《2024网络安全重要趋势》_第1页
《2024网络安全重要趋势》_第2页
《2024网络安全重要趋势》_第3页
《2024网络安全重要趋势》_第4页
《2024网络安全重要趋势》_第5页
已阅读5页,还剩36页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Cybersecurityconsiderations2024Technology

innovations

demandstrategic

pragmatism.KPMG

International/cyberconsiderationsMeetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024ForewordForewordAs

2024unfolds,organizationalleaders,fromtheCEOdown,havemuchontheirplates.Theyarecontendingwithdiversechallengesaroundachievingsustainedgrowth,navigatingtheimpactandrisksofemergingtechnology,andattractingandretainingtalent,to

namejustafew.

Fortheirpart,

ChiefInformationSecurityOfficers

(CISOs)areincreasinglybeingviewedasproactiveco-stewardsoftheseongoingbusinessimperatives—notmerelythecavalryleaderridinginto

savethedayduringacrisis.ThisevolvingthreatlandscaperequiresorganizationsandtheirCISOsto

viewsecuritythroughanew,

morepragmaticlens.Morethaneverbefore,theymustbalancedatasecurityandprivacywiththebroaderobjectivesofthebusiness.Fromacybersecurityperspective,theimpactsofsocietal,economic,political,andregulatorydevelopmentsaremoreconsistentlyfeltgloballytoday.Thesimplereasonistheworldismoreconnected.Themostacuteeffectoftheconnectedbusinessecosystemcontinuesto

bewithinglobalsupplychains—forallpracticalpurposes,therearevirtuallynoregionsoftheworldthatareisolatedanymore.InourannualCybersecurityconsiderationsreport,adiversecross-sectionofglobalKPMG

cybersecurityspecialistsexploreseightconsiderationsthatCISOsandtheirteamsareencouragedto

prioritizeinthecomingyearto

supporttheorganization’sbusinessgrowthobjectivesbymitigatingtheimpactofspecificcyberincidentsandreducingoverallcyberriskexposure.However,thereremainlocalnuances.Forexample,thereareregulatoryrequirementsto

whichbusinessesmustadherethatremainuniquelyregional,suchascertainmarketsbeingmoresensitiveto

theprotectionofpersonaldataandnewrulesaroundresponsibleAI,

criticalinfrastructureandsupplychains.Organizationsworldwidefacemanycybersecuritychallengesrequiringtheimplementationofcontrolsto

buildandembedresilience,meetregulatorymandates,andreduceoverallrisk.However,therapidemergenceofartificialintelligence(AI)

asastrategictoolforbothlegitimateandnefariouspurposesisrapidlymovingupthelist.ThedemocratizationofAI

—theseadvancedtechnologysolutionsandmodelsarenowlargelyaccessibleto

anyonewithacreditcardviathecloud—hasatoncerevealednewpathsto

valuecreationandexposedsignificantpotentialrisks.AI

isprovingto

beatrueorganizationalgame-changer,includingforsecurityteams.There’saglobalfocuswithinthecybersecurityuniverseoncomplianceingeneral,witharefinedeyetowardtheoverallburdenofregulation,aswellasthediversityofvariousreportingrequirements.As

aresult,companiesareputtingmoreemphasisonembeddingprivacyandsecuritywithinthewaytheycomplywithabroadrangeoftrans-borderregulatoryrequirementsandregimes.Thisisofparticularinterestwhenitcomesto

buildingandgoverningresponsibleAI

systems,ensuringcustomerprivacy,andenactingguidelinesaroundcriticalinfrastructure,supplychains,smartproducts,andresilience.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20242Meetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024Atthesametime,cybersecuritybudgetsmayhaveto

bemoreobjectivelyjustifiedmovingforwardasorganizationsdealwitheconomicuncertainty.ManyCISOsareseeingflatbudgets,notnecessarilyreduced,assomeofthatspendisdivertedto

organizationalinnovation,particularlyAI

andautomationsolutions.Thisnoteworthydevelopmentrequiressecurityteamsto

engageintechnologyrationalizationandbudgetoptimization—essentially,doingmorewithless.Fundamentally,thisreportexploresfromvariousangleswhatisperhapsthecentralaspirationforexecutivesacrosstheenterprise:keepingtheirorganizationsresilient.Bottomline,ifadataleakornetworkbreachoccurs,howquicklycantheorganizationresumeregularoperations,andhowcantheimpactoncustomersbeminimized?Thisisemblematicoftheresilienceagendathatcanbeseenwithinmanyofthemostrecentlyproposedregulations,particularlythosefocusingoncriticalinfrastructuresectors.Inmanycases,theemphasisisnowonresponseandrecovery,aswellasmitigatingharmto

