{"id":497,"date":"2011-04-25T16:49:52","date_gmt":"2011-04-25T16:49:52","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/upcoming-meetings-7\/computer-security-workshop-2"},"modified":"2011-04-25T16:49:52","modified_gmt":"2011-04-25T16:49:52","slug":"computer-security-workshop-2","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/","title":{"rendered":"Computer Security Workshop"},"content":{"rendered":"<p>The AMPARO Project will conduct a new Regional Training Workshop for Computer Security Technicians in the city of Buenos Aires (Argentina) between 25 and 28 April. This activity is aimed at computer security professionals who wish to train in CSIRT creation and management. For more information, please contact <a href=\"mailto:contactoamparo@lacnic.net\" target=\"_blank\">contactoamparo@lacnic.net<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The AMPARO Project will conduct a new Regional Training Workshop for Computer Security Technicians in the city of Buenos Aires (Argentina) between 25 and 28 April. This activity is aimed at computer security professionals who wish to train in CSIRT creation and management. For more information, please contact contactoamparo@lacnic.net<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[650],"tags":[],"archivo":[549,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-497","post","type-post","status-publish","format-standard","hentry","category-sin-categoria-en","archivo-april-2011-edition","archivo-editions"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Computer Security Workshop<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Computer Security Workshop\" \/>\n<meta property=\"og:description\" content=\"The AMPARO Project will conduct a new Regional Training Workshop for Computer Security Technicians in the city of Buenos Aires (Argentina) between 25 and 28 April. This activity is aimed at computer security professionals who wish to train in CSIRT creation and management. For more information, please contact contactoamparo@lacnic.net\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2011-04-25T16:49:52+00:00\" \/>\n<meta name=\"author\" content=\"Mart\u00edn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/\"},\"author\":{\"name\":\"Mart\u00edn\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc\"},\"headline\":\"Computer Security Workshop\",\"datePublished\":\"2011-04-25T16:49:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/\"},\"wordCount\":52,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"articleSection\":[\"sin categoria\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/\",\"name\":\"LACNIC Blog | Computer Security Workshop\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"datePublished\":\"2011-04-25T16:49:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Security Workshop\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc\",\"name\":\"Mart\u00edn\",\"description\":\"Especialista en imagen institucional\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/sysmartin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Computer Security Workshop","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Computer Security Workshop","og_description":"The AMPARO Project will conduct a new Regional Training Workshop for Computer Security Technicians in the city of Buenos Aires (Argentina) between 25 and 28 April. This activity is aimed at computer security professionals who wish to train in CSIRT creation and management. For more information, please contact contactoamparo@lacnic.net","og_url":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2011-04-25T16:49:52+00:00","author":"Mart\u00edn","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/"},"author":{"name":"Mart\u00edn","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc"},"headline":"Computer Security Workshop","datePublished":"2011-04-25T16:49:52+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/"},"wordCount":52,"commentCount":1,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"articleSection":["sin categoria"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/","url":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/","name":"LACNIC Blog | Computer Security Workshop","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"datePublished":"2011-04-25T16:49:52+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/computer-security-workshop-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Computer Security Workshop"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc","name":"Mart\u00edn","description":"Especialista en imagen institucional","url":"https:\/\/blog.lacnic.net\/en\/author\/sysmartin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":357,"post_title":"Taller de seguridad inform\u00e1tica","slug":"taller-de-seguridad-informatica-2","href":"https:\/\/blog.lacnic.net\/taller-de-seguridad-informatica-2\/"},{"locale":"pt_BR","id":498,"post_title":"Oficina de seguran\u00e7a inform\u00e1tica","slug":"oficina-de-seguranca-informatica-2","href":"https:\/\/blog.lacnic.net\/pt-br\/oficina-de-seguranca-informatica-2\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=497"}],"version-history":[{"count":0,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/497\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=497"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=497"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=497"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}