<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://ciberseguridad.egs-latam.com/mekotio-un-sistema-de-ciberseguridad-innovador-frente-a-las-amenazas-digitales</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-Nov-27-2024-12-50-12-3094-AM.jpg</image:loc><image:caption>1graf9septiembreNov2720241250123094AM</image:caption><image:title>1graf9septiembreNov2720241250123094AM</image:title></image:image><lastmod>2024-11-27</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ataque-ddos-conoce-el-enemigo-invisible-que-puede-paralizar-tu-negocio</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ddos3.jpg</image:loc><image:caption>ddos3</image:caption><image:title>ddos3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ddos-1.jpg</image:loc><image:caption>ddos1</image:caption><image:title>ddos1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ddos2.jpg</image:loc><image:caption>ddos2</image:caption><image:title>ddos2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ddos4-1.jpg</image:loc><image:caption>ddos41</image:caption><image:title>ddos41</image:title></image:image><lastmod>2023-07-20</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ciberseguridad-personal-para-el-verano-protege-a-tu-equipo-y-a-tu-empresa</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/foto-blog-1.jpg</image:loc><image:caption>fotoblog1</image:caption><image:title>fotoblog1</image:title></image:image><lastmod>2025-02-19</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/qu%C3%A9-es-y-para-qu%C3%A9-sirve-la-ciberseguridad</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/que-es-ciberseguridad-egs-latam.jpg</image:loc><image:caption>queesciberseguridadegslatam</image:caption><image:title>queesciberseguridadegslatam</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/lupa.png</image:loc><image:caption>lupa</image:caption><image:title>lupa</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/que-es-ciberseguridad-egs-latam-CSIRT.jpg</image:loc><image:caption>queesciberseguridadegslatamCSIRT</image:caption><image:title>queesciberseguridadegslatamCSIRT</image:title></image:image><lastmod>2023-01-12</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/la-higiene-de-la-ciberseguridad-como-lo-basico-bien-hecho-sostiene-la-resiliencia-empresarial</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/resiliencia-ciberseguridad-egs.jpg</image:loc><image:caption>resilienciaciberseguridadegs</image:caption><image:title>resilienciaciberseguridadegs</image:title></image:image><lastmod>2025-05-13</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/anci-agencia-nacional-de-ciberseguridad-un-nuevo-pilar-en-la-proteccion-digital-de-chile</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-Jan-15-2025-12-09-11-0605-PM.jpg</image:loc><image:caption>1graf9septiembreJan1520251209110605PM</image:caption><image:title>1graf9septiembreJan1520251209110605PM</image:title></image:image><lastmod>2025-01-15</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/estas-son-las-tendencias-de-ciberseguridad-para-el-primer-semestre-del-2025</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Ley%20Marco-1.jpg</image:loc><image:caption>LeyMarco1</image:caption><image:title>LeyMarco1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ciberseguridad-2023-el-riesgo-sera-clave-en-las-decisiones-de-negocio</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Destacada%20-%20Ciberseguridad%202023.jpg</image:loc><image:caption>DestacadaCiberseguridad2023</image:caption><image:title>DestacadaCiberseguridad2023</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/seguridad-en-dispositivos-moviles-el-nuevo-frente-de-batalla</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/blog%20ciberseguridad.jpg</image:loc><image:caption>blogciberseguridad</image:caption><image:title>blogciberseguridad</image:title></image:image><lastmod>2025-06-18</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/proteccion-de-datos-moderna-ventajas-y-oportunidades-de-draas-y-braas</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/main.jpg</image:loc><image:caption>main</image:caption><image:title>main</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><lastmod>2022-10-13</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/deteccion-y-respuesta-a-amenazas-edr-cual-es-su-importancia-y-uso</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/edr.jpg</image:loc><image:caption>edr</image:caption><image:title>edr</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/que-es-edr.jpg</image:loc><image:caption>queesedr</image:caption><image:title>queesedr</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/que-es-edr-marcas-1.jpg</image:loc><image:caption>queesedrmarcas1</image:caption><image:title>queesedrmarcas1</image:title></image:image><lastmod>2023-12-07</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/afinando-lazos-exitoso-encuentro-entre-egs-latam-y-watchguard-technologies-en-santiago</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/egs-wathguard.jpg</image:loc><image:caption>egswathguard</image:caption><image:title>egswathguard</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/egs-junta.jpg</image:loc><image:caption>egsjunta</image:caption><image:title>egsjunta</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/egs-wathguard2.jpg</image:loc><image:caption>egswathguard2</image:caption><image:title>egswathguard2</image:title></image:image><lastmod>2024-07-31</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ciberseguridad-y-continuidad-del-negocio-preparandote-para-lo-peor</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ciberresiliencia-1.jpg</image:loc><image:caption>ciberresiliencia1</image:caption><image:title>ciberresiliencia1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/continuidad-del-negocio3.jpg</image:loc><image:caption>continuidaddelnegocio3</image:caption><image:title>continuidaddelnegocio3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/continuidad-del-negocio.jpg</image:loc><image:caption>continuidaddelnegocio</image:caption><image:title>continuidaddelnegocio</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/continuidad-del-negocio2.jpg</image:loc><image:caption>continuidaddelnegocio2</image:caption><image:title>continuidaddelnegocio2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Ciberseguridad-y-Continuidad-del-Negocio.jpg</image:loc><image:caption>CiberseguridadyContinuidaddelNegocio</image:caption><image:title>CiberseguridadyContinuidaddelNegocio</image:title></image:image><lastmod>2023-10-23</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ambientes-en-la-nube-y-espacios-de-trabajo-seguros-como