ISC, see the next ten years of digital security

Author:Xiaguang Society Time:2022.07.30

Author | Hu Yan

Edit | Wang Miao

"Faced with a strong opponent, 'invisible' has become the biggest pain point in the digital security era, and 'invisible' is about to be beaten. Therefore, 'see' is a safe watershed, can see threats, and can have the security protection ability to resist attacks. "Zhou Hongyi, the founder of Sanqi Company, publicly stated publicly at the 10th Internet Security Conference (ISC 2022).

The theme of this conference is "escorting digital civilization and creating a new era of digital security". Many enterprise executives and scholars who attended the meeting agreed that digital security is the cornerstone of the digital economy. With the help of ISC, create a "China Plan" of global forward -looking dialogue and peak technology discussions, explore digital security, and escort the digital transformation of governments, large enterprises, cities, and small and medium -sized enterprises.

In fact, this year is the tenth year of the ISC conference. Looking back, ISC can become a lighthouse for the network security industry every year. Today, the digital economy is becoming an important engine of a new round of scientific and technological revolution and industrial change in the world. In the context of the degree of digitalization and the acceleration of government -enterprise accelerated "Shangyun", global network security issues are increasingly prominent, and digital security barriers are the foundation for ensuring the development of the digital economy.

In the next ten years, ISC will continue to focus on the challenges brought by emerging digital technology and complex digital scenarios, helping enterprises to solve safety needs, creating industrial forums in the fields of transportation, power, education, finance, Internet of Vehicle, and Industrial Internet to help the industry promote the industry Digital transformation; and through cutting -edge technical forums to help the country break through the digital security "stuck neck" problem, making China a real digital security power in the true sense.

Ten years of digital security

With the birth of various types of network communication technologies, data circulation has grown geometrically. Although my country's information communication and the development of the Internet industry have started late compared with European and American countries, as the infrastructure continues to improve, in just decades, my country's network technology has made rapid progress.

It is not only the improvement of production efficiency and the convenience of life, but the online world has become more and more complicated. From the 1970s, the world's first cyber virus "worm", to the emergence of various hackers and cyber attacks, network security issues such as system downtime and information leakage were valued by individuals, enterprises and governments. At the national level, digital security and network security have become an extension of territorial security, and it is an important cornerstone of national security. It is enough to see its strategic importance.

Throughout the history of the development of the network security industry in my country, from the beginning of the information security industry in the 1980s, to the emergence of computer security laws and regulations in the 1990s. After 2000, China's network security industry officially entered a period of high -speed development. The passive response protection mainly based on virus prevention and killing and killing is the dynamic and active defense of dynamic defense driven by big data, cloud computing and artificial intelligence as the core technology.

At present, the main business types of my country's network security industry have covered 15 major categories and 75 categories including terminal security, data security, application security, and Internet of Things security. This has laid the industrial foundation for the leapfrog development of my country's network security industry in China.

In this process of leapfrog development, ISC created a precedent of network security conferences. As early as 2012, Zhou Hongyi proposed that it was necessary to hold the Chinese "World Top Network Security Conference".

In 2013, the Snowden's "Prism Gate" incident became the focus of the attention of various media and public opinion. At the first Internet Security Conference (ISC 2013), Zhou Hongyi, the master of red, bluntly said that network security needs to be redefined and said that network security is currently network security It is not only a company that can be satisfied. As the security threats continue to expand in the future, calling on everyone to cooperate together, which also marks the beginning of a new era.

During the nine years, ISC held over 20 international summits around the forefront of the forefront of network space governance, data security, threat intelligence, and Internet of Things security. It attracted more than 2,000 dignitaries, industry leaders, and network security experts from the United States, Russia, Israel, and Germany to participate in in -depth participation in more than 2,000 countries, and interviewed the global network security ecology.

It can be said that with the continuous iteration of technology and the rapid development of the industry, ISC has continued to advance with the times, leaving a unique mark on the development of China's network security.

Ten years of grinding a sword, ISC has not only become a world -class network security technology exchange platform, but also a vane of global network security development trend.

Standing at the ten -year change node, network security has been redefined again. 2022 is the "first year of digital security". In various industries, they are trying to embrace the digital civilization of the universe. If the network security industry continues to be disabled and stays at the network security level, it means that everyone is not standing high enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough, not enough to see enough. Far. Therefore, the network security industry should be redefined. Cyber ​​security must be assigned digital security in order to match the digital strategy of the entire country today.

See the next ten years

In fact, the digital security advocated by ISC is closely linked to the digital economy. At the end of 2021, the State Council issued the "Fourteenth Five -Year Plan" digital economic development plan. Among them, the emphasis on digital economic security issues.

