{"id":9910,"date":"2023-04-25T09:49:00","date_gmt":"2023-04-25T15:49:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/the-3-scariest-breach-consequences-for-cios\/"},"modified":"2025-01-10T10:36:04","modified_gmt":"2025-01-10T17:36:04","slug":"as-3-consequencias-mais-assustadoras-de-uma-violacao-de-seguranca-para-os-cios","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/","title":{"rendered":"As tr\u00eas consequ\u00eancias mais assustadoras de uma viola\u00e7\u00e3o de seguran\u00e7a para os CISOs"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Tr\u00eas consequ\u00eancias mais assustadoras de uma viola\u00e7\u00e3o de seguran\u00e7a para os CISOs\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2023-04-25T09:49:00-06:00\">25 de abril de 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">As tr\u00eas consequ\u00eancias mais assustadoras de uma viola\u00e7\u00e3o de seguran\u00e7a para os CISOs<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de utilizador\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minutos de leitura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correio eletr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Three%20Scariest%20Breach%20Consequences%20for%20CISOs').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F', '_blank')\" title=\"Correio eletr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Three%20Scariest%20Breach%20Consequences%20for%20CISOs&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fthe-3-scariest-breach-consequences-for-cios%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<p>Na era digital atual, as amea\u00e7as cibern\u00e9ticas nunca param de evoluir, o que torna cada vez mais dif\u00edcil para as empresas protegerem seus dados sens\u00edveis. As consequ\u00eancias de uma viola\u00e7\u00e3o de dados podem ser catastr\u00f3ficas, e \u00e9 responsabilidade do l\u00edder de seguran\u00e7a garantir a seguran\u00e7a dos dados da empresa e dos clientes. Os Diretores de Seguran\u00e7a da Informa\u00e7\u00e3o (CISOs) desempenham um papel fundamental na prote\u00e7\u00e3o dos ativos digitais da empresa e na preserva\u00e7\u00e3o de sua reputa\u00e7\u00e3o. No entanto, a falha em proteger dados sens\u00edveis pode levar a graves consequ\u00eancias tanto para a organiza\u00e7\u00e3o quanto para o l\u00edder de seguran\u00e7a.<\/p>\n\n\n\n<p>Apesar da recente onda de <a href=\"https:\/\/swimlane.com\/pt\/blogue\/principais-violacoes-de-dados-de-2022\/\">viola\u00e7\u00f5es de dados de alto perfil<\/a>, Pesquisas mostram que muitos CISOs ainda est\u00e3o agindo com muita lentid\u00e3o em seus esfor\u00e7os para aprimorar as ferramentas de seguran\u00e7a e as melhores pr\u00e1ticas de suas organiza\u00e7\u00f5es. Um estudo recente, por exemplo, constatou que <a href=\"https:\/\/www.scmagazine.com\/news\/security-awareness\/a-third-of-companies-dont-offer-cybersecurity-training-to-remote-workers\">uma em cada tr\u00eas organiza\u00e7\u00f5es<\/a> N\u00e3o est\u00e3o oferecendo treinamento de conscientiza\u00e7\u00e3o sobre seguran\u00e7a cibern\u00e9tica para funcion\u00e1rios remotos \u2013 algo que historicamente \u00e9 responsabilidade de um CISO (Diretor de Seguran\u00e7a da Informa\u00e7\u00e3o).<\/p>\n\n\n\n<p>Mas os CISOs que adotam uma filosofia de &quot;isso n\u00e3o vai acontecer comigo&quot; podem estar arriscando ainda mais do que imaginam. Aqui est\u00e3o algumas das consequ\u00eancias mais graves que esses executivos podem enfrentar ap\u00f3s uma viola\u00e7\u00e3o de seguran\u00e7a:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Perda de emprego<\/h2>\n\n\n\n<p>Pode n\u00e3o ser justo, mas em muitos casos, o CISO ser\u00e1 responsabilizado principalmente por permitir um ataque cibern\u00e9tico. Isso \u00e9 especialmente verdadeiro para empresas de capital aberto, nas quais a equipe executiva precisa prestar contas a um conselho de administra\u00e7\u00e3o. Em muitos casos, quando uma organiza\u00e7\u00e3o desse tipo enfrenta uma crise, o conselho exigir\u00e1 demiss\u00f5es, mesmo que seja apenas para apaziguar os acionistas e evitar a queda acentuada do pre\u00e7o das a\u00e7\u00f5es.