{"id":2492,"date":"2026-02-11T14:14:33","date_gmt":"2026-02-11T14:14:33","guid":{"rendered":"https:\/\/assig.com.mx\/?page_id=2492"},"modified":"2026-02-11T14:20:20","modified_gmt":"2026-02-11T14:20:20","slug":"blog-iso-28000-gestionar-la-seguridad-en-la-cadena-de-suministro-mas-alla-del-transporte","status":"publish","type":"page","link":"https:\/\/assig.com.mx\/?page_id=2492","title":{"rendered":"Blog ISO 28000: gestionar la seguridad en la cadena de suministro m\u00e1s all\u00e1 del transporte"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2492\" class=\"elementor elementor-2492\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-38e6989f elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"38e6989f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-299aba36\" data-id=\"299aba36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67f437ad elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"67f437ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">En un entorno global marcado por <span style=\"color: #33cccc;\"><strong>robos, sabotajes, interrupciones log\u00edsticas, contrabando, ciberataques y eventos externos<\/strong>,<\/span> la seguridad en la cadena de suministro se ha convertido en un <span style=\"color: #33cccc;\"><strong>factor cr\u00edtico para la continuidad del negocio<\/strong>.<\/span><\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #000000;\">La <span style=\"color: #33cccc;\"><strong>ISO 28000<\/strong><\/span> es la norma internacional que permite a las organizaciones implementar un <span style=\"color: #33cccc;\"><strong>Sistema de Gesti\u00f3n de la Seguridad de la Cadena de Suministro<\/strong>,<\/span> enfocado en <span style=\"color: #33cccc;\"><strong>prevenir, detectar y responder a amenazas<\/strong><\/span> que pueden afectar personas, productos, informaci\u00f3n e infraestructura.<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #000000;\">En <span style=\"color: #33cccc;\"><strong>ASSIG<\/strong><\/span>, observamos que muchas empresas gestionan calidad, ambiente o SST, pero <span style=\"color: #33cccc;\"><strong>no integran la seguridad log\u00edstica como un sistema estructurado<\/strong>,<\/span> lo que las deja vulnerables ante riesgos externos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7edeb1c elementor-widget elementor-widget-heading\" data-id=\"7edeb1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 es ISO 28000?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b889162 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b889162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">La <span style=\"color: #33cccc;\"><strong>ISO 28000<\/strong><\/span> establece los requisitos para identificar, evaluar y controlar <span style=\"color: #33cccc;\"><strong>riesgos de seguridad<\/strong><\/span> a lo largo de la cadena de suministro, desde el origen hasta el cliente final.<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #000000;\">Aplica a organizaciones que participan en:<\/span><\/p><ul style=\"font-weight: 400;\"><li><span style=\"color: #000000;\">Manufactura<\/span><\/li><li><span style=\"color: #000000;\">Almacenamiento<\/span><\/li><li><span style=\"color: #000000;\">Transporte<\/span><\/li><li><span style=\"color: #000000;\">Log\u00edstica<\/span><\/li><li><span style=\"color: #000000;\">Distribuci\u00f3n<\/span><\/li><li><span style=\"color: #000000;\">Importaci\u00f3n y exportaci\u00f3n<\/span><\/li><li><span style=\"color: #000000;\">Servicios asociados a la cadena de suministro<\/span><\/li><\/ul><p style=\"font-weight: 400;\"><span style=\"color: #000000;\">Su enfoque es <span style=\"color: #33cccc;\"><strong>preventivo y basado en riesgos<\/strong>,<\/span> similar a otras normas ISO, pero con \u00e9nfasis en <span style=\"color: #33cccc;\"><strong>seguridad f\u00edsica, operativa y organizacional<\/strong>.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4cdb343\" data-id=\"4cdb343\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-95090a7 elementor-widget elementor-widget-heading\" data-id=\"95090a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ISO 28000: gestionar la seguridad en la cadena de suministro m\u00e1s all\u00e1 del transporte<\/h4>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1029bb6d elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1029bb6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb84d4e\" data-id=\"eb84d4e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b27c26a elementor-widget elementor-widget-heading\" data-id=\"b27c26a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 tipo de riesgos gestiona ISO 28000?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65ff9b5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"65ff9b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">ISO 28000 permite gestionar amenazas como:<\/span><\/p><ul style=\"font-weight: 400;\"><li><span style=\"color: #000000;\">Robo de mercanc\u00eda<\/span><\/li><li><span style=\"color: #000000;\">Sabotaje o contaminaci\u00f3n intencional<\/span><\/li><li><span style=\"color: #000000;\">Acceso no autorizado a instalaciones<\/span><\/li><li><span style=\"color: #000000;\">Manipulaci\u00f3n de productos en tr\u00e1nsito<\/span><\/li><li><span style=\"color: #000000;\">Falsificaci\u00f3n o desv\u00edo de mercanc\u00eda<\/span><\/li><li><span style=\"color: #000000;\">Interrupciones por eventos externos<\/span><\/li><li><span style=\"color: #000000;\">Riesgos en proveedores y transportistas<\/span><\/li><li><span style=\"color: #000000;\">P\u00e9rdida o alteraci\u00f3n de informaci\u00f3n log\u00edstica<\/span><\/li><\/ul><p><span style=\"font-weight: 400; color: #000000;\">Estos riesgos, si no se controlan, pueden generar <span style=\"color: #33cccc;\"><strong>p\u00e9rdidas econ\u00f3micas, incumplimientos contractuales y da\u00f1o reputacional<\/strong>.