{"id":3288,"date":"2025-08-12T14:44:44","date_gmt":"2025-08-12T17:44:44","guid":{"rendered":"https:\/\/www.ammsolutions.com.br\/?p=3288"},"modified":"2025-09-11T20:23:58","modified_gmt":"2025-09-11T20:23:58","slug":"cybersecurity-summit-rio","status":"publish","type":"post","link":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/","title":{"rendered":"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions"},"content":{"rendered":"<p style=\"text-align: justify;\" data-start=\"300\" data-end=\"768\">A AMM Solutions participou ativamente do Cybersecurity Summit Rio.<!--more-->Nos dias 6 e 7 de agosto de 2025, com o executivo comercial Viktor Valentim representando a empresa.<\/p>\n<p style=\"text-align: justify;\" data-start=\"300\" data-end=\"768\">Durante dois dias, especialistas e l\u00edderes do setor compartilharam dados preocupantes, tend\u00eancias e estrat\u00e9gias pr\u00e1ticas para enfrentar as amea\u00e7as digitais que crescem em velocidade e complexidade. Reunimos aqui os principais aprendizados que podem ajudar sua empresa a agir agora para se proteger.<\/p>\n<hr data-start=\"770\" data-end=\"773\" \/>\n<h1 style=\"text-align: justify;\" data-start=\"775\" data-end=\"801\"><strong data-start=\"778\" data-end=\"799\">Brasil sob ataque<\/strong><\/h1>\n<p style=\"text-align: justify;\" data-start=\"802\" data-end=\"1192\">O Brasil ocupa a segunda posi\u00e7\u00e3o no ranking mundial de ataques cibern\u00e9ticos, registrando milhares de tentativas de invas\u00e3o a cada minuto. Apesar do aumento previsto nos investimentos em ciberseguran\u00e7a, o pa\u00eds ainda reage mais do que se antecipa. Muitas empresas s\u00f3 refor\u00e7am a seguran\u00e7a ap\u00f3s sofrerem um ataque, o que amplia os danos e o tempo de recupera\u00e7\u00e3o. \u00c9 hora de mudar essa postura.<\/p>\n<hr data-start=\"1194\" data-end=\"1197\" \/>\n<h2 style=\"text-align: justify;\" data-start=\"1199\" data-end=\"1254\"><strong data-start=\"1202\" data-end=\"1252\">Cybersecurity Summit traz os pr\u00f3ximos passos do Brasil<\/strong><\/h2>\n<p style=\"text-align: justify;\" data-start=\"1255\" data-end=\"1399\">No evento, especialistas apresentaram uma estrat\u00e9gia clara para fortalecer a seguran\u00e7a digital no pa\u00eds. Ela se baseia em quatro a\u00e7\u00f5es diretas:<\/p>\n<ol style=\"text-align: justify;\" data-start=\"1400\" data-end=\"1691\">\n<li data-start=\"1400\" data-end=\"1448\">\n<p data-start=\"1403\" data-end=\"1448\">Proteger e conscientizar grupos vulner\u00e1veis<\/p>\n<\/li>\n<li data-start=\"1449\" data-end=\"1517\">\n<p data-start=\"1452\" data-end=\"1517\">Blindar infraestruturas cr\u00edticas como sa\u00fade, energia e finan\u00e7as<\/p>\n<\/li>\n<li data-start=\"1518\" data-end=\"1601\">\n<p data-start=\"1521\" data-end=\"1601\">Promover a coopera\u00e7\u00e3o entre setores p\u00fablicos, privados, civis e internacionais<\/p>\n<\/li>\n<li data-start=\"1602\" data-end=\"1691\">\n<p data-start=\"1605\" data-end=\"1691\">Garantir soberania tecnol\u00f3gica com certifica\u00e7\u00f5es nacionais e desenvolvimento pr\u00f3prio<\/p>\n<\/li>\n<\/ol>\n<p style=\"text-align: justify;\" data-start=\"1693\" data-end=\"1791\">Esses pilares exigem a\u00e7\u00e3o coordenada, investimentos cont\u00ednuos e participa\u00e7\u00e3o ativa das empresas.