{"id":55201,"date":"2021-03-02T13:25:45","date_gmt":"2021-03-02T12:25:45","guid":{"rendered":"https:\/\/tecnolawyer.com\/auditoria-seguridad-de-la-informacion\/"},"modified":"2024-07-13T19:48:47","modified_gmt":"2024-07-13T17:48:47","slug":"auditoria-seguridad-de-la-informacion","status":"publish","type":"page","link":"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/auditoria-seguridad-de-la-informacion\/","title":{"rendered":"Auditor\u00eda Seguridad de la Informaci\u00f3n"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"55201\" class=\"elementor elementor-55201 elementor-54134\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3318498 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3318498\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ff845d1\" data-id=\"ff845d1\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d70f863 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d70f863\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 60px; font-weight: bold; color: #ffffff;\">Seguridad de la Informaci\u00f3n CIBERSEGURIDAD<\/span><\/p>\n<p><span style=\"font-size: 24px; color: #ffffff;\">\u201cNuestros poderes tecnol\u00f3gicos aumentan, pero los efectos secundarios y posibles riesgos tambi\u00e9n aumentan\u201d<\/span><br \/><span style=\"font-weight: bold; color: #ffffff;\"><span style=\"font-size: 24px;\">Alvin Toffler<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29a27a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29a27a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2cd7b7f\" data-id=\"2cd7b7f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa7aa25 elementor-nav-menu--dropdown-tablet elementor-nav-menu__text-align-aside elementor-nav-menu--toggle elementor-nav-menu--burger elementor-widget elementor-widget-nav-menu\" data-id=\"fa7aa25\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;horizontal&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;svg aria-hidden=\\&quot;true\\&quot; class=\\&quot;e-font-icon-svg e-fas-caret-down\\&quot; viewBox=\\&quot;0 0 320 512\\&quot; xmlns=\\&quot;http:\\\/\\\/www.w3.org\\\/2000\\\/svg\\&quot;&gt;&lt;path d=\\&quot;M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\\&quot;&gt;&lt;\\\/path&gt;&lt;\\\/svg&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;toggle&quot;:&quot;burger&quot;}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Men\u00fa\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-horizontal e--pointer-underline e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-fa7aa25\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-55237\"><a href=\"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/\" class=\"elementor-item\">Introducci\u00f3n<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-55238\"><a href=\"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/auditoria-seguridad-de-la-informacion\/\" class=\"elementor-item\">Auditor\u00eda Seguridad de la Informaci\u00f3n<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-55239\"><a href=\"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/compliance\/\" class=\"elementor-item\">Compliance<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t<div class=\"elementor-menu-toggle\" role=\"button\" tabindex=\"0\" aria-label=\"Alternar men\u00fa\" aria-expanded=\"false\">\n\t\t\t<svg aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--open e-font-icon-svg e-eicon-menu-bar\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M104 333H896C929 333 958 304 958 271S929 208 896 208H104C71 208 42 237 42 271S71 333 104 333ZM104 583H896C929 583 958 554 958 521S929 458 896 458H104C71 458 42 487 42 521S71 583 104 583ZM104 833H896C929 833 958 804 958 771S929 708 896 708H104C71 708 42 737 42 771S71 833 104 833Z\"><\/path><\/svg><svg aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--close e-font-icon-svg e-eicon-close\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M742 167L500 408 258 167C246 154 233 150 217 150 196 150 179 158 167 167 154 179 