{"id":2,"date":"2023-05-10T20:13:54","date_gmt":"2023-05-10T23:13:54","guid":{"rendered":"https:\/\/www.egs-latam.com\/biblioteca\/?page_id=2"},"modified":"2025-06-29T20:00:07","modified_gmt":"2025-06-29T23:00:07","slug":"biblioteca","status":"publish","type":"page","link":"https:\/\/www.egs-latam.com\/recursos\/biblioteca\/","title":{"rendered":"biblioteca"},"content":{"rendered":"\t<section class=\"section\" id=\"section_157553095\">\n\t\t<div class=\"bg section-bg fill bg-fill  \" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"text-449513381\" class=\"text\">\n\t\t\n<h1>BIBLIOTECA DIGITAL<\/h1>\n\t\t\n<style>\n#text-449513381 {\n  line-height: 0.75;\n  text-align: center;\n  color: rgb(255,255,255);\n}\n#text-449513381 > * {\n  color: rgb(255,255,255);\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\n\t\t\n<style>\n#section_157553095 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n#section_157553095 .section-bg.bg-loaded {\n  background-image: url(https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/bg-biblioteca-1.jpg);\n}\n#section_157553095 .section-bg {\n  background-position: 42% 0%;\n}\n#section_157553095 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_157553095 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n<div class=\"row align-middle\"  id=\"row-1659522782\">\n\n\t<div id=\"col-1687338897\" class=\"col medium-7 small-12 large-7\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<div class=\"row row-collapse\"  id=\"row-1746840805\">\n\n\t<div id=\"col-558880049\" class=\"col medium-1 small-12 large-1\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<div class=\"is-divider divider clearfix\" style=\"margin-top:0.8em;margin-bottom:0.8em;max-width:24px;background-color:rgb(235, 28, 36);\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1949710479\" class=\"col medium-11 small-12 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-649723425\" class=\"text\">\n\t\t\n<p><strong>DESCARGAR EL E-BOOK<\/strong><\/p>\n\t\t\n<style>\n#text-649723425 {\n  font-size: 1rem;\n  line-height: 0.75;\n  text-align: left;\n  color: #eb1c24;\n}\n#text-649723425 > * {\n  color: #eb1c24;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"text-3591782329\" class=\"text\">\n\t\t\n<h3>Descarga ahora el nuevo eBook Gratis<\/h3>\n\t\t\n<style>\n#text-3591782329 {\n  font-size: 1.3rem;\n  line-height: 1.2;\n  text-align: left;\n  color: #353b43;\n}\n#text-3591782329 > * {\n  color: #353b43;\n}\n@media (min-width:550px) {\n  #text-3591782329 {\n    line-height: 0.75;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3177219831\" class=\"text\">\n\t\t\n<h2>C\u00f3mo la IA est\u00e1 cambiando las reglas de la ciberseguridad<\/h2>\n\t\t\n<style>\n#text-3177219831 {\n  font-size: 1.25rem;\n  line-height: 1.9;\n  text-align: left;\n  color: #eb1c24;\n}\n#text-3177219831 > * {\n  color: #eb1c24;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-4202500762\" class=\"text\">\n\t\t\n\t\t\n<style>\n#text-4202500762 {\n  font-size: 0.75rem;\n  line-height: 1.9;\n  text-align: left;\n  color: rgb(0,0,0);\n}\n#text-4202500762 > * {\n  color: rgb(0,0,0);\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-246378197\">\n\n\t<div id=\"col-1504202055\" class=\"col medium-11 small-10 large-11\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p>Vivimos en un mundo donde las amenazas cibern\u00e9ticas evolucionan a una velocidad sin precedentes. Las herramientas tradicionales de seguridad \u2014como los firewalls perimetrales\u2014 siguen siendo importantes, pero ya no son suficientes. Hoy, los atacantes utilizan credenciales leg\u00edtimas, se mueven lateralmente dentro de las redes y aprovechan configuraciones err\u00f3neas o dispositivos no monitoreados para penetrar y causar da\u00f1os significativos.<\/p>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1687338897 > .col-inner {\n  margin: 0 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-35025096\" class=\"col medium-5 small-12 large-5\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1761142847\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/e-book-c%C3%B3mo-la-ia-est%C3%A1-cambiando-las-reglas-de-la-ciberseguridad\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1301\" height=\"1332\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/ebook-junio2025.jpg\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/ebook-junio2025.jpg 1301w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/ebook-junio2025-293x300.jpg 293w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/ebook-junio2025-1000x1024.jpg 1000w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/ebook-junio2025-768x786.jpg 768w\" sizes=\"auto, (max-width: 1301px) 100vw, 1301px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_1761142847 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-910851682\">\n\n\t<div id=\"col-1819491200\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/e-book-c%C3%B3mo-la-ia-est%C3%A1-cambiando-las-reglas-de-la-ciberseguridad\" target=\"_self\" class=\"button primary\"  style=\"border-radius:10px;\">\n    <span>Descargar ebook aqu\u00ed<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-1819491200 > .col-inner {\n  margin: -73px 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-35025096 > .col-inner {\n  margin: -21px 0px 0px 0px;\n}\n@media (min-width:550px) {\n  #col-35025096 > .col-inner {\n    margin: 0px -39px 0px 0px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-834242602\">\n\n\t<div id=\"col-802088672\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<div class=\"is-divider divider clearfix\" style=\"max-width:100%;height:1px;\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-1057003869\">\n\n\t<div id=\"col-1157096747\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-3963608716\" class=\"text\">\n\t\t\n<h3>E-BOOKS ANTERIORES<\/h3>\n\t\t\n<style>\n#text-3963608716 {\n  font-size: 1.3rem;\n  text-align: center;\n  color: #eb1c24;\n}\n#text-3963608716 > * {\n  color: #eb1c24;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row align-center\"  id=\"row-6218860\">\n\n\t<div id=\"col-412101627\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_764409470\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/la-hoja-de-ruta-de-ti-para-la-ciberseguridad\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"291\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/biblioteca-ebook-marzo.