
Chema Alonso
Chema Alonso es actualmente CDO (Chief Digital Officer) de Telefónica, y es responsable de Innovación, Datos, Plataformas, Productos y Servicios Digitales. Wayra, OpenGatay, Aplicaciones Digitales, Kernel, Plataformas de Vídeo o WiFi son parte de su unidad. Previamente fue CDCO (Chief Digital Consumer Officer) y CDO (Chief Data Officer) donde fue responsable del lanzamiento de LUCA, Aura, 4P, Movistar Home & Living Apps. Anteriormente había sido el fundador y CEO de ElevenPaths empresa filial de Telefónica centrada en ciberseguridad. También fundó, trabajó y dirigió Informática 64 durante 14 años, empresa centrada en Seguridad Informática y formación. Es Doctor en Seguridad Informática por la Universidad Rey Juan Carlos de Madrid, Ingeniero Informático por la URJC e Ingeniero Informático de Sistemas por la Universidad Politécnica de Madrid, que además le nombró Embajador Honorífico de la Escuela Universitaria de Informática en el año 2012. En 2020, la URJC le ha nombrado Doctor Honoris Causa.
Puedes contactar con Chema Alonso directamente a través de su buzón público en https://www.mypublicinbox.com/ChemaAlonso y puedes solicitar un reunión virtual con él en https://www.mypublicinbox.com/chemaalonso/videocall
Address: Puedes contactar con Chema Alonso directamente a través de su buzón público en https://www.mypublicinbox.com/ChemaAlonso y puedes solicitar un reunión virtual con él en https://www.mypublicinbox.com/chemaalonso/videocall
Puedes contactar con Chema Alonso directamente a través de su buzón público en https://www.mypublicinbox.com/ChemaAlonso y puedes solicitar un reunión virtual con él en https://www.mypublicinbox.com/chemaalonso/videocall
Address: Puedes contactar con Chema Alonso directamente a través de su buzón público en https://www.mypublicinbox.com/ChemaAlonso y puedes solicitar un reunión virtual con él en https://www.mypublicinbox.com/chemaalonso/videocall
less
Related Authors
Steven Pinker
Harvard University
David Seamon
Kansas State University
Armando Marques-Guedes
UNL - New University of Lisbon
Andrew N Liaropoulos
University of Piraeus
Fatiha Djemili Tolba
Badji Mokhtar - Annaba University
Renata Morais
European Graduate School (EGS)
Fabio Cuzzolin
Oxford Brookes University
Nataliia Bielova
INRIA
Dr. Matthew Crosston
Brown University
Uploads
Papers by Chema Alonso
by verifying user identification information of said user, where in a second server in connection with a user computing device with a dedicated program is used for receiving a request about a status associated to said user; initializing a credential exchange in order to provide mutual authentication, verifying said associated status that has been previously set as valid or as invalid by said user; and sending said associated status of said first server wherein the latter allows the logging of said request or rejects it if said associated status is set as valid or as invalid.
a security level of said requested web page including a status of the us er and the presence of risks in the requested web page. The control service executes a security check on said requested web page by checking whether the requested web page is included in a blacklist or a whitelist and also by
checking certain risk control criteria of the requested web page. Finally, in response to receipt a result of said security check, the control device allows or denies access †o said web page.
These connections multiply the risks involved in data
transmission for legitimate users, since the security provided by the infrastructure is insufficient. This article describes the risks
and protection options that a legitimate user of a legitimate. although insecure wireless network. can resort to. This document analices the environments in which a legitimate user may be at risk. exposed to attacks from malicious network users. and the practices that help to increase security for your work within the network. A monitoring tool has been developed to provide assistance in this task, by allowing the user to monitor network activity, and thereby gaining greater security.
dealt with. In this white paper [Social and ethical challenges of the metaverse. Preprint at https://www.telefonica.com/en/
communication-room/the-social-andethical-challenges-of-the-metaverse/ (2022). Accessed Dec 2022], we briefly describe
what the metaverse is, what technologies are part of its ecosystem, and where it comes from. We then focus on the potential
societal/social and ethical risks of the metaverse. We argue that companies that are implementing the responsible use of AI
are well prepared for the social and ethical risks of the metaverse. Not because they know the future, but because they have
the right governance and culture in place to deal with such risks.
by verifying user identification information of said user, where in a second server in connection with a user computing device with a dedicated program is used for receiving a request about a status associated to said user; initializing a credential exchange in order to provide mutual authentication, verifying said associated status that has been previously set as valid or as invalid by said user; and sending said associated status of said first server wherein the latter allows the logging of said request or rejects it if said associated status is set as valid or as invalid.
a security level of said requested web page including a status of the us er and the presence of risks in the requested web page. The control service executes a security check on said requested web page by checking whether the requested web page is included in a blacklist or a whitelist and also by
checking certain risk control criteria of the requested web page. Finally, in response to receipt a result of said security check, the control device allows or denies access †o said web page.
These connections multiply the risks involved in data
transmission for legitimate users, since the security provided by the infrastructure is insufficient. This article describes the risks
and protection options that a legitimate user of a legitimate. although insecure wireless network. can resort to. This document analices the environments in which a legitimate user may be at risk. exposed to attacks from malicious network users. and the practices that help to increase security for your work within the network. A monitoring tool has been developed to provide assistance in this task, by allowing the user to monitor network activity, and thereby gaining greater security.
dealt with. In this white paper [Social and ethical challenges of the metaverse. Preprint at https://www.telefonica.com/en/
communication-room/the-social-andethical-challenges-of-the-metaverse/ (2022). Accessed Dec 2022], we briefly describe
what the metaverse is, what technologies are part of its ecosystem, and where it comes from. We then focus on the potential
societal/social and ethical risks of the metaverse. We argue that companies that are implementing the responsible use of AI
are well prepared for the social and ethical risks of the metaverse. Not because they know the future, but because they have
the right governance and culture in place to deal with such risks.