{"id":9957,"date":"2015-04-09T22:12:00","date_gmt":"2015-04-10T04:12:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/managing-security-as-a-business-risk\/"},"modified":"2025-01-10T10:28:52","modified_gmt":"2025-01-10T17:28:52","slug":"gerenciando-a-seguranca-como-um-risco-empresarial","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/","title":{"rendered":"Por que gerenciar a seguran\u00e7a da informa\u00e7\u00e3o como um risco empresarial \u00e9 crucial, parte 1: Impacto financeiro"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Notas de d\u00f3lar americano espalhadas ilustrando o risco financeiro, o impacto de fraudes e as considera\u00e7\u00f5es de custo em opera\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-04-09T22:12:00-06:00\">9 de abril de 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Por que gerenciar a seguran\u00e7a da informa\u00e7\u00e3o como um risco empresarial \u00e9 crucial, parte 1: Impacto financeiro<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de utilizador\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minutos de leitura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correio eletr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%201%3A%20Financial%20impact').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fmanaging-security-as-a-business-risk%2F', '_blank')\" title=\"Correio eletr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%201%3A%20Financial%20impact&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>&nbsp;<\/h2>\n<h3>Parte I: Impacto Financeiro Direto<\/h3>\n<p>Um dos maiores desafios enfrentados pelos profissionais de TI atualmente \u00e9 a persistente mentalidade de compartimentaliza\u00e7\u00e3o, que os mant\u00e9m afastados de iniciativas cr\u00edticas de neg\u00f3cios da organiza\u00e7\u00e3o, como a gest\u00e3o de riscos. O problema da compartimentaliza\u00e7\u00e3o \u00e9 particularmente prevalente no que diz respeito \u00e0 seguran\u00e7a da informa\u00e7\u00e3o; um estudo recente da Raytheon, empresa do setor de defesa, com 1.006 executivos de tecnologia, por exemplo, constatou que <a href=\"http:\/\/investor.raytheon.com\/mobile.view?c=84193&amp;v=203&amp;d=1&amp;id=2018124\" target=\"_blank\" rel=\"noopener\">66%<\/a> N\u00e3o acredito que os l\u00edderes seniores de suas organiza\u00e7\u00f5es vejam a seguran\u00e7a de TI como uma prioridade estrat\u00e9gica.<\/p>\n<p>Mas a quest\u00e3o tem dois lados. Em alguns casos, os profissionais de seguran\u00e7a da informa\u00e7\u00e3o podem hesitar em compartilhar informa\u00e7\u00f5es e colaborar com outros departamentos por diversos motivos, desde preocupa\u00e7\u00f5es com restri\u00e7\u00f5es de tempo at\u00e9 receios de falta de ades\u00e3o dos funcion\u00e1rios. Nesta s\u00e9rie de tr\u00eas partes, examinaremos por que \u00e9 t\u00e3o crucial que os profissionais de seguran\u00e7a de TI e outras partes interessadas mudem sua mentalidade coletiva e comecem a pensar na gest\u00e3o de opera\u00e7\u00f5es de seguran\u00e7a como um risco crucial para os neg\u00f3cios, em vez de uma quest\u00e3o estritamente tecnol\u00f3gica.<\/p>\n<p>Conseguir v\u00e1rios departamentos\u2014e o <a title=\"Por que alinhar seu SOC e a alta administra\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica \u00e9 fundamental\" href=\"https:\/\/swimlane.com\/pt\/alinhando-seu-diretor-executivo-e-a-alta-administracao-em-seguranca-cibernetica\/\">Executivo de alto escal\u00e3o<\/a> Al\u00e9m disso, o trabalho em conjunto \u00e9 crucial para a formula\u00e7\u00e3o de uma estrat\u00e9gia de seguran\u00e7a abrangente e eficaz. A colabora\u00e7\u00e3o e o compartilhamento de informa\u00e7\u00f5es entre departamentos facilitam o treinamento do usu\u00e1rio final, e o di\u00e1logo cont\u00ednuo entre o SOC e as principais partes interessadas aumenta a probabilidade de a organiza\u00e7\u00e3o investir recursos financeiros na ado\u00e7\u00e3o de medidas robustas de seguran\u00e7a. <a title=\"Aumente a seguran\u00e7a. Reduza custos. O Swimlane automatiza as opera\u00e7\u00f5es de seguran\u00e7a.\" href=\"https:\/\/swimlane.com\/pt\/solution\/\">solu\u00e7\u00f5es de seguran\u00e7a automatizadas<\/a>.<\/p>\n<p>Mas a realidade para os CISOs e outros profissionais do SOC \u00e9 que, quando ocorre uma viola\u00e7\u00e3o de seguran\u00e7a, eles ser\u00e3o responsabilizados. Ali\u00e1s, a press\u00e3o sobre os CISOs \u00e9 t\u00e3o grande que gerou uma tend\u00eancia de contrata\u00e7\u00e3o desses profissionais. <a title=\"O que est\u00e1 impulsionando a rotatividade de executivos de CISO?