{"id":6311,"date":"2017-02-07T14:24:56","date_gmt":"2017-02-07T13:24:56","guid":{"rendered":"https:\/\/preblogs.deusto.es\/iedeusto\/?p=6311"},"modified":"2018-06-27T08:58:12","modified_gmt":"2018-06-27T06:58:12","slug":"cyber-security-ventures","status":"publish","type":"post","link":"https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/","title":{"rendered":"Cyber Security Ventures"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full wp-image-6327 aligncenter\" src=\"https:\/\/blogs.deusto.es\/iedeusto\/wp-content\/uploads\/sites\/27\/2017\/02\/cber.png\" alt=\"cber\" width=\"322\" height=\"72\" srcset=\"https:\/\/blogs.deusto.es\/wp-content\/uploads\/sites\/27\/2017\/02\/cber.png 322w, https:\/\/blogs.deusto.es\/wp-content\/uploads\/sites\/27\/2017\/02\/cber-300x67.png 300w\" sizes=\"(max-width: 322px) 100vw, 322px\" \/>Si tu equipo es comprometido y\u00a0tiene un proyecto de negocio en ciberseguridad\u00a0que est\u00e9 orientado al mercado, con proyecci\u00f3n \u00a0internacional y potencial de comercializaci\u00f3n, tu start-up podr\u00eda ser una de las 10 seleccionadas para optar a premios de hasta 120.000\u20ac en met\u00e1lico.<\/p>\n<p>Cyber Security Ventures ofrece <strong>capacitaci\u00f3n, mentorizaci\u00f3n y vinculaci\u00f3n con inversores<\/strong><strong>;<\/strong>\u00a0apoyo intensivo orientado a <strong>atraer inversiones<\/strong> y <strong>captar los primeros clientes <\/strong>y\u00a0oportunidad de presentar el proyecto de negocio en el <strong>Demo Day final<\/strong> y <strong>premios de hasta 120.000\u20ac<\/strong> para acelerar el desarrollo de proyecto de negocio.<\/p>\n<p>Aunque la convocatoria todav\u00eda no est\u00e9 abierta puedes empezar con la preparaci\u00f3n de tu propuesta en\u00a0<a href=\"http:\/\/www.incibe.es\/ventures\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=es&amp;q=http:\/\/www.incibe.es\/ventures&amp;source=gmail&amp;ust=1486131467696000&amp;usg=AFQjCNEPmmDTeKBouBxRMU_ISlhnUeqb9w\">www.incibe.es\/ventures<\/a>.<\/p>\n<p>Si te gustar\u00eda saber m\u00e1s, registra tus datos a trav\u00e9s de:\u00a0<a href=\"https:\/\/wmail.inteco.es\/owa\/redir.aspx?SURL=sQgVyXajDrIkJns7_6cO8vxlOmXuqKygWoOq6pxmBgktZ5x-KjrUCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAGYANgBzAC4AYwBvAG0ALwBjAHkAYgBlAHIAcwBlAGMAdQByAGkAdAB5AHYAZQBuAHQAdQByAGUAcwBhAHAAcABsAGkAYwBhAHQAaQBvAG4AMgAwADEANwAvAGEAcABwAGwAeQA.&amp;URL=https%3a%2f%2fwww.f6s.com%2fcybersecurityventuresapplication2017%2fapply\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=es&amp;q=https:\/\/wmail.inteco.es\/owa\/redir.aspx?SURL%3DsQgVyXajDrIkJns7_6cO8vxlOmXuqKygWoOq6pxmBgktZ5x-KjrUCGgAdAB0AHAAcwA6AC8ALwB3AHcAdwAuAGYANgBzAC4AYwBvAG0ALwBjAHkAYgBlAHIAcwBlAGMAdQByAGkAdAB5AHYAZQBuAHQAdQByAGUAcwBhAHAAcABsAGkAYwBhAHQAaQBvAG4AMgAwADEANwAvAGEAcABwAGwAeQA.%26URL%3Dhttps%253a%252f%252fwww.f6s.com%252fcybersecurityventuresapplication2017%252fapply&amp;source=gmail&amp;ust=1486131467696000&amp;usg=AFQjCNGyGZwaH3GCm1rnZAnCoiNGLmgWwQ\">https:\/\/www.f6s.com\/cybersecurityventuresapplication2017\/apply<\/a><\/p>\n<p>Si tienes cualquier tipo de duda ponte en contacto con Cyber Security Ventures mediante su correo electr\u00f3nico:\u00a0<a href=\"https:\/\/wmail.inteco.es\/owa\/redir.aspx?SURL=oOL1L0X4q1AaaHiqebq87E2Fhj1v479WAO9-qmiZywktZ5x-KjrUCG0AYQBpAGwAdABvADoAdgBlAG4AdAB1AHIAZQBzAEAAaQBuAGMAaQBiAGUALgBlAHMA&amp;URL=mailto%3aventures%40incibe.es\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=es&amp;q=https:\/\/wmail.inteco.es\/owa\/redir.aspx?SURL%3DoOL1L0X4q1AaaHiqebq87E2Fhj1v479WAO9-qmiZywktZ5x-KjrUCG0AYQBpAGwAdABvADoAdgBlAG4AdAB1AHIAZQBzAEAAaQBuAGMAaQBiAGUALgBlAHMA%26URL%3Dmailto%253aventures%2540incibe.es&amp;source=gmail&amp;ust=1486131467696000&amp;usg=AFQjCNGz12ccHlynHF0Qk7Tod89X8MX9WQ\">ventures@incibe.es<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span