{"id":50313,"date":"2025-09-04T08:00:00","date_gmt":"2025-09-04T14:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=50313"},"modified":"2025-12-17T00:28:46","modified_gmt":"2025-12-17T07:28:46","slug":"ciso-%ea%b0%80%ec%9d%b4%eb%93%9c-ai-%eb%b3%b4%ec%95%88-%ec%98%81%ed%96%a5-%eb%b3%b4%ea%b3%a0%ec%84%9c","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/","title":{"rendered":"AI\uac00 \ubcf4\uc548\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc5d0 \ub300\ud55c CISO \uac00\uc774\ub4dc: SANS \ubcf4\uace0\uc11c \uc694\uc57d"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Swimlane and SANS report covers on AI\u2019s impact on cybersecurity three years later\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-09-04T08:00:00-06:00\">9\uc6d4 4, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">A CISOs Guide to Navigate AI&#8217;s Security Impact: SANS Report Summary<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('A%20CISOs%20Guide%20to%20Navigate%20AI%27s%20Security%20Impact%3A%20SANS%20Report%20Summary').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fciso-guide-ai-security-impact-sans-report%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=CISO%20Guide%3A%20AI%E2%80%99s%20Security%20Impact%20%7C%20SANS%202025%20Report&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fciso-guide-ai-security-impact-sans-report%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fciso-guide-ai-security-impact-sans-report%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fciso-guide-ai-security-impact-sans-report%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-a-cisos-guide-to-navigate-ai-s-security-impact-sans-report-summary-nbsp\">A CISOs Guide to Navigate AI&#8217;s Security Impact: SANS Report Summary&nbsp;<\/h2>\n\n\n\n<p>Artificial intelligence is no longer a future concept. It\u2019s no longer a matter of <em>when <\/em>we will embrace AI, but rather security leaders should be asking themselves <em>how <\/em>are we going to do it responsibly.&nbsp;<\/p>\n\n\n\n<p>To help you understand and strategically apply AI within your Security Operations Center (SOC), the SANS Institute conducted a comprehensive survey. This report, &#8220;<a href=\"https:\/\/swimlane.com\/resources\/reports\/sans-ai-security-survey\/\">SANS 2025 AI Survey: Measuring AI\u2019s Impact on Security Three Years Later<\/a>,&#8221; authored by Ahmed Abugharbia and Brandon Evans, provides critical insights into how organizations are currently using AI, the challenges they face, and what the future holds for security professionals.<\/p>\n\n\n\n<p>This summary highlights key findings from the SANS report, offering a clear view of the current state and future trajectory of AI in cybersecurity.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-7425707bf1dd58e88ffad767fe4e7d2812d96adb\"><style>.bs-pro-button-p-btn-7425707bf1dd58e88ffad767fe4e7d2812d96adb .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/sans-ai-security-survey\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Get SANS Report <\/a><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">Where AI Stands in Cybersecurity Today<\/h2>\n\n\n\n<p>The SANS survey reveals a significant gap between awareness and robust implementation of AI in security. While half of the surveyed organizations currently use AI for cybersecurity tasks, and a staggering 100% plan to incorporate generative AI (GenAI) within the next year, widespread adoption for critical functions remains limited. Only 50.3% of respondents actively utilize GenAI for security purposes.<\/p>\n\n\n\n<p>Incident response teams show a significant interest in AI, with 71.2% believing that AI can enhance existing tools such as SIEM, SOAR, and EDR. However, only a third of organizations plan to use AI for incident investigation in the future. Currently, the primary applications of AI focus on supporting functions, such as alert enrichment, rather than autonomous action.&nbsp;<\/p>\n\n\n\n<p>When it comes to autonomous SOC actions, the current levels of adoption suggest more about the industry&#8217;s comfort and trust in the emerging technology rather than indicating limitations with the technology itself. To overcome this and drive efficiencies, cybersecurity leaders should consider how to utilize existing technology investments, such as rule-based automation, to serve as guardrails that both enable and safeguard AI.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Guide to Understanding AI Cybersecurity Challenges&nbsp;<\/h2>\n\n\n\n<p>The report illuminates several pressing challenges and concerns that security leaders must address. A major pain point for analysts is the overwhelming number of false positives generated by AI systems. Many believe this issue stems from stale data within the models.