{"id":37745,"date":"2026-05-12T16:52:51","date_gmt":"2026-05-12T20:52:51","guid":{"rendered":"https:\/\/www.rsa.com\/resources\/\/\/"},"modified":"2026-05-12T21:08:55","modified_gmt":"2026-05-13T01:08:55","slug":"gartner-report-ai-security-priorities-for-cisos","status":"publish","type":"resources_post_type","link":"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","title":{"rendered":"\u30ac\u30fc\u30c8\u30ca\u30fc\u30ec\u30dd\u30fc\u30c8CISO\u306e\u305f\u3081\u306eAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u512a\u5148\u4e8b\u9805"},"content":{"rendered":"<section class=\"wp-block-create-block-glide-section-container bg-black container-1320\"><div class=\"wrapper\"><section class=\"container-fluid position-relative py-5 bg-black banner-resource-section\">\n  <div class=\"container position-relative py-3 banner-resource\">\n\n    \n          <div class=\"row justify-content-center align-items-center pt-5\">\n\n                  <div class=\"col-12 col-sm-10 col-lg-6 pe-4 content-block\">\n            <div class=\"z-3 position-relative d-grid item-content\">\n\n                              <h1 class=\"item-title\">\n                  \u30ac\u30fc\u30c8\u30ca\u30fc\u30ec\u30dd\u30fc\u30c8CISO\u306e\u305f\u3081\u306eAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u512a\u5148\u4e8b\u9805\n                <\/h1>\n              \n                              <div class=\"pe-5 item-text\">\n                  AI\u306f\u4eca\u3084\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u3068\u5207\u3063\u3066\u3082\u5207\u308a\u96e2\u305b\u306a\u3044\u3082\u306e\u3068\u306a\u3063\u3066\u304a\u308a\u3001CISO\u306f\u7d44\u7e54\u304cAI\u30cd\u30a4\u30c6\u30a3\u30d6\u306b\u306a\u308a\u3064\u3064\u3042\u308b\u3053\u3068\u3092\u793a\u3059\u5fc5\u8981\u306b\u8feb\u3089\u308c\u3066\u3044\u308b\u3002AI\u3092\u5c0e\u5165\u3059\u308b\u305f\u3081\u306b\u8fc5\u901f\u306b\u52d5\u304f\u304b\u3001\u6295\u8cc7\u304c\u5b9f\u969b\u306b\u5831\u308f\u308c\u308b\u3088\u3046\u306b\u30da\u30fc\u30b9\u3092\u843d\u3068\u3059\u304b\u3002\u30ac\u30fc\u30c8\u30ca\u30fc\u793e\u306e\u30ec\u30dd\u30fc\u30c8\u300cPredicts 2026: CISOs Must Embrace Relief of Missing Out on AI\uff082026\u5e74\u306e\u4e88\u6e2c\uff1aCISO\u306fAI\u3092\u53d6\u308a\u9003\u304c\u3059\u3053\u3068\u3078\u306e\u5b89\u5fc3\u3092\u53d7\u3051\u5165\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\uff09\u300d\u3067\u306f\u3001\u300c\u53d6\u308a\u9003\u304c\u3059\u3053\u3068\u3078\u306e\u4e0d\u5b89\u306b\u99c6\u3089\u308c\u305f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306f\u3001\u7121\u99c4\u306a\u6295\u8cc7\u3068\u671f\u5f85\u306f\u305a\u308c\u306e\u5b9f\u73fe\u4fa1\u5024\u306b\u3064\u306a\u304c\u308b\u300d\u3068\u8ff0\u3079\u3089\u308c\u3066\u3044\u308b\u3002CISO\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u512a\u5148\u4e8b\u9805\u306b\u6cbf\u3063\u305fAI\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u3092\u512a\u5148\u3059\u308b\u3053\u3068\u3067\u3001AI\u306e \u201c\u53d6\u308a\u3053\u307c\u3057\u6551\u6e08 \u201d\u3092\u53d7\u3051\u5165\u308c\u308b\u5fc5\u8981\u304c\u3042\u308b\u300d\u3068\u8ff0\u3079\u3066\u3044\u308b\u3002.