Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Lessons Learned: The Unsung Hero of the Incident Response Planning Process
You are here: Home \ Blog
Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, April 10th, 2018 by
Often-overlooked, lessons learned exercises can help organizations improve their incident response planning capabilities going forward.

Topics: Incident Response, Security Practices

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, April 3rd, 2018 by
Each jurisdiction imposes data protection standards with regards to when and how organizations should or must disclose data breaches. This allows individuals whose personal information has been compromised to take remedial steps to avoid potential adverse consequences, such as financial losses or identity theft. As part of our 5-part series, this article dives deeper into the different jurisdictions that organizations in today’s globalized world may be subject to.

Topics: Compliance, Cyber Law, Incident Response

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, March 27th, 2018 by
To help your organization become more confident when facing a security incident, your incident response team needs to have these three key roles...

Topics: Incident Response, Managed Security Services

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, March 20th, 2018 by
As part of our 5-part series about Incident Response Planning (IRP), this article dives deeper into several best practices to keep in mind when building an Incident Response Plan.

Topics: Incident Response, Security Practices

Incident Response Planning - Hitachi Systems Security
Posted on Tuesday, March 13th, 2018 by
We’ve compiled a 5-part series about Incident Response Planning to help organizations understand what IRP is, what they should consider when implementing IRP, and how they can leverage IRPs to secure themselves against cyberthreats. Part 1 outlines the 5 main benefits of implementing an Incident Response Plan.

Topics: Incident Response, Managed Security Services, Security Practices

questions
Posted on Tuesday, March 6th, 2018 by
We’ve gathered a collection of the most frequently asked questions around security controls that may help your organization identify the types of controls that will be most helpful to improve your security maturity, achieve compliance and strengthen your defenses against data breaches and security incidents.

Topics: CISO, Control Assessment, Controls

pentest-resources
Posted on Tuesday, February 27th, 2018 by
Curious about how to stay up to speed with Penetration Testing? We’ve gathered 10 useful resources vetted by Hitachi Systems Security’s own Penetration Testers that will help you keep up with the rapidly evolving landscape of ethical hacking.

Topics: Penetration Testing

vulnerability assessments vs vulberability management
Posted on Monday, February 19th, 2018 by
The terms vulnerability scans, vulnerability assessments and vulnerability management are often mixed up and still cause confusion on many accounts. To make sure that your organization can focus on the most effective tactics when it becomes to dealing with vulnerabilities, we’ve explained the main differences between vulnerability assessments and vulnerability management once and for all.

Topics: Managed Security Services, MSS, Vulnerability Assessment, Vulnerability Management

20 cis controls
Posted on Monday, February 12th, 2018 by
Issued by the Center for Internet Security (CIS), the so-called Critical Security Controls for Effective Cyber Defense present 20 effective actions an organization can take to reduce its risk, strengthen its security posture and lower operational costs. A security control is a safeguard or countermeasure to avoid, detect, counteract or minimize “security” risks to a company’s assets. If you'd like to learn more, here is an overview of the 20 CIS Controls.

Topics: CISO, Controls, Cybersecurity Platform ArkAngel

security controls
Posted on Tuesday, February 6th, 2018 by
The implementation of security controls generally requires a comprehensive strategy and an investment of time, resources, and money. Despite clear controls and descriptions, many organizations still struggle to achieve basic security. Today’s security professionals need to ensure that they can effectively analyze their investments and that the controls that they have in place are in fact reducing risk to a level that is acceptable to the organization. When it comes to implementing and evaluating the CIS controls for effective cyber defense, many organizations are at a loss of where to start because security is still not a major business decision.

Topics: Control Assessment, Controls, Cybersecurity Platform ArkAngel, Managed Security Services, Uncategorized

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More