{"id":51080,"date":"2024-06-19T14:40:11","date_gmt":"2024-06-19T17:40:11","guid":{"rendered":"https:\/\/evertectrends.com\/?p=51080"},"modified":"2024-07-30T15:15:35","modified_gmt":"2024-07-30T18:15:35","slug":"tendencias-de-cybersecurity","status":"publish","type":"post","link":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/","title":{"rendered":"Tend\u00eancias de cybersecurity: h\u00e1 algo novo?"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">\u00c9 muito comum em qualquer mercado falarmos de tend\u00eancias e nos preocuparmos com o futuro, mas ser\u00e1 que estamos tratando dos problemas de agora? E ser\u00e1 que os problemas futuros n\u00e3o s\u00e3o criados por falhas que est\u00e3o acontecendo neste momento?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dentro de seguran\u00e7a, existem dezenas de frentes de trabalho, desde controles t\u00e9cnicos at\u00e9 gest\u00e3o de riscos. No entanto, quero destacar dois pontos que podem fazer a diferen\u00e7a na implementa\u00e7\u00e3o de um programa de seguran\u00e7a e que deveriam ser uma constante tend\u00eancia para os profissionais e empresas: <\/span><b>o equil\u00edbrio entre seguran\u00e7a e o neg\u00f3cio atrav\u00e9s da experi\u00eancia do usu\u00e1rio<\/b><span style=\"font-weight: 400;\">, e a avalia\u00e7\u00e3o constante do ferramental de cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alcan\u00e7ar o equil\u00edbrio entre seguran\u00e7a e experi\u00eancia do usu\u00e1rio requer uma abordagem centrada no usu\u00e1rio, uso inteligente da tecnologia e um foco constante na educa\u00e7\u00e3o e conscientiza\u00e7\u00e3o. Na pr\u00e1tica, podemos adotar algumas medidas:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pesquisa constante de satisfa\u00e7\u00e3o com os usu\u00e1rios;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Envolvimento de especialistas em experi\u00eancia do usu\u00e1rio no desenvolvimento de seguran\u00e7a;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Uso de Single Sign-On (SSO) para redu\u00e7\u00e3o da quantidade de senhas que precisam ser lembradas;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Treinamento e conscientiza\u00e7\u00e3o de seguran\u00e7a cont\u00ednua;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Utiliza\u00e7\u00e3o de biometria para facilitar o processo de autentica\u00e7\u00e3o;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implementa\u00e7\u00e3o de autentica\u00e7\u00e3o adaptativa que se ajusta ao comportamento do usu\u00e1rio e contexto da transa\u00e7\u00e3o.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Ap\u00f3s a implanta\u00e7\u00e3o de controles e ferramentas de seguran\u00e7a, \u00e9 fundamental avaliar sua efic\u00e1cia para garantir os benef\u00edcios esperados. Existem algumas estrat\u00e9gias e m\u00e9todos utilizados, tais como:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Realiza\u00e7\u00e3o de auditorias internas e externas;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execu\u00e7\u00e3o de testes de intrus\u00e3o no ambiente;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avalia\u00e7\u00f5es de vulnerabilidade;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An\u00e1lise e revis\u00e3o de logs de eventos;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implanta\u00e7\u00e3o de indicadores de seguran\u00e7a;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execu\u00e7\u00e3o de simula\u00e7\u00f5es de incidentes;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Realiza\u00e7\u00e3o de benchmarking com o mercado;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Simula\u00e7\u00f5es de phishing;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coleta de feedback dos colaboradores.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Mas, para n\u00e3o deixarmos as tend\u00eancias de lado, vamos analisar o relat\u00f3rio <\/span><b>Cybersecurity Outlook 2024<\/b><span style=\"font-weight: 400;\"> do F\u00f3rum Econ\u00f4mico Mundial (WEF), que levantou os principais desafios apontados pelas empresas para este ano.<\/span><\/p>\n<p><b>Aumento da desigualdade entre as empresas ciber-resilientes e as que n\u00e3o s\u00e3o<\/b><span style=\"font-weight: 400;\">: apesar do n\u00famero de empresas que se declaram possuir controles m\u00ednimos de seguran\u00e7a ter aumentado, as pequenas e m\u00e9dias empresas ainda est\u00e3o longe do patamar de maturidade das grandes organiza\u00e7\u00f5es.