Workflow
数据安全治理
icon
Search documents
山石网科:公司目前正全力推进ASIC安全产品营销工作,将前期投入逐渐转化为商业价值
Core Viewpoint - The current network security industry is facing weak downstream demand and intensified market competition, prompting the company to implement various measures for industry adjustment [1] Group 1: Company Initiatives - The company is actively pursuing technological innovation, marketing, product research and development, and organizational improvements to adapt to industry changes [1] - The development and mass production of ASIC chips are highlighted as a core competitive advantage for the company [1] - The company is focusing on expanding its data security governance, security operations, and security service businesses, as well as exploring overseas markets, which have shown some initial success [1] Group 2: Future Focus - The company is fully committed to promoting the marketing of ASIC security products, aiming to convert previous investments into commercial value [1] - Future efforts will concentrate on improving profitability and narrowing the gap with leading companies in the industry, while ensuring the protection of shareholder interests [1]
数据黑产运作走向精准化 个人信息保护亟待多管齐下
Xin Lang Cai Jing· 2026-02-05 09:58
Group 1 - The core viewpoint of the report indicates that data leakage risks are increasing, with a projected total of 41,644 data breach incidents globally by 2025, marking a 10.83% increase from 2024. The financial sector is identified as the most affected industry, with banking risks leading for three consecutive years [1] - The report highlights that illegal institutions are using deceptive tactics to collect personal information, complicating regulatory oversight and increasing consumer litigation costs due to the transient nature of fraudulent links [1] - The report emphasizes the need for improved data security governance in light of the evolving tactics of illegal data trading and the challenges posed by hidden and organized crime [1] Group 2 - The illegal data trading ecosystem is characterized by the emergence of public chat groups that serve as hubs for data transactions, with over 3.6 million pieces of intelligence captured from 1,209 active data trading groups on Telegram in 2025 [2] - Financial data transactions account for over 50% of illegal data trades, with loan-related data being the most sought after, reflecting its high monetization value in the black market [2] - The report notes that the demand for financial user data, particularly loan-related information, remains dominant across various segments, including consumer finance and bank loans [2] Group 3 - The evolution of illegal data trading methods is highlighted, with the introduction of AI for data cleaning and quality control, which aims to enhance conversion rates by filtering out low-quality data [3] - The report indicates that the black market has segmented its operations to cater to different platforms, involving up to 60 financial institutions, thereby complicating the legal landscape for prosecution [3] - Legal experts point out that current laws are inadequate to cover the full spectrum of black market activities, making it difficult to prosecute all participants in the data trading chain [3][7] Group 4 - The report stresses the urgent need for "penetrating" data audits to enhance the security standards and regulatory frameworks for financial institutions in response to the sophisticated operations of illegal data traders [4] - Financial institutions are held to strict data security obligations under the Personal Information Protection Law, and failure to protect data can lead to civil and administrative penalties [6] - The report suggests that financial institutions should implement rigorous ongoing audits of their third-party marketing partners to ensure comprehensive data security [6] Group 5 - The report reveals that the timeliness of leaked consumer finance application data has evolved to an overnight update cycle, indicating the rapid pace of data exploitation [5] - Legal experts emphasize the importance of source disruption in combating illegal data trading, advocating for victims to preserve evidence effectively to support legal actions [9][10] - The report outlines that victims of precision scams need only demonstrate a connection between their data handling on specific platforms and subsequent targeted fraud to establish a legal claim [10]
泰康在线:以智能治理筑牢金融数据安全底座,赋能业务高质量发展
Cai Fu Zai Xian· 2026-02-03 05:34
Core Insights - Financial technology is transitioning from "tool application" to "productivity innovation," emphasizing the need for robust data governance and compliance frameworks to ensure sustainable technology application [1] - Data security has evolved into a core issue for enterprise survival and competitive advantage, necessitating comprehensive strategies for data management and protection [1] Group 1: Data Security Practices - The "Data Security Operation Practice" by the company has been recognized by the China Academy of Information and Communications Technology, highlighting its commitment to sustainable data security [1] - The practice is centered around the "Wotu Big Data Platform," which facilitates a comprehensive data operation cycle and strengthens security measures [3] - Data assets are categorized and managed across four dimensions: customer, business, operations, and systems, ensuring clear security profiles for each data type [3] Group 2: Control Measures - The company has established a multi-dimensional data directory that allows for data identification, traceability, and control, implementing encryption for sensitive data upon entry [4] - Access control is reinforced through standardized management of metadata, focusing on preventing unauthorized access to sensitive data [4] - A governance mechanism is in place that allows for the discovery and resolution of risks, enhancing the company's financial data security capabilities [4] Group 3: Intelligent Collaboration - The company is building a "human-machine co-governance" ecosystem for data security, driven by AI technology and human expertise [6] - Proprietary statistical sampling algorithms have achieved over 95% accuracy in identifying sensitive fields, significantly reducing processing time from hours to seconds [6] - The integration of AI technologies enables proactive risk perception, enhancing the overall security framework [6] Group 4: Practical Outcomes - The "Data Security Operation Practice" has demonstrated significant economic value through risk prevention, efficiency enhancement, and value extraction [7] - The project has improved data utilization efficiency and compliance management, fostering market trust and supporting business growth in areas like intelligent risk control and precise underwriting [7] - The initiative also protects personal data rights and contributes to social equity and national security, establishing a reliable foundation for data security [7] Group 5: Future Outlook - As AI becomes more integrated into core processes like investment research, customer service, and risk control, the demand for data quality, security, and ethical frameworks will increase exponentially [8] - The company aims to share its experiences and methodologies with financial institutions and technology partners to develop industry standards and create a secure, trustworthy digital financial ecosystem [8]
因信息安全管理受罚 中小银行如何补齐能力短板?