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/biblioteca-ebook-marzo.jpg 375w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2025\/06\/biblioteca-ebook-marzo-300x233.jpg 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_764409470 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2771199635\" class=\"text\">\n\t\t\n<p><strong>M\u00e1s all\u00e1 del antivirus: \u00bfC\u00f3mo construir una Estrategia S\u00f3lida de Ciberseguridad?<\/strong><\/p>\n\t\t\n<style>\n#text-2771199635 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-2771199635 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1473113100\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-1473113100 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-601021750\">\n\n\t<div id=\"col-637774833\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-387159563\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/como-construir-una-estrategia-solida-de-ciberseguridad\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-2065513742\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1467732431\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1109527593\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/la-hoja-de-ruta-de-ti-para-la-ciberseguridad\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"291\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/10\/agosto-old.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/10\/agosto-old.jpg 375w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/10\/agosto-old-300x233.jpg 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_1109527593 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3819439508\" class=\"text\">\n\t\t\n<p><strong>La hoja de ruta de TI para la ciberseguridad<\/strong><\/p>\n\t\t\n<style>\n#text-3819439508 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-3819439508 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3732484786\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-3732484786 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1816580003\">\n\n\t<div id=\"col-1815317380\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-2062861393\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/la-hoja-de-ruta-de-ti-para-la-ciberseguridad\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1213753937\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-99691958\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1946690149\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/protegiendo-tu-espacio-virtual-guia-integral-contra-la-ciberdelincuencia-y-el-fraude-en-internet\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"291\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/08\/resumen.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/08\/resumen.jpg 375w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/08\/resumen-300x233.jpg 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_1946690149 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-355668388\" class=\"text\">\n\t\t\n<p><strong>Protegiendo tu espacio virtual<\/strong><\/p>\n\t\t\n<style>\n#text-355668388 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-355668388 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1158529632\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-1158529632 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1664820452\">\n\n\t<div id=\"col-518934415\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1556456664\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/protegiendo-tu-espacio-virtual-guia-integral-contra-la-ciberdelincuencia-y-el-fraude-en-internet\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-940539036\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-788519549\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_653174830\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/nueva-ley-de-ciberseguridad-una-guia-esencial-para-adaptarte-a-la-nueva-legislacion\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"291\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/05\/ebook-marzo-listado.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/05\/ebook-marzo-listado.jpg 375w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/05\/ebook-marzo-listado-300x233.jpg 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_653174830 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1967137729\" class=\"text\">\n\t\t\n<p><strong>Nueva ley de ciberseguridad en Chile: Una gu\u00eda esencial para adaptarse a la nueva legislaci\u00f3n<\/strong><\/p>\n\t\t\n<style>\n#text-1967137729 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-1967137729 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-646663686\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-646663686 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1765538101\">\n\n\t<div id=\"col-1210362143\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1026213464\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/nueva-ley-de-ciberseguridad-una-guia-esencial-para-adaptarte-a-la-nueva-legislacion\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-560809740\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1894374604\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1737570430\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/ciberseguridad-en-chile-retos-y-realidades-que-nos-dejo-el-2023\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/03\/OLD.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/03\/OLD.