{"id":50613,"date":"2025-09-18T09:00:00","date_gmt":"2025-09-18T15:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=50613"},"modified":"2026-03-31T04:12:19","modified_gmt":"2026-03-31T10:12:19","slug":"cisas%ec%9d%98-%eb%a1%9c%eb%93%9c%eb%a7%b5%ec%9d%80-%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b3%b4%ec%95%88%ec%9d%98-%ec%8b%9c%ea%b8%89%ec%84%b1%ec%9d%84-%eb%b0%98%ec%98%81%ed%95%a9%eb%8b%88%eb%8b%a4","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/","title":{"rendered":"\ud488\uc9c8 \uc2dc\ub300: CISA \ub85c\ub4dc\ub9f5\uc774 \ud604\ub300 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc2dc\uae09\uc131\uc744 \uc5b4\ub5bb\uac8c \ubc18\uc601\ud558\ub294\uac00\u00a0"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Modern enterprise masthead representing secure digital transformation and resilient IT infrastructure.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-09-18T09:00:00-06:00\">9\uc6d4 18, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Quality Era: How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity\u00a0<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Quality%20Era%3A%20How%20CISA%E2%80%99s%20Roadmap%20Reflects%20Urgency%20for%20Modern%20Cybersecurity%C2%A0').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcisas-roadmap-reflects-urgency-for-cybersecurity%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=How%20CISA%E2%80%99s%20Roadmap%20Reflects%20Urgency%20for%20Modern%20Cybersecurity&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcisas-roadmap-reflects-urgency-for-cybersecurity%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcisas-roadmap-reflects-urgency-for-cybersecurity%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcisas-roadmap-reflects-urgency-for-cybersecurity%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-the-quality-era-how-cisa-s-roadmap-reflects-urgency-for-modern-cybersecurity-nbsp\">The Quality Era: How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity&nbsp;<\/h2>\n\n\n\n<p>Last week, the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/cisa-launches-roadmap-cve-program\/\">U.S. Cybersecurity and Infrastructure Security Agency (CISA) launched a roadmap for its CVE Program<\/a>, marking a significant turning point that recognizes the need to transition from a &#8220;growth era&#8221; to a &#8220;quality era&#8221; of vulnerability data. As CISO at Swimlane, this is a powerful affirmation of the need for an integrated, proactive approach to cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Timely Relief for the Private Sector&nbsp;<\/h2>\n\n\n\n<p>Our recent report, <a href=\"https:\/\/swimlane.com\/resources\/reports\/federal-cyber-priorities-impact-report\/\">Shifting Ground: Federal Cyber Priorities Reshape Security Strategy<\/a>, surveyed 500 IT and security decision-makers across the U.S. and U.K. to understand how security teams are adapting to recent shifts in federal cybersecurity programs. The findings revealed a concerning trend: security leaders who once relied on public-sector intelligence and coordination are now contending with increased risk and operational strain. In the wake of recent and anticipated CISA budget cuts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>63% of respondents said their team structure and staffing plans are being affected<\/li>\n\n\n\n<li>91% of private organizations are already taking new steps to maintain operations amid reduced federal support.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>It&#8217;s a clear signal that the private sector is shouldering a heavier burden, making the CVE roadmap even more timely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CISA\u2019s Roadmap: A Call for Integrated and Proactive Cybersecurity&nbsp;<\/h2>\n\n\n\n<p>This roadmap arrives at a critical juncture. As a CISO, I&#8217;m particularly heartened by CISA&#8217;s clear commitment to modernizing the CVE infrastructure. The roadmap is not just a high-level plan; it&#8217;s a strategic move to integrate advanced technologies like automation, AI, and machine learning to improve data quality and scalability. This is a vital shift, as we can no longer rely on manual processes to keep pace with the sheer volume of vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CISA\u2019s Roadmap FAQs&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is the CISA Cybersecurity Strategic Plan?<\/h3>\n\n\n\n<p>The CISA Cybersecurity Strategic Plan outlines the agency&#8217;s priorities to strengthen national cybersecurity. It focuses on advancing resilience, collaboration, and innovation across both public and private sectors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How does the CISA Strategic Plan impact private organizations?<\/h3>\n\n\n\n<p>The CISA Strategic Plan signals a reduction in federal support and encourages private organizations to adopt proactive measures, such as automation, improved threat intelligence, and enhanced coordination across tools and teams.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the CISA AI Roadmap and why does it matter?<\/h3>\n\n\n\n<p>The CISA AI Roadmap is part of the agency\u2019s initiative to modernize the CVE Program, utilizing technologies such as AI and machine learning. It aims to improve data quality, speed response, and reduce manual efforts in vulnerability management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Multi-Sector and International Collaboration&nbsp;<\/h2>\n\n\n\n<p>What&#8217;s also critical is the roadmap&#8217;s emphasis on multi-sector and international collaboration. Expanding representation to include governments, academia, security researchers, operational technology companies, and the open-source community will create a more holistic and robust vulnerability ecosystem. This will provide a more comprehensive view of the threat landscape, which is essential for effective risk management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Commitment to Transparency and Sustainable Funding&nbsp;<\/h2>\n\n\n\n<p>I also strongly support the roadmap&#8217;s commitment to transparency and its dedication to keeping the CVE program a public good. In an industry where trust and data integrity are paramount, ensuring the program remains free and vendor-neutral is non-negotiable. I am also cautiously optimistic about the plans for diversified funding, which will be crucial for the program&#8217;s long-term sustainability beyond traditional government funding cycles.