{"id":1925,"date":"2019-08-18T12:27:54","date_gmt":"2019-08-18T17:27:54","guid":{"rendered":"https:\/\/integrityisr.com\/?page_id=1925"},"modified":"2019-08-18T12:27:54","modified_gmt":"2019-08-18T17:27:54","slug":"insider-threat-training","status":"publish","type":"page","link":"https:\/\/integrityisr.com\/es\/insider-threat-training\/","title":{"rendered":"FORMACI\u00d3N SOBRE AMENAZAS INTERNAS"},"content":{"rendered":"<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em><strong>La forma m\u00e1s eficaz de combatir el riesgo de la Amenaza Interna es a trav\u00e9s de la formaci\u00f3n descendente, multicapa y continua de los empleados.<\/strong><\/em><\/p><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Cada nivel de formaci\u00f3n se basa en la evaluaci\u00f3n de amenazas internas realizada por el equipo de evaluaci\u00f3n de amenazas de Integrity ISR y se desarrolla para abordar tanto las mejores pr\u00e1cticas de seguridad de la informaci\u00f3n como las \u00e1reas de alto riesgo identificadas durante la evaluaci\u00f3n de amenazas internas.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Integrity ISR colaborar\u00e1 con usted para&nbsp;<\/strong><em><strong>optimizar un plan de gesti\u00f3n de amenazas internas de espectro completo&nbsp;<\/strong><\/em><strong>establecer las condiciones para un \u00e9xito econ\u00f3mico continuado en un entorno altamente competitivo. Trabajamos con usted para desarrollar la gobernanza adecuada para seguir determinando, detectando, disuadiendo y haciendo frente a las amenazas internas. Estas \u00e1reas incluyen pol\u00edticas, procedimientos y t\u00e9cnicas para la empresa, administraci\u00f3n de sistemas y seguridad (f\u00edsica, virtual y de procedimientos).<\/strong><\/p>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">FORMACI\u00d3N DE DIRECTIVOS<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>La implicaci\u00f3n y el apoyo entusiasta de los ejecutivos son cruciales para el \u00e9xito del programa de formaci\u00f3n sobre amenazas internas. El curso de formaci\u00f3n para directivos expone el panorama de riesgos, la estrategia de mitigaci\u00f3n de riesgos y una visi\u00f3n general del programa de formaci\u00f3n sobre amenazas internas.<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">FORMACI\u00d3N DEL EQUIPO DEL PROGRAMA<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Un equipo multidisciplinar es necesario para construir un Programa de Amenazas Internas exitoso. Este curso est\u00e1 dise\u00f1ado para instruir al Equipo del Programa de Amenazas Internas sobre c\u00f3mo desarrollar un Plan de Amenazas Internas eficaz, identificar los primeros indicadores de una Amenaza Interna en cada disciplina, comunicar las amenazas al equipo y aplicar contramedidas eficaces.<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">FORMACI\u00d3N PRESENCIAL DE LOS EMPLEADOS<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>La formaci\u00f3n presencial de los empleados es un riguroso programa de formaci\u00f3n de dos d\u00edas para aquellos empleados con acceso a informaci\u00f3n que, en caso de verse comprometida, supondr\u00eda un perjuicio importante para la empresa. Estas \u00e1reas de riesgo se identificar\u00e1n en la Evaluaci\u00f3n de Amenazas Internas<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">FORMACI\u00d3N EN L\u00cdNEA<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Estar\u00e1n disponibles en l\u00ednea m\u00faltiples cursos para todos los empleados, incluida la formaci\u00f3n sobre amenazas internas, la formaci\u00f3n sobre ciberseguridad y la formaci\u00f3n sobre seguridad de la informaci\u00f3n.<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">CAMPA\u00d1A DE SENSIBILIZACI\u00d3N<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Una campa\u00f1a de concienciaci\u00f3n a gran escala sobre las amenazas internas aumenta la vigilancia de los empleados y act\u00faa como elemento disuasorio contra los posibles agentes de amenazas internas.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"1964\" data-permalink=\"https:\/\/integrityisr.com\/es\/insider-threat-training\/insider-25af\/\" data-orig-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" data-orig-size=\"1000,688\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1566129023&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"insider-25af\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-300x206.jpeg\" data-large-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" src=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" alt=\"\" class=\"wp-image-1964\" width=\"500\" height=\"344\" srcset=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg 1000w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-300x206.jpeg 300w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-768x528.jpeg 768w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-700x482.jpeg 700w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-581x400.jpeg 581w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure><\/div>\n\n\n\n<p style=\"color:#c1da6c;text-align:center\" class=\"has-text-color has-large-font-size