{"id":206602,"date":"2025-05-20T20:07:17","date_gmt":"2025-05-20T20:07:17","guid":{"rendered":"https:\/\/emdinfotech.com\/estrutura-de-requisitos-de-seguranca-cibernetica-nacional-s3\/"},"modified":"2025-05-20T20:07:17","modified_gmt":"2025-05-20T20:07:17","slug":"estrutura-de-requisitos-de-seguranca-cibernetica-nacional-s3","status":"publish","type":"post","link":"https:\/\/emdinfotech.com\/pt-br\/estrutura-de-requisitos-de-seguranca-cibernetica-nacional-s3\/","title":{"rendered":"Estrutura de requisitos de seguran\u00e7a cibern\u00e9tica nacional (S3)"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/online-university-18.jpg&#8221; custom_padding=&#8221;8vw||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-a9d8e14e-2f78-408a-a83c-506939196b52&#8243; custom_padding=&#8221;60px|60px|60px|120px|true|false&#8221; custom_padding_tablet=&#8221;30px|30px|30px|60px|true|false&#8221; custom_padding_phone=&#8221;20px|20px|20px|40px|true|false&#8221; border_radii=&#8221;off|30px|30px||&#8221; global_colors_info=&#8221;{%22gcid-a9d8e14e-2f78-408a-a83c-506939196b52%22:%91%22background_color%22%93}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;d343c4fc-656d-4a09-a789-aaac73e94025&#8243; header_font=&#8221;Roboto|300|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;55px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>NIS2 Estrutura Nacional de Seguran\u00e7a Cibern\u00e9tica  <\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1280px&#8221; max_width_tablet=&#8221;1280px&#8221; max_width_phone=&#8221;1280px&#8221; max_width_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;640e0153-b982-4bd5-b76d-dc78dcfc5a61&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Estrutura de requisitos nacionais de seguran\u00e7a cibern\u00e9tica (S3): uma nova era para a seguran\u00e7a no mundo digital<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;eac53637-81be-470b-aa2c-f0a69663910e&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p data-start=\"424\" data-end=\"511\" class=\"\"><strong data-start=\"424\" data-end=\"511\">O que toda empresa precisa saber em 2025 &#8211; Guia completo da EMD Infotech<\/strong><\/p>\n<h3 data-start=\"513\" data-end=\"573\" class=\"\">O que \u00e9 o S3 e por que ele \u00e9 relevante para todas as empresas modernas?<\/h3>\n<p data-start=\"575\" data-end=\"1002\" class=\"\">Em 2025, a seguran\u00e7a cibern\u00e9tica entra em uma nova era com a implementa\u00e7\u00e3o da <strong data-start=\"643\" data-end=\"696\">Estrutura Nacional de Requisitos de Seguran\u00e7a Cibern\u00e9tica (S3)<\/strong>, que \u00e9 a principal ferramenta para a implementa\u00e7\u00e3o da Diretiva Europeia <strong data-start=\"768\" data-end=\"776\">NIS2<\/strong> (Diretiva 2022\/2555\/UE). A S3 estabelece obriga\u00e7\u00f5es e medidas espec\u00edficas para organiza\u00e7\u00f5es que s\u00e3o consideradas &#8220;essenciais&#8221; e &#8220;entidades importantes&#8221; e operam em setores cr\u00edticos da economia e da sociedade gregas. <\/p>\n<p data-start=\"1004\" data-end=\"1203\" class=\"\">A nova legisla\u00e7\u00e3o grega (Lei 5160\/2024 e decis\u00f5es ministeriais relevantes de maio de 2025) \u00e9 diretamente vinculante e afeta as empresas p\u00fablicas, mas principalmente as PRIVADAS, que operam no pa\u00eds:<\/p>\n<ul data-start=\"1204\" data-end=\"1486\">\n<li data-start=\"1204\" data-end=\"1223\" class=\"\">\n<p