½ÃÀ庸°í¼­
»óǰÄÚµå
1613728

»çÀϷο¡¼­ ½Ã³ÊÁö·ÎÀÇ À̵¿ : °³¹ßÀÚ¿Í º¸¾È Çù¾÷¿¡ ÀÇÇÑ ºñÁî´Ï½º °¡Ä¡ÀÇ Çâ»ó

From Silos to Synergy: Enhancing Business Value with Developer-Security Collaboration

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 12 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

Æ÷¸£Åõ°¥ Cascais¿¡¼­ °³ÃÖµÈ IDCÀÇ Á¦8ȸ CISO ¼­¹ÔÀº ÁøÈ­ÇÏ´Â CISOÀÇ ¿ªÇÒ¿¡ ÃÊÁ¡À» ¸ÂÃß°í º¸¾ÈÀÇ ºñÁî´Ï½º ÇÁ·Î¼¼½º¿¡ ´ëÇÑ ÅëÇÕÀ» °­Á¶Çß½À´Ï´Ù. ÁÖ¿ä ÅäÇÈ¿¡´Â Á¾ÇÕÀû »çÀ̹ö º¸¾È ÇÁ·¹ÀÓ¿öÅ©ÀÇ È®¸³, Á¦·Î Æ®·¯½ºÆ® º¸¾ÈÀÇ Ã¤ÅÃ, DevOps(DevSecOps)¿¡ ´ëÇÑ º¸¾ÈÀÇ ÅëÇÕ µîÀÌ Æ÷ÇԵǾú½À´Ï´Ù. DevSecOpsÀÇ Ã¤Åÿ¡´Â ÇöÀçµµ °úÁ¦°¡ ÀÖÁö¸¸, ¼­¹Ô¿¡¼­´Â Çù¾÷, ±³À°, º¸¾È ÇÁ·Î¼¼½º¸¦ °­È­Çϱâ À§ÇÑ GenAIÀÇ È°¿ëÀÇ Á߿伺ÀÌ °­Á¶µÇ¾ú½À´Ï´Ù. "DevSecOps ÇÁ·Î¼¼½º¸¦ ÅëÇÕÇÏ°í °³¹ßÆÀ°ú º¸¾ÈÆÀ °£ÀÇ Çù¾÷À» ÃËÁøÇÏ´Â ¹ßÀüÀº ¿©ÀüÈ÷ ´õµð°Ô ÁøÇàµÇ°í ÀÖ½À´Ï´Ù. Çù¾÷ ³ë·ÂÀ» °­È­ÇÏ°í °³¹ß ÇÁ·Î¼¼½º Ãʱ⿡ »çÀ̹ö À§Çè °ü¸®¸¦ ÀüȯÇϱâ À§ÇÑ °øÅëÁ¡À» ã´Â °ÍÀÌ ½Ã±ÞÇÕ´Ï´Ù."¶ó°í À¯·´ Á¶»ç AVP, Jennifer ThomsonÀº ¸»Çß½À´Ï´Ù.

À̱×Á¦Å¥Æ¼ºê ½º³À¼ô

»óȲ °³¿ä

  • DevSecOpsÀÇ ¼º¼÷µµ
  • º¸¾È Àü¹®°¡ÀÇ ´«À¸·Î º» DevSecOps
  • ¼ÒÇÁÆ®¿þ¾î Àü´Þ¿¡¼­ ½Å·ÚÇÒ ¼ö ÀÖ´Â °¡Ä¡ÀÇ ±¸Ãà°ú Çù¾÷ °­È­·ÎÀÇ ±æ
    • º¸¾ÈÀÇ ºñÁî´Ï½º °¡Ä¡¸¦ ÀÏÄ¡ : °øÅë ¾ð¾î·Î À̾߱âÇÑ´Ù.
      • È¿À²°ú ǰÁú
      • °³¹ßÀÚ °æÇè
      • »ç¿ëÀÚ ¸¸Á·µµ
      • ¸®½ºÅ© °æ°¨
      • ÀÎÀç À¯Áö
    • Çù¾÷ Ã˸ŷμ­ÀÇ GenAI
    • º¯È­¸¦ ¸·´Â Èû°ú ÃËÁøÇÏ´Â ÈûÀ» ½Äº°ÇÑ´Ù.

Å×Å©³î·¯Áö ±¸ÀÔÀÚ¿¡ ´ëÇÑ ¾îµå¹ÙÀ̽º

  • °³¹ßÀÚ¿Í º¸¾È ÆÀÀÇ Á¦ÈÞ¸¦ °­È­Çϱâ À§ÇÑ CISO¿ë ¾îµå¹ÙÀ̽º
    • °ü¿©¿Í Æ÷¼·
    • Çù·ÂÀûÀÎ ¹®È­¸¦ À°¼ºÇÑ´Ù.
    • °¡À̵å¶óÀΰú ÅÛÇø´À» Á¦°øÇÑ´Ù.
    • ÅøÃ¼ÀÎÀÇ Á¶È­
    • ÀÚµ¿È­ °¸ ÇØ¼Ò
    • ¸íÈ®ÇÑ ÁöÇ¥
    • ¼ÒÀ¯±ÇÀ» °­Á¶ÇÑ´Ù.
    • ÄÁÅØ½ºÆ® º¯È¯°ú ÀÎÁö ºÎÇϸ¦ °æ°¨
    • ¸íÈ®ÇÑ Ä¿¹Â´ÏÄÉÀ̼Ç
    • »ç¾÷ ¿î¿µ À§¿øÈ¸
    • ¹ë·±½º Æ®·¯½ºÆ®
    • ¿¬¼ö¿Í ±³À°

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
KSA 24.12.23

IDC's eighth CISO summit in Cascais, Portugal, focused on the evolving role of CISOs and emphasized the integration of security into business processes. Key topics included establishing comprehensive cybersecurity frameworks, adopting zero trust security, and integrating security into DevOps (DevSecOps). Despite ongoing challenges in DevSecOps adoption, the summit highlighted the importance of collaboration, education, and leveraging GenAI to enhance security processes. The goal is to build trusted value across the software delivery value chain, aligning security with business objectives and improving overall security posture."Advancements in integrating DevSecOps processes and fostering collaboration between development and security teams remain sluggish. There is an urgency to find common ground to enhance collaborative efforts and shift cyber-risk management earlier in the development process." - Jennifer Thomson, AVP European Research

Executive Snapshot

Situation Overview

  • Maturity in DevSecOps
  • DevSecOps Through the Eyes of Security Professionals
  • The Path to Building Trusted Value and Enhancing Collaboration in Software Delivery
    • Aligning on the Business Value of Security: Talking a Common Language
      • Efficiency and Quality
      • Developer Experience
      • User Satisfaction
      • Risk Reduction
      • Talent Retention
    • GenAI as a Catalyst to Collaboration
    • Identifying the Forces that Prevent or Galvanize Change

Advice for the Technology Buyer

  • Advice for CISOs to Enhance Collaboration Between Developer and Security Teams
    • Involvement and Inclusion
    • Foster a Collaborative Culture
    • Provide Guidelines and Templates
    • Harmonize Toolchains
    • Close Automation Gaps
    • Clear Metrics
    • Emphasize Ownership
    • Reduce Contextual Switching and Cognitive Load
    • Clear Communication
    • Business Steering Committee
    • Balance Trust
    • Training and Education

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