{"id":13456,"date":"2025-10-09T18:42:09","date_gmt":"2025-10-09T18:42:09","guid":{"rendered":"https:\/\/amiti.org.mx\/?p=13456"},"modified":"2025-10-10T03:32:37","modified_gmt":"2025-10-10T03:32:37","slug":"ciberseguridad-en-el-nearshoring","status":"publish","type":"post","link":"https:\/\/amiti.org.mx\/en\/13456\/ciberseguridad-en-el-nearshoring\/","title":{"rendered":"De maquilar a confiar: la ciberseguridad como nueva moneda de cambio en la cadena de suministro"},"content":{"rendered":"<style>.elementor-13456 .elementor-element.elementor-element-35cdf6ec > .elementor-widget-wrap > .elementor-widget:not(.elementor-widget__width-auto):not(.elementor-widget__width-initial):not(:last-child):not(.elementor-absolute){margin-block-end:20px;}.elementor-13456 .elementor-element.elementor-element-62371ff .jeg-elementor-kit.jkit-categorylist.layout-horizontal{justify-content:flex-start;}.elementor-13456 .elementor-element.elementor-element-62371ff .jeg-elementor-kit.jkit-categorylist.layout-horizontal .category-list-item{margin-right:calc(20px\/2);margin-left:calc(20px\/2);}.elementor-13456 .elementor-element.elementor-element-62371ff .jeg-elementor-kit.jkit-categorylist.layout-vertical .category-list-item:not(:last-child){padding-bottom:calc(20px\/2);}.elementor-13456 .elementor-element.elementor-element-62371ff .jeg-elementor-kit.jkit-categorylist .category-list-item .icon-list i, .elementor-13456 .elementor-element.elementor-element-62371ff .jeg-elementor-kit.jkit-categorylist .category-list-item .icon-list svg{margin-right:5px;}.elementor-13456 .elementor-element.elementor-element-62371ff > .elementor-widget-container{margin:0px 0px 0px 0px;}.elementor-13456 .elementor-element.elementor-element-6f5b467 > .elementor-widget-container{margin:0px 0px 0px 0px;padding:0px 0px 0px 0px;}.elementor-13456 .elementor-element.elementor-element-465ce29f > .elementor-widget-container{margin:-20px 0px 0px 0px;}.elementor-13456 .elementor-element.elementor-element-f4c3062 > .elementor-widget-container{margin:-20px 0px 10px 0px;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items.eael-feature-list-horizontal{gap:15px;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items.eael-feature-list-horizontal[data-layout-tablet=\"vertical\"] .eael-feature-list-item{padding-bottom:calc(15px\/2);}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items.eael-feature-list-vertical .eael-feature-list-item{padding-bottom:calc(15px\/2);}body.rtl .elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items.eael-feature-list-vertical .eael-feature-list-item:after{left:calc(-15px\/2);}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items.eael-feature-list-vertical.connector-type-modern .eael-feature-list-item:not(:last-child):before{height:calc(100% + 15px);}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items .eael-feature-list-icon-box .eael-feature-list-icon-inner{background-color:#37368e;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items .eael-feature-list-icon{color:#fff;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items .eael-feature-list-icon svg{fill:#fff;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-icon-box .eael-feature-list-icon{height:30px;width:30px;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-items.connector-type-classic .connector{right:calc(100% - 30px);}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-icon-box .eael-feature-list-icon i{font-size:23px !important;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-icon-box .eael-feature-list-icon svg{width:23px !important;height:23px !important;line-height:23px !important;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-icon-box .eael-feature-list-icon img{width:23px;height:23px;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-img{width:23px;height:23px;}.elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-left .eael-feature-list-content-box, .elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-right .eael-feature-list-content-box, .elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-top .eael-feature-list-content-box{margin:8px;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-item .eael-feature-list-title{margin-bottom:10px;}.elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-content-box .eael-feature-list-title, .elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-content-box .eael-feature-list-title > a, .elementor-13456 .elementor-element.elementor-element-d089495 .eael-feature-list-content-box .eael-feature-list-title:visited{color:#414247;}.elementor-13456 .elementor-element.elementor-element-ead22eb > .elementor-widget-container{margin:-20px 0px 0px 0px;}.elementor-13456 .elementor-element.elementor-element-5842bf6{--divider-border-style:solid;--divider-color:var( --e-global-color-459cd68 );--divider-border-width:1px;}.elementor-13456 .elementor-element.elementor-element-5842bf6 .elementor-divider-separator{width:100%;}.elementor-13456 .elementor-element.elementor-element-5842bf6 .elementor-divider{padding-block-start:15px;padding-block-end:15px;}@media(max-width:1024px){.elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-left .eael-feature-list-content-box, .elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-right .eael-feature-list-content-box, .elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-top .eael-feature-list-content-box{margin:20px;}}@media(max-width:767px){.elementor-13456 .elementor-element.elementor-element-d089495 .-mobile-icon-position-left .eael-feature-list-content-box{margin:0 0 0 10px !important;}.elementor-13456 .elementor-element.elementor-element-d089495 .-mobile-icon-position-right .eael-feature-list-content-box{margin:0 10px 0 0 !important;}.elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-left .eael-feature-list-content-box, .elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-right .eael-feature-list-content-box, .elementor-13456 .elementor-element.elementor-element-d089495 .-icon-position-top .eael-feature-list-content-box{margin:10px;}}<\/style>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13456\" class=\"elementor elementor-13456\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-66776616 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"66776616\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35cdf6ec\" data-id=\"35cdf6ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62371ff elementor-widget elementor-widget-jkit_category_list\" data-id=\"62371ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_category_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-categorylist layout-horizontal jeg_module___69df1627969fe\" ><div class=\"jkit-category category-list-item\">\n                <a href=\"https:\/\/amiti.org.mx\/en\/category\/noticias-comites\/\">\n                    <span class=\"icon-list\"><i aria-hidden=\"true\" class=\"icon icon-tag\"><\/i><\/span>\n                    <div class=\"jkit-categorylist-content\">Noticias Comit\u00e9s<\/div>\n                <\/a>\n            <\/div><div class=\"jkit-category category-list-item\">\n                <a href=\"https:\/\/amiti.org.mx\/en\/category\/comite-de-ciberseguridad\/\">\n                    <span class=\"icon-list\"><i aria-hidden=\"true\" class=\"icon icon-tag\"><\/i><\/span>\n                    <div class=\"jkit-categorylist-content\">Comit\u00e9 de Ciberseguridad<\/div>\n                <\/a>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f5b467 elementor-widget elementor-widget-text-editor\" data-id=\"6f5b467\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Por <em><a href=\"https:\/\/www.linkedin.com\/in\/jpcarsi\/\">Juan Pablo Carsi<\/a><\/em>, l\u00edder del <em>Comit\u00e9 de Ciberseguridad.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-465ce29f elementor-widget elementor-widget-text-editor\" data-id=\"465ce29f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00bfDe qu\u00e9 sirve atraer inversiones millonarias por <em data-start=\"250\" data-end=\"263\">nearshoring<\/em> si un ataque a tu cadena de suministro puede detener la producci\u00f3n en horas y costar lo mismo que un a\u00f1o de utilidades<\/p><p>Octubre es el Mes de la Ciberseguridad, y desde AMITI vale la pena recordar que ya no estamos hablando solo de <em data-start=\"496\" data-end=\"507\">firewalls<\/em>, antivirus y contrase\u00f1as seguras. Estamos hablando de estrategia de negocios. En un pa\u00eds como M\u00e9xico, que vive una oportunidad hist\u00f3rica con el <em data-start=\"652\" data-end=\"665\">nearshoring<\/em>, la ciberseguridad no es una moda: es la pieza que define si convertimos la oportunidad en ventaja competitiva\u2026 o en fiasco nacional.