<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//stefaninicyber.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://stefaninicyber.com/tops-violacoes-de-dados/</loc>
		<lastmod>2015-08-11T17:06:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/pci-dss-3-0-o-que-ha-de-novo-infographic/</loc>
		<lastmod>2015-08-11T17:10:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/top-7-it-certifications-infographic/</loc>
		<lastmod>2015-08-11T17:11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-attacks/</loc>
		<lastmod>2015-08-11T17:12:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/conheca-o-novo-virus-wirelurker-malware/</loc>
		<lastmod>2015-08-11T17:13:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/relatorio-sobre-violacoes-de-dados-baixe-seu-ponemon2015/</loc>
		<lastmod>2015-09-25T11:30:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sgsi-iso-27001-uma-visao-pragmatica/</loc>
		<lastmod>2015-09-28T11:10:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ataques_hackers/</loc>
		<lastmod>2015-10-01T08:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-vulnerabilidades-2/</loc>
		<lastmod>2015-10-02T08:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/safeway-o-crescimento-do-saas-no-brasil/</loc>
		<lastmod>2015-10-05T16:45:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/analise-de-vulnerabilidades-externa-pentest-e-interna/</loc>
		<lastmod>2015-10-08T09:45:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/voce-tem-duvidas-sobre-as-vulnerabilidades-de-seus-processos-implementados/</loc>
		<lastmod>2015-10-09T09:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/vulnerabilidades-em-banco-de-dados-voce-sabe-como-protege-lo/</loc>
		<lastmod>2015-10-09T13:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/how-to-hacker-proof-your-life/</loc>
		<lastmod>2015-10-10T10:14:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/isae-3402-selo-de-conformidade-e-confianca/</loc>
		<lastmod>2015-10-14T09:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Ameacas-ciberneticas.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/servico-de-gerenciamento-de-vulnerabilidades-tvm/</loc>
		<lastmod>2015-10-14T09:15:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/voce-esta-preparado-para-um-grande-projeto-de-siem/</loc>
		<lastmod>2015-10-15T09:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/hacher_2015-security-plans-infographic/</loc>
		<lastmod>2015-10-16T13:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/video-ibm-security-a-new-way-to-think/</loc>
		<lastmod>2015-10-16T17:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso27001-prioridade-alta-para-2016/</loc>
		<lastmod>2015-10-19T13:35:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/continuidade-dos-negocios-em-tempos-de-crise-o-assunto-sempre-vem-a-tona/</loc>
		<lastmod>2015-10-23T10:34:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-a-gestao-de-continuidade-pode-apoiar-a-gestao-de-vulnerabilidades/</loc>
		<lastmod>2015-10-23T11:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/rsa-tokens-sales-express/</loc>
		<lastmod>2015-10-26T12:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-na-internet-verificacao-em-duas-etapas/</loc>
		<lastmod>2015-10-26T17:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/jp-morgan-desvendando-a-invasao-de-dados-do-jp-morgan/</loc>
		<lastmod>2015-10-27T19:49:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso-22301-vs-bs-25999-infographic/</loc>
		<lastmod>2015-11-03T18:38:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ibm_cisos-como-lideres-de-riscos/</loc>
		<lastmod>2015-11-05T14:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/evento-de-seguranca-1-experience-solutions-safeway-security-tower/</loc>
		<lastmod>2015-11-09T13:40:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/top-das-violacoes-de-dados/</loc>
		<lastmod>2015-11-10T14:17:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberataques-voce-esta-conectado-a-um-campo-de-batalha/</loc>
		<lastmod>2015-11-11T13:09:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/2015-imperva-web-application-attack-report-waar/</loc>
		<lastmod>2015-11-17T14:35:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/certificacao-iso-27001-quem-tem-nao-tem-medo/</loc>
		<lastmod>2015-11-24T09:25:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-burlar-bloqueio-e-continuar-usando-o-whatsapp-nos-proximos-dias/</loc>
		<lastmod>2015-12-17T11:31:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/conheca-os-desafios-ao-criar-um-programa-de-grc/</loc>
		<lastmod>2016-01-04T17:05:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/conferencias-de-seguranca-da-informacao-para-2016/</loc>
		<lastmod>2016-01-11T12:18:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ibm-security-identity-governance-overview/</loc>
		<lastmod>2016-01-27T14:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/infografico-ibm-identity-governance/</loc>
		<lastmod>2016-01-27T19:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cybercrime/</loc>
		<lastmod>2016-02-23T20:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-attackers/</loc>
		<lastmod>2016-02-24T15:26:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso20000/</loc>
		<lastmod>2016-04-12T19:08:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cisos_reportar_vulnerabilidades/</loc>
		<lastmod>2016-04-14T15:10:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/do-you-know-how-youre-getting-hacked/</loc>
		<lastmod>2016-05-12T12:58:05+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2022/10/banner-03.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gerenciar-seguranca-da-informacao-soc/</loc>
		<lastmod>2016-05-17T12:45:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/threat-research-paper-cyber-attacks/</loc>
		<lastmod>2016-05-23T10:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sala-de-contingencia-plano-continuidade/</loc>
		<lastmod>2016-05-28T14:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/midia-o-que-estao-falando-sobre-ameacas-ciberneticas/</loc>
		<lastmod>2016-06-02T12:33:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cinco-maneiras-para-economizar-tempo-e-aumentar-a-eficiencia-com-qradar-em-2016/</loc>
		<lastmod>2016-06-10T17:40:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-proteger-seus-dados-com-seguranca/</loc>
		<lastmod>2016-06-17T19:26:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cybersecurity/</loc>
		<lastmod>2016-06-29T11:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/manage-endpoints-to-detect-and-respond-to-breaches/</loc>
		<lastmod>2016-07-08T19:47:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/pokemon-go-and-five-security/</loc>
		<lastmod>2016-07-21T21:33:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/siem-seguranca-em-rede/</loc>
		<lastmod>2016-08-31T11:05:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/dicas-de-ciberseguranca-cybersecurity/</loc>
		<lastmod>2016-09-12T15:40:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/qual-o-seu-nivel-de-maturidade-frente-ao-cybersecurity/</loc>
		<lastmod>2016-09-14T12:15:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/infografico-cybersecurity/</loc>
		<lastmod>2016-09-22T11:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/business-innovation-study-thinking-outside-the-box-may-not-help-protect-it/</loc>
		<lastmod>2016-09-23T15:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/leaked-mirai-malware-boosts-iot-insecurity-threat-level/</loc>
		<lastmod>2016-10-06T10:47:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cloud-security-dez-consideracoes-importantes/</loc>
		<lastmod>2016-10-31T11:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ibm-watson-for-cyber-security-in-action/</loc>
		<lastmod>2016-11-07T14:15:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ponemon-reports-threat-intelligence-overloads/</loc>
		<lastmod>2016-11-09T16:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-esta-a-saude-da-seguranca-da-informacao-na-area-da-saude/</loc>
		<lastmod>2016-11-10T15:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/inovacao-da-ti-ao-alcance-de-todos/</loc>
		<lastmod>2016-11-11T11:12:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/infographic-trust-in-social-media-security-is-at-an-all-time-low/</loc>
		<lastmod>2016-11-16T15:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ferramenta-autoavaliacao-do-nist-baldrige-cybersecurity-excellencepara-download/</loc>
		<lastmod>2016-12-08T17:31:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/what-the-rise-of-social-media-hacking-means-for-your-business/</loc>
		<lastmod>2016-12-14T15:54:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gartner-como-gerenciar-e-defender-seu-orcamento-de-seguranca/</loc>
		<lastmod>2016-12-15T15:40:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/icyberattacks-top-tips-to-protect-your-personal-computer-and-devices/</loc>
		<lastmod>2016-12-20T13:59:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/%f0%9f%8e%84-boas-festas-e-feliz-2017-%f0%9f%8e%84/</loc>
		<lastmod>2016-12-23T17:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/new-cybersecurity-regulation-adds-weight-to-enterprise-security-efforts/</loc>
		<lastmod>2017-01-05T12:54:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ransomware-prevention-tips/</loc>
		<lastmod>2017-01-06T11:40:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciso-predicting-the-top-three-concerns-for-cisos-in-2017/</loc>
		<lastmod>2017-01-11T14:40:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cissp/</loc>
		<lastmod>2017-01-17T11:23:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/e-hora-de-contratar-um-mssp-cinco-motivos-que-mostram-que-voce-nao-pode-mais-esperar/</loc>
		<lastmod>2017-01-30T13:48:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/infografico-por-que-ciberseguranca-e-tao-importante/</loc>
		<lastmod>2017-02-01T16:09:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/report-imperva-incapsula-bot-traffic/</loc>
		<lastmod>2017-02-02T12:24:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/carreira-perfil-cyber-security/</loc>
		<lastmod>2017-02-02T16:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/executives-must-wake-up-to-the-value-of-risk-management-strategy/</loc>
		<lastmod>2017-02-20T14:20:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/os-maiores-riscos-de-seguranca-em-sistemas-de-ti-de-saude/</loc>
		<lastmod>2017-02-21T14:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/relatorio_cybesecurity/</loc>
		<lastmod>2017-03-09T14:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-cibernetica-pense-em-inovacao-e-colaboracao/</loc>
		<lastmod>2017-03-30T17:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/reduce-application-security-risk-ibms-cognitive-capabilities/</loc>
		<lastmod>2017-03-30T20:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/infographic-8-major-cyber-attacks-2016/</loc>
		<lastmod>2017-03-31T14:14:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/relatorio-mostra-tendencias-de-ciberseguranca-em-iot-para-2017/</loc>
		<lastmod>2017-04-11T14:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/relatorio-fortinet-analisa-crescente-cenario-de-ameacas-cibercrime/</loc>
		<lastmod>2017-04-12T13:19:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-infografico-sobre-o-cibercrime-na-america-latina/</loc>
		<lastmod>2017-04-25T18:01:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ibm-watson-seguranca-cibernetica/</loc>
