{"id":38441,"date":"2024-05-21T09:38:39","date_gmt":"2024-05-21T15:38:39","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=38441"},"modified":"2026-01-09T03:33:56","modified_gmt":"2026-01-09T10:33:56","slug":"%ea%b8%88%ec%9c%b5-%ec%84%9c%eb%b9%84%ec%8a%a4%ec%9d%98-%eb%b3%b4%ec%95%88-%ec%83%81%ed%83%9c","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/","title":{"rendered":"\uc5f0\uc900\uc758 \uc0ac\uac74 \uc815\ubcf4 \uacf5\uac1c \ud1b5\uc81c \uc2dc\ub3c4\ub294 \ud6a8\uacfc\uc801\uc778\uac00?"},"content":{"rendered":"<section class=\"bs-section bs-section-1031ba3af855de1580a8031f0de29293ce51d5d8 bs-section---default bs-section--common-header-with-form bs-section--common-marketo-form bs-section--common-form-sticky\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-md-7 col-sm-0   bs-column-3d962b00decd4fef444449c96db45c42599741ec bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>\ubcf4\uace0\uc11c<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">\uc5f0\uc900\uc758 \uc0ac\uac74 \uc815\ubcf4 \uacf5\uac1c \ud1b5\uc81c \uc2dc\ub3c4\ub294 \ud6a8\uacfc\uc801\uc778\uac00?<\/h1>\n\n\n<p><span style=\"font-weight: 400;\">\uc9c0\ub09c \ud55c \ud574 \ub3d9\uc548 \ubbfc\uac10\ud55c \ub370\uc774\ud130\uc640 \ud575\uc2ec \uc2dc\uc2a4\ud15c\uc744 \ubcf4\ud638\ud574\uc57c \ud560 \ud544\uc694\uc131\uc774 \ucee4\uc9c0\uba74\uc11c \uaddc\uc81c\uac00 \ube60\ub974\uac8c \ubcc0\ud654\ud588\uc2b5\ub2c8\ub2e4. \uc8fc\uc694 \ubcc0\ud654\ub294 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4. <\/span><a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-139\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">SEC\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc0ac\uace0 \uacf5\uac1c \uaddc\uce59<\/span><\/a><span style=\"font-weight: 400;\"> \uadf8\ub9ac\uace0 <\/span><a href=\"https:\/\/www.european-cyber-resilience-act.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">EU\uc758 \uc0ac\uc774\ubc84 \ubcf5\uc6d0\ub825 \ubc95\uc548,<\/span><\/a><span style=\"font-weight: 400;\"> \ucee4\ub125\ud2f0\ub4dc \uc81c\ud488\uc5d0 \ub300\ud55c \uc5c4\uaca9\ud55c \ubcf4\uc548 \uae30\uc900\uc744 \ubd80\uacfc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ud55c\ud3b8, AI \uacbd\uc7c1\uc774 \uc2ec\ud654\ub428\uc5d0 \ub530\ub77c \uc724\ub9ac\uc801 \uc0ac\uc6a9\uc744 \ubcf4\uc7a5\ud558\uae30 \uc704\ud55c \ub354\uc6b1 \ucca0\uc800\ud55c \uaddc\uc81c \uac10\ub3c5\uc774 \uc694\uad6c\ub418\uace0 \uc788\uc2b5\ub2c8\ub2e4.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc2a4\uc714\ub808\uc778\uc740 \ubbf8\uad6d\uacfc \uc601\uad6d\uc5d0\uc11c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc758\uc0ac \uacb0\uc815\uad8c\uc790 500\uba85\uc744 \ub300\uc0c1\uc73c\ub85c \uc124\ubb38 \uc870\uc0ac\ub97c \uc2e4\uc2dc\ud558\uc5ec \uc774\ub7ec\ud55c \uaddc\uc81c \ubcc0\ud654\uac00 \ubcf4\uc548 \uad00\ud589 \ubc0f \uaddc\uc815 \uc900\uc218 \uc804\ub7b5\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc744 \ud30c\uc545\ud588\uc2b5\ub2c8\ub2e4. \ubcf4\uace0\uc11c\ub97c \ud1b5\ud574 \uaddc\uc81c \ud658\uacbd\uc774 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc804\ub7b5, \uc6b0\uc120\uc21c\uc704 \ubc0f \uc608\uc0b0\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uc138\uc694.\u00a0<\/span><\/p>\n<\/div>\n\n\n\n<div class=\"bs-column  col-md-5 col-sm-0   bs-column-4e7708ec1047c5de435a1fcaa9bd912b51781ebd bs-column---default bs-column--form\">\n<div class=\"bs-div bs-div-9bea93ef98765147ecb6579716e4df158c8e6e71 bs-div---default bs-div--form-wrapper\"><div class=\"bs-div__inner\">\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1707\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"ko\"\/><\/form>\n<script>\n    var embeddedFormId = 'cda3a6fe6c745d07f8a5e5938651a0899de508b9';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1707';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1707\"><\/div>\n<!