<\/p>\n\n\n\n<p>Despite the limited adoption of AI for defense, security teams are highly concerned about emerging AI-powered threats, specifically highly personalized social engineering and deepfakes. Concerns also extend to attackers using AI to accelerate vulnerability discovery and evade detection.<\/p>\n\n\n\n<p>Organizations also worry about the security of AI platforms themselves. Many leaders are concerned that employees might pass sensitive data to GenAI platforms, leading to leaks. To take this fear a step further, there is concern that attackers could manipulate training data, resulting in detrimental prompt responses. These concerns underscore the critical need for secure, enterprise-grade AI solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It\u2019s Time for an AI Governance and Workforce Evolution<\/h2>\n\n\n\n<p>The SANS report highlights a concerning lack of security team involvement in governing GenAI. Many cybersecurity professionals believe they should play a role in enterprise-wide AI governance, but very few organizations have a formal AI risk management program in place. This points to a gap between recognizing the importance of governance and actively implementing it.<\/p>\n\n\n\n<p>The impact of AI on the cybersecurity workforce is also significant. Over half of organizations report that AI has affected their security team&#8217;s training requirements. A majority emphasizes the need for more specialized AI\/cybersecurity courses, as well as continuous learning, to keep pace with the evolving AI technologies.<\/p>\n\n\n\n<p>Despite these shifts, most respondents remain optimistic that AI will not eliminate their jobs, anticipating a growing demand for professionals with expertise in AI and cybersecurity over the next three years. They believe AI will automate tedious tasks, shifting roles rather than replacing human jobs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Key to Predictable AI for SOC Teams&nbsp;<\/h2>\n\n\n\n<p>At Swimlane, we recognize that the future of AI in cybersecurity is not just about its capabilities, but also about trust, enablement, and the ability to scale within budget and under scrutiny.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> is an agentic AI automation platform. It integrates with all of your existing security tools, enabling seamless, but selective, data sharing and coordinated incident response efforts. Our core strength is unifying and orchestrating signals from across your environment, seamlessly aggregating, correlating, and enriching data with the full depth of your enterprise and technology stack.<\/p>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/platform\/ai\/\">Hero AI<\/a>, our generative and agentic AI feature set, seamlessly interacts with selected data and playbook actions throughout the Turbine platform. By combining AI and classic automation in this manner, the predictability of deterministic automation acts as guardrails for predictable AI adoption.\u00a0<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-a93f6d0e815dcbe30b6f977066417f54497fd133\"><style>.bs-pro-button-p-btn-a93f6d0e815dcbe30b6f977066417f54497fd133 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/sans-turbine-platform-review\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">SANS Product Review of Swimlane Turbine <\/a><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">Embracing AI, a Strategic Imperative for Cybersecurity Leaders&nbsp;<\/h2>\n\n\n\n<p>The SANS survey clearly indicates that AI is here to stay and will have a profound impact on cybersecurity. For security leaders and CISOs, understanding these shifts and adapting your strategy is crucial. Embrace AI not as a replacement for human expertise, but as a powerful tool that enhances your team&#8217;s capabilities, streamlines operations, and enables your organization to navigate the evolving threat landscape with confidence.<\/p>\n\n\n\n<p>To gain a deeper understanding of these findings and to inform your AI strategy, download the full <a href=\"https:\/\/swimlane.com\/resources\/reports\/sans-ai-security-survey\/\">SANS 2025 AI Survey: Measuring AI\u2019s Impact on Security Three Years Later<\/a> report today.<\/p>\n\n\n\n<div class=\"bs-div bs-div-a216b451bb5e4c10c704702cdec36b5911cd4c2b bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<h4 class=\"wp-block-heading\" id=\"h-tl-dr\" style=\"font-size:26px\">TL;DR<\/h4>\n\n\n\n<p>AI adoption is an immediate strategic imperative (100% plan to use GenAI), yet deployment of critical autonomous SOC functions is lagging. The SANS report identifies three core priorities for CISOs:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mitigate Risk:<\/strong> Address overwhelming false positives, secure AI platforms against data leaks and manipulation, and prepare defenses against AI-powered threats such as deepfakes and advanced social engineering.