{"id":7097,"date":"2022-04-12T18:12:35","date_gmt":"2022-04-12T16:12:35","guid":{"rendered":"https:\/\/www.advens.test\/?post_type=expertise&#038;p=7097"},"modified":"2023-05-30T08:26:10","modified_gmt":"2023-05-30T06:26:10","slug":"riesgos-estrategia","status":"publish","type":"expertise","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/soluciones\/riesgos-estrategia\/","title":{"rendered":"Riesgos y Estrategia"},"content":{"rendered":"\n\n<div id=\"block-logos-1518472714\" class=\"acf-block-logos grid -six mb-4 alignwide\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n              <\/div>\n    <\/div>\n  <\/div>\n  <div class=\"container bg-white py-3\">\n    <div class=\"row\">\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/ap-hp-260x54.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/louis-vuitton-260x27.png\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/axa-260x130.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/wakam-260x140.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/bordeaux-metropole-260x110.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/ingredia-260x94.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n\n<div id=\"block-image-texte-20175304\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lyon-dsc2368-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lyon-dsc2368-1278x1320.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lyon-dsc2368-1278x1320.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Comprender sus necesidades: el primer paso hacia la seguridad\n        <\/h2>\n                    <div class=\"text-content\">\n          <p>Su enfoque de la seguridad debe adaptarse perfectamente a su organizaci\u00f3n. Para ello, nos basamos en un an\u00e1lisis de los riesgos a los que se enfrenta, en sus retos empresariales y su cultura de empresa.<\/p>\n<p>Esto nos permite construir la estrategia m\u00e1s pertinente para desarrollar su cibermadurez d\u00eda tras d\u00eda.<\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-166098370\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -droite\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 -right\">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-paris-dsc0845-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-paris-dsc0845-1320x1278.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-paris-dsc0845-1320x1278.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6  d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Construir juntos una estrategia y coordinar su funci\u00f3n de seguridad\n        <\/h2>\n                    <div class=\"text-content\">\n          <p>Nuestro apoyo tiene en cuenta todas las actividades del CISO y del sector.<\/p>\n<p>Definici\u00f3n de su estrategia, cartograf\u00eda de los riesgos, redacci\u00f3n de su PSSI, sensibilizaci\u00f3n de sus equipos o coordinaci\u00f3n de la cibergobernanza: en virtud de sus necesidades, ponemos a disposici\u00f3n de su funci\u00f3n de seguridad m\u00e9todos de intervenci\u00f3n adaptados.<\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-499578735\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1925-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1925-1320x1278.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1925-1320x1278.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Apostar por el largo plazo con pragmatismo y pedagog\u00eda\n        <\/h2>\n                    <div class=\"text-content\">\n          <p>Protegerle sin implicarle no tiene sentido para nosotros. Queremos tener un impacto duradero en su nivel de seguridad.<\/p>\n<p>Por eso le ayudamos a progresar mediante la transferencia de competencias y el establecimiento de unos objetivos concretos que alcanzar.<\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n  \n<div id=\"block-chiffres-1595805023\" class=\"acf-block-chiffres alignwide\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <h3>Advens en cifras<\/h3>\n      <\/div>\n    <\/div>\n  <\/div>\n  <div class=\"container\">\n    <div class=\"row row-cols-2 row-cols-xl-3 g-3 g-xl-5\">\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">Miles <\/strong>\n              <p class=\"text\">de empresas de ciberseguridad en toda Europa<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">58%<\/strong>\n              <p class=\"text\">de los CISO quieren situar la cibergobernanza en el nivel adecuado<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">3 millones<\/strong>\n              <p class=\"text\">es el n\u00famero de expertos de ciberseguridad que se necesitan actualmente en todo el mundo<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n\n<div id=\"block-interviews-1023177640\" class=\"acf-block-interviews interviews alignwide\">\n      <div class=\"default-block-header header\">\n      <h2 class=\"title-6 title\">Nuestros embajadores<\/h2>\n    <\/div>\n  \n                    <div class=\"container\">\n          <div class=\"row\">\n            <div class=\"col-12 col-xl-6 d-flex flex-column justify-content-center\">\n              <blockquote>\n                <p class=\"introduction introduction text-primary fs-3\">\n                  \u00abEscuchar a nuestros clientes y a nuestros equipos es una cualidad esencial para un consultor en el trabajo cotidiano\u00bb.