โŒ

Reading view

There are new articles available, click to refresh the page.

Can AI manage compliance requirements efficiently?

How Can AI Revolutionize Compliance Management? Are you leveraging AI technologies to optimize compliance management in your organization? Where compliance requirements continue to grow more complex across industries, the integration of Artificial Intelligence (AI) into compliance management is becoming increasingly essential. The call for efficient compliance management resonates especially with organizations operating in sectors such [โ€ฆ]

The post Can AI manage compliance requirements efficiently? appeared first on Entro.

The post Can AI manage compliance requirements efficiently? appeared first on Security Boulevard.

Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks

AI technology, security, AI security, visibility, insights, security platform, Arctic Wolf, zero-trust encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

Researchers with Cyata and BlueRock uncovered vulnerabilities in MCP servers from Anthropic and Microsoft, feeding ongoing security worries about MCP and other agentic AI tools and their dual natures as both key parts of the evolving AI world and easy targets for threat actors.

The post Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks appeared first on Security Boulevard.

How to scale NHIs safely and efficiently?

Is Your Organization Ready to Scale NHIs Safely and Efficiently? Scaling Non-Human Identities (NHIs) is a complex endeavor, particularly in dynamic industries such as financial services, healthcare, and technology-driven sectors that rely heavily on cloud computing. Where NHIs serve as the backbone for automation, the question becomes: how can organizations use NHI management to achieve [โ€ฆ]

The post How to scale NHIs safely and efficiently? appeared first on Entro.

The post How to scale NHIs safely and efficiently? appeared first on Security Boulevard.

How do AI secrets ensure cloud security?

What Role Do AI Secrets Play in Ensuring Cloud Security? Where digital threats loom larger than ever, how do organizations navigate complex cloud security? The answer lies in effectively managing AI secrets. This approach ensures that machine identities, an often overlooked aspect of cybersecurity, are adequately protected. Unveiling Non-Human Identities (NHIs) The cornerstone of modern [โ€ฆ]

The post How do AI secrets ensure cloud security? appeared first on Entro.

The post How do AI secrets ensure cloud security? appeared first on Security Boulevard.

Can AI manage cloud security effectively?

How Can AI Revolutionize Cloud Security Management? How do organizations ensure that their cloud environments are not just secure but intelligently managed? The answer lies in understanding the potential of AI in cloud security. With machines become predominant players in our IT infrastructure, the management of Non-Human Identities (NHIs) has emerged as a pivotal strategy [โ€ฆ]

The post Can AI manage cloud security effectively? appeared first on Entro.

The post Can AI manage cloud security effectively? appeared first on Security Boulevard.

What innovative practices secure AI-driven architectures?

How Do Non-Human Identities Strengthen AI Security Architectures? Is your organization fully prepared to handle the intricate demands of AI-driven systems? Non-Human Identities (NHIs) play a crucial role in securing AI architectures. By effectively managing these machine identities, organizations can bridge significant security gaps and foster a seamless, secure cloud environment. This post is designed [โ€ฆ]

The post What innovative practices secure AI-driven architectures? appeared first on Entro.

The post What innovative practices secure AI-driven architectures? appeared first on Security Boulevard.

Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance

facial recognition, surveillance, camera, security, data

The privacy rights group Fight for the Future was one of 44 organizations that sent a letter to lawmakers urging them to pull back on funding for ICE, noting the growing threats to U.S. citizens and others as the agency spends millions of dollars on its growing surveillance capabilities.

The post Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance appeared first on Security Boulevard.

Exploiting Google Gemini to Abuse Calendar Invites Illustrates AI Threats

Researchers with security firm Miggo used an indirect prompt injection technique to manipulate Google's Gemini AI assistant to access and leak private data in Google Calendar events, highlighting the challenges AI presents that traditional security measures can't address.

The post Exploiting Google Gemini to Abuse Calendar Invites Illustrates AI Threats appeared first on Security Boulevard.

What capabilities does AI add to cloud-native security

Are You Maximizing the Potential of AI in Cloud-Native Security? The intersection of artificial intelligence (AI) and cloud-native security is transforming how organizations safeguard their digital. With AI capabilities advancing rapidly, security is witnessing unprecedented changes that promise more robust protection mechanisms. But are businesses leveraging AI to its fullest potential in their cloud environments? [โ€ฆ]

The post What capabilities does AI add to cloud-native security appeared first on Entro.

The post What capabilities does AI add to cloud-native security appeared first on Security Boulevard.

Hacker Pleads Guilty to Access Supreme Court, AmeriCorps, VA Systems

FTC, privacy, AI privacy lawsuits court

Nicholas Moore, a 24-year-old Tennessee man, pleaded guilty to using stolen credentials of authorized users to hack into computer systems of the Supreme Court, VA, and AmeriCorps, obtaining sensitive information and then posting it online to his Instagram account.

The post Hacker Pleads Guilty to Access Supreme Court, AmeriCorps, VA Systems appeared first on Security Boulevard.

๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œโ€“์œ„์ฆˆ, ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ํ”Œ๋žซํผ ์—ฐ๊ณ„ ํ˜‘๋ ฅ ์ถ”์ง„

์–‘์‚ฌ๋Š” 19์ผ ์„œ์šธ ์—ญ์‚ผ๋™ ๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œ ์—ฐ๋ฝ์‚ฌ๋ฌด์†Œ์—์„œ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๊ฐ•ํ™”๋ฅผ ์œ„ํ•œ ํŒŒํŠธ๋„ˆ์‹ญ์„ ์ฒด๊ฒฐํ–ˆ๋‹ค. ์ฒด๊ฒฐ์‹์—๋Š” ๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œ ์—ผ๋™ํ›ˆ ๋Œ€ํ‘œ์™€ ์œ„์ฆˆ ๋Œ€ํ‘œ ๊ฒธ ์ตœ๊ณ ์šด์˜์ฑ…์ž„์ž(COO) ๋‹ฌ๋ฆฌ ๋ผ์ง์„ ๋น„๋กฏํ•œ ์–‘์‚ฌ ์ฃผ์š” ๊ด€๊ณ„์ž๋“ค์ด ์ฐธ์„ํ–ˆ๋‹ค.

์œ„์ฆˆ๋Š” ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ ์ „๋ฐ˜์˜ ๋ณด์•ˆ ์ƒํƒœ๋ฅผ ํ†ตํ•ฉ์ ์œผ๋กœ ๋ถ„์„ํ•˜๊ณ  ์‹œ๊ฐํ™”ํ•˜๋Š” ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ํ”Œ๋žซํผ์ด๋‹ค. ํด๋ผ์šฐ๋“œ ์ž์‚ฐ, ๊ตฌ์„ฑ ์˜ค๋ฅ˜, ๊ถŒํ•œ, ์„ค์ • ๋“ฑ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ์ •๋ณด๋ฅผ ๊ด€๊ณ„์™€ ๋งฅ๋ฝ์— ๋”ฐ๋ผ ์—ฐ๊ฒฐํ•ด ๋ถ„์„ํ•˜๋ฉฐ, ์ด๋ฅผ ์‹œํ๋ฆฌํ‹ฐ ๊ทธ๋ž˜ํ”„(Security Graph) ๊ธฐ๋ฐ˜์œผ๋กœ ์ œ๊ณตํ•œ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ์ž ์žฌ์ ์ธ ์œ„ํ—˜ ์š”์†Œ์™€ ๊ณต๊ฒฉ ๊ฒฝ๋กœ๋ฅผ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•ด, ๋ณต์žกํ•œ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์˜ ๋ณด์•ˆ ํ˜„ํ™ฉ์„ ๋ณด๋‹ค ์ฒด๊ณ„์ ์ธ ํ˜•ํƒœ๋กœ ์ œ๊ณต๋œ๋‹ค.

์–‘์‚ฌ๋Š” ์œ„์ฆˆ์˜ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ํ”Œ๋žซํผ๊ณผ ๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œ์˜ ํด๋ผ์šฐ๋“œ ์šด์˜ยท๊ตฌ์ถ• ์—ญ๋Ÿ‰์„ ์—ฐ๊ณ„ํ•ด, ๊ณ ๊ฐ์ด ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ๋ณด์•ˆ ๋ฆฌ์Šคํฌ๋ฅผ ์‹๋ณ„ํ•˜๊ณ  ์šฐ์„ ์ˆœ์œ„๋ฅผ ์„ค์ •ํ•ด ๋Œ€์‘ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•  ๊ณ„ํš์ด๋‹ค. ๋ณด๋„์ž๋ฃŒ์— ๋”ฐ๋ฅด๋ฉด, ํŠนํžˆ ๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œ์˜ ๋ณด์•ˆ์‚ฌ์—… ์กฐ์ง์ธ HALO๋Š” ์œ„์ฆˆ์˜ ์‹œํ๋ฆฌํ‹ฐ ๊ทธ๋ž˜ํ”„ ๊ธฐ๋ฐ˜ ๋ถ„์„ ์ •๋ณด๋ฅผ ๊ตญ๋‚ด ๊ณ ๊ฐ ํ™˜๊ฒฝ์— ๋งž๊ฒŒ ์ ์šฉํ•˜๋ฉฐ, ์ด๋ฅผ ํด๋ผ์šฐ๋“œ ์šด์˜ ๊ณผ์ •์—์„œ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•  ์˜ˆ์ •์ด๋‹ค.

๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œ๋Š” ์ด๋Ÿฌํ•œ ๊ธฐ์ˆ ๋กœ โ–ฒํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ ์ „๋ฐ˜์˜ ๋ณด์•ˆ ์ƒํƒœ ํŒŒ์•… โ–ฒ๋ณด์•ˆ ์ง„๋‹จ ๊ฒฐ๊ณผ์˜ ์šด์˜ ํ™˜๊ฒฝ ์ ์šฉ โ–ฒ๋ณด์•ˆ ์ ๊ฒ€ ๊ฒฐ๊ณผ์˜ ์šด์˜ ํŒ๋‹จ ๋ฐ ๋ณด์•ˆ ๊ฐœ์„  ํ™œ๋™ ๋ฐ˜์˜์— ํ™œ์šฉ๋  ์ˆ˜ ์žˆ์„ ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€ํ–ˆ๋‹ค.

์ด์™ธ์—๋„ ์–‘์‚ฌ๋Š” ๊ธฐ์ˆ  ํ˜‘์—…๊ณผ ๊ณต๋™ ์‹œ์žฅ ํ™œ๋™์„ ํ™•๋Œ€ํ•˜๊ณ , ๊ตญ๋‚ด ๊ธฐ์—… ๋ณด์•ˆ ์ฑ…์ž„์ž๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•œ ์„ธ๋ฏธ๋‚˜ ๋“ฑ ์‹ค๋ฌด ์ค‘์‹ฌ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜ ํ”„๋กœ๊ทธ๋žจ๋„ ์ถ”์ง„ํ•  ์˜ˆ์ •์ด๋‹ค.

์—ผ๋™ํ›ˆ ๋Œ€ํ‘œ๋Š” โ€œํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ๋Š” ๋ณด์•ˆ ์†”๋ฃจ์…˜ ์ž์ฒด๋ณด๋‹ค ๊ทธ ์†”๋ฃจ์…˜์ด ์‹ค์ œ ์šด์˜ ๊ณผ์ •์—์„œ ์–ด๋–ป๊ฒŒ ํ™œ์šฉ๋˜๋Š”์ง€๊ฐ€ ๋”์šฑ ์ค‘์š”ํ•ด์ง€๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ โ€œ๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œ๋Š” ํด๋ผ์šฐ๋“œ ์•„ํ‚คํ…์ฒ˜์™€ ์šด์˜ ์ „๋ฐ˜์— ๋Œ€ํ•œ ์ดํ•ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ, ์œ„์ฆˆ์˜ ๋ณด์•ˆ ํ”Œ๋žซํผ์ด ๊ณ ๊ฐ ํ™˜๊ฒฝ์—์„œ ํšจ๊ณผ์ ์œผ๋กœ ์ž‘๋™ํ•˜๋„๋ก ์„ค๊ณ„ยท์šด์˜์„ ์ง€์›ํ•ด ๋ณด์•ˆ ํ™˜๊ฒฝ ๊ฐœ์„ ์— ๊ธฐ์—ฌํ•˜๊ฒ ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๋ผ์ง์€ โ€œํด๋ผ์šฐ๋“œ์™€ AI๋Š” ๊ธฐ์—…์˜ ํ˜์‹  ๋ฐฉ์‹์„ ๋ณ€ํ™”์‹œํ‚ค๊ณ  ์žˆ์œผ๋ฉฐ, ์œ„์ฆˆ๋Š” ์ด๋ฅผ ๋ณด๋‹ค ์•ˆ์ „ํ•˜๊ฒŒ ๋„์ž…ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ โ€œ๋ฉ”๊ฐ€์กดํด๋ผ์šฐ๋“œ์™€ ํŒŒํŠธ๋„ˆ์‹ญ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ˜‘๋ ฅ์„ ๊ฐ•ํ™”ํ•ด ํ•œ๊ตญ ๊ณ ๊ฐ๋“ค์ด ํด๋ผ์šฐ๋“œ ์„ฑ์žฅ ๊ณผ์ •์—์„œ๋„ ๋†’์€ ์ˆ˜์ค€์˜ ๋ณด์•ˆ์„ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•˜๊ฒŒ ๋˜์–ด ๊ธฐ๋Œ€๊ฐ€ ํฌ๋‹คโ€๋ผ๊ณ  ๋ฐํ˜”๋‹ค.
dl-ciokorea@foundryco.com

Can we be certain AI keeps cloud data secure

What Are Non-Human Identities, and Why Are They Crucial for Cloud Security? One might ask, what role do non-human identities (NHIs) play in safeguarding cloud environments? NHIs are machine identities created to bridge the gaps between security and R&D teams, ensuring a secure and seamless cloud experience. These NHIs consist of โ€œSecrets,โ€ such as encrypted [โ€ฆ]

The post Can we be certain AI keeps cloud data secure appeared first on Entro.

The post Can we be certain AI keeps cloud data secure appeared first on Security Boulevard.

Vulnerability in Anthropicโ€™s Claude Code Shows Up in Cowork

prompt cyberattacks trust certifications remote work office cybersecurity awareness Cyber Aware With Micro-Learning

PromptArmor threat researchers uncovered a vulnerability in Anthropic's new Cowork that already was detected in the AI company's Claude Code developer tool, and which allows a threat actor to trick the agent into uploading a victim's sensitive files to their own Anthropic account.

The post Vulnerability in Anthropicโ€™s Claude Code Shows Up in Cowork appeared first on Security Boulevard.

Cyber Fraud, Not Ransomware, is Now Businessesโ€™ Top Security Concern

hacker, scam, Email, fraud, scam fraud

In a report a week before its Davos conference, the World Economic Foundation said 64% world business leaders are most worried about cyber fraud, replacing ransomware at their top concern. AI vulnerabilities also ranked high, as did threats fueled by geopolitics. The group argued that a coordinated approach to cybersecurity is needed.

The post Cyber Fraud, Not Ransomware, is Now Businessesโ€™ Top Security Concern appeared first on Security Boulevard.

Microsoftโ€™s January Security Update of High-Risk Vulnerability Notice for Multiple Products

By: NSFOCUS

Overview On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Azure, etc., including high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed by Microsoftโ€™s monthly update this [โ€ฆ]

The post Microsoftโ€™s January Security Update of High-Risk Vulnerability Notice for Multiple Products appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post Microsoftโ€™s January Security Update of High-Risk Vulnerability Notice for Multiple Products appeared first on Security Boulevard.

Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service

AD, AD security, passwords, security, services, Palo Alto, AD Active Directory microservices

Microsoft and law enforcement agencies in Europe disrupted the operations of RedVDS, a global cybercrime service that sold cheap and disposable dedicated virtual servers to threat actors that used them to run BEC, phishing, and other fraud campaigns. The vendor now wants to shut down its payment networks and find the operators behind it.

The post Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service appeared first on Security Boulevard.

2026๋…„ CISO๊ฐ€ ๋ฐ˜๋“œ์‹œ ํ”ผํ•ด์•ผ ํ•  8๊ฐ€์ง€ ๋ณด์•ˆ ์‹ค์ˆ˜

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ฆฌ๋”๋Š” ์กฐ์ง์˜ ์•ˆ์ „์„ ์ง€ํ‚ค๊ธฐ ์œ„ํ•ด ๊ณ ๋ คํ•ด์•ผ ํ•  ์š”์†Œ๊ฐ€ ๋งค์šฐ ๋งŽ๋‹ค. ๋‹ค๋งŒ ๊ทธ์ค‘์—๋Š” ๋‹ค๋ฅธ ์‚ฌ์•ˆ๋ณด๋‹ค ๋” ๋‘๋“œ๋Ÿฌ์ง€๊ฒŒ ์ค‘์š”ํ•˜๊ฑฐ๋‚˜, ๋ฐ˜๋Œ€๋กœ ์•„์ง ์ถฉ๋ถ„ํžˆ ์ฃผ๋ชฉ๋ฐ›์ง€ ๋ชปํ•œ ๊ณผ์ œ๋„ ์กด์žฌํ•œ๋‹ค.

์ƒˆํ•ด๋ฅผ ๋งž์•„ 2026๋…„ CISO๊ฐ€ ๊ฒฐ์ฝ” ์†Œํ™€ํžˆ ํ•ด์„œ๋Š” ์•ˆ ๋  ํ•ต์‹ฌ ์š”์†Œ 6๊ฐœ๋ฅผ ์งš์–ด๋ณด์•˜๋‹ค.

