Workflow
网络和信息安全
icon
Search documents
中证协最新调研!事关券商信息技术
券商中国· 2026-02-05 03:31
Core Viewpoint - The China Securities Association (CSA) is conducting a survey on the implementation of information technology in securities firms, following the expiration of a three-year plan aimed at enhancing network and information security in the industry [1][2]. Group 1: Survey and Implementation - The survey involves over 70 specific tasks, including whether the average annual IT investment by securities firms is at least 10% of their average annual net profit or 7% of their average annual revenue [2]. - The CSA's "Three-Year Enhancement Plan for Network and Information Security (2023-2025)" aims to improve the security and stability of securities firms' information systems, addressing issues such as insufficient IT investment and outdated system architecture [2][3]. - The plan outlines six key areas for improvement, including governance capabilities, investment mechanisms, system architecture, testing management, operational support, and security defense systems [3]. Group 2: Evaluation of Effectiveness - The CSA has sent a letter to securities firms to assess the implementation of the enhancement plan, focusing on various dimensions such as governance, investment, architecture, security, emergency response, and compliance [4]. - The evaluation categorizes 71 tasks into "mandatory tasks" and "encouragement tasks," with over 70% being mandatory requirements that firms must complete [4]. Group 3: Investment and Talent Development - Securities firms are encouraged to ensure that their average IT investment from 2023 to 2025 is at least 10% of their average net profit or 7% of their average revenue, with a focus on adequate funding for network and information security [5][6]. - Firms are also urged to enhance their technology talent pool, aiming to increase the proportion of IT professionals to 7% of total employees, with at least 3% being information security specialists [6]. Group 4: App Security Certification - The CSA is inquiring about the number of main client-facing apps and how many have passed industry security certification, emphasizing the importance of app security and compliance with national standards [7].
证券行业迎来网络和信息安全大考
Zheng Quan Ri Bao· 2026-02-04 16:12
Core Viewpoint - The implementation of the "Securities Company Network and Information Security Three-Year Enhancement Plan (2023-2025)" has led to a comprehensive evaluation of the securities industry's network and information security, focusing on the results of investments and developments over the past three years [1] Group 1: Evaluation Framework - The evaluation will be based on 71 specific indicators, categorized into "mandatory tasks" and "encouraging tasks," with 55 mandatory tasks and 16 encouraging tasks [2] - The evaluation covers key aspects of the entire lifecycle of securities firms' information systems, from top-level design to operational support and security protection [2] Group 2: Focus Areas - The evaluation emphasizes six core areas: improving technology governance, establishing a reasonable technology investment mechanism, enhancing information system architecture control, strengthening system development and testing management, solidifying operational support capabilities, and improving information security protection systems [2] - Technology investment is highlighted as a critical area, with specific quantitative indicators set for technology spending, including a requirement for average annual IT investment to be at least 10% of average net profit or 7% of average revenue from 2023 to 2025 [3] Group 3: System Architecture and Management - Enhancing information system architecture control and development management is identified as a core focus, with specific tasks aimed at improving system architecture management mechanisms and increasing core system autonomy [3] - The evaluation includes 19 tasks related to operational support, emphasizing the importance of emergency response management and data backup capabilities following recent system outages in the industry [4] Group 4: Information Security Protection - The evaluation includes 21 tasks related to strengthening the information security protection system, with a focus on vulnerability management, attack prevention, and data security management [4] - Key tasks such as enhancing network security situational awareness and data security management system construction are highlighted, reflecting regulatory emphasis on data safety and proactive defense capabilities [4]
中证协全面启动券商网安“期末考” 六大领域成果迎系统检阅
Core Viewpoint - The China Securities Association has issued a three-year enhancement plan for network and information security for securities firms, requiring them to submit a survey by February 15, 2026, focusing on the completion of rigid indicators and quantifiable data [1] Group 1: Technology Governance - The survey emphasizes the integration of network and information security into the overall technology strategy of securities firms, ensuring a clear implementation path [2] - A robust governance structure is essential for the execution of the strategy, requiring clear responsibilities and regular meetings of governance organizations [2] - The assessment encourages the establishment of a standardized management framework covering the entire lifecycle of information systems, from development to operation and security [2] Group 2: Compliance and Risk Management - Securities firms are required to enhance internal compliance and risk management, establishing a three-line defense mechanism to identify risks and issues [4] Group 3: Resource and Talent Management - A scientific and reasonable technology investment