Workflow
内生安全体系
icon
Search documents
2025BCS大会开幕,齐向东:“万家造”和“两张皮”催生数据孤岛
Chang Sha Wan Bao· 2025-06-09 15:32
Core Insights - The importance of data for security has increased exponentially over the past decade, but the lack of a unified system has led to the creation of "data islands," severely hindering the implementation of security systems [3][4] - The phenomenon of "two skins" in business and security is prevalent, where security departments are not synchronized with business operations, leading to vulnerabilities and data breaches [4] Group 1: Data Isolation Issues - Many enterprises face challenges in implementing network security systems, with the data island problem being particularly prominent due to the fragmented nature of security devices and operations [3] - A case study of a leading financial institution revealed that the deployment of multiple firewall models from various brands resulted in inconsistent data formats and incompatible interfaces, complicating data collection and analysis [3] Group 2: Operational Challenges - The "manufactured by many" situation in security equipment was highlighted during the recent India-Pakistan conflict, where India's diverse equipment failed to perform effectively due to lack of standardization and poor data flow, contrasting with Pakistan's more integrated system [3] - Insufficient security investment and compatibility issues between new and old products are significant barriers to the effectiveness of overall security system construction [4]
齐向东:重塑内生安全体系 实现安全突围
Jing Ji Wang· 2025-06-09 10:06
Core Insights - The 2025 Global Digital Economy Conference emphasizes the importance of a systematic approach to cybersecurity, with the theme "Breaking Through Security: Reshaping the Endogenous Security System" [1] - Qi Xiangdong, a key speaker, highlights that the current cybersecurity industry is at a critical juncture where systematic construction is essential for overcoming existing challenges [1] Group 1: Current Challenges in Cybersecurity - The cybersecurity industry is facing three major dilemmas: ineffective implementation of systematic thinking, integration bottlenecks between large and small systems, and operational obstacles within small systems [2] - Over 90% of large government and enterprise institutions purchase security equipment from more than 10 vendors, leading to a fragmented "big platter" state in cybersecurity [2] - The lack of integration between large and small systems results in disjointed security capabilities and difficulties in unified strategic implementation [2] Group 2: Barriers to Effective Security Systems - Qi identifies three significant barriers to achieving the emergent effect in endogenous security systems: data silos, insufficient investment, and compatibility issues between old and new systems [2] - Data silos continue to hinder the implementation of security systems, despite the increasing importance of data in security over the past decade [2] - The phenomenon of "many manufacturers" and "two skins" contributes to data fragmentation, making it difficult for organizations to recognize external attacks [3] Group 3: Pathways for Systematic Construction - Systematic construction in cybersecurity requires adopting a system integration mindset, applying systematic thinking to the development of security protection frameworks [3] - Qi proposes three pathways for reshaping the security industry: reconfiguring data aggregation models, enhancing security operation models, and fostering ecological cooperation models [3]
专家热议AI时代网络安全:重塑内生安全体系是“突围之钥”
Huan Qiu Wang· 2025-06-06 08:22
Core Insights - The 2025 Global Digital Economy Conference highlighted the theme "Breaking Through Security: Reshaping the Endogenous Security System," focusing on the challenges in cybersecurity during the AI era [1][3] Group 1: AI and Cybersecurity Challenges - AI presents both opportunities and systemic challenges for the cybersecurity industry, necessitating a breakthrough in current security frameworks [3] - The complexity of the international situation and the rapid proliferation of AI applications have rendered traditional security measures ineffective [3] - The Chinese government has initiated regulatory measures, including the "Interim Measures for the Management of Generative AI Services," with over 400 large models registered as of now [3][4] Group 2: Systemic Solutions and Recommendations - Experts emphasize the need for a systematic approach to address the multifaceted risks posed by AI in cybersecurity [4] - Recommendations include accelerating the construction of AI-enabled security systems, promoting innovation in AI security products, and enhancing protective measures through practical applications [4][5] - Key obstacles to building an endogenous security system include data silos, insufficient resource investment, and compatibility issues between old and new systems [5] Group 3: International Expansion and Collaboration - Companies like Qi Anxin are focusing on international business growth, aiming for a significant proportion of their operations to be overseas in the next decade [5][6] - The Chinese cybersecurity industry is positioned to compete globally, with innovations and product quality comparable to developed countries [6] - The collaborative ecosystem is deemed essential for overcoming challenges in core technology development and industry cooperation [6]
齐向东:数据孤岛严重阻碍网络安全体系落地
Core Insights - The 2025 Global Digital Economy Conference highlighted the challenges faced by enterprises in implementing cybersecurity systems, particularly the issue of data silos [1][2] - Qi Anxin's chairman emphasized the exponential growth of data importance in security over the past decade, which has led to fragmented systems and isolated data [1] - The lack of a unified system has resulted in difficulties in data management and response capabilities within security operations centers [1] Group 1: Data Silos - The phenomenon of data silos is primarily caused by the "thousand manufacturers" situation of security devices, leading to inconsistent data formats and incompatible interfaces [1] - A case study of a leading financial institution revealed that the deployment of multiple firewall models from various brands resulted in chaotic data collection and analysis [1] - The fragmented nature of security data hampers comprehensive situational awareness and rapid response to incidents [1] Group 2: Business and Security Disconnection - The "two skins" phenomenon, where business operations and security measures are not aligned, was illustrated by an incident involving a financial data breach due to delayed communication between departments [2] - Insufficient investment in security and compatibility issues between new and old products are significant barriers to effective cybersecurity system construction [2] - Addressing these challenges requires a holistic approach to internal security systems, emphasizing the need for strategic thinking in overcoming obstacles [2]
齐向东:当前网络安全体系建设面临三重困境,呼吁重塑内生安全体系
Jing Ji Guan Cha Bao· 2025-06-05 09:26
Group 1 - The core theme of the conference is "Security Breakthrough: Reshaping the Internal Security System," focusing on the challenges and opportunities in the cybersecurity industry during the transition from the 14th to the 15th Five-Year Plan [2] - The chairman of Qi Anxin Group highlighted three major dilemmas facing the current cybersecurity system: the ineffective implementation of systematic thinking, the bottleneck in integrating large and small systems, and operational obstacles within small systems [3][4] Group 2 - The first dilemma is the ineffective implementation of systematic thinking, where over 90% of large government and enterprise institutions procure equipment from more than 10 vendors, leading to a fragmented security system [3] - The second dilemma involves the integration gap between macro-level security designs and micro-level industry-specific security systems, which can create vulnerabilities [3] - The third dilemma is the operational hindrances within small systems due to inconsistent standards and lack of data sharing, which exacerbates capability disparities [3] Group 3 - The issue of insufficient security investment is particularly pronounced in the AI era, with a large energy company investing over 1 billion yuan annually in digital transformation but allocating less than 4% to cybersecurity [4] - The chairman emphasized the need for a shift from "selecting individual products" to "systematic selection" and from "fragmented design" to "systematic design" to effectively address current complex threats [4] - The cybersecurity industry must promote rational security investment, unify standards, and enhance the integration of large and small systems through policy guidance, technological innovation, and industry collaboration [5]