AI ์—์ด์ „ํŠธ ํ™•์‚ฐ ์† ์•„์ด๋ดํ‹ฐํ‹ฐ ํ†ต์ œ ์†Œํ™€

๊ธฐ์—…์ด ์ž๋™ํ™”์™€ ํšจ์œจ์„ฑ์„ ํ™œ์šฉํ•˜๊ธฐ ์œ„ํ•ด AI ์—์ด์ „ํŠธ ๋„์ž…์„ ๋ณธ๊ฒฉํ™”ํ•˜๋ฉด์„œ, ๊ด€๋ จ ๊ธฐ์ˆ ์€ ๋น ๋ฅธ ์†๋„๋กœ ํ™•๋Œ€๋˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋žœ๋“œ๋ทฐ๋ฆฌ์„œ์น˜์— ๋”ฐ๋ฅด๋ฉด ์ „ ์„ธ๊ณ„ AI ์—์ด์ „ํŠธ ์‹œ์žฅ ๊ทœ๋ชจ๋Š” 2024๋…„ 54์–ต ๋‹ฌ๋Ÿฌ๋กœ ์ถ”์‚ฐ๋์œผ๋ฉฐ, 2030๋…„์—๋Š” 503์–ต 1,000๋งŒ ๋‹ฌ๋Ÿฌ๊นŒ์ง€ ์„ฑ์žฅํ•  ๊ฒƒ์œผ๋กœ ์ „๋ง๋œ๋‹ค.

AI ์—์ด์ „ํŠธ ํ™œ์šฉ์ด ๋Š˜์–ด๋‚˜๋ฉด์„œ ๊ธฐ์—…์€ ์ƒˆ๋กœ์šด ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ณผ์ œ์— ์ง๋ฉดํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ์•„์ด๋ดํ‹ฐํ‹ฐ ํ†ต์ œ ์ธก๋ฉด์—์„œ์˜ ๋ถ€๋‹ด์ด ํฌ๋‹ค. ์•„์ด๋ดํ‹ฐํ‹ฐ ์Šคํ‘ธํ•‘์ด๋‚˜ ๊ณผ๋„ํ•œ ๊ถŒํ•œ ๋ถ€์—ฌ๊ฐ€ ๋Œ€ํ‘œ์ ์ธ ์œ„ํ˜‘์ด๋‹ค. ์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„์ž๋Š” ํ”„๋กฌํ”„ํŠธ ์ธ์ ์…˜์ด๋‚˜ ์•…์„ฑ ๋ช…๋ น์„ ํ™œ์šฉํ•ด ์—์ด์ „ํŠธ๋ฅผ ์•…์šฉํ•˜๊ณ , ๋ณด์•ˆ ํ†ต์ œ๋ฅผ ์šฐํšŒํ•ด ์‹œ์Šคํ…œ๊ณผ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ๋ฌด๋‹จ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋‹ค.

PwC์˜ ์‚ฌ์ด๋ฒ„ยท๋ฐ์ดํ„ฐยท๊ธฐ์ˆ  ๋ฆฌ์Šคํฌ ๋ถ€๋ฌธ ๋ถ€์ฑ…์ž„์ž์ธ ๋ชจ๊ฑด ์•„๋‹ด์Šคํ‚ค๋Š” AI ์—์ด์ „ํŠธ๋ฅผ ํฌํ•จํ•œ ์•„์ด๋ดํ‹ฐํ‹ฐ๋ฅผ ์ œ๋Œ€๋กœ ๊ด€๋ฆฌํ•˜๋ฉด, ๋ˆ„๊ฐ€ ๋ฌด์—‡์„ ํ•  ์ˆ˜ ์žˆ๋Š”์ง€๋ฅผ ๊ธฐ๊ณ„ ์†๋„๋กœ ํ†ต์ œํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์•„๋‹ด์Šคํ‚ค๋Š” ๊ณต๊ฒฉ์ž๊ฐ€ ์ ์  ๋” ์นจ์ž…์ด ์•„๋‹Œ ๋กœ๊ทธ์ธ ๋ฐฉ์‹์œผ๋กœ ์ ‘๊ทผํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, AI ์—์ด์ „ํŠธ๊ฐ€ ์‹ค์ œ๋กœ ์‹œ์Šคํ…œ๊ณผ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณ€๊ฒฝํ•˜๋Š” ๋‹จ๊ณ„์— ์ด๋ฅด๋ €๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค. ๊ทธ๋Š” ๋ฆฌ๋”๊ฐ€ ๋†“์ณ์„œ๋Š” ์•ˆ ๋  ํ•ต์‹ฌ์œผ๋กœ ๋ชจ๋“  ์‚ฌ๋žŒ, ์›Œํฌ๋กœ๋“œ, ์—์ด์ „ํŠธ๋ฅผ ๊ด€๋ฆฌ ๋Œ€์ƒ ์•„์ด๋ดํ‹ฐํ‹ฐ๋กœ ์ทจ๊ธ‰ํ•˜๋Š” ์ ์„ ๊ผฝ์•˜๋‹ค. ๊ฐ๊ฐ์— ๊ฐœ๋ณ„ ๊ณ„์ •์„ ๋ถ€์—ฌํ•˜๊ณ , ํ”ผ์‹ฑ์— ๊ฐ•ํ•œ ๋‹ค์ค‘์š”์†Œ์ธ์ฆ์„ ์ ์šฉํ•˜๋ฉฐ, ํ•„์š”ํ•œ ์ตœ์†Œ ๊ถŒํ•œ๋งŒ ํ•„์š”ํ•œ ๊ธฐ๊ฐ„ ๋™์•ˆ ๋ถ€์—ฌํ•˜๊ณ , ๋น„๋ฐ€๋ฒˆํ˜ธ๋‚˜ ํ‚ค๋ฅผ ์ž๋™์œผ๋กœ ๋ณ€๊ฒฝํ•˜๋Š” ์ฒด๊ณ„๋ฅผ ๊ฐ–์ถฐ์•ผ ํ•œ๋‹ค๋Š” ์„ค๋ช…์ด๋‹ค. ์•„์šธ๋Ÿฌ ๋น„์ •์ƒ์ ์ธ ๊ถŒํ•œ ๋ณ€๊ฒฝ์ด๋‚˜ ์„ธ์…˜ ํƒˆ์ทจ ์—ฌ๋ถ€๋ฅผ ์ง€์†์ ์œผ๋กœ ๋ชจ๋‹ˆํ„ฐ๋งํ•ด์•ผ ํ•œ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

์•„๋‹ด์Šคํ‚ค๋Š” ๊ธฐ์—…์ด ํ†ต์ œ๋ ฅ์„ ์žƒ์ง€ ์•Š์œผ๋ฉด์„œ๋„ ๋ฏผ์ฒฉํ•˜๊ฒŒ ๋Œ€์‘ํ•˜๋ ค๋ฉด, ์ผ์ƒ์ ์ธ ์—…๋ฌด ํ๋ฆ„์— AI ์—์ด์ „ํŠธ ๊ฑฐ๋ฒ„๋„Œ์Šค๋ฅผ ๋‚ด์žฌํ™”ํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ๊ด€๋ฆฌ์ž์—๊ฒŒ ํ•˜๋“œ์›จ์–ด ๊ธฐ๋ฐ˜ ๋‹ค์ค‘์š”์†Œ์ธ์ฆ์„ ์˜๋ฌดํ™”ํ•˜๊ณ , ์ƒ์Šน๋œ ๊ถŒํ•œ์€ ๊ธฐ๋ณธ์ ์œผ๋กœ ๋งŒ๋ฃŒ๋˜๋„๋ก ์„ค์ •ํ•˜๋ฉฐ, ์‹ ๊ทœ ์—์ด์ „ํŠธ๋Š” ๊ฐ๊ฐ์˜ ์ •์ฑ…์„ ๊ฐ€์ง„ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์œผ๋กœ ๋“ฑ๋กํ•˜๋Š” ๋ฐฉ์‹์ด ํ•„์š”ํ•˜๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

๊ธ€๋กœ๋ฒŒ ๊ธฐ์ˆ  ๋ฆฌ์„œ์น˜ยท์ž๋ฌธ ๊ธฐ์—… ISG์˜ ๋””๋ ‰ํ„ฐ ์ œ์ด์Šจ ์Šคํƒ€๋”ฉ์€ AI ์—์ด์ „ํŠธ์™€ AI ํ”Œ๋žซํผ์— ๋Œ€ํ•œ ์•„์ด๋ดํ‹ฐํ‹ฐ ๋ฐ ์ ‘๊ทผ ํ†ต์ œ๊ฐ€ CISO์—๊ฒŒ ๊ฐ€์žฅ ์ค‘์š”ํ•œ ์šฐ๋ ค ์˜์—ญ ์ค‘ ํ•˜๋‚˜๋ผ๊ณ  ํ‰๊ฐ€ํ–ˆ๋‹ค. ๊ทธ๋Š” ํ˜„์žฌ AI ๊ด€๋ จ ๊ถŒํ•œ๊ณผ ์ ‘๊ทผ ๊ถŒํ•œ์€ ๋งŽ์€ ์˜์—ญ์—์„œ ์—ฌ์ „ํžˆ ๋ธ”๋ž™๋ฐ•์Šค์— ๊ฐ€๊น๋‹ค๋ฉฐ, ํ–ฅํ›„ ๋ช‡ ๋…„๊ฐ„ ์ด ๋ถ„์•ผ์—์„œ ํˆฌ๋ช…์„ฑ๊ณผ ํ†ต์ œ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ๋„๊ตฌ์™€ ๋ฐฉ๋ฒ•์„ ๋„์ž…ํ•˜๋ ค๋Š” ์›€์ง์ž„์ด ๋ณธ๊ฒฉํ™”๋  ๊ฒƒ์ด๋ผ๊ณ  ์ „๋งํ–ˆ๋‹ค.

