![]() |
½ÃÀ庸°í¼
»óǰÄÚµå
1532170
Àη vs. ÇÁ·Î¼¼½º vs. ±â¼ú : »çÀ̹ö º¸¾È °áÇÔÀÇ ±Ùº» ¿øÀÎ ¹ß°ß ¹× ¼öÁ¤People Versus Process Versus Technology: Finding and Fixing the Root Cause of Cybersecurity Shortcomings |
À̹ø IDC Perspective¿¡¼´Â Á¶Á÷ÀÇ °üÁ¡¿¡¼ »çÀ̹ö º¸¾È ½ÇÆÐÀÇ ±Ùº» ¿øÀÎÀ» Æò°¡ÇÒ ¼ö ÀÖ´Â Àü·«¿¡ ´ëÇØ ¼³¸íÇÕ´Ï´Ù. °ø°ÝÀÇ Æò±Õ ºóµµ¿Í ºñ¿ë µîÀÇ µ¥ÀÌÅÍ·Î ÃøÁ¤ÇßÀ» ¶§, ÀϹÝÀûÀÎ Á¶Á÷ÀÇ »çÀ̹ö º¸¾È ¼º°ú´Â ÁÁÁö ¾ÊÀ¸¸ç, ±× Ãß¼¼´Â °è¼Ó ¾Çȵǰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ Ãß¼¼¸¦ °³¼±Çϱâ À§ÇØ ±â¾÷Àº »çÀ̹ö º¸¾È °áÇÔÀÇ ±Ùº» ¿øÀÎÀÌ ¹«¾ùÀÎÁö ÆÄ¾ÇÇØ¾ß ÇÕ´Ï´Ù. ÀηÂ, ÇÁ·Î¼¼½º, ±â¼úÀÇ ¼¼ °¡Áö ÀϹÝÀûÀÎ ¹üÁÖ¿¡¼ »çÀ̹ö º¸¾È ¸®¼Ò½º¿Í ÅõÀÚ ÇöȲÀ» Æò°¡ÇÔÀ¸·Î½á Á¶Á÷Àº Ãë¾àÁ¡ÀÌ ¾îµð¿¡ ÀÖ´ÂÁö¿¡ ´ëÇÑ ½Ç¿ëÀûÀÎ ÀλçÀÌÆ®¸¦ ¾òÀ» ¼ö ÀÖ½À´Ï´Ù. À̸¦ ÅëÇØ ÀÌ¹Ì ÃæºÐÇÑ »çÀ̹ö º¸¾È ¸®¼Ò½º°¡ ÀÖ´Â ºÐ¾ß¿¡ ´õ ¸¹Àº ÀÚ±ÝÀ» ÅõÀÚÇϰųª, »çÀ̹ö º¸¾È ´ã´çÀÚÀÇ ½Ã°£°ú ³ë·ÂÀ» Áõ°¡½ÃÄѵµ »çÀ̹ö º¸¾È ż¼¸¦ ½ÇÁúÀûÀ¸·Î °³¼±ÇÏÁö ¸øÇÏ´Â º¯°æ »çÇ×À» Ãß°¡ÇÏ´Â ´ë½Å, »çÀ̹ö º¸¾È ¼º°ú¸¦ ÃøÁ¤ °¡´ÉÇÑ ÇüÅ·Π°³¼±ÇÒ ¼ö ÀÖ½À´Ï´Ù. IDC IT Executive Programs(IEP)ÀÇ ºñ»ó±Ù ¿¬±¸ ÀÚ¹®À§¿øÀÎ Å©¸®½º ÅäÄ¡(Chris Tozzi)´Â ´ÙÀ½°ú °°ÀÌ ¸»Çß½À´Ï´Ù. "»çÀ̹ö º¸¾È À§Çè ż¼¸¦ °³¼±Çϱâ À§Çؼ´Â °¡Àå Å« ¾àÁ¡ÀÌ ¾îµð¿¡ ÀÖ´ÂÁö ¾Ë¾Æ¾ß ÇÕ´Ï´Ù. ±×°ÍÀÌ »ç¶÷ÀÎÁö, ÇÁ·Î¼¼½ºÀÎÁö, ±â¼úÀÎÁö, ¾Æ´Ï¸é ±× µÑÀÇ Á¶ÇÕÀÎÁö ¾Ë¾Æ¾ß ÇÕ´Ï´Ù."
This IDC Perspective discusses strategies to assess the root causes of cybersecurity failures from an organizational perspective. Measured in terms of data like the average frequency and cost of attacks, cybersecurity outcomes are bad and growing worse for the typical organization. To turn this trend around, businesses must determine what the root causes of their cybersecurity shortcomings are.By assessing the state of cybersecurity resources and investments across the three classic categories of people, processes, and technologies, organizations can gain actionable insight into where their weaknesses lie. From there, they can make changes that measurably improve cybersecurity outcomes - instead of dumping more money into areas where cybersecurity resources are already adequate, or making changes that demand more time and effort from cybersecurity personnel but don't meaningfully improve cybersecurity posture."Improving cybersecurity risk posture requires knowing where your greatest weaknesses lie - whether they're your people, your processes, your technology, or a combination thereof," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP).