{"id":2030,"date":"2024-08-23T11:39:16","date_gmt":"2024-08-23T09:39:16","guid":{"rendered":"https:\/\/enthec.com\/descargables\/cumplimiento-de-la-nis-2\/"},"modified":"2024-08-23T11:39:16","modified_gmt":"2024-08-23T09:39:16","slug":"cumplimiento-de-la-nis-2","status":"publish","type":"page","link":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/","title":{"rendered":"Cumplimiento de la Nis 2"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image dynamic=&#8221;yes&#8221; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;152703&#8243; media_width_pixel=&#8221;450&#8243;][vc_column_text uncode_shortcode_id=&#8221;144170&#8243;]Hace ya m\u00e1s de una d\u00e9cada, la Uni\u00f3n Europea fue consciente de la necesidad de elaborar un marco legal com\u00fan sobre Ciberseguridad que estableciese la base de una estrategia compartida por los Estados miembros para luchar unidos contra la ciberdelincuencia.[\/vc_column_text][vc_button button_color=&#8221;color-165520&#8243; border_width=&#8221;0&#8243; uncode_shortcode_id=&#8221;789173&#8243; button_color_type=&#8221;uncode-palette&#8221; icon=&#8221;fa fa-arrow-right4&#8243; link=&#8221;url:https%3A%2F%2Fenthec.com%2Fnis-2%2F&#8221;]DESCARGAR [\/vc_button][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_single_image dynamic=&#8221;yes&#8221; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;152703&#8243; media_width_pixel=&#8221;450&#8243;][vc_column_text uncode_shortcode_id=&#8221;144170&#8243;]Hace ya m\u00e1s de una d\u00e9cada, la Uni\u00f3n Europea fue consciente de la necesidad [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1869,"parent":2026,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2030","page","type-page","status-publish","has-post-thumbnail","hentry","page_category-descargables-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cumplimiento de la Nis 2 - ENTHEC \u00b7 Kartos \u00b7 Qondar<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cumplimiento de la Nis 2 - ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_single_image dynamic=&#8221;yes&#8221; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;152703&#8243; media_width_pixel=&#8221;450&#8243;][vc_column_text uncode_shortcode_id=&#8221;144170&#8243;]Hace ya m\u00e1s de una d\u00e9cada, la Uni\u00f3n Europea fue consciente de la necesidad [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png\" \/>\n\t<meta property=\"og:image:width\" content=\"738\" \/>\n\t<meta property=\"og:image:height\" content=\"517\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/\",\"url\":\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/\",\"name\":\"Cumplimiento de la Nis 2 - ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png\",\"datePublished\":\"2024-08-23T09:39:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png\",\"width\":738,\"height\":517,\"caption\":\"Evaluar y gestionar el riesgo de terceros de forma precisa y efectiva durante el tiempo que dure la relaci\u00f3n comercial es crucial para garantizar la seguridad y la continuidad de las operaciones de cualquier organizaci\u00f3n. En este documento analizamos la importancia de la valoraci\u00f3n del ciberriesgo de terceros, los m\u00e9todos comunes de valoraci\u00f3n, sus d\u00e9ficits y los beneficios de introducir el enfoque XTI en la valoraci\u00f3n del riesgo de terceros.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Downloadables\",\"item\":\"https:\/\/enthec.com\/en\/downloadables\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cumplimiento de la Nis 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cumplimiento de la Nis 2 - ENTHEC \u00b7 Kartos \u00b7 Qondar","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/","og_locale":"en_US","og_type":"article","og_title":"Cumplimiento de la Nis 2 - ENTHEC \u00b7 Kartos \u00b7 Qondar","og_description":"[vc_row][vc_column][vc_single_image dynamic=&#8221;yes&#8221; media_width_use_pixel=&#8221;yes&#8221; alignment=&#8221;center&#8221; uncode_shortcode_id=&#8221;152703&#8243; media_width_pixel=&#8221;450&#8243;][vc_column_text uncode_shortcode_id=&#8221;144170&#8243;]Hace ya m\u00e1s de una d\u00e9cada, la Uni\u00f3n Europea fue consciente de la necesidad [&hellip;]","og_url":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","og_image":[{"width":738,"height":517,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/","url":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/","name":"Cumplimiento de la Nis 2 - ENTHEC \u00b7 Kartos \u00b7 Qondar","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png","datePublished":"2024-08-23T09:39:16+00:00","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Riesgo-de-terceros.png","width":738,"height":517,"caption":"Evaluar y gestionar el riesgo de terceros de forma precisa y efectiva durante el tiempo que dure la relaci\u00f3n comercial es crucial para garantizar la seguridad y la continuidad de las operaciones de cualquier organizaci\u00f3n. En este documento analizamos la importancia de la valoraci\u00f3n del ciberriesgo de terceros, los m\u00e9todos comunes de valoraci\u00f3n, sus d\u00e9ficits y los beneficios de introducir el enfoque XTI en la valoraci\u00f3n del riesgo de terceros."},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/downloadables\/cumplimiento-de-la-nis-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/"},{"@type":"ListItem","position":2,"name":"Downloadables","item":"https:\/\/enthec.com\/en\/downloadables\/"},{"@type":"ListItem","position":3,"name":"Cumplimiento de la Nis 2"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/pages\/2030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=2030"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/pages\/2030\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/pages\/2026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/1869"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=2030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}