โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers

2 December 2025 at 12:34

As we look at the remainder of 2025 and beyond, the pace and sophistication of cyber attacks targeting the financial sector show no signs of slowing. In fact, based on research from Check Pointโ€™s Q2 Ransomware Report, the financial cybersecurity threat landscape is only intensifying. Gone are the days when the average hacker was a..

The post How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers appeared first on Security Boulevard.

โ€œํ†ต์‹ ์‚ฌ ๋ณด์•ˆ ๋ฆฌ๋ถ€ํŠธโ€ ๋‚ก์€ ๊ฒฝ๊ณ„๋ฅผ ๋ฒ„๋ฆฌ๊ณ  ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋กœ ์žฌ์„ค๊ณ„ํ•ด์•ผ ํ•˜๋Š” ์ด์œ 

25 November 2025 at 21:56

ํ†ต์‹  ๋„คํŠธ์›Œํฌ๋Š” ์ด์ œ ์–ด๋””์—๋‚˜ ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ๋ถ€ํ„ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๊ตฌ๋™, ๋Œ€๋ฅ™์„ ๊ฐ€๋กœ์ง€๋ฅด๋Š” ์‚ฌ๋žŒ ์—ฐ๊ฒฐ๊นŒ์ง€ ์„ธ์ƒ์„ ์›€์ง์ด๋Š” ๊ธฐ๋ฐ˜์ด ๋๋‹ค. ์˜ค๋žซ๋™์•ˆ ์ด ๋ถ„์•ผ์˜ ๋ณด์•ˆ ๋ฐฉ์‹์€ ๋น„๊ต์  ๋‹จ์ˆœํ–ˆ๋‹ค. ๋ฒฝ์„ ์„ธ์šฐ๊ณ , ์œ„ํ˜‘์€ ๋ฐ–์— ๋‘๊ณ , ๋‚ด๋ถ€๋Š” ์ „๋ถ€ ์‹ ๋ขฐํ•˜๋Š” ๋ฐฉ์‹์ด์—ˆ๋‹ค. ๋„คํŠธ์›Œํฌ๊ฐ€ ํ์‡„์ ์œผ๋กœ ์ž ๊ฒจ ์žˆ์„ ๋•Œ๋Š” ์ด๋Ÿฐ ๋ฐฉ์‹์ด๋ฉด ์ถฉ๋ถ„ํ–ˆ๋‹ค.

ํ•˜์ง€๋งŒ ๊ทธ๋Ÿฐ ์‹œ๋Œ€๋Š” ๋๋‚ฌ๋‹ค. ์ด์ œ ์›Œํฌ๋กœ๋“œ๋Š” ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํด๋ผ์šฐ๋“œ ์ „์—ญ์œผ๋กœ ํผ์ง€๊ณ  ์—ฃ์ง€ ๊ธฐ๊ธฐ๋Š” ํญ๋ฐœ์ ์œผ๋กœ ๋Š˜๊ณ , ์ˆ˜๋งŽ์€ ์„œ๋“œํŒŒํ‹ฐ ์†”๋ฃจ์…˜ ์—…์ฒด๊ฐ€ ํ†ต์‹ ๋ง์— ์—ฐ๊ฒฐ๋œ๋‹ค. ์˜ˆ์ „์˜ ๊ฒฝ๊ณ„์„  ๊ฐœ๋…์€ ์‚ฌ์‹ค์ƒ ์‚ฌ๋ผ์กŒ๋‹ค.

๊ทธ๋ž˜์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ํ•„์š”ํ•ด์กŒ๋‹ค. ๊ทธ์ € ์ตœ์‹  ์œ ํ–‰์–ด์— ๊ทธ์น˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ์ƒ์กด์„ ์œ„ํ•œ ํ•„์ˆ˜ ๋„๊ตฌ๊ฐ€ ๋๋‹ค. ๋งŽ์€ ๊ธฐ์—…์ด ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๋งˆ์น˜ ์‚ฌ์„œ ๋„์ž…ํ•  ์ˆ˜ ์žˆ๋Š” ์ œํ’ˆ ์ •๋„๋กœ ์˜คํ•ดํ•œ๋‹ค๋Š” ์ ์ด๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๊ทธ๋Ÿฐ ๋ฐฉ์‹์œผ๋กœ ์ž‘๋™ํ•˜์ง€ ์•Š๋Š”๋‹ค.