<\/p>\n<hr data-start=\"1793\" data-end=\"1796\" \/>\n<h2 style=\"text-align: justify;\" data-start=\"1798\" data-end=\"1838\"><strong data-start=\"1801\" data-end=\"1836\">O fator humano decide a batalha<\/strong><\/h2>\n<p style=\"text-align: justify;\" data-start=\"1839\" data-end=\"2297\">A tecnologia sozinha n\u00e3o vence a guerra cibern\u00e9tica. A maioria dos incidentes nasce de falhas humanas, desde senhas fracas at\u00e9 cliques em links maliciosos. Poucos executivos brasileiros colocam a ciberseguran\u00e7a como prioridade estrat\u00e9gica, o que deixa brechas para ataques. A presen\u00e7a da AMM Solutions no Cybersecurity Summit Rio foi essencial para entender que empresas precisam investir em treinamentos regulares, simula\u00e7\u00f5es de phishing e programas de upskilling e crosskilling para transformar colaboradores em verdadeiros agentes de defesa.<\/p>\n<hr data-start=\"2299\" data-end=\"2302\" \/>\n<h2 style=\"text-align: justify;\" data-start=\"2304\" data-end=\"2345\"><strong data-start=\"2307\" data-end=\"2343\">Setor p\u00fablico precisa agir agora em rela\u00e7\u00e3o a Cybersecurity<\/strong><\/h2>\n<p style=\"text-align: justify;\" data-start=\"2346\" data-end=\"2631\">Prefeituras e \u00f3rg\u00e3os p\u00fablicos ainda est\u00e3o vulner\u00e1veis. A falta de certifica\u00e7\u00e3o de equipes e de protocolos claros compromete servi\u00e7os essenciais. Sistemas antes secund\u00e1rios, como o de controle de sem\u00e1foros, agora s\u00e3o cr\u00edticos e exigem monitoramento constante e planos de conting\u00eancia.<\/p>\n<hr data-start=\"2633\" data-end=\"2636\" \/>\n<h2 style=\"text-align: justify;\" data-start=\"2638\" data-end=\"2688\"><strong data-start=\"2641\" data-end=\"2686\">Tend\u00eancias que j\u00e1 est\u00e3o moldando o futuro\u00a0<\/strong><\/h2>\n<p style=\"text-align: justify;\" data-start=\"2689\" data-end=\"2788\">O Cybersecurity Summit Rio destacou tend\u00eancias que as empresas precisam considerar imediatamente:<\/p>\n<ul style=\"text-align: justify;\" data-start=\"2789\" data-end=\"3298\">\n<li data-start=\"2789\" data-end=\"2875\">\n<p data-start=\"2791\" data-end=\"2875\">Crescimento acelerado da intelig\u00eancia artificial e dos dilemas \u00e9ticos que ela traz<\/p>\n<\/li>\n<li data-start=\"2876\" data-end=\"2945\">\n<p data-start=\"2878\" data-end=\"2945\">Intensifica\u00e7\u00e3o da guerra cibern\u00e9tica e seu impacto na privacidade<\/p>\n<\/li>\n<li data-start=\"2946\" data-end=\"3028\">\n<p data-start=\"2948\" data-end=\"3028\">Expans\u00e3o dos ataques de ransomware, que j\u00e1 cresceram mais de 70% no \u00faltimo ano<\/p>\n<\/li>\n<li data-start=\"3029\" data-end=\"3096\">\n<p data-start=\"3031\" data-end=\"3096\">Desafios da seguran\u00e7a em nuvem e da prote\u00e7\u00e3o de dados sens\u00edveis<\/p>\n<\/li>\n<li data-start=\"3097\" data-end=\"3156\">\n<p data-start=\"3099\" data-end=\"3156\">Riscos da computa\u00e7\u00e3o qu\u00e2ntica para a criptografia atual<\/p>\n<\/li>\n<li data-start=\"3157\" data-end=\"3228\">\n<p data-start=\"3159\" data-end=\"3228\">Estrat\u00e9gias centradas no fator humano e ado\u00e7\u00e3o do modelo Zero Trust<\/p>\n<\/li>\n<li data-start=\"3229\" data-end=\"3298\">\n<p data-start=\"3231\" data-end=\"3298\">Populariza\u00e7\u00e3o do seguro cibern\u00e9tico como camada extra de prote\u00e7\u00e3o<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3300\" data-end=\"3303\" \/>\n<h2 style=\"text-align: justify;\" data-start=\"3305\" data-end=\"3342\"><strong data-start=\"3308\" data-end=\"3340\">Dark web: a amea\u00e7a invis\u00edvel<\/strong><\/h2>\n<p style=\"text-align: justify;\" data-start=\"3343\" data-end=\"3823\">A dark web se tornou um mercado lucrativo para criminosos. Vulnerabilidades cr\u00edticas de empresas chegam a valer dezenas de vezes mais do que elas estariam dispostas a pagar para corrigir. Especialistas afirmam que praticamente todos os dados pessoais j\u00e1 circulam nesses ambientes. A previs\u00e3o para os pr\u00f3ximos anos \u00e9 clara: veremos intelig\u00eancias artificiais combatendo outras intelig\u00eancias artificiais, enquanto humanos assumem o papel de estrategistas e gestores dessas defesas.