		<lastmod>2017-05-04T14:59:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/atencao-imediata-novo-hacker-chega-ao-brasil/</loc>
		<lastmod>2017-05-12T17:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-as-empresas-estao-investindo-em-controles-internos-para-enfrentar-as-constantes-demandas-por-maior-transparencia/</loc>
		<lastmod>2017-05-31T18:52:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/microsoft-patches-two-critical-remote-code-execution-rce-flaws-that-have-been-exploited-in-attacks/</loc>
		<lastmod>2017-06-14T15:06:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/hidden-cobra-and-deltacharlie-an-explainer/</loc>
		<lastmod>2017-06-21T20:07:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/change-of-style-in-phishing-attacks-creates-fresh-concerns-for-big-name-brands/</loc>
		<lastmod>2017-06-29T19:03:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/watchguard-dimension-visibilidade-de-big-data-para-seguranca-de-rede/</loc>
		<lastmod>2017-07-03T18:30:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/current-trends-in-identity-and-access-management-july-2017/</loc>
		<lastmod>2017-07-05T20:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/webex-gestao-de-riscos-como-voce-controla-e-monitora-seus-indicadores-de-compliance/</loc>
		<lastmod>2017-07-06T15:15:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/succession-planning-the-importance-of-a-deputy-ciso/</loc>
		<lastmod>2017-07-07T14:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/is-blockchain-the-key-to-stopping-ransomware-attacks/</loc>
		<lastmod>2017-07-13T17:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/defcon-20-documentary-full/</loc>
		<lastmod>2017-07-14T12:47:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/podcasts-an-incident-responders-pov-brief-overview-of-the-latest-petya-variant/</loc>
		<lastmod>2017-07-14T13:21:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/quatro-vetores-transformam-o-mercado-de-software-de-seguranca-diz-o-gartner/</loc>
		<lastmod>2017-07-19T14:18:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/legislacao-de-dados-ainda-desafia-empresas/</loc>
		<lastmod>2017-07-28T13:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/wells-fargo-accidentally-leaks-1-4-gigabytes-of-information-on-high-net-worth-clients/</loc>
		<lastmod>2017-07-28T15:06:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cinco-tendencias-em-ciberseguranca-para-2017-e-2018-segundo-o-gartner/</loc>
		<lastmod>2017-08-03T13:04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/em-crescimento-carreira-em-ciberseguranca-paga-salarios-de-ate-r-22-mil-e-precisa-de-mais-profissionais/</loc>
		<lastmod>2017-08-04T15:06:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/training-watson-in-the-language-of-cyber-security/</loc>
		<lastmod>2017-08-04T16:50:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/prepare-se-para-era-cognitiva-com-o-watson-for-cyber-security/</loc>
		<lastmod>2017-08-11T15:38:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/pci-security-standard-council-oferece-guia-de-protecao-contra-ransomware-em-portugues/</loc>
		<lastmod>2017-08-11T16:37:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gerenciamento-unificado-de-endpoint-ibm-maas360-with-watson/</loc>
		<lastmod>2017-08-18T15:20:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/what-the-heck-is-going-on-with-the-hbo-game-of-thrones-hack/</loc>
		<lastmod>2017-08-18T16:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/top-10-security-challenges-for-2017/</loc>
		<lastmod>2017-08-25T16:23:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/the-evolution-of-consumer-iot-the-challenges-and-the-promise/</loc>
		<lastmod>2017-08-25T17:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/711-million-email-addresses-ensnared-in-largest-spambot/</loc>
		<lastmod>2017-09-01T15:58:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/restaurante-em-sp-ja-aceita-bitcoins-na-hora-de-pagar-conta/</loc>
		<lastmod>2017-09-01T16:24:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/enhancing-ibm-securitys-incident-response-capabilities-with-resilient/</loc>
		<lastmod>2017-09-01T17:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/equifax-says-data-from-143-million-americans-exposed-in-hack/</loc>
		<lastmod>2017-09-08T15:50:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/history-of-the-entire-world-i-guess-legendado/</loc>
		<lastmod>2017-09-08T16:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/resolucao-no-4-595-cmn-aprova-novas-regras-de-compliance-para-instituicoes-financeiras/</loc>
		<lastmod>2017-09-08T16:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/immediately-patch-windows-0-day-flaw-thats-being-used-to-spread-spyware-wednesday-september-13-2017-mohit-kumar-tweet-share-37-share-1-36k-share-share-share-windows-0-day-flaw-get-ready-to-instal/</loc>
		<lastmod>2017-09-15T09:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/understanding-the-media-hacks-of-2017/</loc>
		<lastmod>2017-09-15T10:21:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cybercrime-agora-temos-ransomware-como-servico/</loc>
		<lastmod>2017-09-15T10:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gdpr-simply-explained-in-3-minutes/</loc>
		<lastmod>2017-09-15T11:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/preparing-for-gdpr-with-ibm-resilient/</loc>
		<lastmod>2017-09-22T18:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cybersecurity-software-supply-chain-puts-businesses-at-risk/</loc>
		<lastmod>2017-09-29T15:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/how-it-works-ibm-resiliency-orchestration-demo/</loc>
		<lastmod>2017-09-29T16:56:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/deloitte-lida-com-grande-hack-lapso-de-seguranca-ecoa-o-da-equifax/</loc>
		<lastmod>2017-10-02T13:16:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/yahoo-provides-notice-to-additional-users-affected-by-previously-disclosed-2013-data-theft/</loc>
		<lastmod>2017-10-06T13:31:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/wifi-krack-wpa-vulnerabilidade/</loc>
		<lastmod>2017-10-17T15:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/5-questions-to-ask-your-ceo-about-cybersecurity/</loc>
		<lastmod>2017-10-30T19:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ibm-x-force-research-conhecendo-o-malware-sandbox/</loc>
		<lastmod>2017-11-03T11:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/understanding-pulse-wave-ddos-attacks/</loc>
		<lastmod>2017-11-10T12:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/how-to-spot-the-netflix-email-scam-hitting-millions-of-subscribers/</loc>
		<lastmod>2017-11-10T14:19:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gigante-do-transporte-maritimo-tem-prejuizo-de-us-300-milhoes-com-ataque-cibernetico/</loc>
		<lastmod>2017-11-10T14:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/forresters-top-6-cybersecurity-predictions-for-2018/</loc>
		<lastmod>2017-11-17T13:12:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/report-ponemon-cost-of-cyber-crime-rises-rapidly-as-attacks-increase/</loc>
		<lastmod>2017-11-17T14:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/new-quad9-dns-service-makes-the-internet-safer-and-more-private/</loc>
		<lastmod>2017-11-17T16:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ataque-uber-expoe-vulnerabilidade-do-compartilhamento-de-codigos/</loc>
		<lastmod>2017-11-24T14:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/quem-trabalha-com-seguranca-da-informacao-tem-emprego-em-qualquer-parte-do-mundo/</loc>
		<lastmod>2017-11-24T15:10:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/hackers-exploit-recently-disclosed-microsoft-office-bug-to-backdoor-pcs/</loc>
		<lastmod>2017-11-30T15:22:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/top-10-common-hacking-techniques-you-should-know-about/</loc>
		<lastmod>2017-11-30T21:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/falha-no-macos-high-sierra-permite-acesso-de-administrador/</loc>
		<lastmod>2017-11-30T19:20:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/icrosoft-issued-an-emergency-windows-security-update-to-address-critical-flaw-tracked-as-cve-2017-11937/</loc>
		<lastmod>2017-12-08T14:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/atencao-para-as-brechas-de-seguranca-da-sua-empresa/</loc>
		<lastmod>2017-12-12T13:24:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/quais-as-principais-tendencias-em-ciberseguranca-para-2018/</loc>
		<lastmod>2017-12-13T14:20:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/conheca-a-ferramenta-de-grc-archer/</loc>
		<lastmod>2017-12-13T17:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sete-tendencias-sobre-seguranca-da-informacao/</loc>
		<lastmod>2017-12-15T13:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/things-to-consider-when-calculating-the-return-on-security-investment/</loc>
		<lastmod>2017-12-15T16:07:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/voce-sabe-se-o-app-que-esta-baixando-e-realmente-seguro/</loc>
		<lastmod>2017-12-21T18:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-14-bilhoes-de-senhas-vazadas/</loc>
		<lastmod>2017-12-22T15:52:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/importancia-de-proteger-seus-e-mails-apos-o-caso-deloitte/</loc>
		<lastmod>2017-12-29T17:47:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/intel-knew-about-the-massive-security-flaws/</loc>
		<lastmod>2018-01-05T14:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/os-usuarios-do-skype-estao-finalmente-obtendo-criptografia-de-ponta-ponta/</loc>
		<lastmod>2018-01-12T14:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/microsoft-explica-perda-de-desempenho-com-atualizacao-de-seguranca-do-windows/</loc>
		<lastmod>2018-01-12T15:16:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/preparacao-para-gdpr-preocupa-empresas/</loc>
		<lastmod>2018-01-17T12:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/intel-alerta-que-patches-contra-spectre-podem-reiniciar-pcs/</loc>
		<lastmod>2018-01-18T20:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/microsoft-e-thales-ampliam-seguranca-para-aplicativos-criticos-de-negocios/</loc>
		<lastmod>2018-01-22T16:33:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/industrias-continuam-no-radar-de-cibercriminosos-em-2018/</loc>
		<lastmod>2018-01-23T12:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/21-passos-para-melhorar-seguranca-cibernetica-das-redes-scada/</loc>
		<lastmod>2018-01-25T00:02:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ebook-why-you-need-automated-security-solutions/</loc>
		<lastmod>2018-02-02T15:44:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/what-can-be-expected-from-ddos-attacks-in-2018/</loc>
		<lastmod>2018-02-02T16:58:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/carreira-salaries-will-increase-for-cybersecurity-jobs-survey-says/</loc>
		<lastmod>2018-02-02T17:03:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/world-economic-forum-cyber-attacks-third-most-likely-global-risk-in-2018/</loc>
		<lastmod>2018-02-09T14:37:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/meltdown-and-spectre-faq-how-the-critical-cpu-flaws-affect-pcs-and-macs/</loc>
		<lastmod>2018-02-09T15:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/the-orchestrated-enterprise-gain-greater-visibility-and-improve-efficacy-across-your-soc-and-beyond/</loc>
		<lastmod>2018-02-16T13:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/webex-gestao-de-riscos-protecao-integrada-em-tempo-real-contra-ameacas-digitais/</loc>
