{"id":878,"date":"2023-07-03T10:48:05","date_gmt":"2023-07-03T13:48:05","guid":{"rendered":"https:\/\/web1.informatica.unc.edu.ar\/?p=878"},"modified":"2023-07-25T12:20:37","modified_gmt":"2023-07-25T15:20:37","slug":"playbook-que-es-y-por-que-es-necesario-armar-y-tener-un-manual-de-procedimientos-en-ciberseguridad","status":"publish","type":"post","link":"https:\/\/web1.informatica.unc.edu.ar\/2023\/07\/03\/playbook-que-es-y-por-que-es-necesario-armar-y-tener-un-manual-de-procedimientos-en-ciberseguridad\/","title":{"rendered":"Playbook: \u00bfQu\u00e9 es y por qu\u00e9 es necesario armar y tener un manual de procedimientos en ciberseguridad?"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t