-lograrlo</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/clean-cloud.png</image:loc><image:caption>cleancloud</image:caption><image:title>cleancloud</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/main-banner.jpg</image:loc><image:caption>mainbanner</image:caption><image:title>mainbanner</image:title></image:image><lastmod>2022-09-12</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/que-es-un-backup-en-una-empresa</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/backup-empresa.jpg</image:loc><image:caption>backupempresa</image:caption><image:title>backupempresa</image:title></image:image><lastmod>2024-03-27</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/vulnerabilidad-critica-en-openssh-quienes-estan-en-riesgo</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/openssh.jpg</image:loc><image:caption>openssh</image:caption><image:title>openssh</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/open-ssh.jpg</image:loc><image:caption>openssh</image:caption><image:title>openssh</image:title></image:image><lastmod>2024-07-23</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/logra-madurez-tecnologica-para-una-verdadera-transformacion-digital</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/129.png</image:loc><image:caption>129</image:caption><image:title>129</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/128.png</image:loc><image:caption>128</image:caption><image:title>128</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/444.jpg</image:loc><image:caption>444</image:caption><image:title>444</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/130.png</image:loc><image:caption>130</image:caption><image:title>130</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-05-18</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/empodera-tu-equipo-de-ti-con-un-nuevo-paradigma-de-alianza-estrategica</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/destacada-cabecera-egs-3.jpg</image:loc><image:caption>destacadacabeceraegs3</image:caption><image:title>destacadacabeceraegs3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/interna-egs-transparente-5.png</image:loc><image:caption>internaegstransparente5</image:caption><image:title>internaegstransparente5</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/cuadrado-egs-transparente-4.png</image:loc><image:caption>cuadradoegstransparente4</image:caption><image:title>cuadradoegstransparente4</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><lastmod>2022-04-18</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/los-ataques-de-phishing-y-el-gran-aumento-post-pandemia</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/phishing3.jpg</image:loc><image:caption>phishing3</image:caption><image:title>phishing3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/phishing2-1.jpg</image:loc><image:caption>phishing21</image:caption><image:title>phishing21</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/phishing-1.jpg</image:loc><image:caption>phishing1</image:caption><image:title>phishing1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/phishing4.jpg</image:loc><image:caption>phishing4</image:caption><image:title>phishing4</image:title></image:image><lastmod>2023-08-16</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-lograr-que-los-servidores-en-la-nube-sean-tu-mejor-aliado</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-7.png</image:loc><image:caption>internaegstransparente7</image:caption><image:title>internaegstransparente7</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-6.png</image:loc><image:caption>internaegstransparente6</image:caption><image:title>internaegstransparente6</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/cabecera-egs-4.jpg</image:loc><image:caption>cabeceraegs4</image:caption><image:title>cabeceraegs4</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/cuadrado-egs-transparente-5.png</image:loc><image:caption>cuadradoegstransparente5</image:caption><image:title>cuadradoegstransparente5</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><lastmod>2022-05-04</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/que-es-un-disaster-recovery-plan-y-porque-es-esencial-para-tu-empresa</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/disaster.jpg</image:loc><image:caption>disaster</image:caption><image:title>disaster</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/disaster2.jpg</image:loc><image:caption>disaster2</image:caption><image:title>disaster2</image:title></image:image><lastmod>2023-05-11</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/desarrollando-la-higiene-de-la-ciberseguridad-un-plan-a-largo-plazo</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre.jpg</image:loc><image:caption>1graf9septiembre</image:caption><image:title>1graf9septiembre</image:title></image:image><lastmod>2024-09-10</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/riesgos-ciberneticos-el-papel-critico-de-los-profesionales-de-ti</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1-el-papel-critico-de-profesionales-ti-2.jpg</image:loc><image:caption>1elpapelcriticodeprofesionalesti2</image:caption><image:title>1elpapelcriticodeprofesionalesti2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1-el-papel-critico-de-profesionales-ti.jpg</image:loc><image:caption>1elpapelcriticodeprofesionalesti</image:caption><image:title>1elpapelcriticodeprofesionalesti</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1-el-papel-critico-de-profesionales-ti-3.jpg</image:loc><image:caption>1elpapelcriticodeprofesionalesti3</image:caption><image:title>1elpapelcriticodeprofesionalesti3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1-el-papel-critico-de-profesionales-ti-4.jpg</image:loc><image:caption>1elpapelcriticodeprofesionalesti4</image:caption><image:title>1elpapelcriticodeprofesionalesti4</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/capacitacion-interna-el-primer-paso-para-una-estrategia-de-ciberseguridad-efectiva</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-1.jpg</image:loc><image:caption>1graf9septiembre1</image:caption><image:title>1graf9septiembre1</image:title></image:image><lastmod>2024-09-25</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/7-medidas-practicas-para-alinearte-con-la-ley-de-ciberseguridad</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ciberseguridad-chile.jpg</image:loc><image:caption>ciberseguridadchile</image:caption><image:title>ciberseguridadchile</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-proteger-las-estaciones-de-trabajo-de-tu-empresa-contra-amenazas-ciberneticas</