当前位置:网站首页>Top network security prediction: nearly one-third of countries will regulate blackmail software response within three years
Top network security prediction: nearly one-third of countries will regulate blackmail software response within three years
2022-07-29 01:46:00 【Super technology】
Executive performance evaluation will be increasingly linked to the ability to manage network risk , according to Gartner Top network security predictions revealed , Nearly one third of countries will regulate ransomware response in the next three years , Security platform integration will help organizations thrive in hostile environments .

Trend security strategy
In Sydney Gartner In the opening keynote speech of the security and Risk Management Summit ,Gartner Senior director Analyst Richard Addiscott and Gartner Vice president of management Rob McMillan it has been reviewed that Gartner Top predictions prepared by network security experts , To help security and risk management leaders succeed in the digital age .
“ We can't fall into old habits , And try to treat everything as before ,”Addiscott say ,“ Most security and risk leaders now recognize , Major damage is a crisis . We can't control it , But we can develop our thinking , Our philosophy , Our program and our architecture .
Gartner It is recommended that network security leaders build the following strategic planning assumptions in the security strategy for the next two years .
To 2023 year , Government regulations requiring organizations to provide consumer privacy will cover 50 Billion citizens and the world GDP Of 70% above . By 2021 year ,50 Countries have nearly 30 Billion people have gained consumer privacy , Privacy regulation is also expanding .Gartner It is suggested that the organization track the subject permission request indicators , Including the cost and time to fulfill each request , To identify inefficiencies and justify accelerating Automation .
To 2025 year ,80% Of enterprises will adopt a strategy , From a single supplier SSE Unified platform Web, Cloud services and private application access . With a mixed workforce and data accessible to all , Vendors are providing integrated security service edge (SSE) Solution , To provide consistent and simple Web、 Dedicated access and SaaS Application security . Compared with the best solution in its class , Single vendor solutions provide significant operational efficiency and security effectiveness , Including tighter integration 、 Less console usage and less data must be decrypted 、 Check and re encrypt the location .
To 2025 year ,60% Our organization will take zero trust as the starting point of security . More than half of people will not realize these benefits .
The word "zero trust" is now common in security supplier marketing and government security guidance . As a state of mind —— Replace implicit trust with risk appropriate trust based on identity and context —— It's very powerful . however , Because zero trust is both a security principle , It is also an organizational vision , Therefore, cultural change and clear communication are needed , Link it to business results , To realize benefits .
To 2025 year ,60% The organization will use network security risk as the main determinant of third-party transactions and business activities . according to Gartner The data of , Only 23% Our security and risk leaders monitor the network security risks of third parties in real time .Gartner Think , Due to consumer concerns and regulatory interest , Organizations will begin to take cyber security risks as an important determinant when conducting business with third parties , From simple monitoring of key technology suppliers to complex due diligence on mergers and acquisitions .
To 2025 year ,30% Countries will adopt legislation to regulate extortion software payment , Fines and negotiations , and 2021 In 2000, the proportion was less than 1%. Modern extortion software gangs now steal data and encrypt it . The decision whether to pay ransom is a business decision , Not safety decisions .Gartner It is recommended to hire a professional incident response team as well as law enforcement departments and any regulatory agencies before the negotiation .
To 2025 year , Threat actors will successfully weaponize the operational technology environment , Causing casualties .
Yes OT( Monitoring or control equipment 、 Hardware and software of assets and processes ) Attacks have become more and more common , The damage is also getting bigger and bigger .Gartner Express , In the operational environment , Safety and risk management leaders should be more concerned about the harm of the real world to human beings and the environment , Not information theft .
To 2025 year ,70% Of CEO It will require the establishment of an organizational flexibility culture , In order to commit cybercrime 、 Bad weather events 、 Survive the threats of civil strife and political instability .COVID-19 The pandemic exposed the inability of traditional business continuity management plans to support organizations' ability to cope with large-scale disruptions . Because it may continue to interrupt ,Gartner It is suggested that risk leaders regard organizational flexibility as a strategic priority , And formulate an organization wide flexible strategy , At the same time, attract employees 、 stakeholders 、 Customers and suppliers .
To 2026 year ,50% Of C Senior executives will include risk related performance requirements in their employment contracts .
according to Gartner A recent survey , Most boards now view cyber security as a business risk , Not just technology IT problem . therefore ,Gartner We hope to see the formal accountability for dealing with cyber risks change from security leaders to senior business leaders .
The original is translated from helpnetsecurity, Super technology translation , Please indicate the source and original text of the reprint of the cooperation site. The translator is super technology !
Hi, I'm super technology
Super technology is an information security expert , Can defend without upper limit DDos Attack and CC attack , Alibaba cloud strategic partner !
边栏推荐
- 明日无限计划,2022某公司元宇宙产品发布会活动概念策划方案
- SQL question brushing: find the last of all employees who have been assigned departments_ Name and first_ Name and Dept_ no
- 什么是原码、反码和补码
- Reinforcement learning (II): SARS, with code rewriting
- [hcip] MPLS Foundation
- [search] - iteration deepening / bidirectional dfs/ida*
- 规划数学期末模拟考试一
- Understand various paths
- Error installing mysqlclient module on MAC system
- New 1688 API access instructions
猜你喜欢

Groundwater, soil, geology and environment

Nacos installation guide on win system

What are source code, inverse code and complement code

Reinforcement learning (II): SARS, with code rewriting

Introduction to Elmo, Bert and GPT

golang启动报错【已解决】

了解网址url的组成后 运用url模块、querystring模块和mime模块完善静态网站

After understanding the composition of the URL of the website, we use the URL module, querystring module and mime module to improve the static website

CSDN modify column name

J9数字论:什么因素决定NFT的价值?
随机推荐
2022年最火的十大测试工具,你掌握了几个
SiC功率半导体产业高峰论坛成功举办
numpy.where() 用法和np.argsort()的用法
新1688 API 接入说明
matplotlib中文问题
els 方块移动
MySQL execution order
golang启动报错【已解决】
承办首届算力大会,济南胜在何处?
Ruiji takeout project actual battle day01
AlphaFold揭示了蛋白质结构宇宙-从近100万个结构扩展到超过2亿个结构
Docuware mobile labor solution can help you build a new productivity model: anytime, anywhere, any device
ELMO,BERT和GPT简介
Merkel Studio - harmonyos implementation list to do
J9 number theory: what factors determine the value of NFT?
Analysis of Multi Chain use cases on moonbeam -- review of Derek's speech in Polkadot decoded 2022
了解网址url的组成后 运用url模块、querystring模块和mime模块完善静态网站
Three ways of creating indexes in MySQL
body中基本标签
Analyzing the function of human-computer interface module of runtime manager based on autoware