class='st_facebook_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='facebook'><\/span><span st_via='deustoDEC' st_username='deustoDEC' class='st_twitter_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='twitter'><\/span><span class='st_email_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='email'><\/span><span class='st_fblike_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='fblike'><\/span><span class='st_plusone_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='plusone'><\/span><span class='st_pinterest_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='pinterest'><\/span><span class='st_sharethis_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='sharethis'><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Si tu equipo es comprometido y\u00a0tiene un proyecto de negocio en ciberseguridad\u00a0que est\u00e9 orientado al mercado, con proyecci\u00f3n \u00a0internacional y potencial de comercializaci\u00f3n, tu start-up podr\u00eda ser una de las 10 seleccionadas para optar a premios de hasta 120.000\u20ac en met\u00e1lico. Cyber Security Ventures ofrece capacitaci\u00f3n, mentorizaci\u00f3n y vinculaci\u00f3n con inversores;\u00a0apoyo intensivo orientado a atraer [&hellip;]<\/p>\n<p><span class='st_facebook_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='facebook'><\/span><span st_via='deustoDEC' st_username='deustoDEC' class='st_twitter_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='twitter'><\/span><span class='st_email_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='email'><\/span><span class='st_fblike_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='fblike'><\/span><span class='st_plusone_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='plusone'><\/span><span class='st_pinterest_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='pinterest'><\/span><span class='st_sharethis_buttons' st_title='Cyber Security Ventures' st_url='https:\/\/blogs.deusto.es\/iedeusto\/cyber-security-ventures\/' displayText='sharethis'><\/span><\/p>","protected":false},"author":387,"featured_media":6327,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[85,3,1],"tags":[],"class_list":["post-6311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-concurso-2","category-difusion","category-sin-categoria"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blogs.deusto.es\/wp-content\/uploads\/sites\/27\/2017\/02\/cber.png","_links":{"self":[{"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/posts\/6311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/users\/387"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/comments?post=6311"}],"version-history":[{"count":9,"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/posts\/6311\/revisions"}],"predecessor-version":[{"id":6329,"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/posts\/6311\/revisions\/6329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/media\/6327"}],"wp:attachment":[{"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/media?parent=6311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/categories?post=6311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.deusto.es\/iedeusto\/wp-json\/wp\/v2\/tags?post=6311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}