{"id":38955,"date":"2024-06-20T11:00:00","date_gmt":"2024-06-20T17:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=38955"},"modified":"2024-06-20T10:55:58","modified_gmt":"2024-06-20T16:55:58","slug":"%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e8%a6%8f%e5%88%b6%e3%81%8c%e6%88%a6%e7%95%a5%e3%81%a8%e4%ba%88%e7%ae%97%e3%81%ae%e5%a2%97%e5%8a%a0%e3%82%92","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/","title":{"rendered":"\u65b0\u305f\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u304c\u6226\u7565\u3068\u4e88\u7b97\u306e\u5897\u52a0\u3092\u3044\u304b\u306b\u4fc3\u9032\u3059\u308b\u304b"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"How New Cybersecurity Regulations Drive Strategy and Budget Increases\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-06-20T11:00:00-06:00\">6\u6708 20, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">How New Cybersecurity Regulations Drive Strategy and Budget Increases<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('How%20New%20Cybersecurity%20Regulations%20Drive%20Strategy%20and%20Budget%20Increases').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcybersecurity-regulations-drive-strategy-and-budget-increases%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=New%20Cybersecurity%20Regulations%20Drive%20Strategy%20and%20Budget%20Increases%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcybersecurity-regulations-drive-strategy-and-budget-increases%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcybersecurity-regulations-drive-strategy-and-budget-increases%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcybersecurity-regulations-drive-strategy-and-budget-increases%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">Regulatory Changes Fuel Strategy Shifts and Budget Increases in Cybersecurity<\/h2>\n\n\n\n<p>As the chief information security officer (CISO) of Swimlane, I\u2019ve closely monitored the intensifying regulatory changes over the past year. Key developments like the <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-139\">SEC\u2019s cybersecurity incident disclosure rules<\/a> and the EU\u2019s <a href=\"https:\/\/www.european-cyber-resilience-act.com\/\">Cyber Resilience Act<\/a> (CRA) have been significant drivers to begin safeguarding sensitive data and critical systems within an organization. These regulations aim to address the escalating risks of cyber threats and our increasing reliance on digital products. Furthermore, the race to harness<a href=\"https:\/\/swimlane.com\/chatgpt-openai-security-risks-considerations\/\"> AI<\/a> is prompting calls for responsible use and heightened regulatory oversight. These new cybersecurity regulations are compelling organizations, to reevaluate and reshape their strategies.<\/p>\n\n\n\n<p>To gain a deeper understanding of the impact of these changes, we partnered with <a href=\"https:\/\/sapioresearch.com\/\">Sapio Research<\/a> to survey 500 cybersecurity decision-makers from large enterprises in the US and UK. This provided valuable insights into how these organizations are adapting. You can explore our key findings from the report in our blog:<a href=\"https:\/\/swimlane.com\/blog\/ai-cybersecurity-compliance\/\"> AI, Cybersecurity and Compliance: A Data-Driven Perspective<\/a> and download the full report for a comprehensive analysis: <a href=\"https:\/\/swimlane.com\/resources\/reports\/cybersecurity-regulation-effectiveness\">2024 Regulation vs. Reality: Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Impact on Cybersecurity Decision-Makers<\/h2>\n\n\n\n<p>I\u2019ve seen firsthand how regulatory changes are reshaping our industry. According to our recent survey, an overwhelming 93% of organizations have reevaluated their cybersecurity approach in the past year due to new regulatory pressures. Notably, 58% have completely overhauled their strategies. This underscores the dynamic regulatory landscape and the critical importance of robust cybersecurity measures.&nbsp;<\/p>\n\n\n\n<p>The survey reveals that 45% of cybersecurity decision-makers have taken on significant new responsibilities due to these strategic shifts. This added burden highlights the growing complexity of cybersecurity management, where we must balance compliance with proactive threat mitigation and response.\u00a0<\/p>\n\n\n\n<p>As we navigate these changes it\u2019s important for us, as cybersecurity leaders, to understand the evolving roles and responsibilities we face. As regulations, fast-paced trends, and new technologies like AI evolve, we have inevitably shifted from traditional security leader roles to strategic business enablers. We\u2019re now responsible for not only security, but also driving business growth and innovation.<\/p>\n\n\n\n<p>To succeed today, we must develop new skills while maintaining the strong fundamentals.