{"id":411,"date":"2024-08-23T11:39:16","date_gmt":"2024-08-23T09:39:16","guid":{"rendered":"https:\/\/enthec.com\/?page_id=411"},"modified":"2024-08-23T11:50:33","modified_gmt":"2024-08-23T09:50:33","slug":"cumplimiento-de-la-nis-2","status":"publish","type":"page","link":"https:\/\/enthec.com\/descargables\/cumplimiento-de-la-nis-2\/","title":{"rendered":"Cumplimiento de la Nis 2"},"content":{"rendered":"
[vc_row][vc_column][vc_single_image dynamic=\u00bbyes\u00bb media_width_use_pixel=\u00bbyes\u00bb alignment=\u00bbcenter\u00bb uncode_shortcode_id=\u00bb152703″ media_width_pixel=\u00bb450″][vc_column_text uncode_shortcode_id=\u00bb144170″]Hace ya m\u00e1s de una d\u00e9cada, la Uni\u00f3n Europea fue consciente de la necesidad de elaborar un marco legal com\u00fan sobre Ciberseguridad que estableciese la base de una estrategia compartida por los Estados miembros para luchar unidos contra la ciberdelincuencia.[\/vc_column_text][vc_button button_color=\u00bbcolor-165520″ border_width=\u00bb0″ uncode_shortcode_id=\u00bb789173″ button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-arrow-right4″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fnis-2%2F\u00bb]DESCARGAR [\/vc_button][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"
[vc_row][vc_column][vc_single_image dynamic=\u00bbyes\u00bb media_width_use_pixel=\u00bbyes\u00bb alignment=\u00bbcenter\u00bb uncode_shortcode_id=\u00bb152703″ media_width_pixel=\u00bb450″][vc_column_text uncode_shortcode_id=\u00bb144170″]Hace ya m\u00e1s de una d\u00e9cada, la Uni\u00f3n Europea fue consciente de la necesidad […]<\/p>\n","protected":false},"author":1,"featured_media":273,"parent":402,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-411","page","type-page","status-publish","has-post-thumbnail","hentry","page_category-descargables"],"yoast_head":"\n