<\/span><\/p>\n<p><b>Novas tecnologias trar\u00e3o desafios a longo prazo na ciberseguran\u00e7a<\/b><span style=\"font-weight: 400;\">: novas tecnologias como a intelig\u00eancia artificial trar\u00e3o novos riscos ao ambiente tecnol\u00f3gico na mesma propor\u00e7\u00e3o que os benef\u00edcios, por\u00e9m a expectativa \u00e9 mais sombria &#8211; estaremos sempre um passo atr\u00e1s dos atacantes.<\/span><\/p>\n<p><b>Dificuldade de busca e reten\u00e7\u00e3o de talentos em ciberseguran\u00e7a<\/b><span style=\"font-weight: 400;\">: mais uma vez, nada de novo aqui. J\u00e1 faz anos que a demanda por recursos especializados em seguran\u00e7a \u00e9 escassa e a previs\u00e3o n\u00e3o \u00e9 boa; segundo a ISC2, o Brasil tem um d\u00e9ficit de mais de 200 mil profissionais.<\/span><\/p>\n<p><b>Aproxima\u00e7\u00e3o das \u00e1reas de seguran\u00e7a com o neg\u00f3cio<\/b><span style=\"font-weight: 400;\">: essa aproxima\u00e7\u00e3o tem se tornado cada vez mais comum em todas as empresas entrevistadas, o que mostra uma genu\u00edna preocupa\u00e7\u00e3o do neg\u00f3cio com a seguran\u00e7a.<\/span><\/p>\n<p><b>Desafio com a gest\u00e3o de parceiros no ecossistema de seguran\u00e7a<\/b><span style=\"font-weight: 400;\">: para todas as organiza\u00e7\u00f5es entrevistadas, os parceiros de seguran\u00e7a s\u00e3o ativos importantes em todo o ecossistema, bem como um grande desafio.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As empresas que conseguirem endere\u00e7ar de alguma maneira todos esses pontos estar\u00e3o em vantagem. Isso n\u00e3o significa zerar todos os riscos, mas alcan\u00e7ar um equil\u00edbrio entre seguran\u00e7a e neg\u00f3cios, reter talentos-chave, controlar e reduzir os sistemas legados, fazer o &#8220;b\u00e1sico bem feito&#8221; e adotar novas tecnologias. Dessa forma, estar\u00e3o criando uma <\/span><b>cultura de ciberseguran\u00e7a s\u00f3lida<\/b><span style=\"font-weight: 400;\"> e mais preparada para reagir aos ataques.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Todos os pontos expostos s\u00e3o de conhecimento de longa data e, \u00e0 medida que as empresas conseguem trat\u00e1-los, a maturidade vai aumentando e, consequentemente, o risco de seguran\u00e7a diminui.<\/span><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":12,"featured_media":51143,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1001],"tags":[52,742,749,373,350,64,225,750,253],"class_list":["post-51080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca","tag-bancos","tag-consorcio","tag-fundos","tag-pagamentos","tag-previdencia","tag-seguranca","tag-seguranca-da-informacao","tag-servicos-e-consultoria","tag-solucoes-digitais"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tend\u00eancias de cybersecurity: h\u00e1 algo novo? - Evertec Trends<\/title>\n<meta name=\"description\" content=\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia Entenda as novas tend\u00eancias de cibersecurity e quais temas s\u00e3o priorit\u00e1rios nos dias de hoje.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tend\u00eancias de cybersecurity: h\u00e1 algo novo? - Evertec Trends\" \/>\n<meta property=\"og:description\" content=\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia Entenda as novas tend\u00eancias de cibersecurity e quais temas s\u00e3o priorit\u00e1rios nos dias de hoje.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Evertec Trends\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-19T17:40:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-30T18:15:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/Tendencias-Cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fernando Malta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Malta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/\"},\"author\":{\"name\":\"Fernando Malta\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/person\\\/7cf78c7350b5387ad50b8d6f7f1cc066\"},\"headline\":\"Tend\u00eancias de cybersecurity: h\u00e1 algo novo?