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Communicate effectively with the board by tailoring your message to the members&#8217; backgrounds and provide demonstrations that link technical risks to business impacts.\u00a0<\/li>\n\n\n\n<li>Engage with peers and other security executives from different industries to gain valuable insights and support.\u00a0<\/li>\n\n\n\n<li>Adopt a risk-based approach, focusing on being proactive and resilient since breaches and technology are becoming more sophisticated, and balance risk with cost.\u00a0<\/li>\n\n\n\n<li>Invest in your existing security operations (SecOps) team by providing the right training and resources. Success is about enabling your team with the best training and technology, not increasing headcount.\u00a0<\/li>\n\n\n\n<li>Conduct regular tabletop exercises and war games to help raise awareness and foster a culture of proactive risk management within the organization.<\/li>\n\n\n\n<li>Embrace automation to help manage the overwhelming amount of data and free up the team to focus on security tasks.<\/li>\n<\/ul>\n\n\n\n<p>Check out my latest blog, \u201c<a href=\"https:\/\/swimlane.com\/blog\/ciso-guide-to-sec-compliance\/\">The &#8216;Materiality&#8217; Mystery: A CISO\u2019s Guide to SEC Compliance,\u201d<\/a> for more valuable insights and practical tips for security leaders.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Budgetary Implications<\/h2>\n\n\n\n<p>One of the most significant outcomes of these regulatory changes is the notable increase in cybersecurity budgets. A staggering 92% of organizations have reported higher budget allocations for cybersecurity, highlighting the critical prioritization of regulatory compliance and threat management.<\/p>\n\n\n\n<p>Specifically, 36% of these organizations experienced budget increases ranging from 20% to 49%, while 23% saw their budgets skyrocket by over 50%. Substantial budget increases are a clear indicator that organizations recognize the need for enhanced cybersecurity and they are willing to invest to meet regulatory requirements and protect their digital assets.<\/p>\n\n\n\n<p>&#8220;<em>The SEC pushes cybersecurity as mission critical to companies. By putting in a framework of standards and responsibility, this puts a lot of emphasis on what the cybersecurity community sees as &#8216;table stakes&#8217; or &#8216;protecting endpoints&#8217;. A company needs to be a well-oiled machine. This is why we&#8217;ve seen such a big increase in spending. Everyone agrees on the importance of cybersecurity, but it\u2019s about figuring out what the plan and budget is to address it.\u201d<\/em><\/p>\n\n\n\n<p>&#8211; <a href=\"https:\/\/www.linkedin.com\/in\/charles-constanti-329a421\/\"><strong>Charles Constanti<\/strong><\/a><strong>, Chief Financial Officer of Swimlane<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"675\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-20-at-10.31.02\u202fAM-1024x675.png\" alt=\"\" class=\"wp-image-38956\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-20-at-10.31.02\u202fAM-1024x675.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-20-at-10.31.02\u202fAM-300x198.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-20-at-10.31.02\u202fAM-768x506.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-20-at-10.31.02\u202fAM.png 1235w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In addition to regulatory changes, other factors contribute to the increase in cybersecurity spending.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>56% to counter growing cyber threats<\/li>\n\n\n\n<li>54% to invest in employee security awareness training<\/li>\n<\/ul>\n\n\n\n<p>I\u2019d like to highlight the above one more time\u2026 54% of organizations plan to invest in employee security awareness training. This investment highlights the importance of educating and empowering your existing workforce. In my experience, this approach is crucial. With the proper tools and ongoing training, you can empower your organization and enhance your security posture significantly.<\/p>\n\n\n\n<p>Additionally, 51% of organizations are increasing budgets to support expanding digital footprints, such as cloud adoption. This approach is essential for maintaining robust security in an increasingly complex digital world. We must remain adaptable, and continuously update our strategies to meet regulatory demands and emerging threats.