{"id":4260,"date":"2021-09-14T20:15:49","date_gmt":"2021-09-14T18:15:49","guid":{"rendered":"https:\/\/www.exartia.net\/?page_id=4260"},"modified":"2021-09-16T09:18:41","modified_gmt":"2021-09-16T07:18:41","slug":"seguretat-tecnica-avancada","status":"publish","type":"page","link":"https:\/\/www.exartia.net\/ca\/seguretat-informatica\/seguretat-tecnica-avancada\/","title":{"rendered":"Seguretat T\u00e8cnica Avan\u00e7ada"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:200px;--awb-padding-bottom:200px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#eeeeee;--awb-background-image:url(&quot;https:\/\/www.exartia.net\/wp-content\/uploads\/SeguridadTecnicaAvanzada.jpg&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility\" style=\"--awb-bg-size:cover;width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-animated\" style=\"--awb-bg-size:cover;--awb-margin-top:40px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility\" style=\"--awb-bg-size:cover;width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top:40px;--awb-font-size:30px;\"><h1 class=\"fusion-title-heading title-heading-center\" style=\"margin:0;font-size:1em;\"><h1 class=\"entry-title\">Seguretat T\u00e8cnica Avan\u00e7ada<\/h1><\/h1><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:40px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:20px;--awb-margin-bottom:0px;--awb-font-size:20px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h3 class=\"widget-title\">Hacking \u00c8tic<\/h3><\/h3><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #d60707;\">Parlem dels riscos.<\/span><br \/>\nQualsevol entitat, en major o menor mesura, es troba subjecta a sofrir diferents tipus d&#8217;atac per part d&#8217;un tercer.<\/p>\n<p><span style=\"color: #d60707;\">Atacs externs o interns.<\/span><br \/>\nDuts a terme per alg\u00fa vinculat a l&#8217;entitat o totalment desconegut. Provocant el cessament d&#8217;un servei o realitzant un frau inform\u00e0tic, des d&#8217;Internet, la xarxa interna o utilitzant tecnologies m\u00f2bils.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><p><span style=\"color: #d60707;\">I proposem solucions.<\/span><br \/>\nAvan\u00e7ades t\u00e8cniques d&#8217;intrusi\u00f3.<br \/>\nEines pr\u00f2pies i comercials.<br \/>\nUn elevat coneixement per part de l&#8217;equip.<\/p>\n<p><span style=\"color: #d60707;\">exartia<\/span> minimitza aquests riscos a trav\u00e9s d&#8217;un hacking \u00e8tic, coneixent i resolent per endavant qualsevol tipus de via d&#8217;intrusi\u00f3 a la qual pot una entitat estar exposada.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:50px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><style type='text\/css'>.reading-box-container-1 .element-bottomshadow:before,.reading-box-container-1 .element-bottomshadow:after{opacity:0.70;}<\/style><div class=\"fusion-reading-box-container reading-box-container-1 CajasResaltadas\" style=\"--awb-title-color:#333333;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"reading-box\" style=\"background-color:#efefef;border-width:1px;border-color:#f6f6f6;border-left-width:3px;border-left-color:var(--primary_color);border-style:solid;\"><div class=\"reading-box-additional\">\n<p>Un servei de qualitat amb l&#8217;\u00e9s possible identificar i solucionar les principals vulnerabilitats de qualsevol plataforma.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:20px;--awb-margin-bottom:0px;--awb-font-size:20px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h3 class=\"widget-title\">Test d&#8217;Aplicaci\u00f3<\/h3><\/h3><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><p>Avui dia existeixen una s\u00e8rie de condicionants que fan que les aplicacions d&#8217;una entitat hagin de ser preses en major consideraci\u00f3 que altres aspectes de la seguretat com a Sistemes Operatius o Comunicacions.<\/p>\n<p>Algunes febleses t\u00edpiques s\u00f3n:<\/p>\n<ul>\n<li>No disposar d&#8217;un firewall efectiu, qualsevol pot arribar fins a la validaci\u00f3, on residir\u00e0 tota la seguretat.<\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-4\"><ul>\n<li>No basar l&#8217;objectiu del desenvolupament en la seguretat sin\u00f3 en la funcionalitat i facilitat, ja que sol dur-se a terme per personal intern.<\/li>\n<li>No tenir en compte que en l&#8217;aplicaci\u00f3 \u00e9s on resideixen les dades de negoci, i per tant, es converteix en el punt m\u00e9s atraient a vulnerar.