customers.Thisisadifferentlensthroughwhichto

viewsecurityrelativeto

thetraditionalperspective.Whileeconomicheadwindsdrivebudgetpressures,thereisagrowingviewthatcybersecurityhasmaturedto

thepointthatorganizationscantriminvestment.Further,securityfunctionalityisnowembeddedwithinotherITandtransformationbudgetsratherthanbeingacentralbudgetprovision.Also,theshiftto

acloud-based

security-as-a-service

approachembedssecuritycostsintocompanies’broaderoperatingexpensesinawaywehaven’tseenpreviously.Cybersecuritymustbeviewedasanever-evolvingongoingendeavor.Themoreorganizationsacceptcyberincidentsasinevitableyetmanageable,thebettertheirchancesofachievingthatbalancebetweenpreparationandresilience.Inthisenvironment,IencourageCISOsto

sharpentheircyberriskquantification(CRQ)process,whichhelpsexpresstheimpactofcybersecurityriskinfinancialtermsusingmathematicalmodelingto

illustrateriskthroughmeasurablevariables.1LookingatriskthroughaCRQlenscaneffectivelyAkhilesh

Tutejademonstratereturnoninvestmentandinvestmentprioritiesto

leadershipandtheBoard,ensuringtheorganizationunderstandsthethreatfrombothtechnologyandfinancialperspectives.GlobalCyberSecurityLeaderKPMGInternational1Forrester,

TheCyberRiskQuantificationLandscape,Q42022,November29,2022.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20243Eight

key

cybersecurity

considerations

for

2024Click

oneach

considerationtolearnmore.Meet

customer

expectations,Embed

cybersecurity

andimprove

trustprivacy,

for

good010204With

cyberthreatsanddata

privacyconcernsgrowing,CISOsshouldbeseekingtoworkcloselywithstakeholdersacrosstheorganizationtomaintain

trust

byensuringoperationsareresilientintheeventofanincident.The

actofembeddingsecurity

acrosstheorganizationshouldbeviewed

asanexerciseindrivingoperationalexcellence.Navigate

blurring

globalModernize

supply

chain

security03

boundariesDespitethechallenges

andcompetingpriorities,ensuringthesupplierandpartnerecosystem

issecureshouldnotbeabottleneck;

itshouldbea

businessenabler.A

centralconsiderationthatorganizationsshouldexamine

how

tomosteffectivelynavigate

theincreasinglycomplex

globalbusinesslandscapetoensureresilienceandbusinesscontinuity.Unlock

the

potential

ofAI

carefullySupercharge

security

with06

automation0507Securityandprivacyleadersshouldbesupportingthebusinessobjectivesrelianton

AIanddeterminehowtoharnessthisgame-changingtechnologyeffectivelyandresponsibly.As

operatingmodelsdigitize,

securityteamsshouldautomateandupgradetheirprocessestokeep

pace.Align

cybersecurity

withorganizational

resilienceMake

identity

individual,

notinstitutional08Organizationsshouldfinda

waytocreatea

broad-rangingcultureof

resilientsecuritythroughouttheenterprise

andseektoensureallstakeholdersareon

thesamepage.Driven

by

expanding

businessmodels,it’svital

thatorganizationsnow

view

identitynotinisolationbutfroma

broadperspective.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20244Meetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024Consideration

1Meet

customerexpectations,improve

trustIncreasing

trust

should

be

high

on

the

cyberagenda

in

relation

to

how

video

and

audiofiles

are

used

in

the

creation

of

deepfakes,

theimpact

of

which

can

be

grave

for

privacy

andperhaps

even

democracy.Mika

LaaksonenPartnerGlobalCyberSecurityESGLeaderKPMGinFinlandConsumers,employees,suppliers—everycorporatestakeholder—expectbusinessestopursuegrowthandprofits.Butincreasingly,companiesareexpectedtooperateinasociallyresponsiblemanner,

aswell.Organizationsshouldstrengthentheconnectionbetweensecurityandprivacyandenvironmental,social,andgovernance(ESG)factors.

