![《2024網(wǎng)絡(luò)安全重要趨勢(shì)》_第1頁(yè)](http://file4.renrendoc.com/view14/M01/21/25/wKhkGWYNGEmAHCoNAAJmq8-0_tw754.jpg)
![《2024網(wǎng)絡(luò)安全重要趨勢(shì)》_第2頁(yè)](http://file4.renrendoc.com/view14/M01/21/25/wKhkGWYNGEmAHCoNAAJmq8-0_tw7542.jpg)
![《2024網(wǎng)絡(luò)安全重要趨勢(shì)》_第3頁(yè)](http://file4.renrendoc.com/view14/M01/21/25/wKhkGWYNGEmAHCoNAAJmq8-0_tw7543.jpg)
![《2024網(wǎng)絡(luò)安全重要趨勢(shì)》_第4頁(yè)](http://file4.renrendoc.com/view14/M01/21/25/wKhkGWYNGEmAHCoNAAJmq8-0_tw7544.jpg)
![《2024網(wǎng)絡(luò)安全重要趨勢(shì)》_第5頁(yè)](http://file4.renrendoc.com/view14/M01/21/25/wKhkGWYNGEmAHCoNAAJmq8-0_tw7545.jpg)
版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
Cybersecurityconsiderations2024Technology
innovations
demandstrategic
pragmatism.KPMG
International/cyberconsiderationsMeetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024ForewordForewordAs
2024unfolds,organizationalleaders,fromtheCEOdown,havemuchontheirplates.Theyarecontendingwithdiversechallengesaroundachievingsustainedgrowth,navigatingtheimpactandrisksofemergingtechnology,andattractingandretainingtalent,to
namejustafew.
Fortheirpart,
ChiefInformationSecurityOf?cers
(CISOs)areincreasinglybeingviewedasproactiveco-stewardsoftheseongoingbusinessimperatives—notmerelythecavalryleaderridinginto
savethedayduringacrisis.ThisevolvingthreatlandscaperequiresorganizationsandtheirCISOsto
viewsecuritythroughanew,
morepragmaticlens.Morethaneverbefore,theymustbalancedatasecurityandprivacywiththebroaderobjectivesofthebusiness.Fromacybersecurityperspective,theimpactsofsocietal,economic,political,andregulatorydevelopmentsaremoreconsistentlyfeltgloballytoday.Thesimplereasonistheworldismoreconnected.Themostacuteeffectoftheconnectedbusinessecosystemcontinuesto
bewithinglobalsupplychains—forallpracticalpurposes,therearevirtuallynoregionsoftheworldthatareisolatedanymore.InourannualCybersecurityconsiderationsreport,adiversecross-sectionofglobalKPMG
cybersecurityspecialistsexploreseightconsiderationsthatCISOsandtheirteamsareencouragedto
prioritizeinthecomingyearto
supporttheorganization’sbusinessgrowthobjectivesbymitigatingtheimpactofspeci?ccyberincidentsandreducingoverallcyberriskexposure.However,thereremainlocalnuances.Forexample,thereareregulatoryrequirementsto
whichbusinessesmustadherethatremainuniquelyregional,suchascertainmarketsbeingmoresensitiveto
theprotectionofpersonaldataandnewrulesaroundresponsibleAI,
criticalinfrastructureandsupplychains.Organizationsworldwidefacemanycybersecuritychallengesrequiringtheimplementationofcontrolsto
buildandembedresilience,meetregulatorymandates,andreduceoverallrisk.However,therapidemergenceofarti?cialintelligence(AI)
asastrategictoolforbothlegitimateandnefariouspurposesisrapidlymovingupthelist.ThedemocratizationofAI
—theseadvancedtechnologysolutionsandmodelsarenowlargelyaccessibleto
anyonewithacreditcardviathecloud—hasatoncerevealednewpathsto
valuecreationandexposedsigni?cantpotentialrisks.AI
isprovingto
beatrueorganizationalgame-changer,includingforsecurityteams.There’saglobalfocuswithinthecybersecurityuniverseoncomplianceingeneral,withare?nedeyetowardtheoverallburdenofregulation,aswellasthediversityofvariousreportingrequirements.As
aresult,companiesareputtingmoreemphasisonembeddingprivacyandsecuritywithinthewaytheycomplywithabroadrangeoftrans-borderregulatoryrequirementsandregimes.Thisisofparticularinterestwhenitcomesto
buildingandgoverningresponsibleAI
systems,ensuringcustomerprivacy,andenactingguidelinesaroundcriticalinfrastructure,supplychains,smartproducts,andresilience.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20242Meetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024Atthesametime,cybersecuritybudgetsmayhaveto
bemoreobjectivelyjusti?edmovingforwardasorganizationsdealwitheconomicuncertainty.ManyCISOsareseeing?atbudgets,notnecessarilyreduced,assomeofthatspendisdivertedto
organizationalinnovation,particularlyAI
andautomationsolutions.Thisnoteworthydevelopmentrequiressecurityteamsto
