{"id":36993,"date":"2025-11-17T23:37:05","date_gmt":"2025-11-18T04:37:05","guid":{"rendered":"https:\/\/staging.systech.ssdev.ca\/?page_id=36993"},"modified":"2025-11-18T00:47:06","modified_gmt":"2025-11-18T05:47:06","slug":"webinar-diversion-and-counterfeiting-uncovering-vulnerabilities","status":"publish","type":"page","link":"https:\/\/staging.systech.ssdev.ca\/pt\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","title":{"rendered":"Webinar | Desvio e falsifica\u00e7\u00e3o: Descobrindo vulnerabilidades"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"36993\" class=\"elementor elementor-36993\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-overlay-color=\"#22B8B0\" data-dce-background-image-url=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Systech-anti-counterfeit-wine-webinar-banner_12-2023-1.png\" class=\"elementor-element elementor-element-c45c5ee e-flex e-con-boxed e-con e-parent\" data-id=\"c45c5ee\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c89efd e-con-full e-flex e-con e-child\" data-id=\"6c89efd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f28def elementor-widget elementor-widget-heading\" data-id=\"1f28def\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">WEBINAR SOB DEMANDA\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-253b241 elementor-widget elementor-widget-heading\" data-id=\"253b241\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Desvio e falsifica\u00e7\u00e3o: Revelando vulnerabilidades<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b3c4743 e-flex e-con-boxed e-con e-parent\" data-id=\"b3c4743\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bbded74 e-con-full e-flex e-con e-child\" data-id=\"bbded74\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0af81b2 elementor-widget elementor-widget-text-editor\" data-id=\"0af81b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os produtos falsificados transcendem as fronteiras. O impacto da falsifica\u00e7\u00e3o vai al\u00e9m das implica\u00e7\u00f5es financeiras. Ela representa riscos \u00e0 sa\u00fade, aos meios de subsist\u00eancia e muito mais - afetando igualmente fabricantes, varejistas e consumidores.\u00a0<br \/><br \/>Reconhecer que os esfor\u00e7os de combate ao desvio e \u00e0 falsifica\u00e7\u00e3o exigem uma abordagem program\u00e1tica, n\u00e3o apenas a implementa\u00e7\u00e3o de tecnologia. Essa abordagem requer o alinhamento de estrat\u00e9gia, tecnologia, organiza\u00e7\u00e3o, treinamento e recursos para o sucesso. H\u00e1 uma necessidade real de colabora\u00e7\u00e3o para ajudar a identificar, rastrear e autenticar o produto certo.<br \/><br \/>Neste webinar: \"Desvio e falsifica\u00e7\u00e3o: Uncovering Vulnerabilities and Mitigating Risks\", saiba como superar barreiras e reduzir riscos de forma proativa, obtendo visibilidade da cadeia de suprimentos. Junte-se a n\u00f3s para discutir a identifica\u00e7\u00e3o de riscos de desvio e falsifica\u00e7\u00e3o, a implementa\u00e7\u00e3o de pr\u00e1ticas recomendadas e como envolver as principais partes interessadas para obter resultados bem-sucedidos.\u00a0<br \/><br \/>A abordagem desses riscos envolve a cria\u00e7\u00e3o de um programa corporativo com v\u00e1rias camadas de prote\u00e7\u00e3o do produto e da cadeia de suprimentos. A rastreabilidade da cadeia de suprimentos e os recursos de autentica\u00e7\u00e3o de produtos s\u00e3o essenciais para combater o desvio e a falsifica\u00e7\u00e3o. N\u00e3o perca!<\/p><p>\u00a0<\/p><h3>Objetivos de aprendizado:<\/h3><ol><li><p>Identificar onde o desvio e a falsifica\u00e7\u00e3o s\u00e3o mais prov\u00e1veis na cadeia de suprimentos<\/p><\/li><li><p>Como envolver e obter apoio de partes interessadas interdisciplinares essenciais<\/p><\/li><li><p>Como usar informa\u00e7\u00f5es de software e ferramentas inteligentes para refor\u00e7ar os esfor\u00e7os<\/p><\/li><li><p>Aplicar as melhores pr\u00e1ticas para combater o desvio e a falsifica\u00e7\u00e3o em todos os setores<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-508bdab e-con-full e-flex e-con e-child\" data-id=\"508bdab\" data-element_type=\"container\">\n\t\t<div data-dce-background-color=\"#F2F2F4\" class=\"elementor-element elementor-element-b652c84 e-con-full e-flex e-con e-child\" data-id=\"b652c84\" data-element_type=\"container\" id=\"content-form\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b23d18f elementor-widget elementor-widget-heading\" data-id=\"b23d18f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Acesse o webinar sob demanda\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cd3bd7 elementor-widget elementor-widget-html\" data-id=\"8cd3bd7\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script src=\"\/\/info.systechone.com\/js\/forms2\/js\/forms2.min.js\"><\/script> <form id=\"mktoForm_1079\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"pt\"\/><\/form> <script>MktoForms2.loadForm(\"\/\/info.systechone.com\", \"304-PSB-492\", 1079);<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7af9b99 e-flex e-con-boxed e-con e-parent\" data-id=\"7af9b99\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0cbc36c e-con-full e-flex e-con e-child\" data-id=\"0cbc36c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-605121e elementor-widget elementor-widget-heading\" data-id=\"605121e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Alto-falantes\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa7f39c