<\/p>\n\n\n\n<p>Um exemplo perfeito \u00e9 a infame viola\u00e7\u00e3o de dados da Equifax, que resultou na perda de dados pessoais de mais de 143 milh\u00f5es de clientes. A diretora de seguran\u00e7a da Equifax, Susan Mauldin, e o diretor de tecnologia da informa\u00e7\u00e3o, David Webb, foram for\u00e7ados a renunciar ap\u00f3s a viola\u00e7\u00e3o. <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/2017-data-breach-will-cost-equifax-at-least-1-38-billion\">custou \u00e0 empresa mais de 1,3 bilh\u00e3o de d\u00f3lares.<\/a>. Embora nem todas as viola\u00e7\u00f5es resultem em consequ\u00eancias t\u00e3o graves, a amea\u00e7a de perda de emprego \u00e9 uma preocupa\u00e7\u00e3o significativa para os CISOs, tornando imperativo priorizar as medidas de ciberseguran\u00e7a.<\/p>\n\n\n\n<p>A ideia de perder o emprego \u00e9 assustadora, mas \u00e9 uma possibilidade real para os CISOs ap\u00f3s uma viola\u00e7\u00e3o de dados. Na verdade, <a href=\"https:\/\/media.nominetcyber.com\/wp-content\/uploads\/2020\/02\/Nominet_The-CISO-Stress-Report_2020_V10.pdf\">29% de CISOs<\/a> Acredito que o respons\u00e1vel seria demitido em caso de viola\u00e7\u00e3o de seguran\u00e7a. Isso s\u00f3 demonstra a enorme press\u00e3o sobre os CISOs para que protejam os dados sens\u00edveis de suas organiza\u00e7\u00f5es a todo custo.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Danos \u00e0 reputa\u00e7\u00e3o<\/h2>\n\n\n\n<p>Como CISO, sua reputa\u00e7\u00e3o \u00e9 tudo. Voc\u00ea trabalhou duro para construir confian\u00e7a e se estabelecer como um especialista em sua \u00e1rea. Mas uma viola\u00e7\u00e3o de dados pode desfazer todo esse trabalho \u00e1rduo em um instante. Mesmo que um CISO n\u00e3o seja demitido ap\u00f3s uma viola\u00e7\u00e3o, sua reputa\u00e7\u00e3o pode sofrer um s\u00e9rio golpe dentro da organiza\u00e7\u00e3o. O impacto no ego que acompanha a perda de status dentro da empresa j\u00e1 \u00e9 ruim o suficiente, mas tamb\u00e9m pode afetar a capacidade do CISO de obter aprova\u00e7\u00e3o para itens or\u00e7ament\u00e1rios cruciais no futuro.<\/p>\n\n\n\n<p>Uma viola\u00e7\u00e3o de dados pode resultar em cobertura negativa na m\u00eddia, perda da confian\u00e7a do cliente e danos \u00e0 imagem da marca. N\u00e3o \u00e9 \u00e0 toa.<a href=\"https:\/\/www.csoonline.com\/article\/3019283\/does-a-data-breach-really-affect-your-firm-s-reputation.html\"> 46% de organiza\u00e7\u00f5es<\/a> Empresas que sofreram viola\u00e7\u00f5es de dados relatam danos \u00e0 reputa\u00e7\u00e3o. Os CISOs s\u00e3o parcialmente respons\u00e1veis por proteger a reputa\u00e7\u00e3o da organiza\u00e7\u00e3o, e uma viola\u00e7\u00e3o pode desfazer anos de trabalho \u00e1rduo.<\/p>\n\n\n\n<p>Por exemplo, a viola\u00e7\u00e3o de dados da Target, que resultou na perda de mais de 40 milh\u00f5es de registros de clientes, levou a uma perda significativa da confian\u00e7a do cliente e a danos \u00e0 imagem da marca. A CIO da \u00e9poca, Beth Jacob, renunciou ao cargo ap\u00f3s a viola\u00e7\u00e3o. Os danos \u00e0 reputa\u00e7\u00e3o causados por uma viola\u00e7\u00e3o podem ser dif\u00edceis de reparar, e os CISOs devem trabalhar para prevenir que as viola\u00e7\u00f5es ocorram a fim de evitar tais consequ\u00eancias.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Processos judiciais<\/h2>\n\n\n\n<p>Ningu\u00e9m gosta de ser processado, e os CISOs n\u00e3o s\u00e3o exce\u00e7\u00e3o. Em caso de viola\u00e7\u00e3o de seguran\u00e7a, clientes ou funcion\u00e1rios afetados podem entrar com uma a\u00e7\u00e3o judicial contra a organiza\u00e7\u00e3o e seus executivos. Os CISOs tamb\u00e9m podem ser responsabilizados pessoalmente se for constatado que n\u00e3o adotaram medidas adequadas de ciberseguran\u00e7a.&nbsp;<\/p>\n\n\n\n<p>Por exemplo, na viola\u00e7\u00e3o de dados do Yahoo que afetou mais de 3 bilh\u00f5es de contas de usu\u00e1rios, o CISO da empresa foi citado em uma a\u00e7\u00e3o coletiva movida por acionistas. E quase dois anos ap\u00f3s a viola\u00e7\u00e3o da SolarWinds, seu CISO (entre outros) foi citado em <a href=\"https:\/\/www.csoonline.com\/article\/3657874\/solarwinds-breach-lawsuits-6-takeaways-for-cisos.html\">uma a\u00e7\u00e3o coletiva de acionistas<\/a>.