{"id":179447,"date":"2017-07-09T18:54:18","date_gmt":"2017-07-09T22:54:18","guid":{"rendered":"https:\/\/www.cyberark.com\/cisoview\/"},"modified":"2024-03-19T03:44:30","modified_gmt":"2024-03-19T07:44:30","slug":"cisoview","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/ko\/cisoview\/","title":{"rendered":"CISOView"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>The CISO view<\/h1>\n<h2>Independent peer-to-peer guidance from industry-leading CISOs.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Download Now&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-executive-summary-protecting-privileged-access-in-a-zero-trust-model&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">About the CISO view research series<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>The CISO View report series is developed in conjunction with the independent research firm Robinson Insight and brings together leading CISOs for peer-to-peer information sharing to help security teams build effective cybersecurity programs.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 seesaw cybv2-pad-btm&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_aswr8gsmnr videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Protecting Privileged Access while transitioning to Zero Trust<\/h4>\n<p>Digital transformation and enterprise mobility are rapidly eroding the traditional perimeter-based model. As the perimeter dissolves, how can organizations protect access to their most valuable resources \u2013 data, applications, and infrastructure \u2013 on-premises or in the cloud?<\/p>\n<p>We interviewed a panel of 12 Global 1000 CISOs on the changing risk picture, including evolving attack techniques that target privileged access. They offered specific recommendations to mitigate risks using a Zero Trust model. This report is one of the first to offer practical and operational insights for CISOs and their teams on implementing a Zero Trust model.<\/p>\n<p>A companion to this report is\u00a0<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/the-ciso-view-2021-survey-zero-trust-and-privileged-access\">The CISO View 2021 Survey: Zero Trust and Privileged Access<\/a>. After hearing from our panel, we wanted to know if the larger security community shared their outlook. Therefore, we surveyed 100 security executives from large enterprises ($1 billion+ annual revenue), about their perspectives. The survey respondents and the panel both suggest a broad consensus around the value of Zero Trust and a growing sense of urgency for securing privileged access.[\/vc_column_text][vc_btn title=&#8221;Read Report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">More from the series<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Protecting Privileged Access in Robotic Process Automation<\/h4>\n<h6 class=\"vc_custom_heading\">Securing RPA Workflows<\/h6>\n<p>Robotic Process Automation (RPA) is a fast route to increased efficiency, productivity and quality. From a cyber security perspective, RPA also brings a new and attractive attack surface with the proliferation of privileged access as a prime concern.<\/p>\n<p>This CISO View research report examines issues such as: What techniques might an attacker use to exploit privileged access in RPA systems? What are the most significant risks? What controls are the most useful and feasible? What are the key success factors in working with business stakeholders?[\/vc_column_text][vc_btn title=&#8221;Read Report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-robotic-process-automation&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_n1cxswixdq videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_rl2yohwgz5 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Protecting Privileged Access<\/h4>\n<h6 class=\"vc_custom_heading\">Securing Devops and Cloud Environments<\/h6>\n<p>The rewards of rapid software development and automated IT operations are clear \u2013 faster time-to-market and reduced costs. But, what about the risks? How do you successfully secure DevOps and cloud environments?<\/p>\n<p>This CISO View research report drew from the experiences of CISOs from the Global 1000, as well as security professionals and technical experts who have adapted and secured DevOps environments.[\/vc_column_text][vc_btn title=&#8221;Read Report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-devops-and-cloud-environments&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Rapid Risk Reduction<\/h4>\n<h6 class=\"vc_custom_heading\">A 30-Day Sprint to Protect Privileged Credentials<\/h6>\n<p>How do you avoid a data breach? Ultimately, you need to know what techniques attackers use and what security controls can stop them. This CISO View research report provides an inside look at the lessons learned from several high-profile data breaches, as well as recommendations and a 30 day sprint framework to guide rapid implementation of key controls.[\/vc_column_text][vc_btn title=&#8221;Read Report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Frapid-risk-reduction-a-30-day-sprint-to-protect-privileged-credentials&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131862\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" alt=\"Rapid Risk Reduction\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131870\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg\" alt=\"The Balancing Act\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>The Balancing Act<\/h4>\n<h6 class=\"vc_custom_heading\">The CISO View on Improving Privileged Access Controls<\/h6>\n<p>This report provides practical guidance for CISOs to improve privileged access controls based on the first-hand knowledge of leading organizations. The guidance includes recommendations for establishing the balance between enabling and restricting high-levels of access to information assets.