{"id":28049,"date":"2024-11-20T18:29:35","date_gmt":"2024-11-20T18:29:35","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=28049"},"modified":"2024-11-28T13:23:25","modified_gmt":"2024-11-28T13:23:25","slug":"trust-networks-strengthening-cybersecurity-through-coordination","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/","title":{"rendered":"Trust Networks: Strengthening Cybersecurity through Coordination"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/carolina-badano\/\">Carolina Badano<\/a>, Communications Coordinator at LACNIC<\/p>\n\n\n\n<p>In April 2022, Costa Rica suffered a wave of extortion cyberattacks of such magnitude that even critical infrastructure services, including healthcare and payroll processing, were affected. For the first time in the region, a country had to declare a national emergency due to a cyberattack.<\/p>\n\n\n\n<p>These incidents underlined the urgent need to strengthen cyberdiplomacy and regional cooperation to build a safer and more resilient cyberspace.<\/p>\n\n\n\n<p>More than two years after these attacks, what cybersecurity challenges is Latin America facing today?<\/p>\n\n\n\n<p>Paula Brenes Ram\u00edrez, a Costa Rican computer engineer and current president of the <a href=\"https:\/\/www.linkedin.com\/company\/fundacion-yod\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yod Foundation<\/a>, decided to address the issue in a proposal selected for the 5<sup>th<\/sup> edition of <a href=\"https:\/\/www.lacnic.net\/7490\/1\/lacnic\/\" target=\"_blank\" rel=\"noreferrer noopener\">LACNIC&#8217;s L\u00edderes Program<\/a>, an initiative that offers funding and mentorship for research on Internet Governance topics.<\/p>\n\n\n\n<p>Through a documentary analysis of cybersecurity policies and interviews with experts, Brenes was able to obtain valuable insights into effective strategies for strengthening cybersecurity and building trust networks. Her work was conducted with the support of her mentor, Juli\u00e1n Casasbuenas, director of Colnodo.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyberdiplomacy and Trust Networks<\/strong><\/h2>\n\n\n\n<p>It is important to clearly understand two concepts that the researcher refers to throughout her work and that play a key role in both analyzing the situation and presenting her conclusions.<\/p>\n\n\n\n<p>Cyber diplomacy is the use of digital tools and Information and Communication technologies (ICT) by States to achieve their foreign policy objectives. It requires a coherent and coordinated strategy that integrates with traditional diplomatic methods.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--28049\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/most-common-infostealers-in-our-region\/\">Most Common Infostealers in Our Region<\/a><\/div><\/div><\/section>\n\n\n<p>Trust networks are comprised of governments, businesses, civil society, and technical experts, and their role is to facilitate the exchange of information, coordinate actions, and develop capacities to more effectively prevent, detect, and respond to cyber threats.<\/p>\n\n\n\n<p>For this study, Brenes interviewed experts with experience in developing trust networks, who shared knowledge, strategies, and lessons learned in relation to cybersecurity.<\/p>\n\n\n\n<p>These experts included:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Winfried Weck, Head of the <a href=\"https:\/\/www.kas.de\/es\/web\/regionalprogramm-adela\" target=\"_blank\" rel=\"noreferrer noopener\">Regional Programme Alliances for Development and Democracy with Latin America (ADELA)<\/a> and the Panama Office, and Yadira Elizabeth Gratac\u00f3s Reyes, Project Coordinator.<\/li>\n\n\n\n<li>Ricardo C\u00e1ceres, Director of Information Technologies at SICA, who also coordinates the Technical Administrative Secretariat of the ERDI <em>ad-hoc<\/em> group, which leads SICA&#8217;s Regional Digital Strategy.<\/li>\n\n\n\n<li>Belisario Contreras, Coordinator of the Digi Americas Alliance.<\/li>\n\n\n\n<li>Eduvigis Ortiz, President of Women4Cyber \u200b\u200bSpain.<\/li>\n\n\n\n<li>Liina Areng, EU CyberNet Project Director.<\/li>\n\n\n\n<li>C\u00e9sar Molin\u00e9 Rodr\u00edguez, LAC4.<\/li>\n\n\n\n<li>Ernesto Ibarra, President of the Mexican Cybersecurity and Digital Law Academy.<\/li>\n\n\n\n<li>Miguel Porrua, e-Government Principal Specialist, Data and Digital Government Cluster Coordinator at RED GEALC.<\/li>\n<\/ul>\n\n\n\n<p>The interviews are available, in Spanish, at the <a href=\"https:\/\/podcasters.spotify.com\/pod\/show\/fundacion-yod\" target=\"_blank\" rel=\"noreferrer noopener\">Voces que construyen confianza<\/a> (Voices Building Trust) podcast.<\/p>\n\n\n\n<p>Additionally, by using Artificial Intelligence tools, Brenes created story-format videos based on real cases of cyberattacks affecting countries in the region. Her strategy is to employ storytelling \u2014the art of conveying narratives effectively\u2014 to raise awareness about cybersecurity and the political and social implications of these attacks, as well as to maximize the reach and impact of the findings of the study.<\/p>\n\n\n\n<p>As an example, the first story (The day paradise came to a halt, in Spanish) based on the cyberattacks that occurred in Costa Rica in 2022 is available here: <a href=\"https:\/\/youtu.be\/1PLunSj0sm8\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/youtu.be\/1PLunSj0sm8<\/a><\/p>\n\n\n\n<p>All seven stories that are part of this project are available at the following link: <a href=\"https:\/\/www.youtube.com\/@FundacionYoD\/playlists\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/@FundacionYoD\/playlists<\/a><\/p>\n\n\n\n<p>The study conducted by Paula Brenes concludes that both cyberdiplomacy and trust networks are essential pillars for regional cybersecurity. It is crucial for governments, businesses, and civil society to work together to strengthen cyber defense capabilities and promote cooperation among these networks.<\/p>\n\n\n\n<p>The author stresses that this work \u201cis also part of the collaborative support that the Lideres program encourages by creating a network.\u201d She concludes by saying that anyone interested in participating in a new edition of the podcast can reach out to them.<\/p>\n\n\n\n<p>Here are some of the researcher\u2019s proposed recommendations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Promote public policies that incorporate cybersecurity across all levels of public and private administration.<\/li>\n\n\n\n<li>Expand cyber cooperation beyond political and economic borders.