{"id":44,"date":"2024-06-25T13:36:01","date_gmt":"2024-06-25T11:36:01","guid":{"rendered":"https:\/\/dev.ukotek.com\/?page_id=44"},"modified":"2024-11-18T09:35:23","modified_gmt":"2024-11-18T08:35:23","slug":"normativa-regulacion-y-conformidad","status":"publish","type":"page","link":"https:\/\/ukotek.com\/en\/servicios\/normativa-regulacion-y-conformidad\/","title":{"rendered":"Standards, Regulation and Compliance"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"44\" class=\"elementor elementor-44\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-587d670 e-flex e-con-boxed e-con e-parent\" data-id=\"587d670\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ba0bb69 e-con-full e-flex e-con e-child\" data-id=\"ba0bb69\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34be890 elementor-widget elementor-widget-heading\" data-id=\"34be890\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Standards, regulation and compliance<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80d9964 elementor-widget elementor-widget-text-editor\" data-id=\"80d9964\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We are certified experts for obtaining certificates and compliance with regulations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7a709b elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"d7a709b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRequest a Consultation\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb80112 e-flex e-con-boxed e-con e-parent\" data-id=\"fb80112\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dd98647 e-con-full e-flex e-con e-child\" data-id=\"dd98647\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d3cecf elementor-widget elementor-widget-text-editor\" data-id=\"9d3cecf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We help our clients to implement best practices in cybersecurity, promoting the adoption of a Zero Trust strategy according to the frameworks promoted by the American National Institute of Standards and Technology (NIST). We advise you on how to obtain 27001 certification from the International Organization for Standardization (ISO) and compliance with European and International Regulations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b37647f e-flex e-con-boxed e-con e-parent\" data-id=\"b37647f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-af198d2 e-con-full e-flex e-con e-child\" data-id=\"af198d2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07b2ce3 elementor-widget elementor-widget-image\" data-id=\"07b2ce3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg\" class=\"attachment-large size-large wp-image-497\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-300x300.jpg 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-150x150.jpg 150w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-768x768.jpg 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1536x1536.jpg 1536w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944.jpg 1792w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d82ce2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3d82ce2\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3273bc5 e-con-full e-flex e-con e-child\" data-id=\"3273bc5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-506d524 elementor-widget elementor-widget-text-editor\" data-id=\"506d524\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our team of auditors and consultants has extensive experience in the implementation of ENS, DORA, NIS2 and ISO 27001.<\/p><p>All of them have the accreditations - CCN_CERT\/ENS, CISA, ISO\/IEC 27001:2013 - that allow us to accompany your company in the certification process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b998fb e-flex e-con-boxed e-con e-parent\" data-id=\"0b998fb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ba3bd6b e-con-full e-flex e-con e-child\" data-id=\"ba3bd6b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b9d5c7 elementor-widget elementor-widget-heading\" data-id=\"8b9d5c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">ENS and NIS2 compliance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cd54a9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0cd54a9\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0189c8a elementor-widget elementor-widget-text-editor\" data-id=\"0189c8a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We implement the National Security Scheme (ENS) and NIS2 and accompany our clients in the certification process and subsequent advice.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3adac6 elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"c3adac6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"#ENS\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRead more\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4286733 e-con-full e-flex e-con e-child\" data-id=\"4286733\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c74a83 elementor-widget elementor-widget-heading\" data-id=\"6c74a83\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Certified audit team<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e906fc3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e906fc3\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a3ec34 elementor-widget elementor-widget-text-editor\" data-id=\"8a3ec34\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We have an expert team of auditors with the following international certifications:<\/p><ul><li>ISO 27001 Auditors<\/li><li>Certified Information Security Officer (CISA)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a282297 elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"a282297\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"#ORIENTACION\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRead more\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d0052f e-con-full e-flex e-con e-child\" data-id=\"8d0052f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c03ead2 elementor-widget elementor-widget-heading\" data-id=\"c03ead2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">PCI DSS 4.0 compliance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4765fc1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4765fc1\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d7623d elementor-widget elementor-widget-text-editor\" data-id=\"6d7623d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We offer a managed service to provide full visibility of the risks associated with third parties. If you sell services through your website, you will be able to respond to the new PCI DSS 4.0 requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f12ae0 elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"2f12ae0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/ukotek.com\/en\/soluciones\/conformidad-pci\/\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRead more\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c043648 e-flex e-con-boxed e-con e-parent\" data-id=\"c043648\" data-element_type=\"container\" id=\"ENS\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-974d4a6 elementor-widget elementor-widget-spacer\" data-id=\"974d4a6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cfc4a0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cfc4a0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c69fedf e-con-full e-flex e-con e-child\" data-id=\"c69fedf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6cffbbd elementor-widget elementor-widget-text-editor\" data-id=\"6cffbbd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><span style=\"color: #0db02b;\">ENS<\/span>\u00a0- National Security Scheme<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e4a116 e-flex e-con-boxed e-con e-parent\" data-id=\"9e4a116\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d4dbf5 e-con-full e-flex e-con e-child\" data-id=\"5d4dbf5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d128002 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"d128002\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFor whom?\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThe ENS establishes the minimum cybersecurity requirements to be met by public sector entities, their technology providers, and companies wishing to align themselves with the high security standards demanded by the Public Administration in the protection of their systems and data.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3241d57 e-con-full e-flex e-con e-child\" data-id=\"3241d57\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4624411 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"4624411\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWhat for?\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIt aims to ensure the confidentiality, integrity, availability and traceability of data and services, reducing the risks of cyber-attacks and other digital threats.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e29a2d e-flex e-con-boxed e-con e-parent\" data-id=\"2e29a2d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-50ffa3e e-con-full e-flex e-con e-child\" data-id=\"50ffa3e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea6c89f elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"ea6c89f\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tHow?\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTo comply with the ENS, organisations must conduct an initial assessment to determine their level of security, implement appropriate measures, and conduct regular audits and reviews to ensure ongoing compliance. This process not only improves security, but also builds trust in public services.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c4a09e elementor-hidden-mobile elementor-invisible elementor-widget elementor-widget-image\" data-id=\"0c4a09e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"10738\" height=\"1922\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK.png\" class=\"attachment-full size-full wp-image-1925\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK.png 2000w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-300x57.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-1024x194.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-768x146.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-1536x291.png 1536w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-18x3.png 18w\" sizes=\"(max-width: 10738px) 100vw, 10738px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6632133 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"6632133\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1797\" height=\"1017\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-1.png\" class=\"attachment-full size-full wp-image-1666\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-1.png 1804w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-1-300x169.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-1-1024x577.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-1-768x433.