{"id":6409,"date":"2021-02-26T11:57:11","date_gmt":"2021-02-26T10:57:11","guid":{"rendered":"https:\/\/edorteam.com\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"},"modified":"2026-05-04T17:28:17","modified_gmt":"2026-05-04T15:28:17","slug":"what-are-the-functions-of-the-information-security-officer-or-ciso","status":"publish","type":"post","link":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","title":{"rendered":"What are the functions of the Information Security Officer or CISO?"},"content":{"rendered":"<div class=\"et_pb_section_0 et_pb_section et_section_regular et_block_section\"><div class=\"et_pb_row_0 et_pb_row et_block_row\"><div class=\"et_pb_column_0 et_pb_column et_pb_column_4_4 et-last-child et_block_column et_pb_css_mix_blend_mode_passthrough\"><div class=\"et_pb_text_0 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><p>At our<strong><a href=\"https:\/\/nova.edorteam.com\/important-changes-in-company-cybersecurity-royal-decree-43-2021\/?lang=en\" target=\"_blank\" rel=\"noopener\"> previous entry<\/a><\/strong> We inform you of the entry into force of Royal Decree 43\/2021, by which all essential service companies and digital service providers must designate their<strong> Responsible for Information Security<\/strong> or<strong> CISO<\/strong> (<em> Chief Information Security Officer<\/em> ).<\/p>\n<p>Broadly speaking, this figure must be designated no later than April 27 of this year, and will be in charge of analyzing the state of cybersecurity of your company and presenting the relevant authorities <strong>Statement of Applicability<\/strong> , in addition to <strong>ensure compliance<\/strong> a posteriori (so it will not be a temporary figure, far from it).<\/p>\n<p>On July 27, the deadline for submitting the Declaration of Applicability ends. As of this date, companies that do not comply with these obligations may be inspected and sanctioned.<\/p>\n<p>The objective of this regulation is very clear: that essential companies <strong>achieve an adequate level of information security<\/strong> , considering that, being essential service companies such as energy, health, waste management or food, they must minimize their risks of suffering a cyber-incident that paralyzes their work activity.<\/p>\n<p>Last week we talked to you in detail about the<strong><a href=\"https:\/\/nova.edorteam.com\/important-changes-in-company-cybersecurity-royal-decree-43-2021\/?lang=en\" target=\"_blank\" rel=\"noopener\"> companies affected by RD 43\/2021<\/a><\/strong> . This week we want to explain the functions of the CISO or Head of Security.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"et_pb_section_1 et_pb_section et_section_regular et_block_section\"><div class=\"et_pb_row_1 et_pb_row et_block_row\"><div class=\"et_pb_column_1 et_pb_column et_pb_column_4_4 et-last-child et_block_column et_pb_css_mix_blend_mode_passthrough\"><div class=\"et_pb_text_1 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><h2>Questions and answers about the Information Security Officer or CISO<\/h2>\n<p>&nbsp;<\/p>\n<h3>What does a CISO or Security Manager do?<\/h3>\n<p>Its functions are contained in article 7 of RD 43\/2021, which establishes:<\/p>\n<ol>\n<li>Act as a point of contact with the competent authority in matters of supervision of the security requirements of networks and information systems.<\/li>\n<li>Act as a specialized point of contact for the coordination of incident management with the reference CSIRT.<\/li>\n<li>The following functions will be developed under your responsibility, among others:<\/li>\n<\/ol>\n<ul>\n<li>Prepare and propose a Cybersecurity Plan to be approved by the company. This plan must include the technical and organizational measures necessary to manage the risks detected regarding the security of the networks and information systems available to the company.<br \/>Its purpose is to prevent and minimize the effects of cyber incidents that could affect the company and its services. For more information, see the<a href=\"https:\/\/www.boe.es\/diario_boe\/txt.php?id=BOE-A-2021-1192\" target=\"_blank\" rel=\"noopener\"> Article 6 of RD 43\/2021<\/a> .<\/li>\n<li>Supervise and develop the application of security policies, regulations and procedures derived from the organization, supervise their effectiveness and carry out periodic security controls.<\/li>\n<li>Prepare the document of Declaration of Applicability of security measures in accordance with the provisions of article 6.2.<\/li>\n<li>Act as a promoter and trainer for good practices in the organization in cybersecurity.<\/li>\n<li>Send to the competent authority, through the reference CSIRT and without undue delay, notifications of incidents that have disturbing effects on the provision of essential services.<\/li>\n<li>Receive, interpret and supervise the application of the instructions and guides issued by the competent authority, both for the usual operations and for the correction of the deficiencies observed.<\/li>\n<li>Collect, prepare and supply information or documentation to the competent authority or the reference CSIRT, at its request or on its own initiative.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>As we explained on these lines, the figure of the CISO requires<strong> High capacities<\/strong> in information security and carries important responsibilities. The traditional profile of the \"IT company\" specializes and becomes much more complex. However, the Security Manager may rely on services provided by third parties (digital security companies and computer consulting) to fulfill their functions effectively and as required by law.