{"id":102222,"date":"2026-04-15T08:00:39","date_gmt":"2026-04-15T11:00:39","guid":{"rendered":"https:\/\/abes.org.br\/?p=102222"},"modified":"2026-03-24T13:39:40","modified_gmt":"2026-03-24T16:39:40","slug":"gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/","title":{"rendered":"Gartner predicts that AI applications will drive 50% of cybersecurity incident response efforts by 2028."},"content":{"rendered":"<p style=\"text-align: center;\"><em>Analysts will explore security and risk trends during the Gartner Security &amp; Risk Management Conference, which will be held on August 4th and 5th in S\u00e3o Paulo (SP).<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-102223 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/03\/GARTNER-IA-CIBERSEGURANCA-1024x576.jpg\" alt=\"\" width=\"512\" height=\"288\" \/><\/p>\n<p class=\"x_MsoNormal\"><span data-olk-copy-source=\"MessageBody\">By 2028, 50% of all enterprise cybersecurity incident response efforts will focus on incidents involving customized Artificial Intelligence (AI)-driven applications, according to the\u00a0<b>Gartner, Inc.,<\/b>\u00a0A business insights and technology company.<\/span><\/p>\n<p class=\"x_MsoNormal\">\u201c&quot;AI is evolving rapidly, but many tools \u2013 especially custom AI applications \u2013 are being implemented before they are fully tested. These systems are complex, dynamic, and difficult to protect over time. Most security teams still lack clear processes for dealing with this.&quot;\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/cybersecurity-and-ai\" href=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/cybersecurity-and-ai\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"0\"><span lang=\"PT-BR\">AI-related incidents<\/span><\/a><\/span>, &quot;This means that problems may take longer to resolve and require significantly more effort,&quot; he says.\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/experts\/christopher-mixter\" href=\"https:\/\/www.gartner.com\/en\/experts\/christopher-mixter\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"1\"><span lang=\"PT-BR\">Christopher Mixter<\/span><\/a><\/span>, Vice President Analyst at Gartner.<\/p>\n<p class=\"x_MsoNormal\">Gartner recommends that security leaders get involved from the outset in custom AI application projects to ensure there is sufficient time, resources are planned, and expectations are managed for adequate security controls.<\/p>\n<p class=\"x_MsoNormal\">This is one of the main cybersecurity-related topics that will be covered during the event.\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/pt-br\/conferences\/la\/security-risk-management-brazil\" href=\"https:\/\/www.gartner.com\/pt-br\/conferences\/la\/security-risk-management-brazil\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"2\"><b><span lang=\"PT-BR\">Gartner Conference<\/span><\/b><span lang=\"PT-BR\">\u00a0<b>Security &amp; Risk Management<\/b><\/span><\/a><\/span>, which will be held on August 4th and 5th in S\u00e3o Paulo (SP). Gartner recommends that cybersecurity leaders take these predictions into account in their\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/information-security-strategy\" href=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/information-security-strategy\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"3\"><span lang=\"PT-BR\">security strategies<\/span><\/a><\/span>\u00a0over the next two years.<\/p>\n<p class=\"x_MsoNormal\"><b>By 2028, more than 501% of companies will use AI security platforms to protect the use of third-party Artificial Intelligence services and custom AI applications.<\/b><\/p>\n<p class=\"x_MsoNormal\">AI security platforms offer organizations a unified way to manage the new risks associated with the rapid adoption of this technology, such as prompt injection, data misuse, and more. By centralizing visibility and control, these platforms help Chief Information Security Officers (CISOs) enforce usage policies, monitor AI activities, and apply consistent security measures across third-party and custom Artificial Intelligence applications. Security leaders should evaluate AI security platforms to ensure they can protect both types of applications.<\/p>\n<p class=\"x_MsoNormal\"><b>By 2027, manual AI compliance processes will expose 75% of regulated organizations to fines exceeding 5% of their global revenue.<\/b><\/p>\n<p class=\"x_MsoNormal\">Despite differing regulatory approaches worldwide, AI regulations converge on a universal demand for a systematic approach to risk management. Even if CISOs manage to stay ahead of regulations and standards for security, privacy, and cybersecurity risk management, new regulations concerning AI security call everything into question. For greater success, Gartner recommends establishing cybersecurity risk governance and compliance, and enabling compliance through technology.