<\/p>\n\n\n\n<p>A melhor maneira de os CISOs evitarem um processo judicial \u00e9 investir no treinamento dos usu\u00e1rios finais, documentar uma estrat\u00e9gia clara e adotar ferramentas avan\u00e7adas para o gerenciamento de casos de seguran\u00e7a cibern\u00e9tica. Tomar essas medidas reduzir\u00e1 significativamente a probabilidade de uma viola\u00e7\u00e3o e demonstrar\u00e1 um esfor\u00e7o de boa-f\u00e9, limitando assim a responsabilidade.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00c9 hora de mitigar o risco.<\/h3>\n\n\n\n<p>As consequ\u00eancias de uma viola\u00e7\u00e3o de dados podem ser graves para os CISOs, incluindo perda de emprego, danos \u00e0 reputa\u00e7\u00e3o e at\u00e9 mesmo processos judiciais. A amea\u00e7a dessas consequ\u00eancias destaca a import\u00e2ncia de priorizar medidas de ciberseguran\u00e7a para evitar que viola\u00e7\u00f5es ocorram. Os CISOs devem garantir que suas organiza\u00e7\u00f5es tenham medidas de seguran\u00e7a robustas em vigor e que seus sistemas estejam sempre atualizados. <a href=\"https:\/\/swimlane.com\/pt\/blogue\/o-que-e-um-centro-de-operacoes-de-seguranca-soc\/\">Centro de Opera\u00e7\u00f5es de Seguran\u00e7a (SOC)<\/a> A equipe est\u00e1 equipada para priorizar alertas e amea\u00e7as rapidamente.<\/p>\n\n\n\n<p>Ser um CISO n\u00e3o \u00e9 tarefa f\u00e1cil. \u00c9 um trabalho de alta press\u00e3o que exige vigil\u00e2ncia constante e dom\u00ednio absoluto da \u00e1rea. Mas, com a estrat\u00e9gia de ciberseguran\u00e7a correta, os CISOs podem mitigar os riscos associados a uma viola\u00e7\u00e3o de dados e proteger as informa\u00e7\u00f5es sens\u00edveis da organiza\u00e7\u00e3o. Portanto, mantenha-se vigilante, antecipe-se aos problemas e n\u00e3o se esque\u00e7a de respirar.<\/p>\n\n\n\n<div class=\"bs-div bs-div-780013b491a36519dcd320dac1e8bf00a159c881 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-780013b491a36519dcd320dac1e8bf00a159c881 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap\"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/incomm_msthead.webp' class='img-fluid'   alt='Interior da sede da InComm Payments, representando a automa\u00e7\u00e3o de seguran\u00e7a para a l\u00edder global em fintech.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\">Estudo de caso: A InComm Payments unifica ferramentas de seguran\u00e7a isoladas com o Swimlane.<\/h2>\n\n\n\n<p>Saiba mais sobre como a equipe SOC da InComm Payments conseguiu unificar ferramentas de seguran\u00e7a isoladas com a ajuda da automa\u00e7\u00e3o de seguran\u00e7a low-code da Swimlane.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-720ea6be28eebf8fc03421136e5c5ed7d2d54f6d\"><style>.bs-pro-button-p-btn-720ea6be28eebf8fc03421136e5c5ed7d2d54f6d .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/pt\/recursos\/estudos-de-caso\/pagamentos-de-renda\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Ler mais<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Posts relacionados<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69efd2cc58c7c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/3-major-security-operations-mistakes\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>16 de janeiro de 2016<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Tr\u00eas erros graves em opera\u00e7\u00f5es de seguran\u00e7a<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69efd2cc5aee5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/next-great-resignation-security-leaders-ciso\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>17 de mar\u00e7o de 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>A pr\u00f3xima grande demiss\u00e3o? L\u00edderes de seguran\u00e7a e CISOs.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69efd2cc5c207 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/three-crucial-questions-to-ask-before-adopting-cyber-security-solutions\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 de mar\u00e7o de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Tr\u00eas perguntas cruciais a serem feitas antes de adotar uma solu\u00e7\u00e3o de ciberseguran\u00e7a.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Interessado em saber mais?