		<lastmod>2018-02-21T18:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/phishing-saiba-como-bloquea-lo-utilizando-uma-ferramenta-ibm-free/</loc>
		<lastmod>2018-02-22T20:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/security-tower-powered-by-ibm-qradar-cybersecurity/</loc>
		<lastmod>2018-02-23T14:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cibercrime-gera-prejuizo-de-quase-us600-bilhoes-para-economia-mundial/</loc>
		<lastmod>2018-02-23T15:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/brand-protection/</loc>
		<lastmod>2018-02-23T18:47:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/rig-ek-como-ferramentas-do-cibercrime-estao-migrando-de-ransomware-para-minerar-criptomoedas/</loc>
		<lastmod>2018-03-02T14:40:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/primeiro-passo-para-prevencao-de-perda-de-dados-no-office365/</loc>
		<lastmod>2018-03-06T14:01:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/memcached-ddos-the-biggest-baddest-denial-of-service-attacker-yet/</loc>
		<lastmod>2018-03-09T19:26:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/credssp-flaw-in-remote-desktop-protocol-affects-all-versions-of-windows/</loc>
		<lastmod>2018-03-15T23:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sgsi-e-uma-analogia-sobre-o-papel-da-alta-direcao-como-pais-e-maes/</loc>
		<lastmod>2018-03-23T12:59:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/7-ways-to-prepare-for-cybersecurity-audit-start/</loc>
		<lastmod>2018-03-23T16:24:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/how-to-get-the-most-out-of-the-rsa-conference-2018/</loc>
		<lastmod>2018-04-06T17:56:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/dica3-voce-sabe-quem-leu-suas-informacoes-online/</loc>
		<lastmod>2018-04-13T12:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-saber-se-o-facebook-compartilhou-seus-dados-com-a-cambridge-analytica/</loc>
		<lastmod>2018-04-13T15:21:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-identidade-e-acesso-em-sete-passos/</loc>
		<lastmod>2018-04-20T12:15:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sans-experts-share-five-most-dangerous-new-attack-techniques/</loc>
		<lastmod>2018-04-20T18:25:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cobit-5-aumente-o-valor-de-sua-ti/</loc>
		<lastmod>2018-04-27T09:55:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-threat-intelligence-tools-list/</loc>
		<lastmod>2018-04-27T11:46:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-futuro-da-seguranca-cognitiva-e-agora/</loc>
		<lastmod>2018-04-27T13:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/relatorio-anual-de-ciberseguranca-2018/</loc>
		<lastmod>2018-05-04T15:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gdpr-impacto-e-oportunidades-impulsionadas-pelo-regulatorio/</loc>
		<lastmod>2018-05-11T11:33:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/state-of-cybersecurity-2018/</loc>
		<lastmod>2018-05-11T14:36:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/forrest-pesquisa-sobre-fraude-em-mobile/</loc>
		<lastmod>2018-05-16T12:51:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/artigo-cso-nao-ignore-a-gestao-de-vulnerabilidades/</loc>
		<lastmod>2018-05-17T19:46:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/resolucao-bc-46582018/</loc>
		<lastmod>2018-05-25T16:31:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gdpr-qual-o-nivel-de-aderencia-de-minha-organizacao-dicas-de-ferramentas-e-self-assessments/</loc>
		<lastmod>2018-06-04T16:36:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/engenharia_social/</loc>
		<lastmod>2018-06-08T12:25:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/top-10-projetos-de-seguranca-para-2018/</loc>
		<lastmod>2018-06-15T15:09:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/governance-risk-e-software-compliance-grc/</loc>
		<lastmod>2018-06-21T12:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-na-copa-do-mundo-o-que-voce-deve-saber/</loc>
		<lastmod>2018-06-22T14:37:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-esta-sua-estrategia-de-defesa-para-seus-dispositivos-moveis/</loc>
		<lastmod>2018-06-29T16:07:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/carreira-csa-star-a-certificacao-da-nuvem/</loc>
		<lastmod>2018-07-06T12:10:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cisos-e-suas-principais-preocupacoes-4/</loc>
		<lastmod>2018-07-13T03:21:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/saiba-como-proteger-se-de-cyber-ataques/</loc>
		<lastmod>2018-07-18T19:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/saiba-mais-sobre-ameacas-digitais-4/</loc>
		<lastmod>2018-07-20T12:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/advanced-persistent-threats-apt/</loc>
		<lastmod>2018-07-27T13:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/novos-ataques-de-ransomware-usam-criptografia-poderosa-para-impedir-a-analise-e-evitar-a-deteccao/</loc>
		<lastmod>2018-08-17T15:40:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ramnit-infecta-mais-de-100-000-maquinas-em-dois-meses/</loc>
		<lastmod>2018-08-24T12:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/febraban-lanca-nova-versao-de-guia-de-compliance-para-o-setor-bancario/</loc>
		<lastmod>2018-08-31T15:36:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-ultima-versao-do-malware-trickbot-usa-documentos-do-word-habilitados-para-macro-para-fornecer-nova-injecao-de-codigo-invisivel/</loc>
		<lastmod>2018-08-31T16:55:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/trojan-de-acesso-remoto-modular-usa-tecnicas-sofisticadas-para-evitar-a-deteccao/</loc>
		<lastmod>2018-09-11T13:45:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/certificacao-iso-22301-avalie-como-um-diferencial-competitivo-nos-dias-atuais/</loc>
		<lastmod>2018-09-11T17:43:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/microsoft-issues-software-updates-for-17-critical-vulnerabilities/</loc>
		<lastmod>2018-09-14T14:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/faca-o-teste-resolucao-bc-46582018/</loc>
		<lastmod>2018-09-26T17:32:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/relatorio-threat-hunting-2018-report/</loc>
		<lastmod>2018-10-05T15:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/viro-botnet-usa-recursos-de-spam-e-keylogging-para-distribuir-o-ransomware/</loc>
		<lastmod>2018-10-05T16:24:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/10-tendencias-tecnologicas-para-2019-segundo-o-gartner/</loc>
		<lastmod>2018-10-19T14:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/trend-micro-divulgou-um-relatorio-que-detecta-aumento-nos-alertas-de-vulnerabilidade-em-sistema-industrial/</loc>
		<lastmod>2018-10-23T18:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-ameacas-internas-devem-preocupar-empresas/</loc>
		<lastmod>2018-10-25T13:09:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/half-of-execs-feel-unprepared-to-respond-to-a-cyber-incident/</loc>
		<lastmod>2018-10-29T15:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/credential-theft-spikes-by-triple-digits-in-u-s/</loc>
		<lastmod>2018-10-31T14:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/endpoint-attacks-increase-as-patching-slows/</loc>
		<lastmod>2018-11-05T12:53:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/5-tendencias-em-trojans-bancarios/</loc>
		<lastmod>2018-11-07T11:43:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/criptosequestro-conheca-mais-sobre-o-golpe-digital-do-momento/</loc>
		<lastmod>2018-11-09T12:42:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/web-e-fonte-de-mais-de-75-dos-ataques-de-malware-a-pmes/</loc>
		<lastmod>2018-11-12T11:46:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/em-5-anos-perdas-causadas-por-ataques-a-e-mails-somam-us-125-bilhoes-em-todo-o-mundo/</loc>
		<lastmod>2018-11-14T12:07:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ameacas-internas-mesmo-que-acidentais-nao-podem-ser-desprezadas/</loc>
		<lastmod>2018-11-16T12:51:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/10-tendencias-tecnologicas-para-2019-segundo-o-gartner-2/</loc>
		<lastmod>2018-11-19T12:49:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/os-8-maiores-vazamentos-de-dados-de-2018/</loc>
		<lastmod>2018-11-21T11:40:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/quais-as-principais-violacoes-em-servicos-aws/</loc>
		<lastmod>2018-11-23T12:26:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/por-que-chats-podem-colocar-seu-negocio-em-risco/</loc>
		<lastmod>2018-11-26T12:08:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-protege-empresas-e-clientes-na-black-friday/</loc>
		<lastmod>2018-11-28T13:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/what-is-application-security-a-process-and-tools-for-securing-software/</loc>
		<lastmod>2018-11-29T19:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/software-security-report-shows-improved-devsecops/</loc>
		<lastmod>2018-12-03T13:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cisos-e-suas-principais-preocupacoes-2/</loc>
		<lastmod>2018-12-06T13:32:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/saiba-mais-sobre-ameacas-digitais-2/</loc>
		<lastmod>2018-12-06T13:35:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-os-principais-ataques-de-2018-e-o-que-deve-vir-em-2019/</loc>
		<lastmod>2018-12-21T18:17:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/8-previsoes-de-ciberseguranca-para-2019/</loc>
		<lastmod>2019-01-22T21:25:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/bitcoin-o-que-esperar-para-2019/</loc>
		<lastmod>2019-01-24T16:37:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/despejo-de-credencial-contem-mais-22-bilhoes-de-contas-pwned/</loc>
		<lastmod>2019-03-01T16:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/8-dicas-para-uma-internet-mais-segura/</loc>
		<lastmod>2019-03-01T16:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-mitigar-os-riscos-de-shadow-it-em-sua-empresa/</loc>
		<lastmod>2019-03-01T19:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/top-de-seguranca-e-privacidade-ted-talks-de-2018/</loc>
		<lastmod>2019-03-07T19:52:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/certificacao-iso-22301-avalie-como-um-diferencial-competitivo-nos-dias-atuais-2/</loc>
		<lastmod>2019-03-22T14:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-o-modelo-csaas-pode-auxiliar-sua-empresa/</loc>
		<lastmod>2019-03-29T16:05:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-intelligence-mitigue-suas-ameacas/</loc>
		<lastmod>2019-04-12T16:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/planos-de-resposta-a-incidentes-de-seguranca-cibernetica-faltam-ibm-reports/</loc>
		<lastmod>2019-04-18T14:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/open-banking-mais-dados-a-deriva/</loc>
		<lastmod>2019-04-30T19:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/aceleracao-de-regulamentacao-sobre-privacidade-preocupa-empresas/</loc>
		<lastmod>2019-05-07T19:41:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-avaliar-os-provedores-do-soc-como-servico/</loc>
		<lastmod>2019-05-08T12:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/soc-e-o-melhor-caminho-para-aumentar-seus-controles/</loc>
		<lastmod>2019-05-08T17:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/operadores-de-malware-hawkeye-renovam-ataques-a-usuarios-corporativos/</loc>
		<lastmod>2019-05-27T20:59:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lei-geral-de-protecao-de-dados/</loc>
