Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: CISO
You are here: Home \ CISO
Posted on Thursday, September 10th, 2020 by
Munich, Germany, and Montreal, Quebec, Canada – August 31, 2020 – Akarion and Hitachi Systems Security (HISYS-SEC) have reached a mutual agreement to bring their business vision, their know-how and their expertise together. Akarion is a German and Austrian software developer for professional compliance management and verifiable tamper-proof data storage. The objective of this collaboration...

Topics: Akarion, Akarion Compliance Cloud, CISO, CISOaaS, Cloud Security, Compliance, Data Protection Operations Center, DPOaaS, DPOC, Internet of Things, IoT Security, Managed Security Services, MSS, Operational Technology, OT, Privacy & Security

Posted on Thursday, September 12th, 2019 by
With digital transformation becoming the watchword of the first half of the 21st century, what is the outlook on this trending topic now and in the future? In this article, we look at how digital transformation has revolutionized businesses with the latest trends and technologies, including blockchain, DevOps, cloud computing, data privacy and artificial intelligence, just to name a few.

Topics: Artificial Intelligence, BIg Data, CISO, Cloud Security, Digital Transformation, Machine Learning, Managed Security Services, Security Practices, Trends & Technologies

executive insights on IT pros challenges
Posted on Tuesday, October 23rd, 2018 by
Security executives from different industries and backgrounds chat about common challenges for IT professionals. Our executives shared great tips for building a solid cybersecurity pitch to the Board of Directors and the executive management team.

Topics: CISO, Controls, Cybersecurity Posture, Internet of Things, Tips & Tricks

Cybersecurity Strategy FAQ
Posted on Tuesday, August 14th, 2018 by
We’ve gathered the most frequently asked questions to help organizations develop an effective cybersecurity strategy that reflects best practices, is aligned with their overall business objectives, delivers measurable ROI and protects their critical data assets against breaches and intrusions.

Topics: CISO, Cybersecurity Posture, Security Practices

Cybersecurity-How to Convince the Board
Posted on Tuesday, July 31st, 2018 by
Cybersecurity has moved up from the server room to the boardroom in recent years, and more and more board members understand how crucial a strong cybersecurity posture is in today’s digitalized business environment. As stated by Help Net Security: “Cybersecurity strategy needs to be led by the board, executed by the C-Suite and owned at the front lines of the organization.” If you are responsible for implementing security strategies for your organizations, chances are you will need to present your ideas to the BOD in a way that’s clear, relevant and convincing. Here are 10 best practices to follow to convince the Board.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, July 24th, 2018 by
Aligning your cybersecurity posture with your overall business objectives is essential to protect your business against breaches and intrusions. Security leaders are charged with implementing impactful and effective cybersecurity strategies that improve the organization’s cybersecurity posture.

Topics: CISO, Cybersecurity Posture, Security Practices

consideration before outsourcing security mssp
Posted on Tuesday, July 17th, 2018 by
Truth be told, every organization is unique in terms of its cybersecurity needs. Engaging with an MSSP can have tremendous advantages for certain businesses and may not be required for others. Let’s look at 3 key considerations that you should be addressed as part of your decision making: 1. Overall security requirements, 2. Security expertise, 3. Threat monitoring & incident response.

Topics: CISO, Managed Security Services, MSS

Posted on Tuesday, July 10th, 2018 by
To find out how mature you are in terms of cybersecurity, you have to undertake 6 simple steps to define your security posture.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, June 26th, 2018 by
To define your cybersecurity budget, ask yourself what you are trying to protect, why you are trying to protect it and what your current cybersecurity posture is. Answering these questions will help you determine which security expenses you absolutely require.

Topics: CISO, Cybersecurity Posture, Security Practices

where-do-i-start
Posted on Tuesday, June 19th, 2018 by
If you’re going through a merger and acquisition, adding new office locations, hiring new members, dealing with integrating technologies or signing up new third-party vendors, you’ll need to figure out if your cybersecurity strategy is resilient and effective enough to deal with these changes.

Topics: CISO, Controls, Cybersecurity Posture, Risk management, Security Practices, Threat Risk Assessments

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now