{"id":39428,"date":"2025-11-13T12:55:44","date_gmt":"2025-11-13T11:55:44","guid":{"rendered":"https:\/\/mailcommsgroup.com\/?p=39428"},"modified":"2026-02-03T14:02:32","modified_gmt":"2026-02-03T13:02:32","slug":"cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification","status":"publish","type":"post","link":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/","title":{"rendered":"Conformidade e ciberseguran\u00e7a: uma vis\u00e3o estrat\u00e9gica na confer\u00eancia Cybersecurity &amp; Identification"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=&#8221;39455&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;80px&#8221; css=&#8221;.vc_custom_1763023532587{margin-top: -70px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1770123593976{padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #F2F2F2 !important;}&#8221;]<span style=\"font-size: 20px;\"><strong>\u00cdndice  <\/strong><\/span><\/p>\n<ol>\n<li><a href=\"#uno\">Partilha de reflex\u00f5es entre peritos<\/a><\/li>\n<li><a href=\"#dos\">A nossa vis\u00e3o: confian\u00e7a, conformidade e resili\u00eancia digital<\/a><\/li>\n<li><a href=\"#tres\">Comprometido com um modelo de seguran\u00e7a cibern\u00e9tica de confian\u00e7a<\/a><\/li>\n<li><a href=\"#cuatro\">Junta-se a n\u00f3s?<\/a><\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;110px&#8221; css=&#8221;.vc_custom_1770123596341{margin-top: -100px !important;}&#8221;][vc_column_text css=&#8221;&#8221;]No <strong>dia 18 de novembro,<\/strong> Madrid acolher\u00e1 uma nova edi\u00e7\u00e3o da <strong>confer\u00eancia Cybersecurity &amp; Identification,<\/strong> organizada pela IKN Espanha, sob o lema <em>Cyberinnovation: IAM &amp; IA Gen.<\/em> Este encontro consolidou-se como um espa\u00e7o fundamental para <strong>CIOs, CISOs, CTOs e gestores jur\u00eddicos<\/strong> de diferentes sectores, onde ser\u00e3o discutidos os desafios colocados pela ciberseguran\u00e7a num ambiente em que a intelig\u00eancia artificial, a automatiza\u00e7\u00e3o e a regulamenta\u00e7\u00e3o avan\u00e7am a grande velocidade.<\/p>\n<p>Os principais temas do evento incluem a <strong>IA preditiva,<\/strong> <strong>a ciberseguran\u00e7a aut\u00f3noma,<\/strong> <strong>a gest\u00e3o inteligente da identidade (IAM),<\/strong> os modelos de <strong>acesso sem palavra-passe<\/strong> e a aplica\u00e7\u00e3o pr\u00e1tica de regulamentos como o <strong>NIS2, o DORA e a Lei da IA.<\/strong>[\/vc_column_text][vc_empty_space height=&#8221;110px&#8221; css=&#8221;.vc_custom_1770123599997{margin-top: -100px !important;}&#8221; el_id=&#8221;uno&#8221;][vc_column_text css=&#8221;.vc_custom_1763030185810{padding-top: 15px !important;padding-right: 15px !important;padding-bottom: 15px !important;padding-left: 15px !important;background-color: #47D7AC !important;}&#8221;]<\/p>\n<h2 style=\"margin-top: 0;\"><span style=\"color: #000000;\">Partilha de reflex\u00f5es entre peritos<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Participaremos no painel de discuss\u00e3o <strong>&#8220;O novo quadro regulamentar: regulamenta\u00e7\u00e3o ou revolu\u00e7\u00e3o para o CISO?&#8221;<\/strong>, que ter\u00e1 lugar \u00e0s 10h30. O painel ser\u00e1 moderado pelo nosso colaborador habitual <strong>Alonso Hurtado,<\/strong> advogado especializado em tecnologia e s\u00f3cio da ECIJA, e os participantes ser\u00e3o: <strong>Rodrigo Orgaz,<\/strong> Diretor de Ciberseguran\u00e7a do EBN BANCO, <strong>Enrique Cervantes,<\/strong> Executivo de Seguran\u00e7a e Tecnologia da Informa\u00e7\u00e3o (CISO &#8211; CTO) da CESCE e <strong>Alberto Ang\u00f3n,<\/strong> CTO do Grupo MailComms.[\/vc_column_text][vc_empty_space height=&#8221;110px&#8221; css=&#8221;.vc_custom_1770123603205{margin-top: -100px !important;}&#8221; el_id=&#8221;dos&#8221;][vc_column_text css=&#8221;.vc_custom_1763030203002{padding-top: 15px !important;padding-right: 15px !important;padding-bottom: 15px !important;padding-left: 15px !important;background-color: #47D7AC !important;}&#8221;]<\/p>\n<h2 style=\"margin-top: 0;\"><span style=\"color: #000000;\">A nossa vis\u00e3o: confian\u00e7a, conformidade e resili\u00eancia digital<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\u00c9 fundamental <strong>integrar a conformidade nas estrat\u00e9gias de ciberseguran\u00e7a<\/strong> como um pilar de valor e n\u00e3o apenas uma obriga\u00e7\u00e3o.