\n                <\/div>\n                                            <div class=\"py-3 item-link\">\n                  <a href=\"#form\" \n                  \n                  role=\"button\" class=\"btn btn-primary\">\n                    \u30ec\u30dd\u30fc\u30c8\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\n                  <\/a>\n                  \t\t\t\t\t\t\t<a\n\t\t\t\t\t\t\t\thref=\"\"\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tclass=\"btn\">\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/a>\n                <\/div>\n                                        <\/div>\n          <\/div>\n                          <div class=\"col-12 col-sm-10 col-lg-6 position-relative d-flex justify-content-center align-items-center pt-4 pt-lg-0 resource-block\"  style=\"min-height: 500px\" >\n            <div class=\"position-absolute item-video\">\n              <video autoplay muted loop playsinline>\n                <source src=\"https:\/\/www.rsa.com\/wp-content\/uploads\/Authentication-Risk-Ai.webm\" type=\"video\/webm\">\n              <\/video>\n            <\/div>\n                      <\/div>\n              <\/div>\n    \n  <\/div>\n<\/section><\/div><\/section>\n\n\n\n<section class=\"wp-block-create-block-glide-section-container bg-black container-1320\"><div class=\"wrapper\"><div class=\"py-5 gated-asset\">\n\t\t<div class=\"container\">\n\t\t\t<div class=\"row py-5\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-5 z-1 pt-4 form-block\">\n\t\t\t\t\t\t<div class=\"position-relative bg-black form-wrapper\">\n  \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"pb-3 text-center form-title\">\n\t\t\t\t\t\t\t\t\t\u30ec\u30dd\u30fc\u30c8\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\n\t\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<iframe\n\t\t\t\t\t\t\t\t\tdata-pardot=\"true\"\n\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www2.rsa.com\/l\/797543\/2026-04-30\/5h7797\"\n\t\t\t\t\t\t\t\t\taria-label=\"RSA\u30d5\u30a9\u30fc\u30e0\"\n\t\t\t\t\t\t\t\t\twidth=\"100%\"\n\t\t\t\t\t\t\t\t\theight=\"670\"\n\t\t\t\t\t\t\t\t\ttype=\"text\/html\"\n\t\t\t\t\t\t\t\t\tframeborder=\"0\"\n\t\t\t\t\t\t\t\t\tallowtransparency=\"true\"\n\t\t\t\t\t\t\t\t\tstyle=\"border: 0\"\n\t\t\t\t\t\t\t\t\tloading=\"lazy\"\n\t\t\t\t\t\t\t\t\tid=\"form\">\n\t\t\t\t\t\t\t\t<\/iframe>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"col-12 offset-lg-1 col-lg-6\">\n\t\t\t\t\t<div class=\"wysiwyg-editor\" id=\"gated-content\">\n\t\t\t\t\t\t<h3>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308bAI\u304cCISO\u306b\u65b0\u305f\u306a\u30d7\u30ec\u30c3\u30b7\u30e3\u30fc\u3092\u4e0e\u3048\u308b<\/h3>\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5e02\u5834\u306b\u304a\u3051\u308bAI\u306e\u5c0e\u5165\u306f\u6025\u901f\u306b\u52a0\u901f\u3057\u3066\u304a\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7d44\u7e54\u306f\u8fc5\u901f\u306a\u6210\u679c\u3092\u793a\u3059\u3053\u3068\u304c\u671f\u5f85\u3055\u308c\u3066\u3044\u308b\u3002\u591a\u304f\u306e\u5834\u5408\u3001\u30ac\u30fc\u30c8\u30ca\u30fc\u306e\u8abf\u67fb\u304c\u5f37\u8abf\u3057\u3066\u3044\u308b\u3088\u3046\u306b\u3001\u300cAI\u306e\u8a87\u5927\u5ba3\u4f1d\u306f\u3001C\u30ec\u30d9\u30eb\u306e\u30ea\u30fc\u30c0\u30fc\u3092\u99c6\u308a\u7acb\u3066\u3066\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u3092\u500d\u5897\u3055\u305b\u3001\u30ea\u30b9\u30af\u306e\u7279\u5b9a\u3084\u7ba1\u7406\u3088\u308a\u3082\u5c0e\u5165\u30b9\u30d4\u30fc\u30c9\u3092\u512a\u5148\u3055\u305b\u308b\u3002\u201c<\/p>\n<p>\u904b\u7528\u306e\u56de\u5fa9\u529b\u3001\u898f\u5236\u306e\u9075\u5b88\u3001\u4e88\u7b97\u306e\u52b9\u7387\u5316\u3092\u62c5\u5f53\u3059\u308b