{"id":2621,"date":"2018-10-26T12:55:00","date_gmt":"2018-10-26T18:55:00","guid":{"rendered":"https:\/\/encuentro-tic.anuies.mx\/2018\/?page_id=2621"},"modified":"2018-11-14T14:42:14","modified_gmt":"2018-11-14T20:42:14","slug":"tendencias_en_ciberseguridad","status":"publish","type":"page","link":"https:\/\/encuentro-tic.anuies.mx\/2018\/tendencias_en_ciberseguridad\/","title":{"rendered":"Tendencias en Ciberseguridad"},"content":{"rendered":"<div id=\"pl-2621\"  class=\"panel-layout\" ><div id=\"pg-2621-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-2621-0\" style=\"padding: 100px 0; \" data-stretch-type=\"full-stretched-padded\" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-2621-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-2621-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-2621-0-1-0\" class=\"so-panel widget widget_media_image panel-first-child panel-last-child\" data-index=\"0\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2621-0-1-0\" ><a href=\"https:\/\/encuentro-tic.anuies.mx\/2018\/dsc_0302\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"800\" src=\"https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302.jpg\" class=\"image wp-image-2671  attachment-full size-full\" alt=\"\" style=\"max-width: 100%; height: auto;\" srcset=\"https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302.jpg 1200w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-300x200.jpg 300w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-768x512.jpg 768w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-1024x683.jpg 1024w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-830x553.jpg 830w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-230x153.jpg 230w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-350x233.jpg 350w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-480x320.jpg 480w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/DSC_0302-272x182.jpg 272w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/div><\/div><\/div><div id=\"pgc-2621-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-2621-0-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"1\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2621-0-2-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Tendencias en Ciberseguridad<\/strong><\/p>\n<p><strong>Mtro. Lucio Fernando Thompson de la Rosa<\/strong><br \/>\nDirector General de Tecnolog\u00edas de la Informaci\u00f3n - Universidad de las Am\u00e9ricas Puebla<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-2621-0-2-1\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"2\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2621-0-2-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><a href=\"https:\/\/encuentro-tic.anuies.mx\/wp-content\/uploads\/2018\/10\/4-02-Tendencias-en-Ciberseguridad.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2453\" src=\"https:\/\/encuentro-tic.anuies.mx\/wp-content\/uploads\/2018\/10\/pdf-icon.jpg\" alt=\"\" width=\"92\" height=\"92\" srcset=\"https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/pdf-icon.jpg 256w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/pdf-icon-150x150.jpg 150w, https:\/\/encuentro-tic.anuies.mx\/ctrl-content\/uploads\/sites\/3\/2018\/10\/pdf-icon-230x230.jpg 230w\" sizes=\"auto, (max-width: 92px) 100vw, 92px\" \/><\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-2621-0-3\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-2621-0-3-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2621-0-3-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p style=\"text-align: justify;\">El Mtro. Fernando Thompson expone su experiencia en la Direcci\u00f3n General de Tecnolog\u00edas de la Informaci\u00f3n de la UDLAP y como esta considera como un \u00e1rea prioritaria la Ciberseguridad.<\/p>\n<p style=\"text-align: justify;\">A sabiendas que el eslab\u00f3n m\u00e1s d\u00e9bil es el cliente\/usuario la instituci\u00f3n no solamente cuenta con personal de tiempo completo dedicado a la seguridad de la informaci\u00f3n, sino que a trav\u00e9s de diversas actividades tratan de inculcar la cultura de la ciberseguridad a su comunidad. Considera que lo m\u00e1s importante es el orden que ha puesto en su arquitectura, el cual menciona se divide en tres grupos.<\/p>\n<p style=\"text-align: justify;\">Deton\u00f3 la importancia que da la instituci\u00f3n a contar con una estrategia de seguridad y de c\u00f3mo anualmente es revisado y adaptado a las nuevas tendencias. Nuevas tecnolog\u00edas como Machine Learning ha sido un complemento dentro de la arquitectura de seguridad definida en la UDLAP y ha ayudado a la detecci\u00f3n temprana de anomal\u00edas, que pudieran provocar eventos de mayor criticidad en etapas avanzadas.<\/p>\n<p style=\"text-align: justify;\">Indic\u00f3 la importancia de contar con un plan de Protecci\u00f3n Contra Ataques Adaptativo, enfatizo en el Monitoreo Continuo y la Evaluaci\u00f3n Constante.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-2621-0-4\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-2621-1\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-2621-1\" style=\"padding: 60px 0; \" data-stretch-type=\"full-stretched\" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-2621-1-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-2621-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-2621-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2621-1-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<a href=\"https:\/\/encuentro-tic.anuies.mx\/wp-content\/uploads\/2018\/10\/4-02-Tendencias-en-Ciberseguridad.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">4-02-Tendencias-en-Ciberseguridad<\/a>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-2621-1-2\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-2621-1-2-0\" class=\"so-panel widget widget_media_video panel-first-child panel-last-child\" data-index=\"5\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2621-1-2-0\" ><div style=\"width:100%;\" class=\"wp-video\"><!--[if lt IE 9]><script>document.createElement('video');<\/script><![endif]-->\n<video class=\"wp-video-shortcode\" id=\"video-2621-1\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/youtube\" src=\"https:\/\/www.youtube.com\/watch?v=CrCf-S1k7C8&#038;list=PLSbCr4Q7oabk9b5veXCPg_K5n3awkCv5C&#038;index=5&#038;_=1\" \/><a href=\"https:\/\/www.youtube.com\/watch?v=CrCf-S1k7C8&#038;list=PLSbCr4Q7oabk9b5veXCPg_K5n3awkCv5C&#038;index=5\">https:\/\/www.youtube.com\/watch?v=CrCf-S1k7C8&#038;list=PLSbCr4Q7oabk9b5veXCPg_K5n3awkCv5C&#038;index=5<\/a><\/video><\/div><\/div><\/div><\/div><div id=\"pgc-2621-1-3\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Tendencias en Ciberseguridad Mtro. Lucio Fernando Thompson de la Rosa Director General de Tecnolog\u00edas de la Informaci\u00f3n &#8211; Universidad de las Am\u00e9ricas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-2621","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages\/2621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/comments?post=2621"}],"version-history":[{"count":33,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages\/2621\/revisions"}],"predecessor-version":[{"id":3057,"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/pages\/2621\/revisions\/3057"}],"wp:attachment":[{"href":"https:\/\/encuentro-tic.anuies.mx\/2018\/wp-json\/wp\/v2\/media?parent=2621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}