{"id":76224,"date":"2018-03-16T14:00:59","date_gmt":"2018-03-16T14:00:59","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/ceos-encryption-questions-need-asking-experts-2\/"},"modified":"2022-02-10T16:02:25","modified_gmt":"2022-02-10T16:02:25","slug":"ceos-encryption-questions-need-asking-experts-2","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/03\/ceos-encryption-questions-need-asking-experts-2\/","title":{"rendered":"Los CEO y el Cifrado:las preguntas que debe hacerle a sus expertos"},"content":{"rendered":"<p><em>Apenas pasa una semana con algo en las noticias que nos recuerda la funci\u00f3n cr\u00edtica del cifrado para proteger nuestros datos. Es una tecnolog\u00eda que nos protege a medida que dependemos de nuestro negocio, somos responsables de asegurar nuestros activos y transacciones comerciales, y somos responsables de la infraestructura nacional cr\u00edtica.<\/em><\/p>\n<p><em>Como CEO, necesito saber qu\u00e9 preguntas debo hacer a mis expertos t\u00e9cnicos sobre el cifrado y su uso, as\u00ed que le ped\u00ed a mi equipo que produjera este documento. Me pareci\u00f3 tan \u00fatil que pens\u00e9 que deber\u00edamos compartirlo con otros ejecutivos mientras trataban de comprender y administrar esta tecnolog\u00eda compleja pero indispensable.<\/em><\/p>\n<p><em>Creemos, en Internet Society, que el cifrado es uno de los activos m\u00e1s valiosos que administramos: los datos. Esperamos que este documento pueda ser \u00fatil para usted.<\/em><\/p>\n<p><em>&#8211; Kathy Brown, CEO, Internet Society<\/em><\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/03\/ceos-encryption-questions-need-asking-experts-2\/\">Continua leyendo en ingl\u00e9s<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apenas pasa una semana con algo en las noticias que nos recuerda la funci\u00f3n cr\u00edtica del cifrado para proteger nuestros datos. Es una tecnolog\u00eda que nos protege a medida que dependemos de nuestro negocio, somos responsables de asegurar nuestros activos y transacciones comerciales, y somos responsables de la infraestructura nacional cr\u00edtica. Como CEO, necesito saber [&hellip;]<\/p>\n","protected":false},"author":1012,"featured_media":75831,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4319,4898],"tags":[],"region_news_regions":[],"content_category":[6102],"ppma_author":[4109],"class_list":["post-76224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cifrado","category-strong-internet","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption.jpg",1280,757,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption-300x177.jpg",300,177,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption-768x454.jpg",768,454,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption-1024x606.jpg",1024,606,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption.jpg",1280,757,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption.jpg",1280,757,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption-250x148.jpg",250,148,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption.jpg",300,177,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption.jpg",400,237,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/ceo-encryption.jpg",600,355,false]},"uagb_author_info":{"display_name":"Robin Wilton","author_link":"https:\/\/www.internetsociety.org\/es\/author\/wilton\/"},"uagb_comment_info":0,"uagb_excerpt":"Apenas pasa una semana con algo en las noticias que nos recuerda la funci\u00f3n cr\u00edtica del cifrado para proteger nuestros datos. Es una tecnolog\u00eda que nos protege a medida que dependemos de nuestro negocio, somos responsables de asegurar nuestros activos y transacciones comerciales, y somos responsables de la infraestructura nacional cr\u00edtica. Como CEO, necesito saber&hellip;","authors":[{"term_id":4109,"user_id":1012,"is_guest":0,"slug":"wilton","display_name":"Robin Wilton","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Robin-Wilton.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Robin-Wilton.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/76224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1012"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=76224"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/76224\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/75831"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=76224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=76224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=76224"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=76224"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=76224"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=76224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}