{"id":73245,"date":"2022-12-07T10:29:22","date_gmt":"2022-12-07T09:29:22","guid":{"rendered":"https:\/\/eiposgrados.com\/?post_type=evento&#038;p=73245"},"modified":"2023-09-13T15:44:28","modified_gmt":"2023-09-13T13:44:28","slug":"what-is-it-like-to-work-in-cybersecurity-roles-and-functions-2","status":"publish","type":"evento","link":"https:\/\/eiposgrados.com\/eng\/events\/what-is-it-like-to-work-in-cybersecurity-roles-and-functions-2\/","title":{"rendered":"What is it like to work in cybersecurity? Roles and functions"},"content":{"rendered":"<div class=\"gb-container gb-container-ed3d7933\" id=\"Descripci\u00f3n\">\n\n<h2 class=\"gb-headline gb-headline-a9e1ab3c gb-headline-text alturaLinea\"><strong>Description of <span style=\"background-image: linear-gradient(195deg,#f1c434,#fff06b);background-repeat: no-repeat;background-position: 9px bottom;background-size: 100% 17px;border-radius: 110px;\"><strong><strong>EIP Talks<\/strong>:<\/strong><\/span><\/strong><\/h2>\n\n\n\n<p>It is increasingly common to see on business cards some acronyms such as CISO, CIO, CSO, CTO, CEO. Sometimes it is easy to get lost among so many acronyms. They mostly refer to managerial positions. But, what responsibilities does each of these acronyms entail? In this talk we will talk about what functions each of these roles performs.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-8e34316e\" id=\"Bot\u00f3n\">\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Cybersecurity EIP talks 09_02_23\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/In-NosJfNvU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9c69f0b4\" id=\"Imagen\">\n<figure class=\"gb-block-image gb-block-image-5ba5a10e\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1281\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1.jpg\" class=\"gb-image-5ba5a10e\" alt=\"Rear View Of Programmer Working All Night Long (1)\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1.jpg 1920w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1-300x200.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1-1024x683.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1-768x512.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1-247x165.jpg 247w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1-123x82.jpg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1-1536x1025.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2022\/12\/rear-view-of-programmer-working-all-night-long-1-200x133.jpg 200w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" title=\"\"><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>COMPUTACI\u00d3N\u00a0CU\u00c1NTICA: superposici\u00f3n y enredo para paralelismo masivo, aplicado a la factorizaci\u00f3n y a la b\u00fasqueda en listas ordenadas<br \/>\nDISTRIBUCI\u00d3N CU\u00c1NTICA DE CLAVES (QKD): comunicaci\u00f3n cu\u00e1ntica aplicada a la distribuci\u00f3n de claves aleatorias<br \/>\nCRIPTOGRAF\u00cdA POST-CU\u00c1NTICA (PQC): algoritmos de criptograf\u00eda cl\u00e1sica resistentes a los ordenadores cu\u00e1nticos basados en hashes, c\u00f3digos y celos\u00edas<\/p>","protected":false},"featured_media":73247,"template":"","area_evento":[1079],"class_list":["post-73245","evento","type-evento","status-publish","has-post-thumbnail","hentry","area_evento-ciberseguridad-y-programacion-python"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/73245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/evento"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/73245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/73247"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=73245"}],"wp:term":[{"taxonomy":"area_evento","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/area_evento?post=73245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}