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-1-1536x866.png 1536w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-1-18x10.png 18w\" sizes=\"(max-width: 1797px) 100vw, 1797px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91c77d5 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"91c77d5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1782\" height=\"1017\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/EN6-PASOS-UKOTEK-MOV-2.png\" class=\"attachment-full size-full wp-image-1667\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/EN6-PASOS-UKOTEK-MOV-2.png 1804w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/EN6-PASOS-UKOTEK-MOV-2-300x169.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/EN6-PASOS-UKOTEK-MOV-2-1024x577.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/EN6-PASOS-UKOTEK-MOV-2-768x433.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/EN6-PASOS-UKOTEK-MOV-2-1536x866.png 1536w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/EN6-PASOS-UKOTEK-MOV-2-18x10.png 18w\" sizes=\"(max-width: 1782px) 100vw, 1782px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4680bd elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"c4680bd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1804\" height=\"1017\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-3.png\" class=\"attachment-full size-full wp-image-1928\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-3.png 1804w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-3-300x169.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-3-1024x577.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-3-768x433.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-3-1536x866.png 1536w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/en6-PASOS-UKOTEK-MOV-3-18x10.png 18w\" sizes=\"(max-width: 1804px) 100vw, 1804px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34928a7 e-flex e-con-boxed e-con e-parent\" data-id=\"34928a7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1590475 e-con-full e-flex e-con e-child\" data-id=\"1590475\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5bfdf25 elementor-widget elementor-widget-heading\" data-id=\"5bfdf25\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Need help?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3000a0c elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"3000a0c\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_2\" data-name=\"Capa 2\" viewbox=\"0 0 375.22 500.15\"><defs><style>      .cls-1 {        fill-rule: evenodd;      }      .cls-1, .cls-2 {        fill: #fff;        stroke-width: 0px;      }    <\/style><\/defs><g id=\"Capa_1-2\" data-name=\"Capa 1\"><g><path class=\"cls-1\" d=\"M54.39,450.05c0-5.82,5.26-10.54,11.75-10.54h243.34c6.49,0,11.74,4.72,11.74,10.54v39.55c0,5.83-5.26,10.55-11.74,10.55H66.14c-6.49,0-11.75-4.72-11.75-10.55v-39.55Z\"><\/path><path class=\"cls-2\" d=\"M374.58,203.44c-7.52,98.46-94.41,177.2-201.42,170.03-71.24-4.83-125.06-48.72-152.59-102.13C6.6,244.3-1.99,209.35.4,174.73c2.33-34.37,16.34-66.43,28.7-86.3,12.55-20.16,31.28-42.36,56.09-58.9C108.62,13.85,138.67,3.54,174.39.61c54.24-4.45,105.01,16.04,138.35,46.14,35.58,32.17,67.43,83.18,61.85,156.69ZM311.44,171.12c-1.97-19.47-12.38-43.69-22.42-57.29-21.75-29.42-60.71-55.96-119.27-48.79-39.1,4.8-71.71,29.17-88.69,57.43-7.41,12.4-17.68,43.44-17.53,65.14.32,39.94,15.38,62.91,33.81,82.52,21.49,22.8,43.66,37.24,77.44,40.18,73.26,6.41,146.04-48.57,136.65-139.19h0Z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOur certified auditors ensure compliance with the National Security Scheme (ENS), providing expert advice and certification to protect your organisation.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e6f45e elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"0e6f45e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRequest a Consultation\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40c907d e-flex e-con-boxed e-con e-parent\" data-id=\"40c907d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b6bf52a e-con-full e-flex e-con e-child\" data-id=\"b6bf52a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af7674b elementor-widget elementor-widget-text-editor\" data-id=\"af7674b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><span style=\"color: #0db02b;\">NIS2<\/span> - Network and Information Systems Security Directive<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e73ac46 e-flex e-con-boxed e-con e-parent\" data-id=\"e73ac46\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9a045a1 e-con-full e-flex e-con e-child\" data-id=\"9a045a1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f382aa elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"1f382aa\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFor whom?\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThe NIS2 Directive focuses on public and private entities in critical sectors such as energy, health, banking, and essential digital services, as well as medium and large enterprises, to strengthen cybersecurity and incident response in the European Union.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6160248 e-con-full e-flex e-con e-child\" data-id=\"6160248\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-505744a elementor-invisible elementor-widget elementor-widget-image\" data-id=\"505744a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"895\" height=\"539\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/ennis2-2.jpg\" class=\"attachment-full size-full wp-image-1212\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/ennis2-2.jpg 895w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/ennis2-2-300x181.jpg 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/ennis2-2-768x463.jpg 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/02\/ennis2-2-18x12.jpg 18w\" sizes=\"(max-width: 895px) 100vw, 895px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d50efb e-flex e-con-boxed e-con e-parent\" data-id=\"4d50efb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4b28c6c e-con-full e-flex e-con e-child\" data-id=\"4b28c6c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d560f24 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"d560f24\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWhat for?