<\/p>\n<p>Como <strong>fornecedores qualificados de servi\u00e7os de confian\u00e7a, oferecemos<\/strong> uma vis\u00e3o baseada na <strong>seguran\u00e7a, rastreabilidade e garantia legal<\/strong> dentro da cadeia de valor da ciberseguran\u00e7a. O nosso papel \u00e9 acompanhar as empresas no desafio do cumprimento de quadros regulamentares como o <strong>NIS2, DORA ou RGPD,<\/strong> refor\u00e7ando a sua capacidade de operar em ambientes digitais seguros, interoper\u00e1veis e audit\u00e1veis. <\/p>\n<p>Al\u00e9m disso, com as nossas solu\u00e7\u00f5es <strong>de identifica\u00e7\u00e3o por v\u00eddeo assistidas e n\u00e3o assistidas,<\/strong> ajudamos as organiza\u00e7\u00f5es a avan\u00e7ar com as suas estrat\u00e9gias de<strong> Confian\u00e7a Zero<\/strong>, aplicando a verifica\u00e7\u00e3o de identidade e a prote\u00e7\u00e3o de acesso cr\u00edtico de uma forma eficiente e em conformidade.[\/vc_column_text][vc_empty_space height=&#8221;110px&#8221; css=&#8221;.vc_custom_1770123607229{margin-top: -100px !important;}&#8221; el_id=&#8221;tres&#8221;][vc_column_text css=&#8221;.vc_custom_1763030217738{padding-top: 15px !important;padding-right: 15px !important;padding-bottom: 15px !important;padding-left: 15px !important;background-color: #47D7AC !important;}&#8221;]<\/p>\n<h2 style=\"margin-top: 0;\"><span style=\"color: #000000;\">Comprometido com um modelo de seguran\u00e7a cibern\u00e9tica de confian\u00e7a<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]A nossa participa\u00e7\u00e3o neste congresso, como <strong>Patrocinador Gold,<\/strong> reflecte o nosso compromisso com a constru\u00e7\u00e3o de um <strong>ecossistema digital mais seguro e fi\u00e1vel,<\/strong> em que a regula\u00e7\u00e3o e a inova\u00e7\u00e3o n\u00e3o s\u00e3o entendidas como for\u00e7as opostas, mas sim como aliadas na consolida\u00e7\u00e3o de um futuro tecnol\u00f3gico respons\u00e1vel.<\/p>\n<p>Para al\u00e9m das solu\u00e7\u00f5es, queremos contribuir com conhecimento, experi\u00eancia e vis\u00e3o estrat\u00e9gica para impulsionar <strong>a confian\u00e7a digital,<\/strong><strong> a resili\u00eancia organizacional<\/strong> e <strong>a maturidade regulat\u00f3ria<\/strong> do tecido empresarial.[\/vc_column_text][vc_empty_space height=&#8221;110px&#8221; css=&#8221;.vc_custom_1770123610821{margin-top: -100px !important;}&#8221; el_id=&#8221;cuatro&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1728373917190{margin-top: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 35px !important;padding-left: 0px !important;background-color: #f4f4f4 !important;border-radius: 10px !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1763034940545{padding-top: 15px !important;padding-right: 30px !important;padding-bottom: 5px !important;padding-left: 30px !important;}&#8221;]<strong>Junta-se a n\u00f3s?<\/strong><\/p>\n<p><strong>Recebe o teu convite gratuito em<\/strong> <strong><a href=\"https:\/\/ikn.es\/inscripcion-mailcomms-group-cybersecurity-identification\/?utm_term=MAILCOMMS&amp;utm_campaign=BF0119_Cybersecurity_&amp;_Identification&amp;utm_medium=email&amp;utm_source=newsletter&amp;utm_content=email\" target=\"_blank\" rel=\"noopener\">este link*.<\/a><\/strong><\/p>\n<ul>\n<li><strong>Evento:<\/strong> Ciberseguran\u00e7a e identifica\u00e7\u00e3o<\/li>\n<li><strong>Dia:<\/strong> 18 de novembro<\/li>\n<li><strong>Local:<\/strong> Hotel Ilunion Atrium (Madrid)<\/li>\n<li><strong>Hora do painel:<\/strong> 10:30h<\/li>\n<\/ul>\n<p><span style=\"font-size: 14px;\">* Os convites destinam-se exclusivamente a profissionais de tecnologia e ciberseguran\u00e7a que n\u00e3o trabalhem em empresas que ofere\u00e7am solu\u00e7\u00f5es ou servi\u00e7os relacionados com o tema da confer\u00eancia.<\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_single_image image=&#8221;39455&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;80px&#8221; css=&#8221;.vc_custom_1763023532587{margin-top: -70px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1770123593976{padding-top: 50px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;background-color: #F2F2F2 !important;}&#8221;]\u00cdndice Partilha de reflex\u00f5es entre peritos A nossa vis\u00e3o: confian\u00e7a, conformidade e resili\u00eancia digital Comprometido com um modelo de seguran\u00e7a cibern\u00e9tica de confian\u00e7a Junta-se a n\u00f3s? [\/vc_column_text][vc_empty_space height=&#8221;110px&#8221; css=&#8221;.vc_custom_1770123596341{margin-top: -100px !important;}&#8221;][vc_column_text css=&#8221;&#8221;]No dia 18 de novembro, Madrid [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":39455,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[499],"class_list":["post-39428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-da-empresa"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Junta-te a n\u00f3s