What are the highlights of the 2022 Data Security Technology Conference?

“Ensuring data security is a complex project. It is necessary to build a data security system from multiple dimensions such as strategy, management, system, product, and technology, and use advanced data security technology to solve data security problems in new scenarios.” The experts agreed that .

In recent years, China’s digital economy has developed rapidly and has been deeply integrated into various fields of the national economy. Relevant data shows that from 2018 to 2025, the annual average growth rate of China’s total data volume is expected to reach 30%, exceeding the global average; in 2025, China’s data circle will increase to 48.6ZB, accounting for 27.8% of the global total data volume , become the world’s largest data circle. With the surge in data volume and the increasing frequency of data flow, strong data security protection and flow supervision will become an important guarantee for national security.

From September 6th to 7th, the 2022 Data Security Technology Conference and the Annual Meeting of the Information Security Professional Committee of the China Information Association were officially held in Beijing. The conference focused on data security technology innovation, data security compliance, best customer practices, industrial development and other directions. In the main forum, leaders, experts and business representatives from multiple departments discussed new opportunities, new challenges and new ideas faced by the data security industry. Explore. At the same time, the sub-forum focuses on the “tracks” of 6 major industries: government affairs, intelligent manufacturing, automobiles, Internet, laws and regulations, and finance, further uniting the ecological forces of the data security industry to promote the safe and stable development of the digital economy.

race track

NO.1

Focus on government affairs industry – add “safety lock” to data

In the digital age, strengthening the construction of digital government is an important measure to innovate the concept of government governance and promote the modernization of the national governance system and governance capacity. At present, it has entered a new journey of digital government construction, and data security governance has become a necessary means to ensure the security of government data. Digital transformation is not only a major opportunity for the development of the digital economy, but also faces very severe challenges. A number of leaders and experts have fully elaborated on the current situation of government big data, the difficulties it faces, the capabilities and plans for building a data security governance system, and so on. With the development of the digital economy, the transformation of digital government has become an inevitable trend. Data must be interconnected, but important data must also be “locked”.

race track

NO.2

Focus on the intelligent manufacturing industry – forging data protection “armor”

In the past decade or so, the rapid development of information technologies such as the Internet of Things, 5G, and artificial intelligence has driven the manufacturing industry to embark on the fast lane of intelligent development. At the same time, data leakage, phishing attacks, supply chain attacks, ransomware attacks and other security threats against intelligent manufacturing enterprises emerge in an endless stream. New opportunities and new eras, how to deal with data security issues? How to balance data sharing and privacy protection? This is a difficult problem for the sustainable development of the intelligent manufacturing industry. Once private data is leaked, there will be a “cask effect”. After a place is breached, the user’s identity, vehicle, work, financial and other private information may be leaked. From the perspective of industry development, many experts brought experience sharing and innovative practices in network security management, data security protection, and data security governance in the intelligent manufacturing industry, and worked together to forge data protection “armor”.

race track

NO.3

Focus on the automotive industry – let data drive on the “safe road”

China’s automobile intelligence and networking process has been at the forefront of the world. While the smart connected car brings us convenience, it also leads to an increase in the scale of data breaches. As the correlation between the driver and the car increases, smart cars generate a large amount of data, and more and more car data will be collected and used on a large scale, which also raises data and privacy protection issues. The data security of intelligent networked vehicles is not only related to user security, but also to national security. Faced with the “points, lines, and planes” of data risks in the automotive industry, data security companies and car companies must work together to build a data security system to ensure that car data is always on the “safe road”.

race track

NO.4

Focus on the Internet Industry – Be the “Goalkeeper of Data Security”

The development prospects of my country’s digital economy are bright and promising. In the process of the rapid development of the Internet industry, we need to further mobilize the forces of all parties to deeply integrate the Internet economy and the real economy on a wider, deeper and higher level. The construction of the Internet data security system needs to consider business, compliance, technology, consulting, etc., to ensure the security of data flow, use, and storage, to carry out more fine-grained control of data permissions, and to jointly build an advanced data security system. Being a good data security “goalkeeper” and consciously maintaining data security is the direction we need to work hard together.

race track

NO.5

Focus on laws and regulations – build a firm data compliance “dam”

The implementation of laws and regulations such as the “Data Security Law”, “Personal Information Protection Law”, “Measures for the Security Assessment of Data Exports” aims to regulate data export activities, protect the rights and interests of personal information, safeguard national security and social public interests, and promote the cross-border transfer of data. security and free movement. Clarifying the specific provisions of data security laws and regulations is the need to promote the healthy development of the digital economy, prevent and resolve data security risks, protect the rights and interests of personal information, and safeguard national security and social and public interests. Data security compliance is the baseline, not the highest goal of data security. Our goal is to ensure the rapid development of business on the premise of data security and compliance through technical means.

race track

NO.6

Focus on the financial industry – building a “pyramid” of data security

As the financial industry enters the digital age, data security and data management have become important issues.