<\/p>\n<hr data-start=\"3825\" data-end=\"3828\" \/>\n<h2 style=\"text-align: justify;\" data-start=\"3830\" data-end=\"3848\"><strong data-start=\"3833\" data-end=\"3846\">Conclus\u00e3o\u00a0<\/strong><\/h2>\n<p style=\"text-align: justify;\" data-start=\"3849\" data-end=\"4095\">A presen\u00e7a da AMM no Cybersecurity Summit Rio mostrou que esperar pelo ataque para agir \u00e9 um erro que nenhuma empresa pode cometer. A defesa deve ser proativa, cont\u00ednua e baseada em ambientes resilientes, capazes de detectar, responder e se recuperar rapidamente.<\/p>\n<div class=\"_tableWrapper_80l1q_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<hr data-start=\"8658\" data-end=\"8661\" \/>\n<h2 data-start=\"8663\" data-end=\"8686\">&#x1f4ec; Fale com a gente!<\/h2>\n<p data-start=\"8688\" data-end=\"8823\">Transforme seu ambiente de TI com o IBM Power11, e leve sua infraestrutura a um novo patamar de intelig\u00eancia, desempenho e resili\u00eancia.<\/p>\n<p data-start=\"8688\" data-end=\"8823\">&#x1f310; <a class=\"cursor-pointer\" target=\"_new\" rel=\"noopener\" data-start=\"8857\" data-end=\"8880\">www.ammsolutions.com.br<\/a><br data-start=\"8880\" data-end=\"8883\" \/>&#x1f4e9; <a class=\"cursor-pointer\" rel=\"noopener\" data-start=\"8886\" data-end=\"8913\">contato@ammsolutions.com.br<\/a><\/p>\n<\/div>\n<p data-start=\"8825\" data-end=\"8913\">","protected":false},"excerpt":{"rendered":"<p>A AMM Solutions participou ativamente do Cybersecurity Summit Rio.<\/p>","protected":false},"author":1,"featured_media":3296,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[66,84,103,118,127,138,140,226,285,297,304,308,320,331,335,336,337,340,389,411],"class_list":["post-3288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-informativo","tag-amm-solutions","tag-ataques-ciberneticos","tag-ciberseguranca","tag-computacao-quantica","tag-continuidade-de-negocios","tag-cybersecurity-summit-rio","tag-dark-web","tag-inteligencia-artificial","tag-phishing","tag-privacidade-digital","tag-protecao-de-dados","tag-ransomware","tag-resiliencia-cibernetica","tag-seguranca-da-informacao","tag-seguranca-digital","tag-seguranca-em-infraestrutura-critica","tag-seguranca-em-nuvem","tag-seguranca-no-setor-publico","tag-tendencias-de-ciberseguranca","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions | AMM Solutions<\/title>\n<meta name=\"description\" content=\"AMM Solutions no Cybersecurity Summit Rio: principais tend\u00eancias e estrat\u00e9gias para fortalecer sua seguran\u00e7a digital.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions\" \/>\n<meta property=\"og:description\" content=\"AMM Solutions no Cybersecurity Summit Rio: principais tend\u00eancias e estrat\u00e9gias para fortalecer sua seguran\u00e7a digital.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/\" \/>\n<meta property=\"og:site_name\" content=\"AMM Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AmmSolutionsInformatica\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-12T17:44:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-11T20:23:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ammsolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"ammsolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/\"},\"author\":{\"name\":\"ammsolutions\",\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#\/schema\/person\/dc4fd552656c4cb237717a4b0e4a2942\"},\"headline\":\"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions\",\"datePublished\":\"2025-08-12T17:44:44+00:00\",\"dateModified\":\"2025-09-11T20:23:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/\"},\"wordCount\":673,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png\",\"keywords\":[\"AMM