๊ณต๊ธ‰๋ง ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ ๋ฏธํก

๋””์ง€ํ„ธ ๋น„์ฆˆ๋‹ˆ์Šค ํ™•์‚ฐ๊ณผ ๊ธ€๋กœ๋ฒŒ ์‹œ์žฅ์—์„œ์˜ ๊ณต๊ธ‰๋ง ๋ณต์žก์„ฑ ์ฆ๊ฐ€๋Š” ๊ธฐ์—…์˜ ๊ณต๊ธ‰๋ง์„ ์ฃผ์š” ์œ„ํ—˜ ์˜์—ญ์œผ๋กœ ๋งŒ๋“ค๊ณ  ์žˆ๋‹ค. ๊ณต๊ธ‰๋ง์€ ์ด๋ฏธ ๋งŽ์€ ๊ธฐ์—…์—์„œ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ฆฌ์Šคํฌ๊ฐ€ ๋น ๋ฅด๊ฒŒ ์ปค์ง€๊ณ  ์žˆ๋Š” ๋ถ„์•ผ๋‹ค.

์ด ๋ฌธ์ œ๋Š” ํŠนํžˆ ์ œ์กฐ, ์œ ํ†ต, ๋ฌผ๋ฅ˜ ์‚ฐ์—…์—์„œ ๋”์šฑ ์ค‘์š”ํ•˜๋‹ค. ๊ธˆ์† ์ œํ’ˆ๊ณผ ๋ถ€ํ’ˆ์„ ๊ณต๊ธ‰ํ•˜๋Š” AMFT์˜ CTO ๊ทธ๋ ‰ ์ ค๋กœ๋Š” 2026๋…„์— ๋ณต์žกํ•œ ๊ณต๊ธ‰๋ง๊ณผ ์ œ์กฐ ํ™˜๊ฒฝ์—์„œ์˜ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ์„ ๊ฐ„๊ณผํ•˜๋Š” CISO๋Š” ์น˜๋ช…์ ์ธ ๊ฒฐ๊ณผ์— ์ง๋ฉดํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ ค๋กœ๋Š” ํ˜„๋Œ€ ์ œ์กฐ ํ™˜๊ฒฝ์ด ๋” ์ด์ƒ ๋‹จ์ผ ๊ณต์žฅ์— ๊ตญํ•œ๋˜์ง€ ์•Š๋Š”๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค. ์ƒํ˜ธ ์—ฐ๊ฒฐ๋œ ๊ณต๊ธ‰์—…์ฒด, ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท ๊ธฐ๋ฐ˜ ์„ค๋น„, ํด๋ผ์šฐ๋“œ ์ค‘์‹ฌ ์ƒ์‚ฐ ์‹œ์Šคํ…œ์ด ์–ฝํžŒ ๊ตฌ์กฐ๋กœ ์ง„ํ™”ํ•˜๋ฉด์„œ, ํ•˜๋‚˜์˜ ์ทจ์•ฝํ•œ ์—ฐ๊ฒฐ๊ณ ๋ฆฌ๋งŒ์œผ๋กœ๋„ ์ „์ฒด ์šด์˜์ด ๋งˆ๋น„๋  ์ˆ˜ ์žˆ๋Š” ๊ด‘๋ฒ”์œ„ํ•œ ๊ณต๊ฒฉ ํ‘œ๋ฉด์ด ํ˜•์„ฑ๋๋‹ค๋Š” ์„ค๋ช…์ด๋‹ค.

์ตœ๊ทผ ๋ฐœ์ƒํ•œ ์‚ฌ๊ฑด์€ ์ด๋Ÿฌํ•œ ์œ„ํ—˜์„ ๋ถ„๋ช…ํžˆ ๋ณด์—ฌ์ค€๋‹ค. ์ ค๋กœ์— ๋”ฐ๋ฅด๋ฉด 2025๋…„ 9์›” ์žฌ๊ทœ์–ด ๋žœ๋“œ๋กœ๋ฒ„๋Š” ๊ณต๊ธ‰๋ง์„ ๊ฒจ๋ƒฅํ•œ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์„ ๋ฐ›์•„ ์˜๊ตญ, ์Šฌ๋กœ๋ฐ”ํ‚ค์•„, ์ธ๋„, ๋ธŒ๋ผ์งˆ ์ „์—ญ์—์„œ ์ˆ˜์ฃผ ๋™์•ˆ ์ƒ์‚ฐ์ด ์ค‘๋‹จ๋๊ณ , ์ถ”์ • ํ”ผํ•ด์•ก์€ 25์–ต ๋‹ฌ๋Ÿฌ์— ๋‹ฌํ–ˆ๋‹ค. ๊ทธ๋Š” ์ด ์นจํ•ด ์‚ฌ๊ณ ๊ฐ€ ์ˆ˜๋ฐฑ ๊ฐœ ํ˜‘๋ ฅ์‚ฌ๋กœ ํ™•์‚ฐ๋˜๋ฉฐ ๊ตฌ์กฐ์กฐ์ •๊ณผ ํŒŒ์‚ฐ์œผ๋กœ ์ด์–ด์กŒ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์ด๋Š” ๋‹จ์ˆœํ•œ IT ์žฅ์• ๊ฐ€ ์•„๋‹ˆ๋ผ, ๊ธ€๋กœ๋ฒŒ ์ œ์กฐ์—…์ด ์–ผ๋งˆ๋‚˜ ๊นŠ์ด ์ƒํ˜ธ ์˜์กด์ ์ธ์ง€๋ฅผ ๋“œ๋Ÿฌ๋‚ธ ์šด์˜ ์œ„๊ธฐ์˜€๋‹ค๊ณ  ํ‰๊ฐ€ํ–ˆ๋‹ค.

๊ณต๊ฒฉ์ž๋Š” ๋กœ๋ด‡, ์กฐ๋ฆฝ ๋ผ์ธ, ํ’ˆ์งˆ ๊ฒ€์‚ฌ ๋“ฑ์„ ์ œ์–ดํ•˜๋Š” ์šด์˜๊ธฐ์ˆ (OT) ์‹œ์Šคํ…œ์„ ์ ์  ๋” ๋งŽ์ด ๋…ธ๋ฆฌ๊ณ  ์žˆ๋‹ค. ์ƒ์‚ฐ์„ ๋ฉˆ์ถ”๊ฒŒ ํ•˜๋ฉด ๊ธฐ์—…์ด ์‹ ์†ํ•˜๊ฒŒ ๋ชธ๊ฐ’์„ ์ง€๋ถˆํ•  ์ˆ˜๋ฐ–์— ์—†๋‹ค๋Š” ์ ์„ ์•…์šฉํ•˜๊ณ  ์žˆ๋‹ค๋Š” ์„ค๋ช…์ด๋‹ค.

