Technology Cloud Report: New infrastructure has arrived, has the network security construction kept up?

Science and technology cloud report original.

In an environment of uncertainty, the only thing that can be determined at present is the digital transformation of enterprises.

The outbreak of the new crown epidemic and the active advancement of new infrastructure strategies are not only a catalyst, but also a driving force for development and upgrading, accelerating the pace of digital innovation and development of enterprises. When digital transformation becomes the most urgent need of enterprises, the issue of network security is regarded as a challenge that digital transformation must face directly.

Insert picture description here

Fortunately, as more and more companies and organizations begin to increase their investment in network security. Since the beginning of this year, more and more cyber security conferences such as [INSEC WORLD Chengdu·World Information Security Conference] will provide people with a platform for communication and sharing to discuss the development trend of cyber security.

Cybersecurity becomes the focus of digital transformation

At present, the world economy is in the shifting period of the conversion of new and old kinetic energy, and my country has gradually entered the era of digital economy. Digital transformation has become the "new infrastructure" for the transformation and upgrading of enterprises during the 14th Five-Year Plan.

So what will be the challenges of enterprise digital transformation in terms of network security?

According to a survey, the number of users attacked in the first half of 2020 exceeded the number in the whole of 2019. The data also shows that digital transformation has become a priority for companies of all sizes, but budgets are generally reduced.

Since the beginning of 2020, many companies have been unable to resume normal operations in a timely and comprehensive manner due to the impact of the new crown epidemic. New economic models represented by online education, online medical care, and telecommuting have developed rapidly. However, the security defense capabilities of enterprises under the epidemic situation are obviously lagging behind.

A questionnaire survey conducted by Check Point, a multinational security company, with more than 400 cyber security practitioners around the world revealed that during the epidemic, security threats or cyber attacks are increasing. 55% of respondents said that phishing attacks are the biggest threat, followed by malicious websites, accounting for 32%, followed by malware and ransomware.

Insert picture description here

In the post-epidemic era, the use of security to empower the digital development of enterprises will become a basic requirement.

In the past, network security was often considered to be a small part of the network architecture. However, with the digitization of enterprise business, security should be regarded as an important indicator of business continuity protection, which requires it to be able to adapt to business needs. Dynamic adaptation to changes.

Especially in the environment of zero-trust security, enterprises need to extend their security requirements from traditional data centers to mobile terminals and application levels. At the same time, as the demand for flexibility in enterprise security architecture has increased significantly, users should consider the flexibility of future network development in advance, and make corresponding investment protections in advance.

Today's network security situation has become very complicated, and the scope of security has also become very broad. Network security has changed from a support requirement to a basic requirement for the digital development of enterprises. Cyber ​​attacks will not only cause user business interruption, but also damage the company's valuable products. The consequences are difficult to estimate.

So in the post-epidemic era, how should companies build the "infrastructure" of the new infrastructure of cyber security?

Insert picture description here

Chengdu·World Information Security Conference Helps Digital Transformation

The INSEC WORLD Chengdu·World Information Security Conference held in Chengdu on November 24-27 is based on the theme of "New Infrastructure-'Security' Oriented" to discuss smart city security, cloud and data security, and 5G related to new infrastructure. Security, IoT security, and industrial Internet security, etc., escort new infrastructure and support the development of the digital economy.

Insert picture description here

Holding this conference in Western China International Expo City will comprehensively discuss and showcase information security technologies, products and applications, with many highlights.

Highlight 1: A gathering of big coffee speakers

Insert picture description here

Picture: Martin Hellman and Tan Xiaosheng

The two main forum leaders of the first conference last year still participated in the conference this year and sent warm congratulations to the conference.

One is Martin Hellman, a 2015 Turing Award winner, a member of the National Academy of Engineering, and an emeritus professor at Stanford University. Martin Hellman, together with Diffie and Merkle, invented public key cryptography, which enables secure Internet transactions and is used to transfer trillions of dollars every day. In 2015, he also won the Turing Award, the highest award in the field of computer science.

The other is Tan Xiaosheng, the founder and chairman of Beijing Cyber ​​Yingjie Technology Co., Ltd.

Tan Xiaosheng said that in the era of the Internet of Everything, the physical world is connected to the network world, and customers face more new security risks. Cyber ​​security threats will cause economic losses from national security to enterprises. In this context, customers need to improve network security protection capabilities, resist security risks, and use innovative security technologies and innovative business models to solve network security issues.