<\/p><p>La ciberseguridad en el <em data-start=\"825\" data-end=\"838\">nearshoring<\/em> es como el cintur\u00f3n de seguridad en un auto de carreras. Puedes tener el motor m\u00e1s potente (inversi\u00f3n extranjera), el mejor piloto (tu talento humano) y la pista perfecta (infraestructura y tratados comerciales). Pero sin cintur\u00f3n, un choque \u2014inevitable en alg\u00fan punto\u2014 puede dejarte fuera de la competencia para siempre.<\/p><p>El <em data-start=\"1165\" data-end=\"1178\">nearshoring<\/em> es velocidad. La ciberseguridad es resiliencia. Una sin la otra es un accidente esperando suceder.<\/p><p>En M\u00e9xico, la manufactura y la log\u00edstica son el coraz\u00f3n del <em data-start=\"1339\" data-end=\"1352\">nearshoring<\/em>. Pero tambi\u00e9n son el blanco m\u00e1s atractivo para el cibercrimen. M\u00e1s de la mitad de los ataques en Latinoam\u00e9rica golpean directamente a M\u00e9xico, y los reportes de 2025 muestran que las cadenas de suministro est\u00e1n en el centro de esta tormenta<\/p><p>Los atacantes saben que un proveedor d\u00e9bil basta para comprometer a toda una red de empresas. Y lo saben los inversionistas: cada vez m\u00e1s contratos incluyen cl\u00e1usulas de ciberseguridad, y cada vez m\u00e1s <em data-start=\"1796\" data-end=\"1804\">boards<\/em> preguntan no por tus ventas, sino por tu resiliencia digital.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4c3062 elementor-widget elementor-widget-heading\" data-id=\"f4c3062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Desde el comit\u00e9 de ciberseguridad de AMITI te compartimos tres movimientos estrat\u00e9gicos para no ser el eslab\u00f3n d\u00e9bil:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d089495 elementor-widget elementor-widget-eael-feature-list\" data-id=\"d089495\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n\t\t\t<ul id=\"eael-feature-list-d089495\" class=\"eael-feature-list-items circle stacked  eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-5692905\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">1. Eval\u00faa tu cadena como si fueras tu peor atacante.<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">La mayor\u00eda de los incidentes recientes no comenzaron en la planta principal, sino en un tercero.\n<br>\n<b>Acci\u00f3n:<\/b> Implementa un programa de Third Party Risk Management (TPRM).\n<br>\n<b>Quick win:<\/b>Antes de firmar, exige un checklist m\u00ednimo de seguridad a tus proveedores.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-8aee7db\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">2. Cierra la brecha OT-IT antes de que te explote en la planta.<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">La producci\u00f3n no se detiene por un correo malicioso, sino porque un ransomware bloquea una l\u00ednea de ensamblaje.\n<br>\n<b>Acci\u00f3n:<\/b> Eval\u00faa tu ciberseguridad en sistemas de operaci\u00f3n (OT\/ICS).\n<br>\n<b>Quick win: <\/b>Segmenta redes de oficina y producci\u00f3n; es barato y salva millones.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-5cb4c2c\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">3. Ejercita la resiliencia: no se trata de \u201csi\u201d, sino de \u201ccu\u00e1ndo\u201d.<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Los inversionistas no preguntan si tienes antivirus, preguntan cu\u00e1nto tardas en volver a operar.\n<br>\n<b>Acci\u00f3n:<\/b> Haz simulacros de incidentes con tu comit\u00e9 directivo.\n<br>\n<b>Quick win:<\/b> Define SLA de respuesta y recuperaci\u00f3n en tus contratos cr\u00edticos.