\",\"datePublished\":\"2024-06-19T17:40:11+00:00\",\"dateModified\":\"2024-07-30T18:15:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/\"},\"wordCount\":709,\"publisher\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Tendencias-Cybersecurity.png\",\"keywords\":[\"Bancos\",\"Cons\u00f3rcio\",\"Fundos\",\"Pagamentos\",\"Previd\u00eancia\",\"seguran\u00e7a\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"Servi\u00e7os e Consultoria\",\"Solu\u00e7\u00f5es Digitais\"],\"articleSection\":[\"Seguran\u00e7a\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/\",\"name\":\"Tend\u00eancias de cybersecurity: h\u00e1 algo novo? - Evertec Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Tendencias-Cybersecurity.png\",\"datePublished\":\"2024-06-19T17:40:11+00:00\",\"dateModified\":\"2024-07-30T18:15:35+00:00\",\"description\":\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia Entenda as novas tend\u00eancias de cibersecurity e quais temas s\u00e3o priorit\u00e1rios nos dias de hoje.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Tendencias-Cybersecurity.png\",\"contentUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Tendencias-Cybersecurity.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/tendencias-de-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a\",\"item\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/categorias\\\/seguranca\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tend\u00eancias de cybersecurity: h\u00e1 algo novo?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#website\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/\",\"name\":\"Evertec Trends\",\"description\":\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia\",\"publisher\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/evertectrends.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#organization\",\"name\":\"Evertec Trends\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/evertectrends-sq.png\",\"contentUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/evertectrends-sq.png\",\"width\":416,\"height\":417,\"caption\":\"Evertec Trends\"},\"image\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/person\\\/7cf78c7350b5387ad50b8d6f7f1cc066\",\"name\":\"Fernando Malta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62e171d04e7c92397a492d127ad997079b840d7d0196d7e2114a938b7e39c38c?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62e171d04e7c92397a492d127ad997079b840d7d0196d7e2114a938b7e39c38c?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62e171d04e7c92397a492d127ad997079b840d7d0196d7e2114a938b7e39c38c?s=96&d=robohash&r=g\",\"caption\":\"Fernando Malta\"},\"description\":\"Head de Seguran\u00e7a da Informa\u00e7\u00e3o na Sinqia, Fernando Malta possui mais de 20 anos de experi\u00eancia na implanta\u00e7\u00e3o de controles de seguran\u00e7a e de processos de acordo com as necessidades do neg\u00f3cio e das melhores pr\u00e1ticas de mercado.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fernandomalta\\\/\"],\"url\":\"https:\\\/\\\/evertectrends.com\\\/pt-br\\\/author\\\/fernando-malta\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tend\u00eancias de cybersecurity: h\u00e1 algo novo? - Evertec Trends","description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia Entenda as novas tend\u00eancias de cibersecurity e quais temas s\u00e3o priorit\u00e1rios nos dias de hoje.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/","og_locale":"pt_BR","og_type":"article","og_title":"Tend\u00eancias de cybersecurity: h\u00e1 algo novo? - Evertec Trends","og_description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia Entenda as novas tend\u00eancias de cibersecurity e quais temas s\u00e3o priorit\u00e1rios nos dias de hoje.","og_url":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/","og_site_name":"Evertec Trends","article_published_time":"2024-06-19T17:40:11+00:00","article_modified_time":"2024-07-30T18:15:35+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/Tendencias-Cybersecurity.png","type":"image\/png"}],"author":"Fernando Malta","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Fernando Malta","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/"},"author":{"name":"Fernando Malta","@id":"https:\/\/evertectrends.com\/#\/schema\/person\/7cf78c7350b5387ad50b8d6f7f1cc066"},"headline":"Tend\u00eancias de cybersecurity: h\u00e1 algo novo?","datePublished":"2024-06-19T17:40:11+00:00","dateModified":"2024-07-30T18:15:35+00:00","mainEntityOfPage":{"@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/"},"wordCount":709,"publisher":{"@id":"https:\/\/evertectrends.com\/#organization"},"image":{"@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/Tendencias-Cybersecurity.png","keywords":["Bancos","Cons\u00f3rcio","Fundos","Pagamentos","Previd\u00eancia","seguran\u00e7a","seguran\u00e7a da informa\u00e7\u00e3o","Servi\u00e7os e Consultoria","Solu\u00e7\u00f5es Digitais"],"articleSection":["Seguran\u00e7a"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/","url":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/","name":"Tend\u00eancias de cybersecurity: h\u00e1 algo novo? - Evertec Trends","isPartOf":{"@id":"https:\/\/evertectrends.