{"id":6675,"date":"2025-01-28T12:14:58","date_gmt":"2025-01-28T11:14:58","guid":{"rendered":"http:\/\/10.128.3.28\/?page_id=6675"},"modified":"2025-01-28T12:14:58","modified_gmt":"2025-01-28T11:14:58","slug":"ii-jornadas-de-seguridad-informatica","status":"publish","type":"page","link":"https:\/\/computaex.es\/en\/ii-jornadas-de-seguridad-informatica\/","title":{"rendered":"II Jornadas de Seguridad Inform\u00e1tica"},"content":{"rendered":"<div class=\"field field-name-field-fecha-evento field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">Viernes 29 de Junio de 2012, 17:30 horas.<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>The\u00a0<a title=\"Colegio Profesional de Ingenieros en Inform\u00e1tica de Extremadura\" href=\"http:\/\/www.cpiiex.es\/\">Colegio Profesional de Ingenieros en Inform\u00e1tica de Extremadura<\/a>\u00a0(CPIIEx) organiza las II Jornadas de Seguridad Inform\u00e1tica.<\/p>\n<p>El evento se celebrar\u00e1 en el Complejo San Francisco de C\u00e1ceres, con los siguientes ponentes:<\/p>\n<ul>\n<li>Luis Jim\u00e9nez, Subdirector General del\u00a0<a title=\"Centro Criptol\u00f3gico Nacional\" href=\"https:\/\/www.ccn.cni.es\/\">Centro Criptol\u00f3gico Nacional<\/a>. Se tratar\u00e1 el Esquema Nacional de Seguridad que regula el acceso de los ciudadanos a los Servicios P\u00fablicos y la pol\u00edtica de seguridad a establecer para la protecci\u00f3n adecuada de la Informaci\u00f3n en estos Servicios.<\/li>\n<li>Miguel Lubi\u00e1n, responsable de seguridad y consultor\u00eda del\u00a0<a title=\"Instituto CIES - Ciencia e Ingenier\u00eda Econ\u00f3mica y Social\" href=\"http:\/\/www.institutocies.com\/\">Instituto CIES<\/a>. Realizar\u00e1 una visi\u00f3n actual de la LOPD, interpretaci\u00f3n de la misma y aplicaci\u00f3n t\u00e9cnica.<\/li>\n<\/ul>\n<p>M\u00e1s informaci\u00f3n:<\/p>\n<ul>\n<li><a title=\"Colegio Profesional de Ingenieros en Inform\u00e1tica de Extremadura\" href=\"http:\/\/www.cpiiex.es\/index.php\/noticias\/3-destacamos\/284-curso-seguridad-informatica\">Colegio Profesional de Ingenieros en Inform\u00e1tica de Extremadura<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"field field-name-taxonomy-vocabulary-8 field-type-taxonomy-term-reference field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><a href=\"https:\/\/computaex.es\/en\/categoria\/jornadas\/\">Seminars<\/a><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Viernes 29 de Junio de 2012, 17:30 horas. El\u00a0Colegio Profesional de Ingenieros en Inform\u00e1tica de Extremadura\u00a0(CPIIEx) organiza las II Jornadas de Seguridad Inform\u00e1tica. El evento se celebrar\u00e1 en el Complejo &#8230;<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[93],"class_list":["post-6675","page","type-page","status-publish","hentry","category-jornadas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>II Jornadas de Seguridad Inform\u00e1tica - Fundaci\u00f3n COMPUTAEX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computaex.es\/en\/ii-jornadas-de-seguridad-informatica\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"II Jornadas de Seguridad Inform\u00e1tica - Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"og:description\" content=\"Viernes 29 de Junio de 2012, 17:30 horas. El\u00a0Colegio Profesional de Ingenieros en Inform\u00e1tica de Extremadura\u00a0(CPIIEx) organiza las II Jornadas de Seguridad Inform\u00e1tica. El evento se celebrar\u00e1 en el Complejo ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computaex.es\/en\/ii-jornadas-de-seguridad-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/computaex\/\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/08\/COMPUTAEX.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"403\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@computaex\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/\",\"url\":\"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/\",\"name\":\"II Jornadas de Seguridad Inform\u00e1tica - Fundaci\u00f3n COMPUTAEX\",\"isPartOf\":{\"@id\":\"https:\/\/computaex.es\/#website\"},\"datePublished\":\"2025-01-28T11:14:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/computaex.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"II Jornadas de Seguridad Inform\u00e1tica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computaex.es\/#website\",\"url\":\"https:\/\/computaex.es\/\",\"name\":\"Fundaci\u00f3n COMPUTAEX\",\"description\":\"COMPUTAEX\",\"publisher\":{\"@id\":\"https:\/\/computaex.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computaex.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computaex.es\/#organization\",\"name\":\"COMPUTAEX\",\"url\":\"https:\/\/computaex.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"contentUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"width\":2560,\"height\":970,\"caption\":\"COMPUTAEX\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/m.facebook.com\/computaex\/\",\"https:\/\/x.com\/computaex\",\"https:\/\/es.linkedin.com\/company\/cenits\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"II Jornadas de Seguridad Inform\u00e1tica - Fundaci\u00f3n COMPUTAEX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computaex.es\/en\/ii-jornadas-de-seguridad-informatica\/","og_locale":"en_US","og_type":"article","og_title":"II Jornadas de Seguridad Inform\u00e1tica - Fundaci\u00f3n COMPUTAEX","og_description":"Viernes 29 de Junio de 2012, 17:30 horas. El\u00a0Colegio Profesional de Ingenieros en Inform\u00e1tica de Extremadura\u00a0(CPIIEx) organiza las II Jornadas de Seguridad Inform\u00e1tica. El evento se celebrar\u00e1 en el Complejo ...","og_url":"https:\/\/computaex.es\/en\/ii-jornadas-de-seguridad-informatica\/","og_site_name":"Fundaci\u00f3n COMPUTAEX","article_publisher":"https:\/\/m.facebook.com\/computaex\/","og_image":[{"width":1024,"height":403,"url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/08\/COMPUTAEX.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@computaex","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/","url":"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/","name":"II Jornadas de Seguridad Inform\u00e1tica - Fundaci\u00f3n COMPUTAEX","isPartOf":{"@id":"https:\/\/computaex.es\/#website"},"datePublished":"2025-01-28T11:14:58+00:00","breadcrumb":{"@id":"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/computaex.es\/ii-jornadas-de-seguridad-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/computaex.es\/"},{"@type":"ListItem","position":2,"name":"II Jornadas de Seguridad Inform\u00e1tica"}]},{"@type":"WebSite","@id":"https:\/\/computaex.es\/#website","url":"https:\/\/computaex.es\/","name":"COMPUTAEX Foundation","description":"COMPUTAEX","publisher":{"@id":"https:\/\/computaex.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computaex.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computaex.es\/#organization","name":"COMPUTAEX","url":"https:\/\/computaex.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/","url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","contentUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","width":2560,"height":970,"caption":"COMPUTAEX"},"image":{"@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/m.facebook.com\/computaex\/","https:\/\/x.com\/computaex","https:\/\/es.linkedin.com\/company\/cenits"]}]}},"_links":{"self":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/6675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/comments?post=6675"}],"version-history":[{"count":1,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/6675\/revisions"}],"predecessor-version":[{"id":6676,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/6675\/revisions\/6676"}],"wp:attachment":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/media?parent=6675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/categories?post=6675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}