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Assine hoje mesmo para ficar por dentro das novidades e receber atualiza\u00e7\u00f5es regulares da Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexto moderno de SecOps: Um gr\u00e1fico geom\u00e9trico com gradiente representando o fluxo fluido de dados e a agilidade nativa da nuvem.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"pt\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":29849,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"2023-04-26T21:19:35.305Z","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9910","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The 3 Scariest Breach Consequences for CISOs<\/title>\n<meta name=\"description\" content=\"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/as-3-consequencias-mais-assustadoras-de-uma-violacao-de-seguranca-para-os-cios\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Three Scariest Breach Consequences for CISOs\" \/>\n<meta property=\"og:description\" content=\"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/as-3-consequencias-mais-assustadoras-de-uma-violacao-de-seguranca-para-os-cios\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/\",\"name\":\"The 3 Scariest Breach Consequences for CISOs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/3SCARIEST_BREACH.png\",\"datePublished\":\"2023-04-25T15:49:00+00:00\",\"dateModified\":\"2025-01-10T17:36:04+00:00\",\"description\":\"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/3SCARIEST_BREACH.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/3SCARIEST_BREACH.png\",\"width\":1120,\"height\":666,\"caption\":\"three scariest breach consequences for CISOs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/the-3-scariest-breach-consequences-for-cios\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Three Scariest Breach Consequences for CISOs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"As 3 consequ\u00eancias mais assustadoras de uma viola\u00e7\u00e3o de seguran\u00e7a para os CISOs","description":"Apesar das recentes viola\u00e7\u00f5es de dados, pesquisas mostram que os CISOs precisam de toda a ajuda poss\u00edvel para evitar a perda do emprego, processos judiciais e outros problemas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/as-3-consequencias-mais-assustadoras-de-uma-violacao-de-seguranca-para-os-cios\/","og_locale":"pt_PT","og_type":"article","og_title":"The Three Scariest Breach Consequences for CISOs","og_description":"Despite recent data breaches, research shows CISOs needs all the help they can get to avoid job loss, lawsuits and more.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/as-3-consequencias-mais-assustadoras-de-uma-violacao-de-seguranca-para-os-cios\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:36:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH-1.png","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/","url":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/","name":"As 3 consequ\u00eancias mais assustadoras de uma viola\u00e7\u00e3o de seguran\u00e7a para os CISOs","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png","datePublished":"2023-04-25T15:49:00+00:00","dateModified":"2025-01-10T17:36:04+00:00","description":"Apesar das recentes viola\u00e7\u00f5es de dados, pesquisas mostram que os CISOs precisam de toda a ajuda poss\u00edvel para evitar a perda do emprego, processos judiciais e outros problemas.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/3SCARIEST_BREACH.png","width":1120,"height":666,"caption":"three scariest breach consequences for CISOs"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/the-3-scariest-breach-consequences-for-cios\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Three Scariest Breach Consequences for CISOs"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9910\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/29849"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=9910"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=9910"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=9910"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=9910"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=9910"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=9910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}