{"id":646603,"date":"2026-03-17T16:43:51","date_gmt":"2026-03-17T16:43:51","guid":{"rendered":"https:\/\/www.capgemini.com\/br-pt\/?p=646603"},"modified":"2026-03-26T13:11:25","modified_gmt":"2026-03-26T13:11:25","slug":"os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/","title":{"rendered":"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026"},"content":{"rendered":"\t\t<div class=\"wp-block-cg-blocks-hero-press-release\">\n\t\t\t<header class=\"header-hero-press-release\" role=\"main\" id=\"main-content-press-release\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"hero-press-release\">\n\t\t\t\t\t\t<div class=\"hero-press-release-content-wrapper\">\n\t\t\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t\t\t<div class=\"col-12\">\n\t\t\t\t\t\t\t\t\t<div class=\"header-title\">\n\t\t\t\t\t\t\t\t\t\t<h1>\n\t\t\t\t\t\t\t\t\t\t\tOs cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026\t\t\t\t\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"header-description\">\n\t\t\t\t\t\t\t\t\t\t<p>Marco Pereira, Vice-Presidente Executivo, L\u00edder Global de Ciberseguran\u00e7a<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"header-date\">\n\t\t\t\t\t\t\t\t\t\t<span>mar. 17, 2026<\/span>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"hero-press-release-brand-image\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-white.svg\" alt=\"Logotipo da marca\" \/>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/header>\n\t\t<\/div>\n\t\t\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=press-release&amp;p=1100115\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=press-release&amp;p=1100115\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-a-ciberseguranca-nao-se-trata-mais-apenas-de-defesa-trata-se-de-resiliencia-continua-ouco-esse-sentimento-com-frequencia-em-conversas-com-clientes-parceiros-e-analistas-do-setor-ele-reflete-uma-mudanca-real-na-forma-como-as-organizacoes-enxergam-o-risco-cibernetico-atualmente\">&#8220;<em>A ciberseguran\u00e7a n\u00e3o se trata mais apenas de defesa. Trata-se de <strong>resili\u00eancia cont\u00ednua<\/strong>. Ou\u00e7o esse sentimento com frequ\u00eancia em conversas com clientes, parceiros e analistas do setor. Ele reflete uma mudan\u00e7a real na forma como as organiza\u00e7\u00f5es enxergam o risco cibern\u00e9tico atualmente.<\/em>&#8220;<\/h2>\n\n\n\n<p>O ambiente digital est\u00e1 mudando mais r\u00e1pido do que os modelos tradicionais de seguran\u00e7a conseguem acompanhar. <strong>Resili\u00eancia, velocidade de resposta e confian\u00e7a<\/strong> importam mais hoje do que qualquer ferramenta isolada ou solu\u00e7\u00e3o pontual. \u00c0 medida que avan\u00e7amos rumo a 2026, as organiza\u00e7\u00f5es est\u00e3o repensando a ciberseguran\u00e7a n\u00e3o apenas para reduzir riscos, mas para proteger o desempenho e a continuidade dos neg\u00f3cios em um mundo cada vez mais imprevis\u00edvel.<\/p>\n\n\n\n<p>Estes s\u00e3o os cinco imperativos que est\u00e3o moldando a pr\u00f3xima fase da resili\u00eancia empresarial.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1-operacoes-de-seguranca-impulsionadas-por-ia-tornam-se-missao-critica\"><strong>1. Opera\u00e7\u00f5es de seguran\u00e7a impulsionadas por IA tornam-se miss\u00e3o cr\u00edtica<\/strong><\/h2>\n\n\n\n<p>A intelig\u00eancia artificial tornou-se o multiplicador de for\u00e7a mais poderoso na ciberseguran\u00e7a \u2014 tanto para atacantes quanto para defensores. Do lado ofensivo, estamos vendo o surgimento de <a href=\"https:\/\/www.capgemini.com\/br-pt\/research-and-insight\/agentes-de-ia\/\"><strong>sistemas aut\u00f4nomos de IA<\/strong><\/a><strong> capazes de planejar e executar ataques em tempo real<\/strong>. Esses sistemas conseguem identificar alvos, personalizar campanhas de engenharia social e explorar vulnerabilidades com pouqu\u00edssima interven\u00e7\u00e3o humana. Ataques sofisticados est\u00e3o se tornando mais f\u00e1ceis de lan\u00e7ar e mais dif\u00edceis de interromper.