{"id":43495,"date":"2024-12-05T14:00:46","date_gmt":"2024-12-05T21:00:46","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=43495"},"modified":"2025-12-08T23:30:00","modified_gmt":"2025-12-09T06:30:00","slug":"ai-%eb%b3%b4%ec%95%88-%ea%b1%b0%eb%b2%84%eb%84%8c%ec%8a%a4%ec%97%90-%eb%8c%80%ed%95%9c-%ed%86%b5%ec%b0%b0%eb%a0%a5","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/","title":{"rendered":"\ubcf4\uc548 \uc804\ubb38\uac00\ub4e4\uc774 \uc804\ud558\ub294 AI \ubcf4\uc548 \uac70\ubc84\ub10c\uc2a4\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"609\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-5-1024x609.png\" alt=\"AI Security Governance Insights from Security Leaders\n\n\" class=\"wp-image-43498\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-5-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-5-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-5-768x457.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-5-1536x913.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-5-2048x1218.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-12-05T14:00:46-07:00\">12\uc6d4 5, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">AI Security Governance Insights from Security Leaders<\/h1>\n\n\n<div class=\"bs-div bs-div-1c02a909fcd723a1ec953772586290c0df1291b1 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('AI%20Security%20Governance%20Insights%20from%20Security%20Leaders').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-security-governance-insights%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=AI%20Security%20Governance%20Insights%20from%20Security%20Leaders%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-security-governance-insights%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-security-governance-insights%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-security-governance-insights%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>Artificial Intelligence (AI) is rapidly transforming the <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">cybersecurity<\/a> landscape, offering innovative solutions to complex challenges. However, this innovation raises critical questions:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How should we approach AI governance to ensure responsible use and minimize harm?&nbsp;<\/li>\n\n\n\n<li>Is AI making it impossible to balance innovation and confidentiality?<\/li>\n<\/ul>\n\n\n\n<p>At Swimlane, we\u2019re committed to driving cutting-edge, forward-thinking innovation that\u2019s both secure and impactful for your organization. We pair this with transparency to help the organizations cut through the noise and make informed decisions. <\/p>\n\n\n\n<p>We recently partnered with <a href=\"https:\/\/sapioresearch.com\/\">Sapio Research<\/a> to survey 500 cybersecurity leaders across the US and the UK to explore the ongoing debate around AI governance. The findings reveal a split in opinion on who should be responsible for overseeing AI, highlighting key perspectives on government and vendor accountability.<\/p>\n\n\n\n<p>While our research provides valuable insights, there\u2019s something uniquely powerful about the unfiltered perspectives of past and present chief information security officers (CISOs). In a recent webinar, <a href=\"https:\/\/swimlane.com\/resources\/webinar-ai-reality-check\/\"><em>AI Reality Check: CISOs Unpack its Role in Cybersecurity<\/em><\/a>, TAG Cyber CEO and former AT&amp;T CISO <a href=\"https:\/\/www.linkedin.com\/in\/edward-amoroso\/\">Ed Amoroso<\/a> joined Swimlane CISO <a href=\"https:\/\/www.linkedin.com\/in\/michael-lyborg\/\">Michael Lyborg<\/a> for an in-depth discussion on the research findings and the state of AI in cybersecurity.<\/p>\n\n\n\n<p>This blog is the first in a three-part series summarizing both the research data and the expert perspectives shared during the webinar. Continue reading to explore the key findings, and download the full report for a deeper dive: <a href=\"https:\/\/swimlane.com\/resources\/reports\/ai-cybersecurity-research\/\"><em>Is AI Living Up to Its Cybersecurity Promises?<\/em><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key AI Research Findings<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The Policy and Practice Paradox&nbsp;<\/h3>\n\n\n\n<p>While 70% of organizations have protocols in place for data sharing with public Large Language Models (LLMs), 74% are aware of employees inputting sensitive data into these models. This indicates a gap between policy and practice.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-2.jpg\" alt=\"While 70% of organizations have protocols in place for data sharing with public Large Language Models (LLMs), 74% are aware of employees inputting sensitive data into these models. This indicates a gap between policy and practice.