engageintechnologyrationalizationandbudgetoptimization—essentially,doingmorewithless.Fundamentally,thisreportexploresfromvariousangleswhatisperhapsthecentralaspirationforexecutivesacrosstheenterprise:keepingtheirorganizationsresilient.Bottomline,ifadataleakornetworkbreachoccurs,howquicklycantheorganizationresumeregularoperations,andhowcantheimpactoncustomersbeminimized?Thisisemblematicoftheresilienceagendathatcanbeseenwithinmanyofthemostrecentlyproposedregulations,particularlythosefocusingoncriticalinfrastructuresectors.Inmanycases,theemphasisisnowonresponseandrecovery,aswellasmitigatingharmto
customers.Thisisadifferentlensthroughwhichto
viewsecurityrelativeto
thetraditionalperspective.Whileeconomicheadwindsdrivebudgetpressures,thereisagrowingviewthatcybersecurityhasmaturedto
thepointthatorganizationscantriminvestment.Further,securityfunctionalityisnowembeddedwithinotherITandtransformationbudgetsratherthanbeingacentralbudgetprovision.Also,theshiftto
acloud-based
security-as-a-service
approachembedssecuritycostsintocompanies’broaderoperatingexpensesinawaywehaven’tseenpreviously.Cybersecuritymustbeviewedasanever-evolvingongoingendeavor.Themoreorganizationsacceptcyberincidentsasinevitableyetmanageable,thebettertheirchancesofachievingthatbalancebetweenpreparationandresilience.Inthisenvironment,IencourageCISOsto
sharpentheircyberriskquanti?cation(CRQ)process,whichhelpsexpresstheimpactofcybersecurityriskin?nancialtermsusingmathematicalmodelingto
illustrateriskthroughmeasurablevariables.1LookingatriskthroughaCRQlenscaneffectivelyAkhilesh
Tutejademonstratereturnoninvestmentandinvestmentprioritiesto
leadershipandtheBoard,ensuringtheorganizationunderstandsthethreatfrombothtechnologyand?nancialperspectives.GlobalCyberSecurityLeaderKPMGInternational1Forrester,
TheCyberRiskQuanti?cationLandscape,Q42022,November29,2022.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20243Eight
key
cybersecurity
considerations
for
2024Click
oneach
considerationtolearnmore.Meet
customer
expectations,Embed
cybersecurity
andimprove
trustprivacy,
for
good010204With
cyberthreatsanddata
privacyconcernsgrowing,CISOsshouldbeseekingtoworkcloselywithstakeholdersacrosstheorganizationtomaintain
trust
byensuringoperationsareresilientintheeventofanincident.The
actofembeddingsecurity
acrosstheorganizationshouldbeviewed
asanexerciseindrivingoperationalexcellence.Navigate
blurring
globalModernize
supply
chain
security03
boundariesDespitethechallenges
andcompetingpriorities,ensuringthesupplierandpartnerecosystem
issecureshouldnotbeabottleneck;
itshouldbea
businessenabler.A
centralconsiderationthatorganizationsshouldexamine
how
tomosteffectivelynavigate
theincreasinglycomplex
globalbusinesslandscapetoensureresilienceandbusinesscontinuity.Unlock
the
potential
ofAI
—
carefullySupercharge
security
with06
automation0507Securityandprivacyleadersshouldbesupportingthebusinessobjectivesrelianton
AIanddeterminehowtoharnessthisgame-changingtechnologyeffectivelyandresponsibly.As
operatingmodelsdigitize,
securityteamsshouldautomateandupgradetheirprocessestokeep
pace.Align
cybersecurity
withorganizational
resilienceMake
identity
individual,
notinstitutional08Organizationsshouldfinda
waytocreatea
broad-rangingcultureof
resilientsecuritythroughouttheenterprise
andseektoensureallstakeholdersareon
thesamepage.Driven
by
expanding
businessmodels,it’svital
thatorganizationsnow
view
identitynotinisolationbutfroma
broadperspective.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20244Meetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024Consideration
1Meet
customerexpectations,improve
trustIncreasing
trust
should
be
high
on
the
cyberagenda
in
relation
to
how
video
and
audio?les
are
used
in
the
creation
of
deepfakes,
theimpact
of
which
can
be
grave
for
privacy
andperhaps
even
democracy.Mika
LaaksonenPartnerGlobalCyberSecurityESGLeaderKPMGinFinlandConsumers,employees,suppliers—everycorporatestakeholder—expectbusinessestopursuegrowthandpro?ts.Butincreasingly,companiesareexpectedtooperateinasociallyresponsiblemanner,
aswell.Organizationsshouldstrengthentheconnectionbetweensecurityandprivacyandenvironmental,social,andgovernance(ESG)factors.