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Practical Implications for the Private Sector: Improved Data Quality and Responsiveness&nbsp;<\/h2>\n\n\n\n<p>From a practical standpoint, the new minimum standards for CVE record quality and the federated mechanisms for data enrichment are a massive win for security leaders. This will give us more reliable and actionable vulnerability information, which is the foundation of any effective risk management strategy. Furthermore, the enhanced roles of CVE Numbering Authorities (CNAs) and the &#8220;CNA of Last Resort&#8221; role will improve responsiveness and visibility within the program, giving CISOs and their teams the clarity they need to act quickly.<\/p>\n\n\n\n<p>In <a href=\"https:\/\/swimlane.com\/resources\/reports\/federal-cyber-priorities-impact-report\/\">our report,<\/a> we found that organizations are already turning to the private sector to fill the gaps left by reduced federal support. Over half of the organizations surveyed (51%) are now relying more on commercial threat intelligence providers. They are also prioritizing capabilities that can help offset staffing and coordination gaps, with the top areas of interest being improved coordination across security tools and teams (44%), more actionable threat intelligence (41%), and automation of high-volume tasks (39%).&nbsp;<\/p>\n\n\n\n<p>The CISA roadmap&#8217;s focus on quality and automation directly addresses these critical needs and alleviates some of the burden on the private sector.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A New Era of Cybersecurity Empowerment&nbsp;&nbsp;<\/h2>\n\n\n\n<p>CISA&#8217;s new roadmap for the CVE program is more than just a federal initiative; it\u2019s a strategic move that reflects the urgent need for the cybersecurity industry to evolve. By prioritizing data quality and leveraging technologies like automation and AI, the program is setting the stage for a more resilient and proactive defense ecosystem.&nbsp;<\/p>\n\n\n\n<p>It acknowledges that to protect our critical infrastructure, we need to bridge the gap between human expertise and technological advancements, empowering security teams with the tools they need to succeed in this new era of cybersecurity.<\/p>\n\n\n\n<div class=\"bs-div bs-div-7ece2bfc5d1cf8b5a9cc61d4c52a6e1a16eec9fc bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-7ece2bfc5d1cf8b5a9cc61d4c52a6e1a16eec9fc {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Fab-OG-1.png' class='img-fluid'   alt='Federal Cyber Priorities Reshape Security Strategy Recent shifts in U.S. federal cybersecurity programs, including CISA budget cuts and the disbandment of the Cyber Safety Review Board, are significantly impacting the private sector. A new report, based on a survey of 500 IT and security decision-makers in the U.S. and U.K., reveals that security leaders are facing increased risk exposure, reduced visibility, and growing operational strain. Download the research report to see findings that highlight how organizations are adapting to this new landscape.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-1a42cb9950b118094bb6fc4b024a7ac6c94cbeef bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-federal-cyber-priorities-reshape-security-strategy\">Federal Cyber Priorities Reshape Security Strategy<\/h3>\n\n\n\n<p>Recent shifts in U.S. federal cybersecurity programs are significantly impacting the private sector.&nbsp;A new report, based on a survey of 500 IT and security decision-makers in the U.S. and U.K., reveals that security leaders are facing increased risk exposure, reduced visibility, and growing operational strain. <\/p>\n\n\n\n<p>Download the research report to see findings that highlight how organizations are adapting to this new landscape.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-aa6a954726ec6ba9ee2bd704b4a347327a9eefe6\"><style>.bs-pro-button-p-btn-aa6a954726ec6ba9ee2bd704b4a347327a9eefe6 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/federal-cyber-priorities-impact-report\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n\n\n<div class=\"bs-div bs-div-0b209754bfe38a8595893dcc81c625cbcd52291c bs-div---default bs-div--related-posts bs-div--right-sticky-related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-resources\">Related Resources<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ee251d7b449 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/videos\/federal-cyber-cuts\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>Federal Cyber Budget Cuts Reshape Security Priorities in 2025<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ee251d7c8ea bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/federal-cyber-budget-cuts\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>Shifting Ground: The Ripple Effect of Federal Cyber Budget Cuts<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ee251d7d99d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/news\/federal-cyber-cutbacks\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>Report Reveals 85% of Organizations Facing Budget and Resource Strain Amid Federal Cyber Cuts<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"bs-div