{"id":98628,"date":"2025-12-03T08:00:05","date_gmt":"2025-12-03T11:00:05","guid":{"rendered":"https:\/\/abes.org.br\/?p=98628"},"modified":"2025-12-03T14:34:15","modified_gmt":"2025-12-03T17:34:15","slug":"ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/","title":{"rendered":"Cyber-resilience: the next step in digital corporate governance"},"content":{"rendered":"<p><em><b>From incident response planning to digital business continuity.<\/b><\/em><\/p>\n<p><i><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-98630 size-medium alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/11\/CARLOS-FRANCISCO-TATARA-BRY-1-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/>By Carlos Tatara<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Digital transformation has accelerated processes, connected operations, and expanded the attack surface of organizations. In recent years, information security has ceased to be merely a layer of protection and has become central to corporate governance. However, in a scenario where attacks are becoming more sophisticated and disruptions can compromise entire supply chains, simply &quot;being secure&quot; is no longer enough.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where the <\/span><b>cyber-resilience<\/b><span style=\"font-weight: 400;\">, the capacity of an organization <\/span><b>prevent, resist, respond and recover<\/b><span style=\"font-weight: 400;\"> of cyber incidents, preserving the continuity of essential services. This capability goes beyond conventional security practices and also depends on <\/span><b><a href=\"https:\/\/www.bry.com.br\/?utm_source=abes&amp;utm_medium=blog&amp;utm_campaign=ciber-seguranca\">trusted infrastructures<\/a>, <\/b><span style=\"font-weight: 400;\">that underpin the integrity, authenticity, and traceability of digital processes. This is the natural evolution of cybersecurity, broadening the focus to something bigger: the digital survival of the business.<\/span><\/p>\n<h2><b>From cybersecurity to cyber resilience: a necessary evolution.<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity has always had as its main mission <\/span><b>avoid loopholes and reduce risks<\/b><span style=\"font-weight: 400;\">. Cyber resilience, on the other hand, assumes that no matter how mature the defense is, incidents can (and will) happen. Therefore, it shifts the focus to... <\/span><b>capacity <\/b><b>response, continuity and recovery<\/b><span style=\"font-weight: 400;\">, aligning technology, processes and governance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Standards and references such as <\/span><b>ISO 27001<\/b><span style=\"font-weight: 400;\">, <\/span><b>ISO 27035<\/b><span style=\"font-weight: 400;\">, <\/span><b>ENISA<\/b><span style=\"font-weight: 400;\">, <\/span><b>OECD<\/b><span style=\"font-weight: 400;\"> and herself <\/span><b>National Cybersecurity Policy (Decree 11.856\/2023)<\/b><span style=\"font-weight: 400;\"> They reinforce this movement: resilience is not optional, it is a strategic guideline.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This shift in perspective allows technology and governance leaders to adopt a more realistic, proactive, and business-integrated stance.<\/span><\/p>\n<h2><b>Why cyber resilience is digital corporate governance<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">For companies that depend on continuous operation (financial, retail, telecom, education, healthcare, public sector), digital disruption has a direct impact on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Revenue<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Institutional reputation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compliance with legal obligations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trust from clients and partners.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Operational and regulatory risk<\/span>&nbsp;<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">I.e: <\/span><b>A cyber incident is not just an IT problem, it&#039;s a governance problem.<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber resilience integrates security, compliance, business continuity, and risk management into a single vision. It strengthens strategic decisions, accelerates responses, and reduces damage when something goes wrong.<\/span><\/p>\n<h2><b>Essential pillars of cyber-resilience<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To move beyond traditional security, organizations need to structure practices that connect technology, processes, and governance. Among the most relevant are:<\/span><\/p>\n<h3><b>1. Structured prevention<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It includes strong authentication, identity control, cryptography, secure management of digital keys and certificates, access policies, and environment hardening. It is the foundation for mitigating risks before they become incidents.<\/span><\/p>\n<h3><b>2. Efficient detection<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Continuous monitoring and immutable records, ideally with timestamped preserved logs, accelerate audits and prevent the loss of evidence. The shorter the detection time, the smaller the impact.<\/span><\/p>\n<h3><b>3. Coordinated response<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Clear plans, with defined teams, communication flows, responsibilities, and verifiable evidence, such as signed documents, preserved audit trails, and protocols that ensure non-repudiation, which can be used in any eventual expert analysis.<\/span><\/p>\n<h3><b>4. Continuity and recovery<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Reliable backups, redundancy, replication, failover, and operational recovery processes that allow the service to return online with transactional integrity.<\/span><\/p>\n<h2><b>From plan to process: increasing maturity.<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Having an incident response plan is important.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Having a plan that works in practice is essential.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Having a business continuity plan integrated with the future is what differentiates resilient organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Maturity in cyber resilience is not just about technology. It involves culture, governance, executive prioritization, and constant reviews, especially in the face of new regulations, the expansion of digital services, and changes in the threat surface.<\/span><\/p>\n<h2><b>The role of reliable digital evidence.<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In any incident, one question always arises: <\/span><b>Which records can be proven reliable?