<\/p>\n\n\n\n<p>Do lado defensivo, a IA est\u00e1 relacionada \u00e0 <strong>velocidade e \u00e0 antecipa\u00e7\u00e3o<\/strong>. A expectativa para as opera\u00e7\u00f5es de seguran\u00e7a \u00e9 clara: a IA deve reduzir significativamente o tempo necess\u00e1rio para detectar e conter amea\u00e7as. Isso significa ir al\u00e9m de alertas est\u00e1ticos e avan\u00e7ar para modelos capazes de identificar comportamentos anormais antes que eles se transformem em incidentes.<\/p>\n\n\n\n<p>Vejo o investimento em IA defensiva como um investimento na continuidade dos neg\u00f3cios. Isso tamb\u00e9m explica por que o letramento em IA est\u00e1 rapidamente se tornando um requisito essencial para equipes de seguran\u00e7a: <a href=\"https:\/\/www.capgemini.com\/br-pt\/insights\/biblioteca-de-pesquisas\/ia-generativa-em-seguranca-cibernetica\/\"><strong>53% concordam que as habilidades em IA ajudar\u00e3o a escalar suas opera\u00e7\u00f5es de seguran\u00e7a<\/strong><\/a>, segundo nosso relat\u00f3rio CRI mais recente.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2-zero-trust-torna-se-a-base-operacional\"><strong>2. Zero Trust torna-se a base operacional<\/strong><\/h2>\n\n\n\n<p>Organiza\u00e7\u00f5es que ainda dependem de um per\u00edmetro de rede considerado seguro est\u00e3o resolvendo os problemas de ontem. Ambientes de nuvem h\u00edbrida, trabalho remoto e m\u00faltiplos pontos de acesso tornaram o modelo tradicional de per\u00edmetro ineficaz.<\/p>\n\n\n\n<p>O <strong>Zero Trust<\/strong> j\u00e1 n\u00e3o \u00e9 mais uma aspira\u00e7\u00e3o \u2014 <strong>\u00e9 a base<\/strong>. Modelos modernos de Zero Trust validam continuamente usu\u00e1rios, dispositivos e aplica\u00e7\u00f5es, limitam a movimenta\u00e7\u00e3o lateral e ajustam dinamicamente o acesso com base em sinais de risco, como comportamento, localiza\u00e7\u00e3o e integridade do dispositivo.<\/p>\n\n\n\n<p>At\u00e9 2026, o Zero Trust tende a se tornar cada vez mais um <strong>requisito de governan\u00e7a<\/strong>. Novas aplica\u00e7\u00f5es n\u00e3o dever\u00e3o entrar em produ\u00e7\u00e3o sem que esses princ\u00edpios estejam incorporados desde o design.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-3-preparacao-para-a-era-quantica-passa-da-teoria-para-a-acao\"><strong>3. Prepara\u00e7\u00e3o para a era qu\u00e2ntica passa da teoria para a a\u00e7\u00e3o<\/strong><\/h2>\n\n\n\n<p>A computa\u00e7\u00e3o qu\u00e2ntica est\u00e1 se aproximando gradualmente do uso no mundo real. Com ela surge uma nova classe de risco. Dados criptografados hoje podem ser expostos no futuro por meio de ataques conhecidos como <strong>\u201ccolher agora, descriptografar depois\u201d (harvest now, decrypt later)<\/strong>. Esse risco j\u00e1 est\u00e1 influenciando decis\u00f5es estrat\u00e9gicas de seguran\u00e7a de longo prazo.<\/p>\n\n\n\n<p>Pesquisas do Capgemini Research Institute mostram que 70% das organiza\u00e7\u00f5es est\u00e3o avaliando ou implementando <a href=\"https:\/\/www.capgemini.com\/br-pt\/research-and-insight\/post-quantum-crypto\/\">medidas de seguran\u00e7a resistentes \u00e0 computa\u00e7\u00e3o qu\u00e2ntica<\/a>. Ainda assim, quase uma em cada tr\u00eas ainda subestima essa amea\u00e7a.<\/p>\n\n\n\n<p>A Uni\u00e3o Europeia estabeleceu uma diretriz clara: as organiza\u00e7\u00f5es devem realizar sua an\u00e1lise de risco qu\u00e2ntico e desenvolver um <strong>roteiro de implementa\u00e7\u00e3o<\/strong> at\u00e9 o final deste ano. Nos pr\u00f3ximos anos, veremos um crescimento acelerado de projetos-piloto e implementa\u00e7\u00f5es de <strong>criptografia p\u00f3s-qu\u00e2ntica<\/strong>.<\/p>\n\n\n\n<p>A prepara\u00e7\u00e3o para a era qu\u00e2ntica j\u00e1 n\u00e3o \u00e9 mais um tema acad\u00eamico. \u00c9 uma quest\u00e3o de tempo e de prepara\u00e7\u00e3o.