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/proteger-estaciones2-1.jpg</image:loc><image:caption>protegerestaciones21</image:caption><image:title>protegerestaciones21</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/estaciones-de-trabajo-seguras2-1.jpg</image:loc><image:caption>estacionesdetrabajoseguras21</image:caption><image:title>estacionesdetrabajoseguras21</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/estaciones-de-trabajo-seguras.jpg</image:loc><image:caption>estacionesdetrabajoseguras</image:caption><image:title>estacionesdetrabajoseguras</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/proteger-estaciones-4.jpg</image:loc><image:caption>protegerestaciones4</image:caption><image:title>protegerestaciones4</image:title></image:image><lastmod>2023-06-21</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/plan-de-emergencia-cibernetica-antes-de-las-vacaciones-como-implementarlo</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-Dec-19-2024-09-11-48-1876-PM.jpg</image:loc><image:caption>1graf9septiembreDec1920240911481876PM</image:caption><image:title>1graf9septiembreDec1920240911481876PM</image:title></image:image><lastmod>2024-12-19</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/desvelando-la-verdad-por-que-ciberseguridad-no-es-lo-mismo-que-seguridad-de-la-informacion</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ciberseguridad-seguridad-de-la-informacion.jpg</image:loc><image:caption>ciberseguridadseguridaddelainformacion</image:caption><image:title>ciberseguridadseguridaddelainformacion</image:title></image:image><lastmod>2024-03-20</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-evitar-una-crisis-de-datos-la-importancia-del-respaldo-de-informacion</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/respaldar-datos-2.jpg</image:loc><image:caption>respaldardatos2</image:caption><image:title>respaldardatos2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/crisis-de-datos.jpg</image:loc><image:caption>crisisdedatos</image:caption><image:title>crisisdedatos</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/opciones-respaldo-datos.jpg</image:loc><image:caption>opcionesrespaldodatos</image:caption><image:title>opcionesrespaldodatos</image:title></image:image><lastmod>2023-05-17</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/que-a-ti-no-te-pase-evita-el-calor-de-los-ataques-de-phishing-estacionales</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/foto-blog.jpg</image:loc><image:caption>fotoblog</image:caption><image:title>fotoblog</image:title></image:image><lastmod>2025-02-06</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ransomware-una-amenaza-incesante-del-ciberespacio-moderno</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ransomware-1.jpg</image:loc><image:caption>ransomware1</image:caption><image:title>ransomware1</image:title></image:image><lastmod>2024-05-20</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/por-que-parchear-es-un-desafio-y-virtual-patching-la-solucion</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Interna%201.png</image:loc><image:caption>0Interna1</image:caption><image:title>0Interna1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Interna%202.png</image:loc><image:caption>0Interna2</image:caption><image:title>0Interna2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Destacada-cabecera-4.jpg</image:loc><image:caption>0Destacadacabecera4</image:caption><image:title>0Destacadacabecera4</image:title></image:image><lastmod>2022-09-26</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/protege-tu-negocio-en-vacaciones-como-mantener-la-seguridad-mientras-el-equipo-esta-fuera</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-Jan-24-2025-10-54-58-0706-AM.jpg</image:loc><image:caption>1graf9septiembreJan2420251054580706AM</image:caption><image:title>1graf9septiembreJan2420251054580706AM</image:title></image:image><lastmod>2025-01-24</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/que-es-y-por-que-debemos-preocuparnos-de-la-seguridad-informatica</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/seguridad-informatica.jpg</image:loc><image:caption>seguridadinformatica</image:caption><image:title>seguridadinformatica</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/candado-egs-1.png</image:loc><image:caption>candadoegs1</image:caption><image:title>candadoegs1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/por-que-debemos-preocuparnos-de-la-seguridad-informatica.jpg</image:loc><image:caption>porquedebemospreocuparnosdelaseguridadinformatica</image:caption><image:title>porquedebemospreocuparnosdelaseguridadinformatica</image:title></image:image><lastmod>2023-03-07</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/tendencias-y-mejores-practicas-para-tu-plan-de-gobierno-de-datos</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Destacada-cabecera-3.jpg</image:loc><image:caption>0Destacadacabecera3</image:caption><image:title>0Destacadacabecera3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna-1.png</image:loc><image:caption>0interna1</image:caption><image:title>0interna1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20cabecera.png</image:loc><image:caption>0cabecera</image:caption><image:title>0cabecera</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-proteger-servidores-criticos-en-tiempos-turbulentos</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/cuadrado-egs-transparente-6.png</image:loc><image:caption>cuadradoegstransparente6</image:caption><image:title>cuadradoegstransparente6</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-8.png</image:loc><image:caption>internaegstransparente8</image:caption><image:title>internaegstransparente8</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/destacada-cabecera-egs-4-1.jpg</image:loc><image:caption>destacadacabeceraegs41</image:caption><image:title>destacadacabeceraegs41</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><lastmod>2022-05-11</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/presupuesto-de-ciberseguridad-2023-claves-a-tener-en-cuenta</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/cuadrado-egs-2.png</image:loc><image:caption>cuadradoegs2</image:caption><image:title>cuadradoegs2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/egs1.jpg</image:loc><image:caption>egs1</image:caption><image:title>egs1</image:title></image:image><lastmod>2022-12-19</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/teletrabajo-seguro-deteccion-de-amenazas-y-respuesta-en-el-endpoint</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/SEGURIDAD%20DIGITAL%200.png</image:loc><image:caption>SEGURIDADDIGITAL0</image:caption><image:title>SEGURIDADDIGITAL0</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/SEGURIDAD%20DIGITAL%2000.png</image:loc><image:caption>SEGURIDADDIGITAL00</image:caption><image:title>SEGURIDADDIGITAL00</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/SEGURIDAD%20DIGITAL%203.jpg</image:loc><image:caption>SEGURIDADDIGITAL3</image:caption><image:title>SEGURIDADDIGITAL3</image:title></image:image><lastmod>2022-06-16</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/la-integracion-de-xdr-mdr-y-ndr-un-ecosistema-de-seguridad-para-empresas-modernas</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-Dec-12-2024-11-45-17-2676-AM.jpg</image:loc><image:caption>1graf9septiembreDec1220241145172676AM</image:caption><image:title>1graf9septiembreDec1220241145172676AM</image:title></image:image><lastmod>2024-12-12</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/beneficios-de-una-campana-de-concientizacion</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/bajas-amenazas.jpg</image:loc><image:caption>bajasamenazas</image:caption><image:title>bajasamenazas</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/beneficios-campana-concientizacion-egs.jpg</image:loc><image:caption>beneficioscampanaconcientizacionegs</image:caption><image:title>beneficioscampanaconcientizacionegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/beneficios-campana-concientizacion.jpg</image:loc><image:caption>beneficioscampanaconcientizacion</image:caption><image:title>beneficioscampanaconcientizacion</image:title></image:image><lastmod>2023-03-15</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-reducir-riesgos-sin-perder-productividad-con-servicios-de-ti</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/destacada-cabecera-egs-1.jpg</image:loc><image:caption>destacadacabeceraegs1</image:caption><image:title>destacadacabeceraegs1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/cuadrado-egs-transparente-1.png</image:loc><image:caption>cuadradoegstransparente1</image:caption><image:title>cuadradoegstransparente1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-1-1.png</image:loc><image:caption>internaegstransparente11</image:caption><image:title>internaegstransparente11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-2.png</image:loc><image:caption>internaegstransparente2</image:caption><image:title>internaegstransparente2</image:title></image:image><lastmod>2022-04-20</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-evitar-ser-estafado-al-comprar-por-internet</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/footer1.jpg</image:loc><image:caption>footer1</image:caption><image:title>footer1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/correos-phishing-1.jpg</image:loc><image:caption>correosphishing1</image:caption><image:title>correosphishing1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/asi-puedes-protegerte-de-estafas-por-internet.jpg</image:loc><image:caption>asipuedesprotegertedeestafasporinternet</image:caption><image:title>asipuedesprotegertedeestafasporinternet</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/footer2.jpg</image:loc><image:caption>footer2</image:caption><image:title>footer2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/medios-de-pago-confiables.jpg</image:loc><image:caption>mediosdepagoconfiables</image:caption><image:title>mediosdepagoconfiables</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/siempre-paginas-con-https.jpg</image:loc><image:caption>siemprepaginasconhttps</image:caption><image:title>siemprepaginasconhttps</image:title></image:image><lastmod>2023-01-26</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/hackers-en-accion-10-grietas-mas-utilizadas-en-ciberataques</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/hackers-en-accion2.jpg</image:loc><image:caption>hackersenaccion2</image:caption><image:title>hackersenaccion2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/hackers-en-accion3.jpg</image:loc><image:caption>hackersenaccion3</image:caption><image:title>hackersenaccion3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/hackers-en-accion4.jpg</image:loc><image:caption>hackersenaccion4</image:caption><image:title>hackersenaccion4</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/hackers-en-accion.jpg</image:loc><image:caption>hackersenaccion</image:caption><image:title>hackersenaccion</image:title></image:image><lastmod>2023-07-14</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/el-futuro-de-la-ciberseguridad-ia-que-detecta-responde-y-protege-24/7</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ia-ciberseguridad-egs.jpg</image:loc><image:caption>iaciberseguridadegs</image:caption><image:title>iaciberseguridadegs</image:title></image:image><lastmod>2025-04-28</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/gesti%C3%B3n-de-parches-y-las-buenas-pr%C3%A1cticas</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna%201-3.png</image:loc><image:caption>0interna13</image:caption><image:title>0interna13</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/E-book%20blog%20-%20C%C3%B3mo%20lograr%20la%20higiene%20de%20la%20seguridad%20informatica%20para%20estar%20protegido.png</image:loc><image:caption>EbookblogCómolograrlahigienedelaseguridadinformaticaparaestarprotegido</image:caption><image:title>EbookblogCómolograrlahigienedelaseguridadinformaticaparaestarprotegido</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Destacada-cabecera-1.jpg</image:loc><image:caption>0Destacadacabecera1</image:caption><image:title>0Destacadacabecera1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><lastmod>2022-07-28</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/cuida-la-reputacion-online-de-tu-empresa-siguiendo-estos-consejos-de-ciberseguridad</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/reputacion-ciberseguridad3.jpg</image:loc><image:caption>reputacionciberseguridad3</image:caption><image:title>reputacionciberseguridad3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/reputacion-ciberseguridad2.jpg</image:loc><image:caption>reputacionciberseguridad2</image:caption><image:title>reputacionciberseguridad2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/reputacion-ciberseguridad.jpg</image:loc><image:caption>reputacionciberseguridad</image:caption><image:title>reputacionciberseguridad</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ejemplo.jpg</image:loc><image:caption>ejemplo</image:caption><image:title>ejemplo</image:title></image:image><lastmod>2023-09-07</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/que-objetivos-persigue-la-seguridad-informatica</