Building a Solid Network Security Barrier and Deepening Collaborative Governance of Security | Network | Barrier
On September 12th, the 20th China Cybersecurity Annual Conference and National Cybersecurity Propaganda Week Cybersecurity Collaborative Governance Sub Forum, with the theme of "Deepening Collaborative Governance and Building Security Barriers Together", was held in Fuzhou, Fujian. More than 200 experts and representatives from competent departments of network security, scientific research institutes, and enterprises in relevant industries participated in the meeting, and carried out exchanges and discussions around network security threat governance, emergency response, vulnerability governance, mobile Internet security governance, and other contents to promote the healthy and standardized development of network security related industries.
Zhang Hong, Deputy Director of the National Computer Network Emergency Technology Coordination Center, stated that in recent years, China's network legal construction has been continuously improved, data security and personal information protection work has continued to deepen, network security threat detection and disposal capabilities have steadily improved, and cyberspace security barriers have been further improved.
Hu Xiao, Director of the Network Data Management Bureau of the Central Cyberspace Administration, stated that in order to focus on the development and collaborative governance of network security, it is necessary to strictly implement the responsibility system for network security work and build a comprehensive and collaborative network security protection system; To maintain network security in an open environment, we must adhere to a balance between controllable security and open innovation; To carry out technological breakthroughs in response to major national needs and highlight research on the security of new technology applications; We need to continuously enhance the overall awareness of cybersecurity in society and fully leverage the important role of the people in cybersecurity.
With the rapid development of Internet and digital technology, network threats are also increasing. From personal privacy leakage to national security issues, China's network governance still faces many challenges. How to build a digital security system in this context? Shen Changxiang, an academician of the CAE Member, believes that in the face of increasingly serious cyberspace threats, we should build an active immune, secure and credible network power security system based on network security laws, strategies and systems.
What is an "active immunity, safe and reliable protection system"? Shen Changxiang stated that it is a new computing mode that simultaneously performs security protection, which can timely identify "self" and "non self" components, thereby destroying and repelling harmful substances entering the body, avoiding the one-sided computing mode of traditional passive defense that only focuses on computing efficiency rather than security protection, and cultivating immune capabilities for network information systems.
"We need to recognize the essence of cybersecurity, focus on building a trustworthy computing 3.0 industry ecosystem, and strive for self-reliance to create the era of trustworthy computing 3.0, seizing the core technological high ground. At the same time, we need to implement a level protection system, integrate level protection, level protection, and password support, build a complete national cyberspace security system, and strengthen the foundation of a strong cyber nation." Shen Changxiang said.
Building a new pattern of collaborative governance has gradually become a consensus in the industry. In the theme report segment, relevant leaders from Antan, 360 Digital Security, Green Alliance Technology, Tianrongxin, Qi'anxin, Shenxin Technology, Zhichuangyu, Alibaba Cloud, Huawei, Anheng Information, Kaspersky, and others also shared wonderful views and practical cases on deepening collaborative governance of network security around the conference theme.
"With the advancement of information technology, the complexity of information systems, and the increasing size of information assets, security threats are also constantly evolving." In the view of Xiao Xinguang, founder of Antian Technology Group Co., Ltd., China's network security has a good operational foundation in overall security monitoring, emergency response linkage, risk notification mechanisms, etc., but it is clearly not enough. The network security operation model dominated solely by market commodity supply is no longer sufficient to cope with network security threats. The mature experience in public security fields such as fire protection and epidemic prevention is worth learning from and referring to in the field of network security.
Ye Xiaohu, Chief Technology Officer and Senior Vice President of Green Alliance, believes that data security cannot be separated from the two core propositions of secure storage and secure circulation. Facing the risk of data leakage due to excessive permissions of internal data operation and maintenance personnel in the enterprise; A series of new data security issues, such as the inability to achieve fine-grained control in data circulation, require the creation of a secure and trustworthy data security technology system around three key points: data asset management, data control and access management, and data sharing and exchange.
The opening ceremony of the 2023 China Cybersecurity Technology Competition and Cybersecurity Crowdsourcing Competition was also held at the same time at the conference, promoting the gathering of resource elements and exploring collaborative innovative development models.
[
![Building a Solid Network Security Barrier and Deepening Collaborative Governance of Security | Network | Barrier](https://a5qu.com/upload/images/8d89328460b7e589a8f54bbdd3cd43d5.jpg)