share_log

IBM Corp | 10-K: Annual report

IBM Corp | 10-K:年度报表

SEC announcement ·  02/26 06:45
Moomoo AI 已提取核心信息
IBM Corp has implemented a robust cybersecurity infrastructure to manage and mitigate risks. The company employs a layered defense strategy, utilizing its own security solutions and services, as well as third-party tools, to protect against attacks on its networks, devices, servers, applications, data, and cloud solutions. IBM's Security Operations Center (SOC) monitors threats, drawing intelligence from the IBM Security X-Force Exchange platform. Additionally, IBM engages third parties to review its cybersecurity practices and has a global incident response process managed by its Computer Security Incident Response Team (CSIRT). The company fosters a culture of security awareness through training and educational initiatives and manages third-party supplier risks through a dedicated program. Despite the evolving cybersecurity threats, IBM...Show More
IBM Corp has implemented a robust cybersecurity infrastructure to manage and mitigate risks. The company employs a layered defense strategy, utilizing its own security solutions and services, as well as third-party tools, to protect against attacks on its networks, devices, servers, applications, data, and cloud solutions. IBM's Security Operations Center (SOC) monitors threats, drawing intelligence from the IBM Security X-Force Exchange platform. Additionally, IBM engages third parties to review its cybersecurity practices and has a global incident response process managed by its Computer Security Incident Response Team (CSIRT). The company fosters a culture of security awareness through training and educational initiatives and manages third-party supplier risks through a dedicated program. Despite the evolving cybersecurity threats, IBM has not experienced any incidents with a material adverse effect on the company. Governance of cybersecurity is overseen by the Enterprise & Technology Security (E&TS) organization, with a dedicated Chief Information Security Officer (CISO) leading the strategy. The CISO oversees the CSIRT and the Product Security Incident Response Team (PSIRT), focusing on product vulnerabilities. Business Information Security Officers (BISO) coordinate with the CISO on security issues specific to business segments. IBM's Cybersecurity Advisory Committee (CAC) oversees the management of cybersecurity risk, setting governance structures and reviewing incidents to prevent recurrence.
IBM Corp 已经实施了强大的网络安全基础架构来管理和缓解风险。该公司采用分层防御策略,利用自己的安全解决方案和服务以及第三方工具来防范对其网络、设备、服务器、应用程序、数据和云解决方案的攻击。IBM 的安全运营中心 (SOC) 监控威胁,从 IBM Security X-Force Exchange 平台获取情报。此外,IBM 聘请第三方审查其网络安全实践,并由其计算机安全事件响应小组 (CSIRT) 管理全球事件响应流程。该公司通过培训和教育计划培养安全意识文化,并通过专门的计划管理第三方供应商的风险。尽管网络安全威胁不断变化,但IBM没有发生任何对公司造成重大不利影响的事件。网络安全...展开全部
IBM Corp 已经实施了强大的网络安全基础架构来管理和缓解风险。该公司采用分层防御策略,利用自己的安全解决方案和服务以及第三方工具来防范对其网络、设备、服务器、应用程序、数据和云解决方案的攻击。IBM 的安全运营中心 (SOC) 监控威胁,从 IBM Security X-Force Exchange 平台获取情报。此外,IBM 聘请第三方审查其网络安全实践,并由其计算机安全事件响应小组 (CSIRT) 管理全球事件响应流程。该公司通过培训和教育计划培养安全意识文化,并通过专门的计划管理第三方供应商的风险。尽管网络安全威胁不断变化,但IBM没有发生任何对公司造成重大不利影响的事件。网络安全治理由企业与技术安全 (E&TS) 组织监督,由专门的首席信息安全官 (CISO) 领导该战略。首席信息安全官监督CSIRT和产品安全事件响应小组(PSIRT),重点关注产品漏洞。商业信息安全官员 (BISO) 与首席信息安全官就特定业务部门的安全问题进行协调。IBM 的网络安全咨询委员会 (CAC) 监督网络安全风险的管理,制定治理结构并审查事件以防止事件再次发生。
声明:本内容仅用作提供资讯及教育之目的,不构成对任何特定投资或投资策略的推荐或认可。 更多信息