\n\" class=\"wp-image-43499\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-2.jpg 600w, https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-2-300x200.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">The AI Hype Cycle: Fatigue and Adoption&nbsp;<\/h3>\n\n\n\n<p>Amid growing AI fatigue and skepticism, the demand for AI and machine learning (ML) expertise continues to shape workforce priorities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>76% of respondents believe the current <a href=\"https:\/\/swimlane.com\/platform\/ai\/\">AI<\/a> market is saturated with hype<\/li>\n\n\n\n<li>55% of respondents expressed fatigue from the constant focus on <a href=\"https:\/\/swimlane.com\/platform\/ai\/\">AI<\/a><\/li>\n<\/ul>\n\n\n\n<p>However, a counterpoint is 85% of respondents who acknowledge that AI and ML experience influences their hiring decisions. This suggests that despite the hype, AI skills are increasingly valued in the workforce.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-4.jpg\" alt=\"76% of respondents believe the current AI market is saturated with hype\n\n55% of respondents expressed fatigue from the constant focus on AI\" class=\"wp-image-43500\" style=\"width:599px;height:auto\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-4.jpg 600w, https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-4-300x200.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>Is AI just overhyped, or is it truly driving growth? While the question remains up for debate, our recent webinar revealed insights from current and former CISOs and delved deep into this topic.&nbsp;<\/p>\n\n\n\n<p>In <a href=\"https:\/\/swimlane.com\/resources\/webinar-ai-reality-check\/\">AI Reality Check: CISOs Unpack Its Role in Cybersecurity<\/a>, Swimlane CISO Mike Lyborg and Tag Cyber CEO Ed Amoroso agreed that AI provides tangible solutions today. However, they emphasized that vendors who oversaturate their messaging with AI, without demonstrating real-world use cases, only contribute to the noise, making it harder for security leaders and buyers to cut through.&nbsp;<\/p>\n\n\n\n<p>If you&#8217;re finding it difficult to navigate the overwhelming jargon of the AI industry, this blog on the <a href=\"https:\/\/swimlane.com\/blog\/8-questions-ai-vendors\/\">8 essential questions to ask AI security vendors <\/a>will help you cut through the noise and make more informed decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The AI Governance Debate&nbsp;<\/h2>\n\n\n\n<p>Our research report also explores the key issue of AI governance, highlighting a divided perspective:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Limited Government Role:<\/strong> Only 28% of respondents believe the government should have primary responsibility for AI governance.<\/li>\n\n\n\n<li><strong>Vendor Responsibility:<\/strong> Nearly half (46%) believe the companies developing AI should be primarily responsible for the consequences when AI systems cause harm.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-3.jpg\" alt=\"Limited Government Role: Only 28% of respondents believe the government should have primary responsibility for AI governance.\n\nVendor Responsibility: Nearly half (46%) believe the companies developing AI should be primarily responsible for the consequences when AI systems cause harm.\" class=\"wp-image-43501\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-3.jpg 600w, https:\/\/swimlane.com\/wp-content\/uploads\/AI-Report-3-300x200.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>To make sense of this divided landscape, we asked our CISO experts for their real-world perspectives. Here\u2019s a recap of what they had to say.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Organic Governance:<\/strong> Both Amoroso and Lyborg emphasize the need for organic AI governance that evolves alongside the technology itself. They caution against heavy-handed government intervention.<\/li>\n\n\n\n<li><strong>Individual Responsibility:<\/strong> While acknowledging the role of vendors and organizations, the CISO\u2019s stressed the importance of individual responsibility in using AI tools ethically and responsibly.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Tips and Takeaways for CISOs in the Age of AI&nbsp;<\/h2>\n\n\n\n<p>Both the research data and real-world expert perspectives highlight the need for a balanced approach to AI in cybersecurity. While AI offers immense potential for innovation, organizations must proactively address the risks to confidentiality. This involves:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Clear Policies and Training:<\/strong> Establishing and enforcing clear policies around AI use, coupled with comprehensive employee training, is essential.<\/li>\n\n\n\n<li><strong>Focus on Value:<\/strong> Cutting through the AI hype and focusing on solutions that deliver real value is crucial.