-- Incluing form response options -->\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">\uad00\uc2ec \uc788\uc744 \ub9cc\ud55c \ub2e4\ub978 \ucf58\ud150\uce20<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0b1ce76637f bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/videos\/regulations-vs-reality-video\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/YouTube-Thumbnail-1.png' class='img-fluid' alt='' title='\uc720\ud29c\ube0c \uc378\ub124\uc77c'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>\ub3d9\uc601\uc0c1<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>\uaddc\uc815\uacfc \ud604\uc2e4 \ube44\uad50 \uc601\uc0c1: \uc5f0\uc900\uc758 \uc0ac\uac74 \uacf5\uac1c \uaddc\uc815\uc740 \ud6a8\uacfc\uc801\uc778\uac00?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>\ub354 \uc77d\uc5b4\ubcf4\uae30<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0b1ce76858d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/solutions\/industries\/federal-government\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Federal-2.webp' class='img-fluid' alt='' title='\uc5f0\ubc29-2' loading=\"lazy\"  \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>\uc5f0\ubc29 \uc815\ubd80<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>\ub354 \uc77d\uc5b4\ubcf4\uae30<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0b1ce76aa2b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/questions-you-need-to-ask-when-evaluating-a-security-automation-vendor\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/QuestionsMasthead.png' class='img-fluid' alt='\ubcf4\uc548 \uc790\ub3d9\ud654 \uc194\ub8e8\uc158 \uacf5\uae09\uc5c5\uccb4\ub97c \ud3c9\uac00\ud560 \ub54c \ubc18\ub4dc\uc2dc \ubb3c\uc5b4\ubd10\uc57c \ud560 \uc9c8\ubb38\ub4e4' title='\uc9c8\ubb38 \ubaa9\ub85d'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>\ube14\ub85c\uadf8<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>AI \uc790\ub3d9\ud654 \uacf5\uae09\uc5c5\uccb4\ub97c \ud3c9\uac00\ud560 \ub54c \ubc18\ub4dc\uc2dc \ubb3c\uc5b4\ubd10\uc57c \ud560 \uc9c8\ubb38\ub4e4<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>\ub354 \uc77d\uc5b4\ubcf4\uae30<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\"><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>\uc810\uc810 \ub354 \ub2e4\uc591\ud574\uc9c0\ub294 \ub3c4\uc804 \uacfc\uc81c\uc5d0 \uc9c1\uba74\ud55c \uc870\uc9c1\ub4e4\uc740 \uc885\uc885 \uadf8 \ubcc0\ud654\uc5d0 \ubc1c\ub9de\ucdb0 \ub098\uac00\ub294 \ub370 \uc5b4\ub824\uc6c0\uc744 \uacaa\uc2b5\ub2c8\ub2e4. \uc2a4\uc714\ub808\uc778(Swimlane)\uacfc \ub514\uba58\uc154\ub110 \ub9ac\uc11c\uce58(Dimensional Research)\uac00 \uacf5\ub3d9\uc73c\ub85c \uc2e4\uc2dc\ud55c \uc774\ubc88 \uc124\ubb38\uc870\uc0ac\uc5d0\uc11c\ub294 \ubcf4\uc548 \uc804\ubb38\uac00\uc640 \uc784\uc6d0\ub4e4\uc774 \uc8fc\uc694 \uc774\uc288\uc5d0 \ub300\ud574 \uc5b4\ub5bb\uac8c \uc778\uc2dd\ud558\uace0 \uc788\ub294\uc9c0 \uc0b4\ud3b4\ubcf4\uc558\uc2b5\ub2c8\ub2e4.<\/p>","protected":false},"author":43,"featured_media":38446,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":38446,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"off","_relevanssi_hide_content":"off","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[92],"resource-topic":[133],"resource-industry":[93,94,100],"blog-category":[],"class_list":["post-38441","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-reports","resource-topic-research","resource-industry-automation","resource-industry-incident-response","resource-industry-orchestration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SEC and EU Regulations vs. Reality Report | Swimlane<\/title>\n<meta name=\"description\" content=\"Swimlane surveyed 500 cybersecurity decision-makers to understand how US and UK regulatory shifts impact security practices and compliance strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc0ac\uc774\ubc84\ubcf4\uc548-\uaddc\uc81c\uc758-\ud6a8\uacfc\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?\" \/>\n<meta property=\"og:description\" content=\"Swimlane surveyed 500 cybersecurity decision-makers to understand how US and UK regulatory shifts impact security practices and compliance strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc0ac\uc774\ubc84\ubcf4\uc548-\uaddc\uc81c\uc758-\ud6a8\uacfc\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T10:33:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-2.