{"id":283,"date":"2022-06-23T14:21:15","date_gmt":"2022-06-23T14:21:15","guid":{"rendered":"https:\/\/securitybriefing.net\/?page_id=283"},"modified":"2025-09-08T20:40:33","modified_gmt":"2025-09-08T20:40:33","slug":"%ec%86%8c%ea%b0%9c","status":"publish","type":"page","link":"https:\/\/securitybriefing.net\/ko\/%ec%86%8c%ea%b0%9c\/","title":{"rendered":"\ud68c\uc0ac \uc18c\uac1c"},"content":{"rendered":"<p>\ubcf4\uc548 \ube0c\ub9ac\ud551\uc740 \uc138\uacc4 \ucd5c\ucd08\uc774\uc790 \ucd5c\ub300 \uaddc\ubaa8\uc758 \ucd5c\uace0 \uc815\ubcf4 \ubcf4\uc548 \ucc45\uc784\uc790(CISO) \ubc0f \ubcf4\uc548 \uc804\ubb38\uac00 \ucee4\ubba4\ub2c8\ud2f0\uc785\ub2c8\ub2e4. \uc800\ud76c\ub294 \uc0ac\uc774\ubc84 \uacf5\uac04\uc758 \uaca9\ucc28\ub97c \uc881\ud788\uae30 \uc704\ud574 \uc0ac\uace0 \ub9ac\ub354\uc2ed\uacfc \uc6b4\uc601 \uc219\ub828\ub3c4\uac00 \ub3c5\ud2b9\ud558\uac8c \uc870\ud654\ub97c \uc774\ub8e8\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc800\ud76c\ub294 \ub3c5\uc790\ub4e4\uc5d0\uac8c \uac00\uc7a5 \uc911\uc694\ud55c \ub514\uc9c0\ud138 \uc790\uc0b0\uc744 \ubcf4\ud638\ud558\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc904 \uc218 \uc788\ub294 \uc5c5\uacc4 \ucd5c\uace0\uc758 \uc778\uc7ac\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. \ubcf4\uc548 \ube0c\ub9ac\ud551\uc744 \ud1b5\ud574 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc704\ud5d8 \ud3c9\uac00, \uc0ac\uace0 \ub300\uc751 \ubc0f \ud3ec\ub80c\uc2dd \ubd84\uc57c\uc758 \ub3c5\ubcf4\uc801\uc778 \uc804\ubb38 \uc9c0\uc2dd\uc744 \uc811\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc800\ud76c\uc758 \uc0ac\uba85\uc740 \ube44\uc988\ub2c8\uc2a4\uac00 \ub370\uc774\ud130 \uc720\ucd9c\uc774\ub098 \uae30\ud0c0 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc758 \ud76c\uc0dd\uc591\uc774 \ub418\uc9c0 \uc54a\ub3c4\ub85d \ud558\ub294 \uac83\uc785\ub2c8\ub2e4. <\/p>\n\n\n\n<p>\uc0ac\uc774\ubc84 \ubc94\uc8c4\ub294 \uae00\ub85c\ubc8c \uc194\ub8e8\uc158\uc774 \ud544\uc694\ud55c \uc804 \uc138\uacc4\uc801\uc778 \ubb38\uc81c\ub77c\ub294 \uac83\uc744 \uc798 \uc54c\uace0 \uc788\uae30 \ub54c\ubb38\uc5d0 \uc804 \uc138\uacc4 \ucd5c\uace0\uc758 \uc778\uc7ac\ub4e4\uc774 \ubaa8\uc5ec \uc0ac\uc774\ubc84 \uc704\ud611\uc5d0 \ub300\ud55c \uc870\uc9c1\uc758 \uc704\ud5d8 \ub178\ucd9c\uc744 \uc904\uc774\uae30 \uc704\ud574 \ub178\ub825\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc5bc\ub77c\uc774\uc5b8\uc2a4 \ud68c\uc6d0\ub4e4\uc740 \uc9c0\uc2dd\uc744 \uacf5\uc720\ud558\uace0 \uc194\ub8e8\uc158\uc5d0 \ub300\ud574 \ud611\ub825\ud558\uc5ec \uace0\uac1d\uc5d0\uac8c \ube44\uc988\ub2c8\uc2a4\ub97c \ubcf4\ud638\ud560 \uc218 \uc788\ub294 \uc62c\ubc14\ub978 \ub3c4\uad6c, \ud504\ub85c\uc138\uc2a4 \ubc0f \uae30\uc220\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \ub610\ud55c \uc548\uc804\ud55c \uc628\ub77c\uc778 \ud658\uacbd\uc744 \uc870\uc131\ud558\uae30 \uc704\ud55c \ub178\ub825\uc758 \uc77c\ud658\uc73c\ub85c \uc5c5\uacc4 \uc804\ubb38\uac00\uc640 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ucee8\uc124\ud134\ud2b8\ub97c \uc704\ud55c \uc6b4\uc601 \ubc0f \uc804\ub7b5\uc801 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uc804\ubb38 \uad50\uc721 \uacfc\uc815\uacfc \ub124\ud2b8\uc6cc\ud0b9 \uae30\ud68c\ub3c4 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc0ac\uc774\ubc84 \uacf5\uac04\uc758 \ubbf8\ub798\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud55c \ub178\ub825\uc5d0 \ub3d9\ucc38\ud574 \uc8fc\uc138\uc694.<\/p>\n\n\n\n<ul class=\"wp-block-social-links is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/profile.php?id=100083096924332\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewbox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">\ud398\uc774\uc2a4\ubd81<\/span><\/a><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<a class=\"twitter-timeline\" data-width=\"750\" data-height=\"1000\" data-dnt=\"true\" href=\"https:\/\/twitter.com\/scrtbriefing?ref_src=twsrc%5Etfw\">\uc2a4\ud06c\ub9bf\ube0c\ub9ac\ud551\uc758 \ud2b8\uc717<\/a><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p><strong>\uc774\ubbf8\uc9c0 \ud30c\ud2b8\ub108<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/depositphotos.com\" target=\"_blank\"><img decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\" alt=\"Main logo black\" class=\"wp-image-4531\" style=\"width:218px;height:auto\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-300x75.png 