ȸ α â

  • м Ȩ α ּ
α ޴
 󼼺
 ʴ  : 66 ̾߱ Ǯ ̹


SMART
 

ʴ : 66 ̾߱ Ǯ ̹

ȫ | Ѻ̵

Ⱓ
2023-08-28
ePub
뷮
32 M
PC ƮºPC
Ȳ
1, 0, 0
 Ұ
 Ұ
ټ

 Ұ

̴ ٰ ƴϴ

̹ ΰ . ϵ Ʈ, Ͻ, , ̸ 츮 ֺ ϰ õ ִ. å ȭ ȸ ̽ ׸ ӿ ̹ ǹ̿ Ѵ.  ̷ غؾ ϴ ִ. 忡 å ̹ ڴ C ӿ, ʵ õѴ.

ڼҰ

б ڰа ̱ ۵ б ǻͰ ڻ ߴ. ػ罺 ָб , Z ǻͻ ӿ ó ťƮ â ȭ ȣš ź״.

2000 ѱ ʷ Ʈũó ڸ ޾ ѹα ó ȭ ֿ, 1 ̸ ˷ȴ. 2007 ťƮ μ ȷ ְå(CTO) ְ濵(CEO) ϸ ȷ ǻ պȸ ̲. 2014ʹ SC μ ȣְå(CISO) ð ִ.

77 𵵽 ̽ ̹ ħ 忡 ߴ. ݵ , ,  ߿伺 ϰ ̹ å ֿ ȰѴ. ̷ ΰ,  ̷ ų ΰ ִ.

1

ũ̳ _Hybrid Warfare
̹ , dzʴ_Cyber-Physical
ױ۷ °?_State-Sponsored Attack
ִ _Cyber Crime
8000 ޷ ģ _Scenario
ý _Hybrid Attack
纸 Ģ_Principle

2 ̼

⿡ óϴ _Leadership
̹ 濵̴_Management
濵_Subject Matter Expert
_Technology Leadership
η _Role Model
Ⱥ ΰ?_National Security
V 󸮡 _Accountability

3 ٿ

_Vulnerability, Exploit, Zero-day
Ʈ ư _Software
, ݵü_Exponential Growth
ǻͰ Ǿ ư _Network
Ȱ¦ _Internet
MP3 Ʈα_Digital
̹ ź_New Technology

4 ۽Ƽ

𸣴 ų _Governance
_Risk
?_Risk Management Framework
_CIA
̹ ٶ󺸴 _Business Impact
ŵ ູ_Security Control
_Threat Model
۽Ƽ_Perspective

5

⺻̴_Deterrence vs. Buildup
ʰ 㹫ϰ _Foundation
Ŀ ٸ?_Software Supply Chain
ȣ ݰ 繰_Identity Access Management
_Third Party
δٿ ൿ_Assurance
ġ ϶_Cyber Resilience

6 ѱ

赵 Ƿ̴_Root Cause Analysis
Ʈ η° °_Software Ecosystem
ο ΰ _Secrecy vs. Sharing
ġ ū Ҹ_Priority
忡 ִ_Security Practice
ᱹ _Skill Set
IT о߿ ?_Diversity
ȣ _Cybersecurity Industry

7 ε

δٰ ΰ?_Physical vs. Cyber
ڿ Һ ô_Business Model
ɸΰ?_Seamless vs. Frictionless
ȭ BTS _Platform
̹_Surveillance vs. Privacy
౸ ȭ_Offense vs. Defense
ȣ _Liberal Arts & Technology
īīýð _O2O

8 Ư

̹ ൿ , Ǽڵ_Malware
ҵ 巯 γ_Weakest Link
̹ ϰ ȴ_Insidious
Ȱȭ_Legacy
_Victim
̾Ʈ ٲִ _Sustainability
ġ _Cyber Hygiene

9 ̷

°踦 Ѷ_Systemic Cyber Risk
յ ġ _Paradigm Change
θ޶ ƿ ̹ _Cyber Weapon
ʴ _Safety vs. Security
ChatGPT _Game Changer
_Law & Regulation
AI, ׸ ̹ _Core vs. Context

ټ

  • 10
  • 8
  • 6
  • 4
  • 2

(ѱ 300̳)
侲
Ʈ
 ۼ ۼ õ

ϵ ϴ.