powered by


desafio ativo
Como construir segurança toda a cadência necessária
Como construir segurança toda a cadência necessária
Como construir segurança toda a cadência necessária



status
status
status
crítico

6 participantes
6 participantes
6 participantes
recrutados
Requisito do desafio
Requisito do desafio
Requisito do desafio

People-first

Future-proof

AI-driven
Mentores
Mentores

Isabelle Melo
Isabelle Melo
Product Manager

Einstein Torres
Einstein Torres
CFO & Especialista em IA

Dante Freitas
Dante Freitas
Founder - GZero

Renan Hannouche
Renan Hannouche
Founder - GZero

Gabriel Albuquerque
Gabriel Albuquerque
CEO Loomi
Skills Necessárias
Skills Necessárias
Skills Necessárias



Application Security
Application Security
Application Security
Security Monitoring and Alerting
Security Monitoring and Alerting
Security Monitoring and Alerting
Threat Detection and Response
Threat Detection and Response
Threat Detection and Response
Secure SDLC Practices
Secure SDLC Practices
Secure SDLC Practices
Vulnerability Management
Vulnerability Management
Vulnerability Management
Risk Assessment
Risk Assessment
Risk Assessment
Security Architecture
Security Architecture
Security Architecture
DevSecOps
DevSecOps
DevSecOps
Anomaly Detection
Anomaly Detection
Anomaly Detection
Incident Management
Incident Management
Incident Management
Security Automation
Security Automation
Security Automation
Compliance Management
Compliance Management
Compliance Management
Security Governance
Security Governance
Security Governance
Security Awareness and Training
Security Awareness and Training
Security Awareness and Training
Data Protection and Privacy
Data Protection and Privacy
Data Protection and Privacy
Root Cause Analysis
Root Cause Analysis
Root Cause Analysis
Security KPIs and Reporting
Security KPIs and Reporting
Security KPIs and Reporting
Continuous Improvement
Secure Infrastructure Management
Secure Infrastructure Management
Secure Infrastructure Management
Security-by-Design Mindset
Security-by-Design Mindset
Security-by-Design Mindset
A missão
A missão
A missão



Como gerar um processo de monitoria e correção veloz das fragilidades das aplicações?
Como identificar nas atividades do dia a dia as fragilidades e oportunidades para criar autodefesa contra riscos de segurança?
Participantes
Participantes
Toque nos cards para acessar os Lifecards



Alexandre Otavio Soja
Alexandre Otavio Soja
Especialista em Segurança de TI
Especialista em Segurança de TI
Information Security Governance
Information Security Governance
Threat Detection and Response
Threat Detection and Response
Secure Architecture and Compliance
Secure Architecture and Compliance



Claudio Campos Aboud Pereira
Claudio Campos Aboud Pereira
Gerente Sênior de Prevenção à Fraudes
Gerente Sênior de Prevenção à Fraudes
Information Security Governance
Information Security Governance
Threat Detection and Response
Threat Detection and Response
Secure Architecture and Compliance
Secure Architecture and Compliance



Danielle Florido De Carvalho Leonhardt
Danielle Florido De Carvalho Leonhardt
Gerente Sr
Gerente Sr
Strategic Foresight and Vision
Strategic Foresight and Vision
Innovation Portfolio Management
Innovation Portfolio Management
Stakeholder Alignment and Influence
Stakeholder Alignment and Influence



Edson Aparecido Vieira da Silva
Edson Aparecido Vieira da Silva
Consultor de marketing
Consultor de marketing
Product Strategy and Vision
Product Strategy and Vision
Customer-Centric Discovery
Customer-Centric Discovery
Data-Informed Product Delivery
Data-Informed Product Delivery



Leonardo Lombardi Cassemiro
Leonardo Lombardi Cassemiro
Sr. Security Manager
Sr. Security Manager
Information Security Governance
Information Security Governance
Threat Detection and Response
Threat Detection and Response
Secure Architecture and Compliance
Secure Architecture and Compliance


