Gartner发布2021年八大安全和风险管理趋势

{"type":"doc","content":[{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"根据全球领先的","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn","title":null,"type":null},"content":[{"type":"text","text":"信息技术研究","attrs":{}}]},{"type":"text","text":"和顾问公司","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn","title":null,"type":null},"content":[{"type":"text","text":"Gartner","attrs":{}}]},{"type":"text","text":"的报告,随着新冠疫情加速","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn/newsroom/press-releases/gartner_2021_0","title":null,"type":null},"content":[{"type":"text","text":"数字化业务转型","attrs":{}}]},{"type":"text","text":"并给传统网络安全实践带来挑战,为了能够快速重塑自己所在的企业机构,安全和","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn/newsroom/press-releases/gartner_2021_0","title":null,"type":null},"content":[{"type":"text","text":"风险管理领导者","attrs":{}}]},{"type":"text","text":"必须应对八大趋势。","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"Gartner研究副总裁Peter Firstbrook先生表示:“第一个挑战是技能缺口。80%的企业机构告诉我们,他们很难找到和雇用安全专业人员,71%的企业机构表示这影响了他们在企业机构内部交付安全项目的能力。”","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"2021年安全和风险领导人面临的其他主要挑战包括:复杂的地缘政治局势和不断增加的全球法规、工作空间和工作负载从传统网络迁移、端点多样性和地点的迅速增长以及不断变化的攻击环境,尤其是勒索软件和商业电子邮件入侵。","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","marks":[{"type":"strong","attrs":{}}],"text":"以下八大趋势反映了预计将对行业产生广泛影响并具有巨大变革潜力的商业、市场和技术动态。","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势一:网络安全网格(Cybersecurity Mesh)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"网络安全网格是一种可以在最需要的地方部署控制措施的现代化安全方法。网络安全网格不是让每一个安全工具在“孤岛”中运行,而是通过提供基础安全服务以及集中策略管理和协调,使各工具之间实现互操作性。现在许多IT资产都在传统企业边界之外,而","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn","title":null,"type":null},"content":[{"type":"text","text":"网络安全","attrs":{}}]},{"type":"text","text":"网格架构使企业机构能够将安全控制措施扩展到分布式资产。","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势二:身份优先安全机制(Identity-First Security)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"一直以来,“任何用户都可以随时随地访问”(常被称为“身份即新安全边界”)是一个可望而不可及的目标。由于技术和文化的转变,再加上疫情期间大多数人都在远程办公,这一理想已成为现实。身份优先安全机制将身份置于安全设计的中心位置并要求大幅改变传统的局域网边缘设计思路。","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"Firstbrook先生表示:“SolarWinds被攻击事件表明,我们在身份管理和监控方面做得还不够好。我们在多重认证、单点登录和生物识别认证上花费了大量的资金和时间,但却忽视了通过有效监控身份验证来发现针对这一基础设施的攻击。”","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势三:继续为远程办公提供安全支持(Security Support for Remote Work is Here to Stay)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"link","attrs":{"href":"https://www.gartner.com/cn/newsroom/press-releases/gartner_2021_0","title":null,"type":null},"content":[{"type":"text","text":"Gartner 2021年首席信息官议程调查","attrs":{}}]},{"type":"text","text":"显示,目前有64%的员工能够在家办公。根据Gartner的调查,疫情后至少有30%至40%的人会继续在家办公。为了应对这一转变,许多企业机构需要重新设计适合现代化远程工作空间的政策和安全工具。例如需要将端点保护服务迁移至云端交付的服务。安全领导人还需要重新审视数据保护、灾难恢复和备份政策,确保它们仍然适用于远程环境。","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势四:对网络敏感的董事会(Cyber-Savvy Board of Directors)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"在","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn","title":null,"type":null},"content":[{"type":"text","text":"Gartner 2021年董事会调查","attrs":{}}]},{"type":"text","text":"中,董事们将网络安全评为仅次于监管合规的企业第二大风险源。