1、CYBERSECURITY:THE GUARDIAN OF DIGITAL TRANSFORMATION 2|CYBERSECURITY:THE GUARDIAN OF DIGITAL TRANSFORMATIONExternal Document 2023 Infosys LimitedCYBERSECURITY:THE GUARDIAN OF DIGITAL TRANSFORMATION|3External Document 2023 Infosys LimitedContentsCybersecuritys progress from horizon 1 to 3 06Infrastru
2、cture security 09Identity and access management 11Data security 13Governance,risk management,and compliance 15Vulnerability management 17Managed security services-threat detection and response 19Emerging technologies 21Cloud security 23Data privacy 25Advisory council and contributors 27Producers 27C
3、ybersecurity manages business risks throughout the value chain through processes,policies,and governance methodologies.The technology identifies,detects,protects,responds to,recovers from,and governs against cyber threats.It secures an organizations entire attack surface cloud,workplace,IoT/OT,appli
4、cations,big data,and AI models.4|CYBERSECURITY:THE GUARDIAN OF DIGITAL TRANSFORMATIONExternal Document 2023 Infosys LimitedCYBERSECURITY:THE GUARDIAN OF DIGITAL TRANSFORMATION|5External Document 2023 Infosys LimitedDaily and widespread cyberattacks persist.By 2025,Gartner projects 45%of global organ
5、izations will face supply chain software attacks.Cybercrime damage cost will rise from$8 trillion to$10.5 trillion in 2025,according to Cybersecurity Ventures.The cybersecurity landscape has significantly advanced in the past two decades with better regulations,frameworks,and controls.The BS-7799/IS
6、O 27001 standard emerged between 2000 and 2008 an era of antivirus,firewall,and virtual private network(VPN)solutions.Between 2009 and 2014,these solutions evolved to promote application-aware firewalls,unified threat management,deep packet inspection,and malware analysis.This era also introduced th