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/\",\"name\":\"SEC and EU Regulations vs. Reality Report | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Webpage-2.gif\",\"datePublished\":\"2024-05-21T15:38:39+00:00\",\"dateModified\":\"2026-01-09T10:33:56+00:00\",\"description\":\"Swimlane surveyed 500 cybersecurity decision-makers to understand how US and UK regulatory shifts impact security practices and compliance strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Webpage-2.gif\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Webpage-2.gif\",\"width\":1200,\"height\":630,\"caption\":\"Swimlane Turbine AI risk scoring interface visualizing automated threat prioritization and analytics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/cybersecurity-regulation-effectiveness\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SEC \ubc0f EU \uaddc\uc815\uacfc \ud604\uc2e4 \ube44\uad50 \ubcf4\uace0\uc11c | \uc2a4\uc714\ub808\uc778","description":"\uc2a4\uc714\ub808\uc778\uc740 \ubbf8\uad6d\uacfc \uc601\uad6d\uc758 \uaddc\uc81c \ubcc0\ud654\uac00 \ubcf4\uc548 \uad00\ud589 \ubc0f \uaddc\uc815 \uc900\uc218 \uc804\ub7b5\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc744 \ud30c\uc545\ud558\uae30 \uc704\ud574 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc758\uc0ac \uacb0\uc815\uad8c\uc790 500\uba85\uc744 \ub300\uc0c1\uc73c\ub85c \uc124\ubb38 \uc870\uc0ac\ub97c \uc2e4\uc2dc\ud588\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc0ac\uc774\ubc84\ubcf4\uc548-\uaddc\uc81c\uc758-\ud6a8\uacfc\/","og_locale":"ko_KR","og_type":"article","og_title":"Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?","og_description":"Swimlane surveyed 500 cybersecurity decision-makers to understand how US and UK regulatory shifts impact security practices and compliance strategies.","og_url":"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc0ac\uc774\ubc84\ubcf4\uc548-\uaddc\uc81c\uc758-\ud6a8\uacfc\/","og_site_name":"AI Security Automation","article_modified_time":"2026-01-09T10:33:56+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-2.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"1\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/","url":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/","name":"SEC \ubc0f EU \uaddc\uc815\uacfc \ud604\uc2e4 \ube44\uad50 \ubcf4\uace0\uc11c | \uc2a4\uc714\ub808\uc778","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-2.gif","datePublished":"2024-05-21T15:38:39+00:00","dateModified":"2026-01-09T10:33:56+00:00","description":"\uc2a4\uc714\ub808\uc778\uc740 \ubbf8\uad6d\uacfc \uc601\uad6d\uc758 \uaddc\uc81c \ubcc0\ud654\uac00 \ubcf4\uc548 \uad00\ud589 \ubc0f \uaddc\uc815 \uc900\uc218 \uc804\ub7b5\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc744 \ud30c\uc545\ud558\uae30 \uc704\ud574 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc758\uc0ac \uacb0\uc815\uad8c\uc790 500\uba85\uc744 \ub300\uc0c1\uc73c\ub85c \uc124\ubb38 \uc870\uc0ac\ub97c \uc2e4\uc2dc\ud588\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-2.gif","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-2.gif","width":1200,"height":630,"caption":"Swimlane Turbine AI risk scoring interface visualizing automated threat prioritization and analytics"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/cybersecurity-regulation-effectiveness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/38441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/38441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/38446"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=38441"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=38441"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=38441"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=38441"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=38441"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=38441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}