Finance is one of the fields that generates and accumulates the largest amount of data and the most abundant data types. The role of current data is also becoming increasingly prominent. Financial data has become the preferred target of cyber attacks due to its huge value. Data security and personal information protection are in the new era. The times are also facing new risks and challenges. How to ensure data security, promote the legal, safe and effective circulation of data, and give full play to the comprehensive value of data is an important issue facing the financial industry. The financial industry needs to rely on laws and regulations, data classification and grading technology, and data security governance solutions to build an intelligent data security system. On the premise of a clear bottom line, vigorously promote the efficient flow and open integration of data, and realize the intelligence of dynamic and flowing data. Security.

The first anniversary of the implementation of the “Data Security Law” has achieved remarkable results

Zhou Min, deputy director of the State Information Center, said that since the implementation of the Data Security Law one year ago, my country’s data security governance has achieved certain results. But there is still much room for improvement. At present, my country’s data security innovation capability is insufficient, and some key core technologies are still controlled by others, which brings challenges to data security governance to a certain extent. Data security governance has a long way to go. It requires the joint participation of multiple subjects such as the government, scientific research institutions, enterprises and institutions, industry organizations, and individuals to give full play to their respective advantages, assume the responsibility of the main body of data security governance, and jointly create a coordinated governance model that meets the requirements of the data economy era.

740

Su Shaolin, Secretary of the Party Leadership Group and Director of the Beijing Municipal Communications Administration, said: Data security threat management has become a strategic need to promote steady economic and social development and maintain national security. Only by building a solid foundation for data security can we escort the high-quality development of the digital economy. The purpose of this conference is to conscientiously implement General Secretary Xi Jinping’s strategic thinking on the overall national security concept, coordinate development and security, coordinate traditional security and non-traditional security, promote the sustainable, healthy and rapid development of data security technology, and consolidate the foundation of the digital economy. This is of particular importance at the moment. The Beijing Municipal Communications Administration will, as always, support the exchanges and cooperation of companies with technology and strength like SkyGuard, and promote the innovation and progress of the data and information security industry, as well as win-win cooperation.

740 Su Shaolin, Secretary of the Party Leadership Group and Director of the Beijing Municipal Communications Administration

Liu Li, deputy director of the Beijing Economic and Technological Development Zone Management Committee, mentioned that data security is the key to escorting the development engine of the digital economy, and it is the premise for building new advantages and leading the new track in the digital age. I hope that you will conduct in-depth discussions and full exchanges through this conference forum, and take this opportunity to give full play to the advantages of leading enterprises in technical talents and the main role of technological innovation, promote exchanges and cooperation in the field of data security, and carry out digital security basic theoretical innovation. Major issues Research and core technology research, create a new generation of digital security ecology, help the innovation and development of digital security technology, and continue to make new contributions to the development of data security technology and the high-quality development of the digital economy.

740 Liu Li, Deputy Director of the Management Committee of Beijing Economic and Technological Development Zone

Ye Hong, director of the Information Security Professional Committee of the China Information Association, said: The current century-old situation and the epidemic of the century overlap, the international situation is becoming more and more complex, and cyber hegemony poses a threat to world peace and development. The situation is complex and changeable. With the in-depth development of the digital economy, new risks and new challenges are bound to emerge. Therefore, it is necessary to further establish the bottom line thinking of digital security, around the data security law, personal information protection law and other relevant laws and regulations, improve the construction of data security supporting system, clarify the boundaries of data security responsibilities, strengthen supervision functions, and compact the main responsibilities.

740 Ye Hong, Director of Information Security Professional Committee of China Information Association

At this conference, Feng Dengguo, an academician of the Chinese Academy of Sciences, brought us the theme sharing of “Current Situation and Trends of Confidential Computing Development”. Academician Feng said: Confidential computing can provide a security solution for solving the contradiction between data protection and utilization, and realizing the “available and invisible” of data in the process of multi-party information circulation. In the sharing, Academician Feng focused on the basic goals and definitions of confidential computing and its own characteristics, expounded the technical route, application scenarios and application examples of confidential computing development, analyzed the development prospects and trends of confidential computing, and looked forward to confidential computing. the main technical development direction.

740 Feng Dengguo, Academician of the Chinese Academy of Sciences

Meng Xiangfei, chief scientist of application research and development of the National Supercomputing Center in Tianjin, brought us the content sharing of “Driving the Development of Data Industry with Domestic Credit Innovation”. Professor Meng said: The transformation of information technology driven by data and computing power is fundamental and permanent in reshaping innovation paradigms and production methods. The development of the data industry is related to the national economy and people’s livelihood. It is necessary to strengthen the construction of independent digital bases for computing, data, and intelligence, and to strengthen the domestic cycle of digital economy development China’s production, innovation, and security. It is necessary to support the construction of big data institutions and platforms that are controllable by the government, open to the society, and have third-party credibility, promote the improvement of national cross-regional data sharing and circulation facilities and mechanisms, and achieve the comprehensive goals of data strategic security and industrial value release.

