{"id":39737,"date":"2024-07-18T10:56:05","date_gmt":"2024-07-18T16:56:05","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=39737"},"modified":"2024-07-18T10:56:07","modified_gmt":"2024-07-18T16:56:07","slug":"sec-%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b7%9c%ec%a0%95%ec%9d%98-%ec%98%81%ed%96%a5","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/","title":{"rendered":"SEC \uc0ac\uc774\ubc84 \uaddc\uc815\uc774 \uae30\uc5c5 \uc704\ud5d8 \uad00\ub9ac\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Corporate Risk Management\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg 2240w, https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x-768x457.jpg 768w, https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x-1536x913.jpg 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x-2048x1218.jpg 2048w\" sizes=\"(max-width: 2240px) 100vw, 2240px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-07-18T10:56:05-06:00\">7\uc6d4 18, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Impact of SEC Cyber Rules on Corporate Risk Management<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Impact%20of%20SEC%20Cyber%20Rules%20on%20Corporate%20Risk%20Management').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsec-cyber-rules-impact%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=SEC%20Cyber%20Rules%20Impact%20on%20Corporate%20Risk%20Management%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsec-cyber-rules-impact%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsec-cyber-rules-impact%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsec-cyber-rules-impact%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>If you work in <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">cybersecurity<\/a>, follow regulatory changes, or are part of the industry, you&#8217;ve likely been closely monitoring recent regulatory developments. The <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2023-139\">SEC&#8217;s cybersecurity incident disclosure rules<\/a> and the EU&#8217;s <a href=\"https:\/\/www.european-cyber-resilience-act.com\/\">Cyber Resilience Act (CRA)<\/a>, have pushed organizations to reevaluate and reshape their strategies. Now, with the rapid advancement of AI, it\u2019s time for responsible use and stricter regulatory oversight.&nbsp;<\/p>\n\n\n\n<p>While the secure development and use of <a href=\"https:\/\/swimlane.com\/chatgpt-openai-security-risks-considerations\/\">AI<\/a> is not regulated yet, one notable cybersecurity regulation from last year was the SEC&#8217;s new rules on cybersecurity risk management and incident disclosure. It now requires public companies to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Disclose significant cyber incidents to the SEC within <strong>four business days<\/strong>.<\/li>\n\n\n\n<li>Provide detailed information about their board&#8217;s oversight of cybersecurity risks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>To better understand the impact of these changes, we partnered with <a href=\"https:\/\/sapioresearch.com\/\">Sapio Research<\/a> to survey 500 cybersecurity decision-makers from large enterprises in the US and UK. Download the full report: <a href=\"https:\/\/swimlane.com\/resources\/reports\/cybersecurity-regulation-effectiveness\">2024 Regulation vs. Reality: Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Cost of Neglecting Cybersecurity Regulations&nbsp;<\/h2>\n\n\n\n<p>As the Chief Information Security Officer (CISO) of Swimlane, I\u2019ve seen firsthand how regulatory changes are reshaping our industry, and what happens if you neglect them. For example, high-profile incidents like the ransomware attack on <a href=\"https:\/\/www.digitaljournal.com\/tech-science\/change-healthcare-hit-by-new-cyberattack\/article\">Change Healthcare<\/a>, have continually decreased public trust.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"523\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-07-18-at-1.51.34\u202fAM-1024x523.png\" alt=\"\" class=\"wp-image-39738\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-07-18-at-1.51.34\u202fAM-1024x523.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-07-18-at-1.51.34\u202fAM-300x153.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-07-18-at-1.51.34\u202fAM-768x392.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-07-18-at-1.51.34\u202fAM-1536x784.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-07-18-at-1.51.34\u202fAM-2048x1045.