现在,大型企业开始在董事会层面成立专门的网络安全委员会,该委员会由具有安全专业知识的董事会成员或第三方顾问领导。","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"Gartner预测,到2025年40%的董事会将设立专门的网络安全委员会并由一名具备相关资质的董事会成员监督,而现在这一比例还不到10%。","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势五:安全厂商整合(Security Vendor Consolidation)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"Gartner ","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn/newsroom/press-releases/gartner_2021_0","title":null,"type":null},"content":[{"type":"text","text":"2020年首席信息调查官效力调查","attrs":{}}]},{"type":"text","text":"发现,78%的首席信息安全官从其网络安全厂商组合中获得的工具达到16个以上;12%达到46个以上。企业机构中数量众多的安全产品增加了复杂性、集成成本和人员需求。在Gartner最近的一项调查中,80%的IT组织表示,他们计划在未来三年内整合厂商。","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"Firstbrook先生认为:“首席信息安全官希望整合他们必须使用的安全产品和厂商数量。通过减少安全解决方案的数量,他们可以更加轻松地正确配置这些解决方案并对警报作出响应,进而改善安全风险态势。但购买一个功能广泛的平台可能会带来成本和部署时间方面的不利影响。我们建议关注长期总拥有成本(TCO),以此作为衡量成功的标准。”","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势六:隐私增强计算(Privacy-Enhancing Computation)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"隐私增强计算技术正在不断涌现。这项技术可以在数据被使用时(而不是在数据静止或移动时)保护数据,从而实现安全的数据处理、共享、跨境传输和分析,甚至在不可信环境中也不例外。该技术在欺诈分析、情报、数据共享、金融服务(如反洗钱)、制药和医疗方面的部署量正在增加。","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"link","attrs":{"href":"https://www.gartner.com/cn","title":null,"type":null},"content":[{"type":"text","text":"Gartner预测","attrs":{}}]},{"type":"text","text":",到2025年50%的大型企业机构将采用隐私增强计算来处理不可信环境或多方数据分析用例中的数据。","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势七:入侵和攻击模拟(Breach and Attack Simulation)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"入侵和攻击模拟(BAS)工具正在不断出现,为企业机构提供持续性的防御态势评估,挑战渗透测试等年度定点评估所提供的有限可视性。如果首席信息安全官在其定期安全评估中加入BAS,他们就可以帮助他们的团队更有效地识别安全态势缺口并更高效地确定安全举措的优先级别。","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"趋势八:机器身份管理(Managing Machine Identities)","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"机器身份管理的目标是为与其他实体(如设备、应用、云服务或网关)交互的机器建立和管理身份信任。现在,企业机构中的非人类实体日益增加,这意味着机器身份管理已成为安全策略中的重要组成部分。","attrs":{}}]},{"type":"heading","attrs":{"align":null,"level":4},"content":[{"type":"text","text":"关于Gartner","attrs":{}}]},{"type":"paragraph","attrs":{"indent":0,"number":0,"align":null,"origin":null},"content":[{"type":"text","text":"Gartner,Inc.(纽约证券交易所:IT)是全球领先的","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn","title":null,"type":null},"content":[{"type":"text","text":"信息技术研究和顾问公司","attrs":{}}]},{"type":"text","text":",也是标准普尔500指数包含的上市公司之一。Gartner为企业领导者提供必不可少的见解、建议和工具,以帮助他们达成其优先处理的关键事项及建设在未来能够取得成功的企业机构。Gartner完美结合了专家主导、来源于从业者的资源和数据驱动的研究,使客户能够在最重要的问题上做出正确的决策。Gartner的客户遍及100多个国家的14,000个企业机构,覆盖各行各业、各种企业规模的主要职能部门。这些客户都深信Gartner是客观的资源提供者和重要合作伙伴。欲了解更多Gartner如何帮助决策者推动企业未来发展,请访问 ","attrs":{}},{"type":"link","attrs":{"href":"https://www.gartner.com/cn","title":null,"type":null},"content":[{"type":"text","text":"https://www.gartner.com/cn","attrs":{}}]}]}]}
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章