Thisbondisbeingincreasinglyrecognizedacrossthebusinessecosystem,particularlyby

ESGratingservicesastheysearch

for

greatertransparencyinmeasuringandcomparingorganizations.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20245Meetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024Indeed,

roughly

two-thirds

ofconsumers

will

pay

moreforsustainable

products,

although

two-thirds

of

retailexecutives

are

skepticalthat

theyactually

will

pay

more.However,while

consumers

may

be

okay

with

payingextra

for

security,privacy

and

social

responsibility,thesefactorsare,forthemoment,“tablestakes,”

thecostofdoingbusiness,althoughtheyarelikelyto

hitthebottomlinesoonerratherthanlater.The

importance

of

ESG

and

how

security

improvelaborpolicies,andensureworkplacediversityand

privacy

fit

into

the

bigger

pictureandequality,to

namejustafew

items.4AddressingcybersecurityandprivacyspecificallyandESGbroadlyhavebecometopcorporateand,byextension,CISO,priorities.TherearedifferentAccordingto

theKPMG

2023

CEOOutlook,69

percentofCEOshaveembeddedESGintotheirbusinessasregulationsforspecificregionsandindustries,andameansofcreatingvalue,and50

percentanticipatethoseguidelinesneedto

engendertrust.Thisissignificantreturnsfromthoseeffortsoverthenextimportantfromacomplianceperspectivebutalsothreeto

fiveyears.Incasesinvolvingprivateequityorventurecapital,theethicallensthroughwhichthesefirmsviewtheirinvestmentsisworthnoting.Manynowlookforassurancesoftheappropriatelevelofcybersecurityandprivacymanagement.Ultimately,they'reconcernedaboutthebranddamagecybereventscanbringto

theorganizationswheretheyinfusefunds.noteworthybecauseB2BcustomersandB2CWhileenvironmentalaspectsoftheESGagendahavegarneredthemostattention,governanceelementssuchascybersecurityandprivacyarelesswell-developed.Withcyberthreatsanddataprivacyconcernsgrowing,CISOsneedto

workcloselywiththeirESGcounterpartsto

ensurethat,intheeventofanincident,operationsareresilientandcontinuityplansarereadyforactivation.consumershavediscreteexpectationsdirectlyimpactedbythevariousrules.Individualconsumerscanpurchasealternativeproductsorservicesifthey'renothappywiththeprovider’sactionsregardingtheirpersonaldata,privacyandresponseto

breaches.Infact,82

percentpreferabrand’svaluesto

alignwiththeirown,and75percentsaidtheywouldabandonabrandoveraByembeddingcyberandprivacyconsiderationsintosocialresponsibilityprogramsandprotectingcustomerdata,organizationscanincreasethechancesofmaintainingtheirreputationsandtrustamongcustomers,evenintheeventofamajorbreach.conflictinvalues.

Givenachoice,mostconsumers2prefercompaniesthatprioritizesecurity,privacy,andsustainabilitybyadheringto

ESGstandards.Increasingly,

there's

a

big

role

for

cyberto

play

regarding

AI

and

data

ethics.Determining

that

the

data

used

to

train

AIalgorithms

is

accurate,hasn’t

been

corrupted,and

is

free

from

bias

is

a

herculean

and,perhaps

ultimately,

impossible

task,but

wellworth

the

effort.ThisisespeciallytrueontheB2Bside,wherecorporatecustomersvaluesafeguardingtheirconfidentialdataandintellectualproperty.Moreandmoreindustrieshaveregulatoryrequirementsforcybersecurityanddataprivacy,andorganizationsthatcomplywiththeseForconsumerswhosharepersonalinformationwithpublicandprivateserviceproviders,thereisanexpectationthattheirdatawillbeprotectedandthatitwillnotbeusedforpurposesotherthanwhatthey’vesupplieditfor.regulationsarepreferredbystakeholders.

Formany3organizationsoperatinginB2Bindustries,thisismorethana“nice

to

have,”

withregulatoryobligationsflowingdirectlyfromfirmsinregulatedindustriestotheirsuppliers,whocouldbetarnishedbyassociationifthebrandexperiencesasignificantcyberevent.Atthesametime,there’s

anexpectationthat,inthepursuitoftheirbusinessobjectives,organizationswillactinasociallyresponsiblemannerto

reducetheircarbonfootprint,supporttheirlocalcommunities,Caroline

RivettPartnerGlobalCyberSecurityLife

SciencesLeaderKPMGintheUK234Google

Cloud,

“New

research

shows

consumers

more

interested

in

brands’

values

than

ever,”

April

27,

2022.KPMG,

Cybersecurity

in

ESG,

2023.First

Insight/Wharton

School

of

the

University

of

Pennsylvania,

“The

Sustainability

Disconnect

Between

Consumers

and

Retail

Executives,”

January

2022.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20246Meetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024The

social

benefits

of

actively

embedding

proliferatingdigitalcommunicationschannels.cybersecurity

into

the

ESG

agendafrictionless.