<\/li>\n\n\n\n<li><strong>Establish Governance:<\/strong> Implement formal AI risk management programs\u2014a critical gap given the current low involvement of security teams.<\/li>\n\n\n\n<li><strong>Evolve the Workforce:<\/strong> Prioritize specialized AI\/cybersecurity training to manage the shift toward automated tasks, enhancing team capabilities rather than replacing roles.<\/li>\n<\/ul>\n\n\n\n<p>Achieve predictable, trustworthy AI adoption by leveraging deterministic automation as guardrails, as demonstrated by Swimlane Turbine and Hero AI.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-771d74a42e65038e0204337aebd5a3438a949862 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-771d74a42e65038e0204337aebd5a3438a949862 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-2025-SANS-Survey-AI-Security.png' class='img-fluid'   alt='2025 SANS AI Security Survey graphic highlighting key findings on AI use in cybersecurity.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-191e88acf993b1553fe70cae2a5b4937149b9abf bs-div---default\"><div class=\"bs-div__inner     \">\n<p><strong>Report<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SANS 2025 AI Survey: AI\u2019s Impact on Security Three Years Later<\/h2>\n\n\n\n<p>Generative AI (GenAI) and large language models (LLMs) are already here, shaping the cybersecurity landscape.&nbsp;<\/p>\n\n\n\n<p>The 2025 SANS AI Survey, authored by Ahmed Abugharbia and Brandon Evans, examines how organizations are currently utilizing GenAI for security and identifies the problems and threats posed by these new technologies.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-8511573263de9ea9a7da8a87b1c2e2d0edb4c7ba\"><style>.bs-pro-button-p-btn-8511573263de9ea9a7da8a87b1c2e2d0edb4c7ba .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/sans-ai-security-survey\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/ai\/'><span class='tag-content'>AI<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-685a1b01df94aa255c335d03b57561a286e387aa bs-div---default bs-div--related-posts bs-div--right-sticky-related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-resources\">Related Resources<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e1a12f0a4d6 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/webinar-ai-reality-check\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>AI Reality Check: CISO\u2019s Unpack its Role in Cybersecurity<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Watch Now<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t\n\n\t\t\t\t\t<div class=\"bs-post bs-post-69e1a12f0c1fa bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/ai-tier-one-soc-nist-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>AI for Tier 1 SOC: NIST-Aligned Incident Response<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"bs-div bs-div-7a5be0abd58610f08cf9c9d564fee477ee90844a bs-div---default bs-div--blog-inner-single-post\"><div class=\"bs-div__inner     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e1a12f0d884 bs-single-post---default bs-single-post--home-resources-alt enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/reports\/sans-ai-security-survey\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-2025-SANS-Survey-AI-Security-1.png' class='img-fluid' alt='SANS AI Security Survey ' title='OG 2025 SANS Survey AI Security'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>SANS 2025 AI Survey: AI\u2019s Impact on Security Three Years Later<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":50314,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":50316,"learn_more_label":"","image_alt_text":"A CISOs Guide to Navigate AI's Security Impact: SANS Report Summary ","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[202],"resource-type":[67],"resource-topic":[215],"resource-industry":[],"blog-category":[72],"class_list":["post-50313","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-ai","resource-type-blogs","resource-topic-ai","blog-category-tips-tricks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CISO Guide: AI\u2019s Security Impact | SANS 2025 Report<\/title>\n<meta name=\"description\" content=\"Explore key findings from the SANS 2025 AI Survey. Learn how CISOs can responsibly apply AI in SOCs to enhance security, governance, and workforce readiness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ciso-\uac00\uc774\ub4dc-ai-\ubcf4\uc548-\uc601\ud5a5-\ubcf4\uace0\uc11c\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Guide: AI\u2019s Security Impact | SANS 2025 Report\" \/>\n<meta property=\"og:description\" content=\"Explore key findings from the SANS 2025 AI Survey. Learn how CISOs can responsibly apply AI in SOCs to enhance security, governance, and workforce readiness.