\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIt aims to improve cyber security and information systems in the European Union. It seeks to ensure a high common level of cyber security, strengthen the resilience of critical infrastructures and reduce the vulnerability of these systems to cyber attacks.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa755f0 e-con-full e-flex e-con e-child\" data-id=\"aa755f0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63ac48c elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"63ac48c\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tHow?\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tKey requirements of NIS2 include risk management, incident reporting and the implementation of technical and organisational security measures. Organisations must identify their critical assets, implement adequate security controls and maintain continuous monitoring to detect and respond to incidents.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b9b1ee5 e-flex e-con-boxed e-con e-parent\" data-id=\"b9b1ee5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-214b0be e-con-full e-flex e-con e-child\" data-id=\"214b0be\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bfd976 elementor-widget elementor-widget-heading\" data-id=\"2bfd976\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Do you want to start your certification process now?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0731441 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"0731441\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_2\" data-name=\"Capa 2\" viewbox=\"0 0 375.22 500.15\"><defs><style>      .cls-1 {        fill-rule: evenodd;      }      .cls-1, .cls-2 {        fill: #fff;        stroke-width: 0px;      }    <\/style><\/defs><g id=\"Capa_1-2\" data-name=\"Capa 1\"><g><path class=\"cls-1\" d=\"M54.39,450.05c0-5.82,5.26-10.54,11.75-10.54h243.34c6.49,0,11.74,4.72,11.74,10.54v39.55c0,5.83-5.26,10.55-11.74,10.55H66.14c-6.49,0-11.75-4.72-11.75-10.55v-39.55Z\"><\/path><path class=\"cls-2\" d=\"M374.58,203.44c-7.52,98.46-94.41,177.2-201.42,170.03-71.24-4.83-125.06-48.72-152.59-102.13C6.6,244.3-1.99,209.35.4,174.73c2.33-34.37,16.34-66.43,28.7-86.3,12.55-20.16,31.28-42.36,56.09-58.9C108.62,13.85,138.67,3.54,174.39.61c54.24-4.45,105.01,16.04,138.35,46.14,35.58,32.17,67.43,83.18,61.85,156.69ZM311.44,171.12c-1.97-19.47-12.38-43.69-22.42-57.29-21.75-29.42-60.71-55.96-119.27-48.79-39.1,4.8-71.71,29.17-88.69,57.43-7.41,12.4-17.68,43.44-17.53,65.14.32,39.94,15.38,62.91,33.81,82.52,21.49,22.8,43.66,37.24,77.44,40.18,73.26,6.41,146.04-48.57,136.65-139.19h0Z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTrust our certified auditors to comply with the NIS2 Directive, offering you expert advice and certification to improve the cyber security of your infrastructure.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0728485 elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"0728485\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRequest a Consultation\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eeae396 e-flex e-con-boxed e-con e-parent\" data-id=\"eeae396\" data-element_type=\"container\" id=\"ORIENTACION\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e75921 elementor-widget elementor-widget-spacer\" data-id=\"2e75921\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b8ebcfa e-flex e-con-boxed e-con e-parent\" data-id=\"b8ebcfa\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ffe99d0 e-con-full e-flex e-con e-child\" data-id=\"ffe99d0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37855d1 elementor-widget elementor-widget-text-editor\" data-id=\"37855d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>Cybersecurity Framework Guidance: <span style=\"color: #0db02b;\">ISO 27001 and NIST<\/span><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3550cea elementor-widget elementor-widget-text-editor\" data-id=\"3550cea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity frameworks such as ISO 27001 and NIST provide essential guidelines to help organisations comply with security regulations.<\/p><p><strong><span style=\"color: #0db02b;\">ISO 27001<\/span> <\/strong>focuses on information security management through a comprehensive management system.