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5389b3 elementor-widget elementor-widget-text-editor\" data-id=\"c5389b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El <em data-start=\"3006\" data-end=\"3019\">nearshoring<\/em> ya es la carrera que M\u00e9xico corre frente al mundo. Pero ning\u00fan piloto serio se sube a la pista sin cintur\u00f3n de seguridad. La ciberseguridad es esa correa que no evita el choque, pero s\u00ed asegura que puedas levantarte y seguir corriendo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead22eb elementor-widget elementor-widget-heading\" data-id=\"ead22eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La pregunta es clara: \u00bftu empresa ya se abroch\u00f3 el cintur\u00f3n?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5842bf6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5842bf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Noticias Comit\u00e9s Comit\u00e9 de Ciberseguridad Por Juan Pablo Carsi, l\u00edder del Comit\u00e9 de Ciberseguridad. \u00bfDe qu\u00e9 sirve atraer inversiones millonarias por nearshoring si un ataque a tu cadena de suministro puede detener la producci\u00f3n en horas y costar lo mismo que un a\u00f1o de utilidades Octubre es el Mes de la Ciberseguridad, y desde AMITI [&hellip;]<\/p>\n","protected":false},"author":582,"featured_media":13504,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[91,18],"tags":[],"class_list":["post-13456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comite-de-ciberseguridad","category-noticias-comites"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad: el nuevo motor del nearshoring en M\u00e9xico | AMITI<\/title>\n<meta name=\"description\" content=\"Descubre por qu\u00e9 la ciberseguridad es clave para que el nearshoring en M\u00e9xico sea una ventaja competitiva y no un riesgo millonario.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amiti.org.mx\/en\/13456\/ciberseguridad-en-el-nearshoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad: el nuevo motor del nearshoring en M\u00e9xico | AMITI\" \/>\n<meta property=\"og:description\" content=\"Descubre por qu\u00e9 la ciberseguridad es clave para que el nearshoring en M\u00e9xico sea una ventaja competitiva y no un riesgo millonario.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amiti.org.mx\/en\/13456\/ciberseguridad-en-el-nearshoring\/\" \/>\n<meta property=\"og:site_name\" content=\"AMITI\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AMITIMex\/?locale=es_LA\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-09T18:42:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-10T03:32:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amiti.org.mx\/wp-content\/uploads\/2025\/10\/AMITI-CIBERSEGURIDAD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ayr\u00e9e Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AMITI_Mex\" \/>\n<meta name=\"twitter:site\" content=\"@AMITI_Mex\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ayr\u00e9e Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/\"},\"author\":{\"name\":\"Ayr\u00e9e Marketing\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#\\\/schema\\\/person\\\/bef747dc34d5fdd04d3b8548d7ab66e7\"},\"headline\":\"De maquilar a confiar: la ciberseguridad como nueva moneda de cambio en la cadena de suministro\",\"datePublished\":\"2025-10-09T18:42:09+00:00\",\"dateModified\":\"2025-10-10T03:32:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/\"},\"wordCount\":565,\"publisher\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/amiti.org.mx\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AMITI-CIBERSEGURIDAD.png\",\"articleSection\":[\"Comit\u00e9 de Ciberseguridad\",\"Noticias Comit\u00e9s\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/\",\"url\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/\",\"name\":\"Ciberseguridad: el nuevo motor del nearshoring en M\u00e9xico | AMITI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/amiti.org.mx\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AMITI-CIBERSEGURIDAD.png\",\"datePublished\":\"2025-10-09T18:42:09+00:00\",\"dateModified\":\"2025-10-10T03:32:37+00:00\",\"description\":\"Descubre por qu\u00e9 la ciberseguridad es clave para que el nearshoring en M\u00e9xico sea una ventaja competitiva y no un riesgo millonario.