{"id":571,"date":"2021-07-03T09:49:31","date_gmt":"2021-07-03T01:49:31","guid":{"rendered":"https:\/\/choson_steven.lifenet.com.tw\/?p=571"},"modified":"2023-03-29T16:32:33","modified_gmt":"2023-03-29T08:32:33","slug":"%e6%88%b0%e7%95%a5%e5%b1%a4%e6%ac%a1levels-of-strategy","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=571","title":{"rendered":"\u6230\u7565\u5c64\u6b21(Levels of Strategy)"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210703\/20132160GUaj6oJC0O.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210703\/20132160GUaj6oJC0O.jpg\"><br>-\u6230\u7565\u5c64\u6b21<br>\u901a\u5e38\uff0cCEO \u8ca0\u8cac\u5236\u5b9a\u516c\u53f8\u6230\u7565\u6216\u5927\u6230\u7565\uff0c\u8463\u4e8b\u6703\u7684\u610f\u898b\u548c\u9ad8\u7d1a\u7ba1\u7406\u5718\u968a\u7684\u652f\u6301\u3002<br>CISO \u4e0d\u662f\u88fd\u5b9a\u4f01\u696d\u6230\u7565\u7684\u4e3b\u8981\u89d2\u8272\uff0c\u800c\u662f\u8207\u4f01\u696d\u6230\u7565\u4fdd\u6301\u4e00\u81f4\u4ee5\u5275\u9020\u50f9\u503c\u4e26\u5be6\u73fe\u7d44\u7e54\u9858\u666f\u548c\u4f7f\u547d\u7684\u4fe1\u606f\u5b89\u5168\u6230\u7565\u3002\u6b64\u5916\uff0c\u4ed6\u9084\u5fc5\u9808\u5b9a\u4f4d\u5b89\u5168\u8077\u80fd\uff08\u90e8\u9580\uff09\uff0c\u78ba\u5b9a\u5176\u7d44\u7e54\u3001\u89d2\u8272\u548c\u8077\u8cac\uff0c\u5c07\u5b89\u5168\u878d\u5165\u7d44\u7e54\u6d41\u7a0b\uff0c\u652f\u6301\u7522\u54c1\u548c\u670d\u52d9\u7684\u6301\u7e8c\u4ea4\u4ed8\uff08\u6240\u8b02\u7684\u201c\u696d\u52d9\u9023\u7e8c\u6027\u201d\uff09\uff0c\u4e26\u4fdd\u8b77\u4fe1\u606f\u8cc7\u7522\u4ee5\u52a0\u5f37\u5b89\u5168\u3002\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71 (ISMS) \u53ef\u78ba\u4fdd\u6709\u6548\u5730\u5236\u5b9a\u548c\u5be6\u65bd\u5b89\u5168\u7b56\u7565\u3002<br>CISO \u7684\u532f\u5831\u8def\u7dda\u56e0\u7d44\u7e54\u800c\u7570\uff0c\u5404\u6709\u5229\u5f0a\uff0c\u4f46 CISO \u5411 CFO \u6216\u5176\u4ed6\u9ad8\u7d1a\u5b98\u54e1\u532f\u5831\u4e26\u975e\u4e0d\u53ef\u80fd\u3002<br>. CISO \u5411 CIO \u5831\u544a\u7684\u5b89\u6392\u53ef\u80fd\u6703\u5c0e\u81f4\u5229\u76ca\u885d\u7a81\u3002<br>. CISO \u5411 CFO \u5831\u544a\u7684\u5b89\u6392\u53ef\u80fd\u6703\u82b1\u8cbb\u66f4\u591a\u6642\u9593\u4f86\u4ea4\u6d41\u6280\u8853\u5167\u5bb9\u3002<br>. CISO \u5411\u5be9\u8a08\u8077\u80fd\u5831\u544a\u7684\u5b89\u6392\u5c07\u5c0d\u5176\u7368\u7acb\u6027\u7522\u751f\u4e0d\u5229\u5f71\u97ff\u3002<\/p>\n\n\n\n<p>\u53c3\u8003<br>.&nbsp;<a href=\"https:\/\/www.igi-global.com\/dictionary\/security-function\/26102\" target=\"_blank\" rel=\"noreferrer noopener\">\u4ec0\u9ebc\u662f\u5b89\u5168\u529f\u80fd<\/a><br>.&nbsp;<a href=\"https:\/\/www.umassmed.edu\/it\/security\/functions--responsibilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u4fe1\u606f\u5b89\u5168\u8077\u80fd\u548c\u8077\u8cac<\/a><br>.&nbsp;<a href=\"https:\/\/www.securityforum.org\/uploads\/2015\/03\/Managing-a-Security-Function_231015.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u7ba1\u7406\u5b89\u5168\u529f\u80fd\uff1a\u8a3a\u65b7\u7248\u672c 1 \u6458\u8981<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Corporate_security\" target=\"_blank\" rel=\"noreferrer noopener\">\u4f01\u696d\u5b89\u5168<\/a><br>.