Thisbondisbeingincreasinglyrecognizedacrossthebusinessecosystem,particularlyby
ESGratingservicesastheysearch
for
greatertransparencyinmeasuringandcomparingorganizations.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20245Meetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024Indeed,
roughly
two-thirds
ofconsumers
will
pay
moreforsustainable
products,
although
two-thirds
of
retailexecutives
are
skepticalthat
theyactually
will
pay
more.However,while
consumers
may
be
okay
with
payingextra
for
security,privacy
and
social
responsibility,thesefactorsare,forthemoment,“tablestakes,”
thecostofdoingbusiness,althoughtheyarelikelyto
hitthebottomlinesoonerratherthanlater.The
importance
of
ESG
and
how
security
improvelaborpolicies,andensureworkplacediversityand
privacy
fit
into
the
bigger
pictureandequality,to
namejustafew
items.4Addressingcybersecurityandprivacyspeci?callyandESGbroadlyhavebecometopcorporateand,byextension,CISO,priorities.TherearedifferentAccordingto
theKPMG
2023
CEOOutlook,69
percentofCEOshaveembeddedESGintotheirbusinessasregulationsforspeci?cregionsandindustries,andameansofcreatingvalue,and50
percentanticipatethoseguidelinesneedto
engendertrust.Thisissigni?cantreturnsfromthoseeffortsoverthenextimportantfromacomplianceperspectivebutalsothreeto
?veyears.Incasesinvolvingprivateequityorventurecapital,theethicallensthroughwhichthese?rmsviewtheirinvestmentsisworthnoting.Manynowlookforassurancesoftheappropriatelevelofcybersecurityandprivacymanagement.Ultimately,they'reconcernedaboutthebranddamagecybereventscanbringto
theorganizationswheretheyinfusefunds.noteworthybecauseB2BcustomersandB2CWhileenvironmentalaspectsoftheESGagendahavegarneredthemostattention,governanceelementssuchascybersecurityandprivacyarelesswell-developed.Withcyberthreatsanddataprivacyconcernsgrowing,CISOsneedto
workcloselywiththeirESGcounterpartsto
ensurethat,intheeventofanincident,operationsareresilientandcontinuityplansarereadyforactivation.consumershavediscreteexpectationsdirectlyimpactedbythevariousrules.Individualconsumerscanpurchasealternativeproductsorservicesifthey'renothappywiththeprovider’sactionsregardingtheirpersonaldata,privacyandresponseto
breaches.Infact,82
percentpreferabrand’svaluesto
alignwiththeirown,and75percentsaidtheywouldabandonabrandoveraByembeddingcyberandprivacyconsiderationsintosocialresponsibilityprogramsandprotectingcustomerdata,organizationscanincreasethechancesofmaintainingtheirreputationsandtrustamongcustomers,evenintheeventofamajorbreach.con?ictinvalues.
