{"id":62099,"date":"2023-05-17T14:02:34","date_gmt":"2023-05-17T17:02:34","guid":{"rendered":"https:\/\/abes.org.br\/?p=62099"},"modified":"2023-05-02T20:13:59","modified_gmt":"2023-05-02T23:13:59","slug":"gartner-anuncia-as-principais-tendencias-de-ciberseguranca","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/","title":{"rendered":"Gartner Announces Key Cybersecurity Trends"},"content":{"rendered":"<p><i>Security leaders must adopt a human-centric model for establishing an effective cybersecurity program<\/i><\/p>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">O\u00a0<\/span><span class=\"m_-5915552157321339870normaltextrun\"><b>Gartner<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">,<b>\u00a0<\/b>A world leader in research and advice for businesses, announces the top nine global cybersecurity trends. According to analysts, the\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/insights\/leadership-vision-for-security-and-risk-management?utm_medium=press-release&amp;utm_campaign=RM_GB_2023_ITSEC_NPP_PR1_23LVEU&amp;utm_term=ebook\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.gartner.com\/en\/information-technology\/insights\/leadership-vision-for-security-and-risk-management?utm_medium%3Dpress-release%26utm_campaign%3DRM_GB_2023_ITSEC_NPP_PR1_23LVEU%26utm_term%3Debook&amp;source=gmail&amp;ust=1683153752321000&amp;usg=AOvVaw06DONlEQinXjsDdeHDGso1\"><span class=\"m_-5915552157321339870normaltextrun\">Security and Risk Management (SRM) leaders<\/span><\/a><span class=\"m_-5915552157321339870normaltextrun\">\u00a0they should rethink the balance of their technology investments and orient their structures to be human-centric when designing and implementing cybersecurity programs.\u00a0<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<div id=\"attachment_62100\" style=\"width: 238px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-62100\" class=\"wp-image-62100 size-full\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg\" alt=\"\" width=\"228\" height=\"230\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg 228w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner-150x150.jpg 150w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner-12x12.jpg 12w\" sizes=\"(max-width: 228px) 100vw, 228px\" \/><p id=\"caption-attachment-62100\" class=\"wp-caption-text\">Richard Addiscott, Analyst and Senior Director at Gartner<\/p><\/div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">\u201cA human-centric approach to cyber protection is essential to reducing security breaches,\u201d he says.\u00a0<\/span><span class=\"m_-5915552157321339870normaltextrun\">Richard Addiscott<\/span><span class=\"m_-5915552157321339870normaltextrun\">, Analyst and Senior Director at Gartner. \u201cThe people focus on project design and controls implementation, as well as business communications and cybersecurity talent management, will help improve business risk decisions and retention of that team.\u201d<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">To address cybersecurity risks and sustain an effective digital protection program, SRM leaders need to focus on three main fronts: the critical role of people in the success and sustainability of security programs; technical security capabilities that provide greater visibility and responsiveness across an organization&#039;s digital ecosystem; and restructuring the way the security function operates to enable agility without compromising protection.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">According to Gartner, the nine cybersecurity trends that will have a broad impact on cybersecurity leaders are:<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>1 \u2013 Human-centric security design \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">Human-centric security design prioritizes the employee experience throughout the controls management lifecycle. By 2027, 50% from Chief Information Security Officers (CISOs \u2013\u00a0<i>Chief Information Security Officer<\/i>) of large enterprises will have adopted people-centric security practices to minimize the\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-02-22-gartner-predicts-nearly-half-of-cybersecurity-leaders-will-change-jobs-by-2025\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-02-22-gartner-predicts-nearly-half-of-cybersecurity-leaders-will-change-jobs-by-2025&amp;source=gmail&amp;ust=1683153752321000&amp;usg=AOvVaw2EkC82KGkvAF9VdMBXlyAu\"><span class=\"m_-5915552157321339870normaltextrun\">cybersecurity-induced attrition<\/span><\/a><span class=\"m_-5915552157321339870normaltextrun\">\u00a0and increase adoption of control.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">\u201cTraditional security awareness programs have failed to reduce employee unsafe behavior,\u201d says Addiscott. \u201cSecurity officers should review past incidents to identify key frictions generated by cybersecurity and determine where they can reduce costs and ease the burden on employees through more human-centric controls.\u201d<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>2 \u2013 Improve people management for the sustainability of the safety program \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">Traditionally, cybersecurity leaders have focused on improving the technology and processes that support their programs, with little focus on the people who create those changes. CISOs who take a talent management approach\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-03-28-gartner-unveils-top-8-cybersecurity-predictions-for-2023-2024\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-03-28-gartner-unveils-top-8-cybersecurity-predictions-for-2023-2024&amp;source=gmail&amp;ust=1683153752321000&amp;usg=AOvVaw3DTC8nzWED2sFqYXStf8Gp\"><span class=\"m_-5915552157321339870normaltextrun\">human centered<\/span><\/a><span class=\"m_-5915552157321339870normaltextrun\">\u00a0to attract and retain professionals noticed improvements in the maturity of their companies. By 2026, Gartner predicts that 60% of organizations will shift from outsourcing to \u201csilent hiring\u201d from internal talent markets to address systemic cybersecurity and recruitment challenges.