CISO \u306b\u3068\u3063\u3066\u3001\u3053\u306e\u3088\u3046\u306a\u529b\u5b66\u306f\u5177\u4f53\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u3068\u9577\u671f\u7684\u306a\u6226\u7565\u7684\u8ca0\u50b5\u306e\u4e21\u65b9\u3092\u751f\u307f\u51fa\u3059\u3053\u3068\u306b\u306a\u308b\u3002.<\/p>\n<h3>AI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u4fa1\u5024\u306b\u7126\u70b9\u3092\u5f53\u3066\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u7406\u7531<\/h3>\n<p>\u30ac\u30fc\u30c8\u30ca\u30fc\u30fb\u30ec\u30dd\u30fc\u30c8\u306e\u4e2d\u6838\u3092\u306a\u3059\u30e1\u30c3\u30bb\u30fc\u30b8\u306f\u3001AI\u305d\u306e\u3082\u306e\u3092\u30b4\u30fc\u30eb\u3068\u3059\u3079\u304d\u3067\u306f\u306a\u304f\u3001\u3080\u3057\u308d\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6210\u679c\u306b\u8cc7\u3059\u308b\u3082\u306e\u3067\u3042\u308b\u3079\u304d\u3060\u3068\u3044\u3046\u3053\u3068\u3067\u3042\u308b\u3002\u52b9\u679c\u7684\u306aAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306b\u306f\u3001\u30d3\u30b8\u30cd\u30b9\u4e0a\u306e\u512a\u5148\u4e8b\u9805\u3084\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u790e\u3068\u30a4\u30cb\u30b7\u30a2\u30c6\u30a3\u30d6\u3092\u7d50\u3073\u3064\u3051\u308b\u5b9f\u8df5\u7684\u306aAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ed\u30fc\u30c9\u30de\u30c3\u30d7\u304c\u5fc5\u8981\u3067\u3042\u308b\u3002.<\/p>\n<p>\u3053\u306e\u5831\u544a\u66f8\u306b\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30ed\u30fc\u30c9\u30de\u30c3\u30d7\u3092\u63d0\u793a\u3059\u308b\u969b\u306b\u3001\u300cAI\u3092\u500b\u5225\u306e\u30ed\u30fc\u30c9\u30de\u30c3\u30d7\u304b\u3089\u3001\u4e2d\u6838\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u76ee\u7684\uff08\u4f8b\u3048\u3070\u3001NIST CSF 2.0\u306eGovern\u3001Identify\u3001Protect\u3001Detect\u3001Respond\u3001Recover\uff09\u306b\u542b\u307e\u308c\u308b\u4e00\u9023\u306e\u6d3b\u52d5\u306b\u683c\u4e0b\u3052\u3059\u308b\u300d\u3068\u3044\u3046\u5177\u4f53\u7684\u306a\u547c\u3073\u304b\u3051\u304c\u542b\u307e\u308c\u3066\u3044\u308b\u3002\u201c<\/p>\n<h2>\u4e3b\u306a\u8981\u70b9AI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30ea\u30b9\u30af\u3068\u8ab2\u984c<\/h2>\n<ul>\n<li>AI\u4e3b\u5c0e\u306eFOMO\u306f\u3001\u7121\u99c4\u306a\u6295\u8cc7\u3084\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u505c\u6ede\u3092\u62db\u304d\u304b\u306d\u306a\u3044\u3002.<\/li>\n<li>\u6025\u3054\u3057\u3089\u3048\u306eAI\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306f\u3001\u30ac\u30d0\u30ca\u30f3\u30b9\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u3092\u56de\u907f\u3059\u308b\u3053\u3068\u304c\u591a\u3044\u3002.<\/li>\n<li>\u751f\u6210\u7684\u306aAI\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306f\u3001\u7d99\u7d9a\u7684\u306a\u30ed\u30fc\u30c9\u30de\u30c3\u30d7\u306e\u5909\u66f4\u3092\u751f\u307f\u51fa\u3059\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002.