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The Change Healthcare ransomware attack is one of several incidents this year that highlights the severe repercussions organizations can face if they neglect risk management. This includes:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reputational damage&nbsp;<\/li>\n\n\n\n<li>Financial losses<\/li>\n\n\n\n<li>Business Downtime&nbsp;<\/li>\n\n\n\n<li>Sensitive data loss<\/li>\n<\/ul>\n\n\n\n<p>Look at that number again\u2026<strong> $1.6B <\/strong>could be the total financial impact on Change Healthcare.<strong> <\/strong>In my recent blog, <a href=\"https:\/\/swimlane.com\/blog\/ciso-guide-to-sec-compliance\/\">The \u201cMateriality\u201d Mystery: A CISO\u2019s Guide to SEC Compliance<\/a>, I highlighted the importance of understanding the definition of materiality, the risks, and the potential financial impact if you don\u2019t. Some financial impacts include legal fees, regulatory fines, remediation costs, and customer notifications. Another major issue under the SEC\u2019s cybersecurity regulations is the unclear definition of \u201cmateriality\u201d. Without clear guidance, organizations must be proactive to define what\u2019s a \u201cmaterial\u201d cybersecurity incident.&nbsp;<\/p>\n\n\n\n<p>With this in mind, it\u2019s safe to say the recent heightened regulatory scrutiny is crucial to rebuilding trust and ensuring companies prioritize cybersecurity.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3 Proactive Cybersecurity Tips to Address Regulations<\/h2>\n\n\n\n<p>Meeting recent regulatory requirements involves numerous \u201cto-do\u2019s\u201d and <a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a> tactics. However, it\u2019s important to distinguish between simply meeting compliance and truly building a proactive risk management strategy. Doing the bare minimum and settling for <a href=\"https:\/\/swimlane.com\/blog\/five-signs-youre-using-good-automation\/\">\u201cgood enough\u201d security<\/a> won\u2019t protect your organization. Don&#8217;t just take my word for it\u2014look at the numerous companies that suffered from <a href=\"https:\/\/www.techradar.com\/pro\/top-data-breaches-and-cyber-attacks-in-2024\">data breaches and cyber attacks in 2024 <\/a>alone.<\/p>\n\n\n\n<p>Here are three ways you can be proactive with risk management strategies:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Implement Company-Wide Cybersecurity Expertise&nbsp;<\/strong><\/li>\n<\/ol>\n\n\n\n<p>The \u201ccheck-the-box\u201d approach falls short time and time again. As leaders, we must commit from the top down to cybersecurity. This commitment is essential for mitigating risks and preventing cyber attacks.<\/p>\n\n\n\n<p>This starts with board-level cybersecurity expertise. Our recent report highlights:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>81% <\/strong>said that all companies with a Board of Directors should have at least one member with cybersecurity expertise.<\/li>\n\n\n\n<li>Although, <strong>only 55% <\/strong>of respondents said they have one board member with cybersecurity expertise.<\/li>\n<\/ul>\n\n\n\n<p>Investing in the right cybersecurity tools and training for your team will significantly enhance your overall processes. This proactive approach ensures that everyone, from entry-level employees to top executives, understands the importance of cybersecurity and is prepared to respond effectively to incidents with the correct tools in place. Doing so will bolster defenses, improve risk management, streamline <a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\">incident response<\/a>, and create a more resilient organization.<\/p>\n\n\n\n<p>Keep in mind, governance and compliance does not equal risk reduction or improved cybersecurity. However, security posture, resilience, technical controls, and Zero Trust does. You must master the basics first.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Shift Focus in Cyber Event Disclosure<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Organizations need to shift focus when disclosing cyber events to regulators and the public eye. It\u2019s important to move beyond the technical aspects of a cyber event and evaluate broader financial, operational, and reputational risks for accurate reportability. Our report states:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Only 25% of respondents report security incidents within 3-4 business days.<\/li>\n\n\n\n<li>And 43% have faced longer reporting times over the past year.<\/li>\n<\/ul>\n\n\n\n<p>This highlights the challenge many organizations have in maintaining quick and streamlined processes. However, utilizing a security automation platform, like Swimlane Turbine, can help remediate this problem.