当前位置:网站首页>Lu Zhe, chief scientist of Shiping information: building data and personnel centered security capabilities
Lu Zhe, chief scientist of Shiping information: building data and personnel centered security capabilities
2022-07-03 00:48:00 【shipinginfo】
Into the digital age , Data becomes a key factor of production , It is a national strategic resource . With the deepening of digital transformation of industry , The value of data is increasingly prominent , At the same time, the accompanying data security risks are also increasing , The data reveal that 、 Various security threats such as illegal data transactions continue to intensify . How to prevent data security risks , In data sharing 、 Prevent the occurrence of “ Data streaks ”, It is particularly important in the process of digital construction and development in China .
In recent days, , Lu Zhe, chief scientist of Shiping information, was invited to attend “ Escort data · Safe future ” Online salon activities , And around “ Data security ” The theme , In view of the construction of data security governance and technical system in the context of the digital era, talk with the big players in the industry . Experts from Lu zhe think , The key to data security governance in the new era , It's about building security capabilities that focus on data and people , According to the data security characteristics and key needs in the digital era , According to legal requirements and national norms , Build a technical framework system for data security management and monitoring , Realize the standardization of various business data processes by landing 、 Refined security management .
multivariate 、 flow 、 Real time data environment and data processing characteristics , Accelerate the release of data security governance requirements
At the meeting , Lu Zhe, an expert, shared with online audiences the characteristics of information systems and the new information technology environment in the digital era , And analyzes the current industry situation 、 Cutting edge response and development trend . Experts from Lu zhe think , The traditional network security technology for systems and boundaries can no longer meet the information security needs under the new situation , At present, data security risks are mainly characterized by four aspects : Data dependency 、 Endogenous 、 Business relevance and high diffusion , After analysis , Business data and internal personnel are the key .
In response to the above risks , Experts Lu zhe pointed out , In the digital era, the core of data security governance is to go deep into the business process for data sensitivity 、 Security attribute sorting and control , The focus is on compliance with data and people 、 Risk analysis, evaluation, prediction and monitoring , must “ Refined data 、 Down to business 、 Prevent people , Both static and dynamic 、 Both inside and outside ”.
At present, the management and control of data and personnel is mainly reflected in the following five urgent needs :
1. Data classification - Data asset discovery and management
2. Data security compliance and risk management
3. Data and human centered security
4. Go deep into the refined security control of business
5. Comprehensive monitoring of endogenous data leakage risk
Data security capabilities = Data governance + Data security governance ( Management specification + Technical measures )
Talking about the construction of data security capability , Experts Lu zhe proposed that we should first refer to national legal requirements and norms , Take data security governance as a means , Take the data security capability maturity model as the standard , Achieve the comprehensive improvement of the maturity of data security capability .
From the supply side of the industry , The data security governance needs of government and enterprise units have not been fully met . Expert LU zhe introduced the data security governance mode of Shiping information online —— Build layers of protection DCTII Data security management and monitoring technology framework system , Build data and personnel centric security capabilities .
This model focuses on meeting the diversified data security governance needs of government and enterprise units , It is a big data platform for all industries 、 Cloud computing 、 Data asset management and protection in complex environments such as collaborative applications and the Internet provide a complete technical foundation , Effectively improve the user data security capabilities .
The value of data does not lie in the data itself , Digital transformation and innovation of industry , In essence, it is value creation based on data . In the digital age , Can we master data resources and transform them into production factors , Whether the data security risks can be resolved in time in the process , Build a complete data security capability , It has become a measure of an enterprise 、 The level of competitiveness of an industry or even a country is an important factor . Before the tide of the times , Shiping information will also take advantage of the momentum , Continue to promote product innovation and service upgrading , Seize the high ground of data security , Provide strong support for the development of digital construction in China .
边栏推荐
- The "2022 China Digital Office Market Research Report" can be downloaded to explain the 176.8 billion yuan market in detail
- [applet project development -- JD mall] user defined search component of uni app (middle) -- search suggestions
- 【AutoSAR 四 BSW概述】
- Vulkan practice first bullet
- kubernetes资源对象介绍及常用命令(五)-(NFS&PV&PVC)
- leetcode-1964:找出到每个位置为止最长的有效障碍赛跑路线
- AEM: Nanlin fan Ben et al. - plant rhizosphere growth promoting bacteria control soybean blight
- Leetcode-2280: represents the minimum number of line segments of a line graph
- 【AutoSAR 九 C/S原理架构】
- Detailed explanation of pod life cycle
猜你喜欢

Rust所有权(非常重要)

Unity learns from spaceshooter to record the difference between fixedupdate and update in unity for the second time

瑞萨RZ/G2L 处理器简介|框架图|功耗|原理图及硬件设计指南

Illustrated network: what is virtual router redundancy protocol VRRP?
![[shutter] image component (load network pictures | load static pictures | load local pictures | path | provider plug-in)](/img/7e/4f9d96edd04e9ffb26434baf34aa43.jpg)
[shutter] image component (load network pictures | load static pictures | load local pictures | path | provider plug-in)

Detailed explanation of pod life cycle

leetcode-2280:表示一个折线图的最少线段数

Test shift right: Elk practice of online quality monitoring

tail -f 、tail -F、tailf的区别

Why is the website slow to open?
随机推荐
University of Toronto:Anthony Coache | 深度强化学习的条件可诱导动态风险度量
【案例分享】让新时代教育发展与“数”俱进
Leetcode-241: designing priorities for operational expressions
Basic use of shell script
University of Toronto: Anthony coach | the conditions of deep reinforcement learning can induce dynamic risk measurement
【雅思阅读】王希伟阅读P2(阅读填空)
About the practice topic of screen related to unity screen, unity moves around a certain point inside
[shutter] image component (the placeholder | transparent_image transparent image plug-in is loaded into the memory)
Machine learning: numpy version linear regression predicts Boston house prices
Sentry developer contribution Guide - configure pycharm
【AutoSAR 十二 模式管理】
Use Jenkins II job
tail -f 、tail -F、tailf的区别
Markdown tutorial
【AutoSAR 九 C/S原理架构】
leetcode-1964:找出到每个位置为止最长的有效障碍赛跑路线
[IELTS reading] Wang Xiwei reading P2 (reading fill in the blank)
Gan model architecture in mm
The difference between tail -f, tail -f and tail
kubernetes编写yml简单入门