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>3 \u2013 Transform the cybersecurity operating model to support value creation \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">Technology is shifting from IT-centric functions to other business fronts and new corporate functions with multidisciplinary teams. Second\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-03-13-gartner-survey-finds-rise-in-business-technologists-is-driving-funding-for-tech-purchases-outside-of-it\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-03-13-gartner-survey-finds-rise-in-business-technologists-is-driving-funding-for-tech-purchases-outside-of-it&amp;source=gmail&amp;ust=1683153752321000&amp;usg=AOvVaw3r5nXjX-Zs5kKg7SgEgXTv\"><span class=\"m_-5915552157321339870normaltextrun\">search<\/span><\/a><span class=\"m_-5915552157321339870normaltextrun\">\u00a0by Gartner, 41% of employees do some form of technology-related work, and this is a trend that is expected to continue to grow over the next five years.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">\u201cBusiness leaders now widely accept that cybersecurity risk is one of the top business issues to be managed and that it is not just a technology issue to be solved,\u201d says Addiscott. According to the analyst, supporting and accelerating business outcomes is a top cybersecurity priority, but remains a major challenge. Gartner warns that CISOs must modify the cybersecurity operating model to understand how work gets done. Employees must know how to balance a range of risks, including cybersecurity, financial, reputational, competitive, and legal. Cybersecurity must also connect to business value, measuring and reporting success against corporate outcomes and priorities.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>4 \u2013 Threat exposure management \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">The attack surface of modern enterprises is complex and fatigue-inducing. CISOs must evolve their assessment practices to understand their threat exposure by implementing ongoing threat exposure management programs (<i>CTEM \u2013 Continuous Threat Exposure Management<\/i>). Gartner predicts that, by 2026, organizations that prioritize their security investments based on a STEM program will experience two-thirds fewer breaches.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">\u201cCISOs need to continually refine their threat assessment practices to keep pace with their organizations&#039; evolving work, always using a STEM approach to analyze more than just technology vulnerabilities,\u201d adds Addiscott.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>5 - Identity structure immunity (<i>Identity Fabric Immunity<\/i>) \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">The fragile identity infrastructure (<i>Identity Fabric Immunity<\/i>) is caused by incomplete, misconfigured, or vulnerable elements. By 2027, the identity framework immunity principles will prevent 85% from new attacks and thereby reduce the financial impact of breaches on 80%.\u00a0<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">\u201cIdentity framework immunity not only protects access identity management (IAM \u2013\u00a0<i>Identity &amp; Access Management<\/i>) framework with Identity Threat Detection and Response (ITDR \u2013\u00a0<i>Identity Threat And Detection Response<\/i>), but also strengthens it by completing and configuring it properly,\u201d says the Gartner analyst.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>6 \u2013 Cyber security validation \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">Cybersecurity validation brings together techniques, processes, and tools used to validate how potential attackers exploit an identified threat exposure. The tools needed for cybersecurity validation are making significant progress towards automating repeatable and predictable aspects of assessments, enabling regular benchmarking of attack techniques, security controls and processes. By 2026, more than 40% of organizations, including two-thirds of midsize companies, will have consolidated platforms to perform cybersecurity validation assessments.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>7 \u2013 Consolidation of the cybersecurity platform \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">As organizations look to streamline operations, vendors are\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-09-12-gartner-survey-shows-seventy-five-percent-of-organizations-are-pursuing-security-vendor-consolidation-in-2022\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-09-12-gartner-survey-shows-seventy-five-percent-of-organizations-are-pursuing-security-vendor-consolidation-in-2022&amp;source=gmail&amp;ust=1683153752321000&amp;usg=AOvVaw208mx14uKMaHjTPc9tVr-K\"><span class=\"m_-5915552157321339870normaltextrun\">consolidating platforms<\/span><\/a><span class=\"m_-5915552157321339870normaltextrun\">\u00a0around one or more key cybersecurity domains. For example, identity security services can be offered through a common platform, capable of combining governance, privileged access, and usage management capabilities. SRM leaders need to continually inventory security controls to understand where overlaps exist to reduce redundancy across consolidated platforms.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>8 \u2013 Combinable businesses need combinable security \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">Organizations must transition from monolithic systems to building composable features into their applications to respond to the rapid pace of business change. Combinable security is an approach in which cybersecurity controls are integrated into architectural patterns and then applied at a modular level across implementations of combinable technology. By 2027, more than 50% of leading business applications will be built using composable architecture, requiring a new approach to securing these applications.