share_log

IBM Corp | 10-K: Annual report

IBM Corp | 10-K:年度報表

SEC announcement ·  02/26 06:45
Moomoo AI 已提取核心訊息
IBM Corp has implemented a robust cybersecurity infrastructure to manage and mitigate risks. The company employs a layered defense strategy, utilizing its own security solutions and services, as well as third-party tools, to protect against attacks on its networks, devices, servers, applications, data, and cloud solutions. IBM's Security Operations Center (SOC) monitors threats, drawing intelligence from the IBM Security X-Force Exchange platform. Additionally, IBM engages third parties to review its cybersecurity practices and has a global incident response process managed by its Computer Security Incident Response Team (CSIRT). The company fosters a culture of security awareness through training and educational initiatives and manages third-party supplier risks through a dedicated program. Despite the evolving cybersecurity threats, IBM...Show More
IBM Corp has implemented a robust cybersecurity infrastructure to manage and mitigate risks. The company employs a layered defense strategy, utilizing its own security solutions and services, as well as third-party tools, to protect against attacks on its networks, devices, servers, applications, data, and cloud solutions. IBM's Security Operations Center (SOC) monitors threats, drawing intelligence from the IBM Security X-Force Exchange platform. Additionally, IBM engages third parties to review its cybersecurity practices and has a global incident response process managed by its Computer Security Incident Response Team (CSIRT). The company fosters a culture of security awareness through training and educational initiatives and manages third-party supplier risks through a dedicated program. Despite the evolving cybersecurity threats, IBM has not experienced any incidents with a material adverse effect on the company. Governance of cybersecurity is overseen by the Enterprise & Technology Security (E&TS) organization, with a dedicated Chief Information Security Officer (CISO) leading the strategy. The CISO oversees the CSIRT and the Product Security Incident Response Team (PSIRT), focusing on product vulnerabilities. Business Information Security Officers (BISO) coordinate with the CISO on security issues specific to business segments. IBM's Cybersecurity Advisory Committee (CAC) oversees the management of cybersecurity risk, setting governance structures and reviewing incidents to prevent recurrence.
IBM Corp 已經實施了強大的網絡安全基礎架構來管理和緩解風險。該公司採用分層防禦策略,利用自己的安全解決方案和服務以及第三方工具來防範對其網絡、設備、服務器、應用程序、數據和雲解決方案的攻擊。IBM 的安全運營中心 (SOC) 監控威脅,從 IBM Security X-Force Exchange 平台獲取情報。此外,IBM 聘請第三方審查其網絡安全實踐,並由其計算機安全事件響應小組 (CSIRT) 管理全球事件響應流程。該公司通過培訓和教育計劃培養安全意識文化,並通過專門的計劃管理第三方供應商的風險。儘管網絡安全威脅不斷變化,但IBM沒有發生任何對公司造成重大不利影響的事件。網絡安全...展開全部
IBM Corp 已經實施了強大的網絡安全基礎架構來管理和緩解風險。該公司採用分層防禦策略,利用自己的安全解決方案和服務以及第三方工具來防範對其網絡、設備、服務器、應用程序、數據和雲解決方案的攻擊。IBM 的安全運營中心 (SOC) 監控威脅,從 IBM Security X-Force Exchange 平台獲取情報。此外,IBM 聘請第三方審查其網絡安全實踐,並由其計算機安全事件響應小組 (CSIRT) 管理全球事件響應流程。該公司通過培訓和教育計劃培養安全意識文化,並通過專門的計劃管理第三方供應商的風險。儘管網絡安全威脅不斷變化,但IBM沒有發生任何對公司造成重大不利影響的事件。網絡安全治理由企業與技術安全 (E&TS) 組織監督,由專門的首席信息安全官 (CISO) 領導該戰略。首席信息安全官監督CSIRT和產品安全事件響應小組(PSIRT),重點關注產品漏洞。商業信息安全官員 (BISO) 與首席信息安全官就特定業務部門的安全問題進行協調。IBM 的網絡安全諮詢委員會 (CAC) 監督網絡安全風險的管理,制定治理結構並審查事件以防止事件再次發生。
声明:本內容僅用作提供資訊及教育之目的,不構成對任何特定投資或投資策略的推薦或認可。 更多信息