ํ†ต์‹ ์„ ๋ฐœ๋ชฉ ์žก๋Š” ์˜คํ•ด

ํ†ต์‹  ์—…๊ณ„๋ฅผ ๋ณด๋ฉด ์–ด๋А ๊ณณ์—์„œ๋‚˜ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ผ๋Š” ๋‹จ์–ด๊ฐ€ ๋‚˜์˜จ๋‹ค. ์ด์‚ฌํšŒ, ์ „๋žต ๋ฌธ์„œ, ์†”๋ฃจ์…˜ ์—…์ฒด ํ”„๋ ˆ์  ํ…Œ์ด์…˜ ๋“ฑ ์–ด๋””์—๋‚˜ ๋“ฑ์žฅํ•œ๋‹ค. ๊ทธ๋Ÿฐ ๊ณผ์ •์—์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ์˜ ๋ณธ๋ž˜ ์˜๋ฏธ๊ฐ€ ๋งŽ์ด ํฌ์„๋๋‹ค. ๋งŽ์€ ๊ฒฝ์˜์ง„์ด ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๊ทœ์ œ ์ค€์ˆ˜ ์ฒดํฌ๋ฆฌ์ŠคํŠธ ํ•œ ์ค„, ๋˜๋Š” ๋˜ ํ•˜๋‚˜์˜ ์†Œํ”„ํŠธ์›จ์–ด ๊ตฌ์ถ• ์‚ฌ์—… ์ •๋„๋กœ ์—ฌ๊ธด๋‹ค.

ํ˜„์‹ค์€ ํ›จ์”ฌ ๋ƒ‰์ •ํ•˜๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ์‚ฌ๊ณ ๋ฐฉ์‹์ด๋‹ค. ๊ฐ€์ •์„ ๋ฒ„๋ฆฌ๊ณ  ๋Š์ž„์—†์ด ๊ฒ€์ฆํ•˜๋Š” ์ชฝ์œผ๋กœ ์ „ํ™˜ํ•˜๋Š” ๊ด€์ ์ด๋‹ค. ์ด๋Ÿฐ ์‚ฌ๊ณ ๋ฐฉ์‹์ด ์กฐ์ง ๋ฌธํ™”์— ์Šค๋ฉฐ๋“ค์–ด์•ผ ๋ณด์•ˆ์ด โ€˜ํ•ด์•ผ ํ•˜๋Š” ์ผโ€™ ์ˆ˜์ค€์„ ๋ฒ—์–ด๋‚˜ ์‹ค์ œ ์šด์˜ ๋ฐฉ์‹์œผ๋กœ ์ž๋ฆฌ ์žก๋Š”๋‹ค. ํ•˜์ง€๋งŒ ๋Œ€๋ถ€๋ถ„ ํ†ต์‹ ์‚ฌ๋Š” ์ด๋Ÿฐ ์ธ์‹ ์ „ํ™˜์— ์•„์ง ์ด๋ฅด์ง€ ๋ชปํ–ˆ๋‹ค. ํ‘œ๋ฉด์ ์ธ ์•ˆ์ „๋งŒ ๋ฏฟ๊ณ  ์žˆ๊ณ , ๊ณต๊ฒฉ์ž๋Š” ์ด๋Ÿฐ ํ—ˆ์ ์„ ์ •๊ตํ•˜๊ฒŒ ํŒŒ๊ณ ๋“ ๋‹ค.

ํ”ผํ•ด๊ฐ€ ์—ฐ๊ฒฐ๋˜๋Š” IT์™€ OT

์š”์ฆ˜ OT(์šด์˜๊ธฐ์ˆ ) ํ™˜๊ฒฝ์„ ๋…ธ๋ฆฌ๋Š” ๊ณต๊ฒฉ์€ ๋Œ€๋ถ€๋ถ„ IT ํ™˜๊ฒฝ์—์„œ ์ถœ๋ฐœํ•œ๋‹ค. ๊ณต๊ฒฉ์ž๊ฐ€ ๊ด€๋ฆฌ์ž ๊ณ„์ •์„ ํƒˆ์ทจํ•˜๊ฑฐ๋‚˜ ํ—ˆ์ˆ ํ•œ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ฐพ์œผ๋ฉด, ๋„คํŠธ์›Œํฌ ์žฅ๋น„๋‚˜ ๊ธฐ์ง€๊ตญ ์ปจํŠธ๋กค๋Ÿฌ ๊ฐ™์€ ํ•ต์‹ฌ ์„ค๋น„ ์ชฝ์œผ๋กœ ๋ฐ”๋กœ ์ด๋™ํ•  ์ˆ˜ ์žˆ๋‹ค.