<\/p>\n<p class=\"x_MsoNormal\"><b>By 2030, 331% of IT work will be dedicated to remediating AI data debt to ensure the security of Artificial Intelligence.<\/b><\/p>\n<p class=\"x_MsoNormal\">The data from most organizations is not...\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/information-technology\/topics\/ai-readiness\" href=\"https:\/\/www.gartner.com\/en\/information-technology\/topics\/ai-readiness\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"4\"><span lang=\"PT-BR\">AI-ready<\/span><\/a><\/span>, Poorly protected and unstructured data is a major barrier to the adoption of Artificial Intelligence. In response, cybersecurity leaders are expanding data loss prevention to monitor and restrict information flows triggered by events and data access requests from Generative Artificial Intelligence (GenAI) and other technologies.\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/doc\/best-practices-preparing-for-ai-agent-services-opportunities\" href=\"https:\/\/www.gartner.com\/en\/doc\/best-practices-preparing-for-ai-agent-services-opportunities\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"5\"><span lang=\"PT-BR\">Agentic AI<\/span><\/a><\/span>. Gartner recommends that they collaborate with data, analytics, and AI leaders to define a structured program for data discovery, assessment, and remediation of access control.<\/p>\n<p class=\"x_MsoNormal\"><b><span lang=\"PT\">By 2027, organizations will need comprehensive sovereignty over their cloud security controls to address ongoing geopolitical instability.<\/span><\/b><\/p>\n<p class=\"x_MsoNormal\"><span lang=\"PT\">Geopolitical instability and local regulations are creating unsustainable risks to data, requiring many organizations to make sovereignty a fundamental part of their cyber resilience approach. This will necessitate changes in vendor selection.\u00a0<a title=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/cloud-security\" href=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/cloud-security\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"6\">cloud-linked offers<\/a>\u00a0and in prioritization efforts as geopatriation requirements intensify. Cybersecurity leaders must play an active role in defining organizational sovereignty requirements, including those mandated by local regulations.<\/span><\/p>\n<p class=\"x_MsoNormal\"><b>By 2028, 70% of CISOs will utilize identity visibility and intelligence capabilities to reduce the attack surface of identity and access management (IAM), decreasing the risks of credential compromise.<\/b><\/p>\n<p class=\"x_MsoNormal\">Identity has become a major attack surface as organizations struggle to manage the rapid growth and complexity of human and machine identities. This leaves visibility gaps caused by siloed identity and access management (IAM) tools and increases the risk of misconfigurations. Gartner recommends that these blind spots be addressed through the integration of unified, AI-powered identity visibility and intelligence platforms to improve detection and remediation.<\/p>\n<p class=\"x_MsoNormal\">Learn how to create a cybersecurity strategy that meets the needs of both people and technology.\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/cybersecurity-strategy?utm_medium=press-release&amp;utm_campaign=RM_GB_YOY_ITSEC_NPP_PR1_PILSECURITYSTRATEGY\" href=\"https:\/\/www.gartner.com\/en\/cybersecurity\/topics\/cybersecurity-strategy?utm_medium=press-release&amp;utm_campaign=RM_GB_YOY_ITSEC_NPP_PR1_PILSECURITYSTRATEGY\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"7\"><span lang=\"PT-BR\">in this free guide from Gartner<\/span><\/a><\/span>.<\/p>\n<p class=\"x_MsoNormal\"><b><span lang=\"PT\">Gartner is the world authority on AI.\u00a0<\/span><\/b><\/p>\n<p class=\"x_MsoNormal\"><span lang=\"PT\">Gartner is the indispensable partner for C-level executives and technology vendors as they implement AI strategies to achieve their mission-critical priorities. The independence and objectivity of Gartner&#039;s insights provide clients with the confidence needed to make well-informed decisions and unlock the full potential of AI. C-level clients are using Gartner&#039;s AI tool.\u00a0<\/span><a title=\"https:\/\/www.gartner.com\/en\/products\/ask-gartner\" href=\"https:\/\/www.gartner.com\/en\/products\/ask-gartner\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"8\"><span lang=\"PT\">AskGartner<\/span><\/a><span lang=\"PT\">\u00a0for\u00a0<\/span>define\u00a0<span lang=\"PT\">How to leverage AI in your business. With over 2,500 business and technology experts, 6,000\u00a0<\/span>insights<span lang=\"PT\">\u00a0With numerous articles and over 1,000 AI use cases and case studies, Gartner is the world authority on AI. More information can be found [here\/at this link].