People

largely

don'tcare

untilsomething

badmaterializes,and

it

seemsasthough

they

want

theworkofsecurity

tohappen

“behind

the

curtain.”Privacycontrolscanalsoplayakey

roleinlimitingtheexploitationandmisuseofpersonalinformationwithoutconsentorknowledge.ThisisvitalinmaintainingtheA

big

part

of

theequation

is

demonstrating

tocustomersthat

cybersecurity

is

an

organizational

imperative

itsimply

istherightthing

todo.

Organizations

shouldapproach

thisas

though

they

aretrainingtheircustomersand

clients

tounderstand

and

care

about

theimplicationsofcyber

awarenessand

provethat

what

they'redoingisn’t

just

another

to-do

itembut

a

vital

service.The

scope

of

theESG

dialogue

needs

tobe

broadened

—at

manyorganizations,

it's

not

yet

common

tobe

talkingabout

cybersecurity

and

privacy

in

thecontextofESG.publictrustinorganizations.Many

decarbonization

and

CO

reduction

programs2relyon

digital

technologies

andautomated

systems

tomonitorand

manage

energy

production,

distribution,

andconsumption.

As

efficient

asthese

tools

can

be,theycan

also

create

unforeseencybersecurity

vulnerabilitiesand

requirea

high

level

ofdata

protection.Strategicallyembedding

cyber

can

helpmitigatethreats,

reduce

therisk

ofdata

breaches

and

ensureregulatory

compliance.Intoday’senvironment,therearedeepissueswiththesocialcontractbetweenorganizations,employeesandconsumersrelatingto

dataprotection.Increasingtrustshouldbehighonthecyberagendawhenitcomesto

howvideoandaudiofilesareusedinthecreationofdeepfakes—imagery,video,oraudiofeaturingaspecificindividualthatisreplacedwithanotherperson'sfaceorvoiceormanipulatedto

givetheimpressiontheindividualdidorsaidsomethingtheydidnot.Trainingpeople

outside

yourorganization

is

itself

anexercise

inESG

maintenance.Cybersecurity

AwarenessMonth

isanexample

of

how

governmentand

businessesworktogether

to

ensurethat

employees

and

consumersappreciate

the

basics

ofcybersecurity

to

avoidthe

mostobvious

risks.Finally,there's

asubstantialsocialresponsibilitydimensionto

bothcybersecurityandprivacywhereorganizationsshouldworkwithB2CandB2Bcustomersto

helpthembemorecyberaware.Banksdoitroutinely,andretailersaredoingitmoreandmore.There’salsoaconnectionto

supplychainandecosystemsecurity,whereimprovingthesecurityofthevendorecosystemiscritical.Deepfakesaredifficultto

combatsince,inmanyinstances,it’supto

theaudienceto

interpretwhetherthevideooraudioisrealorfraudulent.Organizationsmustbevigilantaboutidentifyingandremovingthesefilesandshouldparticipateineducatingthebroaderpubliconthesubject.Increasingly,there's

abigroleforcyberto

playregardingAI

anddataethics.Determiningthatthedatausedto

trainAI

algorithmsisaccurate,hasn’tbeencorrupted,andisfreefrombiasisaherculeanand,perhapsultimately,impossibletask,butwellworththeeffort.There

is

no

such

thingas

100

percent

security.Despiteall

theprecautions,

incidents

do

happen.

In

the

event

ofacyber

incident,

makea

quick

decision

about

whether

youneed

todisclose

what

happened

and,

if

so,

howmuchinformation

you’reprepared

or

compelled

to

share.5Do

people

really

care

whether

a

business

It'svital

tobe

open

and

honest;

good

communication

canlead

customers

totrust

anorganization

even

morethanhas

a

cyber

incident

if

it’s

managed?theymay

have

beforethe

incident.Theoretically,most

people

would

probably

say

that

theydon't

wanta

company

whose

products

or

services

theyuse

tosuffer

a

data

breach.