mechanism is a key focus, with firms needing to ensure that annual IT investments meet at least 10% of net profit or 7% of operating revenue [6] - The assessment also considers the full chain mechanism for attracting, training, utilizing, and retaining cybersecurity professionals [6] Group 4: System Architecture - The survey investigates the depth of transformation in information system architecture, focusing on the establishment of specialized architect teams for unified planning and management [8] - It also examines the progress in enterprise-level architecture capabilities and the migration from traditional centralized architectures to distributed, low-latency, and open architectures [8][9] Group 5: Research and Testing - The assessment aims to promote early integration of security and quality requirements in the software development lifecycle, emphasizing the establishment of standardized demand design mechanisms [11] - It requires firms to implement comprehensive code auditing standards and ensure 100% audit coverage for self-developed code [12] Group 6: Operational Assurance - The evaluation covers the resilience, intelligence, and efficiency of the operational system, requiring comprehensive assessments for system launches and detailed change management processes [14] - Firms must establish a multi-dimensional monitoring system and leverage AI for fault detection and recovery [14] Group 7: Security Protection - The assessment focuses on the establishment of a robust information security protection system, including compliance with cybersecurity classification protection systems [16] - It emphasizes the need for a closed-loop vulnerability management mechanism integrated into the development process and proactive defense capabilities [16][17]
8例涉网安违规情形披露!面对数字化转型,期货公司如何隔离风险?
Qi Huo Ri Bao· 2025-09-01 23:42
Core Insights - The digital transformation of futures companies has accelerated significantly in recent years, but this has also increased risks related to network and information security [1] - Balancing business development with compliance and security has become a critical challenge for futures companies [1] Regulatory Compliance and Risk Management - As of August this year, there have been 8 cases of penalties related to network and information security issues involving external software and information access by futures companies [2] - Common violations include lack of compliance assessments for external systems, inadequate preservation of compliance materials, and insufficient due diligence on clients [2] - Futures companies are integrating external access management into their compliance risk control systems, establishing comprehensive management mechanisms for access testing and transaction monitoring [5] External Access Models - Futures companies provide three main models for external access: 1. Common trading terminal software where clients do not need additional testing after initial access testing by the company 2. For mid-low frequency quantitative clients, who have simpler strategies, they can connect through self-developed programs or third-party platforms 3. High-frequency clients deploy their strategies in exchange-hosted data centers due to high latency requirements [3] Security Measures - To ensure system stability and data security with external access, futures companies employ four main strategies: 1. Technical security measures, including advanced encryption algorithms and strict identity authentication 2. Compliance measures, ensuring adherence to regulatory requirements during API access for algorithmic trading 3. Establishing transaction risk monitoring systems to detect anomalies in real-time 4. Ensuring fund security through strict account management and fund warning mechanisms [4] Challenges and Recommendations - The futures industry faces challenges in IT investment costs and competitive pressures for customer acquisition [6] - Regulatory requirements for network and information security are becoming more stringent, necessitating a balance between business growth and risk management [7] - It is recommended that futures companies form cross-departmental decision-making teams to evaluate business proposals from various perspectives and ensure effective communication [8] Enhancing Compliance Capabilities - Futures companies should improve their systems and processes based on relevant laws, including the Cybersecurity Law and Data Security Law, to cover all aspects of network information security [9] - Regular training and simulations for employees on the latest security regulations and common cyber-attack methods are essential [9] - Investment in advanced security technologies, including firewalls and intrusion detection systems, should be prioritized [9] Industry Collaboration - Futures companies should maintain close communication with regulatory bodies to stay updated on the latest regulations and compliance requirements [10] - Participation in industry associations and training activities can enhance the overall network and information security management capabilities [10]
期货公司持续完善网络和信息安全管理
Qi Huo Ri Bao Wang· 2025-09-01 17:38