์ ค๋กœ๋Š” ์žฌ๋ฌด์  ์†์‹ค์„ ๋„˜์–ด ์ง€์‹์žฌ์‚ฐ๊ถŒ ํƒˆ์ทจ, ๊ทœ์ œ ์ฒ˜๋ฒŒ, ๊ตญ๊ฐ€ ์•ˆ๋ณด ๋ฌธ์ œ๊นŒ์ง€ ์œ„ํ—˜์ด ํ™•๋Œ€๋œ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค. ๊ทธ๋Š” CISO์—๊ฒŒ ์ฃผ๋Š” ๊ตํ›ˆ์€ ๋ถ„๋ช…ํ•˜๋‹ค๋ฉฐ, ์ „ํ†ต์ ์ธ ๊ฒฝ๊ณ„ ๊ธฐ๋ฐ˜ ๋ณด์•ˆ์€ ์ด๋ฏธ ํ•œ๊ณ„์— ๋„๋‹ฌํ–ˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๋ณต์žกํ•œ ๊ณต๊ธ‰๋ง์„ ๋ณดํ˜ธํ•˜๋ ค๋ฉด IT์™€ OT ์ „๋ฐ˜์— ๊ฑธ์นœ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ์•„ํ‚คํ…์ฒ˜ ์ ์šฉ, ํŽŒ์›จ์–ด์™€ ์†Œํ”„ํŠธ์›จ์–ด ์—…๋ฐ์ดํŠธ๋ฅผ ํฌํ•จํ•œ ์ œ3์ž ๋ฆฌ์Šคํฌ์˜ ์ง€์†์  ๋ชจ๋‹ˆํ„ฐ๋ง, ํ•ต์‹ฌ ์‹œ์Šคํ…œ์„ ๊ฒฉ๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ์‹ ์†ํ•œ ํŒจ์น˜์™€ ์„ธ๋ถ„ํ™”, ๊ณต๊ธ‰์—…์ฒด์™€ ๊ณ„์•ฝ์ž๋ฅผ ํฌํ•จํ•œ ์‚ฌ๊ณ  ๋Œ€์‘ ํ›ˆ๋ จ์ด ํ•„์š”ํ•˜๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

์ง€์ •ํ•™์  ๊ธด์žฅ์— ๋Œ€ํ•œ ๊ณผ์†Œํ‰๊ฐ€

CISO๊ฐ€ ์กฐ์ง์„ ์™ธ๋ถ€์™€ ๋‚ด๋ถ€ ์œ„ํ˜‘์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๋Š” ๋ฐ ์ง€๋‚˜์น˜๊ฒŒ ์ง‘์ค‘ํ•œ ๋‚˜๋จธ์ง€ ์ง€์ •ํ•™์  ๊ธด์žฅ์„ ๋†“์น˜๊ธฐ ์‰ฝ๋‹ค. ํ˜น์€ ์ด๋Ÿฌํ•œ ์š”์†Œ๋ฅผ ์ž์‚ฌ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์ด์Šˆ์™€ ์ง์ ‘์ ์ธ ๊ด€๋ จ์ด ์—†๋‹ค๊ณ  ํŒ๋‹จํ•ด ์ค‘์š”์„ฑ์„ ๋‚ฎ๊ฒŒ ํ‰๊ฐ€ํ•  ์ˆ˜๋„ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์–ด๋А ์ชฝ์ด๋“  ์ด๋Š” ์ค‘๋Œ€ํ•œ ํŒ๋‹จ ์˜ค๋ฅ˜๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค.

๊ธ€๋กœ๋ฒŒ ๊ธฐ์ˆ  ๋ฆฌ์„œ์น˜ยท์ž๋ฌธ ๊ธฐ์—… ISG์˜ ๋””๋ ‰ํ„ฐ ์ œ์ด์Šจ ์Šคํƒ€๋”ฉ์€ ์กฐ์ง์˜ ์‚ฌ์ด๋ฒ„ ํšŒ๋ณตํƒ„๋ ฅ์„ฑ ๊ณ„ํš์— ์‹œ์Šคํ…œ์  ์‹œ๋‚˜๋ฆฌ์˜ค๋ฅผ ๋ฐ˜์˜ํ•˜๋Š” ๊ฒƒ์ด ๋งค์šฐ ์ค‘์š”ํ•˜๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์—ฌ๊ธฐ์—๋Š” ๋น„์ฆˆ๋‹ˆ์Šค์— ์˜ํ–ฅ์„ ๋ฏธ์น  ์ˆ˜ ์žˆ๋Š” ๊ธ€๋กœ๋ฒŒ ์ •์„ธ ๋ณ€ํ™”์™€ ์ง€์ •ํ•™์  ๊ฐˆ๋“ฑ๋„ ๋ฐ˜๋“œ์‹œ ํฌํ•จ๋ผ์•ผ ํ•œ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค.

์Šคํƒ€๋”ฉ์€ ๊ธฐ์—…์˜ ๋น„์ฆˆ๋‹ˆ์Šค์™€ ์ž์‚ฐ์— ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ๋Š” ์นจํ•ด ์ง€ํ‘œ๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ์‚ฐ์—…๋ณ„ ๋งž์ถคํ˜• ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค์— ๋Œ€ํ•œ ์š”๊ตฌ๋„ ์ปค์ง€๊ณ  ์žˆ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. ๊ทธ๋Š” ์ด๋Ÿฌํ•œ ์œ„ํ˜‘ ๊ฐ€์šด๋ฐ ์ผ๋ถ€๋Š” ์•…์˜์ ์ธ ๊ตญ๊ฐ€ ํ–‰์œ„์ž๋กœ๋ถ€ํ„ฐ ๋น„๋กฏ๋˜๋Š” ๊ณ ๋„ ์ง€์† ๊ณต๊ฒฉ๊ณผ ์—ฐ๊ด€๋  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

IT ์ปจ์„คํŒ… ๊ธฐ์—… ๋…ธ์Šค๋„์–ด์˜ ์ตœ๊ณ ์ƒ์—…์ฑ…์ž„์ž(Chief Cmmercial Officer) AJ ํ†ฐ์Šจ์€ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ๊ณผ ์ง€์ •ํ•™์˜ ๊ฒฐํ•ฉ์ด ์ด๋ฏธ ํ˜„์‹ค๋กœ ์ž๋ฆฌ ์žก์•˜๋‹ค๊ณ  ํ‰๊ฐ€ํ–ˆ๋‹ค. ๊ทธ๋Š” ๊ตญ๊ฐ€ ํ–‰์œ„์ž๊ฐ€ ์ฃผ๋„ํ•˜๋Š” ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์ด ํ•ต์‹ฌ ์ธํ”„๋ผ์™€ ๊ธ€๋กœ๋ฒŒ ๊ณต๊ธ‰๋ง์„ ๊ฒจ๋ƒฅํ•œ ๋” ํฐ ๋ถ„์Ÿ์˜ ์ผ๋ถ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์ง€์ •ํ•™์  ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ ์œ„ํ˜‘ ๋ชจ๋ธ๋ง์— ๋ฐ˜์˜ํ•˜์ง€ ์•Š์œผ๋ฉด, ์กฐ์ง์€ ํŒŒ๊ธ‰๋ ฅ์ด ํฐ ๊ตญ๊ฐ€ ์ง€์› ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์— ๊ณผ๋„ํ•˜๊ฒŒ ๋…ธ์ถœ๋  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์•„์šธ๋Ÿฌ ํ†ฐ์Šจ์€ ์˜๋„์น˜ ์•Š๊ฒŒ ์ด๋Ÿฌํ•œ ์ง€์ •ํ•™์  ์‚ฌ๊ฑด์— ์—ฐ๋ฃจ๋  ๊ฒฝ์šฐ, ๊ทœ์ œ ์ธก๋ฉด๊ณผ ๊ธฐ์—… ํ‰ํŒ ์ธก๋ฉด์—์„œ ๋ชจ๋‘ ์‹ฌ๊ฐํ•œ ํ›„๊ณผ๋ฅผ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์กฐ์ง์˜ ํด๋ผ์šฐ๋“œ ํ™œ์šฉ ํ†ต์ œ ๋ถ€์žฌ

ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์‚ฌ์šฉ์ด ๊ณ„์† ํ™•๋Œ€๋˜๋ฉด์„œ, ์ด์— ์ˆ˜๋ฐ˜๋˜๋Š” ๋ณด์•ˆ๊ณผ ๊ฐœ์ธ์ •๋ณด ๋ณดํ˜ธ ์œ„ํ—˜๋„ ํ•จ๊ป˜ ์ปค์ง€๊ณ  ์žˆ๋‹ค. CISO๊ฐ€ ์ด ์˜์—ญ์„ ์†Œํ™€ํžˆ ํ•  ๊ฒฝ์šฐ ์กฐ์ง์€ ๊ฐ์ข… ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์— ๊ทธ๋Œ€๋กœ ๋…ธ์ถœ๋  ์ˆ˜ ์žˆ๋‹ค.