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-4-resiliencia-exige-soberania\"><strong>4. Resili\u00eancia exige soberania<\/strong><\/h2>\n\n\n\n<p>A ciberseguran\u00e7a j\u00e1 n\u00e3o \u00e9 mais impulsionada apenas pela tecnologia. A soberania tornou-se uma lente fundamental por meio da qual as organiza\u00e7\u00f5es precisam avaliar parceiros, plataformas e todo o ecossistema de terceiros.<\/p>\n\n\n\n<p>Os l\u00edderes agora precisam equilibrar inova\u00e7\u00e3o com obriga\u00e7\u00f5es regulat\u00f3rias, restri\u00e7\u00f5es de jurisdi\u00e7\u00e3o legal e a necessidade de manter controle sobre dados, opera\u00e7\u00f5es e depend\u00eancias cr\u00edticas. As arquiteturas de seguran\u00e7a precisam se adaptar n\u00e3o apenas \u00e0s amea\u00e7as t\u00e9cnicas, mas tamb\u00e9m \u00e0s realidades geopol\u00edticas, \u00e0 exposi\u00e7\u00e3o a diferentes jurisdi\u00e7\u00f5es e \u00e0 postura de soberania de cada fornecedor na cadeia.<\/p>\n\n\n\n<p>Nossas pesquisas confirmam essa mudan\u00e7a. A ciberseguran\u00e7a continua sendo a principal<strong> <\/strong><a href=\"https:\/\/www.capgemini.com\/br-pt\/insights\/biblioteca-de-pesquisas\/nova-geracao-de-cadeia-de-suprimentos\/\"><strong>preocupa\u00e7\u00e3o dos executivos de cadeia de suprimentos<\/strong><\/a>, citada por <strong>74% deles,<\/strong> \u00e0 frente de press\u00f5es relacionadas a custos e digitaliza\u00e7\u00e3o. Isso reflete a crescente preocupa\u00e7\u00e3o com a exposi\u00e7\u00e3o gerada por terceiros que n\u00e3o atendem a requisitos de soberania.<\/p>\n\n\n\n<p>At\u00e9 2026, as organiza\u00e7\u00f5es l\u00edderes ir\u00e3o al\u00e9m das avalia\u00e7\u00f5es tradicionais de fornecedores, adotando <strong>modelos cont\u00ednuos de garantia baseados em soberania<\/strong>. Isso inclui:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\">visibilidade em tempo real sobre vulnerabilidades de terceiros<\/li>\n\n\n\n<li class=\"has-medium-font-size\">transpar\u00eancia sobre depend\u00eancias de software e controle operacional<\/li>\n\n\n\n<li class=\"has-medium-font-size\">maior alinhamento com exig\u00eancias regulat\u00f3rias e de soberania em r\u00e1pida evolu\u00e7\u00e3o<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-5-um-mundo-orientado-por-ia-exige-uma-abordagem-centrada-em-identidade-e-dados\"><strong>5. Um mundo orientado por IA exige uma abordagem centrada em identidade e dados<\/strong><\/h2>\n\n\n\n<p>Em um mundo <strong>AI-first<\/strong>, a ciberseguran\u00e7a precisa se tornar <strong>identity-first e data-first<\/strong>. A IA \u00e9 t\u00e3o boa quanto os dados que a alimentam \u2014 sua precis\u00e3o, integridade e confiabilidade dependem totalmente da qualidade das informa\u00e7\u00f5es subjacentes.<\/p>\n\n\n\n<p>\u00c0 medida que as organiza\u00e7\u00f5es aceleram a ado\u00e7\u00e3o de IA, garantir que os <em>dados certos<\/em> estejam dispon\u00edveis, devidamente governados e acess\u00edveis apenas \u00e0s identidades corretas torna-se fundamental.<\/p>\n\n\n\n<p>Isso significa:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-medium-font-size\"><strong>fortalecer a identidade<\/strong> como o novo plano de controle<\/li>\n\n\n\n<li class=\"has-medium-font-size\">aplicar rigorosamente o princ\u00edpio de <strong>menor privil\u00e9gio no acesso<\/strong><\/li>\n\n\n\n<li class=\"has-medium-font-size\">garantir propriedade e rastreabilidade claras dos dados utilizados para treinar sistemas de IA<\/li>\n<\/ul>\n\n\n\n<p>Sem controles robustos de identidade e gest\u00e3o disciplinada de dados, a IA pode n\u00e3o apenas gerar insights pouco confi\u00e1veis, como tamb\u00e9m amplificar riscos.<\/p>\n\n\n\n<p>Para liberar todo o potencial da IA com seguran\u00e7a, precisamos proteger os dados que a treinam, validar quem pode acessar e influenciar esses dados e alinhar de forma rigorosa governan\u00e7a, seguran\u00e7a e opera\u00e7\u00f5es a essa nova realidade.