e-grid e-con-full e-con e-child\" data-id=\"fa7f39c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-40b4e4c e-con-full e-flex e-con e-child\" data-id=\"40b4e4c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-31ddbbd e-con-full e-flex e-con e-child\" data-id=\"31ddbbd\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-38852a9 e-con-full e-flex e-con e-child\" data-id=\"38852a9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51ab190 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"51ab190\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\" class=\"attachment-medium size-medium wp-image-37030\" alt=\"\" srcset=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg 150w, https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW-12x12.jpg 12w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc3cade e-con-full e-flex e-con e-child\" data-id=\"fc3cade\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-818bcba elementor-widget elementor-widget-heading\" data-id=\"818bcba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Elisabeth Skoda\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c05bde8 elementor-widget elementor-widget-text-editor\" data-id=\"c05bde8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Editor geral, Packaging Europe<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09dd6c4 e-con-full e-flex e-con e-child\" data-id=\"09dd6c4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e52eb1 elementor-widget elementor-widget-text-editor\" data-id=\"3e52eb1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Com experi\u00eancia em tradu\u00e7\u00e3o e edi\u00e7\u00e3o de not\u00edcias on-line, Elisabeth trabalha na Packaging Europe desde 2006 e, nesse per\u00edodo, desenvolveu um amplo conhecimento do setor de embalagens e uma aprecia\u00e7\u00e3o das in\u00fameras inova\u00e7\u00f5es e desenvolvimentos que surgiram ao longo dos anos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f766688 e-con-full e-flex e-con e-child\" data-id=\"f766688\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-829e337 elementor-widget elementor-widget-heading\" data-id=\"829e337\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Anfitri\u00e3o<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f964c3 e-grid e-con-full e-con e-child\" data-id=\"6f964c3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-174c61f e-con-full e-flex e-con e-child\" data-id=\"174c61f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3d83f28 e-con-full e-flex e-con e-child\" data-id=\"3d83f28\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5dcf36e e-con-full e-flex e-con e-child\" data-id=\"5dcf36e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4bd43 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"7e4bd43\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW.jpg\" class=\"attachment-medium size-medium wp-image-37022\" alt=\"\" srcset=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW.jpg 150w, https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Dave-DeJean_BW-12x12.jpg 12w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53aa1ae e-con-full e-flex e-con e-child\" data-id=\"53aa1ae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5669dcf elementor-widget elementor-widget-heading\" data-id=\"5669dcf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Dave DeJean\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dedea9 elementor-widget elementor-widget-text-editor\" data-id=\"4dedea9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Vice-presidente, contas estrat\u00e9gicas globais, Systech<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2dc41d e-con-full e-flex e-con e-child\" data-id=\"f2dc41d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0e8a916 elementor-widget elementor-widget-text-editor\" data-id=\"0e8a916\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dave DeJean \u00e9 respons\u00e1vel pelas oportunidades estrat\u00e9gicas de neg\u00f3cios da Systech. Ele ap\u00f3ia e educa os clientes e as partes interessadas sobre as pr\u00e1ticas recomendadas para a implementa\u00e7\u00e3o de solu\u00e7\u00f5es empresariais de serializa\u00e7\u00e3o, rastreabilidade e autentica\u00e7\u00e3o. Dave tem mais de 35 anos de conhecimento de mercado e experi\u00eancia pr\u00e1tica em desenvolvimento de solu\u00e7\u00f5es e metodologia de projetos para conformidade regulat\u00f3ria, prote\u00e7\u00e3o de marcas e rastreabilidade da cadeia de suprimentos. Ele \u00e9 especialista no assunto em sistemas de execu\u00e7\u00e3o de embalagens, identifica\u00e7\u00e3o de produtos e transpar\u00eancia da cadeia de suprimentos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>WEBINAR SOB DEMANDA Diversion and Counterfeiting (Desvio e falsifica\u00e7\u00e3o): Descobrindo vulnerabilidades Os produtos falsificados transcendem as fronteiras. O impacto da falsifica\u00e7\u00e3o vai al\u00e9m das implica\u00e7\u00f5es financeiras. Ela representa riscos \u00e0 sa\u00fade, aos meios de subsist\u00eancia e muito mais - afetando igualmente fabricantes, varejistas e consumidores.  Reconhe\u00e7a que os esfor\u00e7os de combate ao desvio e \u00e0 falsifica\u00e7\u00e3o exigem uma abordagem program\u00e1tica, n\u00e3o apenas a implementa\u00e7\u00e3o de tecnologia. Essa abordagem requer o alinhamento de estrat\u00e9gia, tecnologia, organiza\u00e7\u00e3o, treinamento e [...]