{"id":20577,"date":"2025-04-25T14:00:56","date_gmt":"2025-04-25T17:00:56","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/?p=20577"},"modified":"2025-04-25T13:38:57","modified_gmt":"2025-04-25T16:38:57","slug":"guide-de-mise-en-oeuvre-de-la-norme-de-gestion-de-la-securite-des-informations-iso-cei-27001","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/livros\/guide-de-mise-en-oeuvre-de-la-norme-de-gestion-de-la-securite-des-informations-iso-cei-27001\/","title":{"rendered":"Guide de Mise en \u0152uvre de la Norme de Gestion de la S\u00e9curit\u00e9 des Informations ISO\/CEI 27001"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-20578\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/04\/guide-de-mise-en-oeuvre-de-la-norme-de-gestion-de-la-securite-des-informations-iso-cei-27001.jpg\" alt=\"Guide de Mise en \u0152uvre de la Norme de Gestion de la S\u00e9curit\u00e9 des Informations ISO\/CEI 27001\" width=\"145\" height=\"217\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/04\/guide-de-mise-en-oeuvre-de-la-norme-de-gestion-de-la-securite-des-informations-iso-cei-27001.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/04\/guide-de-mise-en-oeuvre-de-la-norme-de-gestion-de-la-securite-des-informations-iso-cei-27001-100x150.jpg 100w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>European Digital SME Alliance<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Overview:<\/strong><\/span> Aujourd\u2019hui, l\u2019information est un produit de base pour la plupart des entreprises \u2012 et pour beaucoup le seul produit, tandis que d\u2019autres sont tr\u00e8s d\u00e9pendantes du traitement de l\u2019information pour les besoins de leurs activit\u00e9s. Malheureusement, certaines personnes malveillantes tentent d\u2019utiliser le besoin d\u2019information \u00e0 leur profit et r\u00e9cemment, de nombreux exemples de comportement ill\u00e9gal (attaques virales assorties de ran\u00e7ons (WannaCry, Petya), fuites de donn\u00e9es personnelles de grandes entreprises (Equifax ou autres) et fuites d\u2019outils d\u2019espionnage d\u2019organismes de renseignement ont \u00e9t\u00e9 constat\u00e9es.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2025\/04\/guide-de-mise-en-oeuvre-de-la-norme-de-gestion-de-la-securite-des-informations-iso-cei-27001.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11251 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2014\/08\/download.gif\" alt=\"Download\" width=\"89\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>European Digital SME Alliance Overview: Aujourd\u2019hui, l\u2019information est un produit de base pour la plupart des entreprises \u2012 et pour beaucoup le seul produit, tandis que d\u2019autres sont tr\u00e8s d\u00e9pendantes du traitement de l\u2019information pour les besoins de leurs activit\u00e9s. Malheureusement, certaines personnes malveillantes tentent d\u2019utiliser le besoin d\u2019information \u00e0 leur profit et r\u00e9cemment, de nombreux exemples de comportement ill\u00e9gal (attaques virales assorties de ran\u00e7ons (WannaCry, Petya), fuites de donn\u00e9es&hellip; <\/p>\n","protected":false},"author":3,"featured_media":20578,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,112,109,20],"tags":[],"class_list":["post-20577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-livros","category-download","category-francais","category-seguranca-da-informacao"],"views":277,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/20577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/comments?post=20577"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/20577\/revisions"}],"predecessor-version":[{"id":20579,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/20577\/revisions\/20579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media\/20578"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media?parent=20577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/categories?post=20577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/tags?post=20577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}