{"id":14763,"date":"2024-05-16T11:45:10","date_gmt":"2024-05-16T10:45:10","guid":{"rendered":"https:\/\/www.sharinguniversity.eu\/wpress\/?page_id=14763"},"modified":"2024-10-08T19:32:54","modified_gmt":"2024-10-08T18:32:54","slug":"cybersecurity-risk-manager","status":"publish","type":"page","link":"https:\/\/www.sharinguniversity.eu\/wpress\/enisa-profiles\/cybersecurity-risk-manager\/","title":{"rendered":"Cybersecurity Risk Manager"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"14763\" class=\"elementor elementor-14763\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4438ca9 elementor-section-stretched elementor-section-height-min-height elementor-section-items-bottom elementor-section-boxed elementor-section-height-default\" data-id=\"4438ca9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-710ce73\" data-id=\"710ce73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-960f694 elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"960f694\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading \"><h2 class=\"title\">Cursos <\/h2><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1038632 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1038632\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-03af767\" data-id=\"03af767\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd74e34 elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"fd74e34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading \"><h4 class=\"title\"><a href=\"https:\/\/www.sharinguniversity.eu\/wpress\/enisa-profiles\/\" \/>ENISA Profiles<\/a> \u00bb Cybersecurity Risk Manager <\/h4><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05e743a e-grid e-con-full e-con e-parent\" data-id=\"05e743a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-752dd86 elementor-widget elementor-widget-text-editor\" data-id=\"752dd86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #0000ff;\"><strong>Value:<\/strong><\/span> 1700 \u20ac<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ad317f elementor-widget elementor-widget-text-editor\" data-id=\"8ad317f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #0000ff;\">Timetable:<\/span><\/strong><\/p>\n<p>Monday, Wendsday and Thrusday from 18:00 H to 22:00 H<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee87802 elementor-widget elementor-widget-text-editor\" data-id=\"ee87802\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #0000ff;\"><strong>Format:<\/strong><\/span> Online<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73f9602 elementor-widget elementor-widget-text-editor\" data-id=\"73f9602\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #0000ff;\">N. Hours:<\/span><\/strong> 30 H<\/p><p>During: 4 weeks<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-856309a elementor-widget elementor-widget-spacer\" data-id=\"856309a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99b1103 elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"99b1103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tAlternative Title(s)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fc0183 elementor-widget elementor-widget-text-editor\" data-id=\"9fc0183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Information Security Risk Analyst<\/li><li>Cybersecurity Risk Assurance Consultant<\/li><li>Cybersecurity Risk Assessor<\/li><li>Cybersecurity Impact Analyst<\/li><li>Cyber Risk Manager<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1d0939 elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"b1d0939\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tSummary Statement \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4174ff elementor-widget elementor-widget-text-editor\" data-id=\"c4174ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Manage the organisation&#8217;s cybersecurity-related risks aligned to the organisation\u2019s strategy. Develop, maintain and communicate the risk management processes and reports.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ad8ecd elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"9ad8ecd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tMission\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbaa1ba elementor-widget elementor-widget-text-editor\" data-id=\"cbaa1ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Continuously manages (identifies, analyses, assesses, estimates, mitigates) the cybersecurity-related risks of ICT infrastructures, systems and services by planning, applying, reporting and communicating risk analysis, assessment and treatment. Establishes a risk management strategy for the organisation and ensures that risks remain at an acceptable level for the organisation by selecting mitigation actions and controls.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1d477f elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"b1d477f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tDeliverable(s)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e94eab elementor-widget elementor-widget-text-editor\" data-id=\"2e94eab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Cybersecurity Risk Assessment Report<\/li><li>Cybersecurity Risk Remediation Action Plan<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10267cc elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"10267cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tMain Task(s)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7233a4 elementor-widget elementor-widget-text-editor\" data-id=\"e7233a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Develop an organisation\u2019s cybersecurity risk management strategy<\/li><li>Manage an inventory of organisation\u2019s assets<\/li><li>Identify and assess cybersecurity-related