But

those

same

people

don'twant

topay

moreand

wanttouchpoints

tobe

quick

andPrivacyandcybersecurityalsoplayvitalrolesinprotectingfreedomofspeechandsecuringtoday’s5KPMG

International,

“Maintaining

cyber

vigilance

and

staying

resilient,”

2023.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20247Meetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024Learn

moreSuggested

actionsConnectwithyourorganization’s

ESGteamtodeterminewhethertheyconsidercyberakey

aspectoftheirmandate.Ifnot,worktobuildawarenessofhow

andwhy

it’s

importanttoallthreeareasofESG.Cybersecurity

in

ESGIt'stimetoviewESGandcybersecuritythroughthesamelens.Be

practical.Effective

cybersecurityisnotasmuch

aboutgettingbusinesspartnerstodothingsdifferentlyasit’s

aboutreframingtheconversationacrosstheenterprisetoinspireotherareasoftheorganizationtoinfusesecurityintowhattheyalreadydo.SharpenyourglobalregulatoryintelligencearoundcyberingeneralandESGandprivacyinparticulartoensuretimelycomplianceandreporting;keeptrack

ofandremainfamiliarwithever-increasingregulationsandtheireffects

onyourcyberefforts.KPMG

global

tech

report:

ESGHow

businessescanusetechnologyasanopportunitytotackletheirESGambitions.Road

to

readinessKPMGESG

AssuranceMaturityIndex2023.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20248Meetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024Consideration

2Embedcybersecurityand

privacy,for

goodSecurity,fromtheCISOdownthroughtheirentireteam,isaverydifferent

roletoday.

Cyberisbecomingmoreembeddedincorebusinessprocesses.That

realityisbeingreflectedinamoveaway

fromacentralizationofcybersecurityintheCISOroletoafederatedmodel,inwhich

theCISOistheconductoroftheorchestra,establishingtheframeworks,assessingrisk,andprovidingimplementationsupport.Securityisintegraltoeveryfunctionacrosstheorganization,fromfrontoffice

toback,

andmanyleadersnow

acknowledgethevalueofintegratingasecuritymindsetintotheirverydifferent

businessculturesandprocesses.©

2024

Copyright

owned

by

one

or

more

of

the

KPMG

International

entities.

KPMG

International

entities

provide

no

services

to

clients.

All

rights

reserved.Cybersecurity

considerations

20249Meetcustomerexpectations,improve

trustAligncybersecuritywithorganizationalresilienceEmbedcybersecurityandprivacy,

for

goodNavigate

blurringglobalboundariesModernize

supplychain

securityUnlock

thepotentialof

AI—

carefullySupercharge

securitywithautomationMake

identity

individual,notinstitutionalCyber

strategiesfor

2024Business

models

and

technology

arechanging

and

impacting

securityThe

irony

is

it

doesn'ttaketheCISOto

dothat.Managingtheserisks

requiresa

cultural

shift

across

the

businesstoembracesecurity

as

part

of

theorganization’sstandardoperating

procedures.CISOsdon'tinstall

patches,

andthey

don'tmanageoperations.Security

teamsshoulddetermine

how

andwhereto

embedcertain

securitytasks

in

thebusinessand

monitor

thosetasks

to

ensurethey

arecarried

outproperly.This

ishow

we

seesecurityteams

evolving.Embeddingsecurityintobroaderbusinessshouldbeviewedasanexerciseindrivingoperationalexcellence.Securityteamsshoulddescribeanddemonstratewhat

“good”lookslikeandinspireembeddedsecurityprofessionalsacrosstheenterprisetomanagetowardthatvision.It’s

amatterofestablishingappropriateguardrailstoenableasecure-by-designapproachtobeembedded,andthenintegratingtherighttoolingandtemplatesintodevelopmentenvironments.Whetheryou

makea

widget,delivera

service,

orcreateinformation,operatingmodels

areincreasinglycloud-based,which,

inconcertwithothernew

technologies,

isbeingusedtoincreasescalability,reducecosts,generaterevenue,and

widen

profitmargins.Theautomotiveindustryisagoodexampleoftransformingbusinessmodels.Carstodayhave

becomehugetabletsonwheels.People

areorderingpizzafromtheroadandnoteven

usingthephone.Somuchtechnologyhasbeenaddedtogas-poweredcars,nottomentionelectricvehicles,thattheyhave

becomearguablythemostsophisticatedproductavailabletoretailconsumers.It's

going

tobeamatter

of

“insourcing”to

nudgesecurity

closertothe

customeroroutsourcingtoa

third-party

service

provider

toefficiently

leverage

specializedskills

that

may

notexist

within

the

organization.Manyorganizations

struggle

with

the

idea

ofsecurity

asa

corecompe

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论