<\/li>\n\n\n\n<li><strong>Collaborative Governance:<\/strong> A collaborative approach to governance, involving government agencies, vendors, and individual users, is necessary to navigate the complex landscape of AI and ensure its responsible and ethical use.<\/li>\n<\/ul>\n\n\n\n<p>AI is not a panacea for all <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">cybersecurity challenges<\/a>. However, with thoughtful governance and a focus on balancing innovation and confidentiality, it can be a powerful tool for enhancing security postures.Remember, the key is to harness the power of AI while mitigating its risks, ensuring that innovation doesn&#8217;t come at the cost of confidentiality.<\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-52256ceb4bb0abd9163bc62ba2518af74b6fff30 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-52256ceb4bb0abd9163bc62ba2518af74b6fff30 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-10-02-at-3.28.52\u202fPM.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-tag-cyber-tech-report-using-ai-for-secops-automation\">TAG Cyber Tech Report: Using AI for SecOps Automation<\/h3>\n\n\n\n<p>The analyst report begins with a brief overview of the SOAR market, and the story of how Swimlane transformed from a SOAR to AI-enhanced security automation platform. To further understand Swimlane\u2019s use of AI, read the full report. <\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-debfce177532b6b46bfad304b2fd60eab2a1b3f2\"><style>.bs-pro-button-p-btn-debfce177532b6b46bfad304b2fd60eab2a1b3f2 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/tag-ai-secops-automation\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Read Full Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/ai\/'><span class='tag-content'>AI<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d65ce41074a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/8-questions-ai-vendors\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\uc6d4 14, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>8 Must-Ask Questions for AI Security Vendors\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d65ce411d1d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/videos\/black-hat-ai-sec-ops\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 4, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Black Hat Customer Panel: Let&#8217;s get real about where AI can help SecOps<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d65ce41326d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/ai-cybersecurity-compliance\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>5\uc6d4 30, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>AI, Cybersecurity and Compliance: A Data-Driven Perspective<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d65ce414485 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/case-studies\/cyberwinter-studios\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 26, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How CyberWinter Studios Transforms Air Force Operations for Peak Efficiency<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":43502,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":43502,"learn_more_label":"","image_alt_text":"AI Security Governance Insights from Security Leaders","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[202],"resource-type":[67],"resource-topic":[215],"resource-industry":[93],"blog-category":[],"class_list":["post-43495","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-ai","resource-type-blogs","resource-topic-ai","resource-industry-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI Security Governance Insights from Security Leaders | Swimlane<\/title>\n<meta name=\"description\" content=\"Discover insights from 500 cybersecurity leaders on AI security governance. Explore AI&#039;s impact on cybersecurity &amp; navigating AI hype.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\ubcf4\uc548-\uac70\ubc84\ub10c\uc2a4\uc5d0-\ub300\ud55c-\ud1b5\ucc30\ub825\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Security Governance Insights from Security Leaders | Swimlane\" \/>\n<meta property=\"og:description\" content=\"Explore key insights on AI security governance from 500 cybersecurity leaders. Learn about AI\u2019s role in cybersecurity, vendor and government responsibility, and how to navigate the AI hype. Download the full report for more findings.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\ubcf4\uc548-\uac70\ubc84\ub10c\uc2a4\uc5d0-\ub300\ud55c-\ud1b5\ucc30\ub825\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T06:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-3-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"AI Security Governance Insights from Security Leaders | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"Explore key insights on AI security governance from 500 cybersecurity leaders. Learn about AI\u2019s role in cybersecurity, vendor and government responsibility, and how to navigate the AI hype. Download the full report for more findings.