{"id":12651,"date":"2015-10-29T13:00:10","date_gmt":"2015-10-29T16:00:10","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=12651"},"modified":"2015-10-29T12:11:12","modified_gmt":"2015-10-29T15:11:12","slug":"achieving-resilience-in-the-cyber-ecosystem","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/achieving-resilience-in-the-cyber-ecosystem\/","title":{"rendered":"Achieving Resilience in the Cyber Ecosystem"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12652\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/10\/Achieving-Resilience-in-the-Cyber-Ecosystem.jpg\" alt=\"Achieving Resilience in the Cyber Ecosystem\" width=\"145\" height=\"206\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/10\/Achieving-Resilience-in-the-Cyber-Ecosystem.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/10\/Achieving-Resilience-in-the-Cyber-Ecosystem-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Maison d&#8217;\u00e9dition\u00a0Ernst &amp; Young<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Rapid advances in technology are transforming the ability of every individual and every organization to better collect, analyze, and use its information as never before. Integrated networks, fueled by the internet, have removed the historical barriers to productively sharing information, unleashing the capacity of technology to revolutionize our economic and personal lives.<\/p>\n<p>This phenomenon has seen the rise of the cyber ecosystem: a complex community of interacting devices, networks, people and organizations, and the environment of processes<br \/>\nand technologies supporting these interactions.<\/p>\n<p>The cyber ecosystem\u2019s ability to simplify the sharing of information is simultaneously its greatest benefit and its greatest threat. The vulnerability of private and valuable information to theft, alteration or destruction by criminals or other malicious actors<br \/>\ncontinuously increases. Localized disruptions can rapidly trigger a cascading sequence of events that can cause widespread technology disasters across entire networks<br \/>\nand communities.<\/p>\n<p><a href=\"http:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2015\/10\/EY-Insights_on_GRC_Cyber_ecosystem.pdf\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maison d&#8217;\u00e9dition\u00a0Ernst &amp; Young R\u00e9sum\u00e9: Rapid advances in technology are transforming the ability of every individual and every organization to better collect, analyze, and use its information as never before. Integrated networks, fueled by the internet, have removed the historical barriers to productively sharing information, unleashing the capacity of technology to revolutionize our economic and personal lives. This phenomenon has seen the rise of the cyber ecosystem: a complex community&hellip; <\/p>\n","protected":false},"author":3,"featured_media":12652,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,20,112],"tags":[],"class_list":["post-12651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-da-informacao","category-download"],"views":277,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=12651"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12651\/revisions"}],"predecessor-version":[{"id":12653,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/12651\/revisions\/12653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/12652"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=12651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=12651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=12651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}