{"id":12279,"date":"2019-10-30T15:02:12","date_gmt":"2019-10-30T15:02:12","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=12279"},"modified":"2019-10-30T15:02:12","modified_gmt":"2019-10-30T15:02:12","slug":"synergies-for-fighting-cybercrime","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/","title":{"rendered":"Synergies for Fighting Cybercrime"},"content":{"rendered":"<p>Seeking to strengthen the cooperation between the regional actors involved in computer security, law enforcement agencies (LEAs) and the Internet technical community, a meeting was held with about 30 experts during the LACNIC 32 event.<\/p>\n<p>Promoted by LACNIC, the goal of the conference was to identify common lines of work and generate future synergies among representatives of the various stakeholders involved.<\/p>\n<p>The activity included the presentation of studies addressing the increase in the number and volume of cyberattacks as well as the increased sophistication of cybercriminals.<\/p>\n<p>\u201cA growing number of crimes are committed through computer networks. In this regard, we should not only be talking about computer systems but also about Internet platforms and social networks,\u201d said Kevon Swift, Head of Strategic Relations and Integration at LACNIC.<\/p>\n<p>Speakers presented reports on the technological landscape and its impact on the work of law enforcement agencies, as well as the latest trends in cybersecurity.<\/p>\n<p>Carlos Mart\u00ednez, CTO at LACNIC, presented a paper on the Internet ecosystem and how Internet actors can support LEAs. Rodrigo de la Parra, Regional Vice President for ICANN, and Shernon Osepa, Manager for Latin America and the Caribbean for the Internet Society (ISOC), completed this talk.<\/p>\n<p>In turn, Graciela Mart\u00ednez, Head of LACNIC WARP, shared a report on cyberincidents and the role of CSIRTs in supporting police investigations.<\/p>\n<p>Swift noted that the lack of knowledge on technical and governance issues often complicates the work of the agents responsible for online criminal investigations.<\/p>\n<p>Information was also shared regarding how to leverage the work of CSIRTs to mitigate attacks and gather evidence that can be used in the legal prosecution of these incidents.<\/p>\n<p>\u201cWe hope to continue improving our relationship with these groups and, in the future, identify specific issues on which we can work together with law enforcement agencies,\u201d Swift concluded.&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seeking to strengthen the cooperation between the regional actors involved in computer security, law enforcement agencies (LEAs) and the Internet technical community, a meeting was held with about 30 experts during the LACNIC 32 event. Promoted by LACNIC, the goal of the conference was to identify common lines of work and generate future synergies among [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12277,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,908],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-12279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-october-2019-edition"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Synergies for Fighting Cybercrime<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Synergies for Fighting Cybercrime\" \/>\n<meta property=\"og:description\" content=\"Seeking to strengthen the cooperation between the regional actors involved in computer security, law enforcement agencies (LEAs) and the Internet technical community, a meeting was held with about 30 experts during the LACNIC 32 event. Promoted by LACNIC, the goal of the conference was to identify common lines of work and generate future synergies among [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-30T15:02:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Synergies for Fighting Cybercrime\",\"datePublished\":\"2019-10-30T15:02:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/\"},\"wordCount\":308,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/\",\"name\":\"LACNIC Blog | Synergies for Fighting Cybercrime\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png\",\"datePublished\":\"2019-10-30T15:02:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Synergies for Fighting Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Synergies for Fighting Cybercrime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Synergies for Fighting Cybercrime","og_description":"Seeking to strengthen the cooperation between the regional actors involved in computer security, law enforcement agencies (LEAs) and the Internet technical community, a meeting was held with about 30 experts during the LACNIC 32 event. Promoted by LACNIC, the goal of the conference was to identify common lines of work and generate future synergies among [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2019-10-30T15:02:12+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Synergies for Fighting Cybercrime","datePublished":"2019-10-30T15:02:12+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/"},"wordCount":308,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/","url":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/","name":"LACNIC Blog | Synergies for Fighting Cybercrime","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png","datePublished":"2019-10-30T15:02:12+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/synergies-for-fighting-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Synergies for Fighting Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2019\/10\/leas-lacnic32.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":12276,"post_title":"Sinergias para enfrentar la ciber delincuencia","slug":"sinergias-para-enfrentar-la-ciber-delincuencia","href":"https:\/\/blog.lacnic.net\/sinergias-para-enfrentar-la-ciber-delincuencia\/"},{"locale":"pt_BR","id":12281,"post_title":"Sinergias para enfrentar o crime cibern\u00e9tico","slug":"sinergias-para-enfrentar-o-crime-cibernetico","href":"https:\/\/blog.lacnic.net\/pt-br\/sinergias-para-enfrentar-o-crime-cibernetico\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/12279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=12279"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/12279\/revisions"}],"predecessor-version":[{"id":12280,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/12279\/revisions\/12280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/12277"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=12279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=12279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=12279"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=12279"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=12279"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=12279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}