threats and vulnerabilities of ICT systems<\/li><li>Identification of threat landscape including attackers\u2019 profiles and estimation of attacks\u2019 potential<\/li><li>Assess cybersecurity risks and propose most appropriate risk treatment options, including security controls and risk mitigation and avoidance that best address the organisation\u2019s strategy<\/li><li>Monitor effectiveness of cybersecurity controls and risk levels<\/li><li>Ensure that all cybersecurity risks remain at an acceptable level for the organisation\u2019s assets<\/li><li>Develop, maintain, report and communicate complete risk management cycle<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6241e22 elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"6241e22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tKey Skill(s)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a07a43f elementor-widget elementor-widget-text-editor\" data-id=\"a07a43f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Implement cybersecurity risk management frameworks, methodologies and guidelines and ensure compliance with regulations and standards<\/li><li>Analyse and consolidate organisation\u2019s quality and risk management practices<\/li><li>Enable business assets owners, executives and other stakeholders to make riskinformed decisions to manage and mitigate risks<\/li><li>Build a cybersecurity risk-aware environment<\/li><li>Communicate, present and report to relevant stakeholders<\/li><li>Propose and manage risk-sharing options<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a5ce75 elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"8a5ce75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tKey Knowledge\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33aa416 elementor-widget elementor-widget-text-editor\" data-id=\"33aa416\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Risk management standards, methodologies and frameworks<\/li><li>Risk management tools<\/li><li>Risk management recommendations and best practices<\/li><li>Cyber threats<\/li><li>Computer systems vulnerabilities<\/li><li>Cybersecurity controls and solutions<\/li><li>Cybersecurity risks<\/li><li>Monitoring, testing and evaluating cybersecurity controls&#8217; effectiveness<\/li><li>Cybersecurity-related certifications<\/li><li>Cybersecurity-related technologies<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-705de66 elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"705de66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\te-Competences (from e-CF)\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7631a6a elementor-widget elementor-widget-text-editor\" data-id=\"7631a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>E.3.<\/strong> Risk Management (Level 4)<br \/><strong>E.5.<\/strong> Process Improvement (Level 4)<br \/><strong>E.7.<\/strong> Business Change Management (Level 4)<br \/><strong>E.9.<\/strong> IS-Governance (Level 4)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4d77180\" data-id=\"4d77180\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0993f6b elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"0993f6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading \"><h4 class=\"title\">Documenta\u00e7\u00e3o <\/h4><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8932fd elementor-widget elementor-widget-image\" data-id=\"b8932fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.sharinguniversity.eu\/wpress\/download\/enisa-profiles.pdf\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"540\" height=\"540\" src=\"https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-enisa-profiles.jpg\" class=\"attachment-full size-full wp-image-15129\" alt=\"\" srcset=\"https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-enisa-profiles.jpg 540w, https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-enisa-profiles-300x300.jpg 300w, https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-enisa-profiles-150x150.jpg 150w, https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-enisa-profiles-100x100.jpg 100w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d9fbd2 elementor-widget elementor-widget-spacer\" data-id=\"4d9fbd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-870a755 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"870a755\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7a8d77 e-flex e-con-boxed e-con e-parent\" data-id=\"b7a8d77\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b65f0bc elementor-widget elementor-widget-heading\" data-id=\"b65f0bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Para mais informa\u00e7\u00f5es, contacte-nos:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cursos ENISA Profiles \u00bb Cybersecurity Risk Manager Value: 1700 \u20ac Timetable: Monday, Wendsday and Thrusday from 18:00 H to 22:00 H Format: Online N. Hours: 30 H During: 4 weeks Alternative Title(s) Information Security Risk Analyst Cybersecurity Risk Assurance Consultant &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":14600,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-14763","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages\/14763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/comments?post=14763"}],"version-history":[{"count":31,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages\/14763\/revisions"}],"predecessor-version":[{"id":16230,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages\/14763\/revisions\/16230"}],"up":[{"embeddable":true,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages\/14600"}],"wp:attachment":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/media?parent=14763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}