share_log

IBM Corp | 10-K: FY2023 Annual Report

IBM Corp | 10-K: FY2023 Annual Report

IBM Corp | 10-K:2023财年年报
美股SEC公告 ·  02/26 06:45

Moomoo AI 已提取核心信息

IBM Corp has implemented a robust cybersecurity infrastructure to manage and mitigate risks. The company employs a layered defense strategy, utilizing its own security solutions and services, as well as third-party tools, to protect against attacks on its networks, devices, servers, applications, data, and cloud solutions. IBM's Security Operations Center (SOC) monitors threats, drawing intelligence from the IBM Security X-Force Exchange platform. Additionally, IBM engages third parties to review its cybersecurity practices and has a global incident response process managed by its Computer Security Incident Response Team (CSIRT). The company fosters a culture of security awareness through training and educational initiatives and manages third-party supplier risks through a dedicated program. Despite the evolving cybersecurity threats, IBM...Show More
IBM Corp has implemented a robust cybersecurity infrastructure to manage and mitigate risks. The company employs a layered defense strategy, utilizing its own security solutions and services, as well as third-party tools, to protect against attacks on its networks, devices, servers, applications, data, and cloud solutions. IBM's Security Operations Center (SOC) monitors threats, drawing intelligence from the IBM Security X-Force Exchange platform. Additionally, IBM engages third parties to review its cybersecurity practices and has a global incident response process managed by its Computer Security Incident Response Team (CSIRT). The company fosters a culture of security awareness through training and educational initiatives and manages third-party supplier risks through a dedicated program. Despite the evolving cybersecurity threats, IBM has not experienced any incidents with a material adverse effect on the company. Governance of cybersecurity is overseen by the Enterprise & Technology Security (E&TS) organization, with a dedicated Chief Information Security Officer (CISO) leading the strategy. The CISO oversees the CSIRT and the Product Security Incident Response Team (PSIRT), focusing on product vulnerabilities. Business Information Security Officers (BISO) coordinate with the CISO on security issues specific to business segments. IBM's Cybersecurity Advisory Committee (CAC) oversees the management of cybersecurity risk, setting governance structures and reviewing incidents to prevent recurrence.
ibm corp已实施了强大的安防-半导体基础设施以管理和减轻风险。 该公司采用分层防御策略,利用自己的安全解决方案和服务以及第三方工具,来保护其网络,设备,服务器,应用程序,数据和云解决方案免受攻击。ibm的安全操作中心(SOC)监视威胁,并从ibm安全x-force交换平台中获取情报。此外,ibm邀请第三方审核其网络安全实践,并通过其计算机安全事件响应团队(CSIRT)管理全球事件响应流程。该公司通过培训和教育计划培养安全意识文化,并通过专门的方案管理第三方供应商的风险。尽管网络安全威胁不断演变,但ibm并未经历任何对公司造成实质负面影响的安全事件。网络安全的治理由企业和技术安全(E&TS...展开全部
ibm corp已实施了强大的安防-半导体基础设施以管理和减轻风险。 该公司采用分层防御策略,利用自己的安全解决方案和服务以及第三方工具,来保护其网络,设备,服务器,应用程序,数据和云解决方案免受攻击。ibm的安全操作中心(SOC)监视威胁,并从ibm安全x-force交换平台中获取情报。此外,ibm邀请第三方审核其网络安全实践,并通过其计算机安全事件响应团队(CSIRT)管理全球事件响应流程。该公司通过培训和教育计划培养安全意识文化,并通过专门的方案管理第三方供应商的风险。尽管网络安全威胁不断演变,但ibm并未经历任何对公司造成实质负面影响的安全事件。网络安全的治理由企业和技术安全(E&TS)组织监督,并有专门的首席信息安全官(CISO)领导战略。CISO监督CSIRT和产品安全事件响应团队(PSIRT),关注产品漏洞。业务信息安全官(BISO)与CISO协调关于特定于业务领域的安全问题。ibm的网络安全咨询委员会(CAC)监督网络安全风险管理,制定治理结构,并审查事件以防止再次发生。
声明:本内容仅用作提供资讯及教育之目的,不构成对任何特定投资或投资策略的推荐或认可。 更多信息