na Cybersecurity &amp; Identification 2025<\/title>\n<meta name=\"description\" content=\"No dia 18 de novembro, Madrid acolher\u00e1 uma nova edi\u00e7\u00e3o do congresso Cybersecurity &amp; Identification, organizado pela IKN Espanha, sob o lema Cyberinnovation: IAM &amp; IA Gen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Junta-te a n\u00f3s na Cybersecurity &amp; Identification 2025\" \/>\n<meta property=\"og:description\" content=\"No dia 18 de novembro, Madrid acolher\u00e1 uma nova edi\u00e7\u00e3o do congresso Cybersecurity &amp; Identification, organizado pela IKN Espanha, sob o lema Cyberinnovation: IAM &amp; IA Gen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailcomms Group\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T11:55:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-03T13:02:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"623\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Mailcomms Group\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:site\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mailcomms Group\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/\"},\"author\":{\"name\":\"Mailcomms Group\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684\"},\"headline\":\"Conformidade e ciberseguran\u00e7a: uma vis\u00e3o estrat\u00e9gica na confer\u00eancia Cybersecurity &amp; Identification\",\"datePublished\":\"2025-11-13T11:55:44+00:00\",\"dateModified\":\"2026-02-03T13:02:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/\"},\"wordCount\":869,\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp\",\"articleSection\":[\"Not\u00edcias da empresa\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/\",\"url\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/\",\"name\":\"Junta-te a n\u00f3s na Cybersecurity & Identification 2025\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp\",\"datePublished\":\"2025-11-13T11:55:44+00:00\",\"dateModified\":\"2026-02-03T13:02:32+00:00\",\"description\":\"No dia 18 de novembro, Madrid acolher\u00e1 uma nova edi\u00e7\u00e3o do congresso Cybersecurity & Identification, organizado pela IKN Espanha, sob o lema Cyberinnovation: IAM & IA Gen.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp\",\"width\":892,\"height\":623,\"caption\":\"Cybersecurity & Identification 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mailcomms Group\",\"item\":\"https:\/\/mailcommsgroup.com\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogue\",\"item\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Conformidade e ciberseguran\u00e7a: uma vis\u00e3o estrat\u00e9gica na confer\u00eancia Cybersecurity &amp; Identification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#website\",\"url\":\"https:\/\/mailcommsgroup.com\/pt\/\",\"name\":\"MailComms Group\",\"description\":\"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.\",\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#organization\"},\"alternateName\":\"MailComms Group\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailcommsgroup.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#organization\",\"name\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\",\"alternateName\":\"MailComms Group\",\"url\":\"https:\/\/mailcommsgroup.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"width\":512,\"height\":512,\"caption\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CommsCustomer\",\"https:\/\/www.linkedin.com\/company\/customercomms\/\",\"https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684\",\"name\":\"Mailcomms Group\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g\",\"caption\":\"Mailcomms Group\"},\"sameAs\":[\"https:\/\/mailcommsgroup.com\"],\"url\":\"https:\/\/mailcommsgroup.com\/pt\/blog\/author\/ntrwrks_ccmms\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Junta-te a n\u00f3s na Cybersecurity & Identification 2025","description":"No dia 18 de novembro, Madrid acolher\u00e1 uma nova edi\u00e7\u00e3o do congresso Cybersecurity & Identification, organizado pela IKN Espanha, sob o lema Cyberinnovation: IAM & IA Gen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/","og_locale":"pt_PT","og_type":"article","og_title":"Junta-te a n\u00f3s na Cybersecurity & Identification 2025","og_description":"No dia 18 de novembro, Madrid acolher\u00e1 uma nova edi\u00e7\u00e3o do congresso Cybersecurity & Identification, organizado pela IKN Espanha, sob o lema Cyberinnovation: IAM & IA Gen.","og_url":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/","og_site_name":"Mailcomms