{"id":1925,"date":"2019-08-18T12:27:54","date_gmt":"2019-08-18T17:27:54","guid":{"rendered":"https:\/\/integrityisr.com\/?page_id=1925"},"modified":"2019-08-18T12:27:54","modified_gmt":"2019-08-18T17:27:54","slug":"insider-threat-training","status":"publish","type":"page","link":"https:\/\/integrityisr.com\/pt\/insider-threat-training\/","title":{"rendered":"TREINAMENTO SOBRE AMEA\u00c7AS INTERNAS"},"content":{"rendered":"<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em><strong>A maneira mais eficaz de combater o risco da amea\u00e7a interna \u00e9 por meio de treinamento de funcion\u00e1rios de cima para baixo, em v\u00e1rias camadas e cont\u00ednuo.<\/strong><\/em><\/p><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Cada camada de treinamento \u00e9 informada pela Avalia\u00e7\u00e3o de Amea\u00e7as Internas conclu\u00edda pela Equipe de Avalia\u00e7\u00e3o de Amea\u00e7as ISR da Integrity e desenvolvida para abordar as pr\u00e1ticas recomendadas de seguran\u00e7a da informa\u00e7\u00e3o e as \u00e1reas de alto risco identificadas durante a Avalia\u00e7\u00e3o de Amea\u00e7as Internas.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>A Integrity ISR far\u00e1 parceria com voc\u00ea para&nbsp;<\/strong><em><strong>otimizar um plano de gerenciamento de amea\u00e7as internas de espectro completo&nbsp;<\/strong><\/em><strong>para estabelecer as condi\u00e7\u00f5es para o sucesso econ\u00f4mico cont\u00ednuo em um ambiente altamente competitivo. Trabalhamos com voc\u00ea para desenvolver a governan\u00e7a certa para continuar a determinar, detectar, impedir e lidar com amea\u00e7as internas. Essas \u00e1reas incluem pol\u00edticas, procedimentos e t\u00e9cnicas para a empresa, administra\u00e7\u00e3o de sistemas e seguran\u00e7a (f\u00edsica, virtual e processual).<\/strong><\/p>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">TREINAMENTO DE EXECUTIVOS<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A ades\u00e3o dos executivos e o apoio entusi\u00e1stico s\u00e3o fundamentais para o sucesso do Programa de Treinamento em Amea\u00e7as Internas. O Curso de Treinamento Executivo apresenta o cen\u00e1rio de riscos, a estrat\u00e9gia de mitiga\u00e7\u00e3o de riscos e uma vis\u00e3o geral do Programa de Treinamento sobre Amea\u00e7as Internas<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">TREINAMENTO DA EQUIPE DO PROGRAMA<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u00c9 necess\u00e1ria uma equipe multidisciplinar para criar um Programa de Amea\u00e7as Internas bem-sucedido. Este curso foi criado para instruir a equipe do programa de amea\u00e7as internas sobre como desenvolver um plano eficaz de amea\u00e7as internas, identificar os primeiros indicadores de uma amea\u00e7a interna em cada disciplina, comunicar as amea\u00e7as \u00e0 equipe e implementar contramedidas eficazes<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">TREINAMENTO PRESENCIAL DE FUNCION\u00c1RIOS<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>O Treinamento Presencial para Funcion\u00e1rios \u00e9 um programa de treinamento rigoroso, com dura\u00e7\u00e3o de dois dias, para os funcion\u00e1rios que t\u00eam acesso a informa\u00e7\u00f5es que podem causar danos significativos \u00e0 empresa se forem comprometidas. Essas \u00e1reas de risco ser\u00e3o identificadas na Avalia\u00e7\u00e3o de Amea\u00e7as Internas<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">TREINAMENTO ON-LINE<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>V\u00e1rios cursos para todos os funcion\u00e1rios estar\u00e3o dispon\u00edveis on-line, incluindo Treinamento sobre Amea\u00e7as Internas, Treinamento sobre Seguran\u00e7a Cibern\u00e9tica e Treinamento sobre Seguran\u00e7a da Informa\u00e7\u00e3o<\/li><\/ul>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\">CAMPANHA DE CONSCIENTIZA\u00c7\u00c3O<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Uma campanha de conscientiza\u00e7\u00e3o sobre amea\u00e7as internas em grande escala aumenta a vigil\u00e2ncia dos funcion\u00e1rios e atua como um impedimento contra poss\u00edveis agentes de amea\u00e7as internas<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"1964\" data-permalink=\"https:\/\/integrityisr.com\/pt\/insider-threat-training\/insider-25af\/\" data-orig-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" data-orig-size=\"1000,688\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1566129023&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"insider-25af\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-300x206.jpeg\" data-large-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" src=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" alt=\"\" class=\"wp-image-1964\" width=\"500\" height=\"344\" srcset=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg 1000w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-300x206.jpeg 300w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-768x528.jpeg 768w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-700x482.jpeg 700w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af-581x400.jpeg 581w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure><\/div>\n\n\n\n<p style=\"color:#c1da6c;text-align:center\" class=\"has-text-color has-large-font-size