wp-block-paragraph\">#CombatProven<\/p>","protected":false},"excerpt":{"rendered":"<p>The most effective way to combat the risk of the Insider Threat is through top-down, multi-layered, and continuous employee training. Each layer of training is informed by the Insider Threat Assessment completed by the Integrity ISR Threat Assessment Team and developed to address both information security best practices as well as high risk areas identified [&hellip;]<\/p>","protected":false},"author":145379797,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-1925","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>INSIDER THREAT TRAINING - Integrity ISR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/integrityisr.com\/es\/insider-threat-training\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"INSIDER THREAT TRAINING - Integrity ISR\" \/>\n<meta property=\"og:description\" content=\"The most effective way to combat the risk of the Insider Threat is through top-down, multi-layered, and continuous employee training. Each layer of training is informed by the Insider Threat Assessment completed by the Integrity ISR Threat Assessment Team and developed to address both information security best practices as well as high risk areas identified [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/integrityisr.com\/es\/insider-threat-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Integrity ISR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/\",\"url\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/\",\"name\":\"INSIDER THREAT TRAINING - Integrity ISR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/insider-25af.jpeg\",\"datePublished\":\"2019-08-18T17:27:54+00:00\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#primaryimage\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/insider-25af.jpeg\",\"contentUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/insider-25af.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/integrityisr.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"INSIDER THREAT TRAINING\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/\",\"name\":\"Integrity ISR\",\"description\":\"Global Innovative Solutions for C4ISR, Space, and Cyberspace Strategy, Training, and Operations\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/integrityisr.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"INSIDER THREAT TRAINING - Integrity ISR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/integrityisr.com\/es\/insider-threat-training\/","og_locale":"es_MX","og_type":"article","og_title":"INSIDER THREAT TRAINING - Integrity ISR","og_description":"The most effective way to combat the risk of the Insider Threat is through top-down, multi-layered, and continuous employee training. Each layer of training is informed by the Insider Threat Assessment completed by the Integrity ISR Threat Assessment Team and developed to address both information security best practices as well as high risk areas identified [&hellip;]","og_url":"http:\/\/integrityisr.com\/es\/insider-threat-training\/","og_site_name":"Integrity ISR","og_image":[{"url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/integrityisr.com\/insider-threat-training\/","url":"http:\/\/integrityisr.com\/insider-threat-training\/","name":"INSIDER THREAT TRAINING - Integrity ISR","isPartOf":{"@id":"https:\/\/integrityisr.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/integrityisr.com\/insider-threat-training\/#primaryimage"},"image":{"@id":"http:\/\/integrityisr.com\/insider-threat-training\/#primaryimage"},"thumbnailUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg","datePublished":"2019-08-18T17:27:54+00:00","breadcrumb":{"@id":"http:\/\/integrityisr.com\/insider-threat-training\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["http:\/\/integrityisr.com\/insider-threat-training\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"http:\/\/integrityisr.com\/insider-threat-training\/#primaryimage","url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg","contentUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg"},{"@type":"BreadcrumbList","@id":"http:\/\/integrityisr.com\/insider-threat-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrityisr.com\/"},{"@type":"ListItem","position":2,"name":"INSIDER THREAT TRAINING"}]},{"@type":"WebSite","@id":"https:\/\/integrityisr.com\/#website","url":"https:\/\/integrityisr.com\/","name":"Integridad ISR","description":"Soluciones innovadoras globales para la estrategia, la formaci\u00f3n y las operaciones C4ISR, espaciales y ciberespaciales","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrityisr.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/PaiUyX-v3","_links":{"self":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/pages\/1925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/users\/145379797"}],"replies":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/comments?post=1925"}],"version-history":[{"count":0,"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/pages\/1925\/revisions"}],"wp:attachment":[{"href":"https:\/\/integrityisr.com\/es\/wp-json\/wp\/v2\/media?parent=1925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}