IT์™€ OT์˜ ๊ฐ„๊ทน์„ ์ค„์ด๋Š” ํ•ด๋ฒ•์€ ์กฐ์ง๋„๋ฅผ ๋ฐ”๊พธ๋Š” ์ผ์ด ์•„๋‹ˆ๋‹ค. ๋ชจ๋“  ๊ฒƒ์„ ํ•œ๋ˆˆ์— ๋ณด๊ณ , ๋‹จ์ผํ•œ ๊ทœ์น™ ์ง‘ํ•ฉ์œผ๋กœ ๋‹ค๋ฃจ๋Š” ์ผ์ด๋‹ค. ์ ‘๊ทผ ๊ถŒํ•œ ์ •์ฑ…์„ ๊ณต์œ ํ•˜๊ณ  ํŒจ์น˜ ์šฐ์„ ์ˆœ์œ„๋ฅผ ๋ช…ํ™•ํžˆ ์ •ํ•˜๊ณ , ์œ„ํ˜‘ ํƒ์ง€๋ฅผ ํ†ตํ•ฉํ•ด์•ผ ํ•œ๋‹ค. ์ด๋Ÿฐ ์š”์†Œ๊ฐ€ ํ•˜๋‚˜๋กœ ๋งž๋ฌผ๋ ค ๋Œ์•„๊ฐˆ ๋•Œ ๋น„๋กœ์†Œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ํ˜„์‹ค์ ์ธ ๋ณด์•ˆ ๋ชจ๋ธ๋กœ ๊ตฌํ˜„๋œ๋‹ค.

์ง„์งœ ์  : ์ง‘์š”ํ•จ๊ณผ ์ธ๋‚ด์‹ฌ

ํ†ต์‹  ์‚ฌ์—…์ž๋Š” ์ด์ œ ๊ฐœ์ธ ํ•ด์ปค๋‚˜ ๋žœ์„ฌ์›จ์–ด ๋ฒ”์ฃ„์กฐ์ง๋งŒ ์ƒ๋Œ€ํ•˜์ง€ ์•Š๋Š”๋‹ค. ์˜ค๋Š˜๋‚  ๊ฐ€์žฅ ํฐ ์œ„ํ˜‘์€ ์ถฉ๋ถ„ํ•œ ์ž๊ธˆ๊ณผ ์ธ๋ ฅ์„ ๊ฐ–์ถ˜ ์ง‘์š”ํ•œ ๊ณต๊ฒฉ ๊ทธ๋ฃน์ด๋‹ค. ๊ตญ๊ฐ€ ์ฐจ์›์˜ ๊ณต๊ฒฉ ์กฐ์ง์ด ๋ณด์ด์ง€ ์•Š๊ฒŒ ์ž ๋ณตํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ์†”ํŠธ ํƒ€์ดํ‘ผ(Salt Typhoon)๊ณผ ๊ฐ™์€ ๊ณต๊ฒฉ ์‚ฌ๋ก€๋Š” ์ด๋Ÿฐ ๊ทธ๋ฃน์ด ํ†ต์‹ ๋ง ์•ˆ์— ๋ช‡ ๋‹ฌ์”ฉ ๋จธ๋ฌด๋ฅด๋ฉฐ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๋นผ๋‚ด๊ณ , ๊ทธ ๊ฒฐ๊ณผ๊ฐ€ ์‹ค์ œ ์ง€์ •ํ•™์  ์œ„ํ—˜์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ์Œ์„ ๋ณด์—ฌ์คฌ๋‹ค.

๋ฏธ๊ตญ ์‚ฌ์ด๋ฒ„๋ณด์•ˆยท์ธํ”„๋ผ๋ณด์•ˆ๊ตญ(CISA)์€ 2021๋…„ ์ดํ›„ ์ „ ์„ธ๊ณ„ ํ†ต์‹  ์‚ฌ์—…์ž๋ฅผ ์นจํˆฌํ•œ ๊ณต๊ฒฉ ์‚ฌ๋ก€์™€ ๊ด€๋ จํ•ด ๋ณผํŠธ ํƒ€์ดํ‘ผ(Volt Typhoon)์„ ํฌํ•จํ•œ ์ค‘๊ตญ ์—ฐ๊ณ„ ๊ทธ๋ฃน์˜ ์œ„ํ—˜์„ ๊ณต์‹ ๊ฒฝ๊ณ ํ–ˆ๋‹ค.

์—†๋Š” ์‹ ๋ขฐ๋ฅผ ์ƒˆ๋กœ ์Œ“๋Š” ๋ฐฉ๋ฒ•

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๋‹จ์ˆœํ•œ ๊ธฐ์ˆ  ์—…๊ทธ๋ ˆ์ด๋“œ๊ฐ€ ์•„๋‹ˆ๋ผ ์Šต๊ด€์˜ ๋ฌธ์ œ๋‹ค. ๊ทธ ์ค‘์—์„œ๋„ ์„ธ ๊ฐ€์ง€ ์Šต๊ด€์ด ํ•ต์‹ฌ์ด๋‹ค. ํ•ญ์ƒ ๊ฒ€์ฆํ•˜๊ณ , ํ•„์š”ํ•œ ๋งŒํผ๋งŒ ๊ถŒํ•œ์„ ์ฃผ๊ณ , ๋ฌธ์ œ๊ฐ€ ํผ์ง€์ง€ ๋ชปํ•˜๊ฒŒ ๋ง‰๋Š” ์ผ์ด๋‹ค.