\n                <\/p>\n                <cite>\n                  <strong class=\"texte-moyen-bold d-flex\">Laure Deroche<\/strong>\n                  <span class=\"texte-moyen\">Consultor &#038; Team Manager<\/span>\n                <\/cite>\n              <\/blockquote>\n              <div class=\"btns\">\n                                              <\/div>\n            <\/div>\n            <div class=\"col-12 col-xl-6\">\n                          <\/div>\n          <\/div>\n        <\/div>\n            <\/div>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n\n<div id=\"block-colonnes-1990681266\" class=\"acf-block-colonnes colonnes alignwide\">\n  <div class=\"container\">\n    <div class=\"row mb-4\">\n      <div class=\"col-12\">\n        <h3>\u00bfPor qu\u00e9 elegir Advens?<\/h3>\n                  <p>Le apoyamos en todos sus ciberproyectos, a largo plazo, para que ninguna amenaza se interponga en su negocio.<\/p>\n\n                          <a class=\"link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/acerca-de-advens\/\" target=\"\" title=\"Acerca de Advens\">\n            Acerca de Advens\n          <\/a>\n              <\/div>\n    <\/div>\n\n                  \n    <div class=\"row row-colonnes row-cols-1 row-cols-md-2 row-cols-xl-4 gy-4 mb-4 mb-xl-5\">\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Una oferta global<\/h4>\n              <p>La combinaci\u00f3n de conocimientos de vanguardia con un enfoque \u00abas-a-service\u00bb.<\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Una pericia con sello de calidad<\/h4>\n              <p>Servicios reconocidos por los sellos de la ANSSI (Agencia Nacional de Seguridad de los Sistemas de Informaci\u00f3n) y por expertos certificados.<\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>La Security-as-a-Service<\/h4>\n              <p>Un servicio \u00fanico que combina protecci\u00f3n aumentada, agilidad y optimizaci\u00f3n presupuestaria.<\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Pragmatismo y pedagog\u00eda<\/h4>\n              <p>Enfoques accesibles, orientados a los resultados y adaptados a sus necesidades.<\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Una estrategia de seguridad requiere un m\u00e9todo controlado, una coordinaci\u00f3n sin fallos&#8230; y una serie muy concreta de habilidades y competencias. Hemos reunido todas las herramientas para apoyarle y protegerle de forma duradera, respetando sus prioridades empresariales.<\/p>\n","protected":false},"featured_media":5975,"template":"","taxo_expertise":[],"class_list":["post-7097","expertise","type-expertise","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberriesgos y seguridad: protegerse a largo plazo<\/title>\n<meta name=\"description\" content=\"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberriesgos y seguridad: protegerse a largo plazo\" \/>\n<meta property=\"og:description\" content=\"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-30T06:26:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2022\/04\/work-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ciberriesgos y seguridad: protegerse a largo plazo\" \/>\n<meta name=\"twitter:description\" content=\"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/\",\"url\":\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/\",\"name\":\"Ciberriesgos y seguridad: protegerse a largo plazo\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg\",\"datePublished\":\"2022-04-12T16:12:35+00:00\",\"dateModified\":\"2023-05-30T06:26:10+00:00\",\"description\":\"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Riesgos y Estrategia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberriesgos y seguridad: protegerse a largo plazo","description":"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/","og_locale":"es_ES","og_type":"article","og_title":"Ciberriesgos y seguridad: protegerse a largo plazo","og_description":"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...","og_url":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/","og_site_name":"Advens","article_modified_time":"2023-05-30T06:26:10+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.advens.test\/app\/uploads\/2022\/04\/work-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Ciberriesgos y seguridad: protegerse a largo plazo","twitter_description":"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...","twitter_image":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/","url":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/","name":"Ciberriesgos y seguridad: protegerse a largo plazo","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg","datePublished":"2022-04-12T16:12:35+00:00","dateModified":"2023-05-30T06:26:10+00:00","description":"Una estrategia de seguridad es esencial para hacer frente al riesgo de ciberataques. Para ello es necesario un enfoque adaptado y sostenible...","breadcrumb":{"@id":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/work-2.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/soluciones\/expertise-risque-securite-cyberattaque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/es\/"},{"@type":"ListItem","position":2,"name":"Riesgos y Estrategia"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/wp-json\/wp\/v2\/expertise\/7097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/wp-json\/wp\/v2\/expertise"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/wp-json\/wp\/v2\/types\/expertise"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/wp-json\/wp\/v2\/media\/5975"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/wp-json\/wp\/v2\/media?parent=7097"}],"wp:term":[{"taxonomy":"taxo_expertise","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/es\/wp-json\/wp\/v2\/taxo_expertise?post=7097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}