Solutions\",\"ataques cibern\u00e9ticos\",\"ciberseguran\u00e7a\",\"computa\u00e7\u00e3o qu\u00e2ntica\",\"continuidade de neg\u00f3cios\",\"cybersecurity summit rio\",\"dark web\",\"Intelig\u00eancia Artificial\",\"phishing\",\"privacidade digital\",\"prote\u00e7\u00e3o de dados\",\"ransomware\",\"resili\u00eancia cibern\u00e9tica\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"seguran\u00e7a digital\",\"seguran\u00e7a em infraestrutura cr\u00edtica\",\"seguran\u00e7a em nuvem\",\"seguran\u00e7a no setor p\u00fablico\",\"tend\u00eancias de ciberseguran\u00e7a\",\"zero trust\"],\"articleSection\":[\"Informativo\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/\",\"url\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/\",\"name\":\"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions | AMM Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png\",\"datePublished\":\"2025-08-12T17:44:44+00:00\",\"dateModified\":\"2025-09-11T20:23:58+00:00\",\"description\":\"AMM Solutions no Cybersecurity Summit Rio: principais tend\u00eancias e estrat\u00e9gias para fortalecer sua seguran\u00e7a digital.\",\"breadcrumb\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage\",\"url\":\"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png\",\"contentUrl\":\"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png\",\"width\":1000,\"height\":1000,\"caption\":\"Executivo da AMM Solutions, Viktor Valentim, representando a empresa no Cybersecurity Summit Rio 2025 durante palestras sobre tend\u00eancias e estrat\u00e9gias de ciberseguran\u00e7a.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#website\",\"url\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/\",\"name\":\"AMM Solutions\",\"description\":\"Sua Parceira IBM no Brasil!\",\"publisher\":{\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#organization\",\"name\":\"AMM Solutions\",\"url\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/\",\"logo\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-organization-logo\"},\"sameAs\":[\"https:\/\/www.facebook.com\/AmmSolutionsInformatica\",\"https:\/\/www.instagram.com\/ammsolutions.as400\",\"https:\/\/www.youtube.com\/@ammsolutions\",\"https:\/\/www.linkedin.com\/company\/amm-solutions\"],\"description\":\"Especialista em Gest\u00e3o e Suporte IBM i (AS\/400) , por\u00e9m vamos al\u00e9m para atender toda a Infraestrutura de TI com Servidores e Storages de Alta Perfomance, Cloud, Backup e Solu\u00e7\u00f5es de Cyber Resili\u00eancia.\",\"address\":{\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-place-address\"},\"telephone\":[],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}],\"globalLocationNumber\":\"3RX9+9H Centro, Rio de Janeiro - RJ\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#\/schema\/person\/dc4fd552656c4cb237717a4b0e4a2942\",\"name\":\"ammsolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ammsolutions.com.br\/wp-content\/litespeed\/avatar\/96904ffe7b28bfcd429b71c12b1935ec.jpg?ver=1777713036\",\"contentUrl\":\"https:\/\/ammsolutions.com.br\/wp-content\/litespeed\/avatar\/96904ffe7b28bfcd429b71c12b1935ec.jpg?ver=1777713036\",\"caption\":\"ammsolutions\"},\"sameAs\":[\"https:\/\/slategrey-meerkat-459541.hostingersite.com\"],\"url\":\"https:\/\/ammsolutions.com.br\/es\/author\/ammsolutions\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-place-address\",\"streetAddress\":\"Av. Pres. Vargas, 542 - Sala 1402, Centro\",\"addressLocality\":\"Rio de Janeiro\",\"postalCode\":\"20071-002\",\"addressRegion\":\"Rj\",\"addressCountry\":\"BR\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-organization-logo\",\"url\":\"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2024\/01\/cropped-cropped-logo-amm-solutions-cor-fundo-transparente-1.png\",\"contentUrl\":\"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2024\/01\/cropped-cropped-logo-amm-solutions-cor-fundo-transparente-1.png\",\"width\":240,\"height\":136,\"caption\":\"AMM