๊ธ€๋กœ๋ฒŒ ๊ธฐ์ˆ  ๋ฆฌ์„œ์น˜ยท์ž๋ฌธ ๊ธฐ์—… ISG์˜ ๋””๋ ‰ํ„ฐ ์ œ์ด์Šจ ์Šคํƒ€๋”ฉ์€ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค์™€ AI ๋„๊ตฌ๊ฐ€ ์„œ๋กœ ๊ธด๋ฐ€ํ•˜๊ฒŒ ๊ฒฐํ•ฉ๋ผ ํ™œ์šฉ๋˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค๋Š” ์ ์—์„œ ์ด ๋ฌธ์ œ๊ฐ€ ๋”์šฑ ์ค‘์š”ํ•˜๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๊ทธ๋Š” ์—ญํ• ๊ณผ ์ฑ…์ž„์— ์—ฐ๊ณ„๋œ ์ ์ ˆํ•˜๊ณ  ํ˜„๋Œ€์ ์ธ ๋ณด์•ˆ ์ธ์‹ ๊ต์œก์ด ํ•ต์‹ฌ์ด๋ฉฐ, ํ˜„์žฌ ์—…๋ฌด ํ™˜๊ฒฝ ์ „๋ฐ˜์— ํ™•์‚ฐ๋œ AI ๋„๊ตฌ์™€ ๊ธฐ์ˆ  ์‚ฌ์šฉ๊นŒ์ง€ ๊ณ ๋ คํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

์Šคํƒ€๋”ฉ์€ ํด๋ผ์šฐ๋“œ ๊ด€๋ฆฌ์ž์™€ ์—”์ง€๋‹ˆ์–ด๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•œ ์˜ฌ๋ฐ”๋ฅธ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๊ด€ํ–‰๊ณผ ์ ˆ์ฐจ์— ๋Œ€ํ•œ ๊ต์œก์ด ๋ถ€์กฑํ•œ ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค. ๋˜ํ•œ ํด๋ผ์šฐ๋“œ ํŒ€ ๋‹ค์ˆ˜๊ฐ€ ๋ณด์•ˆ ๋„๊ตฌ ๋„์ž…๊ณผ ํ™œ์šฉ ์ธก๋ฉด์—์„œ ๊ฐœ์„ ์„ ์‹œ๋„ํ•˜๊ณ  ์žˆ์ง€๋งŒ, ์‹ค์ œ๋กœ๋Š” ๋งŽ์€ ์กฐ์ง์ด ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ์„ ์œ„ํ•ด ํˆฌ์žํ•œ ๋„๊ตฌ๋ฅผ ์ถฉ๋ถ„ํžˆ ํ™œ์šฉํ•˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

IT ์ปจ์„คํŒ… ๊ธฐ์—… ๋…ธ์Šค๋„์–ด์˜ ์ตœ๊ณ ์ƒ์—…์ฑ…์ž„์ž AJ ํ†ฐ์Šจ์€ ๋ฉ€ํ‹ฐํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ ํ™•์‚ฐ๊ณผ ํ•จ๊ป˜ ์ „ํ†ต์ ์ธ ๋ณด์•ˆ ๊ฒฝ๊ณ„๋Š” ์ด๋ฏธ ์‚ฌ๋ผ์กŒ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค. ๊ทธ๋Š” ์‚ฌํ›„ ๋Œ€์‘ ์ค‘์‹ฌ์˜ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ์— ์˜์กดํ•˜๋Š” ์กฐ์ง์€ ์ •๊ตํ•œ ์œ„ํ˜‘์„ ๋†“์น˜๊ธฐ ์‰ฝ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.

ํ†ฐ์Šจ์€ ์‚ฌ์ „ ๋Œ€์‘ํ˜• ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ํƒœ์„ธ ๊ด€๋ฆฌ(CSPM)์™€ ๋ช…ํ™•ํ•œ ์‚ฌ์šฉ์ž ๋ณด์•ˆ ๊ฐ€์ด๋“œ๋ผ์ธ์ด ๋น„์šฉ์ด ํฐ ์นจํ•ด ์‚ฌ๊ณ ์™€ ์šด์˜ ์ค‘๋‹จ์„ ์˜ˆ๋ฐฉํ•˜๋Š” ๋ฐ ํ•ต์‹ฌ์ ์ธ ๋‹จ๊ณ„๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๋ณต์žกํ•œ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ์ธ์  ์˜ค๋ฅ˜๋กœ ์ธํ•œ ์œ„ํ—˜์„ ์ตœ์†Œํ™”ํ•˜๋ ค๋ฉด, ์•ˆ์ „ํ•œ ์‚ฌ์šฉ์ž ํ–‰๋™์„ ์ง€์†์ ์œผ๋กœ ์กฐ์ง ๋ฌธํ™”์— ๋‚ด์žฌํ™”ํ•ด์•ผ ํ•œ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

๊ฐ•ํ™”๋˜๋Š” ๊ทœ์ œ ํ™˜๊ฒฝ์— ๋Œ€ํ•œ ๋Œ€์‘ ๋ถ€์กฑ

๊ธˆ์œต ์„œ๋น„์Šค๋‚˜ ํ—ฌ์Šค์ผ€์–ด์ฒ˜๋Ÿผ ๊ทœ์ œ๊ฐ€ ์—„๊ฒฉํ•œ ์‚ฐ์—…์— ์†ํ•œ ์ผ๋ถ€ ๊ธฐ์—…์€ ์˜ค๋ž˜์ „๋ถ€ํ„ฐ ๊ธˆ์œต์ •๋ณด๋ณดํ˜ธ๋ฒ•(GLBA)์ด๋‚˜ ์˜๋ฃŒ์ •๋ณด๋ณดํ˜ธ๋ฒ•(HIPAA)๊ณผ ๊ฐ™์€ ๋ฐ์ดํ„ฐ ๋ณด์•ˆยทํ”„๋ผ์ด๋ฒ„์‹œ ๊ทœ์ œ๋ฅผ ์ค€์ˆ˜ํ•ด์•ผ ํ–ˆ๋‹ค.

๊ทธ๋Ÿฌ๋‚˜ ์ตœ๊ทผ์—๋Š” ๊ฑฐ์˜ ๋ชจ๋“  ์‚ฐ์—…์ด ์ „ ์„ธ๊ณ„์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๋Š” ๋ฐ์ดํ„ฐ ํ”„๋ผ์ด๋ฒ„์‹œ ๋ฐ ๋ณดํ˜ธ ๋ฒ•๊ทœ๋ฅผ ์ค€์ˆ˜ํ•ด์•ผ ํ•˜๋Š” ์ƒํ™ฉ์ด๋‹ค. ์ด๋Ÿฌํ•œ ๊ทœ์ œ๋ฅผ ๊ฐ„๊ณผํ•˜๊ฑฐ๋‚˜ ์ค‘์š”์„ฑ์„ ๋‚ฎ๊ฒŒ ํ‰๊ฐ€ํ•  ๊ฒฝ์šฐ, ๋ฒŒ๊ธˆ๊ณผ ์ถ”๊ฐ€์ ์ธ ์ œ์žฌ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค.

์Šคํƒ€๋”ฉ์€ ๊ทœ์ œ๊ฐ€ ๋งŽ์€ ์กฐ์ง์ด ์ปดํ”Œ๋ผ์ด์–ธ์Šค ํ™œ๋™์œผ๋กœ ์ธํ•ด ์ƒ๋‹นํ•œ ์ถ”๊ฐ€ ๋ถ€๋‹ด์„ ์•ˆ๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋กœ ์ธํ•œ ํ”ผ๋กœ๊ฐ๋„ ์ ์ง€ ์•Š๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๋‹ค๋งŒ ์ตœ๊ทผ ๋ช‡ ๋…„๊ฐ„ CISO ์—ญํ• ์ด ์ปดํ”Œ๋ผ์ด์–ธ์Šค์— ๋Œ€ํ•œ ์ฑ…์ž„๊ณผ ๊ถŒํ•œ๊นŒ์ง€ ํ™•๋Œ€๋œ ๋งŒํผ, ์ด๋ฅผ ์†Œํ™€ํžˆ ํ•˜๊ฑฐ๋‚˜ ๊ณผ์†Œํ‰๊ฐ€ํ•  ์—ฌ์ง€๋Š” ์—†๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

ํŠนํžˆ ๊ธ€๋กœ๋ฒŒ ๊ธฐ์—…์˜ CISO๋Š” ์ตœ์‹  ๊ทœ์ œ ๋™ํ–ฅ์„ ๋ฉด๋ฐ€ํžˆ ํŒŒ์•…ํ•ด์•ผ ํ•œ๋‹ค. ํ†ฐ์Šจ์€ ์˜๊ตญ๊ณผ ์œ ๋Ÿฝ์—์„œ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ทœ์ œ ํ™˜๊ฒฝ์ด ๋น ๋ฅด๊ฒŒ ๊ฐ•ํ™”๋˜๊ณ  ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๊ทธ๋Š” GDPR(General Data Protection Regulation)๊ณผDORA(Digital Operational Resilience Act)๊ณผ ๊ฐ™์€ ํ”„๋ ˆ์ž„์›Œํฌ๊ฐ€ ๋ฌธ์„œํ™”๋œ ํ†ต์ œ๋ฟ ์•„๋‹ˆ๋ผ, ์‹ค์ฆ์ ์œผ๋กœ ๊ฒ€์ฆ ๊ฐ€๋Šฅํ•œ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํšจ๊ณผ๋ฅผ ์กฐ์ง์— ์š”๊ตฌํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