Givenachoice,mostconsumers2prefercompaniesthatprioritizesecurity,privacy,andsustainabilitybyadheringto
ESGstandards.Increasingly,
there's
a
big
role
for
cyberto
play
regarding
AI
and
data
ethics.Determining
that
the
data
used
to
train
AIalgorithms
is
accurate,hasn’t
been
corrupted,and
is
free
from
bias
is
a
herculean
and,perhaps
ultimately,
impossible
task,but
wellworth
the
effort.ThisisespeciallytrueontheB2Bside,wherecorporatecustomersvaluesafeguardingtheircon?dentialdataandintellectualproperty.Moreandmoreindustrieshaveregulatoryrequirementsforcybersecurityanddataprivacy,andorganizationsthatcomplywiththeseForconsumerswhosharepersonalinformationwithpublicandprivateserviceproviders,thereisanexpectationthattheirdatawillbeprotectedandthatitwillnotbeusedforpurposesotherthanwhatthey’vesupplieditfor.regulationsarepreferredbystakeholders.
Formany3organizationsoperatinginB2Bindustries,thisismorethana“nice
to
have,”
withregulatoryobligations?owingdirectlyfrom?rmsinregulatedindustriestotheirsuppliers,whocouldbetarnishedbyassociationifthebrandexperiencesasigni?cantcyberevent.Atthesametime,there’s
anexpectationthat,inthepursuitoftheirbusinessobjectives,organizationswillactinasociallyresponsiblemannerto
reducetheircarbonfootprint,supporttheirlocalcommunities,Caroline
RivettPartnerGlobalCyberSecurityLife
SciencesLeaderKPMGintheUK234Google
Cloud,
“New
research
shows
consumers
more
interested
in
brands’
values
than
ever,”
April
27,
2022.KPMG,
Cybersecurity
in
ESG,
2023.First
Insight/Wharton
School
of
the
University
of
Pennsylvania,
“The
Sustainability
Disconnect
Between
Consumers
and
Retail
Executives,”
January
2022.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20246Meetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024The
social
benefits
of
actively
embedding
proliferatingdigitalcommunicationschannels.cybersecurity
into
the
ESG
agendafrictionless.
People
largely
don'tcare
untilsomething
badmaterializes,and
it
seemsasthough
they
want
theworkofsecurity
tohappen
“behind
the
curtain.”Privacycontrolscanalsoplayakey
roleinlimitingtheexploitationandmisuseofpersonalinformationwithoutconsentorknowledge.ThisisvitalinmaintainingtheA
big
part
of
theequation
is
demonstrating
tocustomersthat
cybersecurity
is
an
organizational
imperative
—
itsimply
istherightthing
todo.
Organizations
shouldapproach
thisas
though
they
aretrainingtheircustomersand
clients
tounderstand
and
care
about
theimplicationsofcyber
awarenessand
provethat
what
they'redoingisn’t
just
another
to-do
itembut
a
vital
service.The
scope
of
theESG
dialogue
needs
tobe
broadened
—at
manyorganizations,
it's
not
yet
common
tobe
talkingabout
cybersecurity
and
privacy
in
thecontextofESG.publictrustinorganizations.Many
decarbonization
and
CO
reduction
programs2relyon
digital
technologies
andautomated
systems
tomonitorand
manage
energy
production,
distribution,
andconsumption.
As
ef?cient
asthese
tools
can
be,theycan
also
create
unforeseencybersecurity
vulnerabilitiesand
requirea
high
level
ofdata
protection.Strategicallyembedding
cyber
can
helpmitigatethreats,
reduce
therisk
ofdata
breaches
and
ensureregulatory
compliance.Intoday’senvironment,therearedeepissueswiththesocialcontractbetweenorganizations,employeesandconsumersrelatingto
dataprotection.Increasingtrustshouldbehighonthecyberagendawhenitcomesto
howvideoandaudio?lesareusedinthecreationofdeepfakes—imagery,video,oraudiofeaturingaspeci?cindividualthatisreplacedwithanotherperson'sfaceorvoiceormanipulatedto
givetheimpressiontheindividualdidorsaidsomethingtheydidnot.Trainingpeople
outside
yourorganization
is
itself
anexercise
inESG
maintenance.Cybersecurity
AwarenessMonth
isanexample
of
how
governmentand
businessesworktogether
to
ensurethat
employees
and
consumersappreciate
the
basics
ofcybersecurity
to
avoidthe
mostobvious
risks.Finally,there's
asubstantialsocialresponsibilitydimensionto
bothcybersecurityandprivacywhereorganizationsshouldworkwithB2CandB2Bcustomersto
helpthembemorecyberaware.Banksdoitroutinely,andretailersaredoingitmoreandmore.There’salsoaconnectionto
supplychainandecosystemsecurity,whereimprovingthesecurityofthevendorecosystemiscritical.Deepfakesaredif?cultto
combatsince,inmanyinstances,it’supto
theaudienceto
interpretwhetherthevideooraudioisrealorfraudulent.Organizationsmustbevigilantaboutidentifyingandremovingthese?lesandshouldparticipateineducatingthebroaderpubliconthesubject.Increasingly,there's
abigroleforcyberto
playregardingAI
anddataethics.Determiningthatthedatausedto
trainAI
algorithmsisaccurate,hasn’tbeencorrupted,andisfreefrombiasisaherculeanand,perhapsultimately,impossibletask,butwellworththeeffort.There
is
no
such
thingas
100
percent
security.Despiteall
theprecautions,
incidents
do
happen.