Solutions\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Rio de Janeiro\" \/>\n<meta name=\"geo.region\" content=\"Brasil\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions | AMM Solutions","description":"AMM Solutions no Cybersecurity Summit Rio: principais tend\u00eancias e estrat\u00e9gias para fortalecer sua seguran\u00e7a digital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/","og_locale":"es_ES","og_type":"article","og_title":"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions","og_description":"AMM Solutions no Cybersecurity Summit Rio: principais tend\u00eancias e estrat\u00e9gias para fortalecer sua seguran\u00e7a digital.","og_url":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/","og_site_name":"AMM Solutions","article_publisher":"https:\/\/www.facebook.com\/AmmSolutionsInformatica","article_published_time":"2025-08-12T17:44:44+00:00","article_modified_time":"2025-09-11T20:23:58+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png","type":"image\/png"}],"author":"ammsolutions","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"ammsolutions","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#article","isPartOf":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/"},"author":{"name":"ammsolutions","@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#\/schema\/person\/dc4fd552656c4cb237717a4b0e4a2942"},"headline":"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions","datePublished":"2025-08-12T17:44:44+00:00","dateModified":"2025-09-11T20:23:58+00:00","mainEntityOfPage":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/"},"wordCount":673,"commentCount":0,"publisher":{"@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#organization"},"image":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage"},"thumbnailUrl":"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png","keywords":["AMM Solutions","ataques cibern\u00e9ticos","ciberseguran\u00e7a","computa\u00e7\u00e3o qu\u00e2ntica","continuidade de neg\u00f3cios","cybersecurity summit rio","dark web","Intelig\u00eancia Artificial","phishing","privacidade digital","prote\u00e7\u00e3o de dados","ransomware","resili\u00eancia cibern\u00e9tica","seguran\u00e7a da informa\u00e7\u00e3o","seguran\u00e7a digital","seguran\u00e7a em infraestrutura cr\u00edtica","seguran\u00e7a em nuvem","seguran\u00e7a no setor p\u00fablico","tend\u00eancias de ciberseguran\u00e7a","zero trust"],"articleSection":["Informativo"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/","url":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/","name":"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions | AMM Solutions","isPartOf":{"@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage"},"image":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage"},"thumbnailUrl":"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png","datePublished":"2025-08-12T17:44:44+00:00","dateModified":"2025-09-11T20:23:58+00:00","description":"AMM Solutions no Cybersecurity Summit Rio: principais tend\u00eancias e estrat\u00e9gias para fortalecer sua seguran\u00e7a digital.","breadcrumb":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#primaryimage","url":"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png","contentUrl":"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2025\/08\/Design-sem-nome3.png","width":1000,"height":1000,"caption":"Executivo da AMM Solutions, Viktor Valentim, representando a empresa no Cybersecurity Summit Rio 2025 durante palestras sobre tend\u00eancias e estrat\u00e9gias de ciberseguran\u00e7a."