{"id":86402,"date":"2025-05-09T08:00:19","date_gmt":"2025-05-09T11:00:19","guid":{"rendered":"https:\/\/abes.org.br\/?p=86402"},"modified":"2025-04-23T13:12:16","modified_gmt":"2025-04-23T16:12:16","slug":"consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/","title":{"rendered":"Consulting firm Capco lists strategies for banks to overcome cyber risk"},"content":{"rendered":"<p style=\"text-align: center;\"><em>Lack of integration between banks and all external suppliers increases risks<\/em><\/p>\n<p><span data-olk-copy-source=\"MessageBody\">Last December, the Central Bank (BC) conducted an exercise to combat cyberattacks with the five largest retail banks in the country. These attacks are one of the biggest concerns for the financial sector, including in Brazil, one of the leaders in this type of problem. Solving this scenario is complex because security oversight tools are fragmented, concludes the study.<strong>Third-Party Cyber Security Risk: Implementing Process Efficiencies While Preserving Resilience<\/strong>\u201d (\u201cThird-Party Cybersecurity Risk: Implementing Process Efficiencies, Preserving Resilience\u201d) from\u00a0<a title=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmHrvMyWVRvtDgdyF8Hpz-2FpQ-3DAmkK_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hr-2FiUUbjahnfQawFMGUzidMYg92piVHZ12vP3tirTz8uEDn8UEDjHTlgCANpRMJfESDCJ5b-2BRpgtCnCeG1-2BNS-2B19sv2yOUKfLt769mKP2P-2BKF-2BjwBeJxXeQRBPQ-2FYZR8jmUy-2BlYzuiPTrkN-2BHlNIKvxHviR21AmCI1sW9DEzVmWEZf-2Fd9-2B6vYmAg8WraERvSMY-3D\" href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmHrvMyWVRvtDgdyF8Hpz-2FpQ-3DAmkK_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hr-2FiUUbjahnfQawFMGUzidMYg92piVHZ12vP3tirTz8uEDn8UEDjHTlgCANpRMJfESDCJ5b-2BRpgtCnCeG1-2BNS-2B19sv2yOUKfLt769mKP2P-2BKF-2BjwBeJxXeQRBPQ-2FYZR8jmUy-2BlYzuiPTrkN-2BHlNIKvxHviR21AmCI1sW9DEzVmWEZf-2Fd9-2B6vYmAg8WraERvSMY-3D\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"1\">Capco<\/a><strong>, a global management and technology consultancy for the financial sector of the Wipro group<\/strong>.<\/span><\/p>\n<p>Risks come from different sources, including the banks&#039; broad network of suppliers and partners, which end up expanding the surface area for potential attacks. To overcome the fragmentation of solutions, it is necessary to have rigorous control processes and <span data-olk-copy-source=\"MessageBody\">compliance, says the consultancy.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-86415 size-full\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico.jpg\" alt=\"\" width=\"591\" height=\"407\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico.jpg 591w, https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico-480x331.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 591px, 100vw\" \/><\/p>\n<p>\u201c<em>Financial institutions operate in one of the most regulated environments in the world. This requires structured third-party risk management. But solutions often do not communicate effectively, creating operational bottlenecks and increasing risks.<\/em>\u201c, explains\u00a0<strong>Luciano Sobral, partner at Capco in Brazil.<\/strong><\/p>\n<p><span data-olk-copy-source=\"MessageBody\">The use of different platforms without proper integration leads many organizations to adopt isolated solutions to assess, monitor and mitigate risks. This compromises a global view of cybersecurity. At the same time, global standards and Resolution No. 4,893 of the Central Bank impose requirements on third-party governance that make the adoption of new technologies a challenging process.<\/p>\n<p>\u201cThe lack of integration between systems and regulatory complexity make third-party risk management a major obstacle for the financial sector,\u201d Sobral points out. \u201cThe adoption of technologies such as automation and artificial intelligence enables faster and more accurate analyses, reduces response time to threats and ensures greater protection.\u201d<\/p>\n<p>To address these challenges, Capco experts recommend:<\/span><\/p>\n<ul type=\"disc\">\n<li class=\"x_MsoNormal\"><u>Tool integration<\/u>\u00a0\u2013 Centralization of systems to unify all stages of third-party risk supervision.<\/li>\n<li class=\"x_MsoNormal\"><u>Process automation<\/u>\u00a0\u2013 Reduced time spent on manual tasks and increased accuracy in threat detection.<\/li>\n<li class=\"x_MsoNormal\"><u>Continuous monitoring<\/u>\u00a0\u2013 Implementation of systems that identify and neutralize risks in real time.<\/li>\n<li class=\"x_MsoNormal\"><u>Stakeholder engagement<\/u>\u00a0\u2013 Involvement of suppliers and internal teams in the adoption of new methods, ensuring adherence and compliance.<\/li>\n<li class=\"x_MsoNormal\"><u>Regulatory adaptation<\/u>\u00a0\u2013 Use of technological solutions that meet regulatory requirements without compromising operational efficiency.<\/li>\n<\/ul>\n<p>Third-party management is essential for cyber resilience in the financial sector. Investing in this evolution is not only a strategic choice, but a necessity to face the challenges of the current digital landscape.