<\/li>\n<li>AI\u306b\u3088\u308bSOC\u306e\u751f\u7523\u6027\u5411\u4e0a\u306f\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8907\u96d1\u5316\u306b\u3088\u3063\u3066\u76f8\u6bba\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002.<\/li>\n<li>AI\u304c\u652f\u63f4\u3059\u308b\u53cd\u5fa9\u7684\u306a\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u306f\u3001\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30ca\u30eb\u30fb\u30ea\u30b9\u30af\u3092\u5897\u5927\u3055\u305b\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002.<\/li>\n<\/ul>\n<h3>CISO\u304cAI\u306e\u30ea\u30b9\u30af\u7ba1\u7406\u3092\u512a\u5148\u3057\u3001\u3088\u308a\u30b9\u30de\u30fc\u30c8\u306aAI\u6295\u8cc7\u3092\u884c\u3046\u306b\u306f<\/h3>\n<p>AI\u3092\u3088\u308a\u5e83\u7bc4\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u4e2d\u306e1\u3064\u306e\u30c4\u30fc\u30eb\u306b\u904e\u304e\u306a\u3044\u3068\u8003\u3048\u308b\u3053\u3068\u3067\u3001\u5927\u304d\u306a\u30e1\u30ea\u30c3\u30c8\u3092\u5f97\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002AI\u3092\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u691c\u77e5\u3001\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3001\u30ec\u30b9\u30dd\u30f3\u30b9\u306e\u5404\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u306b\u601d\u616e\u6df1\u304f\u7d44\u307f\u8fbc\u3080\u3053\u3068\u306b\u6ce8\u529b\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30fc\u30c0\u30fc\u306f\u3001\u6280\u8853\u7684\u8ca0\u50b5\u3092\u56de\u907f\u3057\u3001\u904b\u7528\u4e0a\u306e\u6469\u64e6\u3092\u6e1b\u3089\u3057\u3001AI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8105\u5a01\u3068\u80fd\u529b\u304c\u9032\u5316\u3059\u308b\u4e2d\u3067\u3088\u308a\u52b9\u679c\u7684\u306b\u9069\u5fdc\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002.<\/p>\n<h3>AI\u30ac\u30d0\u30ca\u30f3\u30b9\u3068\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5f79\u5272<\/h3>\n<p>AI\u306b\u3088\u3063\u3066\u7d44\u7e54\u304c\u7ba1\u7406\u3057\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3001\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u3001\u30a2\u30af\u30bb\u30b9\u6c7a\u5b9a\u306e\u6570\u304c\u62e1\u5927\u3059\u308b\u306b\u3064\u308c\u3066\u3001AI\u30ac\u30d0\u30ca\u30f3\u30b9\u3068\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u57fa\u76e4\u3068\u306a\u308b\u3002AI\u4e3b\u5c0e\u306e\u74b0\u5883\u306f\u3001\u30a2\u30af\u30bb\u30b9\u306e\u898f\u6a21\u3001\u30b9\u30d4\u30fc\u30c9\u3001\u8907\u96d1\u6027\u3092\u5897\u5927\u3055\u305b\u3001\u53ef\u8996\u5316\u3001\u30dd\u30ea\u30b7\u30fc\u306e\u5b9f\u65bd\u3001\u4fdd\u8a3c\u3092\u8b72\u308c\u306a\u3044\u3082\u306e\u3068\u3059\u308b\u3002.<\/p>\n<p>RSA\u306e\u898b\u89e3\u3067\u306f\u3001\u3053\u306e\u3053\u3068\u306f\u5305\u62ec\u7684\u306a\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u30fb\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u7ba1\u7406\u3001\u9ad8\u4fdd\u8a3c\u306e\u8a8d\u8a3c\u306e\u91cd\u8981\u6027\u3092\u5f37\u5316\u3057\u3066\u3044\u308b\u3002\u3053\u308c\u3089\u304c\u306a\u3051\u308c\u3070\u3001AI\u306f\u30ea\u30b9\u30af\u3092\u4f4e\u6e1b\u3059\u308b\u3069\u3053\u308d\u304b\u3001\u65b0\u305f\u306a\u653b\u6483\u7d4c\u8def\u3084\u904b\u7528\u4e0a\u306e\u76f2\u70b9\u3092\u3082\u305f\u3089\u3059\u3053\u3068\u306b\u306a\u308b\u3002.