740 Meng Xiangfei, chief scientist of application research and development of the National Supercomputing Center in Tianjin

In recent years, my country has attached great importance to data security, and successively promulgated and implemented the “Data Security Law” and “Personal Information Protection Law”. Safeguarding national sovereignty, security and development interests and providing legal guarantees. Fan Chunling, the network security supervision department, delivered a keynote speech on “Strengthening Network and Data Security Protection”, analyzing the current situation and corresponding protection measures and countermeasures for the prominent problems in current hierarchical protection, especially data security.

Shangguan Xiaoli, Deputy Secretary-General of the National Information Security Standardization Technical Committee, introduced the introduction of my country’s data security standardization work. The content includes: analysis of the current data security situation, interpretation of data security-related policies and regulations issued in my country in recent years, the overall situation of national standards for data security and personal information protection, and standards supporting the Data Security Law and the Personal Information Protection Law The important role played in the implementation of specific provisions, as well as the key standards for data security and personal information protection to be formulated by the Information Security Standards Committee in the next step.

740 Shangguan Xiaoli, Deputy Secretary General of the National Information Security Standardization Technical Committee

With the continuous flow of data elements, various new methods of data theft, tampering, and abuse are introduced, which brings new challenges to data security governance. At present, there is an urgent need for a technology as a starting point to implement the data security system and build a strong data security defense line. Yang Mingfei, director, partner and senior technical director of Beijing Skyguard Network Security Technology Co., Ltd., brought you the content sharing of “Data Security Governance Technology – Multi-dimensional Data Leak Prevention (MDLP)”. Mr. Yang said: Data security governance first needs to classify and grade data, that is, to adopt different protection methods for different types and levels of data. And DLP is the best tool for classification and grading. As the leader of domestic DLP technology, SkyGuard has solved the difficult problem of data classification and classification process, simplified the entire classification and classification process, and greatly reduced the difficulty of DLP deployment and use. The multi-dimensional data leakage prevention (MDLP) can cover the entire IT architecture of the entire enterprise, including the network, terminal, mobile terminal, application terminal, and cloud.

740 Yang Mingfei, Director, Partner and Senior Technical Director of Beijing Skyguard Network Security Technology Co., Ltd.

“Six modernizations and one management”, the data security governance automation system was officially released

As an important part of this conference, Sky Guardian released the most cutting-edge data security technology – Data Security Governance Automation System (DSAG).

740 Liu Lin, founder and CEO of Beijing Skyguard Network Security Technology Co., Ltd.

Data Security Governance Automation (DSAG) identifies structured and unstructured data through automation technology, from the discovery of data resources within the enterprise to the classification and classification of data, and takes the data classification and classification objects as the core, and user behavior analysis as an enhancement method. The configuration and execution of data security policies comprehensively cover every aspect of the data security governance cycle. DSAG uses reasonable automation technology to minimize manual intervention, use intelligent assistance in necessary manual links, reduce human errors, and improve the security of data work with higher efficiency and effectiveness. 

The highlights of DSAG can be summarized as “six modernizations and one management”, namely, data classification and grading automation, data security processing automation, behavior analysis intelligence, comprehensive data desensitization, API data content analysis fine-grained, DSAG programming management visualization, first-in-command Data security management “a pen”.

Data Security Technology Work Department, to promote the prosperity and development of the industry

Under the leadership of the Information Security Professional Committee of the China Information Association, the Data Security Technical Work Department brings together outstanding data security companies, talents and technologies in China, strengthens China’s data security team, and creates an open platform for data security manufacturers to participate and communicate together. Promote the integration of data security technology and artificial intelligence, and promote the prosperity and development of my country’s data security industry.

Member units of the Data Security Technical Work Department:

740

The Data Security Technology Work Department will focus on users in my country’s intelligent manufacturing, finance, automotive, medical, Internet and other industries, and provide data security governance solutions, industry research, and policy consultation and other services according to their data business development needs.

Members of the Data Security Technical Work Department unveiled

The establishment of this work department means that China’s data security industry has taken an important step in the direction of a digital intelligent ecological chain.

On the first anniversary of the promulgation of the “Data Security Law of the People’s Republic of China”, the 2022 First Data Security Technology Conference “promoting the implementation of data security governance system technology with new technologies” is just in time, aiming to resolutely implement the relevant national data security work Through advanced data security technology, the safe and orderly flow of national, industry, enterprise and personal data is guaranteed, open and shared, the value of data is brought into play, and new ideas and opportunities for data security development will be explored together with colleagues in the industry. , new ways and new trends, promote the healthy and high-quality development of the data industry, build a secure foundation for the development of the digital economy, provide strong support for data security, and contribute to the construction of a digital China and a smart society. (Leifeng Network)

This article is reprinted from: https://www.leiphone.com/category/gbsecurity/rfxqDbxxQp3sX6aR.html
This site is for inclusion only, and the copyright belongs to the original author.

Leave a Comment