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Systems that utilize mechanisms such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">qualified digital signatures,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">protocols of non-repudiation,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">qualified timestamp,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Preservation of logs with guaranteed integrity.,<\/span>&nbsp;<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">They create a layer of trust that is essential for audits, internal investigations, regulatory compliance, and post-incident recovery.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These technologies transform operational data into <\/span><b>verifiable evidence<\/b><span style=\"font-weight: 400;\">, This allows for faster analysis, ensuring the digital chain of trust and safer decision-making for the orderly restoration of critical processes. Reliable evidence is the bridge between the incident and the decision.<\/span><\/p>\n<h2><b>Cyber resilience as a competitive advantage<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Companies evolving towards a resilient model:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They reduce the financial impact of incidents.,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They shorten downtime.,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They gain regulatory confidence.,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They strengthen partnerships and ecosystems.,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">and build a reputation for digital strength.<\/span>&nbsp;<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In an environment where disruptions can compromise results and user experiences, resilience ceases to be a differentiator and becomes a necessity. <\/span><b>corporate requirement<\/b><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber resilience represents the next frontier of digital governance. It expands the scope of information security to include continuity, evidence, recovery, and trust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More than just preventing attacks, it&#039;s about ensuring that the organization... <\/span><b>Remain intact, functional, and reliable even in the face of digital crises.<\/b><span style=\"font-weight: 400;\">. It&#039;s a change in approach: not just protecting, but <\/span><b>survive, respond and evolve<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For companies that treat technology as strategic infrastructure, the time to move towards a cyber-resilient model is not in the future, it&#039;s now.<\/span><\/p>\n<p><em>Carlos Francisco Tatara is the CTO of Bry.<\/em><\/p>\n<p><em><strong>Notice:<\/strong>\u00a0The opinion presented in this article is the responsibility of its author and not of ABES - Brazilian Association of Software Companies<\/em><b><\/b><b><\/b><\/p>","protected":false},"excerpt":{"rendered":"<p>Carlos Francisco Tatara, CTO of Bry<\/p>","protected":false},"author":12,"featured_media":98633,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[8],"tags":[8606,8607,2639],"class_list":["post-98628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artigos","tag-ciber-resiliencia","tag-governanca-corporativa-digital","tag-vantagem-competitiva"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital - ABES\" \/>\n<meta property=\"og:description\" content=\"Carlos Francisco Tatara, CTO da Bry\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-03T11:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-03T17:34:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/11\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital\",\"datePublished\":\"2025-12-03T11:00:05+00:00\",\"dateModified\":\"2025-12-03T17:34:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/\"},\"wordCount\":978,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg\",\"keywords\":[\"Ciber-resili\u00eancia\",\"governan\u00e7a corporativa digital\",\"vantagem competitiva\"],\"articleSection\":[\"Artigos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/\",\"name\":\"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg\",\"datePublished\":\"2025-12-03T11:00:05+00:00\",\"dateModified\":\"2025-12-03T17:34:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/","og_locale":"en_US","og_type":"article","og_title":"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital - ABES","og_description":"Carlos Francisco Tatara, CTO da Bry","og_url":"https:\/\/abes.org.br\/en\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2025-12-03T11:00:05+00:00","article_modified_time":"2025-12-03T17:34:15+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/11\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital","datePublished":"2025-12-03T11:00:05+00:00","dateModified":"2025-12-03T17:34:15+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/"},"wordCount":978,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/11\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg","keywords":["Ciber-resili\u00eancia","governan\u00e7a corporativa digital","vantagem competitiva"],"articleSection":["Artigos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/","url":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/","name":"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/11\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg","datePublished":"2025-12-03T11:00:05+00:00","dateModified":"2025-12-03T17:34:15+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/11\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/11\/CARLOS-FRANCISCO-TATARA-BRY-IMAGEM-DESTACADA-2.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/ciber-resiliencia-o-proximo-passo-da-governanca-corporativa-digital\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Ciber-resili\u00eancia: o pr\u00f3ximo passo da governan\u00e7a corporativa digital"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-27 09:12:52","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/98628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=98628"}],"version-history":[{"count":2,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/98628\/revisions"}],"predecessor-version":[{"id":98758,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/98628\/revisions\/98758"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/98633"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=98628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=98628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=98628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}