[\/vc_column_text][vc_btn title=&#8221;Read Report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-balancing-act-the-ciso-view-on-improving-privileged-access-controls&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 plp-overview-more-col&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-md-center heading&#8221; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6\">About the CISO view research approach and panel<\/h3>\n<p class=\"vc_custom_heading\">Today, organizations face increasingly sophisticated and challenging cyber threats. At CyberArk, we believe that sharing insights and guidance across the CISO community will help strengthen security strategies and lead to better-protected organizations.<\/p>\n<p class=\"vc_custom_heading\">CyberArk has commissioned an independent research firm, Robinson Insight, to develop The CISO View which explores topics related to improving privileged access controls. The initiative brings together CISOs from leading organizations across the globe to share their insights into critical issues facing security leaders with the goal of establishing valuable peer-to-peer guidance and dialog. Contributors to current and past reports, and members of The CISO View Research Panel include the following individuals.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131879\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg\" alt=\"Alissa Adbullah\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Alissa (Dr Jay) Abdullah<\/h4>\n<p>SVP and Deputy Chief Security Officer, Mastercard[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131887\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg\" alt=\"Brad Arkin\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Brad Arkin<\/h4>\n<p>SVP, Chief Security &amp; Trust Officer, Cisco[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131895\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg\" alt=\"Tim Bengson\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Tim Bengson<\/h4>\n<p>VP, Global Chief Information Security Officer, Kellogg Company[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131903\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg\" alt=\"Dawn Cappelli\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dawn Cappelli<\/h4>\n<p>VP, Global Security and Chief Information Security Officer, Rockwell Automation[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131911\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg\" alt=\"Melissa Carvalho\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Melissa Carvalho<\/h4>\n<p>VP, Enterprise and Customer Identity and Access Management,<br \/>\nRoyal Bank of Canada (RBC)[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131919\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg\" alt=\"Dave Estlick\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dave Estlick<\/h4>\n<p>Chief Information Security Officer, Chipotle[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131927\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg\" alt=\"Peter Fizelle\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Peter Fizelle<\/h4>\n<p>Chief Information Security Officer, Asian Development Bank[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131935\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg\" alt=\"Mike Gordon\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Gordon<\/h4>\n<p>VP and Chief Information Security Officer, Lockheed Martin Corporation (LMC)[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131943\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg\" alt=\"Omar Khawaja\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Omar Khawaja<\/h4>\n<p>VP and Chief Information Security Officer, Highmark Health[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131951\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg\" alt=\"Olivier Perrault\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Olivier Perrault<\/h4>\n<p>Cyber Security Officer, Orange Business Services[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131959\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg\" alt=\"Emma Smith\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Emma Smith<\/h4>\n<p>Global Security Director, Vodafone[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131967\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg\" alt=\"Daniel Tse\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Daniel Tse<\/h4>\n<p>Head, Cyber Security, Information &amp; Technology Risk, GIC Private Limited[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 plp-overview-more-col&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-md-center heading&#8221; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3>Contributors to prior reports include the following individuals<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Rob Bening<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer Emeritus, ING Bank<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">David Bruyea<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, CIBC<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Connelly<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Lockheed Martin<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Khadir Fayaz<\/h4>\n<p class=\"vc_custom_heading\">Vice President, Global Security Strategy, Engineering &amp; Architecture, Pearson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Gelinne<\/h4>\n<p class=\"vc_custom_heading\">Managing Director, Advisory Cyber Risk Services, Deloitte &amp; Touche<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Fred Gibbins<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, American Express Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Charles Gillman<\/h4>\n<p class=\"vc_custom_heading\">Chief Security Officer, NTT Communications &#8211; Cloud Infrastructure Services<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Steve Glynn<\/h4>\n<p class=\"vc_custom_heading\">Global Head of Information Security, ANZ<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mark Grant<\/h4>\n<p class=\"vc_custom_heading\">PhD, CIPP Chief Information