data-start=\"1206\" data-end=\"1223\" class=\"\">Telecomunica\u00e7\u00f5es<\/p>\n<\/li>\n<li data-start=\"1224\" data-end=\"1236\" class=\"\">\n<p data-start=\"1226\" data-end=\"1236\" class=\"\">Energia<\/p>\n<\/li>\n<li data-start=\"1237\" data-end=\"1246\" class=\"\">\n<p data-start=\"1239\" data-end=\"1246\" class=\"\">Sa\u00fade<\/p>\n<\/li>\n<li data-start=\"1247\" data-end=\"1260\" class=\"\">\n<p data-start=\"1249\" data-end=\"1260\" class=\"\">Transporte<\/p>\n<\/li>\n<li data-start=\"1261\" data-end=\"1289\" class=\"\">\n<p data-start=\"1263\" data-end=\"1289\" class=\"\">Tecnologias da informa\u00e7\u00e3o<\/p>\n<\/li>\n<li data-start=\"1290\" data-end=\"1322\" class=\"\">\n<p data-start=\"1292\" data-end=\"1322\" class=\"\">Servi\u00e7os financeiros<\/p>\n<\/li>\n<li data-start=\"1323\" data-end=\"1334\" class=\"\">\n<p data-start=\"1325\" data-end=\"1334\" class=\"\">Alimentos<\/p>\n<\/li>\n<li data-start=\"1335\" data-end=\"1356\" class=\"\">\n<p data-start=\"1337\" data-end=\"1356\" class=\"\">Gerenciamento de \u00e1gua<\/p>\n<\/li>\n<li data-start=\"1357\" data-end=\"1391\" class=\"\">\n<p data-start=\"1359\" data-end=\"1391\" class=\"\">Infraestrutura industrial cr\u00edtica<\/p>\n<\/li>\n<li data-start=\"1392\" data-end=\"1486\" class=\"\">\n<p data-start=\"1394\" data-end=\"1486\" class=\"\">Muitos outros setores, <strong data-start=\"1416\" data-end=\"1486\">inclusive o de hotelaria e turismo<\/strong><\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1488\" data-end=\"1533\" class=\"\">O que muda com a S3 e a nova legisla\u00e7\u00e3o?<\/h3>\n<p data-start=\"1535\" data-end=\"1556\" class=\"\"><strong data-start=\"1535\" data-end=\"1556\">Agora isso \u00e9 necess\u00e1rio:<\/strong><\/p>\n<ul data-start=\"1557\" data-end=\"2721\">\n<li data-start=\"1557\" data-end=\"1710\" class=\"\">\n<p data-start=\"1559\" data-end=\"1710\" class=\"\"><strong data-start=\"1559\" data-end=\"1591\">Gerenciamento hol\u00edstico de riscos<\/strong>: Pol\u00edticas, procedimentos e medidas baseados em padr\u00f5es internacionais (ISO, NIST, etc.), com documenta\u00e7\u00e3o de todas as a\u00e7\u00f5es.<\/p>\n<\/li>\n<li data-start=\"1711\" data-end=\"1849\" class=\"\">\n<p data-start=\"1713\" data-end=\"1849\" class=\"\"><strong data-start=\"1713\" data-end=\"1738\">Responsabilidade expl\u00edcita da ger\u00eancia<\/strong>: os \u00f3rg\u00e3os da alta ger\u00eancia (diretoria, CEO, etc.) agora s\u00e3o pessoalmente respons\u00e1veis pela implementa\u00e7\u00e3o e presta\u00e7\u00e3o de contas.<\/p>\n<\/li>\n<li data-start=\"1850\" data-end=\"1975\" class=\"\">\n<p data-start=\"1852\" data-end=\"1975\" class=\"\"><strong data-start=\"1852\" data-end=\"1896\">Avalia\u00e7\u00e3o e gerenciamento cont\u00ednuos de riscos<\/strong>: revis\u00e3o regular de amea\u00e7as, medidas e planos de resposta a incidentes.<\/p>\n<\/li>\n<li data-start=\"1976\" data-end=\"2234\" class=\"\">\n<p data-start=\"1978\" data-end=\"2234\" class=\"\"><strong data-start=\"1978\" data-end=\"2015\">Pol\u00edticas e procedimentos de seguran\u00e7a<\/strong>: Exist\u00eancia obrigat\u00f3ria e atualiza\u00e7\u00e3o regular de pol\u00edticas de acesso, gerenciamento de contas, criptografia, criptografia, backups, seguran\u00e7a f\u00edsica e ambiental, parcerias com fornecedores, desenvolvimento de software, etc.