<\/p>\n\n\n\n<p>To successfully navigate these challenges, allocating a budget towards <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> is not just beneficial\u2014it\u2019s essential. This proactive step enables organizations to implement advanced technologies, conduct thorough risk assessments, and bolster their defenses against increasingly sophisticated cyber threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI-Enhanced Security Automation<\/h2>\n\n\n\n<p>It\u2019s important to foster a culture of vigilance and adaptability across your organization. AI-enhanced automation allows security professionals to focus on complex judgment-driven issues, ensuring efficiency and compliance while enhancing resilience against cyber threats. It streamlines <a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>, improves response times, and optimizes resources, empowering your team to be more effective, regardless of size.<\/p>\n\n\n\n<p>At Swimlane, we tackle these challenges by drinking our own champagne. We leverage AI-enhanced security automation in our security operations center (<a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>) to enhance incident response and mitigate risks efficiently. Our platform helps you mitigate risks, adapt to regulatory changes, and defend against cyber threats in real-time.<\/p>\n\n\n\n<div class=\"bs-div bs-div-5e403fa6221e76a9981dd330521a76f407f10926 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-5e403fa6221e76a9981dd330521a76f407f10926 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-3.gif' class='img-fluid'   alt='roi report swimlane security automation' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-3.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-are-the-fed-s-attempts-at-wrangling-incident-disclosure-effective\"><strong>Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?<\/strong><\/h3>\n\n\n\n<p>Download the full research report now to understand how these regulatory shifts are impacting security practices and compliance strategies. Read the report to learn more about how the regulatory environment is impacting cybersecurity strategies, priorities, and budgets.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-a381802cb155934408b1ffb7f30eb8fd44a88e75\"><style>.bs-pro-button-p-btn-a381802cb155934408b1ffb7f30eb8fd44a88e75 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/cybersecurity-regulation-effectiveness\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ja\/tag\/research\/'><span class='tag-content'>Research<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d04e98dfcf3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/top-soc-analyst-challenges\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>11\u6708 18, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Top SOC Analyst Challenges<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d04e98e10c7 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/incident-response-plans\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\u6708 20, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automating cybersecurity incident response plans<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d04e98e2295 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/nist-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\u6708 31, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Improving incident response with the NIST Cybersecurity Framework and security automation and orchestration (SAO)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":38958,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":38957,"learn_more_label":"","image_alt_text":"How New Cybersecurity Regulations Drive Strategy and Budget Increases","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[132],"resource-industry":[],"blog-category":[77],"class_list":["post-38955","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs","resource-topic-platform","blog-category-platform"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Regulations Drive Strategy and Budget Increases | Swimlane<\/title>\n<meta name=\"description\" content=\"Discover how new regulations are reshaping cybersecurity strategies and budgets. Hear from Swimlane CISO, Michael Lyborg as he explores how organizations should adapt to the new SEC incident disclosure rules and the EU\u2019s Cyber Resilience Act (CRA).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u304c\u6226\u7565\u3068\u4e88\u7b97\u306e\u5897\u52a0\u3092\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Cybersecurity Regulations Drive Strategy and Budget Increases | Swimlane\" \/>\n<meta property=\"og:description\" content=\"Discover how new regulations are reshaping cybersecurity strategies and budgets. Hear from Swimlane CISO, Michael Lyborg as he explores how organizations should adapt to the new SEC incident disclosure rules and the EU\u2019s Cyber Resilience Act (CRA).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u304c\u6226\u7565\u3068\u4e88\u7b97\u306e\u5897\u52a0\u3092\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"New Cybersecurity Regulations Drive Strategy and Budget Increases | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"Discover how new regulations are reshaping cybersecurity strategies and budgets. Hear from Swimlane CISO, Michael Lyborg as he explores how organizations should adapt to the new SEC incident disclosure rules and the EU\u2019s Cyber Resilience Act (CRA).