

{"id":2,"date":"2023-09-20T21:14:57","date_gmt":"2023-09-20T19:14:57","guid":{"rendered":"https:\/\/www.uajms.edu.bo\/uartic25\/?page_id=2"},"modified":"2025-12-02T16:49:34","modified_gmt":"2025-12-02T15:49:34","slug":"inicio","status":"publish","type":"page","link":"https:\/\/www.uajms.edu.bo\/uartic25\/","title":{"rendered":"Inicio"},"content":{"rendered":"\n<!DOCTYPE html>\n<html lang=\"es\">\n<head>\n  <meta charset=\"UTF-8\" \/>\n  <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\" \/>\n  <title>UARTIC 2025<\/title>\n<\/head>\n\n<body>\n<!-- Cabecera para computadoras -->\n<header class=\"header header-desktop\">\n  <div class=\"hero-header\">\n    <img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/Copia-de-UARTIC25.gif\" class=\"hero-img\">\n  <\/div>\n<\/header>\n<!-- Cabecera para celulares -->\n<header class=\"header header-mobile\">\n  <div class=\"hero-header\">\n    <img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/Copia-de-UARTIC-800-x-800-px.gif\" class=\"hero-img\">\n  <\/div>\n<\/header>\n<!-- INICIO -->\n<section id=\"inicio\" class=\"section\">\n  <div class=\"container card\">\n    <h2 class=\"section-title\">Seguridad Digital \u2014 Asegurando el Futuro<\/h2>\n    <p>UARTIC 2025 es un encuentro acad\u00e9mico y tecnol\u00f3gico que re\u00fane a expertos, estudiantes y profesionales para abordar los desaf\u00edos m\u00e1s actuales de la <strong>ciberseguridad y la transformaci\u00f3n digital<\/strong>. Durante dos jornadas, el evento ofrecer\u00e1 conferencias especializadas, demostraciones tecnol\u00f3gicas y espacios de intercambio estrat\u00e9gico. Impulsando la construcci\u00f3n de un entorno digital m\u00e1s seguro, innovador y resiliente.\n    <\/p>\n  <\/div>\n<\/section>\n<section class=\"section\">\n      <div class=\"container card\">\n        <h3>Video Oficial<\/h3>\n        <iframe \n\t\t\twidth=\"1920\" \n\t\t\theight=\"1080\" \n\t\t\tsrc=\"https:\/\/www.youtube.com\/embed\/s32b6_ISz20\" \n\t\t\ttitle=\"UARTIC 2025 - CICLO DE CONFERENCIAS\" \n\t\t\tframeborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" \n\t\t\treferrerpolicy=\"strict-origin-when-cross-origin\" \n\t\t\tallowfullscreen\n\t\t\tstyle=\"display: block; margin-top: 20px; margin-bottom: 20px; max-width: 100%;\">\n\t\t<\/iframe>\n      <\/div>\n<\/section>\n<section class=\"section\">\n      <div class=\"container card\">\n        <h3>Ubicaci\u00f3n<\/h3>\n\t\t<iframe src=\"https:\/\/www.google.com\/maps\/d\/u\/0\/embed?mid=1_FRVBcG6U2zY3Z_ZwLkAYyEaH-uwdlQ&#038;ehbc=2E312F&#038;noprof=1\" width=\"100%\" height=\"400\"><\/iframe>\n        <p>Campus Universitario zona El Tejar &#8211; Tarija\n        <br>dtic@uajms.edu.bo\n        <br>+591 68706124<\/p>\n      <\/div> \n<\/section>\n<!-- CONFERENCIAS -->\n<section id=\"conferencias\" class=\"section\">\n  <div class=\"hero-header\">\n    <img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/3.jpg\" class=\"hero-img\">\n  <\/div>\n  <div class=\"container card\">\n\t<p>El Ciclo de Conferencias de UARTIC 2025 ofrece un espacio acad\u00e9mico abierto a estudiantes, profesionales y p\u00fablico interesado en los desaf\u00edos actuales de la ciberseguridad. Con acceso <strong>totalmente libre<\/strong>, este ciclo re\u00fane a expertos y representantes del sector tecnol\u00f3gico para analizar tendencias, estrategias y soluciones innovadoras orientadas a fortalecer la protecci\u00f3n digital. Las conferencias brindan una oportunidad \u00fanica para adquirir conocimientos relevantes y entender el papel clave de la seguridad de la informaci\u00f3n en el desarrollo institucional y social.<\/p>\n    <p>Programa del evento. Haz clic en un conferencista para ver su ficha.