{"id":148085,"date":"2023-04-20T12:56:20","date_gmt":"2023-04-20T15:56:20","guid":{"rendered":"https:\/\/sandbox2.institutopmg.com\/itsm\/itsm-in-practice-applications-to-information-security\/"},"modified":"2025-12-16T14:39:02","modified_gmt":"2025-12-16T17:39:02","slug":"itsm-in-practice-applications-to-information-security","status":"publish","type":"post","link":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/","title":{"rendered":"ITSM in practice: applications to information security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One way to apply <a href=\"https:\/\/www.axelos.com\/certifications\/itil-service-management\/what-is-it-service-management\">ITSM<\/a> in practice is by understanding security threats and how to deal with them. After all, this type of tool serves to improve the quality of IT service, with systems that adapt to the company&#8217;s needs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That being said, it is not difficult to understand that ITSM in practice can be successfully applied to security. After all, how many rumors or news of data breaches do not arise per month? In addition, how many attacks do not occur?<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Navegue por t\u00f3picos de interesse:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#How_ITSM_works\" >How ITSM works<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#The_definition_of_threat_modeling\" >The definition of threat modeling<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#ITSM_in_practice_implementing_a_threat_concept\" >ITSM in practice: implementing a threat concept<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#Evaluate_your_companys_threat_modeling\" >Evaluate your company&#8217;s threat modeling<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"How_ITSM_works\"><\/span><span style=\"font-weight: 400;\">How ITSM works<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Before we see how ITSM can be implemented in the practice of information security, it is necessary to explain a little about this system. This acronym, by the way, stands for IT Service Management &#8211; or IT Service Management in Portuguese.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This protocol model aims to offer a more efficient and quality IT service. It is related to <a href=\"https:\/\/itsmhouse.com\/what-is-itil-4-definitive-guide-to-itil-4\/\">ITIL<\/a>, since this is the most recognized framework in the use of ITSM.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is, ITSM, in practice, is a series of tools, software and strategies that are linked to IT. It constitutes a management structure and depends on the effective use of products, people, processes and partners.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, dealing with information security, it has its model that can be applicable. So, it is necessary to see how it can be used, as we will do now.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_definition_of_threat_modeling\"><\/span><span style=\"font-weight: 400;\">The definition of threat modeling<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Well, now it&#8217;s time to talk a little more about the applicability of ITSM in the practice of information security. After all, how to implement it in this area?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First of all, remember what information security means. This concept prioritizes the control of access to information, as the name suggests, with values \u200b\u200bsuch as confidentiality and integrity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Have you ever thought about your site being attacked, your company&#8217;s and customers&#8217; data being stolen, and all the consequences that can generate? Well, this is a headache that everyone wants to avoid.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is why it is necessary to learn to defend your company more effectively against possible security threats. And here comes a function of ITSM.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is because in your company and your management, it is necessary, first of all, to understand who can attack you and how. Knowing this, you can then think about which defenses you can use to reduce the chances of security breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this sense, concepts such as threat modeling are relevant, but they do not always receive the value they deserve. What your company should consider, in summary, is the following:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Critical assets: everything the company has, especially what is most relevant;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Threats and vulnerabilities: what is in a more vulnerable situation and can be attacked;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Defenses: how to prevent or minimize the chances of external attack.<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"ITSM_in_practice_implementing_a_threat_concept\"><\/span><span style=\"font-weight: 400;\">ITSM in practice: implementing a threat concept<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Now, it&#8217;s time to talk about ITSM in practice in terms of creating and implementing a security concept. This concept must deal exactly with what I discussed above: critical targets, threats and vulnerabilities, and defenses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, it is important to think about a few more issues. In summary, they are these:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">What am I operating, building or protecting?<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Who can attack me and how can they attack me?<\/span><\/li>\n<li><span style=\"font-weight: 400;\">How can the attack be beneficial to the intruder?<\/span><\/li>\n<li><span style=\"font-weight: 400;\">How can the attack be detrimental to my company or customer?<\/span><\/li>\n<li><span style=\"font-weight: 400;\">How can I detect, prevent, and respond to vulnerabilities and threats?<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Am I succeeding in this (prevention, detection, and response)?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Therefore, think of steps to produce the model. Firstly, plan and discover the degree of threats, collecting information related to the system and company management. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then, start building data flows, information, processes, and controls to help build the threat model. Next, put this model into practice in different teams within the company. <\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Evaluate_your_companys_threat_modeling\"><\/span><span style=\"font-weight: 400;\">Evaluate your company&#8217;s threat modeling<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In conclusion, it is important to understand that implementing the ITSM model allows for the creation of threat modeling systems, which aid in information security. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once you focus on vulnerabilities and potential threats, it helps security teams control them. Thus, you decrease the risk related to your business.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One way to apply ITSM in practice is by understanding security threats and how to deal with them. After all, this type of tool serves to improve the quality of IT service, with systems that adapt to the company&#8217;s needs. That being said, it is not difficult to understand that ITSM in practice can be [&hellip;]<\/p>\n","protected":false},"author":85233,"featured_media":148086,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8044,9438,9433],"tags":[9492,9518,9502,9452,9966,9592,9967,9493,9521,9968,9969,9970],"class_list":["post-148085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-t-itsmf","category-tutorials","tag-gestao-de-riscos-2","tag-information-security","tag-itil-2","tag-itsm-2","tag-modelagem-de-ameacas","tag-qualidade-de-servico","tag-quality-of-service","tag-risk-management","tag-seguranca-da-informacao-2","tag-threat-modeling","tag-vulnerabilidades-2","tag-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ITSM in practice: applications to information security - PMG Academy<\/title>\n<meta name=\"description\" content=\"Learn how to implement ITSM in information security to reduce the risk of security breaches and improve the quality of IT service.