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/#primaryimage\",\"url\":\"https:\\\/\\\/amiti.org.mx\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AMITI-CIBERSEGURIDAD.png\",\"contentUrl\":\"https:\\\/\\\/amiti.org.mx\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AMITI-CIBERSEGURIDAD.png\",\"width\":1080,\"height\":1350,\"caption\":\"De maquilar a confiar: la ciberseguridad como nueva moneda de cambio en la cadena de suministro\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/13456\\\/ciberseguridad-en-el-nearshoring\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/amiti.org.mx\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"De maquilar a confiar: la ciberseguridad como nueva moneda de cambio en la cadena de suministro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#website\",\"url\":\"https:\\\/\\\/amiti.org.mx\\\/\",\"name\":\"AMITI\",\"description\":\"Mejores empresas TI para M\u00e9xico\",\"publisher\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/amiti.org.mx\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#organization\",\"name\":\"AMITI\",\"url\":\"https:\\\/\\\/amiti.org.mx\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/amiti.org.mx\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Amiti_CMYK.png\",\"contentUrl\":\"https:\\\/\\\/amiti.org.mx\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Amiti_CMYK.png\",\"width\":1161,\"height\":458,\"caption\":\"AMITI\"},\"image\":{\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AMITIMex\\\/?locale=es_LA\",\"https:\\\/\\\/x.com\\\/AMITI_Mex\",\"https:\\\/\\\/www.instagram.com\\\/amiti_mex\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/amiti-mex\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCaBdZB-k6j-lCH-eTCbLGJw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/amiti.org.mx\\\/#\\\/schema\\\/person\\\/bef747dc34d5fdd04d3b8548d7ab66e7\",\"name\":\"Ayr\u00e9e Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/154730eb13401b64772ed3dee7128fc1adbd2e25785ab70a92a288c835715b69?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/154730eb13401b64772ed3dee7128fc1adbd2e25785ab70a92a288c835715b69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/154730eb13401b64772ed3dee7128fc1adbd2e25785ab70a92a288c835715b69?s=96&d=mm&r=g\",\"caption\":\"Ayr\u00e9e Marketing\"},\"url\":\"https:\\\/\\\/amiti.org.mx\\\/en\\\/author\\\/ayree\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad: el nuevo motor del nearshoring en M\u00e9xico | AMITI","description":"Descubre por qu\u00e9 la ciberseguridad es clave para que el nearshoring en M\u00e9xico sea una ventaja competitiva y no un riesgo millonario.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amiti.org.mx\/en\/13456\/ciberseguridad-en-el-nearshoring\/","og_locale":"en_US","og_type":"article","og_title":"Ciberseguridad: el nuevo motor del nearshoring en M\u00e9xico | AMITI","og_description":"Descubre por qu\u00e9 la ciberseguridad es clave para que el nearshoring en M\u00e9xico sea una ventaja competitiva y no un riesgo millonario.","og_url":"https:\/\/amiti.org.mx\/en\/13456\/ciberseguridad-en-el-nearshoring\/","og_site_name":"AMITI","article_publisher":"https:\/\/www.facebook.com\/AMITIMex\/?locale=es_LA","article_published_time":"2025-10-09T18:42:09+00:00","article_modified_time":"2025-10-10T03:32:37+00:00","og_image":[{"width":1080,"height":1350,"url":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2025\/10\/AMITI-CIBERSEGURIDAD.png","type":"image\/png"}],"author":"Ayr\u00e9e Marketing","twitter_card":"summary_large_image","twitter_creator":"@AMITI_Mex","twitter_site":"@AMITI_Mex","twitter_misc":{"Written by":"Ayr\u00e9e Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/#article","isPartOf":{"@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/"},"author":{"name":"Ayr\u00e9e Marketing","@id":"https:\/\/amiti.org.mx\/#\/schema\/person\/bef747dc34d5fdd04d3b8548d7ab66e7"},"headline":"De maquilar a confiar: la ciberseguridad como nueva moneda de cambio en la cadena de suministro","datePublished":"2025-10-09T18:42:09+00:00","dateModified":"2025-10-10T03:32:37+00:00","mainEntityOfPage":{"@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/"},"wordCount":565,"publisher":{"@id":"https:\/\/amiti.org.mx\/#organization"},"image":{"@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/#primaryimage"},"thumbnailUrl":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2025\/10\/AMITI-CIBERSEGURIDAD.png","articleSection":["Comit\u00e9 