Core Insights - Recent penalties imposed on Shangrao Bank and Xingtai Bank highlight the inadequacies in information security management within the banking sector [1][2] - The evolving regulatory landscape emphasizes that data security is now a critical component of corporate governance and comprehensive risk management in the banking industry [1][6] Regulatory Environment - The National Financial Regulatory Administration will implement the "Data Security Management Measures for Banking and Insurance Institutions" by December 2024, followed by the People's Bank of China issuing the "Data Security Management Measures in the Business Field" by May 2025 [1] - Data security is transitioning from a technical issue to a focal point of regulatory scrutiny, indicating a long-term trend in the banking sector [1] Challenges Faced by Banks - Small and medium-sized banks are struggling with a significant gap between increasing regulatory demands and their limited technical capabilities, management levels, and resource investments [1][4] - The shift from traditional network security management to data security governance presents a challenge, as many banks have not yet integrated data management with their IT infrastructure effectively [3][4] Operational Shortcomings - Many small and medium-sized banks prioritize business operations over information security, often viewing security as a compliance cost rather than a core competency [4] - There is a lack of collaboration between IT departments and business units, leading to blurred responsibilities and difficulties in accountability during security incidents [4] Recommendations for Improvement - The regulatory focus is on embedding data and network security into corporate governance and daily operations, moving from reactive compliance to proactive management [6] - Banks are encouraged to adopt a unified governance framework that integrates data lifecycle management with network protection to enhance security and business development [3][6] - Smaller banks may benefit from partnering with security service providers to enhance their monitoring and response capabilities, allowing them to focus on core risk management [6]
周鸿祎建言“数据安全治理”,提案入选全国政协好提案
Xin Lang Cai Jing· 2026-01-08 07:16
Core Viewpoint - The proposal by Zhou Hongyi, founder of 360 Group, focuses on constructing a data circulation security infrastructure platform to support the high-quality development of digital China, addressing core pain points in data circulation security [1][2][3] Industry Growth - The establishment of the National Data Bureau and the implementation of foundational systems are leading to explosive growth in China's data factor market, with the national data market transaction scale expected to reach 160 billion yuan in 2024, representing a year-on-year growth of over 30% [1][2] - The on-site market transaction scale has doubled, indicating a significant increase in data circulation activities [1][2] Security Challenges - As data circulation scales expand, security challenges are becoming increasingly severe, with Zhou identifying three major shortcomings in current data security governance [3] - Many market entities adopt isolated protection models, leading to "information islands" and weak overall situational awareness [3] - There is a lack of unified security construction and operational standards across regions, resulting in resource waste due to redundant investments [3] - The absence of cross-industry and cross-regional coordination mechanisms makes it difficult to respond to complex threats such as APT attacks [3] Proposed Solutions - Zhou's proposal includes three key recommendations to address the identified pain points [2][3] - Construct a data circulation security infrastructure platform to break down "information islands" and establish a comprehensive security monitoring mechanism [2][3] - Develop unified security standards to regulate access certification, data desensitization, and ensure controlled circulation throughout the process [2][3] - Create a multi-entity collaborative operation system to integrate resources from regulatory bodies and data supply and demand sides, achieving dynamic lifecycle management [2][3]
中国信通院:平安好医生获业界首张“医疗健康数据安全管理能力”复评证书
Xin Lang Zheng Quan· 2025-09-29 07:32
Core Viewpoint - The article highlights that Ping An Good Doctor has successfully passed the second evaluation of the Data Security Management Capability (DSMC) certification, becoming the first in the healthcare sector to achieve this milestone, which underscores the importance of data security and privacy protection in the company's sustainable development strategy [1][4]. Group 1: DSMC Certification and Evaluation - The DSMC assessment is a dynamic and ongoing process aimed at ensuring that certified companies maintain the effectiveness and advancement of their data security management systems over a three-year period [3]. - The recent re-evaluation was based on the updated T/ISC0059—2024 standards, which impose higher requirements on the completeness of management systems, effectiveness of technical tools, and compliance of process execution [3]. Group 2: Data Security Achievements - As of 2024, Ping An Good Doctor has obtained multiple information security management system certifications, including ISO 27001, ISO 27701, and ISO 27799, covering 100% of its business operations [3]. - The company has enhanced its self-developed business system's comprehensive security defense capabilities, achieving a 35% improvement in alert detection compared to previous commercial products [3]. Group 3: Commitment to Sustainable Development - The company emphasizes that data security and personal information protection are fundamental responsibilities for compliance and sustainable development [4]. - Ping An Good Doctor's sustainable development strategy focuses on comprehensive sustainability, advanced technology empowerment, robust information security protection, and extensive social responsibility [4]. Group 4: Future Directions and Industry Collaboration - The company plans to use its certification as a starting point to deepen privacy protection practices and build a solid digital trust for users [4]. - The China Academy of Information and Communications Technology (CAICT) aims to enhance the DSMC evaluation system by integrating the latest national standards, encouraging more companies, especially those in data processing, to participate in DSMC evaluations [5].