  • ํ•ญ์ƒ ๊ฒ€์ฆํ•˜๊ธฐ. ๋กœ๊ทธ์ธ ์ ˆ์ฐจ๊ฐ€ ๊ฒ€์ฆ์˜ ๋์ด ์•„๋‹ˆ๋‹ค. ์‚ฌ๋žŒ, ๊ธฐ๊ธฐ, ์‹œ์Šคํ…œ ๋ชจ๋‘์— ๋Œ€ํ•ด ์ ‘์† ์œ„์น˜, ์ˆ˜ํ–‰ํ•˜๋Š” ์ž‘์—…, ํ‰์†Œ์™€ ๋‹ค๋ฅธ ์ ์ด ์žˆ๋Š”์ง€ ๊ณ„์† ์‚ดํŽด์•ผ ํ•œ๋‹ค.
  • ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ. ์‚ฌ๋žŒ์ด๋‚˜ ์‹œ์Šคํ…œ์ด ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋Š” ๊ถŒํ•œ์„ ์ตœ์†Œํ™”ํ• ์ˆ˜๋ก ๋ฌธ์ œ๊ฐ€ ์ƒ๊ฒผ์„ ๋•Œ ํ”ผํ•ด ๋ฒ”์œ„๊ฐ€ ์ค„์–ด๋“ ๋‹ค. ๊ถŒํ•œ๋งŒ ์ž˜ ์ฃ„์–ด๋„ ๋ณ„๋„์˜ ํ™”๋ คํ•œ ์‹ ๊ทœ ๋„๊ตฌ ์—†์ด๋„ ์œ„ํ—˜์„ ํฌ๊ฒŒ ๋‚ฎ์ถœ ์ˆ˜ ์žˆ๋‹ค.
  • ๋„คํŠธ์›Œํฌ ๋ถ„๋ฆฌ. ๋ฌธ์ œ ํ™•์‚ฐ์„ ์ฐจ๋‹จํ•˜๋Š” ์ผ์ด๋‹ค. ๋„คํŠธ์›Œํฌ๋ฅผ ์ž‘๊ณ  ๊ณ ๋ฆฝ๋œ ์˜์—ญ์œผ๋กœ ์ž˜๊ฒŒ ๋‚˜๋ˆ„๋Š” ๋งˆ์ดํฌ๋กœ ์„ธ๊ทธ๋จผํŠธ ๊ตฌ์กฐ๋ฅผ ๋งŒ๋“ ๋‹ค. ์ด๋ ‡๊ฒŒ ๋ถ„๋ฆฌ๋œ ๋„คํŠธ์›Œํฌ์—์„œ๋Š” ์นจํ•ด ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ•ด๋„ ํ”ผํ•ด๋ฅผ ์ตœ์†Œํ™”ํ•  ์ˆ˜ ์žˆ๋‹ค.

์™ธ๋ฉดํ•˜๊ธฐ ์–ด๋ ค์šด ์กด์žฌ, ๋ ˆ๊ฑฐ์‹œ ๊ธฐ์ˆ 

์†”์งํžˆ ๋งํ•ด ๋ ˆ๊ฑฐ์‹œ ์ธํ”„๋ผ๋Š” ์‚ฌ๋ผ์ง€์ง€ ์•Š๋Š”๋‹ค. ์ˆ˜์‹ญ ๋…„ ์ „์— ๊ตฌ์ถ•ํ•œ ๋„คํŠธ์›Œํฌ ํ•˜๋“œ์›จ์–ด๊ฐ€ ์ง€๊ธˆ๋„ ํ†ต์‹ ๋ง์„ ์ง€ํƒฑํ•œ๋‹ค. ๋‹น์‹œ ์žฅ๋น„๋Š” 24์‹œ๊ฐ„ ๊ฐ€๋™๊ณผ ๋‚ด๋ถ€ ์ž๋™ ์‹ ๋ขฐ๋ฅผ ์ „์ œ๋กœ ์„ค๊ณ„๋๋‹ค. ์ „๋ถ€ ์ƒˆ ์žฅ๋น„๋กœ ๊ต์ฒดํ•˜๋Š” ์ผ์€ ์œ„ํ—˜ ๋ถ€๋‹ด์ด ํฌ๊ณ  ๋น„์šฉ๋„ ๋ง‰๋Œ€ํ•˜๋‹ค. ๊ทธ๋Œ€๋กœ ๋‘๋Š” ์„ ํƒ์ง€๊ฐ€ ์กฐ๊ธˆ ๋” ์œ„ํ—˜ํ•  ๋ฟ์ด๋‹ค.

