies.mx\/wp-content\/uploads\/2018\/10\/pdf-icon.jpg\" alt=\"\" width=\"92\" height=\"92\" srcset=\"https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/pdf-icon.jpg 256w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/pdf-icon-150x150.jpg 150w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/pdf-icon-230x230.jpg 230w\" sizes=\"auto, (max-width: 92px) 100vw, 92px\" \/><\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-2541-0-3\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-2541-0-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2541-0-3-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p style=\"text-align: justify;\">Durante su presentaci\u00f3n la Dra. Patricia Trujillo hizo un breve recuento de la historia de las computadoras y de los primeros virus y malware.<\/p>\n<p style=\"text-align: justify;\">Comenta que en la 27\u00aa sesi\u00f3n de la <em><strong>UNODC <\/strong><\/em>(United Nations Office on Drugs and Crime) se establecieron los criterios b\u00e1sicos para analizar a la ciberdelincuencia Enfatiza la importancia de contar con una estrategia de ciberseguridad en el pa\u00eds ya que solo el 12% de los pa\u00edses en el mundo la tiene. Se\u00f1ala que la Estrategia Nacional de Ciberseguridad apunta hacia el desarrollo de las capacidades formativas y hacia la cultura de la educaci\u00f3n en este tema.<\/p>\n<p style=\"text-align: justify;\">Ha mostrado como trabaja su instituci\u00f3n en esta materia y expuso casos reales a los que se enfrenta todos los d\u00edas. Enfatiza la importancia de que las Universidades e Instituciones de Educaci\u00f3n Superior trabajen en la formaci\u00f3n de profesionales con los perfiles necesarios para dar respuesta a los incidentes cibern\u00e9ticos que se est\u00e1n presentando actualmente, pero con la visi\u00f3n a futuro.<\/p>\n<p style=\"text-align: justify;\">La educaci\u00f3n en ciberseguridad es trascendental por lo cual las IES tiene la obligaci\u00f3n de trabajar de manera conjunta con diferentes instituciones que ayuden a tener una visi\u00f3n global y a futuro de las necesidades de los diferentes sectores en el pa\u00eds y en el mundo, con el fin de ofrecer una formaci\u00f3n m\u00e1s completa a los futuros profesionales en este tema que se encuentran en las Instituciones de Educaci\u00f3n Superior.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-2541-0-4\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-2541-1\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-2541-1\" style=\"padding: 60px 0; \" data-stretch-type=\"full-stretched\" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-2541-1-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-2541-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-2541-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2541-1-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<a href=\"https:\/\/encuentro-tic.anuies.mx\/wp-content\/uploads\/2018\/10\/4-01-Estrategias-de-Colaboraci\u00f3n-en-Ciberseguridad.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">4-01-Estrategias-de-Colaboraci\u00f3n-en-Ciberseguridad<\/a>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-2541-1-2\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-2541-1-2-0\" class=\"so-panel widget widget_media_video panel-first-child panel-last-child\" data-index=\"5\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2541-1-2-0\" ><div style=\"width:100%;\" class=\"wp-video\"><!--[if lt IE 9]><script>document.createElement('video');<\/script><![endif]-->\n<video class=\"wp-video-shortcode\" id=\"video-2541-1\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/youtube\" src=\"https:\/\/www.youtube.com\/watch?v=8xIrBtOpSCM&#038;index=7&#038;list=PLSbCr4Q7oabk9b5veXCPg_K5n3awkCv5C&#038;_=1\" \/><a href=\"https:\/\/www.youtube.com\/watch?v=8xIrBtOpSCM&#038;index=7&#038;list=PLSbCr4Q7oabk9b5veXCPg_K5n3awkCv5C\">https:\/\/www.youtube.com\/watch?v=8xIrBtOpSCM&#038;index=7&#038;list=PLSbCr4Q7oabk9b5veXCPg_K5n3awkCv5C<\/a><\/video><\/div><\/div><\/div><\/div><div id=\"pgc-2541-1-3\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Estrategias de Colaboraci\u00f3n en Ciberseguridad Dra. Patricia Rosalinda Trujillo Mariel Titular de la Divisi\u00f3n Cient\u00edfica. Polic\u00eda Federal Durante su presentaci\u00f3n la Dra. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-2541","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages\/2541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/comments?post=2541"}],"version-history":[{"count":68,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages\/2541\/revisions"}],"predecessor-version":[{"id":3061,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages\/2541\/revisions\/3061"}],"wp:attachment":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/media?parent=2541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}