<\/p><p><strong><span style=\"color: #0db02b;\"> NIST<\/span> <\/strong>provides technical and organisational guidelines to improve cyber security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28a0105 elementor-widget elementor-widget-text-editor\" data-id=\"28a0105\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Implementing these frameworks involves establishing clear security policies, conducting regular risk assessments and adopting appropriate security measures. These frameworks not only help to comply with ENS and NIS2, but also strengthen the organisation's overall cybersecurity posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4687400 e-con-full e-flex e-con e-child\" data-id=\"4687400\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74e0c03 elementor-hidden-mobile premium-table-dir-ltr elementor-widget elementor-widget-premium-tables-addon\" data-id=\"74e0c03\" data-element_type=\"widget\" data-settings=\"{&quot;premium_table_responsive&quot;:&quot;yes&quot;}\" data-widget_type=\"premium-tables-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-table-wrap premium-table-responsive\">\r\n\t\t\t\r\n\t\t\t<table class=\"premium-table\" data-settings=\"{&quot;sort&quot;:false,&quot;usNumbers&quot;:false,&quot;sortMob&quot;:false,&quot;search&quot;:false,&quot;records&quot;:false,&quot;dataType&quot;:&quot;custom&quot;,&quot;csvFile&quot;:null,&quot;firstRow&quot;:null,&quot;separator&quot;:null,&quot;pagination&quot;:&quot;&quot;,&quot;rows&quot;:0}\" >\r\n\r\n\t\t\t\r\n\t\t<thead class=\"premium-table-head\">\r\n\r\n\t\t\t<tr class=\"premium-table-row\">\r\n\r\n\t\t\t\t<th class=\"premium-table-cell elementor-repeater-item-b7e5c7c\"><span class=\"premium-table-text\"><\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-5971cf3\"><span class=\"premium-table-text\">NIST<\/span><\/th><th class=\"premium-table-cell elementor-repeater-item-7165c93\"><span class=\"premium-table-text\">ISO 27001<\/span><\/th>\r\n\t\t\t<\/tr>\r\n\r\n\t\t<\/thead>\r\n\r\n\t\t\t\t<tbody class=\"premium-table-body\">\r\n\t\t\t\t\t\t<tr class=\"premium-table-row elementor-repeater-item-e568339\"><td class=\"premium-table-cell elementor-repeater-item-3bb4875\"><span class=\"premium-table-text\">PURPOSE<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-f9d1f44\"><span class=\"premium-table-text\">Designed as a guide<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-2d9bb3d\"><span class=\"premium-table-text\">Designed as a compliance standard<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-d027fa0\"><td class=\"premium-table-cell elementor-repeater-item-5fa8314\"><span class=\"premium-table-text\">COMPLIANCE PROCESS<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-a976fc4\"><span class=\"premium-table-text\">No certification required, serves as a guide to<br> establishing cybersecurity<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-dbf9cc5\"><span class=\"premium-table-text\">Requires a formal audit resulting in certification<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-77aff6f\"><td class=\"premium-table-cell elementor-repeater-item-3235221\"><span class=\"premium-table-text\">MATURITY<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-ab6027d\"><span class=\"premium-table-text\">Used in the early stages of a company's security process<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-875ba83\"><span class=\"premium-table-text\">Used by organisations with more mature security and advanced risk management<\/span><\/td><\/tr><tr class=\"premium-table-row elementor-repeater-item-bae22b2\"><td class=\"premium-table-cell elementor-repeater-item-c00133f\"><span class=\"premium-table-text\">COSTS<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-109ffad\"><span class=\"premium-table-text\">Free download and application<\/span><\/td><td class=\"premium-table-cell elementor-repeater-item-fddb765\"><span class=\"premium-table-text\">Requires the purchase of the standard and the hiring of an auditor.<\/span><\/td>\t\t\t<\/tr>\r\n\t\t<\/tbody>\r\n\r\n\t\t\r\n\t\t\t<\/table>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c87053 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"5c87053\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"808\" height=\"1238\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/tabla.jpg\" class=\"attachment-full size-full wp-image-1631\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/tabla.jpg 808w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/tabla-196x300.jpg 196w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/tabla-668x1024.jpg 668w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/tabla-768x1177.jpg 768w\" sizes=\"(max-width: 808px) 100vw, 808px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a9f99c e-con-full e-flex e-con e-child\" data-id=\"5a9f99c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8eab252 elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"8eab252\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tContact an Auditor\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2564def e-flex e-con-boxed e-con e-parent\" data-id=\"2564def\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-27ef7ee e-con-full e-flex e-con e-child\" data-id=\"27ef7ee\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac070dd elementor-widget elementor-widget-text-editor\" data-id=\"ac070dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>Security Strategy <span style=\"color: #0db02b;\">Zero Trust<\/span><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f0e641 elementor-widget elementor-widget-text-editor\" data-id=\"4f0e641\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Zero Trust security strategy is based on the premise that nothing, inside or outside the network, should be trusted without continuous verification. The core principles of Zero Trust include constant verification of users and devices and risk-based access control.<\/p><p>To implement a Zero Trust strategy, organisations must conduct a risk assessment, segment their network to limit access and continuously monitor all activities. This strategy is essential to protect data in an environment where threats can emerge both internally and externally.