当前位置:网站首页>Tencent Ding Ke: the mission of Tencent security is to safeguard the beauty of digital
Tencent Ding Ke: the mission of Tencent security is to safeguard the beauty of digital
2022-06-24 02:15:00 【Tencent security】
11 month 3 Japan -4 Japan , The annual Tencent digital ecology conference was held in Wuhan . On the first day of the conference “ The combination of number and reality New machine in full bloom ” At the main Summit , Ding Ke, vice president of Tencent, said “ Safety co construction , Defend beauty ” The theme of , New ideas for security construction in the digital age 、 New practice 、 The new mission was shared . DingKe pointed out , The value of digitization is to bring higher quality vitality to sustainable economic development , Create a better life for people . Through security , In order to provide the most solid guarantee .
Ding Ke said , Tencent's vision of security , yes “ Together , Defend beauty ”, Willing to rely on their own accumulated technology 、 Talents and industry safety construction experience , Reduce the damage and harm caused by cyber threats , Build a solid security base in the digital age .
Ding Ke said , Wuhan is a pioneer in the development of China's digital economy . Forward looking layout and construction in digitization , Let Wuhan carry the epidemic , Soon out of adversity , It also reserves strong momentum for urban recovery and economic development . Wuhan's practice has proved that , Digitization in urban construction 、 Industrial Development and bringing people a better life , Of great value . But Ding Ke also pointed out , Security is the basic guarantee for the healthy and sustainable development of digital economy , It is also the responsibility of all enterprises and governments “ Will answer ”.
He pointed out that , At the national level , Network security embodies the overall will from top to bottom , Improvement of relevant laws and regulations , It also gives the legal and compliant operation of enterprises “ Draw a red line ”; At the industrial level , Risk exposure does not exist only in a single enterprise , All parties in the industrial chain must be brought into a unified security framework from an overall perspective 、 Standards and regulations , Ensure the integrity of the safety system ; At the enterprise level , Information security construction is accompanied by digital production and business digitization , Security has become one of the core competitiveness of enterprises , It is also the responsibility of enterprises to integrate into the digital age .
At the conference , Ding Ke built a network with customers around safety manufacturers 、 Enterprise business development and security co construction 、 Three dimensions of safe ecological co construction , It deeply analyzes how Tencent cooperates with government and enterprise customers 、 Ecological partners work together to build a secure base in the digital age .
Build the first floor , Is to upgrade the traditional relationship between Party A and Party B , Security vendors and customers are result oriented , Build together , Grow up together .
Under the needs of security , The traditional relationship between Party A and Party B needs to be upgraded , Result oriented and jointly build , Grow up together .2021 year , Tencent and SAIC 、 China Resources Group and other enterprise customers jointly build a joint safety laboratory , And participated in the construction of several large-scale digital city projects , At the same time, it has contributed to the formulation and promulgation of industry standards .
Build the second floor , It is business development and security co construction .
In the process of enterprise business growth , The requirements for data are becoming higher and higher , Once data is consolidated from within the enterprise , Enter the internal and external data flow interaction , In particular, the business is related to the establishment of user data , We need to pay more attention to data compliance and privacy protection . Enterprises should be in " Data doesn't land " And in the face of strong constraints , Dig out a new model for future business and security to grow together , Realize the associated relationship of mutual integration .
Build the third floor , It is to realize the linkage and complementary advantages of the whole safe ecology .
At the level of Ecological Security Co Construction , Integrate safe and ecologically optimal technologies and products , Able to build a solid infrastructure for the digital economy , Provide plenty of kinetic energy . Tencent security has been formulated “ Build an ecosystem ” Our strategic approach . In terms of resource integration , Optimize partner policies , Achieve more professional and efficient management ; In terms of product structure , Improve positioning and service ; Continue to increase ecological investment , Support partners in business and technology , Truly realize collaborative symbiosis .
The following is the full text of Dinke's speech :
Distinguished guests , friends , Good morning everyone ! I'm very glad to meet you in Wuhan at the annual Tencent digital ecology Conference . Today, with the normalization of the epidemic situation , We can get together smoothly in Wuhan , Thanks to the effective measures of Wuhan government in epidemic prevention and control , It also benefits from digital urban governance in Wuhan 、 Important practice in economic development .
Wuhan is a pioneer in the development of China's digital economy , Digital foresight 、 Layout and construction , Let Wuhan carry the epidemic , Soon out of adversity , It also reserves strong momentum for urban recovery and economic development . Relevant data statistics ,2020 In, the whole digital economy of Hubei has accounted for GDP Of the total 40% above , Wuhan is accelerating the establishment of a national digital economy Experimental Zone . While maintaining its own development vitality , Also for the global digital city construction 、 The industrial layout provides a very good reference model .
Just now, Tang Daosheng also mentioned , Tencent and Wuhan jointly build a digital network , Won many very important awards . As a partner and assistant in the digital development of Wuhan industry , Tencent is very lucky to participate , Including cloud computing 、 Security 、 Travel 、 Medical industry and other basic Internet Oriented capabilities , Digitization is injecting fresh impetus into the city and economic development , It also creates beauty and convenience for everyone's life .
It can be said that the vision and value of digitization , In the future , Bring higher quality vitality to the sustainable development of economy , Create a better life for people .