bs-div-1f12b074b47667aa403a5b953fe1bb6f300e2528 bs-div---default bs-div--blog-inner-single-post\"><div class=\"bs-div__inner     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ee251d7ed3e bs-single-post---default bs-single-post--home-resources-alt enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/global-soc-survey-insights\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-43.png' class='img-fluid' alt='SANS SOC Survey ' title='Masthead'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>2025 SANS SOC Survey Insights: Why AI Automation is Non-Negotiable<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":50614,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":50616,"learn_more_label":"","image_alt_text":"CISA\u2019s CVE roadmap marks a shift toward smarter, AI-driven cybersecurity. Discover what it means for the private sector and how to prepare. Read more.","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[192,107],"blog-category":[75],"class_list":["post-50613","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","resource-industry-federal","resource-industry-security-automation","blog-category-security-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity<\/title>\n<meta name=\"description\" content=\"CISA\u2019s CVE roadmap marks a shift toward smarter, AI-driven cybersecurity. Discover what it means for the private sector and how to prepare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/cisas\uc758-\ub85c\ub4dc\ub9f5\uc740-\uc0ac\uc774\ubc84-\ubcf4\uc548\uc758-\uc2dc\uae09\uc131\uc744-\ubc18\uc601\ud569\ub2c8\ub2e4\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"CISA\u2019s CVE roadmap marks a shift toward smarter, AI-driven cybersecurity. Discover what it means for the private sector and how to prepare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/cisas\uc758-\ub85c\ub4dc\ub9f5\uc740-\uc0ac\uc774\ubc84-\ubcf4\uc548\uc758-\uc2dc\uae09\uc131\uc744-\ubc18\uc601\ud569\ub2c8\ub2e4\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T10:12:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile_Text-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity\" \/>\n<meta name=\"twitter:description\" content=\"CISA\u2019s CVE roadmap marks a shift toward smarter, AI-driven cybersecurity. Discover what it means for the private sector and how to prepare.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile_Text-8.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISA\uc758 \ub85c\ub4dc\ub9f5\uc740 \ud604\ub300 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc2dc\uae09\uc131\uc744 \uc5b4\ub5bb\uac8c \ubc18\uc601\ud558\ub294\uac00","description":"CISA\uc758 CVE \ub85c\ub4dc\ub9f5\uc740 \ub354\uc6b1 \uc2a4\ub9c8\ud2b8\ud558\uace0 AI \uae30\ubc18\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc73c\ub85c\uc758 \uc804\ud658\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \ubbfc\uac04 \ubd80\ubb38\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uacfc \ub300\ube44\ucc45\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/cisas\uc758-\ub85c\ub4dc\ub9f5\uc740-\uc0ac\uc774\ubc84-\ubcf4\uc548\uc758-\uc2dc\uae09\uc131\uc744-\ubc18\uc601\ud569\ub2c8\ub2e4\/","og_locale":"ko_KR","og_type":"article","og_title":"How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity","og_description":"CISA\u2019s CVE roadmap marks a shift toward smarter, AI-driven cybersecurity. Discover what it means for the private sector and how to prepare.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/cisas\uc758-\ub85c\ub4dc\ub9f5\uc740-\uc0ac\uc774\ubc84-\ubcf4\uc548\uc758-\uc2dc\uae09\uc131\uc744-\ubc18\uc601\ud569\ub2c8\ub2e4\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-31T10:12:19+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile_Text-8.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity","twitter_description":"CISA\u2019s CVE roadmap marks a shift toward smarter, AI-driven cybersecurity. Discover what it means for the private sector and how to prepare.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile_Text-8.jpg","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/","url":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/","name":"CISA\uc758 \ub85c\ub4dc\ub9f5\uc740 \ud604\ub300 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uc2dc\uae09\uc131\uc744 \uc5b4\ub5bb\uac8c \ubc18\uc601\ud558\ub294\uac00","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1.jpg","datePublished":"2025-09-18T15:00:00+00:00","dateModified":"2026-03-31T10:12:19+00:00","description":"CISA\uc758 CVE \ub85c\ub4dc\ub9f5\uc740 \ub354\uc6b1 \uc2a4\ub9c8\ud2b8\ud558\uace0 AI \uae30\ubc18\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc73c\ub85c\uc758 \uc804\ud658\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \ubbfc\uac04 \ubd80\ubb38\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uacfc \ub300\ube44\ucc45\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1.jpg","width":1120,"height":666,"caption":"Modern enterprise masthead representing secure digital transformation and resilient IT infrastructure."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Quality Era: How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/50613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/50613\/revisions"}],"predecessor-version":[{"id":55417,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/50613\/revisions\/55417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/50614"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=50613"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=50613"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=50613"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=50613"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=50613"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=50613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}