		<lastmod>2019-05-31T16:01:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-auditoria-no-contexto-da-governanca-corporativa/</loc>
		<lastmod>2019-06-07T16:11:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/phishing-de-credenciais-em-documento-do-word-no-mundo-corporativo/</loc>
		<lastmod>2019-06-21T13:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/voce-esta-usando-corretamente-seus-acessos-para-evitar-vazamento-de-dados/</loc>
		<lastmod>2019-07-05T14:41:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/anpd-criada-lgpd-aprovada-o-que-muda-com-a-sancao-da-lei-13-853-19/</loc>
		<lastmod>2019-07-12T17:26:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/mapeamento-de-processos-x-cultura-organizacional-seus-processos-estao-organizados-como-merecem/</loc>
		<lastmod>2019-07-26T17:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gerenciamento-de-patches/</loc>
		<lastmod>2019-08-02T17:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-e-as-empresas-um-breve-relato/</loc>
		<lastmod>2019-08-22T17:04:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-em-dispositivos-iot/</loc>
		<lastmod>2019-08-30T14:50:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/as-05-funcionalidades-para-uma-gestao-de-identidade-bem-estruturada/</loc>
		<lastmod>2019-08-30T15:04:40+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/08/ihcosta_Deepfake_fraud_attempt_-v_6.1_dc1974ec-dd9e-4afd-b605-c3deb6fb9ee2_2a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-papel-da-norma-isaca-1200-na-auditoria/</loc>
		<lastmod>2019-09-06T14:26:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/qual-a-importancia-da-adequacao-quanto-a-classificacao-da-informacao/</loc>
		<lastmod>2019-09-13T02:01:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/security-id-meeting-sp-2019-lgpd-e-gestao-de-identidade/</loc>
		<lastmod>2019-09-19T17:15:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/abbc-promove-evento-sobre-implantacao-e-gestao-da-lgpd/</loc>
		<lastmod>2019-09-19T19:48:47+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/10/DSC00107.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-de-redes-internas-corporativas-com-dominio-windows-active-directory/</loc>
		<lastmod>2019-09-27T15:22:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/resolucao-n-4658-instituicoes-financeiras-terao-que-implantar-politica-de-seguranca-cibernetica/</loc>
		<lastmod>2019-10-11T14:22:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-fator-humano-como-ponto-estrategico-na-seguranca-da-informacao/</loc>
		<lastmod>2019-10-18T16:29:36+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/12/ebook-horizontal_v2-compactado.pdf</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/saiba-mais-gdpr-regulamento-geral-de-protecao-de-dados/</loc>
		<lastmod>2019-10-25T13:18:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/top-07-da-gestao-de-identidade-e-acesso-gia/</loc>
		<lastmod>2019-10-30T21:00:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/as-11-principais-estatisticas-de-como-os-cisos-podem-priorizar-o-seu-orcamento-de-seguranca-para-2020/</loc>
		<lastmod>2019-11-06T18:47:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/por-que-ainda-ha-resistencia-de-empresas-em-investimentos-em-si-e-ciberseguranca/</loc>
		<lastmod>2019-11-28T14:56:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/inteligencia-emocional-no-relacionamento-com-cliente/</loc>
		<lastmod>2019-12-05T21:42:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ceo-voce-sabe-quem-tem-suas-credenciais-de-acesso/</loc>
		<lastmod>2019-12-13T18:27:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-continuidade-de-negocios-para-a-organizacao/</loc>
		<lastmod>2019-12-20T13:36:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/por-que-devo-fazer-um-pen-test-na-minha-empresa/</loc>
		<lastmod>2020-01-17T16:36:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/think-safe-2020/</loc>
		<lastmod>2020-01-23T17:46:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/os-desafios-de-2020-para-a-seguranca-da-informacao/</loc>
		<lastmod>2020-01-24T15:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/melhoria-continua-envolvimento-da-alta-direcao-e-sistema-de-gestao-pdca/</loc>
		<lastmod>2020-01-31T17:11:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/descomplicando-tudo-o-que-voce-precisa-saber-sobre-o-pci/</loc>
		<lastmod>2020-02-07T12:55:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/avaliacao-de-riscos-de-seguranca-da-informacao-em-fornecedores/</loc>
		<lastmod>2020-02-14T16:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-sua-empresa-esta-preparada-para-ciberataques/</loc>
		<lastmod>2020-02-21T19:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-uso-da-inteligencia-artificial-para-a-seguranca-da-informacao/</loc>
		<lastmod>2020-03-06T16:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-cenario-de-ciberseguranca-e-um-paralelo-com-os-dados-do-relatorio-ibm-x-force-threat-intelligence-index-2020/</loc>
		<lastmod>2020-03-09T20:38:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/aplicacoes-web-uma-porta-de-entrada-para-os-dados-de-sua-organizacao/</loc>
		<lastmod>2020-03-13T17:44:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/open-banking-e-seguranca-de-apis-uma-evolucao-para-as-relacoes-comerciais-modernas/</loc>
		<lastmod>2020-03-18T17:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/covid-19-coronavirus-e-continuidade-de-negocios-voce-esta-preparado/</loc>
		<lastmod>2020-03-20T14:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ferramentas-gratuitas-de-cybersecurity-e-comunicacao-para-auxiliar-sua-empresa-durante-a-pandemia-do-coronavirus/</loc>
		<lastmod>2020-03-23T18:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-durante-o-regime-de-trabalho-remoto/</loc>
		<lastmod>2020-03-27T16:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/continuidade-de-negocios-x-corona-virus-pandemia/</loc>
		<lastmod>2020-03-30T18:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/coronavirus-o-que-focar-agora-acoes-durante-a-pandemia/</loc>
		<lastmod>2020-04-08T21:11:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/covid-19-e-os-ataques-ciberneticos-10-dicas-de-seguranca-para-suas-informacoes/</loc>
		<lastmod>2020-04-24T18:16:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/machine-learning-em-seguranca-da-informacao/</loc>
		<lastmod>2020-05-07T18:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sistema-de-gestao-checklist-basico-para-iniciar-uma-implementacao/</loc>
		<lastmod>2020-05-12T13:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-garantir-a-resiliencia-de-sua-empresa-durante-a-pandemia-medidas-estrategicas-e-de-curto-prazo-diante-da-crise/</loc>
		<lastmod>2020-05-14T18:39:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-dos-riscos-de-fraudes-corporativas-saiba-como-melhorar-controles-e-minimizar-ocorrencias/</loc>
		<lastmod>2020-05-22T13:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-dos-riscos-de-fraudes-corporativas-saiba-como-melhorar-controles-e-minimizar-ocorrencias-2/</loc>
		<lastmod>2020-05-22T13:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-presente-e-o-futuro-do-profissional-de-seguranca-da-informacao/</loc>
		<lastmod>2020-05-29T14:44:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/certificacao-iso-22301-avalie-como-um-diferencial-competitivo-nos-dias-atuais-4/</loc>
		<lastmod>2020-06-05T11:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-evolucao-do-uso-de-dados/</loc>
		<lastmod>2020-06-05T14:44:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-manter-a-produtividade-cuidar-da-saude-mental-e-bem-estar-emocional-no-home-office/</loc>
		<lastmod>2020-06-12T14:04:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/qual-o-impacto-da-lgpd-em-call-centers/</loc>
		<lastmod>2020-06-19T13:01:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/riscos-em-projetos/</loc>
		<lastmod>2020-06-26T14:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-auditoria-para-a-seguranca-da-informacao/</loc>
		<lastmod>2020-07-03T13:18:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-em-tempos-de-home-office-nao-e-so-sobre-computadores-e-sobre-comportamento-humano/</loc>
		<lastmod>2020-07-07T13:38:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/avaliacao-de-ambiente-a-partir-de-matrizes-pre-definidas/</loc>
		<lastmod>2020-07-09T17:08:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ser-ou-nao-ser-100-digital-eis-a-questao/</loc>
		<lastmod>2020-07-10T15:28:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso-iec-277012019-qual-a-importancia-o-gerenciamento-de-privacidade/</loc>
		<lastmod>2020-07-13T13:25:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-riscos-de-seguranca/</loc>
		<lastmod>2020-07-16T16:51:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/os-perigos-do-ransonware/</loc>
		<lastmod>2020-07-16T23:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-vulnerabilidade/</loc>
		<lastmod>2020-07-17T12:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/guia-pratico-sobre-seguranca-em-cloud/</loc>
		<lastmod>2020-07-24T14:21:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-controlar-riscos-de-segregacao-de-funcoes/</loc>
		<lastmod>2020-07-30T13:19:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-em-empresas-de-pequeno-porte-por-onde-comecar/</loc>
		<lastmod>2020-07-31T13:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-analise-de-impacto-nos-negocios-bia/</loc>
		<lastmod>2020-08-07T11:34:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso-iec-20000-quais-os-beneficios-e-vantagens-na-implementacao-de-um-sistema-de-gestao-de-servicos-sgs/</loc>
		<lastmod>2020-08-14T10:45:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso-27701-como-avaliar-o-nivel-de-adequacao-de-sua-empresa-a-protecao-de-dados/</loc>
		<lastmod>2020-08-20T17:27:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-qual-a-importancia-do-mapa-de-dados/</loc>
		<lastmod>2020-08-28T13:45:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/valor-agregado-do-uso-de-ferramentas-de-siem-pensando-em-seguranca-da-informacao/</loc>
		<lastmod>2020-09-04T14:19:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-gestao-de-riscos-ciberneticos-fazer-parte-da-estrategia-das-empresas/</loc>
		<lastmod>2020-09-25T14:11:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-aconteceu-no-ultimo-episodio-da-1a-temporada-da-lgpd/</loc>
		<lastmod>2020-09-29T18:31:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-seguranca-da-informacao-no-novo-normal/</loc>
		<lastmod>2020-10-02T17:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/qualidade-em-servicos-entendendo-as-expectativas-do-cliente/</loc>
		<lastmod>2020-10-14T12:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguro-cyber-sua-empresa-esta-preparada-para-a-lgpd/</loc>
		<lastmod>2020-10-16T11:47:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-do-desenvolvimento-seguro/</loc>
		<lastmod>2020-10-22T19:19:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-impactos-praticos-do-regulatorio-nos-processos-de-cyber-security/</loc>
		<lastmod>2020-11-05T18:01:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-consultoria-juridica-adequacoes-e-novas-tecnologias/</loc>
		<lastmod>2020-11-13T14:23:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-gestao-dos-dados/</loc>
		<lastmod>2020-11-20T14:09:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-papel-da-concientizacao-e-treinamentos-em-seguranca-da-informacao-na-organizacao/</loc>
		<lastmod>2020-11-27T13:52:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/e-hora-de-adotar-mais-inteligencia-em-seu-soc/</loc>