In
the
event
ofacyber
incident,
makea
quick
decision
about
whether
youneed
todisclose
what
happened
and,
if
so,
howmuchinformation
you’reprepared
—
or
compelled
—
to
share.5Do
people
really
care
whether
a
business
It'svital
tobe
open
and
honest;
good
communication
canlead
customers
totrust
anorganization
even
morethanhas
a
cyber
incident
if
it’s
managed?theymay
have
beforethe
incident.Theoretically,most
people
would
probably
say
that
theydon't
wanta
company
whose
products
or
services
theyuse
tosuffer
a
data
breach.
But
those
same
people
don'twant
topay
moreand
wanttouchpoints
tobe
quick
andPrivacyandcybersecurityalsoplayvitalrolesinprotectingfreedomofspeechandsecuringtoday’s5KPMG
International,
“Maintaining
cyber
vigilance
and
staying
resilient,”
2023.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20247Meetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024Learn
moreSuggested
actionsConnectwithyourorganization’s
ESGteamtodeterminewhethertheyconsidercyberakey
aspectoftheirmandate.Ifnot,worktobuildawarenessofhow
andwhy
it’s
importanttoallthreeareasofESG.Cybersecurity
in
ESGIt'stimetoviewESGandcybersecuritythroughthesamelens.Be
practical.Effective
cybersecurityisnotasmuch
aboutgettingbusinesspartnerstodothingsdifferentlyasit’s
aboutreframingtheconversationacrosstheenterprisetoinspireotherareasoftheorganizationtoinfusesecurityintowhattheyalreadydo.SharpenyourglobalregulatoryintelligencearoundcyberingeneralandESGandprivacyinparticulartoensuretimelycomplianceandreporting;keeptrack
ofandremainfamiliarwithever-increasingregulationsandtheireffects
onyourcyberefforts.KPMG
global
tech
report:
ESGHow
businessescanusetechnologyasanopportunitytotackletheirESGambitions.Road
to
readinessKPMGESG
AssuranceMaturityIndex2023.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20248Meetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024Consideration
2Embedcybersecurityand
privacy,for
goodSecurity,fromtheCISOdownthroughtheirentireteam,isaverydifferent
roletoday.
Cyberisbecomingmoreembeddedincorebusinessprocesses.That
realityisbeingre?ectedinamoveaway
fromacentralizationofcybersecurityintheCISOroletoafederatedmodel,inwhich
theCISOistheconductoroftheorchestra,establishingtheframeworks,assessingrisk,andprovidingimplementationsupport.Securityisintegraltoeveryfunctionacrosstheorganization,fromfrontof?ce
toback,
andmanyleadersnow
acknowledgethevalueofintegratingasecuritymindsetintotheirverydifferent
businessculturesandprocesses.?
2024
Copyright
owned
by
one
or
more
of
the
KPMG
International
entities.
KPMG
International
entities
provide
no
services
to
clients.