ํ˜„์‹ค์ ์ธ ํ•ด๋ฒ•์€ ๊ธฐ์กด ์‹œ์Šคํ…œ์„ ํ˜„๋Œ€์ ์ธ โ€˜๋ณด์•ˆ ์…ธโ€™๋กœ ๊ฐ์‹ธ๋Š” ์ผ์ด๋‹ค. ๋ณด์•ˆ ๊ฒŒ์ดํŠธ์›จ์ด, ์ค‘์•™์ง‘์ค‘ํ˜• ์ธ์ฆ, ์„ธ์…˜ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ฐ™์€ ๊ณ„์ธต์„ ๋ง์”Œ์šฐ๋Š” ๋ฐฉ์‹์ด๋‹ค. ์ด๋Ÿฐ ๊ณ„์ธต์„ ์ถ”๊ฐ€ํ•˜๋ฉด ๋Œ€๊ทœ๋ชจ ๊ต์ฒด๋กœ ์ธํ•œ ์„œ๋น„์Šค ์ค‘๋‹จ ์œ„ํ—˜ ์—†์ด๋„ ์ง€๊ธˆ ๋‹น์žฅ ๋ณด์•ˆ ์ˆ˜์ค€์„ ๋Œ์–ด์˜ฌ๋ฆด ์ˆ˜ ์žˆ๋‹ค.

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ์˜ ๋ชฉํ‘œ๋Š” ์™„๋ฒฝํ•œ ์ด์ƒํ–ฅ์„ ์ข‡๋Š” ์ผ์ด ์•„๋‹ˆ๋‹ค. ์ „์ฒด ๋ณด์•ˆ ์ˆ˜์ค€์„ ํ•œ ๋‹จ๊ณ„์”ฉ ๋Œ์–ด์˜ฌ๋ฆฌ๋Š” ๊ณผ์ •์ด๋‹ค. ๋งค ์—ฐ๊ฒฐ์„ ๊ฒ€์ฆํ•˜๊ณ , ํ•˜๋‚˜์”ฉ ์›Œํฌ๋กœ๋“œ๋ฅผ ๋ถ„๋ฆฌํ•  ๋•Œ๋งˆ๋‹ค ๋„คํŠธ์›Œํฌ๋Š” ์กฐ๊ธˆ์”ฉ ๋” ๋‹จ๋‹จํ•ด์ง„๋‹ค.

๊ตญ๊ฒฝ์„ ๋„˜๋‚˜๋“œ๋Š” ์‹ค์งˆ์  ์ปดํ”Œ๋ผ์ด์–ธ์Šค

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๊ธฐ์กด ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๊ทœ์ •์„ ๋ฌด์‹œํ•˜๋Š” ๊ฐœ๋…์ด ์•„๋‹ˆ๋‹ค. ๊ทธ๋Ÿฐ ๊ทœ์ •์„ ํ† ๋Œ€๋กœ ์Œ“์•„ ์˜ฌ๋ฆฌ๋Š” ์ „๋žต์ด๋‹ค. ISO 27001, ๋ฏธ๊ตญ ๊ตญ๋ฆฝํ‘œ์ค€๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ์˜ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ(NIST Cybersecurity Framework), ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ NIS2 ์ง€์นจ(EU NIS2 Directive), ๊ฐ๊ตญ ํ†ต์‹  ๊ทœ์ œ ๋“ฑ ์–ด๋–ค ๊ทœ์ œ๋ฅผ ์ ์šฉํ•˜๋”๋ผ๋„ ํ•ต์‹ฌ์€ ๊ฐ™๋‹ค. ์œ„ํ—˜์„ ๊ณ„์† ์ ๊ฒ€ํ•˜๊ณ , ๋ˆ„๊ฐ€ ๋“ค์–ด์˜ค๋Š”์ง€ ํ†ต์ œํ•˜๊ณ , ๊ด€๋ฆฌ ์ƒํƒœ๋ฅผ ์ฆ๋ช…ํ•˜๋Š” ์ผ์ด๋‹ค.