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b150fc e-flex e-con-boxed e-con e-parent\" data-id=\"2b150fc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2e4b2b elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c2e4b2b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A team of expert auditors and consultants at your service<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ee2bce elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"9ee2bce\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-lg premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRequest a Consultation\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Normativa, regulaci\u00f3n y conformidad Somos expertos certificados para la obtenci\u00f3n de certificados y cumplimento de normativas Solicitar una Consulta Ayudamos a nuestros clientes a implementar las mejores pr\u00e1cticas en ciberseguridad, promoviendo la adopci\u00f3n de una estrategia Zero Trust seg\u00fan los marcos de trabajo promovidos por el Instituto Nacional de Est\u00e1ndares y Tecnolog\u00eda Americano (NIST). Te [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":698,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Normativa, Regulaci\u00f3n y Conformidad - Ukotek<\/title>\n<meta name=\"description\" content=\"Ukotek ofrece servicios de normativa, regulaci\u00f3n y conformidad para empresas. UKOTEK asesora en la implementaci\u00f3n de pr\u00e1cticas de ciberseguridad y estrategias Zero Trust seg\u00fan NIST, adem\u00e1s de la certificaci\u00f3n ISO 27001 y el cumplimiento de normativas internacionales.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/en\/servicios\/normativa-regulacion-y-conformidad\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Normativa, Regulaci\u00f3n y Conformidad - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Ukotek ofrece servicios de normativa, regulaci\u00f3n y conformidad para empresas. UKOTEK asesora en la implementaci\u00f3n de pr\u00e1cticas de ciberseguridad y estrategias Zero Trust seg\u00fan NIST, adem\u00e1s de la certificaci\u00f3n ISO 27001 y el cumplimiento de normativas internacionales.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/en\/servicios\/normativa-regulacion-y-conformidad\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-18T08:35:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/\",\"url\":\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/\",\"name\":\"Normativa, Regulaci\u00f3n y Conformidad - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg\",\"datePublished\":\"2024-06-25T11:36:01+00:00\",\"dateModified\":\"2024-11-18T08:35:23+00:00\",\"description\":\"Ukotek ofrece servicios de normativa, regulaci\u00f3n y conformidad para empresas. UKOTEK asesora en la implementaci\u00f3n de pr\u00e1cticas de ciberseguridad y estrategias Zero Trust seg\u00fan NIST, adem\u00e1s de la certificaci\u00f3n ISO 27001 y el cumplimiento de normativas internacionales.\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Servicios\",\"item\":\"https:\/\/ukotek.com\/servicios\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Normativa, Regulaci\u00f3n y Conformidad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Normativa, Regulaci\u00f3n y Conformidad - Ukotek","description":"Ukotek ofrece servicios de normativa, regulaci\u00f3n y conformidad para empresas. UKOTEK asesora en la implementaci\u00f3n de pr\u00e1cticas de ciberseguridad y estrategias Zero Trust seg\u00fan NIST, adem\u00e1s de la certificaci\u00f3n ISO 27001 y el cumplimiento de normativas internacionales.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/en\/servicios\/normativa-regulacion-y-conformidad\/","og_locale":"en_GB","og_type":"article","og_title":"Normativa, Regulaci\u00f3n y Conformidad - Ukotek","og_description":"Ukotek ofrece servicios de normativa, regulaci\u00f3n y conformidad para empresas. UKOTEK asesora en la implementaci\u00f3n de pr\u00e1cticas de ciberseguridad y estrategias Zero Trust seg\u00fan NIST, adem\u00e1s de la certificaci\u00f3n ISO 27001 y el cumplimiento de normativas internacionales.","og_url":"https:\/\/ukotek.com\/en\/servicios\/normativa-regulacion-y-conformidad\/","og_site_name":"Ukotek","article_modified_time":"2024-11-18T08:35:23+00:00","og_image":[{"width":1792,"height":1792,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/","url":"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/","name":"Normativa, Regulaci\u00f3n y Conformidad - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg","datePublished":"2024-06-25T11:36:01+00:00","dateModified":"2024-11-18T08:35:23+00:00","description":"Ukotek ofrece servicios de normativa, regulaci\u00f3n y conformidad para empresas. UKOTEK asesora en la implementaci\u00f3n de pr\u00e1cticas de ciberseguridad y estrategias Zero Trust seg\u00fan NIST, adem\u00e1s de la certificaci\u00f3n ISO 27001 y el cumplimiento de normativas internacionales.","breadcrumb":{"@id":"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/standard-quality-control-collage-3-scaled-e1719558038944-1024x1024.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/servicios\/normativa-regulacion-y-conformidad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Servicios","item":"https:\/\/ukotek.com\/servicios\/"},{"@type":"ListItem","position":3,"name":"Normativa, Regulaci\u00f3n y Conformidad"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":191,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":2584,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/44\/revisions\/2584"}],"up":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/698"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}