wp-block-paragraph\">#CombatProven<\/p>","protected":false},"excerpt":{"rendered":"<p>The most effective way to combat the risk of the Insider Threat is through top-down, multi-layered, and continuous employee training. Each layer of training is informed by the Insider Threat Assessment completed by the Integrity ISR Threat Assessment Team and developed to address both information security best practices as well as high risk areas identified [&hellip;]<\/p>","protected":false},"author":145379797,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-1925","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>INSIDER THREAT TRAINING - Integrity ISR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/integrityisr.com\/pt\/insider-threat-training\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"INSIDER THREAT TRAINING - Integrity ISR\" \/>\n<meta property=\"og:description\" content=\"The most effective way to combat the risk of the Insider Threat is through top-down, multi-layered, and continuous employee training. Each layer of training is informed by the Insider Threat Assessment completed by the Integrity ISR Threat Assessment Team and developed to address both information security best practices as well as high risk areas identified [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/integrityisr.com\/pt\/insider-threat-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Integrity ISR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/\",\"url\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/\",\"name\":\"INSIDER THREAT TRAINING - Integrity ISR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/insider-25af.jpeg\",\"datePublished\":\"2019-08-18T17:27:54+00:00\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#primaryimage\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/insider-25af.jpeg\",\"contentUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/insider-25af.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/insider-threat-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/integrityisr.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"INSIDER THREAT TRAINING\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/\",\"name\":\"Integrity ISR\",\"description\":\"Global Innovative Solutions for C4ISR, Space, and Cyberspace Strategy, Training, and Operations\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/integrityisr.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"INSIDER THREAT TRAINING - Integrity ISR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/integrityisr.com\/pt\/insider-threat-training\/","og_locale":"pt_BR","og_type":"article","og_title":"INSIDER THREAT TRAINING - Integrity ISR","og_description":"The most effective way to combat the risk of the Insider Threat is through top-down, multi-layered, and continuous employee training. Each layer of training is informed by the Insider Threat Assessment completed by the Integrity ISR Threat Assessment Team and developed to address both information security best practices as well as high risk areas identified [&hellip;]","og_url":"http:\/\/integrityisr.com\/pt\/insider-threat-training\/","og_site_name":"Integrity ISR","og_image":[{"url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/integrityisr.com\/insider-threat-training\/","url":"http:\/\/integrityisr.com\/insider-threat-training\/","name":"INSIDER THREAT TRAINING - Integrity ISR","isPartOf":{"@id":"https:\/\/integrityisr.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/integrityisr.com\/insider-threat-training\/#primaryimage"},"image":{"@id":"http:\/\/integrityisr.com\/insider-threat-training\/#primaryimage"},"thumbnailUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg","datePublished":"2019-08-18T17:27:54+00:00","breadcrumb":{"@id":"http:\/\/integrityisr.com\/insider-threat-training\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/integrityisr.com\/insider-threat-training\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"http:\/\/integrityisr.com\/insider-threat-training\/#primaryimage","url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg","contentUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/insider-25af.jpeg"},{"@type":"BreadcrumbList","@id":"http:\/\/integrityisr.com\/insider-threat-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrityisr.com\/"},{"@type":"ListItem","position":2,"name":"INSIDER THREAT TRAINING"}]},{"@type":"WebSite","@id":"https:\/\/integrityisr.com\/#website","url":"https:\/\/integrityisr.com\/","name":"Integridade ISR","description":"Solu\u00e7\u00f5es inovadoras globais para estrat\u00e9gia, treinamento e opera\u00e7\u00f5es de C4ISR, espa\u00e7o e ciberespa\u00e7o","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrityisr.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"}]}},"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/PaiUyX-v3","_links":{"self":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/pages\/1925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/users\/145379797"}],"replies":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/comments?post=1925"}],"version-history":[{"count":0,"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/pages\/1925\/revisions"}],"wp:attachment":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/media?parent=1925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}