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-280edfce elementor-widget elementor-widget-heading\" data-id=\"280edfce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Errores comunes en la seguridad de la cadena de suministro<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-22712b2 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22712b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-63aaf1eb\" data-id=\"63aaf1eb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2158dfce elementor-widget elementor-widget-heading\" data-id=\"2158dfce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Gestionar la seguridad solo de forma reactiva\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47de091b elementor-widget elementor-widget-text-editor\" data-id=\"47de091b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">Se act\u00faa despu\u00e9s del incidente.<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #33cccc;\"><strong>Consecuencia:<\/strong><\/span><br \/><span style=\"color: #000000;\">Altos costos y p\u00e9rdida de confianza.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20a219e0 elementor-widget elementor-widget-heading\" data-id=\"20a219e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">No evaluar riesgos de proveedores y transportistas\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-172ef11 elementor-widget elementor-widget-text-editor\" data-id=\"172ef11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">Se asume que \u201cellos se encargan\u201d.<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #33cccc;\"><strong>Consecuencia:<\/strong><\/span><br \/><span style=\"color: #000000;\">Vulnerabilidades fuera del control interno.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-74b272b3 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74b272b3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-484b38a5\" data-id=\"484b38a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49a360b3 elementor-widget elementor-widget-heading\" data-id=\"49a360b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Falta de procedimientos ante incidentes de seguridad\n\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-289602f6 elementor-widget elementor-widget-text-editor\" data-id=\"289602f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">No existen protocolos claros de respuesta.<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #33cccc;\"><strong>Consecuencia:<\/strong><\/span><br \/><span style=\"color: #000000;\">Reacci\u00f3n tard\u00eda o desorganizada.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e7332ce elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e7332ce\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-695f1e8\" data-id=\"695f1e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1efe8df elementor-widget elementor-widget-heading\" data-id=\"1efe8df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">No integrar la seguridad con otros sistemas de gesti\u00f3n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77e2e5 elementor-widget elementor-widget-text-editor\" data-id=\"b77e2e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">La seguridad log\u00edstica se maneja de forma aislada.<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"color: #33cccc;\"><strong>Consecuencia:<\/strong><\/span><br \/>Duplicidad de esfuerzos y brechas de control.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3d0767 elementor-widget elementor-widget-heading\" data-id=\"a3d0767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo implementar ISO 28000 de forma efectiva?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f98ee2d elementor-widget elementor-widget-text-editor\" data-id=\"f98ee2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">En <span style=\"color: #33cccc;\"><strong>ASSIG<\/strong><\/span>, recomendamos un enfoque pr\u00e1ctico y alineado a la norma:<\/span><\/p><ol style=\"font-weight: 400;\"><li><span style=\"color: #000000;\">Analizar el <span style=\"color: #33cccc;\"><strong>contexto de la organizaci\u00f3n<\/strong><\/span> y su cadena de suministro<\/span><\/li><li><span style=\"color: #000000;\">Identificar amenazas internas y externas<\/span><\/li><li><span style=\"color: #000000;\">Evaluar riesgos de seguridad por proceso<\/span><\/li><li><span style=\"color: #000000;\">Definir controles de seguridad:<\/span><ul><li><span style=\"color: #000000;\">F\u00edsicos<\/span><\/li><li><span style=\"color: #000000;\">Organizacionales<\/span><\/li><li><span style=\"color: #000000;\">Operativos<\/span><\/li><\/ul><\/li><li><span style=\"color: #000000;\">Establecer planes de respuesta ante incidentes<\/span><\/li><li><span style=\"color: #000000;\">Capacitar al personal involucrado<\/span><\/li><li><span style=\"color: #000000;\">Evaluar desempe\u00f1o y mejorar continuamente<\/span><\/li><\/ol><p style=\"font-weight: 400;\"><span style=\"color: #000000;\">Este enfoque permite <span style=\"color: #33cccc;\"><strong>proteger la cadena sin frenar la operaci\u00f3n<\/strong>.