However, the process of digitization is not plain sailing , In the process of development , Network security is the foundation and guarantee for the healthy and sustainable development of digital economy . General secretary Xi Jinping pointed out , Network security and informatization are two wings of one 、 Two wheels of drive , It's about the concomitant relationship between security and digitization . The latest data shows , Nationwide 64% Enterprise CIO Worried about the prospect of network security , There are... In the Asia Pacific region 51% Of enterprises have experienced cyber attacks . On the one hand, it shows that the digital age , Everyone's safety awareness has been significantly improved , On the other hand, it also expresses everyone's concern about safety risks , Security risk is becoming the biggest challenge for us to embrace a better digital life , It is also a must answer for everyone here .
There are three levels , Let's share some thoughts on Security Co Construction .
First of all , At the national level , Network security is national security , *** . Safety is the overall will from top to bottom .2018 Since then , The state has successively issued and continuously improved laws and regulations related to network security and data security , I will focus on three epistatic methods , One is 2018 year 6 month 1 Japanese 《 Network security law 》, The last two were both landed this year ,2021 year 9 month 1 No. 1 landed 《 Data security law 》 and 2021 year 11 month 1 No. 1 just landed 《 Personal information protection law 》, abbreviation “ Personal protection method ”. The country drew a red line , Compliance has become the minimum prerequisite for digital development .
second , At the industrial level , What we need to pay special attention to is the supply chain security . Whether it's today's digitization or the future meta universe , In this process, we will generate a lot of various morphological codes and data , Many common components will be introduced into our R & D process 、 Open source tools . Whether it's traditional software development or traditional security protection , Not enough consideration has been given in this regard . If so much cooperation , There is a probability of one in ten thousand mistakes , The threat to smart transportation and smart city is very great .
Third , At the enterprise level , Special emphasis is placed on data security . Head industry customers , They will find that since digitization , It seems that all kinds of data are doubling and rising every year , There is great value behind this . While data brings value , It also brings responsibility , Users put particularly sensitive private data into the enterprise , Give you trust . But we as builders , Can you shoulder this responsibility , It becomes a very interesting topic . There's a detail ,2021 year 11 Executed on the landing of the month 《 Personal protection method 》, If something goes wrong in this regard , The maximum penalty reached 5000 Million yuan or less than the turnover of the enterprise 5%. It can be seen that the state attaches importance to this aspect and the future development trend .
The benefits of digitization are tangible , But sustainable long-term development , Not only to ensure their own health , Corporate responsibility is also required , Even to develop the altruistic values of the digital future . The industrial chain grows , Great depth of data . Tencent's practical findings , Perhaps industry co construction and future oriented security construction , Is a necessary way .
The first level of co construction is to upgrade the traditional relationship between supply and demand , Security vendors and customers are jointly result oriented , Joint responsibility 、 Build together 、 Grow up together . The traditional security is that Party A and Party B take “ Buy a box ” Delivery , With the border as the protection, we can do . But the boundaries of the digital age are clearly melting , The relationship between Party A and Party B is actually a back-to-back comrades in arms relationship . In the face of the new scene of digitization 、 New business formats and new risks and challenges , Tencent and its customers have explored the ability to jointly build 、 The new model of joint safety laboratory . Some recent cases , Like Tencent security and SAIC 、 China Resources Group and other large central state-owned enterprises adopt a back-to-back cooperation model , Establishment of Joint Laboratory , This is our new attempt to improve the industry-level security capability .
The second layer of co construction is data driven , Build business development and data security together . We observed a lot of customers , This paper summarizes a set of Maslow models of data assets , In theory, the higher the value of numbers , But the third layer is a particularly important watershed . I don't know if you've noticed , In the following two levels, it mainly faces the production materials independently controlled by the enterprise 、 Means of production and production process links . But above the third floor , It changes to strong interaction with user behavior data , This is what we call data security 《 Personal protection method 》 Related categories . In this circulation process , Special attention needs to be paid to value win-win , Attach importance to compliance , And while excavating value , Need some strong technical support . In the scenario of data not landing , In the face of strong constraints , How can the whole industry jointly tap the value of digital products facing the future .
The third level of Co Construction , It is the linkage of safety and ecology . The deepening of digitization in recent years , Our country has also seen a lot of city level 、 Industrial projects , For example, the total investment of Wuhan's smart city is 10 billion , Time is tight and task is heavy . From any point of view , We all need to make a joint construction based on the whole security ecology . Let's come up with the best technology and products , Build a solid infrastructure for the digital economy , Provide the most abundant kinetic energy . Tencent security has also formulated an ecological plan for co construction , I believe all partners will see a clearer layout in our next forum , Carry out more in-depth discussion .
We Tencent security are willing to do our best , Build a secure base for customers and ecological partners in the digital age , Rely on our long-term accumulated safety experience , Work together to create a better life for the people .
Finally, I would like to share with you our new mission of Tencent security —— Defend the bright future with everyone , I'm here to share with you , Thank you. .
边栏推荐
- What is the cloud desktop server configuration? What are the application scenarios of cloud desktop?
- [actual combat] how to realize people nearby through PostGIS
- Xmlmap port practice - X12 to CSV
- How to formulate a domain name trademark registration scheme? What if the plan is rejected?
- If there are enumerations in the entity object, the conversion of enumerations can be carried out with @jsonvalue and @enumvalue annotations
- How to build a website? What needs attention?
- How to query the cloud desktop server address? What are the advantages of using cloud desktop?
- What are the conditions for trademark registration? How long does it take to register a trademark?
- Stm32g474 infrared receiving based on irtim peripherals
- What is the backbone of marketing website construction? What does it do?
猜你喜欢