<\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:50px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><style type='text\/css'>.reading-box-container-2 .element-bottomshadow:before,.reading-box-container-2 .element-bottomshadow:after{opacity:0.70;}<\/style><div class=\"fusion-reading-box-container reading-box-container-2 CajasResaltadas\" style=\"--awb-title-color:#333333;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"reading-box\" style=\"background-color:#efefef;border-width:1px;border-color:#f6f6f6;border-left-width:3px;border-left-color:var(--primary_color);border-style:solid;\"><div class=\"reading-box-additional\">\n<p>Per a sumar seguretat exartia recomana realitzar proves espec\u00edfiques peri\u00f2diques per a aquestes aplicacions, ja siguin de home banking, retail, e-commerce o Intranets.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:20px;--awb-margin-bottom:0px;--awb-font-size:20px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h3 class=\"widget-title\">Defensa Activa<\/h3><\/h3><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-5\"><p><span style=\"color: #d60707;\">Productes efica\u00e7os amb la garantia exartia.<\/span><br \/>\nDesenvolupats des del nostre departament d&#8217;I+D+i perqu\u00e8 la seva entitat estigui sempre protegida.<\/p>\n<p><span style=\"color: #d60707;\">T\u00e8cniques de Forensics Readiness<\/span> per a recollir evid\u00e8ncies, fins i tot judicials, enfront d&#8217;un incident garantint la seva cadena de cust\u00f2dia.<\/p>\n<p><span style=\"color: #d60707;\">HoneyPots<\/span> intel\u00b7ligents, cimbells que atreuen i bloquegen intrusos en una xarxa.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-6\"><p><span style=\"color: #d60707;\">T\u00e8cniques avan\u00e7ades anti-phishing<\/span> que ofereixen una soluci\u00f3 efica\u00e7 davant aquests atacs.<\/p>\n<p>Mecanismes actius de defensa dissenyats per a desenvolupar procediments de resposta enfront d&#8217;un incident espec\u00edfic. Perqu\u00e8 hagi valorat l&#8217;impacte que aquest incident pugui tenir en el negoci i estigui sempre preparat.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:50px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><style type='text\/css'>.reading-box-container-3 .element-bottomshadow:before,.reading-box-container-3 .element-bottomshadow:after{opacity:0.70;}<\/style><div class=\"fusion-reading-box-container reading-box-container-3 CajasResaltadas\" style=\"--awb-title-color:#333333;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"reading-box\" style=\"background-color:#efefef;border-width:1px;border-color:#f6f6f6;border-left-width:3px;border-left-color:var(--primary_color);border-style:solid;\"><div class=\"reading-box-additional\">\n<p>Per a garantir la correcta implantaci\u00f3 de qualsevol desenvolupament i establir un nivell m\u00ednim est\u00e0ndard en tota la plataforma.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:20px;--awb-margin-bottom:0px;--awb-font-size:20px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h3 class=\"widget-title\">Bastionado d&#8217;equips i aplicacions<\/h3><\/h3><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-7\"><p>Al llarg del Cicle de Vida de Desenvolupament d&#8217;Aplicacions i posada en producci\u00f3 de serveis, existeixen diferents fases on \u00e9s necessari establir controls de seguretat per a garantir la integritat i la seguretat del servei. Unes accions que comencen en el mateix disseny funcional de l&#8217;aplicaci\u00f3, i que es mantenen fins a passada la seva posada en producci\u00f3.<\/p>\n<p><span style=\"color: #d60707;\">exartia li proposa una metodologia pr\u00f2pia.<\/span><br \/>\nQue permet aconseguir aquests objectius reduint les principals vulnerabilitats, securizant completament els equips i \u201ccertificant\u201d qualsevol servei que hagi de ser posat en producci\u00f3.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last\" style=\"--awb-bg-size:cover;width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-8\"><p><span style=\"color: #d60707;\">Obri la seva entitat a solucions espec\u00edfiques.<\/span><br \/>\nManual de desenvolupament segur,<br \/>\nDisseny segur d&#8217;aplicacions,<br \/>\nBastionat del Sistema Operatiu,<br \/>\nAn\u00e0lisi en pre-producci\u00f3 o revisions peri\u00f2diques.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-background-color:#e5e5e5;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-19 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-clean-vertical content-left content-boxes-icon-on-top AsignarMismaAlturaContentBoxSeguridadInformatica2\" style=\"--awb-iconcolor:#5f616f;--awb-hover-accent-color:#d60707;--awb-circle-hover-accent-color:transparent;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#ffffff;--awb-iconcolor:#5f616f;border-color:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon link-type-button-bar icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" href=\"https:\/\/www.exartia.net\/ca\/seguretat-informatica\/assessorament-estrategic\/\" target=\"_self\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" src=\"https:\/\/www.exartia.net\/wp-content\/uploads\/AsesoramientoEstrategico.jpg\" width=\"300\" height=\"123.15\" alt=\"\" \/><\/div><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:18px;line-height:23px;\">Assessorament Estrat\u00e8gic<\/h2><\/a><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p style=\"text-align: left;\">Projectes relacionats amb la planificaci\u00f3 i presa de decisi\u00f3 per a abordar accions espec\u00edfiques que contemplin la seguretat dels Sistemes Inform\u00e0tics, com ara Plans Directors, Selecci\u00f3 d&#8217;Eines, Consultoria Tecnol\u00f2gica, etc.