<\/p>\n<p>AI\u306b\u95a2\u3059\u308bRSA\u306e\u30ea\u30bd\u30fc\u30b9\u306b\u306f\u3001\u6b21\u306e\u3088\u3046\u306a\u3082\u306e\u304c\u3042\u308a\u307e\u3059\u3002 <a href=\"\/ja\/resources\/blog\/zero-trust\/claude-mythos-and-capybara-best-practices-for-the-next-evolution-in-ai-powered-cybersecurity-risks\/\">AI\u3092\u6d3b\u7528\u3057\u305f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u5bfe\u3059\u308b\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306e\u5c0e\u5165<\/a> \u307e\u305f\u3001 <a href=\"\/ja\/resources\/blog\/products-and-solutions\/securing-the-ai-workforce\/\">AI\u52b4\u50cd\u529b\u306e\u78ba\u4fdd<\/a>.<\/p>\n<h3>\u30ac\u30fc\u30c8\u30ca\u30fc\u30fb\u30d5\u30ec\u30c3\u30af\u30b9\u30fb\u30ec\u30dd\u30fc\u30c8\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/h3>\n<p>\u30ac\u30fc\u30c8\u30ca\u30fc\u306e\u30ec\u30dd\u30fc\u30c8\u300cPredicts 2026: CISOs Must Embrace Relief of Missing Out on AI\u300d\u306f\u3001AI\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u3092\u91cd\u8981\u306a\u6210\u679c\u306b\u96c6\u4e2d\u3055\u305b\u3088\u3046\u3068\u3059\u308bCISO\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ea\u30fc\u30c0\u30fc\u306b\u3068\u3063\u3066\u4e0d\u53ef\u6b20\u306a\u30ea\u30bd\u30fc\u30b9\u3067\u3042\u308b\u3002.<br \/>\n<em><br \/>\n\u30ac\u30fc\u30c8\u30ca\u30fc\u3001\u300c2026\u5e74\u306e\u4e88\u6e2c\uff1aCISO\u306fAI\u306b\u4e57\u308a\u9045\u308c\u308b\u3068\u3044\u3046\u5b89\u5835\u611f\u3092\u53d7\u3051\u5165\u308c\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u300d\u3001\u30b8\u30a7\u30ec\u30df\u30fc\u30fb\u30c9\u30fc\u30a4\u30f3\u3001\u30c7\u30a3\u30fc\u30d7\u30c6\u30a3\u30fb\u30b4\u30d1\u30fc\u30eb\u3001\u30d4\u30fc\u30c8\u30fb\u30b7\u30e7\u30fc\u30c9\u3001\u30a2\u30ad\u30d5\u30fb\u30ab\u30fc\u30f3\u3001\u30a2\u30fc\u30b5\u30fc\u30fb\u30b7\u30f4\u30a1\u30ca\u30b5\u30f3\u3001\u30af\u30ea\u30b9\u30c8\u30d5\u30a1\u30fc\u30fb\u30df\u30af\u30b9\u30bf\u30fc 2025\u5e7412\u670822\u65e5<\/em><\/p>\n<p>GARTNER\u306f\u3001\u7c73\u56fd\u304a\u3088\u3073\u305d\u306e\u4ed6\u306e\u56fd\u306b\u304a\u3051\u308b\u30ac\u30fc\u30c8\u30ca\u30fc\u793e\u304a\u3088\u3073\uff0f\u307e\u305f\u306f\u305d\u306e\u95a2\u9023\u4f1a\u793e\u306e\u767b\u9332\u5546\u6a19\u304a\u3088\u3073\u30b5\u30fc\u30d3\u30b9\u30de\u30fc\u30af\u3067\u3042\u308a\u3001\u8a31\u53ef\u3092\u5f97\u3066\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002\u7121\u65ad\u8907\u5199\u30fb\u8ee2\u8f09\u3092\u7981\u3058\u307e\u3059\u3002<\/p>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/section>","protected":false},"featured_media":37749,"template":"template-t25-resource-template-v2.blade.php","class_list":["post-37745","resources_post_type","type-resources_post_type","status-publish","has-post-thumbnail","hentry","resource_type-reports"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gartner\u00ae Report: AI Security Priorities for CISOs - RSA<\/title>\n<meta name=\"description\" content=\"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner\u00ae Report: AI Security Priorities for CISOs - RSA\" \/>\n<meta