ํ†ฐ์Šจ์€ ๊ทœ์ œ ๋‹น๊ตญ์ด ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ๊ณผ ์šด์˜ ํšŒ๋ณตํƒ„๋ ฅ์„ฑ์ด ๋‹จ์ˆœํ•œ ๊ทœ์ • ์ค€์ˆ˜ ํ•ญ๋ชฉ์ด ์•„๋‹ˆ๋ผ, ๋น„์ฆˆ๋‹ˆ์Šค ํ”„๋กœ์„ธ์Šค ์ „๋ฐ˜์˜ ๋ชจ๋“  ๊ณ„์ธต์— ๊นŠ์ด ๋‚ด์žฌํ™”๋ผ ์žˆ๋Š”์ง€๋ฅผ ํ™•์ธํ•˜๋ ค ํ•œ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ทธ๋Š” ์ œ3์ž ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ ์—ญ์‹œ ๊ทธ์— ๋ชป์ง€์•Š๊ฒŒ ์ค‘์š”ํ•˜๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค. ๊ณต๊ธ‰๋ง์ด ์ ์  ๋” ๋ณต์žกํ•˜๊ณ  ๋ถ„์‚ฐ๋ ์ˆ˜๋ก ์™ธ๋ถ€ ์ œ๊ณต์—…์ฒด๋กœ ์ธํ•œ ์ทจ์•ฝ์ ์€ ์‹ฌ๊ฐํ•œ ๊ทœ์ œ ๋ฐ ๋ณด์•ˆ ์ฑ…์ž„์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋Ÿฌํ•œ ๊ทœ์ œ ์š”๊ตฌ๋ฅผ ๋ณด์•ˆ ์ „๋žต์— ์„ ์ œ์ ์œผ๋กœ ๋ฐ˜์˜ํ•˜์ง€ ์•Š์„ ๊ฒฝ์šฐ, ๋ง‰๋Œ€ํ•œ ์žฌ๋ฌด์  ์ œ์žฌ๋Š” ๋ฌผ๋ก  ์šด์˜ ์ค‘๋‹จ๊ณผ ์žฅ๊ธฐ์ ์ธ ํ‰ํŒ ํ›ผ์†์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๊ฒฝ๊ณ ํ–ˆ๋‹ค.

AI ์ฑ—๋ด‡ ๋„์ž…์— ๋”ฐ๋ฅธ ๋ฒ•์  ์ฑ…์ž„ ์ธ์‹ ๋ฏธํก

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋ณดํ—˜ ์ œ๊ณต์—…์ฒด ์ฝ”์–ผ๋ฆฌ์…˜์˜ ์ˆ˜์„ ์—ฐ๊ตฌ์› ๋‹ค๋‹ˆ์—˜ ์šฐ์ฆˆ๋Š” AI ์ฑ—๋ด‡์ด ๋ฐ์ดํ„ฐ ํ”„๋ผ์ด๋ฒ„์‹œ ์ธก๋ฉด์—์„œ ์ƒˆ๋กญ๊ฒŒ ๋ถ€์ƒํ•œ ์œ„ํ—˜ ์š”์†Œ๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์ฝ”์–ผ๋ฆฌ์…˜์ด ์•ฝ 200๊ฑด์˜ ํ”„๋ผ์ด๋ฒ„์‹œ ๊ด€๋ จ ์ฒญ๊ตฌ ์‚ฌ๋ก€์™€ 5,000๊ฐœ ๊ธฐ์—… ์›น์‚ฌ์ดํŠธ๋ฅผ ๋ถ„์„ํ•œ ๊ฒฐ๊ณผ, ์ „์ฒด ์ฒญ๊ตฌ์˜ 5%๊ฐ€ ์ฑ—๋ด‡ ๊ธฐ์ˆ ์„ ๊ฒจ๋ƒฅํ•œ ๊ฒƒ์ด์—ˆ๋‹ค.

์šฐ์ฆˆ๋Š” ์ด๋“ค ์ฒญ๊ตฌ๊ฐ€ AI ๋„๊ตฌ๊ฐ€ ๋“ฑ์žฅํ•˜๊ธฐ ํ›จ์”ฌ ์ด์ „์— ์ œ์ •๋œ ์ฃผ(ๅทž) ๋„์ฒญ ๋ฐฉ์ง€๋ฒ•์„ ๊ทผ๊ฑฐ๋กœ, ๊ณ ๊ฐ ๋Œ€ํ™”๋ฅผ ๋ถˆ๋ฒ•์ ์œผ๋กœ ๊ฐ€๋กœ์ฑ˜๋‹ค๊ณ  ์ฃผ์žฅํ•œ ์‚ฌ๋ก€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๋ชจ๋“  ์ฑ—๋ด‡ ๊ด€๋ จ ์ฒญ๊ตฌ๋Š” ๋Œ€ํ™” ์‹œ์ž‘ ์‹œ ํ•ด๋‹น ๋Œ€ํ™”๊ฐ€ ๋…น์Œ๋˜๊ณ  ์žˆ๋‹ค๋Š” ์‚ฌ์‹ค์„ ๊ณ ์ง€ํ–ˆ์–ด์•ผ ํ•œ๋‹ค๋Š” ๋™์ผํ•œ ๊ตฌ์กฐ๋ฅผ ๋”ฐ๋ž๋‹ค๋Š” ๋ถ„์„์ด๋‹ค.

ํ•ด๋‹น ์ฒญ๊ตฌ๋Š” ์ˆ˜์‹ญ ๋…„ ์ „์— ์ œ์ •๋œ ํ”Œ๋กœ๋ฆฌ๋‹ค ํ†ต์‹  ๋ณด์•ˆ๋ฒ• ์œ„๋ฐ˜์„ ์ฃผ์žฅํ•œ ๊ฒƒ์ด์—ˆ๋‹ค๊ณ  ์šฐ์ฆˆ๋Š” ์ „ํ–ˆ๋‹ค. ๊ทธ๋Š” ์ „์ฒด ์›น์‚ฌ์ดํŠธ ๊ฐ€์šด๋ฐ ์•ฝ 5%๊ฐ€ ์ฑ—๋ด‡ ๊ธฐ์ˆ ์„ ๋„์ž…ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด ๋น„์œจ์ด ์ฑ—๋ด‡์„ ์ค‘์‹ฌ์œผ๋กœ ์ œ๊ธฐ๋œ ์›น ํ”„๋ผ์ด๋ฒ„์‹œ ์ฒญ๊ตฌ ๋น„์ค‘๊ณผ ์ •ํ™•ํžˆ ์ผ์น˜ํ•œ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์šฐ์ฆˆ๋Š” IT ์‚ฐ์—…๊ณผ ๊ธˆ์œต ์‚ฐ์—…์—์„œ ์ฑ—๋ด‡ ํ™œ์šฉ์ด ํŠนํžˆ ๋‘๋“œ๋Ÿฌ์กŒ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ํ•ด๋‹น ์‚ฐ์—… ์›น์‚ฌ์ดํŠธ์˜ ๊ฐ๊ฐ 9%์™€ 6%๊ฐ€ ์ฑ—๋ด‡์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ์—ˆ์œผ๋ฉฐ, ํ–ฅํ›„ ์ฑ—๋ด‡ ํ™œ์šฉ์ด ๋Š˜์–ด๋‚  ๊ฐ€๋Šฅ์„ฑ์ด ํฐ ๋งŒํผ ๊ด€๋ จ ์ฒญ๊ตฌ ์—ญ์‹œ ์ฆ๊ฐ€ํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์ „๋งํ–ˆ๋‹ค.

๊ทธ๋Š” ์ฑ—๋ด‡์„ ์ž˜๋ชป ์„ค๊ณ„ํ•˜๊ฑฐ๋‚˜ ์šด์˜ํ•  ๊ฒฝ์šฐ์˜ ์œ„ํ—˜์œผ๋กœ, ํ”„๋กฌํ”„ํŠธ ์ธ์ ์…˜๊ณผ ๊ฐ™์€ ๊ธฐ๋ฒ•์„ ํ†ตํ•ด ์‹œ์Šคํ…œ์ด ์‰ฝ๊ฒŒ ์กฐ์ž‘๋  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์„ ๊ผฝ์•˜๋‹ค. ์ด๋Ÿฌํ•œ ๋ฐฉ์‹์œผ๋กœ ๊ณ ๊ฐ ๋ฐ์ดํ„ฐ๊ฐ€ ์œ ์ถœ๋œ ์‚ฌ๋ก€๊ฐ€ ์ด๋ฏธ ์ˆ˜์‹ญ ์ฐจ๋ก€ ๋ฌธ์„œํ™”๋ผ ์žˆ๋‹ค๊ณ  ๊ฒฝ๊ณ ํ–ˆ๋‹ค.

ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ์ฒด๊ณ„ ๊ด€๋ฆฌ ๊ณต๋ฐฑ

์ด์ œ๋Š” ๊ฑฐ์˜ ๋ชจ๋“  ๊ธฐ์—…์ด ์ตœ์†Œํ•œ ์ผ๋ถ€ ์šด์˜์„ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค์— ์˜์กดํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์„œ๋น„์Šค์˜ ๋ณด์•ˆ์„ ์†Œํ™€ํžˆ ํ•˜๋Š” ๊ฒƒ์€ ๋ฌธ์ œ๋ฅผ ์ž์ดˆํ•˜๋Š” ๊ฒƒ๊ณผ ๋‹ค๋ฆ„์—†๋‹ค.

