{"id":7440,"date":"2021-03-25T10:21:25","date_gmt":"2021-03-25T16:21:25","guid":{"rendered":"https:\/\/anuies-tic.anuies.mx\/web\/?p=7440"},"modified":"2021-05-11T20:06:39","modified_gmt":"2021-05-12T02:06:39","slug":"webinar-que-se-necesita-para-tener-mas-mujeres-en-puestos-de-liderazgo-en-ciberseguridad","status":"publish","type":"post","link":"https:\/\/anuies-tic.anuies.mx\/web\/webinar-que-se-necesita-para-tener-mas-mujeres-en-puestos-de-liderazgo-en-ciberseguridad\/","title":{"rendered":"24 marzo &#8211; Webinar: \u00bfQu\u00e9 se necesita para tener m\u00e1s mujeres en puestos de liderazgo en ciberseguridad?."},"content":{"rendered":"<div id=\"pl-7440\"  class=\"panel-layout\" ><div id=\"pg-7440-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7440-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-7440-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"kvgmc6g5 cxmmr5t8 oygrvhab hcukyx3x c1et5uql ii04i59q\">\n<div dir=\"auto\" style=\"text-align: justify;\">La Red de Mujeres en TIC y la Comisi\u00f3n de Fomento de la Cultura de Seguridad de la Informaci\u00f3n de la ANUIES TIC, en colaboraci\u00f3n con <a class=\"oajrlxb2 g5ia77u1 qu0x051f esr5mh6w e9989ue4 r7d6kgcz rq0escxv nhd2j8a9 nc684nl6 p7hjln8o kvgmc6g5 cxmmr5t8 oygrvhab hcukyx3x jb3vyjys rz4wbd8a qt6c0cv9 a8nywdso i1ao9s8h esuyzwwr f1sip0of lzcic4wl q66pz984 gpro0wi8 b1v8xokw\" tabindex=\"0\" role=\"link\" href=\"https:\/\/www.facebook.com\/hashtag\/cyberiiot?__eep__=6&amp;__cft__[0]=AZViWX_IKaC2C1mRFgk64Rtna2I6oj1H20zBDgTQw1br1fxe3eBA4e--Im7MXySMazBNmjTvEzkObsDM9QrquKvo1AwHgMx1FAFRAKDUKdn504OmUOTA0RpRVGqNPR6sr52XQb5XkcOCN7D4aTwlnFDfxM2chBGnG75niJfqO0HHh1qBuh6bYI2069DkOuqmjQU&amp;__tn__=*NK-R\">#CyberIIoT<\/a> y IoTSI Security Institute, M\u00e9xico, organizaron el webinar \u201c\u00bfQu\u00e9 se necesita para tener m\u00e1s mujeres en puestos de liderazgo en ciberseguridad? Con el objetivo de visibilizar a la mujer en el campo de la ciberseguridad, los retos y experiencias que se presentan, para ello, convoco a 6 mujeres que llevan a\u00f1os dedicadas a la ciberseguridad o vinculadas al sector y que con sus experiencias nos ayudaron a comprender ventajas y desventajas que se presentan para acortar la brecha de g\u00e9nero.<\/div>\n<div dir=\"auto\"><\/div>\n<\/div>\n<div dir=\"auto\"><\/div>\n<p><span style=\"font-size: 14pt;\"><strong>Moderadora: <\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Mtra. Julia Janet Bernuy S\u00e1nchez\u00a0 - IIMAS-UNAM<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Ponentes:<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\">Dra. Julia Urbina Pineda - CyberIIoT( Cybersecurity for the Industrial IoT) - \u00a0IoT Security Institute, M\u00e9xico.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Mtra. Ana Paula Romualdo - Hogan Lovells M\u00e9xico \u2013 Legalzilla.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Mtra. Lesly Colmenares Palafox - Senior Manager Cybersecurity IEnova.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Ing. Blanca Azucena Mart\u00ednez Garc\u00eda - Subdirectora de Seguridad Inform\u00e1tica en Gobierno del Estado de M\u00e9xico.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Dra. Perla M. Viera-Gonz\u00e1lez<strong>\u00a0-\u00a0<\/strong>Coordinadora de Seguridad Inform\u00e1tica y Administradora de Sistemas Linux en la Facultad de Ciencias F\u00edsico Matem\u00e1ticas de la Universidad Aut\u00f3noma de Nuevo Le\u00f3n.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Mtra. Alba Gabriela Garay R. - IEEE Seccion Honduras<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-7440-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-7440-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/5rPbDlBAwgg\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>La Red de Mujeres en TIC y la Comisi\u00f3n de Fomento de la Cultura de Seguridad de la Informaci\u00f3n de la ANUIES TIC, en colaboraci\u00f3n con #CyberIIoT y IoTSI Security Institute, M\u00e9xico, organizaron el webinar \u201c\u00bfQu\u00e9 se necesita para tener m\u00e1s mujeres en puestos de liderazgo en ciberseguridad? Con el objetivo de visibilizar a la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7471,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,52],"tags":[],"class_list":{"0":"post-7440","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-eventos","8":"category-eventos-anteriores","10":"post-with-thumbnail","11":"post-with-thumbnail-large"},"rttpg_featured_image_url":{"full":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post.png",1200,1200,false],"landscape":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post.png",1200,1200,false],"portraits":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post.png",1200,1200,false],"thumbnail":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-150x150.png",150,150,true],"medium":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-300x300.png",300,300,true],"large":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-1024x1024.png",720,720,true],"1536x1536":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post.png",1200,1200,false],"2048x2048":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post.png",1200,1200,false],"post-thumbnail":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-720x380.png",720,380,true],"vantage-thumbnail-no-sidebar":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-1080x380.png",1080,380,true],"vantage-slide":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-960x480.png",960,480,true],"vantage-carousel":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-272x182.png",272,182,true],"vantage-grid-loop":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-436x272.png",436,272,true],"sow-carousel-default":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/03\/banner_rs_post-272x182.png",272,182,true]},"rttpg_author":{"display_name":"ctrlweb","author_link":"https:\/\/anuies-tic.anuies.mx\/web\/author\/ctrldcsctrlweb\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/anuies-tic.anuies.mx\/web\/category\/eventos\/\" rel=\"category tag\">Eventos<\/a> <a href=\"https:\/\/anuies-tic.anuies.mx\/web\/category\/eventos\/eventos-anteriores\/\" rel=\"category tag\">Eventos anteriores<\/a>","rttpg_excerpt":"La Red de Mujeres en TIC y la Comisi\u00f3n de Fomento de la Cultura de Seguridad de la Informaci\u00f3n de la ANUIES TIC, en colaboraci\u00f3n con #CyberIIoT y IoTSI Security Institute, M\u00e9xico, organizaron el webinar \u201c\u00bfQu\u00e9 se necesita para tener m\u00e1s mujeres en puestos de liderazgo en ciberseguridad? Con el objetivo de visibilizar a la&hellip;","_links":{"self":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts\/7440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/comments?post=7440"}],"version-history":[{"count":7,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts\/7440\/revisions"}],"predecessor-version":[{"id":7629,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts\/7440\/revisions\/7629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/media\/7471"}],"wp:attachment":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/media?parent=7440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/categories?post=7440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/tags?post=7440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}