½ÃÀ庸°í¼­
»óǰÄÚµå
1317051

IDCÀÇ »çÀ̹ö º¸¾È ¿ª·® Æò°¡ ÇÁ·¹ÀÓ¿öÅ© 1.0

IDC¢¥s Cybersecurity Capabilities Assessment Framework 1.0

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 14 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC Perspective¿¡¼­´Â IDCÀÇ »çÀ̹ö º¸¾È ¿ª·® Æò°¡ ÇÁ·¹ÀÓ¿öÅ© 1.0¿¡ ´ëÇØ ³íÀÇÇϰí 7°³ ¿µ¿ª¿¡ °ÉÃÄ »çÀ̹ö º¸¾È Áغñ »óŸ¦ Æò°¡ÇÕ´Ï´Ù. ¿ø°Ý ±Ù¹«¿Í °°Àº °üÇàÀÇ È®´ë, À§Çù ÇàÀ§ÀÚÀÇ »õ·Î¿î °ø°Ý ±â¹ý Çõ½Å°ú ÇÔ²² Çö´ë IT ȯ°æÀÇ º¹À⼺ÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ±â¾÷Àº »çÀ̹ö º¸¾È À§Çù°ú À§ÇèÀ» °ü¸®ÇϱⰡ ±× ¾î´À ¶§º¸´Ù ¾î·Á¿öÁ³½À´Ï´Ù. ÀÌ·¯ÇÑ °úÁ¦¸¦ ÇØ°áÇϱâ À§ÇØ ±â¾÷Àº ´ÙÀ½°ú °°Àº 7°¡Áö ÁÖ¿ä ¿µ¿ª¿¡¼­ »çÀ̹ö º¸¾È ¸ð¹ü »ç·Ê¸¦ ±¸ÇöÇØ¾ß ÇÕ´Ï´Ù. ³×Æ®¿öÅ© º¸¾È, ¿£µåÆ÷ÀÎÆ® º¸¾È, ½Å¿ø ¹× µðÁöÅÐ ½Å·Ú, µ¥ÀÌÅÍ º¸¾È, ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È, ´ëÀÀ, º¹±¸ ¹× º¹¿ø·Â, GRC(°Å¹ö³Í½º, ¸®½ºÅ©, ÄÄÇöóÀ̾ð½º)ÀÇ 7°³ÀÔ´Ï´Ù. IDCÀÇ »çÀ̹ö º¸¾È ¿ª·® Æò°¡ ÇÁ·¹ÀÓ¿öÅ© 1.0Àº ±â¾÷ÀÌ Ä§ÇØ ¹ß»ý À§ÇèÀ» ÃÖ¼ÒÈ­ÇÏ°í ¼º°øÀûÀÎ °ø°ÝÀÌ ¹ß»ýÇÒ °æ¿ì ±× ¿µÇâÀ» ¿ÏÈ­Çϱâ À§ÇØ °¢ ¿µ¿ª¿¡¼­ ±¸ÇöÇØ¾ß ÇÏ´Â Çʼö »ç·Ê¿Í Àü·«À» ½Äº°ÇÕ´Ï´Ù. ÀÌ ÇÁ·¹ÀÓ¿öÅ©´Â ±â¼úÀû ¼Ö·ç¼Ç¿¡ ´ëÇÑ ³íÀÇ ¿Ü¿¡µµ ¾ö°ÝÇÑ »çÀ̹ö º¸¾È Àü·«ÀÇ Åä´ë°¡ µÇ´Â ÀÌÇØ°ü°èÀÚ ±³À°, ´Ù¸¥ °æ¿µÁø ¹× ±â¾÷ ÀÌ»çȸ¿ÍÀÇ CISO Ä¿¹Â´ÏÄÉÀ̼ǰú °°Àº ºñÁî´Ï½º °üÇàÀ» °­Á¶ÇÕ´Ï´Ù. "»çÀ̹ö º¸¾È Ãø¸é¿¡¼­´Â ±â¼úÀû ¼Ö·ç¼Ç°ú ¸ð¹ü »ç·Ê¿¡ ¾ÈÁÖÇÏ´Â °Í¸¸À¸·Î´Â ÃæºÐÇÏÁö ¾Ê½À´Ï´Ù."¶ó°í IDC IEP(IT Executive Programs)ÀÇ adjunct research advisor, Chris Tozzi´Â ¸»ÇÕ´Ï´Ù. "°¡Àå ź·ÂÀûÀÎ ±â¾÷Àº º¸¾ÈÀ» ´Ü¼øÇÑ ±â¼úÀû ³ë·ÂÀÌ ¾Æ´Ñ ºñÁî´Ï½º ¿ì¼± ¼øÀ§·Î »ï°í Á¶Á÷ ±¸Á¶¿¡ º¸¾ÈÀ» ±¸ÃàÇÕ´Ï´Ù."