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2024\/03\/OLD-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_1737570430 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-678686124\" class=\"text\">\n\t\t\n<p><strong>Ciberseguridad en Chile: Retos y realidades que nos dej\u00f3 el 2023<\/strong><\/p>\n\t\t\n<style>\n#text-678686124 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-678686124 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3265905115\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-3265905115 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-532705947\">\n\n\t<div id=\"col-345921055\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-773392192\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/ciberseguridad-en-chile-retos-y-realidades-que-nos-dejo-el-2023\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1284470160\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1249801217\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1717605694\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/ciberseguridad-en-la-nube-un-mar-de-riesgos-y-oportunidades-por-el-que-navegan-empresas\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/12\/octubre.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/12\/octubre.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/12\/octubre-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_1717605694 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2338741956\" class=\"text\">\n\t\t\n<p><strong>Ciberseguridad en la nube: Riesgos y oportunidades en la que navegan las empresas<\/strong><\/p>\n\t\t\n<style>\n#text-2338741956 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-2338741956 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2704873169\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-2704873169 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1222634660\">\n\n\t<div id=\"col-133488236\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1140228975\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/ciberseguridad-en-la-nube-un-mar-de-riesgos-y-oportunidades-por-el-que-navegan-empresas\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1758254175\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-876911949\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_911179615\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/conoces-realmente-cual-es-tu-superficie-de-ataque\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/10\/ebook-superficie-de-ataque-1.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/10\/ebook-superficie-de-ataque-1.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/10\/ebook-superficie-de-ataque-1-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_911179615 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-201128987\" class=\"text\">\n\t\t\n<p><strong>\u00bfConoces realmente cu\u00e1l es tu superficie de ataque?<\/strong><\/p>\n\t\t\n<style>\n#text-201128987 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-201128987 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1513161374\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-1513161374 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1135352401\">\n\n\t<div id=\"col-779211103\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-807646976\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/conoces-realmente-cual-es-tu-superficie-de-ataque\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-363772426\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1745314075\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_400013205\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/xdr-el-principio-esencial-de-la-ciberseguridad-moderna\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/09\/ebook1.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/09\/ebook1.png 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/09\/ebook1-300x233.png 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_400013205 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-7683243\" class=\"text\">\n\t\t\n<p><strong>XDR: El principio esencial de la ciberseguridad moderna<\/strong><\/p>\n\t\t\n<style>\n#text-7683243 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-7683243 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-58038011\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-58038011 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-241464260\">\n\n\t<div id=\"col-2093982024\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1474719274\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/xdr-el-principio-esencial-de-la-ciberseguridad-moderna\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-485554147\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1637575518\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1800343286\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/la-importancia-de-la-proteccion-integral-de-datos-mas-alla-del-respaldo\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/09\/ebook2.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/09\/ebook2.png 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/09\/ebook2-300x233.png 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_1800343286 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-4040160967\" class=\"text\">\n\t\t\n<p><strong>La importancia de la protecci\u00f3n integral de datos: m\u00e1s all\u00e1 del respaldo<\/strong><\/p>\n\t\t\n<style>\n#text-4040160967 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-4040160967 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-966181208\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-966181208 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-656181401\">\n\n\t<div id=\"col-1221723920\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1720734471\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/la-importancia-de-la-proteccion-integral-de-datos-mas-alla-del-respaldo\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1628458322\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-151002746\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_266281071\">\n\t\t<a class=\"\" href=\"https:\/\/ciberseguridad.egs-latam.com\/ciberseguridad-en-el-mundo-empresarial-mitos-y-verdades\"  >\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/marzo.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/marzo.