<\/p>\n<p><a href=\"#Contact\">Count on Edorteam to guide your company in adapting to Royal Decree 43\/2021.<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"et_pb_section_2 et_pb_section et_section_regular et_block_section\"><div class=\"et_pb_row_2 et_pb_row et_block_row\"><div class=\"et_pb_column_2 et_pb_column et_pb_column_4_4 et-last-child et_block_column et_pb_css_mix_blend_mode_passthrough\"><div class=\"et_pb_text_2 et_pb_text et_pb_bg_layout_light et_pb_module et_block_module\"><div class=\"et_pb_text_inner\"><h3>Does the Safety Manager have to be a company employee?<\/h3>\n<p>Not necessarily, it can be a<strong> department, unit or collegiate body<\/strong> external to the company. However, a natural person must always be appointed as a representative and a substitute to assume his functions in cases of absence, vacancy or illness.<\/p>\n<p>Due to the nature and complexity of its functions, we recommend that the CISO of your company be a<strong> technical professional with specialized knowledge in computer security<\/strong> , to be able to be hired specifically for this position or, in any case, promoted to this new position after receiving the complementary training that he may need.<\/p>\n<p>The professional profile should have the following capabilities:<\/p>\n<ul>\n<li><strong>Advanced computer skills<\/strong> , if possible with a university degree in Computer Engineering or similar.<\/li>\n<li>Specialized knowledge and experience in<strong> cybersecurity<\/strong> from the organizational, technical and legal points of view.<\/li>\n<li>Ability to participate in all matters relating to security, maintaining a<strong> communication<\/strong> real and effective with the direction of the company.<\/li>\n<li>Capacity of<strong> independence<\/strong> with respect to those responsible for the company's networks and information systems.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Edorteam, as specialists in digital security with more than 25 years of experience, we will be a<strong> valuable support for your Security Manager<\/strong> helping him in his training and new functions.<\/p>\n<p>Our<strong> IT department<\/strong> It will not only be in charge of analyzing the cybersecurity of your company and identifying possible threats, it will also propose<strong> software solutions<\/strong> to meet the standards required by regulations. All under the supervision of our<strong> legal department<\/strong> , made up of lawyers and data protection specialists to guarantee full legal compliance.<\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":5260,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[113],"class_list":["post-6409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-security-of-the-information"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the functions of the Information Security Officer or CISO?<\/title>\n<meta name=\"description\" content=\"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the functions of the Information Security Officer or CISO?\" \/>\n<meta property=\"og:description\" content=\"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/\" \/>\n<meta property=\"og:site_name\" content=\"Edorteam\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edorteam\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-26T10:57:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T15:28:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nova.edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"672\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Edorteam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@edorteam\" \/>\n<meta name=\"twitter:site\" content=\"@edorteam\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edorteam\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/\"},\"author\":{\"name\":\"Edorteam\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/person\\\/4bb44f6c1a9e5938ce0a0e863b0c85dd\"},\"headline\":\"What are the functions of the Information Security Officer or CISO?\",\"datePublished\":\"2021-02-26T10:57:11+00:00\",\"dateModified\":\"2026-05-04T15:28:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/\"},\"wordCount\":11,\"commentCount\":11,\"publisher\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/consultoria-juridica-legaltech.jpg\",\"keywords\":[\"security of the information\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/\",\"name\":\"What are the functions of the Information Security Officer or CISO?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/consultoria-juridica-legaltech.jpg\",\"datePublished\":\"2021-02-26T10:57:11+00:00\",\"dateModified\":\"2026-05-04T15:28:17+00:00\",\"description\":\"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/consultoria-juridica-legaltech.jpg\",\"contentUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/consultoria-juridica-legaltech.jpg\",\"width\":1600,\"height\":672},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/what-are-the-functions-of-the-information-security-officer-or-ciso\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the functions of the Information Security Officer or CISO?