<\/p>\n\t<p><\/p><h3>Mi\u00e9rcoles 3 de Diciembre<\/h3>\n    <div class=\"conference-list\">\n      <label class=\"conference-card\" for=\"modal1\">\n        <div class=\"conf-time\">08:30<\/div>\n        <div class=\"conf-info\">\n          <h3>Inauguraci\u00f3n<\/h3>\n          <p>Comit\u00e9 Organizador<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/4-1.jpg')\"><\/div>\n          <div>\n            <strong>Raquel Jalil<\/strong><br>\n            <span>Directora \/ DTIC &#8211; UAJMS<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal1\">\n        <div class=\"conf-time\">08:50<\/div>\n        <div class=\"conf-info\">\n          <h3>Infraestructura de Sistemas Inform\u00e1ticos en la UAJMS<\/h3>\n          <p>DTIC &#8211; UAJMS<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/12\/teo-copa.jpg')\"><\/div>\n          <div>\n            <strong>Te\u00f3filo Copa Fern\u00e1ndez<\/strong><br>\n            <span>Jefe de Sistemas de Informaci\u00f3n<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal1\">\n        <div class=\"conf-time\">09:20<\/div>\n        <div class=\"conf-info\">\n          <h3>Sistema de Calificaci\u00f3n de M\u00e9ritos SICAM UAJMS<\/h3>\n          <p>Sistemas de Informaci\u00f3n DTIC &#8211; UAJMS<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/12\/oscar-salinas.jpg')\"><\/div>\n          <div>\n            <strong>Oscar Jos\u00e9 Salinas Garc\u00eda<\/strong><br>\n            <span>Analista Programador de Sistemas<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal1\">\n        <div class=\"conf-time\">09:40<\/div>\n        <div class=\"conf-info\">\n          <h3>Sistema Acad\u00e9mico para el Instituto de Idiomas de la UAJMS<\/h3>\n          <p>Sistemas de Informaci\u00f3n DTIC &#8211; UAJMS<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/12\/7-1.jpg')\"><\/div>\n          <div>\n            <strong>Yeni Zenteno Choque<\/strong><br>\n            <span>Analista Programadora de Sistemas<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal2\">\n        <div class=\"conf-time\">10:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Visi\u00f3n y Direcci\u00f3n Estrat\u00e9gica<\/h3>\n          <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/2.jpg')\"><\/div>\n          <div>\n            <strong>Johanny Granda Guerrero<\/strong><br>\n            <span>Regional Account Manager Peru &#038; Bolivia<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal3\">\n        <div class=\"conf-time\">11:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Protecci\u00f3n de las Redes Inform\u00e1ticas (NGFW) y Presi\u00f3n IA<\/h3>\n\t\t  <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/Hector-Pessolano.jpg')\"><\/div>\n          <div>\n            <strong>H\u00e9ctor Pessolano<\/strong><br>\n            <span>Domain Consultant Latam &#8211; Strata<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal4\">\n        <div class=\"conf-time\">12:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Acceso Remoto Seguro (ZTNA) + SASE<\/h3>\n\t\t  <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/1.jpg')\"><\/div>\n          <div>\n            <strong>Luis Guti\u00e9rrez<\/strong><br>\n            <span>Domain Consultant Latam &#8211; SASE<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal5\">\n        <div class=\"conf-time\">13:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Almuerzo<\/h3>\n          <p><\/p>\n        <\/div>\n\t  <\/label>\n      <label class=\"conference-card\" for=\"modal6\">\n        <div class=\"conf-time\">15:00<\/div>\n        <div class=\"conf-info\">\n          <h3>El Navegador Web: La nueva frontera a proteger (PAB)<\/h3>\n          <p>Palo Alto Networks<\/p>\n          <p><\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/1.jpg')\"><\/div>\n          <div>\n            <strong>Luis Guti\u00e9rrez<\/strong><br>\n            <span>Domain Consultant Latam &#8211; SASE<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal7\">\n        <div class=\"conf-time\">16:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Protecci\u00f3n de Datos (CASB + DLP)<\/h3>\n          <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/1.jpg')\"><\/div>\n          <div>\n            <strong>Luis Guti\u00e9rrez<\/strong><br>\n            <span>Domain Consultant Latam &#8211; SASE<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal8\">\n        <div class=\"conf-time\">17:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Protecci\u00f3n de Dispositivos (CDSS