{"id":7,"date":"2015-12-28T01:42:28","date_gmt":"2015-12-28T06:42:28","guid":{"rendered":"https:\/\/kryptogenesis.com.co\/kportal\/?page_id=7"},"modified":"2019-12-05T00:22:57","modified_gmt":"2019-12-05T05:22:57","slug":"auditoria-en-seguridad-de-la-informacion","status":"publish","type":"page","link":"https:\/\/kryptogenesis.com.co\/?page_id=7","title":{"rendered":"Auditor\u00eda En Seguridad de la Informaci\u00f3n"},"content":{"rendered":"<div id=\"pl-7\"  class=\"panel-layout\" ><div id=\"pg-7-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-7-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-172\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/telsec_seguridad-300x188.png\" alt=\"telsec_seguridad\" width=\"1200\" height=\"750\" srcset=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/telsec_seguridad-300x188.png 300w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/telsec_seguridad-768x480.png 768w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/telsec_seguridad.png 1024w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Auditor\u00eda En Seguridad de la Informaci\u00f3n<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-7-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-7-1-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"1\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><span style=\"font-size: small; color: #888888;\"><strong>Las organizaciones dependen, cada d&iacute;a m&aacute;s, de las IT para lograr sus objetivos y estrategias de negocio. La evoluci&oacute;n obliga a un cambio constante para que las organizaciones mantengan la ventaja competitiva de los avances tecnol&oacute;gicos en el manejo del negocio.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><div id=\"pgc-7-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-7-1-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"2\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><span style=\"color: #888888; font-size: small;\"><strong>Con un enfoque en seguridad, Kryptog&eacute;nesis IT Security, le ofrece servicios de auditor&iacute;a en seguridad inform&aacute;tica para evaluar la confiabilidad, confidencialidad, integridad y disponibilidad de la informaci&oacute;n.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><div id=\"pgc-7-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-7-1-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"3\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><span style=\"color: #888888; font-size: small;\"><strong>Garantizando la alineaci&oacute;n de las estrategias inform&aacute;ticas a las del negocio, su control y direcci&oacute;n, as&iacute; como la salvaguarda de la informaci&oacute;n y de la tecnolog&iacute;a que la soporta, como principales activos del negocio, y la existencia de una cultura organizacional y de la informaci&oacute;n.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pg-7-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-7-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><a href=\"https:\/\/kryptogenesis.com.co\/kportal\/cotizador\/\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-351 aligncenter\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/01\/cotice_aqui-kryptogenesis.gif\" alt=\"cotice_aqui-kryptogenesis\" width=\"171\" height=\"42\" \/><\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-7-3\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7-3-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7-3-1\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7-3-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7-3-3\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7-3-4\"  class=\"panel-grid-cell panel-grid-cell-empty panel-grid-cell-mobile-last\" ><\/div><div id=\"pgc-7-3-5\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Auditor\u00eda En Seguridad de la Informaci\u00f3n Las organizaciones dependen, cada d&iacute;a m&aacute;s, de las IT para lograr sus objetivos y estrategias de negocio. La evoluci&oacute;n obliga a un cambio constante para que las organizaciones mantengan la ventaja competitiva de los avances tecnol&oacute;gicos en el manejo del negocio. Con un enfoque en seguridad, Kryptog&eacute;nesis IT Security, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":95,"parent":500,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-7","page","type-page","status-publish","has-post-thumbnail","hentry","post","post-with-thumbnail","post-with-thumbnail-large"],"_links":{"self":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7"}],"version-history":[{"count":0,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/7\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/media\/95"}],"wp:attachment":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}