<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://sotelo.ameci.org/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://sotelo.ameci.org/la-ciberseguridad-y-elecciones-en-mexico/</loc><lastmod>2024-05-13T09:56:14-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/ley-olimpia-y-la-impunidad-en-internet/</loc><lastmod>2024-05-13T10:05:58-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/el-peligro-de-los-sitios-seguros/</loc><lastmod>2024-05-13T10:06:48-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/por-que-atacan-mi-email/</loc><lastmod>2024-05-12T18:03:52-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/que-tipo-de-azucar-prefieres-y-tu-password/</loc><lastmod>2024-05-12T18:04:42-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/aumento-de-ciberataques-en-mexico/</loc><lastmod>2024-05-13T09:52:20-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/infosecurity-latam-edition/</loc><lastmod>2024-05-13T09:55:33-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/panel-de-expertos-bedu/</loc><lastmod>2024-05-12T18:32:04-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-en-el-empresario/</loc><lastmod>2024-05-12T18:40:05-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/participacion-en-canal-11/</loc><lastmod>2024-05-12T18:32:38-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/clinica-de-ciberseguridad-cisco/</loc><lastmod>2024-05-12T18:33:10-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/evento-en-hp-mexico/</loc><lastmod>2024-05-13T09:58:46-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-en-tv-azteca/</loc><lastmod>2024-05-13T10:05:27-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/mexico-business/</loc><lastmod>2024-05-13T10:07:40-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/secretaria-de-seguridad-publica-oaxaca/</loc><lastmod>2024-05-12T18:07:13-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/cyber-month-scotiabank-mexico/</loc><lastmod>2024-05-13T10:08:08-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/panel-de-expertos-en-cifrado-de-la-informacion/</loc><lastmod>2024-05-13T10:08:42-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/participacion-en-el-programa-de-hecho-am/</loc><lastmod>2024-05-13T09:50:42-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/participacion-en-el-foro-virtual-forbes-centro-america/</loc><lastmod>2024-05-12T18:17:44-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-para-global-industries/</loc><lastmod>2024-05-12T18:15:33-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/webinar-para-hp/</loc><lastmod>2024-05-12T18:18:40-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-para-hechos-am/</loc><lastmod>2024-05-13T10:12:03-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-virtual-para-milenio-television/</loc><lastmod>2024-05-13T10:12:45-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-realizada-por-idconline/</loc><lastmod>2024-05-13T09:57:36-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/cso20-mejores-practicas-e-innovaciones-en-ciberseguridad/</loc><lastmod>2024-05-13T10:03:34-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/infosecurity-2019/</loc><lastmod>2024-05-12T18:19:24-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/participacion-en-foro-de-expertos-para-la-seguridad-de-la-informacion-en-organizaciones-mexicanas/</loc><lastmod>2024-05-13T10:16:16-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-en-la-revista-forbes-mexico/</loc><lastmod>2024-05-12T18:27:35-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-ciber-que/</loc><lastmod>2024-05-12T18:09:36-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-privacidad-en-riesgo-zoom/</loc><lastmod>2024-05-12T18:21:59-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/buscas-cuidar-tus-datos-incluye-todos-tus-recursos-no-solo-los-sistemas/</loc><lastmod>2024-05-13T09:50:04-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/tiktok-y-la-intrusion-en-tu-movil/</loc><lastmod>2024-05-12T18:22:55-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/privacidad-o-anonimato/</loc><lastmod>2024-05-12T19:08:30-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/cifrado-y-guerra/</loc><lastmod>2024-05-13T09:53:42-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/1er-webinar-del-proyecto-digital-leaders-hub/</loc><lastmod>2024-05-12T19:06:29-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/participacion-para-la-universidad-virtual-de-guanajuato/</loc><lastmod>2024-05-12T19:05:19-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/pegasus-espionaje-en-mexico/</loc><lastmod>2024-05-12T19:02:58-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/retos-y-desafios-de-la-ciberseguridad/</loc><lastmod>2024-05-12T19:01:06-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/participacion-en-el-foro-virtual-forbes-centro-america-2/</loc><lastmod>2024-05-12T18:55:49-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/retos-y-desafios-de-la-ciberseguridad-2/</loc><lastmod>2024-05-12T18:56:26-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/aumento-de-ciberataques-en-mexico-2/</loc><lastmod>2024-05-12T18:51:56-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/infosecurity-latam-edition-2/</loc><lastmod>2024-05-12T18:57:42-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-realizada-por-idconline-2/</loc><lastmod>2024-05-12T18:59:09-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-seguridad-en-las-organizaciones/</loc><lastmod>2024-05-12T17:57:12-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/el-ransomware-el-covid-digital-que-esta-aqui-para-quedarse/</loc><lastmod>2024-05-12T17:56:48-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/inteligencia-artificial-u-su-importancia-en-la-seguridad/</loc><lastmod>2024-05-12T17:55:30-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