Device Security)<\/h3>\n          <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/3-1.jpg')\"><\/div>\n          <div>\n            <strong>H\u00e9ctor Pessolano<\/strong><br>\n            <span>Domain Consultant Latam &#8211; Strata<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal9\">\n        <div class=\"conf-time\">18:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Gesti\u00f3n y Anal\u00edtica Centralizada Potenciada por IA (SCM PRO) + Quantum Security<\/h3>\n\t      <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/Hector-Pessolano.jpg')\"><\/div>\n          <div>\n            <strong>H\u00e9ctor Pessolano<\/strong><br>\n            <span>Domain Consultant Latam &#8211; Strata<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n\t  <label class=\"conference-card\" for=\"modal10\">\n        <div class=\"conf-time\">19:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Cena<\/h3>\n        <\/div>\n      <\/label>\n\t<p><\/p><h3>Jueves 4 de Diciembre<\/h3>\n      <label class=\"conference-card\" for=\"modal11\">\n        <div class=\"conf-time\">09:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Protecci\u00f3n, Detecci\u00f3n y Respuesta Avanzada en los Endpoints e Email (XSIAM: Cortex XDR &#038; Email Security)<\/h3>\n          <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/1.jpg')\"><\/div>\n          <div>\n            <strong>Luis Guti\u00e9rrez<\/strong><br>\n            <span>Domain Consultant Latam &#8211; SASE<\/span>\n          <\/div>\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/Hector-Pessolano.jpg')\"><\/div>\n          <div>\n            <strong>H\u00e9ctor Pessolano<\/strong><br>\n            <span>Domain Consultant Latam &#8211; Strata<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal12\">\n        <div class=\"conf-time\">10:00<\/div>\n        <div class=\"conf-info\">\n          <h3>CiberSOC Aut\u00f3nomo &#8211; C\u00f3mo acercar a nuestros equipos a la detecci\u00f3n y respuesta r\u00e1pida con IA (XSIAM: SIEM, SOAR)<\/h3>\n          <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/1.jpg')\"><\/div>\n          <div>\n            <strong>Luis Guti\u00e9rrez<\/strong><br>\n            <span>Domain Consultant Latam &#8211; SASE<\/span>\n          <\/div>\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/Hector-Pessolano.jpg')\"><\/div>\n          <div>\n            <strong>H\u00e9ctor Pessolano<\/strong><br>\n            <span>Domain Consultant Latam &#8211; Strata<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal13\">\n        <div class=\"conf-time\">11:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Unit-41, El \u00abSeguro de Vida\u00bb ante un Ciberataque<\/h3>\n          <p>Palo Alto Networks<\/p>\n        <\/div>\n        <div class=\"speaker-box\">\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/1.jpg')\"><\/div>\n          <div>\n            <strong>Luis Guti\u00e9rrez<\/strong><br>\n            <span>Domain Consultant Latam &#8211; SASE<\/span>\n          <\/div>\n          <div class=\"speaker-photo\" style=\"background-image:url('\/wp-content\/uploads\/sites\/108\/2025\/11\/Hector-Pessolano.jpg')\"><\/div>\n          <div>\n            <strong>H\u00e9ctor Pessolano<\/strong><br>\n            <span>Domain Consultant Latam &#8211; Strata<\/span>\n          <\/div>\n        <\/div>\n      <\/label>\n      <label class=\"conference-card\" for=\"modal14\">\n        <div class=\"conf-time\">12:00<\/div>\n        <div class=\"conf-info\">\n          <h3>Cierre del Evento<\/h3>\n          <p>Comit\u00e9 Organizador<\/p>\n        <\/div>\n\t  <\/label>\n  <\/div>\n<\/section>\n<!-- CERTIFICADO -->\n<section id=\"certificado\" class=\"section\">\n  <div class=\"hero-header\">\n    <img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/solicita-certificado.jpg\" class=\"hero-img\">\n  <\/div>\n  <div class=\"container card\">\n\t<p>La participaci\u00f3n en el Ciclo de Conferencias de UARTIC 2025 es libre, solo los asistentes que deseen obtener el <strong>certificado de participaci\u00f3n con valor curricular<\/strong> podr\u00e1n solicitarlo pagando un costo m\u00ednimo (disponible para todos quienes completen su registro y asistencia).