All
rights
reserved.Cybersecurity
considerations
20249Meetcustomerexpectations,improve
trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,
for
goodNavigate
blurringglobalboundariesModernize
supplychain
securityUnlock
thepotentialof
AI—
carefullySupercharge
securitywithautomationMake
identity
individual,notinstitutionalCyber
strategiesfor
2024Business
models
and
technology
arechanging
and
impacting
securityThe
irony
is
it
doesn'ttaketheCISOto
dothat.Managingtheserisks
requiresa
cultural
shift
across
the
businesstoembracesecurity
as
part
of
theorganization’sstandardoperating
procedures.CISOsdon'tinstall
patches,
andthey
don'tmanageoperations.Security
teamsshoulddetermine
how
andwhereto
embedcertain
securitytasks
in
thebusinessand
monitor
thosetasks
to
ensurethey
arecarried
outproperly.This
ishow
we
seesecurityteams
evolving.Embeddingsecurityintobroaderbusinessshouldbeviewedasanexerciseindrivingoperationalexcellence.Securityteamsshoulddescribeanddemonstratewhat
“good”lookslikeandinspireembeddedsecurityprofessionalsacrosstheenterprisetomanagetowardthatvision.It’s
amatterofestablishingappropriateguardrailstoenableasecure-by-designapproachtobeembedded,andthenintegratingtherighttoolingandtemplatesintodevelopmentenvironments.Whetheryou
makea
widget,delivera
service,
orcreateinformation,operatingmodels
areincreasinglycloud-based,which,
inconcertwithothernew
technologies,
isbeingusedtoincreasescalability,reducecosts,generaterevenue,and
widen
pro?tmargins.Theautomotiveindustryisagoodexampleoftransformingbusinessmodels.Carstodayhave
becomehugetabletsonwheels.People
areorderingpizzafromtheroadandnoteven
usingthephone.Somuchtechnologyhasbeenaddedtogas-poweredcars,nottomentionelectricvehicles,thattheyhave
becomearguablythemostsophisticatedproductavailabletoretailconsumers.It's
going
tobeamatter
of
“insourcing”to
nudgesecurity
closertothe
customeroroutsourcingtoa
third-party
service
provider
toef?ciently
leverage
specializedskills
that
may
notexist
within
the
organization.Manyorganizations
struggle
with
the
idea
ofsecurity
asa
corecompe
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 人民版道德與法治九年級(jí)上冊(cè)第七課《生命之間》配套聽課評(píng)課記錄
- 湘教版七年級(jí)數(shù)學(xué)下冊(cè)第2章2.1.2冪的乘方與積的乘方(第1課時(shí))聽評(píng)課記錄
- 人教版七年級(jí)數(shù)學(xué)上冊(cè):1.2.1《有理數(shù)》聽評(píng)課記錄
- 冀教版數(shù)學(xué)九年級(jí)上冊(cè)《平行線分線段成比例》聽評(píng)課記錄1
- 《兩漢的科技和文化》聽課評(píng)課記錄1(新部編人教版七年級(jí)上冊(cè)歷史)
- 蘇教版四年級(jí)數(shù)學(xué)下冊(cè)期末復(fù)習(xí)口算練習(xí)題三
- 湘教版數(shù)學(xué)八年級(jí)上冊(cè)《小結(jié)練習(xí)》聽評(píng)課記錄
- 聽評(píng)課記錄數(shù)學(xué)二年級(jí)
- 小學(xué)生營(yíng)養(yǎng)餐飯?zhí)霉ぷ魅藛T聘用合同范本
- 人員派遣租賃協(xié)議書范本
- 防洪防汛安全知識(shí)教育課件
- (正式版)FZ∕T 80014-2024 潔凈室服裝 通 用技術(shù)規(guī)范
- 新起點(diǎn)英語(yǔ)二年級(jí)下冊(cè)全冊(cè)教案
- 【幼兒園戶外體育活動(dòng)材料投放的現(xiàn)狀調(diào)查報(bào)告(定量論文)8700字】
- 剪映專業(yè)版:PC端短視頻制作(全彩慕課版) 課件 第3章 短視頻剪輯快速入門
- 湖南省長(zhǎng)沙市開福區(qū)青竹湖湘一外國(guó)語(yǔ)學(xué)校2023-2024學(xué)年九年級(jí)下學(xué)期一模歷史試題
- 帶狀皰疹與帶狀皰疹后遺神經(jīng)痛(HZ與PHN)
- 漢密爾頓抑郁和焦慮量表
- 風(fēng)電場(chǎng)事故案例分析
- 前列腺癌的診斷與治療
- 人教版八年級(jí)數(shù)學(xué)初中數(shù)學(xué)《平行四邊形》單元教材教學(xué)分析
評(píng)論
0/150
提交評(píng)論