ÁÖ¿ä ¿ä¾à

»óȲÀÇ °³¿ä

  • IDC »çÀ̹ö º¸¾È ¿ª·® Æò°¡ ÇÁ·¹ÀÓ¿öÅ© 1.0ÀÇ ¿ä¼Ò
    • IDC »çÀ̹ö º¸¾È ¿ª·® Æò°¡ ÇÁ·¹ÀÓ¿öÅ© 1.0ÀÇ ´Ü°è
      • Ãë¾àÇÑ Á¶Á÷
        • °³¿ä
        • »ç¾÷ ¼º°ú
      • º¸È£µÈ Á¶Á÷
        • °³¿ä
        • »ç¾÷ ¼º°ú
      • ȸº¹·Â ÀÖ´Â Á¶Á÷
        • °³¿ä
        • »ç¾÷ ¼º°ú
      • ÃÖÀûÈ­µÈ Á¶Á÷
        • °³¿ä
        • »ç¾÷ ¼º°ú
  • IDC »çÀ̹ö º¸¾È ¿ª·® Æò°¡ ÇÁ·¹ÀÓ¿öÅ© 1.0ÀÇ ¿µ¿ª
    • ³×Æ®¿öÅ© º¸¾È
    • ¿£µåÆ÷ÀÎÆ® º¸¾È
    • ID¡¤µðÁöÅÐ Æ®·¯½ºÆ®
    • µ¥ÀÌÅÍ º¸¾È
    • ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
    • ¹ÝÀÀ¡¤È¸º¹¡¤º¹¿ø
    • GRC

±â¼ú ±¸ÀÔÀÚ¿¡ ´ëÇÑ ¾îµå¹ÙÀ̽º

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
KSA 23.08.10

This IDC Perspective discusses IDC's Cybersecurity Capabilities Assessment Framework 1.0 and assesses cybersecurity readiness across seven domains. The increased complexity of modern IT estates, combined with the expansion of practices like remote work and the innovation of novel attack techniques by threat actors, makes it more difficult than ever for businesses to manage cybersecurity threats and risks. To meet the challenge, organizations must implement cybersecurity best practices across seven key domains, including:Network securityEndpoint securityIdentity and digital trustData securityApplication securityResponse, recovery, and resilienceGovernance, risk, and complianceIDC's Cybersecurity Capabilities Assessment Framework 1.0 identifies the essential practices and strategies that businesses should implement within each of these domains to minimize their risk of experiencing a breach, as well as to mitigate the impact of successful attacks in the event that they do take place. In addition to discussing technical solutions, the framework highlights the business practices - such as stakeholder education and CISO communication with other executives and the corporate board - that form the foundation of a rigorous cybersecurity strategy."On the cybersecurity front, settling for technical solutions and best practices isn't enough," says Chris Tozzi, adjunct research advisor with IDC's IT Executive Programs (IEP). "The most resilient enterprises build security into their organizational structure and make it a business priority, not merely a technological endeavor."

Executive Snapshot

Situation Overview

  • Elements of IDC's Cybersecurity Capabilities Assessment Framework 1.0
    • Phases of IDC's Cybersecurity Capabilities Assessment Framework 1.0
      • Vulnerable Organization
        • Description
        • Business Outcome
      • Protected Organization
        • Description
        • Business Outcome
      • Resilient Organization
        • Description
        • Business Outcome
      • Optimized Organization
        • Description
        • Business Outcome
  • Domains of IDC's Cybersecurity Capabilities Assessment Framework 1.0
    • Network Security
    • Endpoint Security
    • Identity and Digital Trust
    • Data Security
    • Application Security
    • Response, Recovery, and Resilience
    • GRC

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