		<lastmod>2020-11-27T17:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/09-beneficios-da-gestao-de-pessoas-no-mundo-corporativo/</loc>
		<lastmod>2020-12-10T18:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-identificar-e-prevenir-as-fraudes/</loc>
		<lastmod>2020-12-18T15:51:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/formulas-para-dimensionar-times-de-seguranca/</loc>
		<lastmod>2021-01-15T14:35:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-e-cookies-o-que-mudou/</loc>
		<lastmod>2021-01-15T15:39:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/agro-5-0-e-a-seguranca-de-dados-ja-pensou-nisso/</loc>
		<lastmod>2021-01-29T14:59:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/frameworks-de-seguranca-da-informacao/</loc>
		<lastmod>2021-02-05T15:46:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-em-ambiente-em-nuvem-x-iso-iec-27017-2016/</loc>
		<lastmod>2021-02-12T14:51:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-do-encarregado-de-protecao-de-dados-dpo-nas-empresas/</loc>
		<lastmod>2021-02-26T14:47:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/transformacao-digital-coloca-em-risco-dados-confidenciais/</loc>
		<lastmod>2021-03-01T20:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/nova-resolucao-bacen-48932021-principais-pontos-de-atencao/</loc>
		<lastmod>2021-03-03T20:26:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sincades-tech-seguranca-da-informacao-x-cenario-de-ameacas/</loc>
		<lastmod>2021-03-12T19:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sincades-tech-seguranca-da-informacao-x-cenario-de-ameacas/</loc>
		<lastmod>2021-03-12T19:25:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/metricas-de-cyber-security-como-estabelecer/</loc>
		<lastmod>2021-03-19T14:54:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-seguranca-da-informacao-no-desenvolvimento-de-software/</loc>
		<lastmod>2021-03-25T17:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-riscos-e-compliance-beneficios-no-mundo-corporativo/</loc>
		<lastmod>2021-03-30T13:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ibm-security-summit-brasil/</loc>
		<lastmod>2021-04-02T16:51:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-aliado-ao-combate-a-fraudes/</loc>
		<lastmod>2021-04-08T16:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/controles-e-metodos-de-seguranca-da-informacao/</loc>
		<lastmod>2021-04-12T12:39:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/backup-e-a-sua-importancia/</loc>
		<lastmod>2021-04-14T13:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-no-pix/</loc>
		<lastmod>2021-04-16T13:00:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/principais-ameacas-de-seguranca-em-cloud-computing/</loc>
		<lastmod>2021-04-18T13:00:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/engenharia-social/</loc>
		<lastmod>2021-04-20T13:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-no-ambiente-de-iot/</loc>
		<lastmod>2021-04-22T13:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-proteger-dados-pessoais/</loc>
		<lastmod>2021-04-24T13:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciso-ser-ou-nao-ser/</loc>
		<lastmod>2021-05-27T20:19:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-e-code-review-saiba-a-importancia-de-fazer-essa-revisao/</loc>
		<lastmod>2021-06-08T19:58:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/7-principais-perguntas-a-fazer-para-encontrar-a-melhor-solucao-zero-trust-network-access-ztna/</loc>
		<lastmod>2021-06-18T14:08:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/mudancas-na-politica-de-privacidade-do-whatsapp/</loc>
		<lastmod>2021-06-22T13:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-area-de-conhecimento-gerenciamento-de-tempo-pmbok/</loc>
		<lastmod>2021-06-25T17:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-cenario-de-pandemia-ja-faz-parte-do-sistema-de-gestao-de-continuidade-de-negocios-sgcn-da-empresa/</loc>
		<lastmod>2021-06-25T17:31:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-e-a-transformacao-digital/</loc>
		<lastmod>2021-07-02T13:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-seguranca-regulamentacao-para-setores-de-missao-critica-infraestruturas-criticas/</loc>
		<lastmod>2021-07-07T14:00:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/byod-vale-a-pena/</loc>
		<lastmod>2021-07-22T17:57:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/inteligencia-de-ameacas-conhecendo-o-seu-adversario/</loc>
		<lastmod>2021-07-23T14:04:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/todo-mundo-so-pensa-nisso-dados-e-transformacao-digital/</loc>
		<lastmod>2021-07-25T14:15:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/as-origens-e-importancia-de-cti/</loc>
		<lastmod>2021-07-26T14:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/rede-privada-virtual-vpn/</loc>
		<lastmod>2021-07-27T14:15:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-cenario-da-seguranca-da-informacao-nas-empresas-durante-a-pandemia-da-covid-19/</loc>
		<lastmod>2021-08-19T15:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cobit-5-primeiro-principio-atender-as-necessidades-das-partes-interessadas/</loc>
		<lastmod>2021-08-19T17:04:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/os-10-maiores-desafios-de-seguranca-em-iot/</loc>
		<lastmod>2021-08-27T12:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-de-dados-e-personalizacao-do-consumo-destacam-negocios-no-mercado-digital/</loc>
		<lastmod>2021-08-30T17:14:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cloud-como-aliada-a-lgpd/</loc>
		<lastmod>2021-09-10T20:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/owasp-top-10-2021-projeto-para-revisao-dos-pares/</loc>
		<lastmod>2021-09-16T19:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-threat/</loc>
		<lastmod>2021-09-21T13:53:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/principais-vulnerabilidades-exploradas-para-a-instalacao-de-ransomware/</loc>
		<lastmod>2021-09-24T14:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-identidade-e-acessos-e-conformidade/</loc>
		<lastmod>2021-09-24T14:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ataques-hackers-com-pedidos-de-resgate-quadriplicam/</loc>
		<lastmod>2021-10-01T12:22:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/por-que-investir-em-um-programa-de-conscientizacao-de-seguranca-da-informacao/</loc>
		<lastmod>2021-10-06T13:08:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-gestao-de-acessos-e-identidades-nas-empresas/</loc>
		<lastmod>2021-10-08T11:55:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-gestao-de-acessos-e-identidades-nas-empresas-2/</loc>
		<lastmod>2021-10-08T11:55:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-seguranca-e-o-ecossistema-da-industria-automotiva/</loc>
		<lastmod>2021-10-13T19:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgdp-na-seguranca-digital/</loc>
		<lastmod>2021-10-19T13:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/crimes-ciberneticos-prevenir-e-importante-e-tratar-adequadamente-tambem/</loc>
		<lastmod>2021-10-28T14:45:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-dos-processos-de-seguranca-da-informacao-em-recursos-humanos/</loc>
		<lastmod>2021-10-29T12:10:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iam-summit-2021-qual-o-seu-nivel-de-maturidade-em-iam-e-lgpd-com-marcos-paulo/</loc>
		<lastmod>2021-11-05T17:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iam-summit-2021-qual-o-seu-nivel-de-maturidade-em-iam-e-lgpd-com-marcos-paulo/</loc>
		<lastmod>2021-11-05T17:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/smct-2021-cybersecurity-carreira-importancia-e-pratica/</loc>
		<lastmod>2021-11-05T17:56:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/saiba-como-identificar-um-conflito-de-interesses/</loc>
		<lastmod>2021-11-10T15:01:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguro-contra-ransomware-incentivo-ao-cibercrime/</loc>
		<lastmod>2021-11-11T12:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/arquiteturas-de-seguranca-para-ambientes-cloud-containers/</loc>
		<lastmod>2021-11-11T15:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-de-dados-alguns-erros-comuns/</loc>
		<lastmod>2021-11-12T12:27:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-acesso-privilegiado/</loc>
		<lastmod>2021-11-16T13:45:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/relatorio-de-conformidade-soc/</loc>
		<lastmod>2021-11-22T14:08:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/raas-ransomware-as-a-service/</loc>
		<lastmod>2021-11-25T17:23:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/empresas-focam-na-adequacao-e-protecao-do-seu-ecossistema-apos-ciberataques/</loc>
		<lastmod>2021-12-02T13:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/formacao-de-equipe/</loc>
		<lastmod>2021-12-02T13:54:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso-27001-como-apoio-para-adequacao-a-lgpd/</loc>
		<lastmod>2021-12-07T13:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-relacao-entre-privacidade-e-confiabilidade/</loc>
		<lastmod>2021-12-07T13:26:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/open-source-intelligence/</loc>
		<lastmod>2021-12-09T18:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/zero-trust-security/</loc>
		<lastmod>2021-12-09T18:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-veja-as-principais-tendencias-para-2022/</loc>
		<lastmod>2021-12-10T18:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/quais-sao-as-principais-vantagens-de-contratar-um-soc/</loc>
		<lastmod>2022-01-07T15:29:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/aprender-muito-evoluir-rapido/</loc>
		<lastmod>2022-02-18T18:40:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/resiliencia-de-ransomware-lidera-as-descobertas-no-x-force-threat-intelligence-index-2022/</loc>
		<lastmod>2022-02-25T14:14:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-e-watering-hole-attack/</loc>
		<lastmod>2022-03-04T20:23:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/qual-o-maior-desafio-da-ciberseguranca/</loc>
		<lastmod>2022-03-10T16:44:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/engenharia-social-nas-empresas/</loc>
		<lastmod>2022-03-31T14:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-para-instituicoes-ensino/</loc>
		<lastmod>2022-04-06T15:29:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-para-empresas-de-pequeno-porte/</loc>
		<lastmod>2022-04-06T16:57:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/auditoria-itgc-o-que-e-e-como-pode-ajudar-na-sua-empresa/</loc>
		<lastmod>2022-04-11T20:14:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/conhecimentos-essenciais-para-profissionais-de-ciberseguranca/</loc>
		<lastmod>2022-04-18T13:20:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-como-aliada-do-negocio/</loc>
		<lastmod>2022-04-25T17:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-sao-insiders-e-como-se-proteger/</loc>
		<lastmod>2022-05-02T13:43:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/impacto-da-lgpd-em-shoppings/</loc>
		<lastmod>2022-05-09T15:07:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/blockchain-e-privacidade-de-dados/</loc>
		<lastmod>2022-05-16T15:23:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-seguranca-e-as-novas-regras-propostas-pela-sec-securities-and-exchange/</loc>
		<lastmod>2022-05-19T12:00:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-e-governanca-de-ti-para-protecao-de-dados-pessoais/</loc>