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusao\"><strong>Conclus\u00e3o<\/strong><\/h2>\n\n\n\n<p>A lideran\u00e7a em ciberseguran\u00e7a em 2026 ser\u00e1 definida por escolhas estrat\u00e9gicas. Organiza\u00e7\u00f5es que automatizam de forma inteligente, adotam Zero Trust, se preparam para a disrup\u00e7\u00e3o qu\u00e2ntica, se adaptam \u00e0s exig\u00eancias de soberania e priorizam a prote\u00e7\u00e3o de identidade e dados estar\u00e3o mais bem posicionadas para resistir a interrup\u00e7\u00f5es e manter a confian\u00e7a.<\/p>\n\n\n<section class=\"latest-insights layout-odd layout-one-card-only \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Estudos e Insights<\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/br-pt\/insights\/biblioteca-de-pesquisas\/perspectivas-da-ia-2026\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/01\/AI-perspectives-2026-DotCom_Banner.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/br-pt\/insights\/biblioteca-de-pesquisas\/perspectivas-da-ia-2026\/\" aria-label=\"A vantagem da IA ao longo de v\u00e1rios anos: Construindo a empresa do amanh\u00e3\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Report<\/div>\n                                <h3 class=\"card-title\">A vantagem da IA ao longo de v\u00e1rios anos: Construindo a empresa do amanh\u00e3<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><\/div><\/section>\n\n<div class=&quot;wp-block-cg-blocks-latest-news&quot;><section class=\"latest-news-block \"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-left\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<span class=\"box-tag\">Corporate news<\/span>\n\t\t\t\t<a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/br-pt\/noticias\/press-release\/capgemini-une-forcas-com-a-openai\/\"><h3 class=\"news-subtitle\">A Capgemini une for\u00e7as com a OpenAI para acelerar uma nova era de transforma\u00e7\u00e3o empresarial impulsionada por IA com a Frontier Alliance<\/h3><\/a>\n\t\t\t\t<p>A Capgemini anuncia parceria com a OpenAI para transformar a IA empresarial com a plataforma Frontier. Saiba mais.<\/p>\n\t\t\t\t<span class=\"box-date\">fev. 24, 2026<\/span>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"box-wrapper col-md-8 col-right\"><div class=\"box\"><span class=\"box-tag\">Corporate news<\/span><a class=\"box-title\" href=\"https:\/\/www.capgemini.com\/br-pt\/noticias\/press-release\/capgemini-firma-parceria-com-a-microsoft-para-viabilizar-uma-transformacao-digital-resiliente-e-confiavel-para-clientes-com-solucoes-integradas-de-soberania\/\"><h3 class=\"news-subtitle\">Capgemini firma parceria com a Microsoft para viabilizar uma transforma\u00e7\u00e3o digital resiliente e confi\u00e1vel para clientes com solu\u00e7\u00f5es integradas de soberania<\/h3><\/a><span class=\"box-date\">fev. 11, 2026<\/span><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Descubra os imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 que moldar\u00e3o a resili\u00eancia empresarial e prote\u00e7\u00e3o de dados.<\/p>\n","protected":false},"author":588,"featured_media":646623,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"80","footnotes":"","featured_focal_points":""},"categories":[239],"tags":[329],"brand":[80],"service":[218],"industry":[],"partners":[],"blog-topic":[119,133],"content-group":[],"class_list":["post-646603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberseguranca","tag-ciberseguranca","brand-capgemini","service-seguranca-cibernetica","blog-topic-expert-perspective","blog-topic-experts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 - Capgemini Brasil<\/title>\n<meta name=\"description\" content=\"Descubra os imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 que moldar\u00e3o a resili\u00eancia empresarial e prote\u00e7\u00e3o de dados.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026\" \/>\n<meta property=\"og:description\" content=\"Descubra os imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 que moldar\u00e3o a resili\u00eancia empresarial e prote\u00e7\u00e3o de dados.