{"id":150,"date":"2025-12-08T15:33:31","date_gmt":"2025-12-08T15:33:31","guid":{"rendered":"https:\/\/mvsconsultores.cl\/?page_id=150"},"modified":"2025-12-09T16:37:10","modified_gmt":"2025-12-09T16:37:10","slug":"virtual-ciso","status":"publish","type":"page","link":"https:\/\/mvsconsultores.cl\/index.php\/virtual-ciso\/","title":{"rendered":"Virtual CISO"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-ydbzjqvq alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-iwioyele uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Virtual CISO<\/h3><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-otwrrvx3\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-38f2d0e7 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Click Here<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bpzoy1ed alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-gv1oset0 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/mvsconsultores.cl\/wp-content\/uploads\/2025\/12\/concepto-de-collage-html-y-css-con-persona-1-1024x1024.jpg ,https:\/\/mvsconsultores.cl\/wp-content\/uploads\/2025\/12\/concepto-de-collage-html-y-css-con-persona-1-scaled.jpg 780w, https:\/\/mvsconsultores.cl\/wp-content\/uploads\/2025\/12\/concepto-de-collage-html-y-css-con-persona-1-scaled.jpg 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/mvsconsultores.cl\/wp-content\/uploads\/2025\/12\/concepto-de-collage-html-y-css-con-persona-1-1024x1024.jpg\" alt=\"\" class=\"uag-image-153\" width=\"521\" height=\"600\" title=\"concepto-de-collage-html-y-css-con-persona (1)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-8swfubse\">\n<div class=\"wp-block-uagb-info-box uagb-block-zwmckkvf uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">\u00bfQue Es Virtual CISO?<\/h2><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-sskdazen uagb-infobox__content-wrap  uagb-infobox-icon-left-title uagb-infobox-left uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-left-title-image\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><\/div><p class=\"uagb-ifb-desc\">Un Virtual Chief Information Security Officer es un<br>ejecutivo externo especializado en seguridad de la<br>informaci\u00f3n y protecci\u00f3n de datos, que act\u00faa como<br>parte del equipo directivo, aportando liderazgo<br>estrat\u00e9gico y t\u00e9cnico sin la necesidad de contratar un<br>CISO a tiempo completo.<br><\/p><div class=\"uagb-ifb-separator\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-rwyc9gda uagb-infobox__content-wrap  uagb-infobox-icon-left-title uagb-infobox-left uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-left-title-image\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Beneficios clave:<br><\/h3><\/div><\/div><p class=\"uagb-ifb-desc\">-Acceso inmediato a experiencia de alto nivel.<br>-Optimizaci\u00f3n de costos frente a un CISO en plantilla.<br>-Flexibilidad en alcance y dedicaci\u00f3n.<br>-Alineaci\u00f3n con negocio, riesgos y cumplimiento<br>normativoAlcan<br><\/p><div class=\"uagb-ifb-separator\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-k1x56gsf alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-1wx3deeh uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Alcance del VIRTUAL CISO<\/h2><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-yuskek1l\">\n<div class=\"wp-block-uagb-container uagb-block-kb0f5eqy\">\n<div class=\"wp-block-uagb-info-box uagb-block-erdlqfs6 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><div class=\"uagb-iconbox-icon-wrap uagb-infobox-shape-circle\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">Gobierno y estrategia<\/p><\/div><p class=\"uagb-ifb-desc\">Gobierno y<br>Estrategia<br>-Definir y ejecutar la<br>Estrategia de<br>Seguridad de la<br>Informaci\u00f3n.<br>-Integrar el SGSI con<br>la estrategia de<br>negocio.<br>-Asegurar la<br>alineaci\u00f3n con ISO<br>27001:2022 e<br>integrar marcos como<br>NIST CSF o CIS.<br><\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a0cwmyyo\">\n<div class=\"wp-block-uagb-info-box uagb-block-0ordxwkb uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><div class=\"uagb-iconbox-icon-wrap uagb-infobox-shape-circle\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">Cumplimiento Legal<br>y Normativo<br><\/p><\/div><p class=\"uagb-ifb-desc\">-Diagn\u00f3stico y plan<br>de cumplimiento<br>frente a Ley 21.663 y<br>Ley 21.719<br>-Preparaci\u00f3n y<br>soporte para<br>auditor\u00edas<br>regulatorias.