		<lastmod>2022-05-23T12:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-gerenciamento-de-problemas-como-um-processo-de-otimizacao-de-servicos-de-ti/</loc>
		<lastmod>2022-06-01T18:40:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/guerra-cibernetica-e-seus-efeitos-na-atualidade/</loc>
		<lastmod>2022-06-08T18:54:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/pci-o-que-e-e-porque-obter-a-certificacao/</loc>
		<lastmod>2022-06-15T13:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/2a-edicao-da-semana-da-seguranca-da-informacao/</loc>
		<lastmod>2022-06-17T12:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/rgpd-x-lgpd-os-caminhos-que-temos-a-percorrer/</loc>
		<lastmod>2022-06-22T13:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/overview-cyberday-2022-red-team/</loc>
		<lastmod>2022-06-27T19:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-os-10-principios-para-tratamento-de-dados-pessoais/</loc>
		<lastmod>2022-06-29T20:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gestao-de-mudancas/</loc>
		<lastmod>2022-07-04T13:00:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/itgcs-introducao-aos-controles-gerais-de-seguranca-da-informacao/</loc>
		<lastmod>2022-07-11T13:00:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cybersecurity-e-negocios/</loc>
		<lastmod>2022-07-18T12:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao/</loc>
		<lastmod>2022-07-25T12:54:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/novo-selo-de-seguranca-da-informacao-para-a-industria-automotiva/</loc>
		<lastmod>2022-07-29T17:38:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/certificacao-iso-27001-x-soc-2/</loc>
		<lastmod>2022-08-01T13:06:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/apt-advanced-persistent-threat/</loc>
		<lastmod>2022-08-04T13:22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/inteligencia-artificial-aliada-a-privacidade-de-dados/</loc>
		<lastmod>2022-08-08T13:40:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/testes-manuais-x-testes-automatizados/</loc>
		<lastmod>2022-08-11T13:51:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/recomendacoes-de-seguranca-para-uso-das-redes-sociais-e-bens-da-companhia-durante-o-trabalho-remoto/</loc>
		<lastmod>2022-08-15T13:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/quais-sao-as-principais-vantagens-de-contratar-um-soc-2/</loc>
		<lastmod>2022-08-18T13:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/osint/</loc>
		<lastmod>2022-08-25T14:16:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/banco-de-dados-e-lgpd/</loc>
		<lastmod>2022-08-29T11:58:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/owasp-api-top-10/</loc>
		<lastmod>2022-09-01T14:26:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-os-dados-e-informacoes-sao-importantes-na-saude-do-negocio/</loc>
		<lastmod>2022-09-04T12:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/engenharia-social-2/</loc>
		<lastmod>2022-09-08T14:37:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/analise-de-ataques-ciberneticos-e-boas-praticas-para-evita-los/</loc>
		<lastmod>2022-09-12T12:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/continuidade-do-negocio-alem-do-desastre/</loc>
		<lastmod>2022-09-19T14:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/implementacao-da-iso-31000-para-gerenciamento-de-riscos-na-organizacao/</loc>
		<lastmod>2022-09-26T12:00:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iso-20000-12018-sistema-de-gestao-de-servicos-e-sua-importancia/</loc>
		<lastmod>2022-09-30T14:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/tratativa-de-malwares-e-threat-intelligence-por-nossos-analistas-do-soc/</loc>
		<lastmod>2022-10-03T12:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/carreira-em-seguranca-da-informacao/</loc>
		<lastmod>2022-10-10T12:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-se-preparar-para-uma-certificacao-iso/</loc>
		<lastmod>2022-10-17T12:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/honeypot-o-que-e-e-como-implementar-um-pode-ajudar-a-aumentar-a-seguranca-na-sua-empresa/</loc>
		<lastmod>2022-10-24T12:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-e-um-ataque-ransomware-de-tripla-extorsao/</loc>
		<lastmod>2022-10-31T12:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/boas-praticas-para-participacoes-em-auditorias/</loc>
		<lastmod>2022-11-07T12:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/qual-a-relacao-entre-agronegocio-e-seguranca-da-informacao/</loc>
		<lastmod>2022-11-14T12:00:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/bluebugging-ou-ataque-hacker-via-bluetooth-o-que-e-e-como-se-proteger/</loc>
		<lastmod>2022-11-18T12:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/auditoria-interna-x-externa-de-ti-e-suas-principais-diferencas/</loc>
		<lastmod>2022-11-25T12:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cibercrimes-no-metaverso/</loc>
		<lastmod>2022-11-28T12:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/analise-forense-por-que-adotar-esta-pratica/</loc>
		<lastmod>2022-12-02T12:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/usabilidade-do-cliente-a-importancia-de-promover-uma-experiencia-agradavel-e-segura/</loc>
		<lastmod>2022-12-05T12:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/artigo-owasp-top-10-kubernetes/</loc>
		<lastmod>2022-12-08T12:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/vallourec/</loc>
		<lastmod>2022-12-08T20:05:49+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2022/12/vol.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-as-organizacoes-podem-proteger-seus-negocios-investindo-em-seguranca-da-informacao/</loc>
		<lastmod>2022-12-12T12:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/deepfake-e-riscos-a-seguranca/</loc>
		<lastmod>2022-12-16T12:00:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-dos-sistemas-de-gestao-de-acesso/</loc>
		<lastmod>2022-12-19T12:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/red-team-blue-team-e-seus-papeis-na-seguranca-da-informacao/</loc>
		<lastmod>2022-12-23T12:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-de-acompanhar-a-adequacao-em-terceiros-lgpdmagazine-4a-edicao-da-revista-lgpd-magazine/</loc>
		<lastmod>2022-12-26T13:20:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/politica-de-backup-e-sua-importancia-na-continuidade-do-negocio/</loc>
		<lastmod>2022-12-30T12:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/monitoramento-e-resposta-a-incidentes-convergencia-de-leis-resolucoes-e-circulares-para-o-tema-de-seguranca-cibernetica/</loc>
		<lastmod>2023-01-06T12:00:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-dos-treinamentos-de-seguranca-da-informacao/</loc>
		<lastmod>2023-01-13T12:00:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-sao-exploits-quais-os-riscos-e-como-se-proteger/</loc>
		<lastmod>2023-01-20T12:00:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cyber-kill-chain-estrutura-de-um-ataque/</loc>
		<lastmod>2023-02-03T12:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/processo-de-gestao-de-riscos-e-compliance/</loc>
		<lastmod>2023-02-10T14:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/phishing-a-tecnica-de-capturar-dados/</loc>
		<lastmod>2023-02-24T12:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/vantagens-da-tokenizacao-de-ativos-para-o-seu-negocio/</loc>
		<lastmod>2023-03-03T12:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cis-control-v8-o-que-e-e-porque-e-importante/</loc>
		<lastmod>2023-03-24T11:50:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-e-por-que-implementar-seguranca-da-informacao/</loc>
		<lastmod>2023-03-24T13:03:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/7-tipos-de-ataques-de-engenharia-social-que-voce-precisa-se-proteger/</loc>
		<lastmod>2023-03-24T14:32:08+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/7-tipos-de-ataque.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/previsoes-ciberseguranca-2023/</loc>
		<lastmod>2023-03-24T14:39:37+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/banner_home_v2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/para-stefanini-rafael-trabalho-remoto-exige-o-minimo-de-seguranca-da-informacao/</loc>
		<lastmod>2023-03-24T14:42:41+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/trabalho-remoto.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/stefanini-rafael-cresce-no-brasil-e-anuncia-expansao-para-a-europa/</loc>
		<lastmod>2023-03-24T14:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/rafael-cresce.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/stefanini-rafael-oferece-radio-inteligente-rds-para-atuar-em-estrategias-de-defesa-e-seguranca/</loc>
		<lastmod>2023-03-24T14:47:31+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/rds.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/stefanini-rafael-debate-estrategias-para-a-seguranca-digital-em-evento-da-fundacao-dom-cabral/</loc>
		<lastmod>2023-03-24T14:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Stefanini-Rafael-debate-estrategias-para-a-Seguranca-Digital-em-evento-da-Fundacao-Dom-Cabral.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/stefanini-rafael-triplica-numero-de-clientes-em-2022/</loc>
		<lastmod>2023-03-24T14:52:43+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/rafael-cresce-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/governanca-risco-e-compliance-grc-por-que-pensar-sobre-isso/</loc>
		<lastmod>2023-03-24T14:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Governanca-Risco-e-Compliance-GRC.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ataques-ciberneticos-estao-em-alta-veja-5-segredos-que-ninguem-conta-sobre-cyber-security/</loc>
		<lastmod>2023-03-24T14:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Ataques-ciberneticos-estao-em-alta.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/qual-e-a-importancia-de-um-pentest-confira-4-passos-para-implementa-lo/</loc>
		<lastmod>2023-03-24T14:57:44+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Qual-e-a-importancia-de-um-pentest.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/7-dicas-para-implementar-cyber-security-confira-neste-post/</loc>
		<lastmod>2023-03-24T14:59:32+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/7-dicas-para-implementar-Cyber-Security.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-fica-a-reputacao-da-marca-diante-da-inseguranca-cibernetica/</loc>
		<lastmod>2023-03-24T15:01:22+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Como-fica-a-reputacao-da-marca-diante-da-inseguranca-cibernetica.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-no-setor-bancario-entenda-os-desafios-e-como-enfrenta-los/</loc>
		<lastmod>2023-03-24T15:05:41+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Seguranca-no-setor-bancario.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-e-anonimizacao-entenda-a-importancia-desse-processo/</loc>
		<lastmod>2023-03-24T15:07:57+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/O-que-e-anonimizacao.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-que-e-a-gestao-de-incidentes-entenda-a-importancia-para-seu-negocio/</loc>
		<lastmod>2023-03-24T15:10:14+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/O-que-e-a-gestao-de-incidentes.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-e-seguranca-da-informacao-veja-os-desafios-dessa-digitalizacao/</loc>
		<lastmod>2023-03-24T15:13:42+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/LGPD-e-seguranca-da-informacao.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/beneficios-das-melhores-praticas-de-seguranca-cibernetica-e-por-que-isso-e-mais-importante-do-que-nunca/</loc>