163 mailbox login portal display, enterprise mailbox computer version login portal

Stm32g474 infrared receiving based on irtim peripherals

Introduction to development model + test model

Leetcode969: pancake sorting (medium, dynamic programming)

If there are enumerations in the entity object, the conversion of enumerations can be carried out with @jsonvalue and @enumvalue annotations

BIM model example

layer 3 switch

Review of AI hotspots this week: the Gan compression method consumes less than 1/9 of the computing power, and the open source generator turns your photos into hand drawn photos

2020 language and intelligent technology competition was launched, and Baidu provided the largest Chinese data set

How to fill in and register e-mail, and open mass mailing software for free
随机推荐
Global and Chinese micro focus X-ray tube industry competitiveness analysis and Investment Strategy Research Report 2022-2028
LeetCode 931. Descent path min sum
How to build your own website? Is it difficult?
Global and Chinese dealox industry development status and demand trend forecast report 2022-2028
Dry goods collection | the most important content collection of Tencent security in the digital ecology Conference
Measurement model 𞓜 pre determined variable # time Fe
A detailed explanation of the laser slam framework logo-loam
Designing complex messaging systems using bridging patterns
What is a private VLAN? Eight part essay with pictures and texts.
Devops learning notes (II)
Looking at the future development direction of industrial Internet from the transformation of circulation links of large building materials
Global and Chinese gallium industry market panoramic survey and investment strategy proposal report 2022-2028
Easycvr connects with Huawei IVS platform to query the foreign domain list interface definition and use sharing
What about registered domain names? How long does it take to register a domain name?
[seckill] new / old users lock in the "explosive seckill zone" and snap up the one-year validity cloud function resource yyds for 63 yuan!
Are cloud game servers expensive to rent? Factors to consider in cloud game server leasing
LeetCode 1289. Descent path min and II
Thoroughly explain the details of the simple factory that you haven't paid attention to
Analysis report on development trends and prospects of China's pyrolytic boron nitride (PBN) component industry 2022-2028
How to calculate the trademark registration fee? How much does it cost to register a trademark?