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5ea9ae elementor-widget elementor-widget-heading\" data-id=\"e5ea9ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Beneficios de implementar ISO 28000<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88acee0 elementor-widget elementor-widget-text-editor\" data-id=\"88acee0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><span style=\"color: #000000;\">Un Sistema de Gesti\u00f3n conforme a ISO 28000 permite:<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #000000;\">\u2705 Reducir robos y p\u00e9rdidas<\/span><br \/><span style=\"color: #000000;\">\u2705 Asegurar la continuidad del suministro<\/span><br \/><span style=\"color: #000000;\">\u2705 Proteger productos, personas e informaci\u00f3n<\/span><br \/><span style=\"color: #000000;\">\u2705 Fortalecer la confianza de clientes y socios<\/span><br \/><span style=\"color: #000000;\">\u2705 Integrarse con ISO 9001, 14001, 45001, 27001<\/span><br \/><span style=\"color: #000000;\">\u2705 Mejorar la resiliencia del negocio<\/span><\/p><p style=\"font-weight: 400;\"><span style=\"color: #000000;\">ISO 28000 es especialmente valiosa para empresas con <span style=\"color: #33cccc;\"><strong>operaciones log\u00edsticas cr\u00edticas o exposici\u00f3n a riesgos externos<\/strong>.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c1432d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c1432d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a22044\" data-id=\"3a22044\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea27578 elementor-widget elementor-widget-heading\" data-id=\"ea27578\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo te apoya ASSIG?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaae71d elementor-widget elementor-widget-text-editor\" data-id=\"eaae71d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400; text-align: center;\"><span style=\"color: #000000;\">En <span style=\"color: #33cccc;\"><strong>ASSIG<\/strong>,<\/span> apoyamos a las organizaciones con:<\/span><\/p><ul style=\"font-weight: 400; text-align: center;\"><li style=\"text-align: left;\"><span style=\"color: #000000;\">Diagn\u00f3stico ISO 28000<\/span><\/li><li style=\"text-align: left;\"><span style=\"color: #000000;\">Identificaci\u00f3n y evaluaci\u00f3n de riesgos de seguridad<\/span><\/li><li style=\"text-align: left;\"><span style=\"color: #000000;\">Dise\u00f1o del Sistema de Gesti\u00f3n de Seguridad en la Cadena de Suministro<\/span><\/li><li style=\"text-align: left;\"><span style=\"color: #000000;\">Integraci\u00f3n con otros sistemas ISO<\/span><\/li><li style=\"text-align: left;\"><span style=\"color: #000000;\">Capacitaci\u00f3n al personal<\/span><\/li><li style=\"text-align: left;\"><span style=\"color: #000000;\">Auditor\u00edas internas y preparaci\u00f3n para certificaci\u00f3n<\/span><\/li><\/ul><p style=\"font-weight: 400; text-align: center;\"><span style=\"color: #000000;\">Nuestro enfoque es <span style=\"color: #33cccc;\"><strong>estrat\u00e9gico, preventivo y alineado a la realidad operativa<\/strong>.<\/span><\/span><\/p><p style=\"font-weight: 400; text-align: center;\"><span style=\"color: #000000;\"><span style=\"color: #33cccc;\"><strong>Cont\u00e1ctanos<\/strong><\/span> escr\u00edbenos por WhatsApp <span style=\"color: #33cccc;\"><strong>220 492 99 93<\/strong><\/span> o env\u00edanos un correo a <span style=\"color: #33cccc;\"><a style=\"color: #33cccc;\" href=\"mailto:contacto@assig.com.mx\"><strong>contacto@assig.com.mx<\/strong><\/a><\/span><\/span><\/p><p style=\"font-weight: 400; text-align: center;\"><span style=\"color: #000000;\">#ISO28000 #CadenaDeSuministro #SeguridadLog\u00edstica #Gesti\u00f3nDeRiesgos #ASSIG #SupplyChainSecurity #ContinuidadDelNegocio #Log\u00edsticaSegura #SistemasDeGesti\u00f3n #Auditor\u00edaISO<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>En un entorno global marcado por robos, sabotajes, interrupciones log\u00edsticas, contrabando, ciberataques y eventos externos, la seguridad en la cadena [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1189,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2492","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/assig.com.mx\/index.php?rest_route=\/wp\/v2\/pages\/2492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/assig.com.mx\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/assig.com.mx\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/assig.com.mx\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/assig.com.mx\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2492"}],"version-history":[{"count":4,"href":"https:\/\/assig.com.mx\/index.php?rest_route=\/wp\/v2\/pages\/2492\/revisions"}],"predecessor-version":[{"id":2497,"href":"https:\/\/assig.com.mx\/index.php?rest_route=\/wp\/v2\/pages\/2492\/revisions\/2497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/assig.com.mx\/index.php?rest_route=\/wp\/v2\/media\/1189"}],"wp:attachment":[{"href":"https:\/\/assig.com.mx\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}