½ÃÀ庸°í¼­
»óÇ°ÄÚµå
1536738

IDC PeerScape : »çÀ̹ö º¸¾È ÆÀ ±¸Á¶ÀÇ °èȹ°ú ÃÖÀûÈ­ ÇÁ·¢Æ¼½º

IDC PeerScape: Practices for Planning and Optimizing Cybersecurity Team Structure

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 8 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óÇ°Àº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC PeerScape´Â »çÀ̹ö º¸¾È ÆÀ ±¸Á¶¿¡ Á¢±ÙÇÏ´Â ¹æ¹ý¿¡ °üÇÑ °¡ÀÌ´ø½º¸¦ Á¦°øÇÏ°í ÀÖ½À´Ï´Ù. ´Ù¾çÇÑ ºÎ¹®ÀÇ ±â¾÷ »çÀ̹ö º¸¾ÈÀÇ ½ÃÁ¡À¸·ÎºÎÅÍ ÆÀ ±¸Á¶¸¦ °ü¸®Çϱâ À§ÇÑ º£½ºÆ® ÇÁ·¢Æ¼½º¸¦ ½Äº°ÇÏ°í ÀÖ½À´Ï´Ù. ¶ÇÇÑ ÆÀ ±¸Á¶°¡ Áß¿äÇÑ ÀÌÀ¯, ÆÀ ±¸Á¶ÀÇ ´Ù¾çÇÑ ¾îÇÁ·ÎÄ¡, ÇöÀç ÆÀ ±¸Á¶°¡ ºñÁî´Ï½ºÀÇ ¿ä±¸¿¡ ÀûÇÕÇÏÁö ¾ÊÀºÁö¸¦ ÆÇ´ÜÇÏ´Â ¹æ¹ý¿¡ ´ëÇؼ­µµ °¡ÀÌ´ø½º¸¦ Á¦°øÇÏ°í ÀÖ½À´Ï´Ù. IDCÀÇ IT Executive Programs(IEP), ºñ»ó±Ù ¸®¼­Ä¡ ¾îµå¹ÙÀÌÀú Chris Tozzi´Â ´ÙÀ½°ú °°ÀÌ ¸»Çß½À´Ï´Ù. "º¸¾È ÆÀÀ» Æí¼ºÇϱâ À§ÇÑ ¸¸´É ¾îÇÁ·ÎÄ¡´Â ¾ø½À´Ï´Ù. ±×·¯³ª ¸ðµç Á¶Á÷ÀÌ ½ÃÇàÇØ¾ß ÇÏ´Â °ÍÀº °èȹ¼ºÀÌ ºÎÁ·Çϰųª ÀÓ±âÀÀº¯ÀûÀÎ ÆÀ ±¸Á¶¸¦ µðÆúÆ®·Î ÇÏ´Â °ÍÀÌ ¾Æ´Ï¶ó ½ÅÁßÇÏ°í Àü·«Àû ¾îÇÁ·ÎÄ¡¸¦ ÃëÇÏ´Â °ÍÀÔ´Ï´Ù."

IDC PeerScape Figure

°³¿ä

Peer Insights

  • ÇÁ·¢Æ¼½º 1 : º¹¼ö »çÀ̹ö º¸¾È ÆÀÀÇ ÀÛ¼ºÀ» °ËÅäÇÑ´Ù.
    • °úÁ¦
    • ¿¹
      • ±ÝÀ¶ ¼­ºñ½º
      • ÇコÄɾî
      • ÇÁ·ÎÁ§Æ® °ü¸®¡¤°Ç¼³
    • °¡ÀÌ´ø½º
  • ÇÁ·¢Æ¼½º 2 : °¢ »çÀ̹ö º¸¾È ÆÀÀÇ ¿µÇâ ôµµ¸¦ Á¤ÀÇ ¹× ÃßÀûÇÑ´Ù.
    • °úÁ¦
    • ¿¹
      • ±ÝÀ¶ ¼­ºñ½º
      • ÇコÄɾî
      • ÇÁ·ÎÁ§Æ® °ü¸®¡¤°Ç¼³
    • °¡ÀÌ´ø½º
  • ÇÁ·¢Æ¼½º 3 : ÆÀ °èÃþ°ú ¸®Æ÷Æà ±¸Á¶¸¦ °í·ÁÇÑ´Ù.
    • °úÁ¦
    • ¿¹
      • ±ÝÀ¶ ¼­ºñ½º
      • ÇコÄɾî
      • ÇÁ·ÎÁ§Æ® °ü¸®¡¤°Ç¼³
    • °¡ÀÌ´ø½º
  • ÇÁ·¢Æ¼½º 4 : Á÷¹« ¸¸Á·µµ¸¦ °í·ÁÇÑ´Ù.
    • °úÁ¦
    • ¿¹
      • ±ÝÀ¶ ¼­ºñ½º
      • ÇコÄɾî
      • ÇÁ·ÎÁ§Æ® °ü¸®¡¤°Ç¼³
    • °¡ÀÌ´ø½º
KSA 24.08.30

This IDC PeerScape offers guidance on how to approach cybersecurity team structure. Drawing on perspectives from enterprise cybersecurity across diverse sectors, it identifies best practices for managing team structure. It also provides guidance on why team structure is important, different approaches to structuring teams, and how to determine when a current team structure is not ideal for a business' needs."There's no one-size-fits-all approach to organizing security teams," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "But what every organization must do is take a deliberate, strategic approach rather than defaulting to poorly planned or ad hoc team structures."

IDC PeerScape Figure

Executive Summary

Peer Insights

  • Practice 1: Consider Creating Multiple Cybersecurity Teams
    • Challenge
    • Examples
      • Financial Services
      • Healthcare
      • Project Management and Construction
    • Guidance
  • Practice 2: Define and Track Measures of Each Cybersecurity Team's Impact
    • Challenge
    • Examples
      • Financial Services
      • Healthcare
      • Project Management and Construction
    • Guidance
  • Practice 3: Consider Team Hierarchies and Reporting Structures
    • Challenge
    • Examples
      • Financial Services
      • Healthcare
      • Project Management and Construction
    • Guidance
  • Practice 4: Consider Job Satisfaction
    • Challenge
    • Examples
      • Financial Services
      • Healthcare
      • Project Management and Construction
    • Guidance
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óÇ°À» ¼±Åà Áß
»óÇ° ºñ±³Çϱâ
Àüü»èÁ¦