Core Viewpoint - The rapid digital transformation of futures companies has led to increased risks in network and information security, necessitating a balance between business development and compliance safety [1]. Group 1: Compliance and Risk Management - As of August 2023, there have been 8 cases of penalties related to network and information security issues involving external software and information access by futures companies [2]. - Key violations include lack of compliance assessments for external systems, inadequate preservation of compliance materials, and insufficient due diligence for client access [2]. - Futures companies are integrating external access management into their compliance risk control systems, establishing comprehensive management mechanisms for access testing and transaction monitoring [5]. Group 2: External Access Models - Futures companies provide three main external access models: common trading terminal software, self-developed or third-party platforms for low-frequency clients, and high-frequency trading setups requiring low latency [3]. - Different trading desks are offered to meet market demands based on the access model used by clients [3]. Group 3: Security Measures - To ensure system stability and data security with external access, futures companies employ four main strategies: technical security measures, compliance protocols, transaction risk monitoring systems, and stringent fund security management [4]. - Companies conduct thorough evaluations of third-party technology suppliers, requiring documentation such as business licenses and product quality certifications [4]. Group 4: Challenges and Recommendations - The high IT investment costs and competitive pressures for customer acquisition pose challenges for futures companies in enhancing network and information security [6]. - Regulatory measures are becoming more detailed, with new regulations like the "Trial Measures for Programmatic Trading Management in the Futures Market" being introduced [6]. - A cross-departmental decision-making team is recommended to balance business needs and risk isolation, ensuring effective communication and collaboration among departments [7]. Group 5: Enhancing Compliance Capabilities - Futures companies should improve their systems and processes based on relevant laws, including the Cybersecurity Law and Data Security Law, to cover all aspects of network information security [9]. - Regular training and simulations of network attack scenarios are suggested to enhance compliance awareness and skills among employees [9]. - Investment in advanced security technologies and the establishment of a robust emergency response mechanism are crucial for improving security management [9]. Group 6: Industry Collaboration - Futures companies are encouraged to maintain close communication with regulatory bodies to stay updated on the latest regulations and compliance requirements [10]. - Participation in industry associations and training activities is vital for understanding industry trends and enhancing network and information security management [10].
网络和信息安全教育
2025-07-16 06:13
Summary of Key Points from the Conference Call Industry Focus - The conference primarily focuses on the **financial technology** sector, specifically addressing **network security** and **data protection** within the financial industry. Core Insights and Arguments 1. **Importance of Network Security**: The speaker emphasizes that network security is not solely the responsibility of the technical department but is a critical concern for every practitioner and investor in the financial sector [1][2][3]. 2. **Weak Passwords**: The discussion highlights the dangers of weak passwords, defined as easily guessable or automated tool-crackable passwords, which can be compared to leaving a house key under the doormat [2][5]. 3. **Common Password Patterns**: The speaker outlines common password patterns that are frequently exploited by attackers, including simple sequences, repeated characters, and personal information combinations [3][4][5]. 4. **Password Management Techniques**: Recommendations for creating strong passwords include using passphrases, incorporating a mix of character types, and avoiding common patterns and personal information [10][11][12][13]. 5. **Password Security Statistics**: The top passwords from 2020 and 2024 are discussed, showing a concerning trend of repeated use of weak passwords among users [9]. 6. **Password Attacks**: Various attack methods are described, including password spraying, dictionary attacks, and brute force attacks, which exploit the commonality of weak passwords [7][8][17]. 7. **Consequences of Weak Passwords**: The potential catastrophic consequences of using weak passwords, especially for system administrators, are highlighted, including data breaches and significant financial losses [6][17]. 8. **Phishing Attacks**: The conference also covers phishing tactics, including email and SMS phishing, which exploit human psychology to deceive users into revealing sensitive information [21][22][23][24]. 9. **User Awareness and Education**: The importance of user education in recognizing phishing attempts and maintaining good password hygiene is stressed, with practical tips provided [19][20][26][27][28]. Other Important but Overlooked Content 1. **Default Password Risks**: The dangers of using default passwords on devices are discussed, emphasizing that many users fail to change these settings, creating vulnerabilities [18]. 2. **Multi-Factor Authentication**: The necessity of implementing multi-factor authentication as an additional security layer is mentioned, particularly in corporate environments [15][20]. 3. **Password Management Tools**: While password managers are suggested for securely storing and generating complex passwords, caution is advised regarding their security [14]. 4. **Regular Updates and Vigilance**: The need for regular software updates and maintaining vigilance against suspicious communications is highlighted as essential for enhancing overall security [27][28]. This summary encapsulates the critical points discussed during the conference, focusing on the financial technology industry's challenges and strategies related to network security and password management.