当前位置:网站首页>Hunan data security governance Summit Forum was held, and Tencent built the best practice of government enterprise data security
Hunan data security governance Summit Forum was held, and Tencent built the best practice of government enterprise data security
2022-06-24 03:06:00 【Tencent security】
10 month 14 Japan , The Public Security Department of Hunan Province organized 2021 The theme day of the national cyber security publicity week on the rule of law . among , By Tencent security 、 Changsha Data Resources Management Bureau 、 Hunan Cyberspace Security Association 、 Beijing Weibu Online Technology Co., Ltd. jointly organized the publicity and implementation of key information infrastructure security protection regulations and data security governance Summit Forum , Gathered leaders of Hunan Provincial Public Security Department 、 Experts in the field of public security 、 University Law Professor 、 Industry experts and other important guests attended .
At the meeting , Wang Pengqun, director of Tencent security government solutions, delivered a speech entitled 《 Construction and practice sharing of government enterprise data security protection system 》 Speech , Combined with the latest laws, regulations, policies and standards in the field of network security , Analyze the latest development situation in the field of network security , And specifically shared the successful practical experience of Tencent security in assisting government and enterprise units to build a new generation of data security governance system .
The threat to global security has intensified , The top-level policy of national network security has been continuously improved
Wang Pengqun thinks , Digital technology is bringing economic benefits 、 While promoting social development , It also makes data privacy face greater risks . In the past two years , Global data leakage and privacy incidents occur frequently , The data security situation is grim . Such as human error 、 The application of digital technology has also been questioned frequently due to system design defects, malicious criminal attacks and other privacy security problems , Specifically, the challenges in the field of government and enterprises are more severe .
In this context , China's laws, regulations and regulatory agencies are tightening day by day , Especially critical information infrastructure , For national security 、 Economic security 、 Social stability, 、 Public health and safety are essential .《 Data security law 》 Clearly put forward the obligation of government data security of state organs . Establish and improve the data security management system , Implement the responsibility of data security protection , Ensure the security of government and enterprise data . Wang Pengqun said , Ensure the application and security of big data , To classify all data , Carry out hierarchical safety management for data of different categories and accuracy .
be based on “ Three levels 、 Four steps ”, Build best practices for government and enterprise data security governance
Data as the fifth factor of production , It is deeply affecting the national economic and social development , Data security has risen to the height of stable business operation . In the process of data security governance , Risk runs through all aspects of business data flow , We need to focus on data security governance and security prevention and control in the circulation process . Through data security protection 、 Data security governance 、 Build a big data security protection framework from three levels of data security services .
meanwhile , Wang Pengqun talked about how to quickly land the framework , It is suggested that the establishment of data security management organization , Implementation of data security classification system 、 Data lifecycle security control 、 Four steps of data security operation management , Effectively implement government and enterprise data security management .
at present , Complex scenarios for big data of government and enterprises , Tencent security polished a complete set of government and enterprise data security management scheme , And accumulated a large number of key technologies that can be landed . Include : be based on AI Sensitive data identification and classification technology 、 High performance state secret encryption technology 、 Data audit technology based on deep database protocol parsing 、 Scenario driven fine-grained access control technology 、 application &API Data security monitoring and protection technology 、“ Data available invisible ” Data sandbox technology, etc .
Sum up , The scheme has three advantages , That is, the whole system protection 、 All round management 、 Whole process service capability . Specifically, it is different from static database security protection , Tencent's government enterprise data security governance scheme can cover the whole process of data flow , Through a unified data security management platform , For data security assets 、 risk 、 Unified management of events , Realize the security protection of government and enterprise data in a service-oriented way .
Tencent's government enterprise data security governance scheme has successfully realized the digital government of Guangdong Province 、 Changsha chaonao 、 Wuhan smart city 、 Number wise Guiyang 、 Chongqing urban big data resource center 、 Effective implementation of several super large projects such as Guizhou on cloud .
As the promoter of industrial digital upgrading , Tencent relies on 20 Years of safety experience and technology accumulation , Accumulated and precipitated solid practical ability in the field of data security , With the digital transformation and upgrading of the industry, it continues to grow , Tencent security will continue to think and explore , Assist government and enterprise units to build a new generation of data security governance system , To higher 、 A deeper direction to build solutions for Industry Development , Further strengthen the network security defense line , Let digital technology truly benefit the people .
边栏推荐
- Velocitytracker use
- Innovation or hype? Is low code a real artifact or a fake tuyere?
- Grpc: how to enable tls/ssl?
- Grc: GRC interface is mixed with restful API
- Tencent cloud CVM starts IPv6
- What is the use of cloud desktop security server configuration? What should I do?
- 2022-2028 global cancer biopsy instrument and kit industry research and trend analysis report
- Sinclair radio stopped broadcasting many TV stations, suspected of being attacked by blackmail software
- PHP verify mailbox format
- 2022-2028 global portable two-way radio equipment industry research and trend analysis report
猜你喜欢

2022-2028 global high tibial osteotomy plate industry research and trend analysis report

2022-2028 global marine clutch industry research and trend analysis report
![[51nod] 2106 an odd number times](/img/af/59b441420aa4f12fd50f5062a83fae.jpg)
[51nod] 2106 an odd number times

2022-2028 global pilot night vision goggle industry research and trend analysis report

2022-2028 global cell-based seafood industry research and trend analysis report
![[51nod] 2653 section XOR](/img/2d/cb4bf4e14939ce432cac6d35b6a41b.jpg)
[51nod] 2653 section XOR

The cost of on-site development of software talent outsourcing is higher than that of software project outsourcing. Why

2022-2028 global indoor pressure monitor and environmental monitor industry research and trend analysis report

What is etcd and its application scenarios

2022-2028 global aircraft front wheel steering system industry research and trend analysis report
随机推荐
2022-2028 global aircraft front wheel steering system industry research and trend analysis report
Tstor onecos, focusing on a large number of object scenes
Prompt error when Jekyll runs cannot load such file -- webrick (LoadError)
How to build a shopping website? What problems should be paid attention to in the construction of shopping websites?
2022-2028 global aircraft audio control panel system industry research and trend analysis report
US Treasury secretary says extortion software poses a threat to the economy, Google warns 2billion chrome users | global network security hotspot
How is intelligent character recognition realized? Is the rate of intelligent character recognition high?
[51nod] 3216 Awards
C common regular expression collation
Grpc: based on cloud native environment, distinguish configuration files
[1024 programmers' day] Why do some programmers leave work earlier than you?
Liaoyuan social cloud primary actual combat camp test environment script
What are the responsibilities of cloud desktop administrators? How to use cloud desktop?
[51nod] 2106 an odd number times
System design: File Hosting Service
How to query trademark registration? Where should I check?
2022-2028 global marine clutch industry research and trend analysis report
Is your database "cloud native"?
MySQL case deep excavation information_ Root causes of slow schema view query (Part 2)
Activiti obtains the initiator based on the process instance ID