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITSM in practice: applications to information security\" \/>\n<meta property=\"og:description\" content=\"Learn how to implement ITSM in information security to reduce the risk of security breaches and improve the quality of IT service.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PMG Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/adriano.martinsantonio\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-20T15:56:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-16T17:39:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adriano Martins Antonio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adriano Martins Antonio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/\"},\"author\":{\"name\":\"Adriano Martins Antonio\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\"},\"headline\":\"ITSM in practice: applications to information security\",\"datePublished\":\"2023-04-20T15:56:20+00:00\",\"dateModified\":\"2025-12-16T17:39:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/\"},\"wordCount\":684,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg\",\"keywords\":[\"gest\u00e3o de riscos\",\"information security.\",\"itil\",\"itsm\",\"modelagem de amea\u00e7as\",\"qualidade de servi\u00e7o.\",\"quality of service.\",\"risk management\",\"seguran\u00e7a da informa\u00e7\u00e3o.\",\"threat modeling\",\"vulnerabilidades\",\"vulnerabilities\"],\"articleSection\":[\"Articles\",\"T-ITSMF\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/\",\"name\":\"ITSM in practice: applications to information security - PMG Academy\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg\",\"datePublished\":\"2023-04-20T15:56:20+00:00\",\"dateModified\":\"2025-12-16T17:39:02+00:00\",\"description\":\"Learn how to implement ITSM in information security to reduce the risk of security breaches and improve the quality of IT service.\",\"breadcrumb\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg\",\"width\":720,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Tutorials\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"T-ITSMF\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/t-itsmf\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ITSM in practice: applications to information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"name\":\"PMG Academy\",\"description\":\"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis\",\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\",\"name\":\"PMG Academy\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"width\":6964,\"height\":2938,\"caption\":\"PMG Academy\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\",\"name\":\"Adriano Martins Antonio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"url\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"contentUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"caption\":\"Adriano Martins Antonio\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adriano.martinsantonio\"],\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/author\/adrianopmgacademy-coms\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ITSM in practice: applications to information security - PMG Academy","description":"Learn how to implement ITSM in information security to reduce the risk of security breaches and improve the quality of IT service.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/","og_locale":"en_US","og_type":"article","og_title":"ITSM in practice: applications to information security","og_description":"Learn how to implement ITSM in information security to reduce the risk of security breaches and improve the quality of IT service.","og_url":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/","og_site_name":"PMG Academy","article_publisher":"https:\/\/www.facebook.com\/PMG.Academy.Brasil","article_author":"https:\/\/www.facebook.com\/adriano.martinsantonio","article_published_time":"2023-04-20T15:56:20+00:00","article_modified_time":"2025-12-16T17:39:02+00:00","og_image":[{"width":720,"height":480,"url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg","type":"image\/jpeg"}],"author":"Adriano Martins Antonio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adriano Martins Antonio","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#article","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/"},"author":{"name":"Adriano Martins Antonio","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7"},"headline":"ITSM in practice: applications to information security","datePublished":"2023-04-20T15:56:20+00:00","dateModified":"2025-12-16T17:39:02+00:00","mainEntityOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/"},"wordCount":684,"commentCount":0,"publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg","keywords":["gest\u00e3o de riscos","information security.","itil","itsm","modelagem de amea\u00e7as","qualidade de servi\u00e7o.","quality of service.","risk management","seguran\u00e7a da informa\u00e7\u00e3o.","threat modeling","vulnerabilidades","vulnerabilities"],"articleSection":["Articles","T-ITSMF","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/","url":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/","name":"ITSM in practice: applications to information security - PMG Academy","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg","datePublished":"2023-04-20T15:56:20+00:00","dateModified":"2025-12-16T17:39:02+00:00","description":"Learn how to implement ITSM in information security to reduce the risk of security breaches and improve the quality of IT service.","breadcrumb":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#primaryimage","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2025\/12\/homem_com_pe_de_cabra_na_mao_se_protegendo_contra_crime_digital_itsm.jpg","width":720,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/sandbox2.institutopmg.com\/en\/itsm-in-practice-applications-to-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Tutorials","item":"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/"},{"@type":"ListItem","position":2,"name":"T-ITSMF","item":"https:\/\/sandbox2.institutopmg.com\/en\/tutorials\/t-itsmf\/"},{"@type":"ListItem","position":3,"name":"ITSM in practice: applications to information security"}]},{"@type":"WebSite","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website","url":"https:\/\/sandbox2.institutopmg.com\/en\/","name":"PMG Academy","description":"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis","publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization","name":"PMG Academy","url":"https:\/\/sandbox2.institutopmg.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","width":6964,"height":2938,"caption":"PMG Academy"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PMG.Academy.Brasil"]},{"@type":"Person","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7","name":"Adriano Martins Antonio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","contentUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","caption":"Adriano Martins Antonio"},"sameAs":["https:\/\/www.facebook.com\/adriano.martinsantonio"],"url":"https:\/\/sandbox2.institutopmg.com\/en\/author\/adrianopmgacademy-coms\/"}]}},"_links":{"self":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/148085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/users\/85233"}],"replies":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/comments?post=148085"}],"version-history":[{"count":1,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/148085\/revisions"}],"predecessor-version":[{"id":149077,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/posts\/148085\/revisions\/149077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/media\/148086"}],"wp:attachment":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/media?parent=148085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/categories?post=148085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/tags?post=148085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}