<br>Los interesados en obtener este certificado deben unirse al grupo de WhatsApp oficial del evento, donde recibir\u00e1n la informaci\u00f3n y el acompa\u00f1amiento necesario para completar su solicitud.<\/p>\n    <a class=\"btn\" target=\"_blank\" href=\"https:\/\/chat.whatsapp.com\/CI8z6K0a7uK83774Ntsiyk\">Unirme al grupo de WhatsApp<\/a>\n  <\/div>\n<\/section>\n<!-- REUNI\u00d3N DE DIRECTORES -->\n<section id=\"reunion\" class=\"section\">\n      <div class=\"hero-header\">\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/4.jpg\" class=\"hero-img\">\n      <\/div>\n\t  <div class=\"container card\">\n\t  <p>La Reuni\u00f3n de Directores TIC constituye un espacio estrat\u00e9gico de an\u00e1lisis y toma de decisiones orientado al fortalecimiento de la seguridad digital en la instituci\u00f3n. En esta sesi\u00f3n, los responsables de las \u00e1reas tecnol\u00f3gicas abordar\u00e1n la formulaci\u00f3n y alineaci\u00f3n del <strong>Plan Institucional de Seguridad de la Informaci\u00f3n (PISI)<\/strong>, un instrumento clave para garantizar la protecci\u00f3n integral de los datos, la continuidad operativa y la gobernanza tecnol\u00f3gica.\nA trav\u00e9s del intercambio de criterios, la evaluaci\u00f3n de riesgos y la definici\u00f3n de lineamientos comunes, esta reuni\u00f3n busca consolidar una visi\u00f3n institucional unificada para implementar pol\u00edticas, est\u00e1ndares y mecanismos de seguridad acordes a los desaf\u00edos actuales.\n      <\/p>\n\t  <\/div>\n<\/section>\n<!-- CENA -->\n<section id=\"cena\" class=\"section\">\n\t<div class=\"hero-header\">\n       <img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/n-CENA.jpg\" class=\"hero-img\">\n    <\/div>\n    <div class=\"container card\">\n    <p>La Cena Aniversario DTIC conmemora los <strong>24 a\u00f1os de trayectoria<\/strong> de la Direcci\u00f3n de Tecnolog\u00edas de la Informaci\u00f3n y Comunicaci\u00f3n, un espacio donde autoridades, invitados especiales, profesionales y colaboradores se re\u00fanen para celebrar los logros alcanzados y renovar el compromiso con la innovaci\u00f3n tecnol\u00f3gica institucional. Este encuentro festivo ofrece un ambiente de camarader\u00eda, integraci\u00f3n y reconocimiento al trabajo realizado a lo largo de estos a\u00f1os, marcando un hito especial dentro de las actividades de UARTIC 2025.<\/p>\n    <p>\u00danete al grupo de WhatsApp oficial del evento si deseas participar de la cena.<\/p>\n\t<a class=\"btn\" target=\"_blank\" href=\"https:\/\/chat.whatsapp.com\/CI8z6K0a7uK83774Ntsiyk\">Unirme al grupo de WhatsApp<\/a>\n    <\/div>\n<\/section>\n<!-- AUSPICIADORES -->\n<section id=\"auspiciadores\" class=\"section\">\n    <div class=\"card sponsors\">\n      <h2>Auspiciadores<\/h2>\n      <div class=\"sponsor-grid1\">\n        <div class=\"sponsor-box1\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/palo-alto-aus.jpg\"><\/div>\n        <div class=\"sponsor-box1\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/sites\/108\/2025\/11\/cloud-IT-aus.jpg\"><\/div>\n      <\/div>\n    <\/div>\n<\/section>\n<footer class=\"footer\">\u00a9 UAJMS \u00b7 UARTIC 2025<\/footer>\n<\/body>\n<\/html>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>UARTIC 2025 Seguridad Digital \u2014 Asegurando el Futuro UARTIC 2025 es un encuentro acad\u00e9mico y tecnol\u00f3gico que re\u00fane a expertos, estudiantes y profesionales para abordar los desaf\u00edos m\u00e1s actuales de [&hellip;]<\/p>\n","protected":false},"author":121,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_joinchat":[],"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"publishpress_future_action":{"enabled":false,"date":"2026-04-23 05:23:05","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":5,"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":1307,"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/pages\/2\/revisions\/1307"}],"wp:attachment":[{"href":"https:\/\/www.uajms.edu.bo\/uartic25\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}