{"id":21052,"date":"2023-04-26T17:52:06","date_gmt":"2023-04-26T17:52:06","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=21052"},"modified":"2023-04-26T17:59:23","modified_gmt":"2023-04-26T17:59:23","slug":"how-to-deal-with-growing-cyber-threats","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/","title":{"rendered":"How to Deal with Growing Cyber Threats\u00a0"},"content":{"rendered":"\n<p>During <a href=\"https:\/\/lacnic39.lacnic.net\/en\/programme\/agenda\/plenary\" target=\"_blank\" rel=\"noreferrer noopener\">LACNIC 39,<\/a> six experts will discuss the future of cybersecurity, the impact of cyber threats, the risk they pose to Internet stability, and the difficulties that organizations in our region face as they deal with increasingly sophisticated and frequent incidents.<\/p>\n\n\n\n<p>Moderated by Kevon Swift, Head of Public Security Affairs at LACNIC, Pablo \u00c1lvarez (Government of Yucat\u00e1n SIIES), Sabas Casas (CANIETI Sureste), Wilberth P\u00e9rez (CSIRT &#8211; Autonomous University of Yucat\u00e1n), John Brown (Team Cymru Senior Security Evangelist), and Claudio Peguero (Ambassador and Dominican Ministry of Foreign Affairs Advisor on Cyber Affairs) will present the latest developments in cybersecurity.<\/p>\n\n\n\n<p>This group of professionals will share how threats have evolved and how cybercriminal organizations have become increasingly sophisticated, as well as the status of our capabilities in Latin America and the Caribbean to deal with these problems.<\/p>\n\n\n\n<p>Companies and organizations across the region are facing greater pressure to protect their critical assets and networks by recruiting and retaining talent and by developing contingency plans they can implement in case of an attack. Likewise, formal international cooperation mechanisms aimed at strengthening legal processes such as the UN cybercrime convention continue to be developed<\/p>\n\n\n\n<p>However, the global deficit of cybersecurity professionals, the scarcity of technical resources, and national frameworks that are inadequate to formally cooperate by sharing information for cybercrime investigation and sanctioning purposes represent major barriers for organizations designing their strategic security plans.<\/p>\n\n\n\n<p>Swift stressed that there is an urgent need for all the actors involved to improve their capabilities at the organizational level. \u201cCybersecurity is not linear. All the actors involved \u2014government, academia, the private sector\u2014 must act in collaboration, which is why we must act now,\u201d Swift noted.<\/p>\n\n\n\n<p>\u201cIf no action is taken, by 2025 the costs of cybercrime may skyrocket. The pandemic has increased digitalization, which also means that attack surfaces have grown. This is why it&#8217;s time to think globally and act locally,\u201d Swift concluded.<\/p>\n\n\n\n<p>The panel will address cybersecurity from multiple perspectives: the importance of coordinating the actions of the government, academic, and private sectors to build cybersecurity capabilities within a digital ecosystem; the most common threats to cybersecurity (phishing, ransomware, malware, and software vulnerabilities); the importance of cybersecurity education for employees and end users, and best practices in cybersecurity.<\/p>\n\n\n\n<p>National, regional, and global cybersecurity regulatory frameworks will also be analyzed, including plans for the protection of critical infrastructure and strategic plans to promote cooperation.<\/p>\n\n\n\n<p>The panel will be streamed live, and simultaneous interpretation will be provided into English, Spanish, and Portuguese.<\/p>\n\n\n\n<p>The complete agenda of the event is available <a href=\"https:\/\/lacnic39.lacnic.net\/en\/programme\/agenda\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During LACNIC 39, six experts will discuss the future of cybersecurity, the impact of cyber threats, the risk they pose to Internet stability, and the difficulties that organizations in our region face as they deal with increasingly sophisticated and frequent incidents. Moderated by Kevon Swift, Head of Public Security Affairs at LACNIC, Pablo \u00c1lvarez (Government [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":21064,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[501],"tags":[1283],"archivo":[1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-21052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-events","archivo-editions"],"acf":{"author":"","related_notes":[20947,20724]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | How to Deal with Growing Cyber Threats\u00a0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | How to Deal with Growing Cyber Threats\u00a0\" \/>\n<meta property=\"og:description\" content=\"During LACNIC 39, six experts will discuss the future of cybersecurity, the impact of cyber threats, the risk they pose to Internet stability, and the difficulties that organizations in our region face as they deal with increasingly sophisticated and frequent incidents. Moderated by Kevon Swift, Head of Public Security Affairs at LACNIC, Pablo \u00c1lvarez (Government [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-26T17:52:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-26T17:59:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"How to Deal with Growing Cyber Threats\u00a0\",\"datePublished\":\"2023-04-26T17:52:06+00:00\",\"dateModified\":\"2023-04-26T17:59:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/\"},\"wordCount\":431,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg\",\"keywords\":[\"Events\"],\"articleSection\":[\"Events\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/\",\"name\":\"LACNIC Blog | How to Deal with Growing Cyber Threats\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg\",\"datePublished\":\"2023-04-26T17:52:06+00:00\",\"dateModified\":\"2023-04-26T17:59:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Deal with Growing Cyber Threats\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | How to Deal with Growing Cyber Threats\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | How to Deal with Growing Cyber Threats\u00a0","og_description":"During LACNIC 39, six experts will discuss the future of cybersecurity, the impact of cyber threats, the risk they pose to Internet stability, and the difficulties that organizations in our region face as they deal with increasingly sophisticated and frequent incidents. Moderated by Kevon Swift, Head of Public Security Affairs at LACNIC, Pablo \u00c1lvarez (Government [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2023-04-26T17:52:06+00:00","article_modified_time":"2023-04-26T17:59:23+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg","type":"image\/jpeg"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"How to Deal with Growing Cyber Threats\u00a0","datePublished":"2023-04-26T17:52:06+00:00","dateModified":"2023-04-26T17:59:23+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/"},"wordCount":431,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg","keywords":["Events"],"articleSection":["Events"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/","url":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/","name":"LACNIC Blog | How to Deal with Growing Cyber Threats\u00a0","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg","datePublished":"2023-04-26T17:52:06+00:00","dateModified":"2023-04-26T17:59:23+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/how-to-deal-with-growing-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"How to Deal with Growing Cyber Threats\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/04\/ciberseguridad_lacnic.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":21046,"post_title":"\u00bfC\u00f3mo enfrentar las crecientes amenazas cibern\u00e9ticas?\u00a0","slug":"como-enfrentar-las-crecientes-amenazas-ciberneticas","href":"https:\/\/blog.lacnic.net\/como-enfrentar-las-crecientes-amenazas-ciberneticas\/"},{"locale":"pt_BR","id":21056,"post_title":"Como enfrentar as crescentes amea\u00e7as cibern\u00e9ticas?","slug":"como-enfrentar-as-crescentes-ameacas-ciberneticas","href":"https:\/\/blog.lacnic.net\/pt-br\/como-enfrentar-as-crescentes-ameacas-ciberneticas\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/21052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=21052"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/21052\/revisions"}],"predecessor-version":[{"id":21059,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/21052\/revisions\/21059"}],"acf:post":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/20724"},{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/20947"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/21064"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=21052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=21052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=21052"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=21052"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=21052"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=21052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}