Security Officer, CSX Corporation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Gary Harbison<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, Monsanto Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Motes<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Kathy Orner<\/h4>\n<p class=\"vc_custom_heading\">Chief Risk Officer, CWT<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Wilson<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, McKesson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">JD Rogers<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, American Financial Group<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Schramm<\/h4>\n<p class=\"vc_custom_heading\">CISA, CISSP, VP Global Information Risk Management &amp; CIRO, Manulife<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Chun Meng Tee<\/h4>\n<p class=\"vc_custom_heading\">Vice President and Head of Information Security, Singapore Exchange<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Thomas Tschersich<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President, Internal Security &amp; Cyber Defense, T-Systems International<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Munawar Valiji<\/h4>\n<p class=\"vc_custom_heading\">Head of Information Security, News UK<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-center&#8221;][vc_column][vc_column_text]*Represents role at time of contribution.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_talk_to_an_expert&#8221; css=&#8221;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;extra-space&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Get started<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section9_text&#8221;]<\/p>\n<p style=\"text-align: center;\">Leverage the expertise of the industry\u2019s most innovative CISOs to help you build an effective cybersecurity program today.<\/p>\n<p>[\/vc_column_text][vc_btn title=&#8221;Download Now&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model%2F&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] The CISO view Independent peer-to-peer guidance from industry-leading CISOs. [\/vc_column_text][vc_btn title=&#8221;Download Now&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-executive-summary-protecting-privileged-access-in-a-zero-trust-model&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text] About the CISO view research series&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-179447","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CISO Reports: Privileged Access Management for CISOs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ko\/cisoview\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISOView\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] The CISO view Independent peer-to-peer guidance from industry-leading CISOs. [\/vc_column_text][vc_btn title=&#8221;Download Now&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-executive-summary-protecting-privileged-access-in-a-zero-trust-model&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text] About the CISO view research series...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ko\/cisoview\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-19T07:44:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"9\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/cisoview\/\",\"url\":\"https:\/\/www.cyberark.com\/ko\/cisoview\/\",\"name\":\"CISO Reports: Privileged Access Management for CISOs\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/cisoview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/cisoview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"datePublished\":\"2017-07-09T22:54:18+00:00\",\"dateModified\":\"2024-03-19T07:44:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ko\/cisoview\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ko\/cisoview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/cisoview\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ko\/cisoview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISOView\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO Reports: Privileged Access Management for CISOs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ko\/cisoview\/","og_locale":"ko_KR","og_type":"article","og_title":"CISOView","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] The CISO view Independent peer-to-peer guidance from industry-leading CISOs. [\/vc_column_text][vc_btn title=&#8221;Download Now&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-executive-summary-protecting-privileged-access-in-a-zero-trust-model&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text] About the CISO view research series...","og_url":"https:\/\/www.cyberark.com\/ko\/cisoview\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-03-19T07:44:30+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"9\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ko\/cisoview\/","url":"https:\/\/www.cyberark.com\/ko\/cisoview\/","name":"CISO Reports: Privileged Access Management for CISOs","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/ko\/cisoview\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/ko\/cisoview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","datePublished":"2017-07-09T22:54:18+00:00","dateModified":"2024-03-19T07:44:30+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ko\/cisoview\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ko\/cisoview\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/ko\/cisoview\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ko\/cisoview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"CISOView"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/comments?post=179447"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/pages\/179447\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/media?parent=179447"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/ko\/wp-json\/wp\/v2\/product_category?post=179447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}