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๊ด€์ ์„ ์ด๋Ÿฐ ํ”„๋ ˆ์ž„์›Œํฌ์— ๋…น์—ฌ ๋„ฃ์œผ๋ฉด ์ปดํ”Œ๋ผ์ด์–ธ์Šค๋Š” ๊ณจ์นซ๊ฑฐ๋ฆฌ๊ฐ€ ๋˜์ง€ ์•Š๋Š”๋‹ค. ๋‹จ์ˆœํžˆ ์š”๊ฑด์„ ์ฑ„์šฐ๋Š” ์ž‘์—…์ด ์•„๋‹ˆ๋ผ ์ผ์ƒ์ ์ธ ๋ณด์•ˆ ํ™œ๋™์˜ ์ผ๋ถ€๊ฐ€ ๋œ๋‹ค. ์œ„ํ˜‘ ์–‘์ƒ์ด ๋ฐ”๋€Œ๋ฉด ๋ณดํ˜ธ ์ฒด๊ณ„๋„ ํ•จ๊ป˜ ๋ฐ”๋€๋‹ค. ๋„คํŠธ์›Œํฌ๊ฐ€ ์–ด๋””์— ์œ„์น˜ํ•˜๋“  ์ ๊ฒ€์„ ๋ฐ›๊ธฐ์— ์ถฉ๋ถ„ํ•œ ์ค€๋น„ ์ƒํƒœ๋ฅผ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋‹ค.

์„ฑ๊ณผ๊ฐ€ ๋ณด์ด๋Š” ์ „ํ™˜ : ์ฒซ 180์ผ ๋™์•ˆ ํ™•์ธํ•  6๊ฐ€์ง€ KPI

๊ฒฝ์˜์ง„์€ ๋ง‰์—ฐํ•œ ์•ฝ์†์ด ์•„๋‹ˆ๋ผ ์ฆ๊ฑฐ๋ฅผ ์›ํ•œ๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๋„์ž…ํ•ด ์ฒ˜์Œ 6๊ฐœ์›” ๋™์•ˆ ์‹ค์ œ๋กœ ์‚ดํŽด๋ด์•ผ ํ•  ์ง€ํ‘œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค.

  • ํ•„์š” ์ด์ƒ์œผ๋กœ ๋‚จ์•„ ์žˆ๋˜ ๊ณ ๊ธ‰ ๊ถŒํ•œ ๊ณ„์ • ์ˆ˜๊ฐ€ ์ค„์–ด๋“ ๋‹ค.
  • ์ด์ƒ ์ง•ํ›„๋ฅผ ํฌ์ฐฉํ•˜๋Š” ์†๋„๊ฐ€ ๋นจ๋ผ์ง„๋‹ค.
  • ์ ‘๊ทผ ์Šน์ธ ์ ˆ์ฐจ๊ฐ€ ์ง€์—ฐ๋˜์ง€ ์•Š๊ณ , ๊ฑฐ๋ฒ„๋„Œ์Šค๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค ์†๋„์— ๋งž์ถฐ ์›€์ง์ธ๋‹ค.
  • ๋” ๋งŽ์€ ์—”๋“œํฌ์ธํŠธ์™€ ์›Œํฌ๋กœ๋“œ๊ฐ€ ๋ชจ๋‹ˆํ„ฐ๋ง ๋Œ€์ƒ์— ์˜ฌ๋ผ๊ฐ„๋‹ค.
  • ๋„คํŠธ์›Œํฌ ๋‚ด๋ถ€๋ฅผ ๋ชฐ๋ž˜ ๋Œ์•„๋‹ค๋‹ˆ๋Š” ์นจ์ž… ํ–‰์œ„๊ฐ€ ์ค„์–ด๋“ ๋‹ค.
  • IT์™€ OT ํŒ€์ด ๊ณต๋™ ๋Œ€์‘ ํ›ˆ๋ จ์„ ์‹ค์ œ๋กœ ์ˆ˜ํ–‰ํ•œ๋‹ค.

์ด๋“ค ์ง€ํ‘œ๋Š” ๋ณด์—ฌ์ฃผ๊ธฐ์šฉ ์ˆ˜์น˜๊ฐ€ ์•„๋‹ˆ๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ์œ ํ–‰์–ด๋ฅผ ๋„˜์–ด ์‹ค์ œ๋กœ ํšจ๊ณผ๋ฅผ ๋‚ด๊ณ  ์žˆ์Œ์„ ์ฆ๋ช…ํ•˜๋Š” ์ง€ํ‘œ๋‹ค. ์ดํ›„ ์ „๋žต์„ ๊ณ„์† ๊ณ ๋„ํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ฐ˜์ด ๋œ๋‹ค.