<\/p>\n<p><strong>About Capco<\/strong><br \/>\nCapco, a Wipro company, is a global technology and management consultancy focused on the financial services and energy industries. Capco operates at the intersection of business and technology, combining innovative thinking with unmatched industry expertise to support clients across banking and payments, capital markets, wealth and asset management, insurance and energy. We help our clients simplify complexity to see a clear path forward and create solutions that enable them to transform their businesses and build a lasting legacy of success. For more information, visit\u00a0<a title=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPRrEhpfj9N-2FHC-2BNyDv80TE-3DlVkN_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hr-2FiUUbjahnfQawFMGUzidMYg92piVHZ12vP3tirTz8uF4DFkL3RGBgKnoGK-2BpcjuCvzKB3wsEL5l5srHCtG0FCFVi9BiBB-2BtoA0mhQWAM4FrjcgVSX8o-2B7sRxrFCul9SGJCCmV-2FYK-2BfG1BTgM-2BIS2F3mZVhXLzZ8XVSV54owTPbgHrqq58rGNDHTM34AXfsHE-3D\" href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPRrEhpfj9N-2FHC-2BNyDv80TE-3DlVkN_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hr-2FiUUbjahnfQawFMGUzidMYg92piVHZ12vP3tirTz8uF4DFkL3RGBgKnoGK-2BpcjuCvzKB3wsEL5l5srHCtG0FCFVi9BiBB-2BtoA0mhQWAM4FrjcgVSX8o-2B7sRxrFCul9SGJCCmV-2FYK-2BfG1BTgM-2BIS2F3mZVhXLzZ8XVSV54owTPbgHrqq58rGNDHTM34AXfsHE-3D\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"2\">site<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Falta de integra\u00e7\u00e3o entre bancos e todos os fornecedores externos aumenta os riscos Em dezembro passado, o Banco Central (BC) realizou um exerc\u00edcio de combate a ataques cibern\u00e9ticos com os cinco maiores bancos de varejo do pa\u00eds. Esses ataques s\u00e3o uma das maiores preocupa\u00e7\u00f5es do setor financeiro, inclusive no Brasil, um dos l\u00edderes nesse tipo [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":86416,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[7185,4500],"class_list":["post-86402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-estrategias-para-superar-risco-cibernetico","tag-gestao-de-terceiros"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico - ABES\" \/>\n<meta property=\"og:description\" content=\"Falta de integra\u00e7\u00e3o entre bancos e todos os fornecedores externos aumenta os riscos Em dezembro passado, o Banco Central (BC) realizou um exerc\u00edcio de combate a ataques cibern\u00e9ticos com os cinco maiores bancos de varejo do pa\u00eds. Esses ataques s\u00e3o uma das maiores preocupa\u00e7\u00f5es do setor financeiro, inclusive no Brasil, um dos l\u00edderes nesse tipo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-09T11:00:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico-1200-x-675.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico\",\"datePublished\":\"2025-05-09T11:00:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Capco-risco-cibernetico-1200-x-675.jpg\",\"keywords\":[\"estrat\u00e9gias para superar risco cibern\u00e9tico\",\"Gest\u00e3o de Terceiros\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/\",\"name\":\"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Capco-risco-cibernetico-1200-x-675.jpg\",\"datePublished\":\"2025-05-09T11:00:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Capco-risco-cibernetico-1200-x-675.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Capco-risco-cibernetico-1200-x-675.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/","og_locale":"en_US","og_type":"article","og_title":"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico - ABES","og_description":"Falta de integra\u00e7\u00e3o entre bancos e todos os fornecedores externos aumenta os riscos Em dezembro passado, o Banco Central (BC) realizou um exerc\u00edcio de combate a ataques cibern\u00e9ticos com os cinco maiores bancos de varejo do pa\u00eds. Esses ataques s\u00e3o uma das maiores preocupa\u00e7\u00f5es do setor financeiro, inclusive no Brasil, um dos l\u00edderes nesse tipo [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2025-05-09T11:00:19+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico-1200-x-675.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico","datePublished":"2025-05-09T11:00:19+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/"},"wordCount":622,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico-1200-x-675.jpg","keywords":["estrat\u00e9gias para superar risco cibern\u00e9tico","Gest\u00e3o de Terceiros"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/","url":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/","name":"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico-1200-x-675.jpg","datePublished":"2025-05-09T11:00:19+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico-1200-x-675.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/04\/Capco-risco-cibernetico-1200-x-675.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/consultoria-capco-lista-estrategias-para-bancos-superarem-risco-cibernetico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Consultoria Capco lista estrat\u00e9gias para bancos superarem risco cibern\u00e9tico"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-02 15:18:02","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/86402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=86402"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/86402\/revisions"}],"predecessor-version":[{"id":86417,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/86402\/revisions\/86417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/86416"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=86402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=86402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=86402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}