<br>-Implementaci\u00f3n de<br>controles para<br>sectores cr\u00edticos y<br>OIV (Operadores de<br>Infraestructura Vital).<br><\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-vxsivkh0\">\n<div class=\"wp-block-uagb-info-box uagb-block-sxedjw8u uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><div class=\"uagb-iconbox-icon-wrap uagb-infobox-shape-circle\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">Gesti\u00f3n de Riesgos<br><\/p><\/div><p class=\"uagb-ifb-desc\">-An\u00e1lisis de riesgos<br>seg\u00fan ISO 27005.<br>-Priorizaci\u00f3n de<br>inversiones en<br>ciberseguridad.<br>-Estrategias de<br>resiliencia y<br>continuidad<br>operacional.<br><\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-oefwdefk\">\n<div class=\"wp-block-uagb-info-box uagb-block-dh2sduex uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><div class=\"uagb-iconbox-icon-wrap uagb-infobox-shape-circle\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">Concientizaci\u00f3n y<br>Cultura<br><\/p><\/div><p class=\"uagb-ifb-desc\">-Programas de<br>awareness en<br>ciberseguridad.<br>-Simulacros de<br>respuesta a<br>incidentes.<br>-Fortalecimiento de<br>la cultura de<br>seguridad<br><\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-9r3xm4o5 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-ohlswtyz uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>SERVICIO VCISO<br>APOYO EN GOBIERNO Y<br>CIBERSEGURIDAD<\/strong><br><\/h3><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-5dcc4178 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title\">Objetivo: Apoyar en la alineaci\u00f3n de la estrategia corporativa<br>con las necesidades de Ciberresilencia y cumplimiento<br>normativo.<br><\/p><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-xabblagw alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-amrv2w9o uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Servicio 1<br>DIAGN\u00d3STICO Y CONCIENTIZACI\u00d3N BASICA<br><\/h3><\/div><p class=\"uagb-ifb-desc\">Objetivo: Evaluar el estado actual de la organizaci\u00f3n en materia de seguridad de la<br>informaci\u00f3n y generar las primeras acciones de concientizaci\u00f3n y cumplimento<br>normativo.<br><\/p><div class=\"uagb-ifb-separator\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-pqiazmer\">\n<div class=\"wp-block-uagb-container uagb-block-n0yys8gb\">\n<div class=\"wp-block-uagb-info-box uagb-block-hn0jdxu5 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 256 512\"><path d=\"M64 448c-8.188 0-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L178.8 256L41.38 118.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160c12.5 12.5 12.5 32.75 0 45.25l-160 160C80.38 444.9 72.19 448 64 448z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">ALCANCE DEL SERVICIO<br>-Diagn\u00f3stico inicial (Gap An\u00e1lisis<br>vs. ISO\/IEC 27001:2022\/<br>CISC+NIST2)<br>-Taller de concientizaci\u00f3n en<br>Seguridad de la Informaci\u00f3n<br>-12 comunicados para uso<br>interno sobre ciber higiene<br>-Revisi\u00f3n inicial de informaci\u00f3n<br>dark y deep web.<br>-Ethical b\u00e1sico sitio principal.<br>-Revisi\u00f3n general de<br>cumplimiento legal chileno (Ley<br>21.459, Ley 19.628).<br>-Lista de verificaci\u00f3n de<br>cumplimiento b\u00e1sico<br>-Recomendaciones iniciales<br><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-8bba2f7a\">\n<div class=\"wp-block-uagb-info-box uagb-block-2liehili uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">RESULTADOS ESPERADOS<br>-Diagnostico base de<br>madurez en<br>ciberseguridad.<br>-Primer Plan de Acci\u00f3n<br>con Brechas y Prioridades.<br>&lt;&lt;&lt;&lt;&lt;<br>-Reporte Ejecutivo y<br>acompa\u00f1amiento<br>Directivo.<br><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-eliugfso alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-otndpvwg uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">SERVICIO 2<br>AVANZADO GESTI\u00d3N INTEGRAL<br>DEL SGSI<br><\/h3><\/div><p class=\"uagb-ifb-desc\">Objetivo: Generar una aplicaci\u00f3n integral del SGSI, incluyendo un enfoque de<br>riesgo tecnol\u00f3gico asociado a la gesti\u00f3n diaria de seguridad.<br><\/p><div class=\"uagb-ifb-separator\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-jgrahvvn\">\n<div class=\"wp-block-uagb-container uagb-block-antfjooq\">\n<div class=\"wp-block-uagb-info-box uagb-block-mqv2lzux uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 256 512\"><path d=\"M64 448c-8.188 0-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L178.8 256L41.38 118.