150 196 150 212 150 229 154 242 171 254L408 500 167 742C138 771 138 800 167 829 196 858 225 858 254 829L496 587 738 829C750 842 767 846 783 846 800 846 817 842 829 829 842 817 846 804 846 783 846 767 842 750 829 737L588 500 833 258C863 229 863 200 833 171 804 137 775 137 742 167Z\"><\/path><\/svg>\t\t<\/div>\n\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-fa7aa25\" class=\"elementor-nav-menu\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-55237\"><a href=\"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/\" class=\"elementor-item\" tabindex=\"-1\">Introducci\u00f3n<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-55238\"><a href=\"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/auditoria-seguridad-de-la-informacion\/\" class=\"elementor-item\" tabindex=\"-1\">Auditor\u00eda Seguridad de la Informaci\u00f3n<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-55239\"><a href=\"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/compliance\/\" class=\"elementor-item\" tabindex=\"-1\">Compliance<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6570e50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6570e50\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-0cfd10b\" data-id=\"0cfd10b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98f8a11 elementor-widget elementor-widget-text-editor\" data-id=\"98f8a11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 style=\"line-height: 40px; font-size: 40px; margin-bottom: 16px; font-family: 'Maersk Headline', -apple-system, BlinkMacSystemFont, 'Microsoft JhengHei', 'Microsoft Yahei', \u5fae\u8f6f\u96c5\u9ed1, STXihei, \u534e\u6587\u7ec6\u9ed1, sans-serif; letter-spacing: 0px; text-align: left;\"><span style=\"font-size: 36px;\"><span style=\"color: #009abe;\">Auditor\u00edas externas de Seguridad de la Informaci\u00f3n<\/span><\/span><span style=\"font-size: 36px;\"><span style=\"color: #009abe;\"><br \/>\n<\/span><\/span><span style=\"font-size: 24px;\">para <span style=\"font-weight: bold;\">empresas que traten datos de categor\u00eda especial<\/span>.<\/span><\/h2>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f050b5d elementor-widget elementor-widget-text-editor\" data-id=\"f050b5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>C\u00f3mo en cualquier otro marco de\u00a0gesti\u00f3n del cumplimiento, las auditor\u00edas son una parte esencial de los procesos de\u00a0revisi\u00f3n y mejora continua.<br \/>\r\n<br \/>\r\nEn cuanto a seguridad de la Informaci\u00f3n, destacamos dos tipos de auditor\u00edas:<\/p>\r\n<ul>\r\n\t<li>Auditorias de <b>buena pr\u00e1cticas<\/b> en Seguridad de la Informaci\u00f3n<\/li>\r\n\t<li>Auditorias de <b>cumplimiento legal y regulatorio<\/b> en Seguridad de la Informaci\u00f3n<\/li>\r\n<\/ul>\r\n<p style=\"margin-bottom: 6.0pt;\">En la realizaci\u00f3n de las auditor\u00edas de buenas pr\u00e1cticas es habitual el uso de marcas de referencia o frameworks, mediante los cuales contrastaremos el estado de nuestra organizaci\u00f3n respecto a los controles de seguridad definidos. Estas marcas se caracterizan por cubrir cada aspecto que pueda comprometer los activos de la entidad. Algunas de las marcas de referencia son:<\/p>\r\n<ul>\r\n\t<li><a href=\"https:\/\/www.iso.org\/isoiec-27001-information-security.html\" target=\"_blank\" rel=\"noopener\">International Organization for Standarization<\/a> (ISO 27000)<\/li>\r\n\t<li><a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener\">National Institue of Standards and Technology<\/a> (NIST)<\/li>\r\n\t<li><a href=\"https:\/\/www.boe.es\/boe_catalan\/dias\/2010\/01\/29\/pdfs\/BOE-A-2010-1330-C.pdf\" target=\"_blank\" rel=\"noopener\">Esquema Nacional de Seguridad<\/a><\/li>\r\n<\/ul>\r\n<p style=\"margin-bottom: 6.0pt;\">En la realizaci\u00f3n de las\u00a0<strong>auditor\u00edas de cumplimiento legal y regulatorio<\/strong>, se eval\u00faa el cumplimiento de las leyes y reglamentos relacionados con la seguridad. Algunas de las m\u00e1s importantes