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/marzo-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\t\t\n<style>\n#image_266281071 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1373936365\" class=\"text\">\n\t\t\n<p><strong>Ciberseguridad en el mundo empresarial: Mitos y verdades<\/strong><\/p>\n\t\t\n<style>\n#text-1373936365 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-1373936365 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3859975825\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-3859975825 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1056192147\">\n\n\t<div id=\"col-1621244247\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-589806177\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/ciberseguridad-en-el-mundo-empresarial-mitos-y-verdades\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1297517903\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-568132612\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_534873850\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/febrero.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/febrero.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/febrero-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_534873850 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3525856732\" class=\"text\">\n\t\t\n<p><strong>Educando a nuestros hijos en ciberseguridad<\/strong><\/p>\n\t\t\n<style>\n#text-3525856732 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-3525856732 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1448683110\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-1448683110 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-2026035960\">\n\n\t<div id=\"col-887944779\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1223111872\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/educando-a-nuestros-hijos-en-ciberseguridad\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-149382784\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1537431763\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_781744622\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/enero.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/enero.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/enero-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_781744622 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-911497147\" class=\"text\">\n\t\t\n<p><strong>Gu\u00eda Pr\u00e1ctica: Mejorar la ciberseguridad de tu empresa<\/strong><\/p>\n\t\t\n<style>\n#text-911497147 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-911497147 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3950258934\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-3950258934 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-506481993\">\n\n\t<div id=\"col-610817490\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-216674300\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/ebook-guia-practica-para-mejorar-ciberseguridad-en-tu-empresa\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1289600981\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1051781691\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1041209596\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/ramsomeware.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/ramsomeware.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/ramsomeware-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1041209596 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-552217131\" class=\"text\">\n\t\t\n<p><strong>Ransomeware: claves de una pr\u00e1ctica m\u00e1s frecuente.<\/strong><\/p>\n\t\t\n<style>\n#text-552217131 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-552217131 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3800471211\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-3800471211 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1279063969\">\n\n\t<div id=\"col-1877766008\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-842445111\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/e-book-ransomware-claves-de-una-practica-cada-vez-mas-frecuente?hsCtaTracking=f67bdf14-8961-4794-b61f-4d4d81c5e1aa%7Cfeb7d995-5966-48ea-a56e-364b14dbd25f\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1324171480\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-139402761\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1749158352\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/la-cultura-digital-ciberseguridad.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/la-cultura-digital-ciberseguridad.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/la-cultura-digital-ciberseguridad-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1749158352 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-401066710\" class=\"text\">\n\t\t\n<p><strong>La cultura empresarial en ciberseguridad<\/strong><\/p>\n\t\t\n<style>\n#text-401066710 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-401066710 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1858717632\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-1858717632 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-850838340\">\n\n\t<div id=\"col-754385781\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-100573861\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/e-book-la-cultura-de-la-empresa-y-ciberseguridad?hsCtaTracking=d6b48620-b6cd-453c-a030-00b96f9f015f%7C23b52ebe-96c3-4576-b9bd-833927158944\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1397854659\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-197104404\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_426362695\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/enpoint.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/enpoint.