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Brasil\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T16:43:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T13:11:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"bruna.lima@capgemini.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bruna.lima@capgemini.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/\",\"url\":\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/\",\"name\":\"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 - Capgemini Brasil\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg\",\"datePublished\":\"2026-03-17T16:43:51+00:00\",\"dateModified\":\"2026-03-26T13:11:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/#\/schema\/person\/8621f2a45cd493cbf89cfb65fafc663d\"},\"description\":\"Descubra os imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 que moldar\u00e3o a resili\u00eancia empresarial e prote\u00e7\u00e3o de dados.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg\",\"width\":400,\"height\":250,\"caption\":\"ciber seguran\u00e7a\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/br-pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/#website\",\"url\":\"https:\/\/www.capgemini.com\/br-pt\/\",\"name\":\"Capgemini Brasil\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/br-pt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/#\/schema\/person\/8621f2a45cd493cbf89cfb65fafc663d\",\"name\":\"bruna.lima@capgemini.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.capgemini.com\/br-pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dbebb8c16fe9c2fd30419174f8a75c4a09a040e49c1769e8a572c8134412df7d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dbebb8c16fe9c2fd30419174f8a75c4a09a040e49c1769e8a572c8134412df7d?s=96&d=mm&r=g\",\"caption\":\"bruna.lima@capgemini.com\"},\"url\":\"https:\/\/www.capgemini.com\/br-pt\/author\/bruna-limacapgemini-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 - Capgemini Brasil","description":"Descubra os imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 que moldar\u00e3o a resili\u00eancia empresarial e prote\u00e7\u00e3o de dados.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/","og_locale":"pt_BR","og_type":"article","og_title":"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026","og_description":"Descubra os imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 que moldar\u00e3o a resili\u00eancia empresarial e prote\u00e7\u00e3o de dados.","og_url":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/","og_site_name":"Capgemini Brasil","article_published_time":"2026-03-17T16:43:51+00:00","article_modified_time":"2026-03-26T13:11:25+00:00","og_image":[{"width":400,"height":250,"url":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg","type":"image\/jpeg"}],"author":"bruna.lima@capgemini.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bruna.lima@capgemini.com","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/","url":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/","name":"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 - Capgemini Brasil","isPartOf":{"@id":"https:\/\/www.capgemini.com\/br-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg","datePublished":"2026-03-17T16:43:51+00:00","dateModified":"2026-03-26T13:11:25+00:00","author":{"@id":"https:\/\/www.capgemini.com\/br-pt\/#\/schema\/person\/8621f2a45cd493cbf89cfb65fafc663d"},"description":"Descubra os imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026 que moldar\u00e3o a resili\u00eancia empresarial e prote\u00e7\u00e3o de dados.