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ciso-\uac00\uc774\ub4dc-ai-\ubcf4\uc548-\uc601\ud5a5-\ubcf4\uace0\uc11c\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T07:28:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-31.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CISO Guide: AI\u2019s Security Impact | SANS 2025 Report\" \/>\n<meta name=\"twitter:description\" content=\"Explore key findings from the SANS 2025 AI Survey. Learn how CISOs can responsibly apply AI in SOCs to enhance security, governance, and workforce readiness.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-31.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/\",\"name\":\"CISO Guide: AI\u2019s Security Impact | SANS 2025 Report\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg\",\"datePublished\":\"2025-09-04T14:00:00+00:00\",\"dateModified\":\"2025-12-17T07:28:46+00:00\",\"description\":\"Explore key findings from the SANS 2025 AI Survey. Learn how CISOs can responsibly apply AI in SOCs to enhance security, governance, and workforce readiness.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg\",\"width\":1120,\"height\":666,\"caption\":\"Swimlane and SANS report covers on AI\u2019s impact on cybersecurity three years later\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A CISOs Guide to Navigate AI&#8217;s Security Impact: SANS Report Summary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO \uac00\uc774\ub4dc: AI\uc758 \ubcf4\uc548 \uc601\ud5a5 | SANS 2025 \ubcf4\uace0\uc11c","description":"SANS 2025 AI \uc124\ubb38\uc870\uc0ac\uc758 \uc8fc\uc694 \uacb0\uacfc\ub97c \uc0b4\ud3b4\ubcf4\uc138\uc694. CISO\uac00 \ubcf4\uc548, \uac70\ubc84\ub10c\uc2a4 \ubc0f \uc778\ub825 \uc900\ube44 \ud0dc\uc138\ub97c \uac15\ud654\ud558\uae30 \uc704\ud574 SOC\uc5d0 AI\ub97c \ucc45\uc784\uac10 \uc788\uac8c \uc801\uc6a9\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ciso-\uac00\uc774\ub4dc-ai-\ubcf4\uc548-\uc601\ud5a5-\ubcf4\uace0\uc11c\/","og_locale":"ko_KR","og_type":"article","og_title":"CISO Guide: AI\u2019s Security Impact | SANS 2025 Report","og_description":"Explore key findings from the SANS 2025 AI Survey. Learn how CISOs can responsibly apply AI in SOCs to enhance security, governance, and workforce readiness.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ciso-\uac00\uc774\ub4dc-ai-\ubcf4\uc548-\uc601\ud5a5-\ubcf4\uace0\uc11c\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-17T07:28:46+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-31.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"CISO Guide: AI\u2019s Security Impact | SANS 2025 Report","twitter_description":"Explore key findings from the SANS 2025 AI Survey. Learn how CISOs can responsibly apply AI in SOCs to enhance security, governance, and workforce readiness.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-31.jpg","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/","url":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/","name":"CISO \uac00\uc774\ub4dc: AI\uc758 \ubcf4\uc548 \uc601\ud5a5 | SANS 2025 \ubcf4\uace0\uc11c","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg","datePublished":"2025-09-04T14:00:00+00:00","dateModified":"2025-12-17T07:28:46+00:00","description":"SANS 2025 AI \uc124\ubb38\uc870\uc0ac\uc758 \uc8fc\uc694 \uacb0\uacfc\ub97c \uc0b4\ud3b4\ubcf4\uc138\uc694. CISO\uac00 \ubcf4\uc548, \uac70\ubc84\ub10c\uc2a4 \ubc0f \uc778\ub825 \uc900\ube44 \ud0dc\uc138\ub97c \uac15\ud654\ud558\uae30 \uc704\ud574 SOC\uc5d0 AI\ub97c \ucc45\uc784\uac10 \uc788\uac8c \uc801\uc6a9\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-52.jpg","width":1120,"height":666,"caption":"Swimlane and SANS report covers on AI\u2019s impact on cybersecurity three years later"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/ciso-guide-ai-security-impact-sans-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"A CISOs Guide to Navigate AI&#8217;s Security Impact: SANS Report Summary"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/50313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/50313\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/50314"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=50313"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=50313"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=50313"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=50313"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=50313"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=50313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}