<a href=\"https:\/\/www.gartner.com\/en\/ai\">\u00a0<\/a><\/span><span lang=\"PT\">on here<\/span><span lang=\"PT\">.<\/span><\/p>\n<p class=\"x_MsoNormal\"><b>About the Gartner Security &amp; Risk Management Conference<\/b><\/p>\n<p class=\"x_MsoNormal\">Gartner analysts are presenting the latest insights for security and risk management leaders during the Gartner Security &amp; Risk Management Conference, which is taking place this week in [location].\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/conferences\/apac\/security-risk-management-australia\" href=\"https:\/\/www.gartner.com\/en\/conferences\/apac\/security-risk-management-australia\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"10\"><span lang=\"PT-BR\">Sydney<\/span><\/a><\/span>(Australia). Other dates and locations for the Gartner Security &amp; Risk Management Conferences are: June 1-3 in<a title=\"https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us\" href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"11\">National Harbor<\/a>(United States), July 22-24<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/conferences\/apac\/security-risk-management-japan\" href=\"https:\/\/www.gartner.com\/en\/conferences\/apac\/security-risk-management-japan\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"12\"><span lang=\"PT-BR\">Tokyo<\/span><\/a><\/span>(Japan), August 4 and 5<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/conferences\/la\/security-risk-management-brazil\" href=\"https:\/\/www.gartner.com\/en\/conferences\/la\/security-risk-management-brazil\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"13\"><span lang=\"PT-BR\">Sao Paulo<\/span><\/a><\/span>(Brazil) and September 22-24 in<span lang=\"EN\"><a title=\"https:\/\/www.gartner.com\/en\/conferences\/emea\/security-risk-management-uk\" href=\"https:\/\/www.gartner.com\/en\/conferences\/emea\/security-risk-management-uk\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"14\"><span lang=\"PT-BR\">London<\/span><\/a><\/span>(United Kingdom). Follow the news and updates from the conferences at<span lang=\"EN\"><a title=\"https:\/\/x.com\/Gartner_inc\" href=\"https:\/\/x.com\/Gartner_inc\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"15\"><span lang=\"PT-BR\">X<\/span><\/a><\/span>and<span lang=\"EN\"><a title=\"https:\/\/www.linkedin.com\/showcase\/gartner-for-it-leaders\" href=\"https:\/\/www.linkedin.com\/showcase\/gartner-for-it-leaders\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"16\"><span lang=\"PT-BR\">LinkedIn<\/span><\/a><\/span>using<span lang=\"EN\"><a title=\"https:\/\/twitter.com\/search?q=%23GartnerSEC&amp;src=typd\" href=\"https:\/\/twitter.com\/search?q=%23GartnerSEC&amp;src=typd\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"17\"><span lang=\"PT-BR\">#GartnerSEC<\/span><\/a><\/span>.<\/p>\n<p class=\"x_MsoNormal\"><b>About Gartner for Cybersecurity Leaders\u00a0<\/b><\/p>\n<p class=\"x_MsoNormal\">Gartner for Cybersecurity Leaders equips security leaders with the insights to help reshape roles, align security strategy with business objectives, and build programs to balance protection with organizational needs. Additional information is available at [link to Gartner for Cybersecurity Leaders report].\u00a0<span lang=\"EN\"><span lang=\"PT-BR\">https:\/\/www.gartner.com\/en\/cybersecurity\/products\/gartner-for-cisos<\/span><\/span>.<\/p>\n<p class=\"x_MsoNormal\">Follow news and updates from Gartner for Cybersecurity Leaders on\u00a0<span lang=\"EN\"><a title=\"https:\/\/twitter.com\/Gartner_inc\" href=\"https:\/\/twitter.com\/Gartner_inc\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"18\"><span lang=\"PT-BR\">X<\/span><\/a><\/span>\u00a0and\u00a0<span lang=\"EN\"><a title=\"https:\/\/www.linkedin.com\/showcase\/gartner-for-it-leaders\/\" href=\"https:\/\/www.linkedin.com\/showcase\/gartner-for-it-leaders\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"19\"><span lang=\"PT-BR\">LinkedIn<\/span><\/a><\/span> using #GartnerSEC.<\/p>\n<p class=\"x_MsoNormal\"><b>About Gartner\u00a0<\/b><\/p>\n<p class=\"x_MsoNormal\">Gartner, Inc. delivers objective, actionable insights that drive smarter decisions and better performance for enterprises\u2019 mission-critical priorities. To learn more, visit\u00a0<span lang=\"EN\"><a title=\"http:\/\/www.gartner.com\/\" href=\"http:\/\/www.gartner.