{"id":3090,"date":"2025-03-12T16:15:01","date_gmt":"2025-03-12T15:15:01","guid":{"rendered":"https:\/\/ukotek.com\/?p=3090"},"modified":"2025-03-24T11:29:43","modified_gmt":"2025-03-24T10:29:43","slug":"ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna","status":"publish","type":"post","link":"https:\/\/ukotek.com\/it\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/","title":{"rendered":"Ukotek alla RootedCON 2025: Comunicazione e strategia nella moderna cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3090\" class=\"elementor elementor-3090\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f29d5f3 e-flex e-con-boxed e-con e-parent\" data-id=\"f29d5f3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8230d97 elementor-widget elementor-widget-text-editor\" data-id=\"8230d97\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">La recente edizione di <a href=\"https:\/\/www.rootedcon.com\/\" target=\"_blank\" rel=\"noopener\">RootedCON<\/a>tenutosi dal 6 all'8 marzo 2025 a Madrid, ha riunito esperti di cybersecurity per condividere le conoscenze e discutere le tendenze attuali del settore. In questa occasione, Ukotek, in collaborazione con lo sponsor <a href=\"https:\/\/ukotek.com\/it\/soluciones\/gestion-de-exposicion-al-riesgo\/\">Sicurezza Picus<\/a>ha avuto una partecipazione straordinaria all'evento.<\/p><p class=\"p1\">Durante il congresso, Alejandro de Bri\u00f1as, CEO di Ukotek, ha moderato la tavola rotonda intitolata <strong>\"I CISO come divulgatori<\/strong>. A questa sessione hanno partecipato importanti CISO: Daniel Puente P\u00e9rez, Enrique Cervantes Mora, Rub\u00e9n F. e David Gonz\u00e1lez Gonz\u00e1lez.<\/p><p class=\"p1\">La discussione si \u00e8 concentrata sull'importanza di una comunicazione efficace nella moderna gestione della sicurezza informatica. Gli argomenti trattati comprendono<\/p><ul><li class=\"p1\">adattare i messaggi ai diversi tipi di pubblico<\/li><li class=\"p1\">la preparazione di piani di comunicazione di crisi<\/li><li class=\"p1\">equilibrio etico nella divulgazione delle vulnerabilit\u00e0.<\/li><\/ul><p>Uno dei punti evidenziati \u00e8 la necessit\u00e0 di sensibilizzare tutti i livelli dell'organizzazione sull'importanza della sicurezza digitale.<\/p><p class=\"p1\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb569ce e-flex e-con-boxed e-con e-parent\" data-id=\"fb569ce\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cedacab e-con-full e-flex e-con e-child\" data-id=\"cedacab\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-090342c elementor-widget__width-auto elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"090342c\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carosello di immagini\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 di 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/RootedCON-2025-Ukotek-Picus-Security-1-1024x576.jpeg\" alt=\"RootedCON 2025 Ukotek Picus Security 1\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 di 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/RootedCON-2025-Ukotek-Picus-Security-2-1024x576.jpeg\" alt=\"RootedCON 2025 Ukotek Picus Security 2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 di 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/RootedCON-2025-Ukotek-Picus-Security-3-1024x768.jpeg\" alt=\"RootedCON 2025 Ukotek Picus Security 3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 di 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/RootedCON-2025-Ukotek-Picus-Security-4-1024x768.jpeg\" alt=\"RootedCON 2025 Ukotek Picus Security 4\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 di 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/RootedCON-2025-Ukotek-Picus-Security-5-e1741884889750-1024x885.jpeg\" alt=\"RootedCON 2025 Ukotek Picus Security 5\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30513e6 elementor-widget elementor-widget-text-editor\" data-id=\"30513e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Durante la RootedCON 2025 sono state affrontate alcune delle sfide pi\u00f9 rilevanti della cybersecurity.<\/p><p class=\"p1\">Uno dei messaggi pi\u00f9 sorprendenti \u00e8 stato il modo in cui<strong> il limite dell'attaccante \u00e8 la sua creativit\u00e0, con strumenti sempre pi\u00f9 accessibili.<\/strong> per portare a termine gli attacchi.<\/p><p class=\"p1\">\u00c8 stata evidenziata anche l'ascesa del <strong>Il crimine come servizio (CaaS)<\/strong> e la scalabilit\u00e0 dei gruppi APT, che moltiplica il rischio per le aziende, soprattutto per le PMI all'interno della catena di fornitura.<\/p><p class=\"p1\">Inoltre, il <strong>L'intelligenza artificiale \u00e8 un'arma a doppio taglio, utilizzata sia per migliorare la difesa che per potenziare gli attacchi.<\/strong>.<\/p><p class=\"p1\">Infine, \u00e8 stato sottolineato che l'ignoranza non esime dal rischio, sottolineando l'importanza della consapevolezza e della preparazione alle minacce digitali.<\/p><p class=\"p1\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>La recente edizione di RootedCON, tenutasi dal 6 all'8 marzo 2025 a Madrid, ha riunito esperti di cybersecurity per condividere le conoscenze e discutere le tendenze attuali del settore. In questa occasione, Ukotek, in collaborazione con il suo sponsor Picus Security, ha svolto un ruolo di primo piano nell'evento. Durante il congresso, Alejandro de [...]