		<lastmod>2023-03-24T15:16:25+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Beneficios-das-melhores-praticas-de-seguranca-cibernetica.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-o-valor-da-confianca-digital/</loc>
		<lastmod>2023-03-24T15:18:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/entenda-o-que-e-um-ransomware-e-como-se-proteger-dos-ataques/</loc>
		<lastmod>2023-03-24T15:21:26+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Entenda-o-que-e-um-Ransomware-e-como-se-proteger-dos-ataques.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ameacas-ciberneticas-quais-as-principais-e-como-proteger-a-empresa/</loc>
		<lastmod>2023-03-24T15:23:39+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Ameacas-ciberneticas.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/protecao-contra-ransomware-5-dicas-para-manter-sua-empresa-segura/</loc>
		<lastmod>2023-03-24T15:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Protecao-contra-ransomware.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/stefanini-rafael-tera-showroom-no-parque-tecnologico-de-sao-jose-dos-campos/</loc>
		<lastmod>2023-03-24T15:28:18+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Rafael_stefanini.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/stefanini-rafael-e-ibm-firmam-parceria-para-o-mercado-de-ciberseguranca/</loc>
		<lastmod>2023-03-24T15:30:26+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Stefanini-Rafael-e-IBM-firmam-parceria-para-o-mercado-de-ciberseguranca.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/estatisticas-de-seguranca-cibernetica-para-2022-lista-de-dados-e-tendencias/</loc>
		<lastmod>2023-03-24T15:33:14+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/seguranca_cibernetica_aug-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-da-informacao-um-novo-estilo-de-vida/</loc>
		<lastmod>2023-03-24T15:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Seguranca-da-informacao.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ameacas-a-seguranca-cibernetica-e-o-ambiente-de-nossa-privacidade-digital/</loc>
		<lastmod>2023-03-24T15:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Stefanini-ciberseguranca-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/quais-acoes-de-seguranca-devem-ser-tomadas-no-caso-de-um-ataque/</loc>
		<lastmod>2023-03-24T15:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Quais-acoes-de-seguranca-devem-ser-tomadas-no-caso-de-um-ataque.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-o-mes-da-conscientizacao-em-ciberseguranca-pode-contribuir-para-o-crescimento-do-seu-negocio/</loc>
		<lastmod>2023-03-24T15:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/mes-da-conscientizacao-em-ciberseguranca.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/identity-access-management-iam-o-que-e-e-quais-os-seus-componentes/</loc>
		<lastmod>2023-03-24T15:57:07+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Identity-Access-Management-IAM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/87talks-do-grupo-stefanini-reune-especialistas-para-debater-sobre-ciberseguranca/</loc>
		<lastmod>2023-03-24T15:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/87talks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/circular-susep-no-638-2021-pontos-de-atencao-e-desafios/</loc>
		<lastmod>2023-03-30T13:55:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/deepweb-darkweb-o-que-a-seguranca-da-informacao-precisa-saber-sobre-isso/</loc>
		<lastmod>2023-03-31T12:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/as-maiores-tendencias-de-ciberseguranca-a-serem-observadas-em-2023/</loc>
		<lastmod>2023-04-06T19:02:58+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/04/programming-background-collage-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-due-diligence-para-analise-de-riscos/</loc>
		<lastmod>2023-04-07T12:51:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-gestao-de-vulnerabilidades/</loc>
		<lastmod>2023-04-14T17:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/monitoramento-corporativo-da-dark-web-um-servico-de-seguranca-cibernetica/</loc>
		<lastmod>2023-04-14T17:08:38+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Como-proteger-a-sua-empresa-de-ameacas-do-ambiente-digital.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-proteger-a-sua-empresa-de-ameacas-do-ambiente-digital/</loc>
		<lastmod>2023-04-17T17:05:51+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/inteligencia-artifical.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/consolidacao-da-ciberseguranca-exige-cautela-dos-cisos/</loc>
		<lastmod>2023-04-17T19:26:49+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/04/businessman-protecting-data-personal-information-cyber-security-data-concept-padlock-and-internet-te.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/chatgpt-e-implementacoes-de-servicos-em-seguranca-da-informacao/</loc>
		<lastmod>2023-04-21T16:46:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-uso-da-inteligencia-artificial-na-seguranca-da-informacao/</loc>
		<lastmod>2023-04-28T15:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/lgpd-um-pagar-para-ver-que-pode-sair-caro/</loc>
		<lastmod>2023-05-05T14:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-papel-da-seguranca-cibernetica-na-protecao-de-dispositivos-e-infraestrutura-de-iot/</loc>
		<lastmod>2023-05-12T15:44:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/voce-sabe-qual-e-a-ultima-protecao-frente-a-um-ataque-de-ransomware/</loc>
		<lastmod>2023-05-19T13:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ataque-ddos-principais-caracteristicas-e-como-se-proteger/</loc>
		<lastmod>2023-06-09T13:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/consultor-de-seguranca/</loc>
		<lastmod>2023-06-13T19:23:26+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/06/beautiful-hacker-girl-working-with-another-dangerous-cyber-criminals-hackers-centre-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/suas-apis-estao-vazando-dados-confidenciais/</loc>
		<lastmod>2023-06-15T19:30:17+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/06/rpa-concept-with-blurry-hand-touching-screen-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/resiliencia-operacional-como-a-resolucao-de-no-304-do-bacen-contribui-para-a-seguranca-do-ecossistema-financeiro/</loc>
		<lastmod>2023-06-16T13:29:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/cibercriminosos-estao-utilizando-o-chatgpt-para-disseminar-malwares-nas-plataformas-do-facebook-instagram-e-whatsapp/</loc>
		<lastmod>2023-06-22T19:15:35+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/seguranca_cibernetica_aug-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/aplicacao-de-gestao-de-acessos-nos-processos-de-seguranca-da-informacao/</loc>
		<lastmod>2023-06-23T14:50:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/gerenciamento-de-superficie-de-ataque/</loc>
		<lastmod>2023-06-28T18:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/06/programming-background-with-person-working-with-codes-computer-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/trust-ai-e-a-adequacao-ao-artificial-intelligence-risk-management-framework-ai-rmf-pontos-de-atencao-e-desafios/</loc>
		<lastmod>2023-06-29T19:18:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-futuro-incerto-das-criptografias-e-da-internet-como-a-conhecemos/</loc>
		<lastmod>2023-07-07T14:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/atualizacao-iso-iec-27001-e-iso-iec-27002-principais-mudancas-e-como-se-preparar/</loc>
		<lastmod>2023-07-17T18:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-vital-da-gestao-de-riscos-nas-empresas-protegendo-seus-objetivos-e-garantindo-continuidade-do-negocio/</loc>
		<lastmod>2023-07-19T17:07:26+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/07/connection-bond-connect-networking-togetherness-concept-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/os-desafios-e-solucoes-para-garantir-a-disponibilidade-de-dados-e-aplicacoes/</loc>
		<lastmod>2023-07-26T14:36:58+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/07/top-view-laptop-with-lock-chain-2-compressed.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/segmentacao-de-contas-em-ambientes-cloud/</loc>
		<lastmod>2023-08-04T16:36:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/desvendando-o-managed-detection-and-response-mdr-reforcando-a-defesa-contra-ameacas-ciberneticas/</loc>
		<lastmod>2023-08-09T18:23:27+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/08/standard-quality-control-concept-m-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/medidas-simples-para-reforcar-a-mitigacao-de-vazamentos-de-dados/</loc>
		<lastmod>2023-08-10T17:14:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-cibernetica-avancada-estrategia-vital-para-as-instituicoes-financeiras/</loc>
		<lastmod>2023-08-11T10:08:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/fortalecendo-a-seguranca-e-simplificando-o-acesso-atraves-do-gerenciamento-de-acesso-privilegiado-pam/</loc>
		<lastmod>2023-08-16T14:24:56+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/08/imagem-1-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/certificacoes-de-conformidade-diferencas-entre-relatorio-soc-1-soc-2-e-soc/</loc>
		<lastmod>2023-08-17T18:45:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-ascensao-da-inteligencia-artificial-na-seguranca-cibernetica-moldando-o-futuro-da-seguranca-online/</loc>
		<lastmod>2023-08-23T17:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/08/robot-handshake-human-background-futuristic-digital-age-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/estrategias-de-protecao-empresarial-contra-violacoes-de-ciberseguranca/</loc>
		<lastmod>2023-08-25T12:35:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/e-as-soft-skills-de-quem-defende-a-importancia-das-competencias-comportamentais-no-mercado-de-ciberseguranca/</loc>
		<lastmod>2023-08-30T12:37:19+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/08/smiley-woman-holding-clipboard-workplace-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/tecnicas-de-seguranca-para-prevenir-vazamentos-de-dados-e-violacoes-de-privacidade/</loc>
		<lastmod>2023-08-31T11:52:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/inteligencia-de-ameacas-ciberneticas-ofensiva-vs-defensiva/</loc>
		<lastmod>2023-09-06T16:59:43+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/08/close-de-dedos-masculinos-digitando-um-documento-comercial-nota-ou-tecla-de-pesquisa-no-laptop-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/7-dicas-para-uma-conscientizacao-de-seguranca-digital/</loc>
		<lastmod>2023-09-08T14:08:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/atumoacaosoar/</loc>
		<lastmod>2023-09-13T13:36:47+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/08/person-working-html-computer-1-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-dos-ativos-ot-e-sua-visibilidade/</loc>
		<lastmod>2023-09-14T19:47:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/analise-de-tendencias-de-ataque-para-criacao-de-regras-do-siem-o-papel-das-fontes-de-informacoes-diversas/</loc>
		<lastmod>2023-09-20T14:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/08/o-sistema-de-seguranca-bloqueia-os-dados-para-seguranca-do-computador-gerados-pela-ia-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/nova-variante-de-ransomware-blackcat/</loc>