The "Planning" emphasizes that the security issues in the development of the digital economy often have a large impact and heavy losses. Therefore, the "Planning" particularly emphasizes the strengthening of the construction of network security infrastructure, strengthening protection capabilities, establishing and improving the data security governance system, and improving industrial security monitoring and early warning mechanisms. Same as the introduction of the top -level design of the digital economy, ISC is seeing the wave of global technological changes in the next five years or even ten years. At the same time, it also sees the security challenges facing new digital technology and complex scenarios.

During the epidemic, online education, online office, and online e -commerce industries have grown against the trend. The digital economy has promoted the transformation and upgrading of traditional industries, becoming a new trend and highlight. The epidemic accelerates the deep integration of the Internet, big data, artificial intelligence and the real economy. From the perspective of industrial development, enterprises applied computer technology, IoT technology, communication technology and other technologies to research and development, production, logistics, marketing and other processes, and can provide new opportunities and new impetus for the transformation and upgrading of traditional industries.

Not only enterprises, in recent years, my country's electronic government affairs have also ushered in a period of rapid development. All localities have built government affairs cloud platforms to promote the cloud information system through various policies. "Let the people running less legs and more information" has become the purpose of many local governments for civil affairs.

For urban development, data and other elements have the characteristics of non -pollution, and the digital economy and green development concepts are in line with the concept of green development. Digital transformation provides new ideas for traditional industries to achieve green development. Create a digital industrial park ecosystem, perform digital management and digital operations in the park, and use digital infrastructure to cultivate new kinetic energy in a good digital ecological environment, and drive the digital transformation of traditional industries by industrial agglomeration effects.

It is undeniable that data, as a key element of digital transformation, can play an important role in corporate cost reduction and efficiency, optimizing social resource allocation, and improving administrative efficiency. However, whether it is the development of enterprises, governments, cities, and countries, it is necessary to face security issues in the process of digital transformation. Different enterprises and local governments, due to the differences in funds and technical differences, network security protection capabilities are large, facing security issues such as data protection and privacy leakage.

Therefore, the ISC of the next ten years of digital security trends has created an industrial theme forum covering transportation, power, education, finance, vehicle networking, and industrial Internet. Structure upgrades bring more reference and practice to the digital transformation of traditional industries.

At the same time, ISC has set up several cutting -edge technical theme forums based on network space governance, data security, threat intelligence, zero trust, XDR and other cutting -edge fields of the frontier fields to unite national strategic technological power and strongly promote the development of digital industrialization.

Gather the industry, face the challenge

There is no doubt that in the era of digital economy, digital security issues have become more complicated: cloud security, big data security, IoT security, terminal security, supply chain security, communication security, and communication security will be six basic security issues. In addition More complicated security scenarios such as Internet of Vehicle, Digital Finance, Energy Internet, Digital Government, and Smart City.

In terms of form, individual hackers seem to have become history, and they are replaced by online troops, APT organizations, and organized cyber crimes with the national background. The layout, challenges, goals, techniques, and harm caused by network attacks have exceeded routine. Various new attacks such as supply chain attacks, extortion attacks, and industrial control equipment attacks are constantly refreshing their imagination, becoming the biggest uncertainty in the digital economy era.

For ISC, the trend of seeing the future is far from enough. More importantly, after insight into cutting -edge technology, the ability to solve practical problems.

In the past ten years, the ISC conference has released a series of technologies that break through the network security "stuck neck" technology such as APT detection, vulnerability mining, threatening intelligence, and map surveying and mapping, forming a strong network space early warning capability. As of now, these technologies with big data analysis have helped the state discover 46 national background hackers and detected more than 3600 APT attacks.

Of course, as an industry event, ISC knows that it is difficult for a single enterprise to deal with complex and changeable situations. Therefore The problem of turning the network space to create a radar defense system for network space. In addition, through sharing threat intelligence and knowledge bases with other security companies and customers, ISC will be committed to helping traditional security products and customers' existing security products upgrade, seeing and solving unknown network threats and attacks.

In the future, ISC will unite outstanding enterprises with innovative consciousness and family feelings, focus on cutting -edge, condense strength, and truly help the country and enterprises solve the "card neck" problem of "seeing" high -level threats The system is to escort the digital economy era.

- END -

Air China, China Eastern, and China Southern Airlines purchased 292 aircraft from Airbus

Air China, China Eastern and China Southern Airlines announced on the same day to ...

Two years in Shandong opened 103 stores, and now convenience bees are shrinking Shandong territory?

In Jinan, the convenient bee that was once shocked by star was slowly fading. The ...