<\/p>\n<\/li>\n<li data-start=\"2235\" data-end=\"2348\" class=\"\">\n<p data-start=\"2237\" data-end=\"2348\" class=\"\"><strong data-start=\"2237\" data-end=\"2276\">Designa\u00e7\u00e3o de um diretor de seguran\u00e7a (SHO)<\/strong>: uma fun\u00e7\u00e3o obrigat\u00f3ria em todas as entidades que se reportam diretamente \u00e0 ger\u00eancia.<\/p>\n<\/li>\n<li data-start=\"2349\" data-end=\"2468\" class=\"\">\n<p data-start=\"2351\" data-end=\"2468\" class=\"\"><strong data-start=\"2351\" data-end=\"2386\">Verifica\u00e7\u00f5es e testes independentes<\/strong>: Auditorias internas\/externas anuais e testes de penetra\u00e7\u00e3o.<\/p>\n<\/li>\n<li data-start=\"2469\" data-end=\"2581\" class=\"\">\n<p data-start=\"2471\" data-end=\"2581\" class=\"\"><strong data-start=\"2471\" data-end=\"2504\">Treinamento cont\u00ednuo da equipe<\/strong>: Programas de conscientiza\u00e7\u00e3o e treinamento t\u00e9cnico para toda a equipe.<\/p>\n<\/li>\n<li data-start=\"2582\" data-end=\"2721\" class=\"\">\n<p data-start=\"2584\" data-end=\"2721\" class=\"\"><strong data-start=\"2584\" data-end=\"2628\">Gerenciamento e notifica\u00e7\u00e3o de incidentes<\/strong>: Registro, an\u00e1lise e notifica\u00e7\u00e3o obrigat\u00f3ria de incidentes de seguran\u00e7a cibern\u00e9tica \u00e0s autoridades competentes.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"2723\" data-end=\"2779\" class=\"\">Mais especificamente para hot\u00e9is e empresas de turismo<\/h3>\n<p data-start=\"2781\" data-end=\"3075\" class=\"\">Muitas vezes, as empresas hoteleiras lidam com dados cr\u00edticos de clientes, processos de reserva on-line, sistemas de pagamento e tecnologias inteligentes de hospitalidade (quartos inteligentes, check-in autom\u00e1tico etc.). A conformidade com a S3 \u00e9 <strong data-start=\"3011\" data-end=\"3033\">legalmente obrigat\u00f3ria<\/strong> e agora ser\u00e1 auditada regularmente. <\/p>\n<h3 data-start=\"3077\" data-end=\"3119\" class=\"\">Quem estar\u00e1 em risco se voc\u00ea n\u00e3o estiver em conformidade?<\/h3>\n<ul data-start=\"3121\" data-end=\"3287\">\n<li data-start=\"3121\" data-end=\"3154\" class=\"\">\n<p data-start=\"3123\" data-end=\"3154\" class=\"\">Multas e san\u00e7\u00f5es legais<\/p>\n<\/li>\n<li data-start=\"3155\" data-end=\"3189\" class=\"\">\n<p data-start=\"3157\" data-end=\"3189\" class=\"\">Perda de parcerias\/contratos<\/p>\n<\/li>\n<li data-start=\"3190\" data-end=\"3208\" class=\"\">\n<p data-start=\"3192\" data-end=\"3208\" class=\"\">Danos \u00e0 reputa\u00e7\u00e3o<\/p>\n<\/li>\n<li data-start=\"3209\" data-end=\"3287\" class=\"\">\n<p data-start=\"3211\" data-end=\"3287\" class=\"\">Risco operacional real (tempo de inatividade, perda de dados)<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3289\" data-end=\"3335\" class=\"\">Como <strong data-start=\"3318\" data-end=\"3334\">a EMD Infotech<\/strong> pode ajudar voc\u00ea?<\/h3>\n<p data-start=\"3337\" data-end=\"3456\" class=\"\"><strong data-start=\"3339\" data-end=\"3355\">A EMD Infotech<\/strong> oferece um pacote completo de servi\u00e7os de gerenciamento e conformidade de seguran\u00e7a cibern\u00e9tica, que inclui:<\/p>\n<ul data-start=\"3458\" data-end=\"4457\">\n<li data-start=\"3458\" data-end=\"3608\" class=\"\">\n<p data-start=\"3460\" data-end=\"3608\" class=\"\"><strong data-start=\"3460\" data-end=\"3491\">Auditoria inicial &#8211; an\u00e1lise de lacunas<\/strong>: investiga\u00e7\u00e3o da situa\u00e7\u00e3o atual e dos pontos fracos da sua empresa em rela\u00e7\u00e3o aos requisitos S3\/NIS2.