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/amenazas-informaticas2-1.jpg</image:loc><image:caption>amenazasinformaticas21</image:caption><image:title>amenazasinformaticas21</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/triangle.jpg</image:loc><image:caption>triangle</image:caption><image:title>triangle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/objetivos-seguridad-informatica-blog.jpg</image:loc><image:caption>objetivosseguridadinformaticablog</image:caption><image:title>objetivosseguridadinformaticablog</image:title></image:image><lastmod>2023-03-30</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/cultura-de-ciberseguridad-todos-somos-guardianes</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/todos-somos-guardianes2.jpg</image:loc><image:caption>todossomosguardianes2</image:caption><image:title>todossomosguardianes2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/todos-somos-guardianes3.jpg</image:loc><image:caption>todossomosguardianes3</image:caption><image:title>todossomosguardianes3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/todos-somos-guardianes4.jpg</image:loc><image:caption>todossomosguardianes4</image:caption><image:title>todossomosguardianes4</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/todos-somos-guardianes.jpg</image:loc><image:caption>todossomosguardianes</image:caption><image:title>todossomosguardianes</image:title></image:image><lastmod>2023-11-22</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/seguridad-corporativa-en-la-nueva-era-donde-esta-el-perimetro</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna%202-2.png</image:loc><image:caption>0interna22</image:caption><image:title>0interna22</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna%201-2.png</image:loc><image:caption>0interna12</image:caption><image:title>0interna12</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Destacada-cabecera.jpg</image:loc><image:caption>0Destacadacabecera</image:caption><image:title>0Destacadacabecera</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-07-27</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Ley%20Marco(1).jpg</image:loc><image:caption>LeyMarco1</image:caption><image:title>LeyMarco1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/resiliencia-ciberseguridad-egs.jpg</image:loc><image:caption>resilienciaciberseguridadegs</image:caption><image:title>resilienciaciberseguridadegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/nist-egs-latam.jpg</image:loc><image:caption>nistegslatam</image:caption><image:title>nistegslatam</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ia-ciberseguridad-egs.jpg</image:loc><image:caption>iaciberseguridadegs</image:caption><image:title>iaciberseguridadegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ciberseguridad-chile.jpg</image:loc><image:caption>ciberseguridadchile</image:caption><image:title>ciberseguridadchile</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/caso-exito.jpg</image:loc><image:caption>casoexito</image:caption><image:title>casoexito</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Ley%20Marco-1.jpg</image:loc><image:caption>LeyMarco1</image:caption><image:title>LeyMarco1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/bg-noticias.jpg</image:loc><image:caption>bgnoticias</image:caption><image:title>bgnoticias</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/blog%20ciberseguridad.jpg</image:loc><image:caption>blogciberseguridad</image:caption><image:title>blogciberseguridad</image:title></image:image><lastmod>2022-12-14</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/comprendiendo-las-diferencias-entre-evaluaci%C3%B3n-de-vulnerabilidades-y-evaluaci%C3%B3n-de-riesgos-en-cibersegurida</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/va-ra.jpg</image:loc><image:caption>vara</image:caption><image:title>vara</image:title></image:image><lastmod>2024-02-07</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/cis-y-nist-marcos-de-referencia-para-la-seguridad-cibernetica-de-que-tratan</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-2.jpg</image:loc><image:caption>1graf9septiembre2</image:caption><image:title>1graf9septiembre2</image:title></image:image><lastmod>2024-10-16</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/caso-de-exito-grupo-de-empresas-denham-y-su-alianza-estrategica-con-egs-latam</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/caso-exito.jpg</image:loc><image:caption>casoexito</image:caption><image:title>casoexito</image:title></image:image><lastmod>2025-06-04</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/explorando-la-nueva-ley-de-ciberseguridad-en-chile-un-viaje-a-la-proteccion-digital</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ley-marco.jpg</image:loc><image:caption>leymarco</image:caption><image:title>leymarco</image:title></image:image><lastmod>2024-01-22</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ciberseguridad-2023-concientizacion-del-usuario</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/cuadrado-egs-2-1.png</image:loc><image:caption>cuadradoegs21</image:caption><image:title>cuadradoegs21</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/egs3.jpg</image:loc><image:caption>egs3</image:caption><image:title>egs3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-12-19</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/plan-de-recuperacion-ante-desastres-en-ciberseguridad-claves-para-la-proteccion-empresarial</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/plan-recuperacion-desastres.jpg</image:loc><image:caption>planrecuperaciondesastres</image:caption><image:title>planrecuperaciondesastres</image:title></image:image><lastmod>2024-04-25</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/seguridad-informatica-para-empresas-protegiendo-tus-activos-digitales</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/activos-digitales-de-una-empresa.jpg</image:loc><image:caption>activosdigitalesdeunaempresa</image:caption><image:title>activosdigitalesdeunaempresa</image:title></image:image><lastmod>2024-04-17</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/homoglyph-sabias-que-existen-caracteres-que-se-parecen-mucho-entre-si-pero-que-en-realidad-son-diferentes</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/homogly.jpg</image:loc><image:caption>homogly</image:caption><image:title>homogly</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/gly.jpg</image:loc><image:caption>gly</image:caption><image:title>gly</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/homoglyph.jpg</image:loc><image:caption>homoglyph</image:caption><image