{"id":11666,"date":"2019-03-28T14:17:07","date_gmt":"2019-03-28T14:17:07","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=11666"},"modified":"2019-03-28T14:17:07","modified_gmt":"2019-03-28T14:17:07","slug":"three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/","title":{"rendered":"Three and a Half Days of Training on How to Manage Cybersecurity Incidents"},"content":{"rendered":"<p>Together with Universidad Veracruzana de Mexico, the Mexican National Association of Universities and Higher Education Institutions and NIC Mexico, LACNIC WARP trained approximately forty Mexican professionals on how to handle computer security incidents and the creation of centers for managing and mitigating cybersecurity attacks.<\/p>\n<p>Over the course of three and a half days, LACNIC WARP experts led a workshop on the creation of security incident response teams in the city of Veracruz. The purpose of the activity was to promote information security specialists and encourage the dissemination of strategies for the development of collaborative networks for dealing with cybersecurity issues.&nbsp;<\/p>\n<p>As part of the workshop&#8217;s opening remarks, LACNIC CEO Oscar Robles stressed the importance of creating appropriate capabilities to respond to cybersecurity incidents, with special emphasis on how academia can contribute by deploying the IPv6 protocol. \u201cIPv6 contributes to the traceability of online transactions, which in turn helps increase security,\u201d noted Robles.<\/p>\n<p>Graciela Mart\u00ednez, head of LACNIC WARP and the instructor responsible for the workshop, highlighted participants\u2019 diversity (representatives of academia, public institutions, private companies, the technical community) and observed that this diversity had been reflected in the working groups that were created for the training activity.<\/p>\n<p>The workshop alternated theory and practical activities with the basics of creating a CSIRT and managing security incidents, and the different teams had to respond to simulated potential attack scenarios. \u201cAfter they were organized, these groups had to respond to various incidents. Because of the participants\u2019 diverse backgrounds, the workshop was also a way to create synergies among a community that is preparing to create incident handling teams,\u201d Mart\u00ednez observed.<\/p>\n<p>Giovanni Cruz, the instructor who presented the workshop together with Mart\u00ednez, stressed the importance of working together. \u201cSharing a week with the workshop participants at Universidad Veracruzana was a very valuable and enriching experience,\u201d he added.<\/p>\n<p>The workshop concluded with a round table where participants attempted to identify common projects and establish the basis for potential agreements regarding the creation of CSIRTs in Mexican universities or other institutions.<\/p>\n<p>The next workshop on cybersecurity incident handling is scheduled to be presented in Argentina towards the end of May.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Together with Universidad Veracruzana de Mexico, the Mexican National Association of Universities and Higher Education Institutions and NIC Mexico, LACNIC WARP trained approximately forty Mexican professionals on how to handle computer security incidents and the creation of centers for managing and mitigating cybersecurity attacks. Over the course of three and a half days, LACNIC WARP [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":11635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[407,1271],"archivo":[1345,879],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-11666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-amparo-en","tag-cibersecurity","archivo-editions","archivo-march-2019-edition"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Three and a Half Days of Training on How to Manage Cybersecurity Incidents<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Three and a Half Days of Training on How to Manage Cybersecurity Incidents\" \/>\n<meta property=\"og:description\" content=\"Together with Universidad Veracruzana de Mexico, the Mexican National Association of Universities and Higher Education Institutions and NIC Mexico, LACNIC WARP trained approximately forty Mexican professionals on how to handle computer security incidents and the creation of centers for managing and mitigating cybersecurity attacks. Over the course of three and a half days, LACNIC WARP [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-28T14:17:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Three and a Half Days of Training on How to Manage Cybersecurity Incidents\",\"datePublished\":\"2019-03-28T14:17:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/\"},\"wordCount\":373,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png\",\"keywords\":[\"AMPARO\",\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/\",\"name\":\"LACNIC Blog | Three and a Half Days of Training on How to Manage Cybersecurity Incidents\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png\",\"datePublished\":\"2019-03-28T14:17:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png\",\"width\":680,\"height\":378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three and a Half Days of Training on How to Manage Cybersecurity Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Three and a Half Days of Training on How to Manage Cybersecurity Incidents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Three and a Half Days of Training on How to Manage Cybersecurity Incidents","og_description":"Together with Universidad Veracruzana de Mexico, the Mexican National Association of Universities and Higher Education Institutions and NIC Mexico, LACNIC WARP trained approximately forty Mexican professionals on how to handle computer security incidents and the creation of centers for managing and mitigating cybersecurity attacks. Over the course of three and a half days, LACNIC WARP [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2019-03-28T14:17:07+00:00","og_image":[{"width":680,"height":378,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Three and a Half Days of Training on How to Manage Cybersecurity Incidents","datePublished":"2019-03-28T14:17:07+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/"},"wordCount":373,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png","keywords":["AMPARO","Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/","url":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/","name":"LACNIC Blog | Three and a Half Days of Training on How to Manage Cybersecurity Incidents","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png","datePublished":"2019-03-28T14:17:07+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png","width":680,"height":378},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/three-and-a-half-days-of-training-on-how-to-manage-cybersecurity-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Three and a Half Days of Training on How to Manage Cybersecurity Incidents"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/03\/amparo-mexico-marzo-2019.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":11664,"post_title":"Tres d\u00edas y medio de entrenamientos  para enfrentar incidentes cibern\u00e9ticos","slug":"tres-dias-y-medio-de-entrenamientos-para-enfrentar-incidentes-ciberneticos","href":"https:\/\/blog.lacnic.net\/tres-dias-y-medio-de-entrenamientos-para-enfrentar-incidentes-ciberneticos\/"},{"locale":"pt_BR","id":11668,"post_title":"Tr\u00eas dias e meio de treinamento para enfrentar incidentes cibern\u00e9ticos","slug":"tres-dias-e-meio-de-treinamento-para-enfrentar-incidentes-ciberneticos","href":"https:\/\/blog.lacnic.net\/pt-br\/tres-dias-e-meio-de-treinamento-para-enfrentar-incidentes-ciberneticos\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=11666"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11666\/revisions"}],"predecessor-version":[{"id":11667,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11666\/revisions\/11667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/11635"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=11666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=11666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=11666"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=11666"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=11666"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=11666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}