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160c12.5 12.5 12.5 32.75 0 45.25l-160 160C80.38 444.9 72.19 448 64 448z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\"><strong>ALCANCE DEL SERVICIO<\/strong><br>-Gesti\u00f3n continua de riesgos (ISO\/IEC 27005)<br>-Evaluaci\u00f3n de ciberseguridad NICS + NIST 2.0<br>-Monitoreo de cumplimiento de controles<br>-Implementaci\u00f3n de seguridad en la nube (ISO\/IEC 27017)<br>-Evaluaci\u00f3n de privacidad conforme a ISO\/IEC 27701<br>-Plan de continuidad del negocio y respuesta a incidentes<br>-Auditor\u00edas internas y soporte externo<br>-Plan de concientizaci\u00f3n anual<br>-Ethical hacking superficie sitio principal + b\u00fasqueda de<br>informaci\u00f3n en dark y deep web<br><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-vhrg6ufe\">\n<div class=\"wp-block-uagb-info-box uagb-block-ecwikof1 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\"><strong>RESULTADOS ESPERADOS<\/strong><br>-Fortalecer Integral del SGSI<br>-Mejora del nivel de Ciberresilencia<br>-Cumplimiento y madurez organizacional<br><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-wkkk9qrm alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-da8zuk8e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">SERVICIO 3<br>EMPRESARIAL CIBER RESILIENCIA Y<br>SEGURIDAD DIGITAL INTEGRAL<br><\/h3><\/div><p class=\"uagb-ifb-desc\">Objetivo: Generar Resiliencia integrando el SGSI, la gobernanza, el<br>Compliance normativo legal y el tratamiento del riesgo como un<br>todo integrado.<br><\/p><div class=\"uagb-ifb-separator\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dt9x76mf\">\n<div class=\"wp-block-uagb-container uagb-block-f0xk0piz\">\n<div class=\"wp-block-uagb-info-box uagb-block-9k312hi0 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 256 512\"><path d=\"M64 448c-8.188 0-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L178.8 256L41.38 118.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160c12.5 12.5 12.5 32.75 0 45.25l-160 160C80.38 444.9 72.19 448 64 448z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\"><strong>ALCANCE DEL SERVICIO<\/strong><br>-Ciberseguridad avanzada (ISO\/IEC<br>27032)<br>-Plan de continuidad y resiliencia<br>-Simulaciones de ciber incidentes y<br>ejercicios de resiliencia<br>-Gobierno de datos personales (ISO\/IEC<br>27701)<br>-Integraci\u00f3n de ciberseguridad en la<br>estrategia corporativa<br>-Evaluaci\u00f3n de herramientas t\u00e9cnicas<br>-Arquitecturas cloud h\u00edbridas seguras<br>-Dise\u00f1o e implementaci\u00f3n de SOC \/<br>MDR<br>-Cumplimiento internacional<br>(GDPR,NIST, HIPAA, PCI-DSS)<br>-Automatizaci\u00f3n de auditor\u00edas y<br>monitoreo (GRC Tools)<br><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ixo55wwy\">\n<div class=\"wp-block-uagb-info-box uagb-block-gox77mtn uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\"><strong>RESULTADOS ESPERADOS<\/strong><br>-Resiliencia y madurez<br>organizacional avanzada<br>-Cumplimiento normativo y<br>protecci\u00f3n integral de datos<br>-Ciberdefensa proactiva y<br>automatizaci\u00f3n del control<br><\/p><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-gwkobzk2 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-2xxbmxw6 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">-Todos los niveles incluyen asesor\u00eda, documentaci\u00f3n y capacitaciones.<br>-Los niveles superiores incluyen y ampl\u00edan los servicios de los niveles previos.<br>-Personalizaci\u00f3n seg\u00fan el rubro (salud, educaci\u00f3n, banca, gobierno, etc.)<\/h3><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-yahd60oo\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-150","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/mvsconsultores.cl\/index.php\/author\/rodrigomvs\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/pages\/150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/comments?post=150"}],"version-history":[{"count":16,"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/pages\/150\/revisions"}],"predecessor-version":[{"id":176,"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/pages\/150\/revisions\/176"}],"wp:attachment":[{"href":"https:\/\/mvsconsultores.cl\/index.php\/wp-json\/wp\/v2\/media?parent=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}