},{"@type":"BreadcrumbList","@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/"},{"@type":"ListItem","position":2,"name":"Li\u00e7\u00f5es do Cybersecurity Summit Rio com a AMM Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#website","url":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/","name":"AMM Solutions","description":"Sua Parceira IBM no Brasil!","publisher":{"@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Organization","Place"],"@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#organization","name":"AMM Solutions","url":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/","logo":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-organization-logo"},"image":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/AmmSolutionsInformatica","https:\/\/www.instagram.com\/ammsolutions.as400","https:\/\/www.youtube.com\/@ammsolutions","https:\/\/www.linkedin.com\/company\/amm-solutions"],"description":"Especialista em Gest\u00e3o e Suporte IBM i (AS\/400) , por\u00e9m vamos al\u00e9m para atender toda a Infraestrutura de TI com Servidores e Storages de Alta Perfomance, Cloud, Backup e Solu\u00e7\u00f5es de Cyber Resili\u00eancia.","address":{"@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-place-address"},"telephone":[],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"17:00"}],"globalLocationNumber":"3RX9+9H Centro, Rio de Janeiro - RJ"},{"@type":"Person","@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#\/schema\/person\/dc4fd552656c4cb237717a4b0e4a2942","name":"ammsolutions","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.slategrey-meerkat-459541.hostingersite.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/ammsolutions.com.br\/wp-content\/litespeed\/avatar\/96904ffe7b28bfcd429b71c12b1935ec.jpg?ver=1777713036","contentUrl":"https:\/\/ammsolutions.com.br\/wp-content\/litespeed\/avatar\/96904ffe7b28bfcd429b71c12b1935ec.jpg?ver=1777713036","caption":"ammsolutions"},"sameAs":["https:\/\/slategrey-meerkat-459541.hostingersite.com"],"url":"https:\/\/ammsolutions.com.br\/es\/author\/ammsolutions\/"},{"@type":"PostalAddress","@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-place-address","streetAddress":"Av. Pres. Vargas, 542 - Sala 1402, Centro","addressLocality":"Rio de Janeiro","postalCode":"20071-002","addressRegion":"Rj","addressCountry":"BR"},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ammsolutions.com.br\/es\/cybersecurity-summit-rio\/#local-main-organization-logo","url":"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2024\/01\/cropped-cropped-logo-amm-solutions-cor-fundo-transparente-1.png","contentUrl":"https:\/\/ammsolutions.com.br\/wp-content\/uploads\/2024\/01\/cropped-cropped-logo-amm-solutions-cor-fundo-transparente-1.png","width":240,"height":136,"caption":"AMM Solutions"}]},"geo.placename":"Rio de Janeiro","geo.region":"Brasil"},"_links":{"self":[{"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/posts\/3288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/comments?post=3288"}],"version-history":[{"count":2,"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/posts\/3288\/revisions"}],"predecessor-version":[{"id":15241,"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/posts\/3288\/revisions\/15241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/media\/3296"}],"wp:attachment":[{"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/media?parent=3288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/categories?post=3288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ammsolutions.com.br\/es\/wp-json\/wp\/v2\/tags?post=3288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}