son:<\/p>\r\n<ul>\r\n\t<li><a href=\"https:\/\/www.boe.es\/buscar\/pdf\/2018\/BOE-A-2018-16673-consolidado.pdf\" target=\"_blank\" rel=\"noopener\">Ley Org\u00e1nica de Protecci\u00f3n de Datos de Car\u00e1cter Personal<\/a> (LOPD)<\/li>\r\n\t<li><a href=\"https:\/\/www.boe.es\/doue\/2016\/119\/L00001-00088.pdf\" target=\"_blank\" rel=\"noopener\">Reglamento General de Protecci\u00f3n de Datos<\/a> (RGPD)<\/li>\r\n\t<li><a href=\"https:\/\/www.boe.es\/buscar\/doc.php?id=BOE-A-2018-12257\" target=\"_blank\" rel=\"noopener\">Ley de Servicios de la Seguridad de la Informaci\u00f3<\/a>n (LSSICE)<\/li>\r\n\t<li><a href=\"https:\/\/www.boe.es\/buscar\/doc.php?id=BOE-A-2010-1330\" target=\"_blank\" rel=\"noopener\">Esquema Nacional de Seguridad<\/a><\/li>\r\n\t<li><a href=\"https:\/\/boe.es\/buscar\/pdf\/2011\/BOE-A-2011-7630-consolidado.pdf\" target=\"_blank\" rel=\"noopener\">Ley de Protecci\u00f3n de Infraestructuras Cr\u00edticas<\/a> (PIC)<\/li>\r\n\t<li><a href=\"https:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-1995-24292\" target=\"_blank\" rel=\"noopener\">Ley de Prevenci\u00f3n de Riesgos Laborales<\/a> (LPRL)<\/li>\r\n<\/ul>\r\n<p style=\"margin-bottom: 6.0pt;\">Los dos tipos de auditor\u00eda se abordan desde la vertiente legal pero tambi\u00e9n desde la vertiente t\u00e9cnica. Por este motivo contamos con un <strong>equipo\u00a0multidisciplinar\u00a0formado por profesionales especializados en derecho y en tecnolog\u00edas de la informaci\u00f3n<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-10d992f\" data-id=\"10d992f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a1b7f5 elementor-widget elementor-widget-image\" data-id=\"4a1b7f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1874\" src=\"https:\/\/tecnolawyer.com\/wp-content\/uploads\/2024\/03\/129bead7-5325-44a2-973d-5b7d69a47f46-scaled.jpg\" class=\"attachment-full size-full wp-image-60015\" alt=\"\" srcset=\"https:\/\/tecnolawyer.com\/wp-content\/uploads\/2024\/03\/129bead7-5325-44a2-973d-5b7d69a47f46-scaled.jpg 2560w, https:\/\/tecnolawyer.com\/wp-content\/uploads\/2024\/03\/129bead7-5325-44a2-973d-5b7d69a47f46-300x220.jpg 300w, https:\/\/tecnolawyer.com\/wp-content\/uploads\/2024\/03\/129bead7-5325-44a2-973d-5b7d69a47f46-1024x750.jpg 1024w, https:\/\/tecnolawyer.com\/wp-content\/uploads\/2024\/03\/129bead7-5325-44a2-973d-5b7d69a47f46-768x562.jpg 768w, https:\/\/tecnolawyer.com\/wp-content\/uploads\/2024\/03\/129bead7-5325-44a2-973d-5b7d69a47f46-1536x1125.jpg 1536w, https:\/\/tecnolawyer.com\/wp-content\/uploads\/2024\/03\/129bead7-5325-44a2-973d-5b7d69a47f46-2048x1499.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d2998e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d2998e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-3d6f156\" data-id=\"3d6f156\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e8aeac elementor-widget elementor-widget-text-editor\" data-id=\"8e8aeac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 28px;\">Caracter\u00edsticas<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5522e1c\" data-id=\"5522e1c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b57712 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b57712\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d695722\" data-id=\"d695722\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b1e0b8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"4b1e0b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Auditor\u00eda externa (garant\u00eda de independencia e imparcialidad)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Metodolog\u00eda propia en 10 pasos<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Recomendada para empresas que traten datos de nivel de seguridad medio alto.