:title>homoglyph</image:title></image:image><lastmod>2023-07-05</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/nunca-es-demasiada-seguridad-para-la-informacion-de-tu-empresa</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Destacada.jpg</image:loc><image:caption>0Destacada</image:caption><image:title>0Destacada</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna-2.png</image:loc><image:caption>0interna2</image:caption><image:title>0interna2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-10-03</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/la-brecha-de-talento-en-ciberseguridad-un-riesgo-latente-para-las-organizaciones-en-latinoamerica</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/brechas-de-talento-en-ciberseguridad.jpg</image:loc><image:caption>brechasdetalentoenciberseguridad</image:caption><image:title>brechasdetalentoenciberseguridad</image:title></image:image><lastmod>2024-05-29</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/superando-prejuicios-y-obst%C3%A1culos-en-ciberseguridad</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/prejuicios.jpg</image:loc><image:caption>prejuicios</image:caption><image:title>prejuicios</image:title></image:image><lastmod>2024-08-30</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/el-firewall-humano-la-ultima-frontera</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/E-book%20ransomware%20-%20blog.png</image:loc><image:caption>Ebookransomwareblog</image:caption><image:title>Ebookransomwareblog</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20Destacada-cabecera-2.jpg</image:loc><image:caption>0Destacadacabecera2</image:caption><image:title>0Destacadacabecera2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-09-22</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/principales-amenazas-wi-fi-a-considerar-para-un-trabajo-remoto-seguro</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna%202-1.png</image:loc><image:caption>0interna21</image:caption><image:title>0interna21</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20destacada-1.jpg</image:loc><image:caption>0destacada1</image:caption><image:title>0destacada1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna%201-1.png</image:loc><image:caption>0interna11</image:caption><image:title>0interna11</image:title></image:image><lastmod>2022-07-06</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/consejos-esenciales-de-ciberseguridad-para-unas-vacaciones-seguras-en-linea</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/vacaciones-seguras-en-linea2.jpg</image:loc><image:caption>vacacionessegurasenlinea2</image:caption><image:title>vacacionessegurasenlinea2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/vacaciones-seguras-en-linea.jpg</image:loc><image:caption>vacacionessegurasenlinea</image:caption><image:title>vacacionessegurasenlinea</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/vacaciones-seguras-en-linea-phishing.jpg</image:loc><image:caption>vacacionessegurasenlineaphishing</image:caption><image:title>vacacionessegurasenlineaphishing</image:title></image:image><lastmod>2024-01-10</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/mitos-y-verdades-de-la-seguridad-informatica</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/cuadrado-egs-transparente-7.png</image:loc><image:caption>cuadradoegstransparente7</image:caption><image:title>cuadradoegstransparente7</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Destacada-cabecera-egs-6.jpg</image:loc><image:caption>Destacadacabeceraegs6</image:caption><image:title>Destacadacabeceraegs6</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-10.png</image:loc><image:caption>internaegstransparente10</image:caption><image:title>internaegstransparente10</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-9.png</image:loc><image:caption>internaegstransparente9</image:caption><image:title>internaegstransparente9</image:title></image:image><lastmod>2022-06-06</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-evitar-que-su-correo-electronico-lo-deje-vulnerable</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Destacada-cabecera-egs-5-1.jpg</image:loc><image:caption>Destacadacabeceraegs51</image:caption><image:title>Destacadacabeceraegs51</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/interna-egs-transparente-4.png</image:loc><image:caption>internaegstransparente4</image:caption><image:title>internaegstransparente4</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Stock%20Images/cuadrado-egs-transparente-3.png</image:loc><image:caption>cuadradoegstransparente3</image:caption><image:title>cuadradoegstransparente3</image:title></image:image><lastmod>2022-04-26</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/dmarc-que-es-y-su-importancia-en-la-seguridad-de-los-correos-electronicos</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-4.jpg</image:loc><image:caption>1graf9septiembre4</image:caption><image:title>1graf9septiembre4</image:title></image:image><lastmod>2024-11-14</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/panorama-de-amenazas-mas-ataques-y-atacantes</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/gif-egs2.gif</image:loc><image:caption>gifegs2</image:caption><image:title>gifegs2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/main-bg.png</image:loc><image:caption>mainbg</image:caption><image:title>mainbg</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-09-19</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/como-construir-una-estrategia-de-recuperacion-de-datos-ciberresiliente-segun-el-marco-nist-2</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/nist-egs-latam.jpg</image:loc><image:caption>nistegslatam</image:caption><image:title>nistegslatam</image:title></image:image><lastmod>2025-04-09</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/mitos-y-realidades-sobre-mfa-desmitificando-la-autenticacion-multifactor</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/1%20graf%209%20septiembre-3.jpg</image:loc><image:caption>1graf9septiembre3</image:caption><image:title>1graf9septiembre3</image:title></image:image><lastmod>2024-10-29</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/analizando-vulnerabilidades-y-protegiendo-datos-un-vistazo-a-nuestro-evento-de-ciberseguridad</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/isec.jpg</image:loc><image:caption>isec</image:caption><image:title>isec</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/isec-blog2.jpg</image:loc><image:caption>isecblog2</image:caption><image:title>isecblog2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/isec2.png</image