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/\",\"name\":\"Consultor\u00eda Compliance y protecci\u00f3n de datos\",\"description\":\"Empresa de Ciberseguridad y Protecci\u00f3n de Datos\",\"publisher\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#organization\"},\"alternateName\":\"Edorteam\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#organization\",\"name\":\"Edorteam | Cibersecurity services and data protection company\",\"alternateName\":\"Edorteam\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/cropped-favicon.png\",\"contentUrl\":\"https:\\\/\\\/nova.edorteam.com\\\/wp-content\\\/uploads\\\/cropped-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Edorteam | Cibersecurity services and data protection company\"},\"image\":{\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/edorteam\\\/\",\"https:\\\/\\\/x.com\\\/edorteam\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/edorteam\\\/\",\"https:\\\/\\\/www.instagram.com\\\/edorteam\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/#\\\/schema\\\/person\\\/4bb44f6c1a9e5938ce0a0e863b0c85dd\",\"name\":\"Edorteam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g\",\"caption\":\"Edorteam\"},\"sameAs\":[\"http:\\\/\\\/edorteam.com\"],\"url\":\"https:\\\/\\\/nova.edorteam.com\\\/en\\\/author\\\/web_edorteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the functions of the Information Security Officer or CISO?","description":"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What are the functions of the Information Security Officer or CISO?","og_description":"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?","og_url":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","og_site_name":"Edorteam","article_publisher":"https:\/\/www.facebook.com\/edorteam\/","article_published_time":"2021-02-26T10:57:11+00:00","article_modified_time":"2026-05-04T15:28:17+00:00","og_image":[{"width":1600,"height":672,"url":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","type":"image\/jpeg"}],"author":"Edorteam","twitter_card":"summary_large_image","twitter_creator":"@edorteam","twitter_site":"@edorteam","twitter_misc":{"Written by":"Edorteam"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#article","isPartOf":{"@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"},"author":{"name":"Edorteam","@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/person\/4bb44f6c1a9e5938ce0a0e863b0c85dd"},"headline":"What are the functions of the Information Security Officer or CISO?","datePublished":"2021-02-26T10:57:11+00:00","dateModified":"2026-05-04T15:28:17+00:00","mainEntityOfPage":{"@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"},"wordCount":11,"commentCount":11,"publisher":{"@id":"https:\/\/nova.edorteam.com\/en\/#organization"},"image":{"@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","keywords":["security of the information"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","url":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/","name":"What are the functions of the Information Security Officer or CISO?","isPartOf":{"@id":"https:\/\/nova.edorteam.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage"},"image":{"@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage"},"thumbnailUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","datePublished":"2021-02-26T10:57:11+00:00","dateModified":"2026-05-04T15:28:17+00:00","description":"Answers about the CISO or Information Security Officer: what does he do? its duties? What profile should it be?","breadcrumb":{"@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#primaryimage","url":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","contentUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/consultoria-juridica-legaltech.jpg","width":1600,"height":672},{"@type":"BreadcrumbList","@id":"https:\/\/nova.edorteam.com\/en\/what-are-the-functions-of-the-information-security-officer-or-ciso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/nova.edorteam.com\/en\/"},{"@type":"ListItem","position":2,"name":"What are the functions of the Information Security Officer or CISO?"}]},{"@type":"WebSite","@id":"https:\/\/nova.edorteam.com\/en\/#website","url":"https:\/\/nova.edorteam.com\/en\/","name":"Consultor\u00eda Compliance y protecci\u00f3n de datos","description":"Empresa de Ciberseguridad y Protecci\u00f3n de Datos","publisher":{"@id":"https:\/\/nova.edorteam.com\/en\/#organization"},"alternateName":"Edorteam","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nova.edorteam.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nova.edorteam.com\/en\/#organization","name":"Edorteam | Cibersecurity services and data protection company","alternateName":"Edorteam","url":"https:\/\/nova.edorteam.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/cropped-favicon.png","contentUrl":"https:\/\/nova.edorteam.com\/wp-content\/uploads\/cropped-favicon.png","width":512,"height":512,"caption":"Edorteam | Cibersecurity services and data protection company"},"image":{"@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edorteam\/","https:\/\/x.com\/edorteam","https:\/\/www.linkedin.com\/company\/edorteam\/","https:\/\/www.instagram.com\/edorteam\/"]},{"@type":"Person","@id":"https:\/\/nova.edorteam.com\/en\/#\/schema\/person\/4bb44f6c1a9e5938ce0a0e863b0c85dd","name":"Edorteam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e28be36471774aba19e1b15aa24a52aa2d8955a536897526f71cec2370a0a24?s=96&d=blank&r=g","caption":"Edorteam"},"sameAs":["http:\/\/edorteam.com"],"url":"https:\/\/nova.edorteam.com\/en\/author\/web_edorteam\/"}]}},"_links":{"self":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/comments?post=6409"}],"version-history":[{"count":2,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6409\/revisions"}],"predecessor-version":[{"id":20296,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/posts\/6409\/revisions\/20296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/media\/5260"}],"wp:attachment":[{"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/media?parent=6409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/categories?post=6409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nova.edorteam.com\/en\/wp-json\/wp\/v2\/tags?post=6409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}