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ayuda en la demostraci\u00f3n de la responsabilidad proactiva<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Capa adicional de seguridad<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Segura y confidencial<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-80750e3\" data-id=\"80750e3\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0f3d51 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"c0f3d51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Capa_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 390.262 390.262\" style=\"enable-background:new 0 0 390.262 390.262;\" xml:space=\"preserve\"><path style=\"fill:#1BB7EA;\" d=\"M327.503,6.989c-5.652-0.097-10.312,4.408-10.409,10.061l-0.43,25.477  C283.333,15.939,241.062-0.005,195.126,0C87.355,0.01,0.013,87.357,0.008,195.123c-0.005,40.223,12.196,77.691,33.085,108.749  c3.154,4.695,9.513,5.944,14.213,2.785c4.69-3.154,5.939-9.518,2.785-14.213h-0.005c-18.698-27.822-29.599-61.245-29.599-97.321  c0.005-48.256,19.528-91.853,51.149-123.489c31.636-31.621,75.228-51.144,123.489-51.149c40.668,0.005,77.988,13.88,107.663,37.161  l-23.311,4.823c-5.54,1.147-9.098,6.564-7.957,12.104c1.152,5.54,6.564,9.098,12.104,7.951l53.023-10.967l0.922-54.149  C337.667,11.75,333.166,7.086,327.503,6.989z\"><\/path><path style=\"fill:#A4ABB1;\" d=\"M354.245,82.156c-3.282-4.608-9.672-5.688-14.28-2.412c-4.608,3.277-5.688,9.672-2.412,14.28l0,0  c20.291,28.549,32.215,63.391,32.22,101.105c-0.01,48.261-19.528,91.858-51.149,123.5c-31.642,31.621-75.228,51.149-123.5,51.154  c-41.492-0.005-79.549-14.469-109.522-38.63l25.6-5.299c5.54-1.147,9.098-6.564,7.962-12.099c-1.152-5.54-6.564-9.098-12.099-7.957  l-53.028,10.972l-0.932,54.144c-0.102,5.652,4.408,10.317,10.061,10.414c5.658,0.097,10.322-4.408,10.419-10.066l0.394-23.183  c33.275,26.388,75.407,42.189,121.144,42.184c107.781-0.015,195.118-87.368,195.128-195.138  C390.254,153.062,376.906,114.017,354.245,82.156z\"><\/path><path style=\"fill:#1F4254;\" d=\"M212.17,196.378c-5.069,2.125-10.634,3.308-16.476,3.308c-5.842,0-11.412-1.178-16.476-3.308  c-34.493,7.547-60.324,38.231-60.324,74.988h153.6C272.494,234.609,246.653,203.924,212.17,196.378z\"><\/path><circle style=\"fill:#1BB7EA;\" cx=\"195.694\" cy=\"157.02\" r=\"42.665\"><\/circle><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d154e57 elementor-widget elementor-widget-text-editor\" data-id=\"d154e57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 20px;\"><strong>\u00bfTienes dudas?<\/strong> Reserva aqu\u00ed la primera cita gratuita y sin compromiso. Te ayudaremos.<\/span><span style=\"font-size: 20px; background-color: rgba(36, 55, 70, 0.04);\"><\/span><\/p><p><span style=\"font-size: 20px;\"><br><\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2b324b elementor-align-center elementor-widget elementor-widget-button\" data-id=\"f2b324b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/tecnolawyer.com\/es\/consultas\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Consulta<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Seguridad de la Informaci\u00f3n CIBERSEGURIDAD \u201cNuestros poderes tecnol\u00f3gicos aumentan, pero los efectos secundarios y posibles riesgos tambi\u00e9n aumentan\u201dAlvin Toffler Auditor\u00edas ... <a title=\"Auditor\u00eda Seguridad de la Informaci\u00f3n\" class=\"read-more\" href=\"https:\/\/tecnolawyer.com\/es\/seguridad-de-la-informacion-ciberseguridad\/auditoria-seguridad-de-la-informacion\/\" aria-label=\"Leer m\u00e1s sobre Auditor\u00eda Seguridad de la Informaci\u00f3n\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":55218,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"inline_featured_image":false,"generate_page_header":"","footnotes":""},"class_list":["post-55201","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/pages\/55201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/comments?post=55201"}],"version-history":[{"count":0,"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/pages\/55201\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/pages\/55218"}],"wp:attachment":[{"href":"https:\/\/tecnolawyer.com\/es\/wp-json\/wp\/v2\/media?parent=55201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}