{"id":9967,"date":"2015-02-06T00:36:00","date_gmt":"2015-02-06T07:36:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/cyber-security-drivers-talent-shortage\/"},"modified":"2025-01-10T10:14:04","modified_gmt":"2025-01-10T17:14:04","slug":"escassez-de-talentos-em-ciberseguranca-2","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/","title":{"rendered":"Fatores determinantes da ciberseguran\u00e7a, parte 2: A escassez de talentos"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-02-06T00:36:00-07:00\">6 de fevereiro de 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Fatores determinantes da ciberseguran\u00e7a, parte 2: A escassez de talentos<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"avatar de utilizador\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minutos de leitura\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Correio eletr\u00f3nico\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Cybersecurity%20drivers%20part%202%3A%20The%20talent%20shortage').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-drivers-talent-shortage%2F', '_blank')\" title=\"Correio eletr\u00f3nico\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Cybersecurity%20drivers%20part%202%3A%20The%20talent%20shortage&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-drivers-talent-shortage%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-drivers-talent-shortage%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-drivers-talent-shortage%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p><em>Esta s\u00e9rie de quatro partes abordar\u00e1 quatro fatores principais que est\u00e3o remodelando o cen\u00e1rio da seguran\u00e7a cibern\u00e9tica e continuar\u00e3o a faz\u00ea-lo nos pr\u00f3ximos tr\u00eas a cinco anos.<\/em><\/p>\n<p>Na Parte I desta s\u00e9rie, abordamos o impacto significativo que a prolifera\u00e7\u00e3o de dispositivos habilitados para IP \u2014 interconectados para formar a Internet das Coisas (IoT) \u2014 ter\u00e1 na gest\u00e3o de opera\u00e7\u00f5es de seguran\u00e7a nos pr\u00f3ximos anos. A IoT \u00e9 um fator impulsionador da seguran\u00e7a cibern\u00e9tica que resulta, em grande parte, da evolu\u00e7\u00e3o e expans\u00e3o natural da tecnologia, mas o setor tamb\u00e9m est\u00e1 sendo afetado por quest\u00f5es relacionadas a pessoal, principalmente uma significativa escassez de profissionais de seguran\u00e7a de TI.<\/p>\n<h3>Montando uma equipe de ciberseguran\u00e7a<\/h3>\n<p>Gerentes e executivos respons\u00e1veis por montar e alocar pessoal em equipes de seguran\u00e7a cibern\u00e9tica est\u00e3o testemunhando uma r\u00e1pida mudan\u00e7a nas habilidades que os membros dessas equipes precisam ter para serem bem-sucedidos diante da crescente amea\u00e7a \u00e0 seguran\u00e7a cibern\u00e9tica. <a href=\"https:\/\/swimlane.com\/pt\/preenchendo-a-lacuna-na-seguranca-cibernetica\/\">Os desafios de hoje.<\/a> Por exemplo, \u00e0 medida que os ambientes de nuvem e virtualizados se tornam cada vez mais comuns, a seguran\u00e7a definida por software \u2014 um modelo no qual a seguran\u00e7a da informa\u00e7\u00e3o \u00e9 implementada e controlada por meio de software \u2014 torna-se cada vez mais cr\u00edtica, elevando as habilidades de desenvolvimento de software a um patamar altamente valorizado.<\/p>\n<p>Infelizmente, a necessidade de profissionais de seguran\u00e7a da informa\u00e7\u00e3o com essas habilidades de desenvolvimento supera em muito o n\u00famero de pessoas que as possuem. E com empresas de tecnologia multibilion\u00e1rias como Facebook e Google competindo pelos melhores talentos, torna-se extremamente dif\u00edcil e caro para as organiza\u00e7\u00f5es atrair indiv\u00edduos com tal aptid\u00e3o. Como resultado, chegamos a um ponto em que a Cisco estima uma escassez mundial de mais de <a title=\"Sala de Imprensa da Cisco\" href=\"http:\/\/newsroom.cisco.com\/release\/1310011\/Cisco-Annual-Security-Report-Documents-Unprecedented-Growth-of-Advanced-Attacks-and-Malicious-Traffic?utm_medium=rss\" target=\"_blank\" rel=\"noreferrer noopener\">1 milh\u00e3o<\/a> Profissionais de seguran\u00e7a de TI.<\/p>\n<p>Ent\u00e3o, como chegamos a esta situa\u00e7\u00e3o? A escassez de talentos em TI n\u00e3o surgiu da noite para o dia; pelo contr\u00e1rio, \u00e9 o resultado de uma conflu\u00eancia de fatores, incluindo:<\/p>\n<ul>\n<li><strong>R\u00e1pida evolu\u00e7\u00e3o da tecnologia: <\/strong>Em resumo, a tecnologia est\u00e1 avan\u00e7ando t\u00e3o rapidamente \u2014 e, consequentemente, criando tantos novos empregos \u2014 que \u00e9 dif\u00edcil formar profissionais qualificados em n\u00famero suficiente para preencher essas vagas. O ritmo acelerado desse avan\u00e7o tecnol\u00f3gico tamb\u00e9m significa que as habilidades dos funcion\u00e1rios muitas vezes se tornam obsoletas rapidamente, a menos que aqueles que trabalham no setor fa\u00e7am um esfor\u00e7o conjunto para se manterem atualizados sobre as \u00faltimas tend\u00eancias.<\/li>\n<\/ul>\n<ul>\n<li><strong>Mudan\u00e7a nas habilidades necess\u00e1rias: <\/strong>\u00c0 medida que a tecnologia e o cen\u00e1rio de amea\u00e7as evoluem, as habilidades necess\u00e1rias para trabalhar com seguran\u00e7a da informa\u00e7\u00e3o tamb\u00e9m mudam. Os profissionais de seguran\u00e7a de TI do futuro precisar\u00e3o de conhecimentos que lhes permitam estar intimamente envolvidos no projeto e desenvolvimento de sistemas, procedimentos e aplica\u00e7\u00f5es de seguran\u00e7a. No mercado de trabalho atual, os indiv\u00edduos que possuem essa ampla gama de habilidades s\u00e3o raros.<\/li>\n<\/ul>\n<ul>\n<li><strong>Dificuldade em desenvolver talentos internamente: <\/strong>Mesmo que uma organiza\u00e7\u00e3o contrate um profissional de seguran\u00e7a da informa\u00e7\u00e3o naturalmente talentoso, ainda assim precisa familiarizar o novo funcion\u00e1rio com seus processos internos e melhores pr\u00e1ticas. Infelizmente, muitas dessas empresas n\u00e3o possuem uma estrat\u00e9gia de desenvolvimento de talentos bem estruturada que inclua o registro dos processos criados por membros seniores da equipe para serem usados como ferramentas de ensino e treinamento pr\u00e1tico.