IDC PeerScape : »çÀ̹ö º¸¾È ÆÀ ±¸Á¶ÀÇ °èȹ°ú ÃÖÀûÈ­ ÇÁ·¢Æ¼½º
IDC PeerScape: Practices for Planning and Optimizing Cybersecurity Team Structure
»óǰÄÚµå : 1536738
¸®¼­Ä¡»ç : IDC
¹ßÇàÀÏ : 2024³â 08¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 8 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 7,500 £Ü 10,253,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

ÀÌ IDC PeerScape´Â »çÀ̹ö º¸¾È ÆÀ ±¸Á¶¿¡ Á¢±ÙÇÏ´Â ¹æ¹ý¿¡ °üÇÑ °¡ÀÌ´ø½º¸¦ Á¦°øÇϰí ÀÖ½À´Ï´Ù. ´Ù¾çÇÑ ºÎ¹®ÀÇ ±â¾÷ »çÀ̹ö º¸¾ÈÀÇ ½ÃÁ¡À¸·ÎºÎÅÍ ÆÀ ±¸Á¶¸¦ °ü¸®Çϱâ À§ÇÑ º£½ºÆ® ÇÁ·¢Æ¼½º¸¦ ½Äº°Çϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ ÆÀ ±¸Á¶°¡ Áß¿äÇÑ ÀÌÀ¯, ÆÀ ±¸Á¶ÀÇ ´Ù¾çÇÑ ¾îÇÁ·ÎÄ¡, ÇöÀç ÆÀ ±¸Á¶°¡ ºñÁî´Ï½ºÀÇ ¿ä±¸¿¡ ÀûÇÕÇÏÁö ¾ÊÀºÁö¸¦ ÆÇ´ÜÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ¼­µµ °¡ÀÌ´ø½º¸¦ Á¦°øÇϰí ÀÖ½À´Ï´Ù. IDCÀÇ IT Executive Programs(IEP), ºñ»ó±Ù ¸®¼­Ä¡ ¾îµå¹ÙÀÌÀú Chris Tozzi´Â ´ÙÀ½°ú °°ÀÌ ¸»Çß½À´Ï´Ù. "º¸¾È ÆÀÀ» Æí¼ºÇϱâ À§ÇÑ ¸¸´É ¾îÇÁ·ÎÄ¡´Â ¾ø½À´Ï´Ù. ±×·¯³ª ¸ðµç Á¶Á÷ÀÌ ½ÃÇàÇØ¾ß ÇÏ´Â °ÍÀº °èȹ¼ºÀÌ ºÎÁ·Çϰųª ÀÓ±âÀÀº¯ÀûÀÎ ÆÀ ±¸Á¶¸¦ µðÆúÆ®·Î ÇÏ´Â °ÍÀÌ ¾Æ´Ï¶ó ½ÅÁßÇϰí Àü·«Àû ¾îÇÁ·ÎÄ¡¸¦ ÃëÇÏ´Â °ÍÀÔ´Ï´Ù."

IDC PeerScape Figure

°³¿ä

Peer Insights

KSA
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

This IDC PeerScape offers guidance on how to approach cybersecurity team structure. Drawing on perspectives from enterprise cybersecurity across diverse sectors, it identifies best practices for managing team structure. It also provides guidance on why team structure is important, different approaches to structuring teams, and how to determine when a current team structure is not ideal for a business' needs."There's no one-size-fits-all approach to organizing security teams," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "But what every organization must do is take a deliberate, strategic approach rather than defaulting to poorly planned or ad hoc team structures."

IDC PeerScape Figure

Executive Summary

Peer Insights

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â