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/enpoint-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_426362695 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3334572428\" class=\"text\">\n\t\t\n<p><strong>El endpoint es el nuevo per\u00edmetro<\/strong><\/p>\n\t\t\n<style>\n#text-3334572428 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-3334572428 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3702610146\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-3702610146 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1549005145\">\n\n\t<div id=\"col-1274681101\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-70551403\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/ebook-el-endpoint-es-el-nuevo-perimetro-desafios-y-oportunidades-para-lograr-un-entorno-seguro-desde-todos-los-accesos\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1845630805\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-589300787\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1903909308\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/seguridad-para-servidores.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/seguridad-para-servidores.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/seguridad-para-servidores-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1903909308 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1988067022\" class=\"text\">\n\t\t\n<p><strong>Seguridad para servidores<\/strong><\/p>\n\t\t\n<style>\n#text-1988067022 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-1988067022 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2237175787\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-2237175787 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-756930175\">\n\n\t<div id=\"col-993607227\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1691040907\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/ebook-seguridad-para-servidores-practicas-actuales-y-puntos-clave-a-tener-en-cuenta\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-2062582083\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1951832693\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1641127220\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/endpoint-es-el-nuevo-perimetro.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/endpoint-es-el-nuevo-perimetro.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/endpoint-es-el-nuevo-perimetro-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1641127220 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3564776308\" class=\"text\">\n\t\t\n<p><strong>\u00bfC\u00f3mo lograr la higiene de su seguridad inform\u00e1tica?<\/strong><\/p>\n\t\t\n<style>\n#text-3564776308 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-3564776308 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-577147017\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-577147017 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-695705847\">\n\n\t<div id=\"col-413219887\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1227378015\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/e-book-como-lograr-la-higiene-de-su-seguridad-informatica?hsCtaTracking=0ddfb3f9-67d0-4ac3-b486-ba558301a56b%7C725a7909-4b81-4b58-9ae7-7a3f1549c935\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1786480703\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1972847918\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1645410417\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/ciberresiliencia.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/ciberresiliencia.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/ciberresiliencia-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1645410417 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-1936633894\" class=\"text\">\n\t\t\n<p><strong>Ciberresiliencia: \u00bfC\u00f3mo prepararse para cuando la seguridad falle?<\/strong><\/p>\n\t\t\n<style>\n#text-1936633894 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-1936633894 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-3263689230\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-3263689230 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1565272309\">\n\n\t<div id=\"col-248136832\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1874450240\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/e-book-ciberresiliencia-como-prepararse-para-cuando-la-seguridad-falle\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1023661678\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-833011201\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_815108104\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/tendencia-buenas-practicas.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/tendencia-buenas-practicas.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/tendencia-buenas-practicas-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_815108104 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-134253237\" class=\"text\">\n\t\t\n<p><strong>Gu\u00eda de tendencias y buenas pr\u00e1cticas para abordar la seguridad en la nube<\/strong><\/p>\n\t\t\n<style>\n#text-134253237 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-134253237 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-2065801638\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-2065801638 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1237265270\">\n\n\t<div id=\"col-1749484937\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-597699577\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/e-book-guia-de-tendencias-y-buenas-practicas-para-abordar-la-seguridad-en-la-nube\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-382373450\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-2463346\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_1888375796\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"293\" src=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/gestion-de-parches.