:loc><image:caption>isec2</image:caption><image:title>isec2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/isec-blog.jpg</image:loc><image:caption>isecblog</image:caption><image:title>isecblog</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/isec3.png</image:loc><image:caption>isec3</image:caption><image:title>isec3</image:title></image:image><lastmod>2023-06-14</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/nuevas-normativas-de-la-ley-marco-de-ciberseguridad-en-chile-que-cambia-a-partir-de-marzo-de-2025</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Ley%20Marco(1).jpg</image:loc><image:caption>LeyMarco1</image:caption><image:title>LeyMarco1</image:title></image:image><lastmod>2025-03-10</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/gestion-de-parches-como-lograr-una-estrategia-solida</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/egs2.jpg</image:loc><image:caption>egs2</image:caption><image:title>egs2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/imagen-egs.png</image:loc><image:caption>imagenegs</image:caption><image:title>imagenegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Mesa%20de%20trabajo%201-1.png</image:loc><image:caption>Mesadetrabajo11</image:caption><image:title>Mesadetrabajo11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><lastmod>2022-12-19</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/principios-fundamentales-para-una-ciberseguridad-eficaz</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ciberseguridad-eficaz.jpg</image:loc><image:caption>ciberseguridadeficaz</image:caption><image:title>ciberseguridadeficaz</image:title></image:image><lastmod>2024-08-23</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/autenticacion-de-dos-factores-2fa-fortaleciendo-la-seguridad-en-linea</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/2fa.jpg</image:loc><image:caption>2fa</image:caption><image:title>2fa</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/importancia-2fa.jpg</image:loc><image:caption>importancia2fa</image:caption><image:title>importancia2fa</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/2fa-3-lat.jpg</image:loc><image:caption>2fa3lat</image:caption><image:title>2fa3lat</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/2fa-3.jpg</image:loc><image:caption>2fa3</image:caption><image:title>2fa3</image:title></image:image><lastmod>2023-12-27</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/vulnerabilidad-cibernetica-en-america-latina-desafios-y-soluciones-para-un-futuro-seguro</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/latam-ciberseguridad.jpg</image:loc><image:caption>latamciberseguridad</image:caption><image:title>latamciberseguridad</image:title></image:image><lastmod>2024-06-25</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ciberseguridad-en-america-latina-desafios-y-oportunidades-para-startups</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/americalatina-ciberseguridad.jpg</image:loc><image:caption>americalatinaciberseguridad</image:caption><image:title>americalatinaciberseguridad</image:title></image:image><lastmod>2024-02-21</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/5-razones-por-las-que-invertir-en-ciberseguridad-en-2022</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/cuadrado-egs-transparente-2.png</image:loc><image:caption>cuadradoegstransparente2</image:caption><image:title>cuadradoegstransparente2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/destacada-1-1.png</image:loc><image:caption>destacada11</image:caption><image:title>destacada11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/interna-egs-transparente-3.png</image:loc><image:caption>internaegstransparente3</image:caption><image:title>internaegstransparente3</image:title></image:image><lastmod>2022-04-18</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/logra-una-seguridad-resiliente-fortaleciendo-al-usuario-como-perimetro</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20destacada-2.jpg</image:loc><image:caption>0destacada2</image:caption><image:title>0destacada2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna.png</image:loc><image:caption>0interna</image:caption><image:title>0interna</image:title></image:image><lastmod>2022-08-01</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/amenazas-de-ingenieria-social-que-son-y-como-evitarlas</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/destacada1(170822)-1.jpg</image:loc><image:caption>destacada11708221</image:caption><image:title>destacada11708221</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/img-body1(170822)-1.png</image:loc><image:caption>imgbody11708221</image:caption><image:title>imgbody11708221</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-09-15</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/soluciones-de-backup-las-copias-de-seguridad-que-tu-empresa-necesita</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/copias-de-seguridad-que-tu-empresa-necesita.jpg</image:loc><image:caption>copiasdeseguridadquetuempresanecesita</image:caption><image:title>copiasdeseguridadquetuempresanecesita</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ventajas-backup.jpg</image:loc><image:caption>ventajasbackup</image:caption><image:title>ventajasbackup</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/tipos.jpg</image:loc><image:caption>tipos</image:caption><image:title>tipos</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><lastmod>2023-02-02</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/la-inteligencia-artificial-y-el-cambio-de-panorama-de-la-ciberseguridad</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/La-Inteligencia-Artificial-y-el-cambio-de-panorama-de-la-ciberseguridad.jpg</image:loc><image:caption>LaInteligenciaArtificialyelcambiodepanoramadelaciberseguridad</image:caption><image:title>LaInteligenciaArtificialyelcambiodepanoramadelaciberseguridad</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ia-3.jpg</image:loc><image:caption>ia3</image:caption><image:title>ia3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ia.jpg</image:loc><image:caption>ia</image:caption><image:title>ia</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ia-2.jpg</image:loc><image:caption>ia2</image:caption><image:title>ia2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><lastmod>2023-05-04</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/de-sherlock-holmes-a-los-hackers-eticos-explorando-los-usos-y-herramientas-del-osint-en-la-era-digital</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/google-dorks.jpg</image:loc><image:caption>googledorks</image:caption><image