守好数字金融安全底线
Jin Rong Shi Bao· 2025-08-08 07:55
Group 1 - Digital security is crucial for national security, economic development, and social stability, with digitalization becoming a key feature for high-quality development across various industries, including finance [1] - The rapid advancement of technology in digital finance has led to increased risks, such as cyberattacks and data breaches, particularly with the integration of AI, which can facilitate more frequent and lower-barrier attacks on financial institutions [1] - There is a consensus in the industry that regulatory bodies must enhance planning and oversight, while technology companies and financial institutions need to collaborate to strengthen technical safeguards and establish a comprehensive protection system for data integrity, confidentiality, and availability [1] Group 2 - Data security governance is essential for the stable operation of financial institutions, the healthy development of financial markets, and the interests of consumers, with increasing emphasis on data governance and security issues in the digital finance sector [2] - Recent government policies, such as the "Network Data Security Management Regulations" and the "Data Security Management Measures for Banking and Insurance Institutions," outline the direction for data security protection and emphasize the establishment of a governance system aligned with business goals [2] - Despite the growing attention to data security governance and the continuous improvement of related policies, there are still significant challenges in the practical implementation within the financial sector [2] Group 3 - The central economic work conference emphasizes the need for coordinated efforts to combat illegal financial activities, particularly those exploiting technology for unlawful purposes [3] - Enhancing computing power security is identified as a critical step in ensuring digital financial security, with plans to strengthen data classification and protection, and to implement strict management of important data [3] - Financial institutions are encouraged to establish monitoring mechanisms, improve standardization and regulation, and invest in talent development to enhance their data security risk assessment and management capabilities [3]
南财数据周报(52期):国家支持深圳探索数据市场机制,安徽明确公共数据资源收费标准
Group 1 - The national data standardization technical committee is soliciting public opinions on seven technical documents related to integrated computing power network construction, including requirements for computing power networking and resource management [1][2] - The Central Committee and the State Council have issued opinions to deepen the market-oriented allocation of data elements, supporting Shenzhen in exploring data trading and trusted circulation mechanisms [2][3] - The National Development and Reform Commission emphasizes four key measures to promote high-quality development of the real economy through finance, technology, and data, while supporting Shenzhen's comprehensive reform pilot [3] Group 2 - Anhui Province has established a pricing mechanism for public data resources, allowing free access for public governance and charging fees for industrial use, with a focus on cost recovery and reasonable profit [4][5] - Shanxi Province is seeking public opinions on a draft implementation plan for data circulation safety governance, proposing specific safety management measures to ensure compliant data circulation [6][7] - Wuhan has released a three-year action plan for the development of the data labeling industry, aiming to establish several data labeling industrial parks and support small and medium-sized enterprises [7][8]
从一张胸片说起,北京为释放数据价值和安全治理有何尝试?
Nan Fang Du Shi Bao· 2025-06-05 09:41
Core Insights - The Beijing government is exploring data security governance for personal, enterprise, and public data to enhance service delivery and convenience [3][4] Group 1: Personal Data - The core issue with personal data is the lack of unified anonymization standards, which creates concerns for data circulation among enterprises [3] - Beijing is collaborating with hospitals to create public datasets from chest X-ray imaging data, aiming to balance patient safety and research needs [3] Group 2: Public Data - Balancing public interest and commercial utilization of public data is a key challenge, with no unified regulations on authorization and pricing [3][4] - The Beijing government has adopted a decentralized authorization approach for public data, particularly in the financial sector, and is considering whether to expand this or shift to centralized authorization [3] Group 3: Enterprise Data - Trust is crucial for enterprise data circulation, and external factors significantly influence its value [5] - Beijing is utilizing blockchain technology to establish a value-added collaboration network to enhance trust among enterprises, particularly in the steel industry where strong interconnections exist [5]