		<lastmod>2023-09-21T14:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/reduzindo-o-custo-do-risco-cibernetico/</loc>
		<lastmod>2023-09-26T18:31:47+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/09/male-system-engineer-analyzing-big-data-computer-checking-cloud-computing-network-digital-servers-young-it-technician-inspecting-modern-data-center-digitalization-handheld-shot-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/grupo-cibercriminoso-clop-tem-alcancado-exito-em-campanhas-de-ransomware-em-organizacoes-e-pessoas-pelo-mundo/</loc>
		<lastmod>2023-09-28T15:21:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-desafio-da-ia-responsavel-no-mundo-corporativo/</loc>
		<lastmod>2023-09-29T12:24:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/deteccao-e-resposta-a-ameacas-de-identidade-itdr-uma-abordagem-abrangente/</loc>
		<lastmod>2023-10-03T18:44:45+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/10/hooded-computer-hacker-stealing-information-with-laptop_Easy-Resize.com_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-do-mes-de-conscientizacao-em-seguranca-cibernetica/</loc>
		<lastmod>2023-10-10T17:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/10/standard-quality-control-collage-concept-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/7-fundamentos-da-seguranca-na-nuvem-proteja-o-seu-negocio-com-estas-dicas/</loc>
		<lastmod>2023-10-18T17:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/10/digital-cloud-data-storage-digital-concept-cloudscape-digital-online-service-global-network-database-backup-computer-infrastructure-technology-solution-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/proteja-seus-dados-no-mundo-5g-cinco-desafios-e-quatro-dicas-de-seguranca/</loc>
		<lastmod>2023-10-26T14:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/desafios-de-seguranca-cibernetica-na-industria-maritima/</loc>
		<lastmod>2023-10-27T13:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/fortalecendo-a-defesa-cibernetica-empresarial-atraves-da-educacao-em-seguranca-da-informacao/</loc>
		<lastmod>2023-11-03T20:23:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-revolucao-tecnologica-da-linguagem-rust-por-que-empresas-estao-migrando/</loc>
		<lastmod>2023-11-17T12:09:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/golpe-do-falso-intermediario-como-se-proteger-ao-usar-gateways-de-pagamento/</loc>
		<lastmod>2023-11-24T14:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/veja-dez-dicas-da-febraban-de-seguranca-na-black-friday/</loc>
		<lastmod>2023-11-24T15:42:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/tempestades-solares-de-2024-e-a-importancia-dos-planos-de-continuidade-de-negocios/</loc>
		<lastmod>2023-12-08T15:45:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-de-uma-boa-gestao-de-backup/</loc>
		<lastmod>2023-12-15T15:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ransomware-o-epidemico-crescimento-de-uma-ameaca-digital/</loc>
		<lastmod>2023-12-21T13:55:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ibm-security-qradar-uma-abordagem-moderna-para-a-deteccao-e-resposta-a-ameacas-ciberneticas/</loc>
		<lastmod>2024-01-19T14:02:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/engenharia-social-riscos-e-impactos-na-seguranca-da-informacao/</loc>
		<lastmod>2024-01-26T13:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-as-principais-tendencias-para-2024/</loc>
		<lastmod>2024-01-30T15:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/desafios-e-praticas-recomendadas-para-a-implementacao-responsavel-de-inteligencia-artificial-no-ambiente-corporativo/</loc>
		<lastmod>2024-02-02T13:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/tres-dicas-aos-ceos-para-a-seguranca-cibernetica-com-inteligencia-artificial/</loc>
		<lastmod>2024-02-06T19:47:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-em-smart-watches-rings-e-wearables-em-geral/</loc>
		<lastmod>2024-02-09T12:38:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/protegendo-seu-e-commerce-contra-ameacas-ciberneticas/</loc>
		<lastmod>2024-02-14T15:04:07+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/10/77df0aeb-385b-4897-b4e6-cd3f9a6cb68a.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ameacas-ciberneticas-crescentes-brasil-lidera-ranking-de-2023-na-america-latina/</loc>
		<lastmod>2024-02-16T10:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/continuidade-de-negocios-e-seguranca-cibernetica-no-mercado-de-seguros/</loc>
		<lastmod>2024-02-19T19:09:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/fortalecendo-a-defesa-cibernetica-a-importancia-da-microsegmentacao-e-vmdr/</loc>
		<lastmod>2024-02-23T15:37:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/sai_grc_e_sai_trust/</loc>
		<lastmod>2024-02-28T16:31:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-da-implantacao-do-ai-trism/</loc>
		<lastmod>2024-03-01T16:37:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-inteligencia-artificial-aliada-a-protecao-e-privacidade-de-dados/</loc>
		<lastmod>2024-03-21T20:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/4-motivos-para-investir-em-um-soc-ainda-em-esse-ano/</loc>
		<lastmod>2024-04-05T14:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/seguranca-em-iot-protegendo-seu-mundo-conectado/</loc>
		<lastmod>2024-04-09T18:33:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-para-o-setor-financeiro-quais-os-impactos-das-falhas/</loc>
		<lastmod>2024-04-24T21:05:50+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/Ciberseguranca-para-o-setor-financeiro-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/novo-sistema-epss-de-pontuacao-ajuda-empresas-a-priorizarem-a-correcao-de-suas-vulnerabilidades/</loc>
		<lastmod>2024-05-07T14:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/threat-intelligence-deteccao-e-remediacao-de-incidentes/</loc>
		<lastmod>2024-05-07T17:37:22+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/05/NA_CYB_threat-intelligence-for-incident-response_banner-jpg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/por-que-a-transparencia-e-a-seguranca-da-informacoes-sao-imprescindiveis-as-praticas-empresariais/</loc>
		<lastmod>2024-06-14T14:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-usuario-e-o-elo-mais-fraco/</loc>
		<lastmod>2024-07-01T12:50:51+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/06/elo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/fortalecendo-a-seguranca-cibernetica-com-ctem/</loc>
		<lastmod>2024-07-17T20:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/07/ihcosta_Continuous_Threat_Exposure_Managemen_4c99e4a0-d8c7-43fa-bbbe-0ccd7b6cdc16_3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/apagao-tecnologico-e-seguranca/</loc>
		<lastmod>2024-07-23T18:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/07/ihcosta_Busy_airport_lobby_397e8ad3-6d22-4f78-a39d-9e3c49dc13ea_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/stefanini-black-hat/</loc>
		<lastmod>2024-07-29T13:22:46+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/07/header-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ia-e-como-identificar-e-combater-deepfakes/</loc>
		<lastmod>2024-08-09T20:58:34+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/08/ihcosta_Deepfake_fraud_attempt_-v_6.1_dc1974ec-dd9e-4afd-b605-c3deb6fb9ee2_2a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciber-seguranca-stefanini-cyber-dobra-de-tamanho/</loc>
		<lastmod>2024-10-17T18:01:43+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/10/caa-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/estrategias-proativas-para-proteger-seu-negocio/</loc>
		<lastmod>2024-11-14T20:08:56+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/11/The-Future-of-Cybersecurity-Proactive-Strategies-are-Key-to-Protecting-Your-Business-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/planejamento-estrategico-para-o-futuro/</loc>
		<lastmod>2024-11-28T15:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/11/ihcosta_strategic_planning_for_the_future_-v_6.1_937a40cb-7ea2-401c-98f7-07ae7e06d580_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/golpe-do-falso-intermediario-e-gateways-de-pagamento/</loc>
		<lastmod>2024-11-29T01:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/11/safeway_27112023-jpg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/inteligencia-artificial-e-investimento/</loc>
		<lastmod>2024-12-05T20:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/12/Marco-Stefanini-1920x12802-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-papel-em-evolucao-do-ciso-na-era-da-ciberseguranca-desafios-e-perspectivas-futuras/</loc>
		<lastmod>2024-12-12T17:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/a-importancia-transversal-da-lei-de-protecao-de-dados/</loc>
		<lastmod>2024-12-13T12:39:59+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/12/ihcosta_An_abstract_representation_of_data_privacy_featuring__d044d2b9-e361-4f85-a6b6-7828ef6bd6e7_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/iag-e-ciberseguranca/</loc>
		<lastmod>2024-12-13T12:51:44+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/12/ihcosta_Create_an_image_depicting_the_use_of_Generative_AI_IA_2b304e7c-0e25-4578-abb4-6b02126ad4c3_3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/ciberseguranca-passado-e-futuro/</loc>
		<lastmod>2024-12-13T13:29:21+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/12/ihcosta_Illustrate_the_evolution_of_cybersecurity_over_the_la_ab0c837f-a696-43cc-a578-ae326dccf32a_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/conheca-o-croc/</loc>
		<lastmod>2025-02-07T21:02:25+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2025/02/iStock-1442493196-800x533-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/riscos-ciberneticos-na-desglobalizacao-o-novo-paradigma-digital/</loc>
		<lastmod>2025-02-12T13:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2025/02/ihcosta_reate_representative_images_of_the_impact_of_deglobal_b71f53a0-7b8b-4a64-8181-907a2713ce23_0.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/7-tipos-de-ataques-ciberneticos-e-como-se-proteger-deles/</loc>
		<lastmod>2025-02-14T15:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2023/03/7-tipos-de-ataques-ciberneticos-e-como-se-proteger-deles.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/desvendando-a-superficie-de-ataque-pense-como-um-atacante/</loc>
		<lastmod>2025-02-14T16:53:57+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/03/0_2-6.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/nos-seguimos-ou-criamos-as-tendencias-em-ciberseguranca/</loc>
		<lastmod>2025-02-20T15:14:02+00:00</lastmod>
		<image:image>
			<image:loc>https://stefaninicyber.com/wp-content/uploads/2024/02/0_0-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://stefaninicyber.com/engenharia-reversa-o-que-e-e-como-pode-ser-usada-para-seguranca-da-informacao/</loc>
		<lastmod>2025-02-21T10:45:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/protecao-da-integridade-das-informacoes/</loc>
		<lastmod>2025-02-21T15:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/o-cenario-realista-de-ataques-ciberneticos-e-a-necessidade-de-seguranca-global/</loc>
		<lastmod>2025-02-21T17:18:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/nist-cybersecurity-framework-beneficios-do-framework-para-sua-organizacao/</loc>
		<lastmod>2025-04-11T17:37:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://stefaninicyber.com/como-indicadores-de-desempenho-de-ti-podem-ajudar-seu-negocio/</loc>
		<lastmod>2025-04-11T17:46:57+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->