»çÀϷο¡¼­ ½Ã³ÊÁö·ÎÀÇ À̵¿ : °³¹ßÀÚ¿Í º¸¾È Çù¾÷¿¡ ÀÇÇÑ ºñÁî´Ï½º °¡Ä¡ÀÇ Çâ»ó
From Silos to Synergy: Enhancing Business Value with Developer-Security Collaboration
»óǰÄÚµå : 1613728
¸®¼­Ä¡»ç : IDC
¹ßÇàÀÏ : 2024³â 12¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 12 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 7,500 £Ü 10,643,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

Æ÷¸£Åõ°¥ Cascais¿¡¼­ °³ÃÖµÈ IDCÀÇ Á¦8ȸ CISO ¼­¹ÔÀº ÁøÈ­ÇÏ´Â CISOÀÇ ¿ªÇÒ¿¡ ÃÊÁ¡À» ¸ÂÃß°í º¸¾ÈÀÇ ºñÁî´Ï½º ÇÁ·Î¼¼½º¿¡ ´ëÇÑ ÅëÇÕÀ» °­Á¶Çß½À´Ï´Ù. ÁÖ¿ä ÅäÇÈ¿¡´Â Á¾ÇÕÀû »çÀ̹ö º¸¾È ÇÁ·¹ÀÓ¿öÅ©ÀÇ È®¸³, Á¦·Î Æ®·¯½ºÆ® º¸¾ÈÀÇ Ã¤ÅÃ, DevOps(DevSecOps)¿¡ ´ëÇÑ º¸¾ÈÀÇ ÅëÇÕ µîÀÌ Æ÷ÇԵǾú½À´Ï´Ù. DevSecOpsÀÇ Ã¤Åÿ¡´Â ÇöÀçµµ °úÁ¦°¡ ÀÖÁö¸¸, ¼­¹Ô¿¡¼­´Â Çù¾÷, ±³À°, º¸¾È ÇÁ·Î¼¼½º¸¦ °­È­Çϱâ À§ÇÑ GenAIÀÇ È°¿ëÀÇ Á߿伺ÀÌ °­Á¶µÇ¾ú½À´Ï´Ù. "DevSecOps ÇÁ·Î¼¼½º¸¦ ÅëÇÕÇÏ°í °³¹ßÆÀ°ú º¸¾ÈÆÀ °£ÀÇ Çù¾÷À» ÃËÁøÇÏ´Â ¹ßÀüÀº ¿©ÀüÈ÷ ´õµð°Ô ÁøÇàµÇ°í ÀÖ½À´Ï´Ù. Çù¾÷ ³ë·ÂÀ» °­È­ÇÏ°í °³¹ß ÇÁ·Î¼¼½º Ãʱ⿡ »çÀ̹ö À§Çè °ü¸®¸¦ ÀüȯÇϱâ À§ÇÑ °øÅëÁ¡À» ã´Â °ÍÀÌ ½Ã±ÞÇÕ´Ï´Ù."¶ó°í À¯·´ Á¶»ç AVP, Jennifer ThomsonÀº ¸»Çß½À´Ï´Ù.

À̱×Á¦Å¥Æ¼ºê ½º³À¼ô

»óȲ °³¿ä

Å×Å©³î·¯Áö ±¸ÀÔÀÚ¿¡ ´ëÇÑ ¾îµå¹ÙÀ̽º

Âü°í ÀÚ·á

KSA
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

IDC's eighth CISO summit in Cascais, Portugal, focused on the evolving role of CISOs and emphasized the integration of security into business processes. Key topics included establishing comprehensive cybersecurity frameworks, adopting zero trust security, and integrating security into DevOps (DevSecOps). Despite ongoing challenges in DevSecOps adoption, the summit highlighted the importance of collaboration, education, and leveraging GenAI to enhance security processes. The goal is to build trusted value across the software delivery value chain, aligning security with business objectives and improving overall security posture."Advancements in integrating DevSecOps processes and fostering collaboration between development and security teams remain sluggish. There is an urgency to find common ground to enhance collaborative efforts and shift cyber-risk management earlier in the development process." - Jennifer Thomson, AVP European Research

Executive Snapshot

Situation Overview

Advice for the Technology Buyer

Learn More

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â