<\/p>","protected":false},"author":41,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-36993","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech<\/title>\n<meta name=\"description\" content=\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.systech.ssdev.ca\/pt\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech\" \/>\n<meta property=\"og:description\" content=\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.systech.ssdev.ca\/pt\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Systech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/systechone\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T05:47:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@systechone\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\",\"name\":\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech\",\"isPartOf\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\",\"datePublished\":\"2025-11-18T04:37:05+00:00\",\"dateModified\":\"2025-11-18T05:47:06+00:00\",\"description\":\"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\",\"contentUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.systech.ssdev.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#website\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/\",\"name\":\"Systech\",\"description\":\"a solutions division of Markem-Imaje\",\"publisher\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.systech.ssdev.ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#organization\",\"name\":\"Systech International\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png\",\"contentUrl\":\"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png\",\"width\":551,\"height\":124,\"caption\":\"Systech International\"},\"image\":{\"@id\":\"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/systechone\/\",\"https:\/\/x.com\/systechone\",\"https:\/\/www.linkedin.com\/company\/systech-international\",\"https:\/\/www.youtube.com\/channel\/UC1fz6UKo5eMa1WxgVMGRhpA\/videos\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.systech.ssdev.ca\/pt\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","og_locale":"pt_BR","og_type":"article","og_title":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","og_description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","og_url":"https:\/\/staging.systech.ssdev.ca\/pt\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","og_site_name":"Systech","article_publisher":"https:\/\/www.facebook.com\/systechone\/","article_modified_time":"2025-11-18T05:47:06+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@systechone","twitter_misc":{"Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","url":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/","name":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities - Systech","isPartOf":{"@id":"https:\/\/staging.systech.ssdev.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","datePublished":"2025-11-18T04:37:05+00:00","dateModified":"2025-11-18T05:47:06+00:00","description":"ON-DEMAND WEBINAR Diversion and Counterfeiting: Uncovering Vulnerabilities Counterfeit products transcend borders. The impact of counterfeiting extends","breadcrumb":{"@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#primaryimage","url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg","contentUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2025\/11\/Elisabeth_Skoda_BW.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/staging.systech.ssdev.ca\/webinar-diversion-and-counterfeiting-uncovering-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.systech.ssdev.ca\/"},{"@type":"ListItem","position":2,"name":"Webinar | Diversion and counterfeiting: Uncovering vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/staging.systech.ssdev.ca\/#website","url":"https:\/\/staging.systech.ssdev.ca\/","name":"Systech","description":"a solutions division of Markem-Imaje","publisher":{"@id":"https:\/\/staging.systech.ssdev.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.systech.ssdev.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/staging.systech.ssdev.ca\/#organization","name":"Systech International","url":"https:\/\/staging.systech.ssdev.ca\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/","url":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png","contentUrl":"https:\/\/staging.systech.ssdev.ca\/wp-content\/uploads\/2018\/04\/systech-logo.png","width":551,"height":124,"caption":"Systech International"},"image":{"@id":"https:\/\/staging.systech.ssdev.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/systechone\/","https:\/\/x.com\/systechone","https:\/\/www.linkedin.com\/company\/systech-international","https:\/\/www.youtube.com\/channel\/UC1fz6UKo5eMa1WxgVMGRhpA\/videos"]}]}},"_links":{"self":[{"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/pages\/36993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/comments?post=36993"}],"version-history":[{"count":16,"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/pages\/36993\/revisions"}],"predecessor-version":[{"id":37079,"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/pages\/36993\/revisions\/37079"}],"wp:attachment":[{"href":"https:\/\/staging.systech.ssdev.ca\/pt\/wp-json\/wp\/v2\/media?parent=36993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}