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/gestion-de-parches.jpg 377w, https:\/\/www.egs-latam.com\/recursos\/wp-content\/uploads\/2023\/05\/gestion-de-parches-300x233.jpg 300w\" sizes=\"auto, (max-width: 377px) 100vw, 377px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_1888375796 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-4069495157\" class=\"text\">\n\t\t\n<p><strong>Gesti\u00f3n de parches<\/strong><\/p>\n\t\t\n<style>\n#text-4069495157 {\n  line-height: 1.3;\n  text-align: center;\n  color: #353b43;\n}\n#text-4069495157 > * {\n  color: #353b43;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-296350028\" class=\"text\">\n\t\t\n<p>E-book<\/p>\n\t\t\n<style>\n#text-296350028 {\n  line-height: 0.75;\n  text-align: center;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row row-collapse\"  id=\"row-1043792020\">\n\n\t<div id=\"col-944897512\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1008273165\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<a href=\"https:\/\/ciberseguridad.egs-latam.com\/ebook-gestion-de-parches-una-estrategia-integral-y-sostenida-en-el-tiempo\" target=\"_self\" class=\"button primary expand\"  style=\"border-radius:10px;\">\n    <span>DESCARGAR<\/span>\n  <\/a>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1113499783\" class=\"col hide-for-medium medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n<div class=\"is-divider divider clearfix\" style=\"max-width:100%;\"><\/div>\n\t<div id=\"gap-676481471\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-676481471 {\n  padding-top: 45px;\n}\n<\/style>\n\t<\/div>\n\t\n\t<section class=\"section\" id=\"section_2116823217\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row\"  id=\"row-638866449\">\n\n\t<div id=\"col-624234674\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-893922204\" class=\"text\">\n\t\t\n<h3>SUSCR\u00cdBETE A NUESTRO NEWSLETTER<\/h3>\n\t\t\n<style>\n#text-893922204 {\n  font-size: 1.3rem;\n  text-align: center;\n  color: #eb1c24;\n}\n#text-893922204 > * {\n  color: #eb1c24;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style>\n#section_2116823217 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n}\n#section_2116823217 .ux-shape-divider--top svg {\n  height: 150px;\n  --divider-top-width: 100%;\n}\n#section_2116823217 .ux-shape-divider--bottom svg {\n  height: 150px;\n  --divider-width: 100%;\n}\n<\/style>\n\t<\/section>\n\t\n<div class=\"row align-center\"  id=\"row-240415722\">\n\n\t<div id=\"col-385737517\" class=\"col medium-3 small-12 large-3\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-793969758\" class=\"col medium-7 small-12 large-7\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script><br \/>\n<script><br \/>\n  hbspt.forms.create({<br \/>\n    region: \"na1\",<br \/>\n    portalId: \"20989385\",<br \/>\n    formId: \"1d48f62a-5023-478c-b265-3f4c56fd9835\"<br \/>\n  });<br \/>\n<\/script><\/p>\n\n<p><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"20989385\",\n    formId: \"ddf5e49e-3b01-4173-82fe-6e406eafaaca\"\n  });\n<\/script><br \/>\n\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-793969758 > .col-inner {\n  margin: -80px 0px 0px 0px;\n}\n<\/style>\n\t<\/div>\n\n\t\n\n\t<div id=\"col-1184572734\" class=\"col medium-2 small-12 large-2\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-blank.php","meta":{"content-type":"","footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>biblioteca - Biblioteca Ciberseguridad Egs Latam<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"biblioteca - Biblioteca Ciberseguridad Egs Latam\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.egs-latam.com\/recursos\/biblioteca\/\" \/>\n<meta property=\"og:site_name\" content=\"Biblioteca Ciberseguridad Egs Latam\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-29T23:00:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/biblioteca\\\/\",\"url\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/biblioteca\\\/\",\"name\":\"biblioteca - Biblioteca Ciberseguridad Egs Latam\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/#website\"},\"datePublished\":\"2023-05-10T23:13:54+00:00\",\"dateModified\":\"2025-06-29T23:00:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/biblioteca\\\/#breadcrumb\"},\"inLanguage\":\"es-CL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/biblioteca\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/biblioteca\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"biblioteca\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/#website\",\"url\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/\",\"name\":\"Biblioteca Ciberseguridad Egs Latam\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.egs-latam.com\\\/recursos\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"biblioteca - Biblioteca Ciberseguridad Egs Latam","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"biblioteca - Biblioteca Ciberseguridad Egs Latam","og_url":"https:\/\/www.egs-latam.com\/recursos\/biblioteca\/","og_site_name":"Biblioteca Ciberseguridad Egs Latam","article_modified_time":"2025-06-29T23:00:07+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.egs-latam.com\/recursos\/biblioteca\/","url":"https:\/\/www.egs-latam.com\/recursos\/biblioteca\/","name":"biblioteca - Biblioteca Ciberseguridad Egs Latam","isPartOf":{"@id":"https:\/\/www.egs-latam.com\/recursos\/#website"},"datePublished":"2023-05-10T23:13:54+00:00","dateModified":"2025-06-29T23:00:07+00:00","breadcrumb":{"@id":"https:\/\/www.egs-latam.com\/recursos\/biblioteca\/#breadcrumb"},"inLanguage":"es-CL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.egs-latam.com\/recursos\/biblioteca\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.egs-latam.com\/recursos\/biblioteca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.egs-latam.com\/recursos\/"},{"@type":"ListItem","position":2,"name":"biblioteca"}]},{"@type":"WebSite","@id":"https:\/\/www.egs-latam.com\/recursos\/#website","url":"https:\/\/www.egs-latam.com\/recursos\/","name":"Biblioteca Ciberseguridad Egs Latam","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.egs-latam.com\/recursos\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CL"}]}},"_links":{"self":[{"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":42,"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":267,"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/pages\/2\/revisions\/267"}],"wp:attachment":[{"href":"https:\/\/www.egs-latam.com\/recursos\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}