<\/li>\n\n\n\n<li>Encourage the active participation of regional stakeholders in international cybersecurity forums.<\/li>\n\n\n\n<li>Establish and strengthen national and regional Cybersecurity Incident Response Teams (CSIRTs) that collaborate in real time to address emerging threats.<\/li>\n<\/ul>\n\n\n\n<p>Brenes&#8217;s work is one of the 16 proposals selected as a result of the 2024 L\u00edderes Program call for presentations. Paula Oteguy, Multisectoral Relations Coordinator at LACNIC and head of the program, highlighted the value of the selected initiatives. As noted by Oteguy, \u201cThis year&#8217;s research has generated new knowledge and perspectives on various key Internet Governance issues. Findings appear in the interplay of IG spaces and processes, providing valuable inputs that will later be shared within these very spaces. The outcomes of this research highlight both the context and the scale of various issues, while also suggesting potential solutions in areas such as access, inclusion, security, emerging technologies, and digital skills. This aspect is particularly relevant and one that I would like to highlight about the program and its researchers.\u201d<\/p>\n\n\n\n<p>The complete study and other initiatives selected through the 2024 L\u00edderes Program call for proposals, are available <a href=\"https:\/\/www.lacnic.net\/7213\/1\/lacnic\/proyectos-seleccionados-2024\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Carolina Badano, Communications Coordinator at LACNIC In April 2022, Costa Rica suffered a wave of extortion cyberattacks of such magnitude that even critical infrastructure services, including healthcare and payroll processing, were affected. For the first time in the region, a country had to declare a national emergency due to a cyberattack. These incidents underlined [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28067,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1364],"tipo_autor":[],"class_list":["post-28049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-carolina-badano-en"],"acf":{"author":"Carolina Badano","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Trust Networks: Strengthening Cybersecurity through Coordination<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Trust Networks: Strengthening Cybersecurity through Coordination\" \/>\n<meta property=\"og:description\" content=\"By Carolina Badano, Communications Coordinator at LACNIC In April 2022, Costa Rica suffered a wave of extortion cyberattacks of such magnitude that even critical infrastructure services, including healthcare and payroll processing, were affected. For the first time in the region, a country had to declare a national emergency due to a cyberattack. These incidents underlined [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T18:29:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-28T13:23:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Trust Networks: Strengthening Cybersecurity through Coordination\",\"datePublished\":\"2024-11-20T18:29:35+00:00\",\"dateModified\":\"2024-11-28T13:23:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/\"},\"wordCount\":855,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/\",\"name\":\"LACNIC Blog | Trust Networks: Strengthening Cybersecurity through Coordination\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png\",\"datePublished\":\"2024-11-20T18:29:35+00:00\",\"dateModified\":\"2024-11-28T13:23:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust Networks: Strengthening Cybersecurity through Coordination\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Trust Networks: Strengthening Cybersecurity through Coordination","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Trust Networks: Strengthening Cybersecurity through Coordination","og_description":"By Carolina Badano, Communications Coordinator at LACNIC In April 2022, Costa Rica suffered a wave of extortion cyberattacks of such magnitude that even critical infrastructure services, including healthcare and payroll processing, were affected. For the first time in the region, a country had to declare a national emergency due to a cyberattack. These incidents underlined [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-11-20T18:29:35+00:00","article_modified_time":"2024-11-28T13:23:25+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Trust Networks: Strengthening Cybersecurity through Coordination","datePublished":"2024-11-20T18:29:35+00:00","dateModified":"2024-11-28T13:23:25+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/"},"wordCount":855,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/","url":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/","name":"LACNIC Blog | Trust Networks: Strengthening Cybersecurity through Coordination","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png","datePublished":"2024-11-20T18:29:35+00:00","dateModified":"2024-11-28T13:23:25+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/trust-networks-strengthening-cybersecurity-through-coordination\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Trust Networks: Strengthening Cybersecurity through Coordination"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/redes-de-confianza-2024.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":28043,"post_title":"Redes de confianza:\u00a0 coordinaci\u00f3n para fortalecer la ciberseguridad","slug":"redes-de-confianza-coordinacion-para-fortalecer-la-ciberseguridad","href":"https:\/\/blog.lacnic.net\/redes-de-confianza-coordinacion-para-fortalecer-la-ciberseguridad\/"},{"locale":"pt_BR","id":28054,"post_title":"Redes de confian\u00e7a: coordena\u00e7\u00e3o para fortalecer a seguran\u00e7a cibern\u00e9tica","slug":"redes-de-confianca-coordenacao-para-fortalecer-a-seguranca-cibernetica","href":"https:\/\/blog.lacnic.net\/pt-br\/redes-de-confianca-coordenacao-para-fortalecer-a-seguranca-cibernetica\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=28049"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28049\/revisions"}],"predecessor-version":[{"id":28246,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28049\/revisions\/28246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/28067"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=28049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=28049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=28049"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=28049"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=28049"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=28049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}