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/Tendencias-Cybersecurity.png","datePublished":"2024-06-19T17:40:11+00:00","dateModified":"2024-07-30T18:15:35+00:00","description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia Entenda as novas tend\u00eancias de cibersecurity e quais temas s\u00e3o priorit\u00e1rios nos dias de hoje.","breadcrumb":{"@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/#primaryimage","url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/Tendencias-Cybersecurity.png","contentUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/Tendencias-Cybersecurity.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/evertectrends.com\/pt-br\/tendencias-de-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/evertectrends.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a","item":"https:\/\/evertectrends.com\/pt-br\/categorias\/seguranca\/"},{"@type":"ListItem","position":3,"name":"Tend\u00eancias de cybersecurity: h\u00e1 algo novo?"}]},{"@type":"WebSite","@id":"https:\/\/evertectrends.com\/#website","url":"https:\/\/evertectrends.com\/","name":"Evertec Trends","description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia","publisher":{"@id":"https:\/\/evertectrends.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evertectrends.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/evertectrends.com\/#organization","name":"Evertec Trends","url":"https:\/\/evertectrends.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/evertectrends.com\/#\/schema\/logo\/image\/","url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/evertectrends-sq.png","contentUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/evertectrends-sq.png","width":416,"height":417,"caption":"Evertec Trends"},"image":{"@id":"https:\/\/evertectrends.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/evertectrends.com\/#\/schema\/person\/7cf78c7350b5387ad50b8d6f7f1cc066","name":"Fernando Malta","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/62e171d04e7c92397a492d127ad997079b840d7d0196d7e2114a938b7e39c38c?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/62e171d04e7c92397a492d127ad997079b840d7d0196d7e2114a938b7e39c38c?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62e171d04e7c92397a492d127ad997079b840d7d0196d7e2114a938b7e39c38c?s=96&d=robohash&r=g","caption":"Fernando Malta"},"description":"Head de Seguran\u00e7a da Informa\u00e7\u00e3o na Sinqia, Fernando Malta possui mais de 20 anos de experi\u00eancia na implanta\u00e7\u00e3o de controles de seguran\u00e7a e de processos de acordo com as necessidades do neg\u00f3cio e das melhores pr\u00e1ticas de mercado.","sameAs":["https:\/\/www.linkedin.com\/in\/fernandomalta\/"],"url":"https:\/\/evertectrends.com\/pt-br\/author\/fernando-malta\/"}]}},"featured_image_url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/Tendencias-Cybersecurity.png","primary_category":"Seguran\u00e7a","_links":{"self":[{"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/posts\/51080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/comments?post=51080"}],"version-history":[{"count":1,"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/posts\/51080\/revisions"}],"predecessor-version":[{"id":51081,"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/posts\/51080\/revisions\/51081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/media\/51143"}],"wp:attachment":[{"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/media?parent=51080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/categories?post=51080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evertectrends.com\/pt-br\/wp-json\/wp\/v2\/tags?post=51080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}