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Automate Incident Response<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Leverage playbooks to automate <a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\">incident response<\/a> processes. This streamlined approach facilitates quicker decision-making, empowering organizations to respond swiftly to cybersecurity incidents and promptly mitigate risks. At Swimlane, we leverage our own <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> platform to build<a href=\"https:\/\/swimlane.com\/blog\/incident-response-playbook\/\"> incident response playbooks<\/a>. This results in simpler processes that&nbsp; allow me to make informed decisions and report critical incident response details more clearly to the leadership team.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Balancing Human Expertise and AI-Enhanced Automation<\/h2>\n\n\n\n<p>When you prioritize a balance between human expertise and AI-enhanced automation tools, you alleviate operational strain. It\u2019s time to automate routine tasks like threat detection and log analysis to free up security professionals for critical, judgment-based decisions. This boosts efficiency and effectiveness, ultimately making decision-makers more confident in their ability to stay compliant.&nbsp;<\/p>\n\n\n\n<p>As your organization adapts to new regulations and cybersecurity challenges I hope that these insights help guide you toward resilience and proactive risk management. Meanwhile, I hope all my fellow security leaders connect with me on <a href=\"https:\/\/www.linkedin.com\/in\/michael-lyborg\/\">LinkedIn<\/a> to further proactive conversations.&nbsp;<\/p>\n\n\n\n<div class=\"bs-div bs-div-1ab8ac16a981df8d284605d7b5244b2d4116af68 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-1ab8ac16a981df8d284605d7b5244b2d4116af68 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-3.gif' class='img-fluid'   alt='roi report swimlane security automation' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage-3.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-are-the-fed-s-attempts-at-wrangling-incident-disclosure-effective\"><strong>Are the Fed\u2019s Attempts at Wrangling Incident Disclosure Effective?<\/strong><\/h3>\n\n\n\n<p>Download the full research report now to understand how these regulatory shifts are impacting security practices and compliance strategies. Read the report to learn more about how the regulatory environment is impacting cybersecurity strategies, priorities, and budgets.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-a381802cb155934408b1ffb7f30eb8fd44a88e75\"><style>.bs-pro-button-p-btn-a381802cb155934408b1ffb7f30eb8fd44a88e75 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/cybersecurity-regulation-effectiveness\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/research\/'><span class='tag-content'>Research<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e788aeceab4 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/top-soc-analyst-challenges\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>11\uc6d4 18, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Top SOC Analyst Challenges<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e788aecff6e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/incident-response-plans\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 20, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automating cybersecurity incident response plans<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e788aed1249 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/nist-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\uc6d4 31, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Improving incident response with the NIST Cybersecurity Framework and security automation and orchestration (SAO)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":39762,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":39765,"learn_more_label":"","image_alt_text":"SEC Cyber Rules Impact on Corporate Risk Management | Swimlane","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[132],"resource-industry":[],"blog-category":[77],"class_list":["post-39737","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs","resource-topic-platform","blog-category-platform"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SEC Cyber Rules Impact on Corporate Risk Management | Swimlane<\/title>\n<meta name=\"description\" content=\"SEC Cyber Rules have pushed organizations to reevaluate and reshape strategies. Learn from Swimlanes CISO the SEC Cyber rules impact on corporate risk management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sec-\uc0ac\uc774\ubc84-\uaddc\uc815\uc758-\uc601\ud5a5\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SEC Cyber Rules Impact on Corporate Risk Management | Swimlane\" \/>\n<meta property=\"og:description\" content=\"SEC Cyber Rules have pushed organizations to reevaluate and reshape strategies. Learn from Swimlanes CISO the SEC Cyber rules impact on corporate risk management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sec-\uc0ac\uc774\ubc84-\uaddc\uc815\uc758-\uc601\ud5a5\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-18T16:56:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-SocialTile@2x-1-1024x538.