当前位置:网站首页>Gartner released the prediction of eight major network security trends from 2022 to 2023. Zero trust is the starting point and regulations cover a wider range
Gartner released the prediction of eight major network security trends from 2022 to 2023. Zero trust is the starting point and regulations cover a wider range
2022-07-06 00:52:00 【CSDN cloud computing】
Gartner The recently released forecast of important trends in network security shows : Executive performance evaluation will be increasingly linked to network risk management capabilities ; In the next three years , Nearly one-third of the world's countries will adopt legislation to regulate the countermeasures against extortion software ; The integration of security platforms will ensure the rapid development of enterprises even in harsh environments .
edit | Song Hui
Contribution | Gartner
In the near future Gartner In the opening keynote speech of the safety and Risk Management Summit ,Gartner Senior Research Director Richard Addiscott And executive vice president Rob McMillan Discussed Gartner Important trend prediction proposed by network security experts , These predictions can help security and risk leaders succeed in the digital age .
Addiscott Express :“ We can't be conservative , It is not feasible to solve all problems with the past methods . Most safety and risk leaders have realized , In the event of a crisis , It will cause serious business interruption . Although we cannot control the crisis , But we can constantly adjust our way of thinking 、 idea 、 Plan and structure .”
Gartner Suggest , Network security leaders should grasp the following strategic predictions , Reasonably formulate the security strategy for the next two years .
From now to 2023 year , Laws and regulations that require enterprises and institutions to protect consumers' privacy rights will cover 50 Billion citizens and more than 70% The world GDP.
By 2021 year , existing 50 Countries are close to 30 The privacy rights of 100 million consumers have been protected , And the coverage of privacy laws continues to expand .Gartner Suggest , The enterprise should track the indicators of the subject's claim , For example, the processing cost and completion time of each request , Find out the links that need to be improved in efficiency , And prove the necessity of accelerating Automation .
To 2025 year ,80% Of enterprises will take advantage of a single manufacturer SSE Platform access network 、 Strategies for cloud services and dedicated applications .
at present , Mixed office mode has been gradually popularized , The need to access data through any device anytime, anywhere is also increasing . So , Manufacturers began to launch comprehensive security service edge (SSE) Solution , Around the network 、 Private access and SaaS application , Create consistency 、 Simple security function . Compared with solutions with single advantages , Comprehensive solutions from a single manufacturer can improve operational efficiency and safety , Including tighter integration 、 Console reduction , And data decryption 、 The location of checking and re encrypting is reduced .
To 2025 year ,60% Enterprises and institutions will take zero trust as the starting point of safety work , More than half of enterprises and institutions will not be able to play the advantage of zero trust .
Now , The word "zero trust" is very common in the marketing of security manufacturers and the security guidance of the government . Zero trust use based on identity and context 、 Trust with moderate risk replaces implicit trust , Is a very powerful mode of thinking . However , Zero trust is both a security principle , It is also an organizational vision , Therefore, enterprises and institutions need to connect with business results through cultural change and effective communication , To give full play to its advantages .
To 2025 year ,60% Of enterprises and institutions will regard network security risk as a major determinant of third-party transactions and business transactions .
Cyber attacks related to third parties are increasing . but Gartner Research shows , have only 23% The security and risk leaders of the company conduct real-time monitoring of third-party network security risks .Gartner Think , As consumer concerns intensify and regulators' attention heats up , From simple key technology supplier monitoring to complex M & A due diligence , Enterprises and institutions will begin to regard network security risk as an important determinant when conducting business with third parties .
To 2025 year ,30% The country will approve the legislation , Pay for ransomware 、 Make provisions for fines and negotiations , and 2021 This proportion was less than in 1%.
Now , Modern extortion software gangs not only steal data , And the data will be encrypted . Business organizations often start from a business rather than a security perspective , Decide whether to pay the ransom .Gartner Suggest , Before negotiation , It should communicate with professional incident response teams as well as law enforcement departments and relevant regulatory agencies , Get advice .
To 2025 year , Threat actors will successfully turn the operational technology environment into weapons , Causing casualties .
Attacks against operational technologies have become more common ( Operation technology refers to equipment 、 Hardware and software for monitoring or controlling assets and processes ), Will cause greater damage .Gartner Think , Safety and risk management leaders are in the process of ensuring the safety of the operating environment , Protecting people and the environment from real harm should be placed in a more important position than preventing information theft .
To 2025 year ,70% CEO of (CEO) It will require the establishment of a resilient corporate culture , To deal with all kinds of threats at the same time : Cyber crime 、 Bad weather events 、 Civil strife and political unrest .
COVID-19 has exposed the limitations of traditional business continuity management planning , That is, it cannot help enterprises and institutions cope with large-scale disruption . In view of the possible continuous interruption ,Gartner It is suggested that risk leaders make Organizational Resilience a strategic priority , And make a plan to let employees 、 Interested parties 、 Corporate level resilience strategies in which customers and suppliers participate .
To 2026 year ,50% The performance requirements related to risks will be added to the labor contract of the chief executive of .
Gartner A recent survey found , Most boards now view cybersecurity more than IT Technical problems , It is also considered a business risk . therefore ,Gartner expect , Senior business leaders will officially replace security leaders , Become the person in charge of network security .
边栏推荐
- ubantu 查看cudnn和cuda的版本
- Natural language processing (NLP) - third party Library (Toolkit):allenlp [library for building various NLP models; based on pytorch]
- Recoverable fuse characteristic test
- Spark AQE
- China Taiwan strategy - Chapter 8: digital marketing assisted by China Taiwan
- uniapp开发,打包成H5部署到服务器
- RAID disk redundancy queue
- Anconda download + add Tsinghua +tensorflow installation +no module named 'tensorflow' +kernelrestart: restart failed, kernel restart failed
- [groovy] compile time metaprogramming (compile time method injection | method injection using buildfromspec, buildfromstring, buildfromcode)
- Spark-SQL UDF函数
猜你喜欢

