{"id":325,"date":"2021-05-21T07:53:47","date_gmt":"2021-05-21T07:53:47","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=325"},"modified":"2023-01-30T16:43:02","modified_gmt":"2023-01-30T16:43:02","slug":"como-deben-los-ciso-afrontar-la-seguridad-del-5g","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/","title":{"rendered":"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G?"},"content":{"rendered":"<p>Tal y como reconoce Pablo Garc\u00eda, telco and channel systems engineering manager de Fortinet, en este v\u00eddeo \u201cel 5G necesita soluciones que hayan pensado en la seguridad desde el principio\u201d, lo que el fabricante conoce como Security First. Para proteger las redes 5G se torna imprescindible que la seguridad se integre con el resto de soluciones, aplicaciones y sistemas.<\/p>\n<p>Para Fortinet la seguridad perimetral no es suficiente en el nuevo panorama que plantea el 5G. Sus expertos abogan por la necesidad de implementar una seguridad de extremo a extremo. Por eso, Garc\u00eda aconseja a los CISO tener en cuenta la integraci\u00f3n y una visi\u00f3n global de la seguridad.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tal y como reconoce Pablo Garc\u00eda, telco and channel systems engineering manager de Fortinet, en este v\u00eddeo \u201cel 5G necesita soluciones que hayan pensado en la seguridad desde el principio\u201d, lo que el fabricante conoce como Security First. Para proteger las redes 5G se torna imprescindible que la seguridad se integre con el resto de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[9],"tags":[],"class_list":["post-325","post","type-post","status-publish","format-video","has-post-thumbnail","hentry","category-videos","post_format-post-format-video"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G? - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G? - Fortinet\" \/>\n<meta property=\"og:description\" content=\"Tal y como reconoce Pablo Garc\u00eda, telco and channel systems engineering manager de Fortinet, en este v\u00eddeo \u201cel 5G necesita soluciones que hayan pensado en la seguridad desde el principio\u201d, lo que el fabricante conoce como Security First. Para proteger las redes 5G se torna imprescindible que la seguridad se integre con el resto de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-21T07:53:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/Vi\u0301deo-2-5G.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G?\",\"datePublished\":\"2021-05-21T07:53:47+00:00\",\"dateModified\":\"2023-01-30T16:43:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/\"},\"wordCount\":123,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/Vi\u0301deo-2-5G.jpg\",\"articleSection\":[\"V\u00eddeos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/\",\"name\":\"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G? - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/Vi\u0301deo-2-5G.jpg\",\"datePublished\":\"2021-05-21T07:53:47+00:00\",\"dateModified\":\"2023-01-30T16:43:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/Vi\u0301deo-2-5G.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/Vi\u0301deo-2-5G.jpg\",\"width\":800,\"height\":488},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/21\\\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G? - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G? - Fortinet","og_description":"Tal y como reconoce Pablo Garc\u00eda, telco and channel systems engineering manager de Fortinet, en este v\u00eddeo \u201cel 5G necesita soluciones que hayan pensado en la seguridad desde el principio\u201d, lo que el fabricante conoce como Security First. Para proteger las redes 5G se torna imprescindible que la seguridad se integre con el resto de [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/","og_site_name":"Fortinet","article_published_time":"2021-05-21T07:53:47+00:00","article_modified_time":"2023-01-30T16:43:02+00:00","og_image":[{"width":800,"height":488,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/Vi\u0301deo-2-5G.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G?","datePublished":"2021-05-21T07:53:47+00:00","dateModified":"2023-01-30T16:43:02+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/"},"wordCount":123,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/Vi\u0301deo-2-5G.jpg","articleSection":["V\u00eddeos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/","url":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/","name":"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G? - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/Vi\u0301deo-2-5G.jpg","datePublished":"2021-05-21T07:53:47+00:00","dateModified":"2023-01-30T16:43:02+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/Vi\u0301deo-2-5G.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/Vi\u0301deo-2-5G.jpg","width":800,"height":488},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/21\/como-deben-los-ciso-afrontar-la-seguridad-del-5g\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo deben los CISO afrontar la seguridad del 5G?"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":1,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/325\/revisions\/326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/327"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}