Group","article_published_time":"2025-11-13T11:55:44+00:00","article_modified_time":"2026-02-03T13:02:32+00:00","og_image":[{"width":892,"height":623,"url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp","type":"image\/webp"}],"author":"Mailcomms Group","twitter_card":"summary_large_image","twitter_creator":"@CommsCustomer","twitter_site":"@CommsCustomer","twitter_misc":{"Escrito por":"Mailcomms Group","Tempo estimado de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#article","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/"},"author":{"name":"Mailcomms Group","@id":"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684"},"headline":"Conformidade e ciberseguran\u00e7a: uma vis\u00e3o estrat\u00e9gica na confer\u00eancia Cybersecurity &amp; Identification","datePublished":"2025-11-13T11:55:44+00:00","dateModified":"2026-02-03T13:02:32+00:00","mainEntityOfPage":{"@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/"},"wordCount":869,"publisher":{"@id":"https:\/\/mailcommsgroup.com\/pt\/#organization"},"image":{"@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp","articleSection":["Not\u00edcias da empresa"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/","url":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/","name":"Junta-te a n\u00f3s na Cybersecurity & Identification 2025","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage"},"image":{"@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp","datePublished":"2025-11-13T11:55:44+00:00","dateModified":"2026-02-03T13:02:32+00:00","description":"No dia 18 de novembro, Madrid acolher\u00e1 uma nova edi\u00e7\u00e3o do congresso Cybersecurity & Identification, organizado pela IKN Espanha, sob o lema Cyberinnovation: IAM & IA Gen.","breadcrumb":{"@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#primaryimage","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2025\/11\/cibersecurity-identification-evento-new.webp","width":892,"height":623,"caption":"Cybersecurity & Identification 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/mailcommsgroup.com\/pt\/blog\/cumplimiento-normativo-y-ciberseguridad-una-vision-estrategica-en-el-congreso-cybersecurity-identification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mailcomms Group","item":"https:\/\/mailcommsgroup.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Blogue","item":"https:\/\/mailcommsgroup.com\/pt\/blog\/"},{"@type":"ListItem","position":3,"name":"Conformidade e ciberseguran\u00e7a: uma vis\u00e3o estrat\u00e9gica na confer\u00eancia Cybersecurity &amp; Identification"}]},{"@type":"WebSite","@id":"https:\/\/mailcommsgroup.com\/pt\/#website","url":"https:\/\/mailcommsgroup.com\/pt\/","name":"MailComms Group","description":"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.","publisher":{"@id":"https:\/\/mailcommsgroup.com\/pt\/#organization"},"alternateName":"MailComms Group","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailcommsgroup.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/mailcommsgroup.com\/pt\/#organization","name":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.","alternateName":"MailComms Group","url":"https:\/\/mailcommsgroup.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","width":512,"height":512,"caption":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal."},"image":{"@id":"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CommsCustomer","https:\/\/www.linkedin.com\/company\/customercomms\/","https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ"]},{"@type":"Person","@id":"https:\/\/mailcommsgroup.com\/pt\/#\/schema\/person\/c3a3ecfc795ade78319e6b1af9d65684","name":"Mailcomms Group","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f4012bdfd3c1190166ba510602a508ab2a504cafc93cf37f0c8cbdc54e85846a?s=96&d=mm&r=g","caption":"Mailcomms Group"},"sameAs":["https:\/\/mailcommsgroup.com"],"url":"https:\/\/mailcommsgroup.com\/pt\/blog\/author\/ntrwrks_ccmms\/"}]}},"_links":{"self":[{"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/posts\/39428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/comments?post=39428"}],"version-history":[{"count":8,"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/posts\/39428\/revisions"}],"predecessor-version":[{"id":43045,"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/posts\/39428\/revisions\/43045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/media\/39455"}],"wp:attachment":[{"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/media?parent=39428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailcommsgroup.com\/pt\/wp-json\/wp\/v2\/categories?post=39428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}