\" href=\"http:\/\/searchsecurity.techtarget.com\/answer\/Whats-driving-executive-turnover-for-CISOs\" target=\"_blank\" rel=\"noreferrer noopener\">deixando o mundo corporativo<\/a> para o lado do fornecedor do neg\u00f3cio. E nada coloca um l\u00edder de seguran\u00e7a em apuros mais r\u00e1pido do que um problema de seguran\u00e7a que custa dinheiro diretamente \u00e0 empresa.<\/p>\n<p>O exemplo mais claro de como um incidente de seguran\u00e7a da informa\u00e7\u00e3o impacta financeiramente uma empresa \u00e9 o roubo puro e simples. At\u00e9 recentemente, acreditava-se que bancos e outras institui\u00e7\u00f5es financeiras eram as mais bem preparadas para se defenderem de invas\u00f5es, mas essa ilus\u00e3o foi desfeita. Algumas das not\u00edcias de grande repercuss\u00e3o recentemente focaram em cibercriminosos roubando informa\u00e7\u00f5es confidenciais de clientes, mas alguns profissionais de seguran\u00e7a de TI podem n\u00e3o estar cientes de que hackers encontraram maneiras de... <a title=\"Hackers de bancos roubam milh\u00f5es atrav\u00e9s de malware\" href=\"http:\/\/www.nytimes.com\/2015\/02\/15\/world\/bank-hackers-steal-millions-via-malware.html\" target=\"_blank\" rel=\"noreferrer noopener\">roubar diretamente milh\u00f5es<\/a> de bancos que utilizam software malicioso. Os ataques foram realizados contra mais de 100 bancos em 30 pa\u00edses e \u00e9 praticamente certo que muitos CISOs e outros profissionais de seguran\u00e7a dessas institui\u00e7\u00f5es sofrer\u00e3o, no m\u00ednimo, danos \u00e0 reputa\u00e7\u00e3o e, na pior das hip\u00f3teses, demiss\u00e3o.<\/p>\n<p>O com\u00e9rcio eletr\u00f4nico \u00e9 outro exemplo. A essa altura, quase todos que conhecem seguran\u00e7a da informa\u00e7\u00e3o ou com\u00e9rcio eletr\u00f4nico entendem que uma intrus\u00e3o que cause a indisponibilidade de um site impacta negativamente a receita. A surpresa, principalmente para grandes empresas, pode ser exatamente essa. <em>quanto <\/em>O dinheiro pode ser perdido em pouco tempo. Por exemplo, Mike Azevedo, CEO da Clustrix, fornecedora de solu\u00e7\u00f5es de banco de dados, afirmou que a indisponibilidade de um site pode custar \u00e0s empresas de e-commerce uma quantia impressionante. <a title=\"431 mil consumidores enfrentaram problemas de desempenho em sites de com\u00e9rcio eletr\u00f4nico durante a temporada de festas de 2014.\" href=\"https:\/\/www.internetretailer.com\/2015\/03\/10\/43-consumers-had-e-commerce-website-performance-issues\" target=\"_blank\" rel=\"noreferrer noopener\">$500.000 por hora<\/a>. Nesse ritmo, mesmo uma \u00fanica viola\u00e7\u00e3o de dados poderia impactar os resultados trimestrais de uma empresa e colocar o emprego de um CISO em s\u00e9rio risco.<\/p>\n<p>Infelizmente, o preju\u00edzo financeiro direto n\u00e3o \u00e9 a \u00fanica forma pela qual as organiza\u00e7\u00f5es e seus CISOs podem ser afetados por ataques cibern\u00e9ticos. Volte na pr\u00f3xima semana para mais informa\u00e7\u00f5es. <a title=\"10 fatos que todo profissional de seguran\u00e7a cibern\u00e9tica deve saber\" href=\"https:\/\/swimlane.com\/pt\/10-fatos-que-todo-profissional-de-seguranca-cibernetica-deve-saber\/\">Parte 2<\/a> Nesta s\u00e9rie, analisamos como a reputa\u00e7\u00e3o de empresas e profissionais de seguran\u00e7a de TI pode ser prejudicada quando ocorre uma viola\u00e7\u00e3o de seguran\u00e7a.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Posts relacionados<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f29b2611d10 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk-part-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26 de abril de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por que gerenciar a seguran\u00e7a da informa\u00e7\u00e3o como um risco empresarial \u00e9 crucial, parte 2: Danos \u00e0 reputa\u00e7\u00e3o<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f29b261379d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12 de maio de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por que gerenciar a seguran\u00e7a da informa\u00e7\u00e3o como um risco empresarial \u00e9 crucial, parte 3: Propriedade intelectual<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f29b2614c31 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-security-information-overload\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10 de mar\u00e7o de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Fatores de ciberseguran\u00e7a - Parte 4: Sobrecarga de informa\u00e7\u00f5es de seguran\u00e7a<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Interessado em saber mais?