:title>googledorks</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/osint-2.jpg</image:loc><image:caption>osint2</image:caption><image:title>osint2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/osin.jpg</image:loc><image:caption>osin</image:caption><image:title>osin</image:title></image:image><lastmod>2023-05-30</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/seguridad-perimetral-una-respuesta-integral-y-superadora</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna%201.png</image:loc><image:caption>0interna1</image:caption><image:title>0interna1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20interna%202.png</image:loc><image:caption>0interna2</image:caption><image:title>0interna2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/0%20destacada.jpg</image:loc><image:caption>0destacada</image:caption><image:title>0destacada</image:title></image:image><lastmod>2022-07-01</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/proteccion-de-datos-como-evitar-riesgos-de-seguridad-y-proteger-la-informacion-de-tu-empresa</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/proteccion-datos-3-1.jpg</image:loc><image:caption>protecciondatos31</image:caption><image:title>protecciondatos31</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/proteccion-datos.jpg</image:loc><image:caption>protecciondatos</image:caption><image:title>protecciondatos</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/proteccion-datos-2-2.jpg</image:loc><image:caption>protecciondatos22</image:caption><image:title>protecciondatos22</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/estos-son-los-ocho-ciberataques-mas-frecuentes-en-2024</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ataques-ciberseguridad-2024.jpg</image:loc><image:caption>ataquesciberseguridad2024</image:caption><image:title>ataquesciberseguridad2024</image:title></image:image><lastmod>2024-07-11</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/fortalecer-el-perimetro-cada-acceso-es-una-infraestructura-critica</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/main-1.jpg</image:loc><image:caption>main1</image:caption><image:title>main1</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/middle.png</image:loc><image:caption>middle</image:caption><image:title>middle</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-10-17</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ciberseguridad-en-5g-desafios-y-oportunidades-en-la-era-de-la-conectividad-ultrarrapida</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/5g.jpg</image:loc><image:caption>5g</image:caption><image:title>5g</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/5g-estrategias.jpg</image:loc><image:caption>5gestrategias</image:caption><image:title>5gestrategias</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/5g-que-es.jpg</image:loc><image:caption>5gquees</image:caption><image:title>5gquees</image:title></image:image><lastmod>2023-10-05</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/ciberseguridad-2022-como-prevenir-las-amenazas-mas-frecuentes</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/Separador%20EGS%201-1.png</image:loc><image:caption>SeparadorEGS11</image:caption><image:title>SeparadorEGS11</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/foto%200-1.png</image:loc><image:caption>foto01</image:caption><image:title>foto01</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/destacada.jpg</image:loc><image:caption>destacada</image:caption><image:title>destacada</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/foto%2000.png</image:loc><image:caption>foto00</image:caption><image:title>foto00</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/Separadores/detalle.png</image:loc><image:caption>detalle</image:caption><image:title>detalle</image:title></image:image><lastmod>2022-06-21</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/7-consejos-para-proteger-tus-servidores-de-ataques-informaticos</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/7-consejos-para-proteger-tus-servidores-de-ciber-ataques.jpg</image:loc><image:caption>7consejosparaprotegertusservidoresdeciberataques</image:caption><image:title>7consejosparaprotegertusservidoresdeciberataques</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><lastmod>2023-02-13</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/stuxnet-el-malware-que-cambio-la-concepci%C3%B3n-de-la-ciberguerra</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/stuxnet2.jpg</image:loc><image:caption>stuxnet2</image:caption><image:title>stuxnet2</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/stuxnet4.jpg</image:loc><image:caption>stuxnet4</image:caption><image:title>stuxnet4</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/stuxnet3.jpg</image:loc><image:caption>stuxnet3</image:caption><image:title>stuxnet3</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/stuxnet.jpg</image:loc><image:caption>stuxnet</image:caption><image:title>stuxnet</image:title></image:image><lastmod>2023-08-24</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/cuales-son-los-ataques-informaticos-mas-comunes-y-como-prevenirlos</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ataque-activo-pasivo.jpg</image:loc><image:caption>ataqueactivopasivo</image:caption><image:title>ataqueactivopasivo</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ataques-informaticos-mas-comunes.jpg</image:loc><image:caption>ataquesinformaticosmascomunes</image:caption><image:title>ataquesinformaticosmascomunes</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/prevenir-ataques.jpg</image:loc><image:caption>prevenirataques</image:caption><image:title>prevenirataques</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/prevenir-ataques2-2.jpg</image:loc><image:caption>prevenirataques22</image:caption><image:title>prevenirataques22</image:title></image:image><lastmod>2023-04-05</lastmod></url><url><loc>https://ciberseguridad.egs-latam.com/asi-puedes-prevenir-los-ciberataques</loc><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/asi-puedes-prevenir-los-ciberataques.jpg</image:loc><image:caption>asipuedesprevenirlosciberataques</image:caption><image:title>asipuedesprevenirlosciberataques</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/iso-egs.png</image:loc><image:caption>isoegs</image:caption><image:title>isoegs</image:title></image:image><image:image><image:loc>https://20989385.fs1.hubspotusercontent-na1.net/hubfs/20989385/ciberataque.jpg</image:loc><image:caption>ciberataque</image:caption><image:title>ciberataque</image:title></image:image><lastmod>2023-03-02</lastmod></url></urlset>