PwC์˜ ์•„๋‹ด์Šคํ‚ค๋Š” ํด๋ผ์šฐ๋“œ์™€ SaaS ํ™•์‚ฐ์ด ๊ณ„์†๋  ๊ฒƒ์ด๋ผ๋ฉฐ, ์•„์ด๋ดํ‹ฐํ‹ฐ, ์•”ํ˜ธํ™”, ๋กœ๊น…, ์™ธ๋ถ€ ํ†ต์‹ ์„ ์œ„ํ•œ ๊ฐ€๋“œ๋ ˆ์ผ์„ ๊ฐ–์ถ˜ ํ‘œ์ค€ ๋žœ๋”ฉ ์กด์„ ์‚ฌ์ „์— ์„ค๊ณ„ํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๋˜ํ•œ ์ •์ฑ…์„ ์ฝ”๋“œ๋กœ ๊ตฌํ˜„ํ•ด ๊ทœ์ • ์ค€์ˆ˜ ์„ค์ •์ด ๊ธฐ๋ณธ๊ฐ’์ด ๋˜๋„๋ก ํ•˜๋Š” ์ ‘๊ทผ์ด ํ•„์š”ํ•˜๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

์•„๋‹ด์Šคํ‚ค๋Š” CISO๊ฐ€ ์ž์‚ฐ์„ ์ง€์†์ ์œผ๋กœ ํŒŒ์•…ํ•˜๊ณ , ์„ค์ • ์˜ค๋ฅ˜๋ฅผ ์‹๋ณ„ํ•˜๋ฉฐ, ์ด์ƒ ํ–‰์œ„๋ฅผ ํƒ์ง€ํ•˜๊ณ , ํ•„์š”ํ•  ๊ฒฝ์šฐ ์ž๋™์œผ๋กœ ์กฐ์น˜ํ•  ์ˆ˜ ์žˆ๋Š” ๋„๊ตฌ๋ฅผ ํ™œ์šฉํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ทธ๋Š” ๋ชจ๋“  ๋ฐฉํ–ฅ์—์„œ ์Ÿ์•„์ง€๋Š” ๊ฒฝ๊ณ ์— ์ผ์ผ์ด ๋Œ€์‘ํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ๋Š” ๋ฉ€ํ‹ฐํด๋ผ์šฐ๋“œ ํ™•์‚ฐ๊ณผ ์•„์ด๋ดํ‹ฐํ‹ฐ ์ค‘์‹ฌ ๊ณต๊ฒฉ์„ ๋”ฐ๋ผ๊ฐ€๊ธฐ ์–ด๋ ต๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค. ํด๋ผ์šฐ๋“œ ์ „๋ฐ˜์˜ ์‹ ํ˜ธ๋ฅผ ์—ฐ๊ณ„ํ•˜๊ณ  ๊ฒฝ๊ณ  ์†Œ์Œ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ์ž๋™ํ™”์™€ AI๋ฅผ ํ™œ์šฉํ•ด ๋ณด์•ˆ ๊ด€์ œ ์„ผํ„ฐ๋ฅผ ํ˜„๋Œ€ํ™”ํ•ด์•ผ ํ•œ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ์—์„œ ์ธ์  ์š”์ธ ๊ฒฝ์‹œ

๋‹ค์–‘ํ•œ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋„๊ตฌ์™€ ์„œ๋น„์Šค๊ฐ€ ๊ตฌ์ถ•๋ผ ์žˆ๋‹ค ๋ณด๋‹ˆ, ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ์—์„œ ์‚ฌ๋žŒ์˜ ์—ญํ• ์„ ๊ฐ„๊ณผํ•˜๊ธฐ ์‰ฝ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌํ•œ ์ธ์‹์€ ์—ฌ๋Ÿฌ ํ˜•ํƒœ์˜ ๋ณด์•ˆ ์‚ฌ๊ณ ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค.

๋กœํŽŒ CM๋กœ์˜ ๊ธฐ์ˆ ยท์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํŒŒํŠธ๋„ˆ์ธ ๋ฒ ์Šค ํŽ„์ปค์Šจ์€ ์‹ค์ œ ๊ฒฝํ—˜์ƒ ๋ณด์•ˆ ์นจํ•ด์˜ ์ง์ ‘์ ์ธ ์›์ธ์€ ๋Œ€๋ถ€๋ถ„ ์ธ์  ์˜ค๋ฅ˜๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๊ทธ๋Š” ๋Œ€์ฒด๋กœ ๋ˆ„๊ตฐ๊ฐ€๊ฐ€ ์‚ฌ๊ธฐ์— ์†์•„ ์•…์„ฑ ์ฝ”๋“œ๊ฐ€ ์œ ์ž…๋˜๋Š” ํ†ต๋กœ๋ฅผ ์—ด๊ฒŒ ๋œ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

์‚ฌ๋žŒ์€ ๋ฉ”์‹œ์ง€์— ์ฆ‰๊ฐ ๋ฐ˜์‘ํ•˜๊ฑฐ๋‚˜ ๋ฌธ์„œ๋ฅผ ์—ด์–ด๋ณด๊ณ  ์‹ถ์–ด ํ•˜๋Š” ๊ฒฝํ–ฅ์ด ์žˆ์œผ๋ฉฐ, ์ด๋Ÿฌํ•œ ํ–‰๋™์ด ๋ฌธ์ œ๋ฅผ ํ‚ค์šด๋‹ค. ํŽ„์ปค์Šจ์€ ๊ทผ๋ณธ์ ์ธ ํ•ด๋ฒ•์€ ๋” ๋งŽ์€ ๊ธฐ์ˆ  ๋„์ž…์ด ์•„๋‹ˆ๋ผ, ์ง์›์ด ์ž์‹ ์˜ ๊ธฐ๊ธฐ ์ ‘๊ทผ์ด๋‚˜ ์ •๋ณด ์ œ๊ณต ์š”์ฒญ์— ๋Œ€ํ•ด ๊ฑฐ์ ˆํ•  ์ˆ˜ ์žˆ๋„๋ก ๋•๋Š” ๊ต์œก์— ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ทธ๋Š” ํ”„๋ฆฐํ„ฐ๋‚˜ ํŒฉ์Šค ์žฅ๋น„๊ฐ€ ๋„คํŠธ์›Œํฌ์— ์—ฐ๊ฒฐ๋ผ ์žˆ๋‹ค๋Š” ์‚ฌ์‹ค์„ ์žŠ๊ณ  ๋ณด์•ˆ ์„ค์ •์„ ์ ์šฉํ•˜์ง€ ์•Š๊ฑฐ๋‚˜, ๋„คํŠธ์›Œํฌ์—์„œ ๋ถ„๋ฆฌํ•˜์ง€ ์•Š๋Š” ๊ฒƒ ์—ญ์‹œ ๋Œ€ํ‘œ์ ์ธ ์ธ์  ์˜ค๋ฅ˜ ์‚ฌ๋ก€๋ผ๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

๋˜ ๋‹ค๋ฅธ ๋ฌธ์ œ๋กœ๋Š” ์ด๋ฏธ ๋„์ž…๋ผ ์žˆ๊ฑฐ๋‚˜ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ๋ณด์•ˆ ๊ธฐ์ˆ ์„ ์ œ๋Œ€๋กœ ํ™œ์šฉํ•˜์ง€ ์•Š๋Š” ์ ์„ ๊ผฝ์•˜๋‹ค. ํŽ„์ปค์Šจ์ด ์ตœ๊ทผ ๋‹ด๋‹นํ•œ ์†Œ์†ก ์‚ฌ๋ก€์—์„œ๋Š” ๊ฒฐ์ œ์นด๋“œ์‚ฐ์—… ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ํ‘œ์ค€(PCI DSS)์— ๋”ฐ๋ผ ํŒŒ์ผ ๋ฌด๊ฒฐ์„ฑ ๊ด€๋ฆฌ ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์ฃผ์žฅํ–ˆ์ง€๋งŒ, ์‹ค์ œ๋กœ๋Š” ๊ฒฝ๊ณ ๋ฅผ ์„ค์ •ํ•˜์ง€ ์•Š์•˜๊ฑฐ๋‚˜ ๊ฒฝ๊ณ ๋ฅผ ๋ฌด์‹œํ•œ ๊ฒฝ์šฐ๊ฐ€ ํฌํ•จ๋ผ ์žˆ์—ˆ๋‹ค.

ํŽ„์ปค์Šจ์€ ์•„๋ฌด๋ฆฌ ๊ฐ•๋ ฅํ•œ ๋ณด์•ˆ ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ๊ฐ–์ถ”๊ณ  ์žˆ๋”๋ผ๋„, ์ด๋ฅผ ์˜ฌ๋ฐ”๋ฅด๊ฒŒ ์„ค์ •ํ•˜๊ณ  ์ง€์†์ ์œผ๋กœ ๊ด€๋ฆฌํ•˜์ง€ ์•Š์œผ๋ฉด ์˜๋ฏธ๊ฐ€ ์—†๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

โŒ