์œ ํ–‰์–ด์—์„œ ๊ธฐ๋ณธ ์›์น™์œผ๋กœ

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๋” ์ด์ƒ ๋ง๋ฟ์ธ ๊ฐœ๋…์ด ์•„๋‹ˆ๋‹ค. ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ์ˆ˜์ค€์„ ํ‰๊ฐ€ํ•˜๋Š” ๊ธฐ์ค€์œผ๋กœ ์ž๋ฆฌ ์žก์•˜๋‹ค. ํ†ต์‹  ์‚ฐ์—…์—์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๋„์ž…์€ ์ด๋ฏธ์ง€ ๊ด€๋ฆฌ๊ฐ€ ์•„๋‹ˆ๋ผ ์ƒ์กด ์ „๋žต์ด๋‹ค.

์‹œ์žฅ์กฐ์‚ฌ๊ธฐ๊ด€ ๊ฐ€ํŠธ๋„ˆ๋Š” 2027๋…„๊นŒ์ง€ ๊ธฐ์—…์˜ 70%๊ฐ€ ๋ณด์•ˆ ์ „๋žต ์ˆ˜๋ฆฝ์„ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๊ด€์ ์—์„œ ์‹œ์ž‘ํ•  ๊ฒƒ์œผ๋กœ ์ „๋งํ•œ๋‹ค. ํ˜„์žฌ ์ˆ˜์น˜๋Š” 20%์—๋„ ๋ชป ๋ฏธ์นœ๋‹ค.

์—ฌ์ „ํžˆ ๋‚ก์€ ๊ฒฝ๊ณ„ ๋ฐฉ์–ด์— ๋งค๋‹ฌ๋ฆฌ๋ฉด ๊ณผ๊ฑฐ ์ „์Ÿ์„ ์น˜๋ฅด๋Š” ์…ˆ์ด๋‹ค. ์„ ๋„ ์‚ฌ์—…์ž๋Š” ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ์—ฌ์ •์œผ๋กœ ๋ฐ›์•„๋“ค์ด๊ณ  ์žˆ๋‹ค. ์ด ๊ธฐ์—…์ด ์•ž์œผ๋กœ ๋ชจ๋‘๊ฐ€ ์˜์กดํ•˜๊ฒŒ ๋  ํ†ต์‹  ๋„คํŠธ์›Œํฌ๋ฅผ ์ฐจ๊ทผ์ฐจ๊ทผ ๊ตฌ์ถ•ํ•˜๊ณ  ์žˆ๋‹ค.
dl-ciokorea@foundryco.com

Why trust is the new currency in the agentic era โ€” and what itโ€™s worth

25 November 2025 at 11:22

The World Economic Forum calls trust โ€œthe new currencyโ€ in the agentic AI era and thatโ€™s not just a metaphor: An increase of 10 percentage points in trust directly translates to 0.5% GDP growth. But hereโ€™s what makes trust as a currency fundamentally different from any thatโ€™s come before: you canโ€™t borrow it, you canโ€™t buy it and you canโ€™t simply mint more.

When it comes to AI, trust used to mean one thing โ€” accuracy. Does the model predict correctly? Then we started asking harder questions about bias, transparency and whether we could explain the AIโ€™s reasoning. Agentic AI changes the equation entirely. When a system doesnโ€™t just analyze or recommend, but actually takes action, trust shifts from โ€œDo I believe this answer?โ€ to โ€œAm I still in full control of what this system does?โ€

In the agentic era, trust must evolve from ensuring accurate results to building systems that can ensure continuous control and reliability of AI agents. As a result, trust is now the foundational architecture that separates organizations capable of deploying autonomous agents from those perpetually managing the consequences of systems they cannot safely control. My question for enterprise leaders is: Are you building that infrastructure now or will you spend next several years explaining why you didnโ€™t?

The growing trust deficit

The numbers tell a story of eroding confidence at precisely the moment when trust matters most. According to Stanford Universityโ€™s Institute for Human-Centered Artificial Intelligence, globally, as AI-related incidents surged 56.4%, confidence that AI companies protect personal data fell from 50% in 2023 to 47% in 2024.

This isnโ€™t just a perception problem. One out of six enterprise security breaches now involves AI, yet 97% of affected companies lacked proper access controls. By 2028, Gartner estimates a quarter of enterprise breaches will trace to AI agent abuse.

Hereโ€™s the paradox: while 79% of companies have already adopted AI agents and another 15% are exploring possibilities, according to PwC, most companies have no AI-specific controls in place. In short, as companies rush to adopt agentic AI, weโ€™re witnessing a fundamental readiness gap between vulnerabilities and defenses. Trust is eroding faster than companies can catch up.