<\/li>\n<\/ul>\n<ul>\n<li><strong>Mercado altamente competitivo: <\/strong>Se o talento \u00e9 escasso, \u00e9 l\u00f3gico que os mais talentosos... <strong>profissionais de seguran\u00e7a de TI<\/strong> Esses profissionais ser\u00e3o disputados intensamente pelas maiores e mais bem-sucedidas empresas do mundo (pense em Google e Facebook). Os verdadeiros gigantes conseguem oferecer os pacotes mais lucrativos e garantir os melhores talentos, deixando outras empresas lutando por profissionais de seguran\u00e7a da informa\u00e7\u00e3o menos qualificados \u2014 e provavelmente pagando sal\u00e1rios exorbitantes.<\/li>\n<\/ul>\n<p><em>N\u00e3o deixe de visitar este blog na pr\u00f3xima semana para a parte 3 da s\u00e9rie, \u201cO panorama das amea\u00e7as\u201d.\u201d <\/em><\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Etiquetas<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Posts relacionados<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f46cb845fd4 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-part-one-the-internet-of-things\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>28 de janeiro de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Fatores de ciberseguran\u00e7a - Parte 1: A Internet das Coisas<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f46cb846efc bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-threat-landscape\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>24 de fevereiro de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Fatores de ciberseguran\u00e7a - Parte 3: O cen\u00e1rio de amea\u00e7as<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69f46cb847b28 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-security-information-overload\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10 de mar\u00e7o de 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Fatores de ciberseguran\u00e7a - Parte 4: Sobrecarga de informa\u00e7\u00f5es de seguran\u00e7a<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Interessado em saber mais?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Assine hoje mesmo para ficar por dentro das novidades e receber atualiza\u00e7\u00f5es regulares da Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Contexto moderno de SecOps: Um gr\u00e1fico geom\u00e9trico com gradiente representando o fluxo fluido de dados e a agilidade nativa da nuvem.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"pt\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9967","sw_resource","type-sw_resource","status-publish","hentry","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Actions part 2: The talent shortage<\/title>\n<meta name=\"description\" content=\"Managers responsible for assembling cyber security teams are seeing a rapid shift in the skills these IT security professionals need.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/escassez-de-talentos-em-ciberseguranca-2\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity drivers part 2: The talent shortage\" \/>\n<meta property=\"og:description\" content=\"Managers responsible for assembling cyber security teams are seeing a rapid shift in the skills these IT security professionals need.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/escassez-de-talentos-em-ciberseguranca-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:14:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Sitewide-OG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/cyber-security-drivers-talent-shortage\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/cyber-security-drivers-talent-shortage\\\/\",\"name\":\"Cybersecurity Actions part 2: The talent shortage\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\"},\"datePublished\":\"2015-02-06T07:36:00+00:00\",\"dateModified\":\"2025-01-10T17:14:04+00:00\",\"description\":\"Managers responsible for assembling cyber security teams are seeing a rapid shift in the skills these IT security professionals need.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/cyber-security-drivers-talent-shortage\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/cyber-security-drivers-talent-shortage\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/blog\\\/cyber-security-drivers-talent-shortage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity drivers part 2: The talent shortage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A\u00e7\u00f5es de ciberseguran\u00e7a, parte 2: A escassez de talentos","description":"Os gestores respons\u00e1veis pela forma\u00e7\u00e3o de equipes de seguran\u00e7a cibern\u00e9tica est\u00e3o testemunhando uma r\u00e1pida mudan\u00e7a nas habilidades necess\u00e1rias para esses profissionais de seguran\u00e7a de TI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/escassez-de-talentos-em-ciberseguranca-2\/","og_locale":"pt_PT","og_type":"article","og_title":"Cybersecurity drivers part 2: The talent shortage","og_description":"Managers responsible for assembling cyber security teams are seeing a rapid shift in the skills these IT security professionals need.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/escassez-de-talentos-em-ciberseguranca-2\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:14:04+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Sitewide-OG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/","url":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/","name":"A\u00e7\u00f5es de ciberseguran\u00e7a, parte 2: A escassez de talentos","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"datePublished":"2015-02-06T07:36:00+00:00","dateModified":"2025-01-10T17:14:04+00:00","description":"Os gestores respons\u00e1veis pela forma\u00e7\u00e3o de equipes de seguran\u00e7a cibern\u00e9tica est\u00e3o testemunhando uma r\u00e1pida mudan\u00e7a nas habilidades necess\u00e1rias para esses profissionais de seguran\u00e7a de TI.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-drivers-talent-shortage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity drivers part 2: The talent shortage"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9967\/revisions"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=9967"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=9967"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=9967"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=9967"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=9967"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=9967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}