property=\"og:description\" content=\"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-13T01:08:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/\",\"name\":\"Gartner\u00ae Report: AI Security Priorities for CISOs - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp\",\"datePublished\":\"2026-05-12T20:52:51+00:00\",\"dateModified\":\"2026-05-13T01:08:55+00:00\",\"description\":\"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/reports\\\/gartner-report-ai-security-priorities-for-cisos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner\u00ae Report: AI Security Priorities for CISOs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u30ac\u30fc\u30c8\u30ca\u30fc\u00ae\u30ec\u30dd\u30fc\u30c8\uff1aCISO\u306b\u3068\u3063\u3066\u306eAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u512a\u5148\u4e8b\u9805 - RSA","description":"\u30ac\u30fc\u30c8\u30ca\u30fc\u306e\u30ec\u30dd\u30fc\u30c8\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u3001CISO\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308bAI\u6a5f\u80fd\u3092\u5c0e\u5165\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","og_locale":"ja_JP","og_type":"article","og_title":"Gartner\u00ae Report: AI Security Priorities for CISOs - RSA","og_description":"Download the Gartner report to learn best practices for CISOs can deploy AI capabilities that enhance cybersecurity.","og_url":"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","og_site_name":"RSA","article_modified_time":"2026-05-13T01:08:55+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-social.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","url":"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/","name":"\u30ac\u30fc\u30c8\u30ca\u30fc\u00ae\u30ec\u30dd\u30fc\u30c8\uff1aCISO\u306b\u3068\u3063\u3066\u306eAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u512a\u5148\u4e8b\u9805 - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp","datePublished":"2026-05-12T20:52:51+00:00","dateModified":"2026-05-13T01:08:55+00:00","description":"\u30ac\u30fc\u30c8\u30ca\u30fc\u306e\u30ec\u30dd\u30fc\u30c8\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u3001CISO\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308bAI\u6a5f\u80fd\u3092\u5c0e\u5165\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.rsa.com\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/gartner-report-ai-security-priorities-for-cisos-rsa-featured.webp","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/ja\/resources\/reports\/gartner-report-ai-security-priorities-for-cisos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/ja\/"},{"@type":"ListItem","position":2,"name":"Gartner\u00ae Report: AI Security Priorities for CISOs"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30c7\u30b8\u30bf\u30eb\u30ea\u30b9\u30af\u7ba1\u7406\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/ja\/wp-json\/wp\/v2\/resources_post_type\/37745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/ja\/wp-json\/wp\/v2\/resources_post_type"}],"about":[{"href":"https:\/\/www.rsa.com\/ja\/wp-json\/wp\/v2\/types\/resources_post_type"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/ja\/wp-json\/wp\/v2\/media\/37749"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/ja\/wp-json\/wp\/v2\/media?parent=37745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}