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#primaryimage","url":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg","contentUrl":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg","width":400,"height":250,"caption":"ciber seguran\u00e7a"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/br-pt\/"},{"@type":"ListItem","position":2,"name":"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/br-pt\/#website","url":"https:\/\/www.capgemini.com\/br-pt\/","name":"Capgemini Brasil","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/br-pt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/br-pt\/#\/schema\/person\/8621f2a45cd493cbf89cfb65fafc663d","name":"bruna.lima@capgemini.com","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.capgemini.com\/br-pt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dbebb8c16fe9c2fd30419174f8a75c4a09a040e49c1769e8a572c8134412df7d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dbebb8c16fe9c2fd30419174f8a75c4a09a040e49c1769e8a572c8134412df7d?s=96&d=mm&r=g","caption":"bruna.lima@capgemini.com"},"url":"https:\/\/www.capgemini.com\/br-pt\/author\/bruna-limacapgemini-com\/"}]}},"blog_topic_info":[{"id":119,"name":"expert perspective"},{"id":133,"name":"experts"}],"taxonomy_info":{"category":[{"id":239,"name":"Cyberseguran\u00e7a","slug":"cyberseguranca"}],"post_tag":[{"id":329,"name":"ciberseguran\u00e7a","slug":"ciberseguranca"}],"brand":[{"id":80,"name":"Capgemini","slug":"capgemini"}],"service":[{"id":218,"name":"Seguran\u00e7a cibern\u00e9tica","slug":"seguranca-cibernetica"}],"blog-topic":[{"id":119,"name":"expert perspective","slug":"expert-perspective"},{"id":133,"name":"experts","slug":"experts"}],"following_users":[{"id":111,"name":"bruna.lima@capgemini.com","slug":"bruna-limacapgemini-com"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026","url":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg"},"articleSection":"Cyberseguran\u00e7a","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Brasil","logo":""},"keywords":["ciberseguran\u00e7a"],"dateCreated":"2026-03-17T16:43:51Z","datePublished":"2026-03-17T16:43:51Z","dateModified":"2026-03-26T13:11:25Z"},"rendered":"<meta name=\"parsely-title\" content=\"Os cinco imperativos estrat\u00e9gicos de ciberseguran\u00e7a para 2026\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/br-pt\/insights\/perspectivas-dos-especialistas\/os-cinco-imperativos-estrategicos-de-ciberseguranca-para-2026\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-03-17T16:43:51Z\" \/>\n<meta name=\"parsely-section\" content=\"Cyberseguran\u00e7a\" \/>\n<meta name=\"parsely-tags\" content=\"ciberseguran\u00e7a\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg","featured_image_alt":"ciber seguran\u00e7a","distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Brasil","distributor_original_site_url":"https:\/\/www.capgemini.com\/br-pt","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2026\/03\/Cybersecurity-web-banners-2026b1.jpg","author_title":"Marco Pereira","author_thumbnail_url":"https:\/\/www.capgemini.com\/br-pt\/wp-content\/uploads\/sites\/12\/2025\/11\/Screenshot-2025-11-10-113855.png?w=462","author_thumbnail_alt":"Marco Pereira","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/posts\/646603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/users\/588"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/comments?post=646603"}],"version-history":[{"count":16,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/posts\/646603\/revisions"}],"predecessor-version":[{"id":646751,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/posts\/646603\/revisions\/646751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/media\/646623"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/media?parent=646603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/categories?post=646603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/tags?post=646603"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/brand?post=646603"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/service?post=646603"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/industry?post=646603"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/partners?post=646603"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/blog-topic?post=646603"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/br-pt\/wp-json\/wp\/v2\/content-group?post=646603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}