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-3.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/\",\"name\":\"AI Security Governance Insights from Security Leaders | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/FeaturedImage-3.png\",\"datePublished\":\"2024-12-05T21:00:46+00:00\",\"dateModified\":\"2025-12-09T06:30:00+00:00\",\"description\":\"Discover insights from 500 cybersecurity leaders on AI security governance. Explore AI's impact on cybersecurity & navigating AI hype.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/FeaturedImage-3.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/FeaturedImage-3.png\",\"width\":2340,\"height\":752,\"caption\":\"AI Security Governance Insights from Security Leaders\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Security Governance Insights from Security Leaders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI \ubcf4\uc548 \uac70\ubc84\ub10c\uc2a4\uc5d0 \ub300\ud55c \ubcf4\uc548 \ub9ac\ub354\ub4e4\uc758 \ud1b5\ucc30\ub825 | \uc2a4\uc714\ub808\uc778","description":"500\uba85\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ub9ac\ub354\ub4e4\uc774 \uc81c\uc2dc\ud558\ub294 AI \ubcf4\uc548 \uac70\ubc84\ub10c\uc2a4\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825\uc744 \ud655\uc778\ud574 \ubcf4\uc138\uc694. AI\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uacfc AI \uacfc\ub300\uad11\uace0\uc5d0 \ub300\ud55c \ub300\uc751 \ubc29\uc548\uc744 \ubaa8\uc0c9\ud574 \ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\ubcf4\uc548-\uac70\ubc84\ub10c\uc2a4\uc5d0-\ub300\ud55c-\ud1b5\ucc30\ub825\/","og_locale":"ko_KR","og_type":"article","og_title":"AI Security Governance Insights from Security Leaders | Swimlane","og_description":"Explore key insights on AI security governance from 500 cybersecurity leaders. Learn about AI\u2019s role in cybersecurity, vendor and government responsibility, and how to navigate the AI hype. Download the full report for more findings.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\ubcf4\uc548-\uac70\ubc84\ub10c\uc2a4\uc5d0-\ub300\ud55c-\ud1b5\ucc30\ub825\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-09T06:30:00+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-3-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"AI Security Governance Insights from Security Leaders | Swimlane","twitter_description":"Explore key insights on AI security governance from 500 cybersecurity leaders. Learn about AI\u2019s role in cybersecurity, vendor and government responsibility, and how to navigate the AI hype. Download the full report for more findings.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-3.png","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/","url":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/","name":"AI \ubcf4\uc548 \uac70\ubc84\ub10c\uc2a4\uc5d0 \ub300\ud55c \ubcf4\uc548 \ub9ac\ub354\ub4e4\uc758 \ud1b5\ucc30\ub825 | \uc2a4\uc714\ub808\uc778","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/FeaturedImage-3.png","datePublished":"2024-12-05T21:00:46+00:00","dateModified":"2025-12-09T06:30:00+00:00","description":"500\uba85\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ub9ac\ub354\ub4e4\uc774 \uc81c\uc2dc\ud558\ub294 AI \ubcf4\uc548 \uac70\ubc84\ub10c\uc2a4\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825\uc744 \ud655\uc778\ud574 \ubcf4\uc138\uc694. AI\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uacfc AI \uacfc\ub300\uad11\uace0\uc5d0 \ub300\ud55c \ub300\uc751 \ubc29\uc548\uc744 \ubaa8\uc0c9\ud574 \ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/FeaturedImage-3.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/FeaturedImage-3.png","width":2340,"height":752,"caption":"AI Security Governance Insights from Security Leaders"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/ai-security-governance-insights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"AI Security Governance Insights from Security Leaders"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/43495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/43495\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/43502"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=43495"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=43495"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=43495"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=43495"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=43495"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=43495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}