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SEC Cyber Rules Impact on Corporate Risk Management | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"SEC Cyber Rules have pushed organizations to reevaluate and reshape strategies. Learn from Swimlanes CISO the SEC Cyber rules impact on corporate risk management.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/\",\"name\":\"SEC Cyber Rules Impact on Corporate Risk Management | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg\",\"datePublished\":\"2024-07-18T16:56:05+00:00\",\"dateModified\":\"2024-07-18T16:56:07+00:00\",\"description\":\"SEC Cyber Rules have pushed organizations to reevaluate and reshape strategies. Learn from Swimlanes CISO the SEC Cyber rules impact on corporate risk management.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg\",\"width\":2240,\"height\":1332,\"caption\":\"Corporate Risk Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Impact of SEC Cyber Rules on Corporate Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SEC \uc0ac\uc774\ubc84 \uaddc\uc815\uc774 \uae30\uc5c5 \uc704\ud5d8 \uad00\ub9ac\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5 | \uc2a4\uc714\ub808\uc778","description":"SEC \uc0ac\uc774\ubc84 \ubcf4\uc548 \uaddc\uc815\uc73c\ub85c \uc778\ud574 \uae30\uc5c5\ub4e4\uc740 \uc804\ub7b5\uc744 \uc7ac\ud3c9\uac00\ud558\uace0 \uc7ac\uad6c\uc131\ud574\uc57c \ud588\uc2b5\ub2c8\ub2e4. \uc2a4\uc714\ub808\uc778\uc988\uc758 CISO\ub85c\ubd80\ud130 SEC \uc0ac\uc774\ubc84 \ubcf4\uc548 \uaddc\uc815\uc774 \uae30\uc5c5 \uc704\ud5d8 \uad00\ub9ac\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sec-\uc0ac\uc774\ubc84-\uaddc\uc815\uc758-\uc601\ud5a5\/","og_locale":"ko_KR","og_type":"article","og_title":"SEC Cyber Rules Impact on Corporate Risk Management | Swimlane","og_description":"SEC Cyber Rules have pushed organizations to reevaluate and reshape strategies. Learn from Swimlanes CISO the SEC Cyber rules impact on corporate risk management.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sec-\uc0ac\uc774\ubc84-\uaddc\uc815\uc758-\uc601\ud5a5\/","og_site_name":"AI Security Automation","article_modified_time":"2024-07-18T16:56:07+00:00","og_image":[{"width":1024,"height":538,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-SocialTile@2x-1-1024x538.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"SEC Cyber Rules Impact on Corporate Risk Management | Swimlane","twitter_description":"SEC Cyber Rules have pushed organizations to reevaluate and reshape strategies. Learn from Swimlanes CISO the SEC Cyber rules impact on corporate risk management.","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/","url":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/","name":"SEC \uc0ac\uc774\ubc84 \uaddc\uc815\uc774 \uae30\uc5c5 \uc704\ud5d8 \uad00\ub9ac\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5 | \uc2a4\uc714\ub808\uc778","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg","datePublished":"2024-07-18T16:56:05+00:00","dateModified":"2024-07-18T16:56:07+00:00","description":"SEC \uc0ac\uc774\ubc84 \ubcf4\uc548 \uaddc\uc815\uc73c\ub85c \uc778\ud574 \uae30\uc5c5\ub4e4\uc740 \uc804\ub7b5\uc744 \uc7ac\ud3c9\uac00\ud558\uace0 \uc7ac\uad6c\uc131\ud574\uc57c \ud588\uc2b5\ub2c8\ub2e4. \uc2a4\uc714\ub808\uc778\uc988\uc758 CISO\ub85c\ubd80\ud130 SEC \uc0ac\uc774\ubc84 \ubcf4\uc548 \uaddc\uc815\uc774 \uae30\uc5c5 \uc704\ud5d8 \uad00\ub9ac\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc5d0 \ub300\ud574 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Corporate-Risk-Management-Masthead@2x.jpg","width":2240,"height":1332,"caption":"Corporate Risk Management"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/sec-cyber-rules-impact\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Impact of SEC Cyber Rules on Corporate Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/39737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/39737\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/39762"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=39737"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=39737"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=39737"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=39737"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=39737"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=39737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}