The third season of ape table school is about to launch, opening a new vision for developers under the wave of going to sea

MIT博士论文 | 使用神经符号学习的鲁棒可靠智能系统

《强化学习周刊》第52期:Depth-CUPRL、DistSPECTRL & Double Deep Q-Network

从 1.5 开始搭建一个微服务框架——调用链追踪 traceId

猿桌派第三季开播在即,打开出海浪潮下的开发者新视野

KDD 2022 | 脑电AI助力癫痫疾病诊断

【EI会议分享】2022年第三届智能制造与自动化前沿国际会议(CFIMA 2022)

Spark SQL null value, Nan judgment and processing

The population logic of the request to read product data on the sap Spartacus home page

Installation and use of esxi
随机推荐
从 1.5 开始搭建一个微服务框架——调用链追踪 traceId
Installation and use of esxi
CTF daily question day44 rot
curlpost-php
免费的聊天机器人API
图解网络:TCP三次握手背后的原理,为啥两次握手不可以?
anconda下载+添加清华+tensorflow 安装+No module named ‘tensorflow‘+KernelRestarter: restart failed,内核重启失败
Finding the nearest common ancestor of binary search tree by recursion
Anconda download + add Tsinghua +tensorflow installation +no module named 'tensorflow' +kernelrestart: restart failed, kernel restart failed
golang mqtt/stomp/nats/amqp
MCU realizes OTA online upgrade process through UART
The relationship between FPGA internal hardware structure and code
After Luke zettlemoyer, head of meta AI Seattle research | trillion parameters, will the large model continue to grow?
KDD 2022 | 脑电AI助力癫痫疾病诊断
[groovy] XML serialization (use markupbuilder to generate XML data | set XML tag content | set XML tag attributes)
Power Query数据格式的转换、拆分合并提取、删除重复项、删除错误、转置与反转、透视和逆透视
毕设-基于SSM高校学生社团管理系统
Set data real-time update during MDK debug
数据分析思维分析方法和业务知识——分析方法(三)
Common API classes and exception systems