In addition, more than 50 speakers from China, the United States, India, Australia, Israel, Ireland, etc. came to INSEC WORLD to speak out for information security!

Highlight 2: The theme forum and the six sub-forums echo each other

The four-day conference includes two-day theme forums and six sub-forums to build a domestic first-class network security exchange platform, integrate talents, policies, information, technology and other resources, lead the direction of industry development, and accelerate network security construction and industrial innovation and development.

Insert picture description here

The two-day main forum focuses on the top-level design and development trend of information security. The topics include information security challenges and opportunities in the era of new infrastructure, interpretation of policies such as the "Cryptography Law", and Security 2.0, information security issues in the construction of smart cities, and human factors in security , 5G network communication security, security issues of the Internet of Things under 5G, etc.

The "CSO Forum" produced by Nie Jun and Wang Huaibin focuses on privacy protection, awareness education, security team capacity building, actual combat drills, and safe operations;

Vulnerability attack and defense and security research forums focus on IOT, APP, Web, etc.;

Data Security and Cloud Security Forum, focusing on GDPR, data encryption, data privacy protection, data transmission security, risk control, etc.;

The "Smart Security Operation Forum" produced by Yuan Mingkun focuses on the role of SOAR, smart security operations, and ATT&CK in security operations;

Industrial control security forum, discussing important business security, security operation and management, system security vulnerability analysis, industrial control security management process;

The "Security Innovation Forum" produced by Yang Qing creates a cooperative and win-win industry ecosystem, the industry's emerging business models, and the sharing of leading information security technologies.

Highlight 3: China's "First Generation White Hat" Hacker Talk is released

China's "first generation white hat" Hacker TALK will bring together China's first generation of Hacker representatives, and the founders of major organizations will historically gather INSEC WORLD Chengdu·World Information Security Conference!

Insert picture description here

At present, the big names that have been confirmed to attend include China's first Hacker organization-Green Corps founder Goodwell, Chenguang Studio founder Frankie, Security Focus founder xundi, Red Guest Alliance founder Lion, 0x557 founder la0wang, Chinahack founder Legendary figures such as Ren PP and Binghe, the author of China’s first Trojan horse.

The big guys will reveal the details and interesting facts of major events in the 25-year history of Hacker in China, share their experience during the transformation process, and discuss network security offensive and defense talent training and system construction ideas, and talent development skills.

The big names will also share their opinions and judgments on major cybersecurity protection activities, and will analyze and forecast the development prospects and technical routes of China's cybersecurity industry!

Highlight 4: Thematic training and exhibition are held at the same time

The conference includes special training, exhibitions, and comprehensive discussions and displays of information security technologies, products and applications under the digital wave. In this 4-day conference schedule, November 24-25 is a closed-door high-level training. During the two-day closed-door training process, the trainees will receive industrial control security skills training and registered information security awareness officer (CSAO) training.

Insert picture description here

The field of industrial control security is a sub-branch of the field of information security and is an emerging field of information security. This time, the leading "Lighthouse Lab" in the industry once again came to Chengdu·World Information Security Conference to offer training courses. From theory to practice, to the actual penetration of the real environment, a qualified industrial control safety engineer was trained in two days. The content of the industrial control safety skills training course involves theory and practice. During the training process, there are more scenes of offensive and defensive display, allowing students to experience the content in class and better absorb knowledge and skills.

CSAO (Certified Security Awareness Officer, Registered Information Security Awareness Officer) is the first professional certification of cyberspace security awareness education in China. It aims to make security awareness work systematic, instrumental and measurable, so as to improve the level of corporate security awareness maturity. More effectively meet compliance requirements and reduce the risk of "human factors". CSAO certification students need to participate in the training and examination organized by the China Cyberspace Security Talent Education Forum Certification Center. Those who meet the certification requirements will obtain the registered information security awareness officer certification.

The large-scale and rich content of the NSEC WORLD Chengdu·World Information Security Conference is looking forward to the visit of experts from all walks of life to discuss the security issues of the digital transformation of enterprises under the new infrastructure. It is worth looking forward to.

[Report on Technology Cloud]

An enterprise-level content expert who focuses on originality-Technology Cloud Report. Established in 2015, it is a top 10 media in the cutting-edge enterprise IT field. It is authoritatively recognized by the Ministry of Industry and Information Technology, and is one of the official media designated by Trusted Cloud and Global Cloud Computing Conference. In-depth original reports on cloud computing, big data, artificial intelligence, blockchain and other fields.

Guess you like

Origin blog.csdn.net/weixin_43634380/article/details/109569706