{"id":5980,"date":"2016-11-25T15:06:23","date_gmt":"2016-11-25T15:06:23","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/2016noven\/lacnic-promotes-the-creation-of-computer-security-response-teams"},"modified":"2023-07-28T18:40:52","modified_gmt":"2023-07-28T18:40:52","slug":"lacnic-promotes-the-creation-of-computer-security-response-teams","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/","title":{"rendered":"LACNIC promotes the creation of Computer Security Response Teams"},"content":{"rendered":"<p>This month, close to 60 professionals and experts in Belize and Bolivia received training on computer security and the creation of security incident response teams at two new workshops organized by the AMPARO project, a LACNIC initiative.<\/p>\n<p>The goal of these workshops was to develop capacity for the creation of Computer Security Incident Response Teams in both countries.<\/p>\n<p>Titled <em>\u201cHow to set up a CSIRT,\u201d <\/em>the Belize workshop was the first AMPARO workshop presented exclusively in English. Organized by LACNIC and the Belize Internet Exchange Point, the activity was attended by companies and organizations representing IXPs, Belize Internet providers and the University of Belize.<\/p>\n<p>The workshop was presented by Graciela Mart\u00ednez of LACNIC. Ernesto P\u00e9rez of CEDIA Ecuador helped in preparing the workshop.<\/p>\n<p>Mart\u00ednez highlighted the experience in Belize and noted that local organizations were interested in starting to work on cybersecurity issues.<em> \u201cThe idea of creating a CSIRT at IXP level was strong,\u201d<\/em> she said.<\/p>\n<p>From Belize, the LACNIC team traveled to La Paz, Bolivia, where they held another workshop with the local support of the Bolivian Telecommunications and Transportation Regulation and Oversight Authority.<\/p>\n<p>Over the course of three days, 40 professionals representing public organizations and companies of different sectors received training on computer security, among them NIC.bo, ISPs, AGETIC, banking institutions, the Army, the Bolivian Police, the General Personal Identification Service (SEGIP), and the Financial System Supervisory Authority (ASFI). This time, Patricia Prandini of Argentina joined Mart\u00ednez and P\u00e9rez for presenting the workshop.<\/p>\n<p><em>\u201cWe were met by an audience eager to participate and learn. Teams worked very enthusiastically,\u201d <\/em>said Mart\u00ednez.<\/p>\n<p>The implementation of a Computer Security Incident Response Team is very advanced in Bolivia, particularly after the decree creating the Agency for e-Government and Information and Communication Technologies (AGETIC). Article 8 of this decree also establishes the implementation of a Computer Security Incident Management Center (CGII) as part of AGETIC&#8217;s technical operational structure.<\/p>\n<p><strong>Balance<\/strong>. The workshops held in both Belize and Bolivia were structured in modules so that workshop attendees would be able to set up an Incident Response Team. <em>\u201cIt is important that participants are faced with the challenge of thinking about every aspect involved in the creation of a CSIRT and its subsequent implementation,\u201d <\/em>noted Mart\u00ednez.<\/p>\n<p>Workshop participants were presented with cyber-attack scenarios and they had to manage these security incidents in groups, taking into account the various roles that may exist within a CSIRT.<\/p>\n<p>The AMPARO Project \u2014an initiative which LACNIC has been promoting since 2009\u2014 encourages the adoption of computer security practices such as Computer Security Incident Response Teams (CSIRT). The project is part of the services provided by LACNIC WARP to its members and to the community as a whole. &#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month, close to 60 professionals and experts in Belize and Bolivia received training on computer security and the creation of security incident response teams at two new workshops organized by the AMPARO project, a LACNIC initiative. The goal of these workshops was to develop capacity for the creation of Computer Security Incident Response Teams [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":21893,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[406,407,1271],"archivo":[1345,786],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-5980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-amparo","tag-amparo-en","tag-cibersecurity","archivo-editions","archivo-november-2016-edition"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | LACNIC promotes the creation of Computer Security Response Teams<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | LACNIC promotes the creation of Computer Security Response Teams\" \/>\n<meta property=\"og:description\" content=\"This month, close to 60 professionals and experts in Belize and Bolivia received training on computer security and the creation of security incident response teams at two new workshops organized by the AMPARO project, a LACNIC initiative. The goal of these workshops was to develop capacity for the creation of Computer Security Incident Response Teams [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-25T15:06:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-28T18:40:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"LACNIC promotes the creation of Computer Security Response Teams\",\"datePublished\":\"2016-11-25T15:06:23+00:00\",\"dateModified\":\"2023-07-28T18:40:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/\"},\"wordCount\":460,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png\",\"keywords\":[\"AMPARO\",\"AMPARO\",\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/\",\"name\":\"LACNIC Blog | LACNIC promotes the creation of Computer Security Response Teams\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png\",\"datePublished\":\"2016-11-25T15:06:23+00:00\",\"dateModified\":\"2023-07-28T18:40:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png\",\"width\":\"680\",\"height\":\"220\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LACNIC promotes the creation of Computer Security Response Teams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | LACNIC promotes the creation of Computer Security Response Teams","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | LACNIC promotes the creation of Computer Security Response Teams","og_description":"This month, close to 60 professionals and experts in Belize and Bolivia received training on computer security and the creation of security incident response teams at two new workshops organized by the AMPARO project, a LACNIC initiative. The goal of these workshops was to develop capacity for the creation of Computer Security Incident Response Teams [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2016-11-25T15:06:23+00:00","article_modified_time":"2023-07-28T18:40:52+00:00","og_image":[{"width":680,"height":220,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"LACNIC promotes the creation of Computer Security Response Teams","datePublished":"2016-11-25T15:06:23+00:00","dateModified":"2023-07-28T18:40:52+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/"},"wordCount":460,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png","keywords":["AMPARO","AMPARO","Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/","url":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/","name":"LACNIC Blog | LACNIC promotes the creation of Computer Security Response Teams","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png","datePublished":"2016-11-25T15:06:23+00:00","dateModified":"2023-07-28T18:40:52+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png","width":"680","height":"220"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/lacnic-promotes-the-creation-of-computer-security-response-teams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"LACNIC promotes the creation of Computer Security Response Teams"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/11\/4b.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":5906,"post_title":"LACNIC impulsa creaci\u00f3n de centros de respuesta a seguridad inform\u00e1tica","slug":"lacnic-impulsa-creacion-de-centros-de-respuesta-a-seguridad-informatica","href":"https:\/\/blog.lacnic.net\/lacnic-impulsa-creacion-de-centros-de-respuesta-a-seguridad-informatica\/"},{"locale":"pt_BR","id":5943,"post_title":"LACNIC promove a cria\u00e7\u00e3o de centros de resposta para a seguran\u00e7a inform\u00e1tica","slug":"lacnic-promove-a-criacao-de-centros-de-resposta-para-a-seguranca-informatica","href":"https:\/\/blog.lacnic.net\/pt-br\/lacnic-promove-a-criacao-de-centros-de-resposta-para-a-seguranca-informatica\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=5980"}],"version-history":[{"count":5,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5980\/revisions"}],"predecessor-version":[{"id":21892,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5980\/revisions\/21892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/21893"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=5980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=5980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=5980"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=5980"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=5980"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=5980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}