<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\">\u201cCombinable security is designed to protect the combinable business,\u201d says Addiscott. \u201cBuilding applications with composable components introduces as yet undiscovered dependencies. For CISOs, this is a significant opportunity to incorporate privacy and security from the design moment to create component-based, reusable control objects.\u201d<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_-5915552157321339870paragraph\"><span class=\"m_-5915552157321339870normaltextrun\"><b>9 \u2013 Boards of Directors expand their competence in cybersecurity oversight \u2013\u00a0<\/b><\/span><span class=\"m_-5915552157321339870normaltextrun\">Boards of Directors&#039; focus on cybersecurity is being driven by the trend to hold board members accountable for governance activities. Cybersecurity leaders must provide Boards of Directors with reports that demonstrate the impact of security programs on their companies&#039; goals and objectives. \u201cLeaders of SRMs should encourage active Board participation, as well as involvement in decision-making on cybersecurity-related issues,\u201d says Addiscott. \u201cIt is the opportunity to act as a strategic advisor, providing recommendations for actions to be taken by the Board, including allocation of budgets and resources for cybersecurity.\u201d<\/span><span class=\"m_-5915552157321339870eop\">\u00a0<\/span><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>L\u00edderes de seguran\u00e7a devem adotar um modelo centrado no ser humano para estabelecer um programa eficaz de seguran\u00e7a cibern\u00e9tica O\u00a0Gartner,\u00a0l\u00edder mundial em pesquisa e aconselhamento para empresas,\u00a0anuncia as nove principais tend\u00eancias mundiais de ciberseguran\u00e7a. Segundo os analistas, os\u00a0l\u00edderes de Seguran\u00e7a e Gerenciamento de Riscos\u00a0(SRM)\u00a0deveriam repensar o equil\u00edbrio de seus investimentos em tecnologia e orientar suas [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":62100,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[2516,270,4016],"class_list":["post-62099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-controles-de-seguranca","tag-seguranca-cibernetica","tag-tendencias-de-ciberseguranca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a - ABES\" \/>\n<meta property=\"og:description\" content=\"L\u00edderes de seguran\u00e7a devem adotar um modelo centrado no ser humano para estabelecer um programa eficaz de seguran\u00e7a cibern\u00e9tica O\u00a0Gartner,\u00a0l\u00edder mundial em pesquisa e aconselhamento para empresas,\u00a0anuncia as nove principais tend\u00eancias mundiais de ciberseguran\u00e7a. Segundo os analistas, os\u00a0l\u00edderes de Seguran\u00e7a e Gerenciamento de Riscos\u00a0(SRM)\u00a0deveriam repensar o equil\u00edbrio de seus investimentos em tecnologia e orientar suas [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-17T17:02:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"228\" \/>\n\t<meta property=\"og:image:height\" content=\"230\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a\",\"datePublished\":\"2023-05-17T17:02:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/\"},\"wordCount\":1555,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/richard-gartner.jpg\",\"keywords\":[\"controles de seguran\u00e7a\",\"seguran\u00e7a cibern\u00e9tica\",\"tend\u00eancias de ciberseguran\u00e7a\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/\",\"name\":\"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/richard-gartner.jpg\",\"datePublished\":\"2023-05-17T17:02:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/richard-gartner.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/richard-gartner.jpg\",\"width\":228,\"height\":230},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/","og_locale":"en_US","og_type":"article","og_title":"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a - ABES","og_description":"L\u00edderes de seguran\u00e7a devem adotar um modelo centrado no ser humano para estabelecer um programa eficaz de seguran\u00e7a cibern\u00e9tica O\u00a0Gartner,\u00a0l\u00edder mundial em pesquisa e aconselhamento para empresas,\u00a0anuncia as nove principais tend\u00eancias mundiais de ciberseguran\u00e7a. Segundo os analistas, os\u00a0l\u00edderes de Seguran\u00e7a e Gerenciamento de Riscos\u00a0(SRM)\u00a0deveriam repensar o equil\u00edbrio de seus investimentos em tecnologia e orientar suas [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-05-17T17:02:34+00:00","og_image":[{"width":228,"height":230,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a","datePublished":"2023-05-17T17:02:34+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/"},"wordCount":1555,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg","keywords":["controles de seguran\u00e7a","seguran\u00e7a cibern\u00e9tica","tend\u00eancias de ciberseguran\u00e7a"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/","url":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/","name":"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg","datePublished":"2023-05-17T17:02:34+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/05\/richard-gartner.jpg","width":228,"height":230},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/gartner-anuncia-as-principais-tendencias-de-ciberseguranca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Gartner anuncia as principais tend\u00eancias de ciberseguran\u00e7a"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-12 12:17:31","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/62099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=62099"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/62099\/revisions"}],"predecessor-version":[{"id":62101,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/62099\/revisions\/62101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/62100"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=62099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=62099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=62099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}