<\/p>","protected":false},"author":1,"featured_media":3091,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[11],"tags":[16,18,30],"class_list":["post-3090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eventos","tag-ciberseguridad","tag-picus-security","tag-rootedcon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna - Ukotek<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/it\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna - Ukotek\" \/>\n<meta property=\"og:description\" content=\"La reciente edici\u00f3n de RootedCON, celebrada del 6 al 8 de marzo de 2025 en Madrid, reuni\u00f3 a expertos en ciberseguridad para compartir conocimientos y debatir sobre las tendencias actuales del sector. En esta ocasi\u00f3n, Ukotek, en colaboraci\u00f3n con su patrocinador Picus Security, tuvo una destacada participaci\u00f3n en el evento. Durante el congreso, Alejandro de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/it\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-12T15:15:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T10:29:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"arquitecto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"arquitecto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/\"},\"author\":{\"name\":\"arquitecto\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\"},\"headline\":\"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna\",\"datePublished\":\"2025-03-12T15:15:01+00:00\",\"dateModified\":\"2025-03-24T10:29:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/\"},\"wordCount\":314,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg\",\"keywords\":[\"ciberseguridad\",\"picus security\",\"RootedCon\"],\"articleSection\":[\"EVENTOS\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/\",\"url\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/\",\"name\":\"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg\",\"datePublished\":\"2025-03-12T15:15:01+00:00\",\"dateModified\":\"2025-03-24T10:29:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\",\"name\":\"arquitecto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"caption\":\"arquitecto\"},\"sameAs\":[\"http:\/\/10.0.1.6\"],\"url\":\"https:\/\/ukotek.com\/it\/author\/arquitecto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna - Ukotek","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/it\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/","og_locale":"it_IT","og_type":"article","og_title":"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna - Ukotek","og_description":"La reciente edici\u00f3n de RootedCON, celebrada del 6 al 8 de marzo de 2025 en Madrid, reuni\u00f3 a expertos en ciberseguridad para compartir conocimientos y debatir sobre las tendencias actuales del sector. En esta ocasi\u00f3n, Ukotek, en colaboraci\u00f3n con su patrocinador Picus Security, tuvo una destacada participaci\u00f3n en el evento. Durante el congreso, Alejandro de [&hellip;]","og_url":"https:\/\/ukotek.com\/it\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/","og_site_name":"Ukotek","article_published_time":"2025-03-12T15:15:01+00:00","article_modified_time":"2025-03-24T10:29:43+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg","type":"image\/jpeg"}],"author":"arquitecto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"arquitecto","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#article","isPartOf":{"@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/"},"author":{"name":"arquitecto","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46"},"headline":"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna","datePublished":"2025-03-12T15:15:01+00:00","dateModified":"2025-03-24T10:29:43+00:00","mainEntityOfPage":{"@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/"},"wordCount":314,"commentCount":0,"publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"image":{"@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg","keywords":["ciberseguridad","picus security","RootedCon"],"articleSection":["EVENTOS"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/","url":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/","name":"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg","datePublished":"2025-03-12T15:15:01+00:00","dateModified":"2025-03-24T10:29:43+00:00","breadcrumb":{"@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/1741475469826.jpeg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/ukotek-en-rootedcon-2025-comunicacion-y-estrategia-en-la-ciberseguridad-moderna\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Ukotek en RootedCON 2025: Comunicaci\u00f3n y Estrategia en la Ciberseguridad Moderna"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46","name":"arquitecto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","caption":"arquitecto"},"sameAs":["http:\/\/10.0.1.6"],"url":"https:\/\/ukotek.com\/it\/author\/arquitecto\/"}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/3090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/comments?post=3090"}],"version-history":[{"count":16,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/3090\/revisions"}],"predecessor-version":[{"id":3176,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/3090\/revisions\/3176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media\/3091"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media?parent=3090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/categories?post=3090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/tags?post=3090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}