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><a class=\" fusion-read-more fusion-button-bar\" href=\"https:\/\/www.exartia.net\/ca\/seguretat-informatica\/assessorament-estrategic\/\" target=\"_self\">M\u00e9s informaci\u00f3<\/a><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-20 fusion_builder_column_1_3 1_3 fusion-one-third\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-2 content-boxes-clean-vertical content-left content-boxes-icon-on-top AsignarMismaAlturaContentBoxSeguridadInformatica2\" style=\"--awb-iconcolor:#5f616f;--awb-hover-accent-color:#d60707;--awb-circle-hover-accent-color:transparent;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#ffffff;--awb-iconcolor:#5f616f;border-color:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon link-type-button-bar icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" href=\"https:\/\/www.exartia.net\/ca\/seguretat-informatica\/gestio-del-risc\/\" target=\"_self\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" src=\"https:\/\/www.exartia.net\/wp-content\/uploads\/GestionDelRiesgo.jpg\" width=\"300\" height=\"165\" alt=\"\" \/><\/div><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:18px;line-height:23px;\">Gesti\u00f3 del Risc de les TIC<\/h2><\/a><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p style=\"text-align: left;\">Treballs que ajuden a identificar, quantificar i resoldre les principals amenaces inform\u00e0tiques que afecten directament el Negoci. Entre aquests destaquen els Plans de Continu\u00eftat, An\u00e0lisi de Riscos, Quadres de Comandament o els Sistemes de Gesti\u00f3 de la Seguretat de la Informaci\u00f3.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><a class=\" fusion-read-more fusion-button-bar\" href=\"https:\/\/www.exartia.net\/ca\/seguretat-informatica\/gestio-del-risc\/\" target=\"_self\">M\u00e9s informaci\u00f3<\/a><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-21 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-3 content-boxes-clean-vertical content-left content-boxes-icon-on-top AsignarMismaAlturaContentBoxSeguridadInformatica2\" style=\"--awb-iconcolor:#5f616f;--awb-hover-accent-color:#d60707;--awb-circle-hover-accent-color:transparent;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#ffffff;--awb-iconcolor:#5f616f;border-color:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon link-type-button-bar icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" href=\"https:\/\/www.exartia.net\/ca\/seguretat-informatica\/assessorament-regulador\/\" target=\"_self\"><div aria-hidden=\"true\" class=\"image\"><img decoding=\"async\" src=\"https:\/\/www.exartia.net\/wp-content\/uploads\/AsesoramientoRegulatorio.jpg\" width=\"300\" height=\"168.9\" alt=\"\" \/><\/div><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:18px;line-height:23px;\">Assessorament Regulador<\/h2><\/a><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p style=\"text-align: left;\">Projectes que contemplen com afecta qualsevol tipus de llei o norma (ja sigui nacional o internacional) als sistemes d&#8217;informaci\u00f3, i ajuden l&#8217;Entitat a adaptar-se al seu compliment. Entre aquestes destaquen la RGPD, LSSI-CE, LMISI, PCI-DSS, SOX, Basilea II, etc.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><a class=\" fusion-read-more fusion-button-bar\" href=\"https:\/\/www.exartia.net\/ca\/seguretat-informatica\/assessorament-regulador\/\" target=\"_self\">M\u00e9s informaci\u00f3<\/a><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4223,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-4260","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/pages\/4260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/comments?post=4260"}],"version-history":[{"count":8,"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/pages\/4260\/revisions"}],"predecessor-version":[{"id":4320,"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/pages\/4260\/revisions\/4320"}],"up":[{"embeddable":true,"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/pages\/4223"}],"wp:attachment":[{"href":"https:\/\/www.exartia.net\/ca\/wp-json\/wp\/v2\/media?parent=4260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}