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Assine hoje mesmo para ficar por dentro das novidades e receber atualiza\u00e7\u00f5es regulares da Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexto moderno de SecOps: Um gr\u00e1fico geom\u00e9trico com gradiente representando o fluxo fluido de dados e a agilidade nativa da nuvem.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"pt\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9958,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9957","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Managing information security as a critical business risk<\/title>\n<meta name=\"description\" content=\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/gerenciando-a-seguranca-como-um-risco-empresarial\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why managing information security as a business risk is critical, part 1: Financial impact\" \/>\n<meta property=\"og:description\" content=\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/gerenciando-a-seguranca-como-um-risco-empresarial\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:28:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/\",\"name\":\"Managing information security as a critical business risk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-finance.png\",\"datePublished\":\"2015-04-10T04:12:00+00:00\",\"dateModified\":\"2025-01-10T17:28:52+00:00\",\"description\":\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-finance.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2015-finance.png\",\"width\":1120,\"height\":696,\"caption\":\"U.S. dollar bills scattered illustrating financial risk, fraud impact and cost considerations in cybersecurity operations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/managing-security-as-a-business-risk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why managing information security as a business risk is critical, part 1: Financial impact\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gerenciar a seguran\u00e7a da informa\u00e7\u00e3o como um risco cr\u00edtico para os neg\u00f3cios","description":"Um dos principais desafios enfrentados pelos profissionais de TI hoje em dia \u00e9 uma mentalidade de isolamento que os mant\u00e9m separados de iniciativas cr\u00edticas de neg\u00f3cios da organiza\u00e7\u00e3o.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/gerenciando-a-seguranca-como-um-risco-empresarial\/","og_locale":"pt_PT","og_type":"article","og_title":"Why managing information security as a business risk is critical, part 1: Financial impact","og_description":"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/gerenciando-a-seguranca-como-um-risco-empresarial\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:28:52+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/","url":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/","name":"Gerenciar a seguran\u00e7a da informa\u00e7\u00e3o como um risco cr\u00edtico para os neg\u00f3cios","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","datePublished":"2015-04-10T04:12:00+00:00","dateModified":"2025-01-10T17:28:52+00:00","description":"Um dos principais desafios enfrentados pelos profissionais de TI hoje em dia \u00e9 uma mentalidade de isolamento que os mant\u00e9m separados de iniciativas cr\u00edticas de neg\u00f3cios da organiza\u00e7\u00e3o.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","width":1120,"height":696,"caption":"U.S. dollar bills scattered illustrating financial risk, fraud impact and cost considerations in cybersecurity operations"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/managing-security-as-a-business-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why managing information security as a business risk is critical, part 1: Financial impact"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9957\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/9958"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=9957"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=9957"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=9957"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=9957"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=9957"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=9957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}