/participacion-en-freesecurity-2021/</loc><lastmod>2024-05-12T17:59:17-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/importancia-del-business-inteligence-en-la-ciberseguridad/</loc><lastmod>2024-05-12T17:52:10-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/riesgos-al-navegar-por-internet-conalep-edo-mx/</loc><lastmod>2024-05-12T17:50:57-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-importancia-de-la-ciberseguridad-en-el-iot-internet-of-things/</loc><lastmod>2024-05-12T17:49:48-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/de-acuerdo-a-tu-edad-que-tipo-de-ataque-podrias-sufrir/</loc><lastmod>2024-05-12T17:49:03-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-responsabilidad-compartida-entre-empleados-y-empresa-para-hacer-frente-a-los-ataques-informaticos/</loc><lastmod>2024-05-12T17:47:58-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/evento-ciberseguridad-idc/</loc><lastmod>2024-05-10T13:43:28-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/importancia-de-la-ciberseguridad-en-las-empresas/</loc><lastmod>2024-05-10T13:42:54-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-ciberseguridad-es-algo-mas-alla-que-el-hacking-etico/</loc><lastmod>2024-05-10T13:42:00-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/importancia-de-las-contrasenas-o-passwords/</loc><lastmod>2024-05-10T13:41:10-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/tareas-basicas-para-proteger-pequenas-emperesas-contra-ataques-ransomware/</loc><lastmod>2024-05-10T13:40:07-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/el-hive-phishing-tan-actual-como-siempre/</loc><lastmod>2024-05-10T13:36:40-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-importancia-de-la-seguridad-digital/</loc><lastmod>2024-05-10T13:35:24-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/preocupado-por-la-seguridad-de-su-facebook/</loc><lastmod>2024-05-10T13:38:07-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-poara-la-revista-segurlatam/</loc><lastmod>2024-05-10T13:37:22-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/framework-cybersecurtity-del-nist/</loc><lastmod>2024-05-10T13:32:59-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/el-software-de-cifrado-de-archivos/</loc><lastmod>2024-05-10T13:31:37-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-cuarta-revolucion-industrial/</loc><lastmod>2024-05-10T13:30:46-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/business-email-compromise-bec/</loc><lastmod>2024-05-10T13:29:40-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/modelo-vuca-en-la-aplicacion-de-la-ciberseguridad/</loc><lastmod>2024-05-10T13:47:32-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/foro-virtual-forbes-centro-america/</loc><lastmod>2024-05-13T10:49:58-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/open-finance-espana/</loc><lastmod>2024-05-13T10:31:49-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-en-tv-azteca-2/</loc><lastmod>2024-05-13T10:50:50-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-el-financiero/</loc><lastmod>2024-05-13T10:52:14-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-para-hechos-am-2/</loc><lastmod>2024-05-13T10:53:20-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/infosecurity-latam/</loc><lastmod>2024-05-13T10:54:32-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/milenio-television/</loc><lastmod>2024-05-13T10:55:34-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-el-economista/</loc><lastmod>2024-05-13T10:56:31-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/tv-azteca-aca-entre-nos/</loc><lastmod>2024-05-13T11:03:35-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/entrevista-idconline/</loc><lastmod>2024-05-13T10:58:27-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/panel-de-expertos-infosecurity/</loc><lastmod>2024-05-13T11:00:21-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/ciberseguridad-o-ciberresiliencia/</loc><lastmod>2024-05-14T11:36:38-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/factores-que-debemos-tener-en-cuenta-al-elegir-una-solucion-siem/</loc><lastmod>2024-05-20T11:43:07-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/el-panorama-de-la-ciberseguridad-amenazas-emergentes-y-defensas-avanzadas/</loc><lastmod>2024-05-28T11:35:33-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/por-que-algunas-personas-son-mas-susceptibles-al-phishing/</loc><lastmod>2024-06-10T13:35:17-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/anatomia-de-un-ataque-a-endpoint/</loc><lastmod>2024-07-26T17:56:52-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/que-pasa-si-pago-un-ransomware/</loc><lastmod>2024-08-15T14:38:50-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/caza-de-amenazas-threat-hunting/</loc><lastmod>2024-09-03T11:03:56-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/tu-huella-como-aliado-en-la-ciberseguridad/</loc><lastmod>2024-09-19T10:17:56-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/los-retos-del-ciso/</loc><lastmod>2024-10-09T14:05:29-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/metodologia-mitre-attck/</loc><lastmod>2024-10-21T13:29:32-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-importancia-de-proteger-la-informacion-a-traves-de-proveedores-externos/</loc><lastmod>2025-03-14T10:04:36-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/la-importancia-de-contratar-una-empresa-especializada-para-conocer-los-riesgos-en-ciberseguridad/</loc><lastmod>2025-04-06T20:08:55-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/los-ciberataques-a-la-cadena-de-suministro/</loc><lastmod>2026-02-19T13:48:20-06:00</lastmod></url><url><loc>https://sotelo.ameci.org/project-glasswing-hackers-eticos-basados-en-ia/</loc><lastmod>2026-04-14T12:34:53-06:00</lastmod></url></urlset>