\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/\",\"url\":\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/\",\"name\":\"Cybersecurity Regulations Drive Strategy and Budget Increases | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg\",\"datePublished\":\"2024-06-20T17:00:00+00:00\",\"description\":\"Discover how new regulations are reshaping cybersecurity strategies and budgets. Hear from Swimlane CISO, Michael Lyborg as he explores how organizations should adapt to the new SEC incident disclosure rules and the EU\u2019s Cyber Resilience Act (CRA).\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg\",\"width\":1120,\"height\":666,\"caption\":\"How New Cybersecurity Regulations Drive Strategy and Budget Increases\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How New Cybersecurity Regulations Drive Strategy and Budget Increases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ja\/#website\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u304c\u6226\u7565\u3068\u4e88\u7b97\u306e\u5897\u984d\u3092\u4fc3\u9032 | Swimlane","description":"\u65b0\u305f\u306a\u898f\u5236\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u3068\u4e88\u7b97\u306b\u3069\u306e\u3088\u3046\u306a\u5909\u5316\u3092\u3082\u305f\u3089\u3057\u3066\u3044\u308b\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002Swimlane\u306eCISO\u3001Michael Lyborg\u304c\u3001SEC\u306e\u65b0\u3057\u3044\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u958b\u793a\u898f\u5247\u3068EU\u306e\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5\uff08CRA\uff09\u306b\u7d44\u7e54\u304c\u3069\u306e\u3088\u3046\u306b\u9069\u5fdc\u3059\u3079\u304d\u304b\u3092\u89e3\u8aac\u3057\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u304c\u6226\u7565\u3068\u4e88\u7b97\u306e\u5897\u52a0\u3092\/","og_locale":"ja_JP","og_type":"article","og_title":"New Cybersecurity Regulations Drive Strategy and Budget Increases | Swimlane","og_description":"Discover how new regulations are reshaping cybersecurity strategies and budgets. Hear from Swimlane CISO, Michael Lyborg as he explores how organizations should adapt to the new SEC incident disclosure rules and the EU\u2019s Cyber Resilience Act (CRA).","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u304c\u6226\u7565\u3068\u4e88\u7b97\u306e\u5897\u52a0\u3092\/","og_site_name":"AI Security Automation","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"New Cybersecurity Regulations Drive Strategy and Budget Increases | Swimlane","twitter_description":"Discover how new regulations are reshaping cybersecurity strategies and budgets. Hear from Swimlane CISO, Michael Lyborg as he explores how organizations should adapt to the new SEC incident disclosure rules and the EU\u2019s Cyber Resilience Act (CRA).","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/","url":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/","name":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u304c\u6226\u7565\u3068\u4e88\u7b97\u306e\u5897\u984d\u3092\u4fc3\u9032 | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg","datePublished":"2024-06-20T17:00:00+00:00","description":"\u65b0\u305f\u306a\u898f\u5236\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u3068\u4e88\u7b97\u306b\u3069\u306e\u3088\u3046\u306a\u5909\u5316\u3092\u3082\u305f\u3089\u3057\u3066\u3044\u308b\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002Swimlane\u306eCISO\u3001Michael Lyborg\u304c\u3001SEC\u306e\u65b0\u3057\u3044\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u958b\u793a\u898f\u5247\u3068EU\u306e\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u6cd5\uff08CRA\uff09\u306b\u7d44\u7e54\u304c\u3069\u306e\u3088\u3046\u306b\u9069\u5fdc\u3059\u3079\u304d\u304b\u3092\u89e3\u8aac\u3057\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.jpg","width":1120,"height":666,"caption":"How New Cybersecurity Regulations Drive Strategy and Budget Increases"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/cybersecurity-regulations-drive-strategy-and-budget-increases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How New Cybersecurity Regulations Drive Strategy and Budget Increases"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/38955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/38955\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/38958"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=38955"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=38955"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=38955"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=38955"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=38955"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=38955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}