de Ciberseguridad","Noticias Comit\u00e9s"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/","url":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/","name":"Ciberseguridad: el nuevo motor del nearshoring en M\u00e9xico | AMITI","isPartOf":{"@id":"https:\/\/amiti.org.mx\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/#primaryimage"},"image":{"@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/#primaryimage"},"thumbnailUrl":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2025\/10\/AMITI-CIBERSEGURIDAD.png","datePublished":"2025-10-09T18:42:09+00:00","dateModified":"2025-10-10T03:32:37+00:00","description":"Descubre por qu\u00e9 la ciberseguridad es clave para que el nearshoring en M\u00e9xico sea una ventaja competitiva y no un riesgo millonario.","breadcrumb":{"@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/#primaryimage","url":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2025\/10\/AMITI-CIBERSEGURIDAD.png","contentUrl":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2025\/10\/AMITI-CIBERSEGURIDAD.png","width":1080,"height":1350,"caption":"De maquilar a confiar: la ciberseguridad como nueva moneda de cambio en la cadena de suministro"},{"@type":"BreadcrumbList","@id":"https:\/\/amiti.org.mx\/13456\/ciberseguridad-en-el-nearshoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/amiti.org.mx\/"},{"@type":"ListItem","position":2,"name":"De maquilar a confiar: la ciberseguridad como nueva moneda de cambio en la cadena de suministro"}]},{"@type":"WebSite","@id":"https:\/\/amiti.org.mx\/#website","url":"https:\/\/amiti.org.mx\/","name":"AMITI","description":"Mejores empresas TI para M\u00e9xico","publisher":{"@id":"https:\/\/amiti.org.mx\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amiti.org.mx\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/amiti.org.mx\/#organization","name":"AMITI","url":"https:\/\/amiti.org.mx\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amiti.org.mx\/#\/schema\/logo\/image\/","url":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2024\/09\/Amiti_CMYK.png","contentUrl":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2024\/09\/Amiti_CMYK.png","width":1161,"height":458,"caption":"AMITI"},"image":{"@id":"https:\/\/amiti.org.mx\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AMITIMex\/?locale=es_LA","https:\/\/x.com\/AMITI_Mex","https:\/\/www.instagram.com\/amiti_mex\/","https:\/\/www.linkedin.com\/company\/amiti-mex\/","https:\/\/www.youtube.com\/channel\/UCaBdZB-k6j-lCH-eTCbLGJw"]},{"@type":"Person","@id":"https:\/\/amiti.org.mx\/#\/schema\/person\/bef747dc34d5fdd04d3b8548d7ab66e7","name":"Ayr\u00e9e Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/154730eb13401b64772ed3dee7128fc1adbd2e25785ab70a92a288c835715b69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/154730eb13401b64772ed3dee7128fc1adbd2e25785ab70a92a288c835715b69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/154730eb13401b64772ed3dee7128fc1adbd2e25785ab70a92a288c835715b69?s=96&d=mm&r=g","caption":"Ayr\u00e9e Marketing"},"url":"https:\/\/amiti.org.mx\/en\/author\/ayree\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-21 22:37:59","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/posts\/13456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/users\/582"}],"replies":[{"embeddable":true,"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/comments?post=13456"}],"version-history":[{"count":2,"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/posts\/13456\/revisions"}],"predecessor-version":[{"id":13491,"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/posts\/13456\/revisions\/13491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/media\/13504"}],"wp:attachment":[{"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/media?parent=13456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/categories?post=13456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/amiti.org.mx\/en\/wp-json\/wp\/v2\/tags?post=13456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}