&nbsp;<a href=\"https:\/\/oumganu.files.wordpress.com\/2011\/04\/topic-2-roles-of-security-management-in-the-organisation1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u7d44\u7e54\u4e2d\u5b89\u5168\u7ba1\u7406\u7684\u89d2\u8272<\/a><br>.&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/08\/06\/organize-security-team-evolution-cybersecurity-roles-responsibilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5982\u4f55\u7d44\u7e54\u60a8\u7684\u5b89\u5168\u5718\u968a\uff1a\u7db2\u7d61\u5b89\u5168\u89d2\u8272\u548c\u8077\u8cac\u7684\u6f14\u8b8a<\/a><br>.&nbsp;<a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2018\/12\/marriott-data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">\u842c\u8c6a-\u6578\u64da\u6d29\u9732<\/a><br>.&nbsp;<a href=\"https:\/\/www.securitymagazine.com\/articles\/93814-ico-fines-marriott-international-for-failing-to-keep-customers-personal-data-secure\" target=\"_blank\" rel=\"noreferrer noopener\">ICO \u56e0\u672a\u80fd\u4fdd\u8b49\u5ba2\u6236\u500b\u4eba\u6578\u64da\u5b89\u5168\u800c\u5c0d\u842c\u8c6a\u570b\u969b\u9032\u884c\u7f70\u6b3e<\/a><br>.&nbsp;<a href=\"https:\/\/corporatefinanceinstitute.com\/resources\/knowledge\/strategy\/corporate-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u4ec0\u9ebc\u662f\u4f01\u696d\u6230\u7565\uff1f<\/a><br>.&nbsp;<a href=\"https:\/\/www.bizjournals.com\/philadelphia\/news\/2019\/09\/30\/who-has-the-responsibility-for-developing-a.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u8ab0\u8ca0\u8cac\u5236\u5b9a\u516c\u53f8\u7684\u6230\u7565\u8a08\u5283\uff1f<\/a><br>.&nbsp;<a href=\"https:\/\/cmoe.com\/blog\/develop-your-corporate-strategy-tips-and-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5982\u4f55\u5236\u5b9a\u4f01\u696d\u6230\u7565\uff08CEO \u5206\u4eab\u6700\u4f73\u6280\u5de7\u548c\u5de5\u5177\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/hbr.org\/1975\/01\/strategic-planning-in-diversified-companies\" target=\"_blank\" rel=\"noreferrer noopener\">\u591a\u5143\u5316\u516c\u53f8\u7684\u6230\u7565\u898f\u5283<\/a><br>.&nbsp;<a href=\"https:\/\/hbr.org\/1963\/07\/how-to-evaluate-corporate-strategy\" target=\"_blank\" rel=\"noreferrer noopener\">\u5982\u4f55\u8a55\u4f30\u4f01\u696d\u6230\u7565<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/04\/14\/cissp-practice-questions-20210415\/\" target=\"_blank\">Wentz Wu QOTD-202104015<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>-\u6230\u7565\u5c64\u6b21\u901a\u5e38\uff0cCEO \u8ca0\u8cac\u5236\u5b9a\u516c\u53f8\u6230\u7565\u6216\u5927\u6230\u7565\uff0c\u8463\u4e8b\u6703\u7684\u610f\u898b\u548c\u9ad8\u7d1a\u7ba1\u7406\u5718\u968a\u7684\u652f\u6301\u3002CISO \u4e0d\u662f\u88fd\u5b9a\u4f01\u696d\u6230\u7565 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-571","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=571"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/571\/revisions"}],"predecessor-version":[{"id":2850,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/571\/revisions\/2850"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}