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-768x192.png 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-18x5.png 18w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\ubcf4\uc548 \ube0c\ub9ac\ud551\uc740 \uc138\uacc4 \ucd5c\ucd08\uc774\uc790 \ucd5c\ub300 \uaddc\ubaa8\uc758 \ucd5c\uace0 \uc815\ubcf4 \ubcf4\uc548 \ucc45\uc784\uc790(CISO) \ubc0f \ubcf4\uc548 \uc804\ubb38\uac00 \ucee4\ubba4\ub2c8\ud2f0\uc785\ub2c8\ub2e4. \uc6b0\ub9ac\ub294 \uc0ac\uc0c1\uc801 \ub9ac\ub354\uc2ed\uacfc \uc6b4\uc601\uc801 \uc804\ubb38\uc131\uc744 \uacb0\ud569\ud558\uc5ec\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%86%8c%ea%b0%9c\/\"><span class=\"screen-reader-text\">\ud68c\uc0ac \uc18c\uac1c<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-283","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>About Security Briefing: For CISO Pros | Security Briefing<\/title>\n<meta name=\"description\" content=\"Learn about Security Briefing, the global community for CISOs and cybersecurity professionals sharing expert analysis, threat intel, and best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc18c\uac1c\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Security Briefing: For CISO Pros | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Learn about Security Briefing, the global community for CISOs and cybersecurity professionals sharing expert analysis, threat intel, and best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc18c\uac1c\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-08T20:40:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/about-us\/\",\"url\":\"https:\/\/securitybriefing.net\/about-us\/\",\"name\":\"About Security Briefing: For CISO Pros | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\",\"datePublished\":\"2022-06-23T14:21:15+00:00\",\"dateModified\":\"2025-09-08T20:40:33+00:00\",\"description\":\"Learn about Security Briefing, the global community for CISOs and cybersecurity professionals sharing expert analysis, threat intel, and best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/about-us\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/about-us\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About Security Briefing: For CISO Pros | Security Briefing","description":"Learn about Security Briefing, the global community for CISOs and cybersecurity professionals sharing expert analysis, threat intel, and best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc18c\uac1c\/","og_locale":"ko_KR","og_type":"article","og_title":"About Security Briefing: For CISO Pros | Security Briefing","og_description":"Learn about Security Briefing, the global community for CISOs and cybersecurity professionals sharing expert analysis, threat intel, and best practices.","og_url":"https:\/\/securitybriefing.net\/ko\/\uc18c\uac1c\/","og_site_name":"Security Briefing","article_modified_time":"2025-09-08T20:40:33+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"2\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/about-us\/","url":"https:\/\/securitybriefing.net\/about-us\/","name":"About Security Briefing: For CISO Pros | Security Briefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/about-us\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/about-us\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png","datePublished":"2022-06-23T14:21:15+00:00","dateModified":"2025-09-08T20:40:33+00:00","description":"Learn about Security Briefing, the global community for CISOs and cybersecurity professionals sharing expert analysis, threat intel, and best practices.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/about-us\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/about-us\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/about-us\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/09\/main-logo-black-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/about-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"About Us"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/pages\/283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":1,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/pages\/283\/revisions"}],"predecessor-version":[{"id":4532,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/pages\/283\/revisions\/4532"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=283"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}