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"21\"><span lang=\"PT-BR\">www.gartner.com<\/span><\/a><\/span>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Analistas ir\u00e3o explorar tend\u00eancias de seguran\u00e7a e risco durante a Confer\u00eancia Gartner Seguran\u00e7a &amp; Gest\u00e3o de Risco, que ser\u00e1 realizada em 04 e 05 de agosto, em S\u00e3o Paulo (SP) At\u00e9 2028, 50% de todos os esfor\u00e7os de resposta a incidentes de ciberseguran\u00e7a em empresas se concentrar\u00e3o em incidentes envolvendo aplica\u00e7\u00f5es orientadas por Intelig\u00eancia Artificial [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":102223,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[9499,108,9500],"class_list":["post-102222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-aplicacoes-de-ia-personalizadas","tag-ciberseguranca","tag-gerenciamento-de-novos-riscos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028 - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028 - ABES\" \/>\n<meta property=\"og:description\" content=\"Analistas ir\u00e3o explorar tend\u00eancias de seguran\u00e7a e risco durante a Confer\u00eancia Gartner Seguran\u00e7a &amp; Gest\u00e3o de Risco, que ser\u00e1 realizada em 04 e 05 de agosto, em S\u00e3o Paulo (SP) At\u00e9 2028, 50% de todos os esfor\u00e7os de resposta a incidentes de ciberseguran\u00e7a em empresas se concentrar\u00e3o em incidentes envolvendo aplica\u00e7\u00f5es orientadas por Intelig\u00eancia Artificial [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T11:00:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/03\/GARTNER-IA-CIBERSEGURANCA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028\",\"datePublished\":\"2026-04-15T11:00:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/\"},\"wordCount\":1346,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/GARTNER-IA-CIBERSEGURANCA.jpg\",\"keywords\":[\"aplica\u00e7\u00f5es de IA personalizadas\",\"ciberseguran\u00e7a\",\"gerenciamento de novos riscos\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/\",\"name\":\"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028 - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/GARTNER-IA-CIBERSEGURANCA.jpg\",\"datePublished\":\"2026-04-15T11:00:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/GARTNER-IA-CIBERSEGURANCA.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/GARTNER-IA-CIBERSEGURANCA.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028 - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/","og_locale":"en_US","og_type":"article","og_title":"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028 - ABES","og_description":"Analistas ir\u00e3o explorar tend\u00eancias de seguran\u00e7a e risco durante a Confer\u00eancia Gartner Seguran\u00e7a &amp; Gest\u00e3o de Risco, que ser\u00e1 realizada em 04 e 05 de agosto, em S\u00e3o Paulo (SP) At\u00e9 2028, 50% de todos os esfor\u00e7os de resposta a incidentes de ciberseguran\u00e7a em empresas se concentrar\u00e3o em incidentes envolvendo aplica\u00e7\u00f5es orientadas por Intelig\u00eancia Artificial [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2026-04-15T11:00:39+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/03\/GARTNER-IA-CIBERSEGURANCA.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028","datePublished":"2026-04-15T11:00:39+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/"},"wordCount":1346,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/03\/GARTNER-IA-CIBERSEGURANCA.jpg","keywords":["aplica\u00e7\u00f5es de IA personalizadas","ciberseguran\u00e7a","gerenciamento de novos riscos"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/","url":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/","name":"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028 - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/03\/GARTNER-IA-CIBERSEGURANCA.jpg","datePublished":"2026-04-15T11:00:39+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/03\/GARTNER-IA-CIBERSEGURANCA.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2026\/03\/GARTNER-IA-CIBERSEGURANCA.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/gartner-preve-que-as-aplicacoes-de-ia-impulsionarao-50-dos-esforcos-de-resposta-a-incidentes-de-seguranca-cibernetica-ate-2028\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Gartner prev\u00ea que as aplica\u00e7\u00f5es de IA impulsionar\u00e3o 50% dos esfor\u00e7os de resposta a incidentes de seguran\u00e7a cibern\u00e9tica at\u00e9 2028"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-28 06:43:02","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/102222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=102222"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/102222\/revisions"}],"predecessor-version":[{"id":102224,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/102222\/revisions\/102224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/102223"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=102222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=102222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=102222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}