<\/p>\n<\/li>\n<li data-start=\"3609\" data-end=\"3805\" class=\"\">\n<p data-start=\"3611\" data-end=\"3805\" class=\"\"><strong data-start=\"3611\" data-end=\"3663\">Prepara\u00e7\u00e3o e atualiza\u00e7\u00e3o de pol\u00edticas de seguran\u00e7a<\/strong>: Preparamos pol\u00edticas e procedimentos sob medida (para acesso, gerenciamento de ativos, incidentes, criptografia, backups, cadeia de suprimentos, etc.).<\/p>\n<\/li>\n<li data-start=\"3806\" data-end=\"3940\" class=\"\">\n<p data-start=\"3808\" data-end=\"3940\" class=\"\"><strong data-start=\"3808\" data-end=\"3836\">Implementa\u00e7\u00e3o t\u00e9cnica de medidas<\/strong>: instalamos e configuramos sistemas de prote\u00e7\u00e3o de endpoints, firewalls, MFA, criptografia de dados, etc.<\/p>\n<\/li>\n<li data-start=\"3941\" data-end=\"4052\" class=\"\">\n<p data-start=\"3943\" data-end=\"4052\" class=\"\"><strong data-start=\"3943\" data-end=\"3982\">Treinamento de funcion\u00e1rios e gerentes<\/strong>: semin\u00e1rios e workshops on-line, adaptados \u00e0 fun\u00e7\u00e3o de cada equipe.<\/p>\n<\/li>\n<li data-start=\"4053\" data-end=\"4188\" class=\"\">\n<p data-start=\"4055\" data-end=\"4188\" class=\"\"><strong data-start=\"4055\" data-end=\"4117\">Realizar testes de penetra\u00e7\u00e3o e avalia\u00e7\u00f5es de vulnerabilidade<\/strong>: auditorias anuais ou ad hoc, com relat\u00f3rios completos e sugest\u00f5es de melhorias.<\/p>\n<\/li>\n<li data-start=\"4189\" data-end=\"4300\" class=\"\">\n<p data-start=\"4191\" data-end=\"4300\" class=\"\"><strong data-start=\"4191\" data-end=\"4226\">DPO\/CISO-as-a-Service<\/strong>: consultoria permanente ou sob demanda para manter a conformidade.<\/p>\n<\/li>\n<li data-start=\"4301\" data-end=\"4457\" class=\"\">\n<p data-start=\"4303\" data-end=\"4457\" class=\"\"><strong data-start=\"4303\" data-end=\"4356\">Gerenciamento de incidentes e suporte a relat\u00f3rios<\/strong>: resposta imediata a incidentes e orienta\u00e7\u00e3o sobre notifica\u00e7\u00e3o obrigat\u00f3ria de incidentes.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4459\" data-end=\"4501\" class=\"\">As pr\u00f3ximas etapas para cada neg\u00f3cio:<\/h3>\n<ol data-start=\"4503\" data-end=\"4907\">\n<li data-start=\"4503\" data-end=\"4606\" class=\"\">\n<p data-start=\"4506\" data-end=\"4606\" class=\"\"><strong data-start=\"4506\" data-end=\"4549\">Entre em contato diretamente com a EMD Infotech<\/strong> para obter uma primeira atualiza\u00e7\u00e3o e uma avalia\u00e7\u00e3o de conformidade gratuita.<\/p>\n<\/li>\n<li data-start=\"4607\" data-end=\"4686\" class=\"\">\n<p data-start=\"4610\" data-end=\"4686\" class=\"\"><strong data-start=\"4610\" data-end=\"4685\">Comece com um invent\u00e1rio completo de seus ativos, sistemas e processos<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4687\" data-end=\"4744\" class=\"\">\n<p data-start=\"4690\" data-end=\"4744\" class=\"\"><strong data-start=\"4690\" data-end=\"4743\">Treine e conscientize a sua equipe<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4745\" data-end=\"4809\" class=\"\">\n<p data-start=\"4748\" data-end=\"4809\" class=\"\"><strong data-start=\"4748\" data-end=\"4808\">Adotar padr\u00f5es e pr\u00e1ticas internacionais de seguran\u00e7a cibern\u00e9tica<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4810\" data-end=\"4907\" class=\"\">\n<p data-start=\"4813\" data-end=\"4907\" class=\"\"><strong data-start=\"4813\" data-end=\"4907\">Mantenha um envolvimento ativo com os especialistas, pois o cen\u00e1rio de amea\u00e7as est\u00e1 em constante mudan\u00e7a.<\/strong><\/p>\n<\/li>\n<\/ol>\n<hr data-start=\"4909\" data-end=\"4912\" class=\"\">\n<p data-start=\"4914\" data-end=\"5048\" class=\"\"><strong data-start=\"4914\" data-end=\"5048\">A EMD Infotech est\u00e1 aqui para garantir que sua empresa esteja protegida, em conformidade e pronta para o futuro digital.<\/strong><\/p>\n<p data-start=\"5050\" data-end=\"5121\" class=\"\"><em data-start=\"5050\" data-end=\"5121\">Para qualquer d\u00favida ou solicita\u00e7\u00e3o de suporte, entre em contato com nossa equipe.<\/p>\n<p><a href=\"https:\/\/emdinfotech.com\/contact\/\" title=\"Entre em contato conosco\">Para contato, clique aqui<\/a> <br \/><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_4,1_4&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;700px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/cybersecurity-1.jpg&#8221; title_text=&#8221;cybersecurity&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|30px|30px|30px|30px&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/cybersecurity-2.jpg&#8221; title_text=&#8221;cybersecurity-2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; position_origin_a_tablet=&#8221;bottom_left&#8221; position_origin_a_phone=&#8221;bottom_left&#8221; position_origin_a_last_edited=&#8221;off|desktop&#8221; position_origin_f_last_edited=&#8221;off|desktop&#8221; position_origin_r_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-20vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; hover_enabled=&#8221;0&#8243; positioning_tablet=&#8221;none&#8221; positioning_phone=&#8221;none&#8221; positioning_last_edited=&#8221;off|desktop&#8221; border_radii=&#8221;on|30px|30px|30px|30px&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto|300|||||||&#8221; header_font=&#8221;Roboto|300|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Mais informa\u00e7\u00f5es<\/h1>\n<p>[\/et_pb_text][et_pb_blog fullwidth=&#8221;off&#8221; include_categories=&#8221;all,43,42,40,41,1,39,current&#8221; show_more=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NIS2 Estrutura Nacional de Seguran\u00e7a Cibern\u00e9tica Estrutura de requisitos nacionais de seguran\u00e7a cibern\u00e9tica (S3): uma nova era para a seguran\u00e7a no mundo digital O que toda empresa precisa saber em 2025 &#8211; Guia completo da EMD Infotech O que \u00e9 o S3 e por que ele \u00e9 relevante para todas as empresas modernas? Em 2025, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[50,53],"tags":[],"class_list":["post-206602","post","type-post","status-publish","format-standard","hentry","category-e-e-instrucoes","category-seguranca-cibernetica"],"_links":{"self":[{"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/posts\/206602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/comments?post=206602"}],"version-history":[{"count":0,"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/posts\/206602\/revisions"}],"wp:attachment":[{"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/media?parent=206602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/categories?post=206602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emdinfotech.com\/pt-br\/wp-json\/wp\/v2\/tags?post=206602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}