The economics of trust infrastructure

Ironically, AI will also be your best defense, whether itโ€™s against AI-amplified attacks by external parties or against AI agents behaving maliciously. An IBM report found that โ€œorganizations using AI and automation extensively throughout their security operations saved an averageย $1.9 millionย in breach costs and reduced the breach lifecycle by an average of 80 days.โ€ Leveraging AI to enhance security delivers both monetary and efficiency ROI, with breaches solved an average of 80 days faster than non-automated operations. Thatโ€™s not hypothetical risk management but measurable competitive advantage, especially because it enables use cases that competitors canโ€™t risk deploying.

Traditional security was built on static trust: verify identity at the gate, then assume good behavior inside the walls. Agentic AI demands we go further. Unlike traditional applications, AI agents adapt autonomously, modify their own behavior and operate at machine speed across enterprise systems; this means yesterdayโ€™s trusted agent could potentially be todayโ€™s compromised threat that immediately reverts to normal behavior to evade detection.

Trust cannot be established and maintained just at the perimeter; our focus must shift to inside the walls as well. Securing these dynamic actors requires treating them less like software and more like a workforce, with continuous identity verification, behavioral monitoring and adaptive governance frameworks.

Successful trust architecture rests on three foundational pillars, each addressing distinct operational requirements while integrating into a cohesive security posture.

Pillar 1: Verifiable identity

Every AI agent requires cryptographic identity verification comparable to employee credentials. Industry leaders recognize this imperative: Microsoft developed Entra Agent ID for agent authentication, while Oktaโ€™s acquisition of Axiom and Palo Alto Networksโ€™ $25 billion CyberArk purchase signal market recognition that agent identity management is critical.

Organizations must register agents in configuration management databases with the same rigor applied to employee vetting and physical infrastructure, establishing clear accountability for every autonomous actor operating within enterprise boundaries.

Pillar 2: Comprehensive visibility and continuous monitoring

Traditional security tools monitor network perimeters and user behavior but lack mechanisms to detect anomalous agent activity. Effective trust infrastructure requires purpose-built observability platforms capable of tracking API call patterns, execution frequencies and behavioral deviations in real time.

Gartner predicts guardian agents, which are AI systems specifically designed to monitor other AI systems, will capture 10% to 15% of the agentic AI market by 2030, underscoring the necessity of layered oversight mechanisms.

Pillar 3: Governance as executable architecture

Effective governance transforms policies from static documents into executable specifications that define autonomy boundaries, such as which actions agents can execute independently, which operations require human approval and which capabilities remain permanently restricted. Organizations with mature responsible AI frameworks achieve 42% efficiency gains, according to McKinsey, demonstrating that governance enables innovation rather than constraining it โ€” provided the governance operates as an architectural principle rather than a compliance afterthought.

Research from ServiceNow and Oxford Economicsโ€™ AI Maturity Index reveals that pacesetter organizations that are achieving measurable AI benefits have established cross-functional governance councils with genuine executive authority, not technical committees relegated to advisory roles.

In sum, trust infrastructure isnโ€™t defensive. Itโ€™s the prerequisite for deploying AI agents in high-value workflows where competitive advantage actually resides, separating organizations capable of strategic deployment from those perpetually constrained by risks they cannot adequately manage.

The 2027 divide

Gartner predicts 40% of agentic AI projects will be canceled by 2027, citing inadequate risk controls as a main factor. By then, there will be a clear divide between organizations that can safely deploy ambitious agentic use cases and those that cannot afford to. The former will have built trust as infrastructure; the latter will be retrofitting security onto systems already deployed and discovering problems through costly incidents.

Trust canโ€™t be borrowed from consultants or bought from vendors. Unlike traditional currencies that flow freely, trust in the age of agentic AI must be earned through verifiable governance, transparent operations and systems designed with security as a core principle, not an afterthought. As the gap between those who have it and those who donโ€™t widens, the architectural decisions you make today will determine which side of the divide youโ€™re on.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

The Death of Legacy MFA and What Must Rise in Its Place

24 November 2025 at 14:37

Tycoon 2FA proves that the old promises of โ€œstrong MFAโ€ came with fine print all along: when an attacker sits invisibly in the middle, your codes, pushes, and one-time passwords become their codes, pushes, and one-time passwords too. Tycoon 2FA: Industrial-Scale Phishing Comes of Age Tycoon 2FA delivers a phishing-as-a-service kit that hands even modestly..

The post The Death of Legacy MFA and What Must Rise in Its Place appeared first on Security Boulevard.

Signing In to Online Accounts

Explore secure methods for signing into online accounts, including SSO, MFA, and password management. Learn how CIAM solutions enhance security and user experience for enterprises.

The post Signing In to Online Accounts appeared first on Security Boulevard.

โŒ
โŒ