Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Control Assessment
You are here: Home \ Control Assessment
Credit Unions Cybersecurity Posture
Posted on Thursday, October 31st, 2019 by
How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal information such as credit scores, banking information and investment history. In this blog article, we'll talk about why cybersecurity is important for credit unions, how credit unions can evaluate and improve their cybersecurity posture, and which first steps credit unions should undertake to strengthen their security defenses.

Topics: Compliance, Control Assessment, Cybersecurity Posture, Security Practices, Tips & Tricks, Uncategorized

Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

questions
Posted on Tuesday, March 6th, 2018 by
We’ve gathered a collection of the most frequently asked questions around security controls that may help your organization identify the types of controls that will be most helpful to improve your security maturity, achieve compliance and strengthen your defenses against data breaches and security incidents.

Topics: CISO, Control Assessment, Controls

security controls
Posted on Tuesday, February 6th, 2018 by
The implementation of security controls generally requires a comprehensive strategy and an investment of time, resources, and money. Despite clear controls and descriptions, many organizations still struggle to achieve basic security. Today’s security professionals need to ensure that they can effectively analyze their investments and that the controls that they have in place are in fact reducing risk to a level that is acceptable to the organization. When it comes to implementing and evaluating the CIS controls for effective cyber defense, many organizations are at a loss of where to start because security is still not a major business decision.

Topics: Control Assessment, Controls, Managed Security Services, Resource, Uncategorized

Why Organizations Aren't Using Cybersecurity Frameworks
Posted on Thursday, December 14th, 2017 by
Why implementing a cybersecurity framework is important? How to use CIS top 20 controls to monitor your risk?

Topics: Control Assessment, Managed Security Services, Risk management

Posted on Wednesday, December 6th, 2017 by
How Uber breach impacted 57 million customer records, and how to prevent it from happening to your business. Here are 5 defensive tactics that would have been effective in preventing Uber’s loss of customer data.

Topics: Cloud Security, Compliance, Control Assessment, Security Practices, Threat Risk Assessments

equifax data breach
Posted on Wednesday, October 4th, 2017 by
Equifax slow response causes public outcry. What is the impact of the Equifax hack? What practices to follow in order to avoid catastrophic loss?

Topics: Control Assessment, Incident Response, Managed Security Services, Penetration Testing, Security Practices, Threat Risk Assessments, Vulnerability Assessment

NIST compliance
Posted on Monday, September 25th, 2017 by
By December 31, 2017, federal contractors or organizations that serve the federal government will need to meet the 110 individual controls in NIST 800-171 pertaining to the handling of CUI in order to maintain compliance with the Federal Government.

Topics: Compliance, Control Assessment

Control assessments - where to start
Posted on Tuesday, September 5th, 2017 by
Security Control Assessments have become critical tools for organizations due to the growing number of destructive cyberattacks across the world. Increasingly, organizations need to strengthen their defenses against data breaches, cybercrime and fraud to ensure even the most basic security posture. Frameworks such as NIST, CIS/SANS 20 or ISO 27001 have separated themselves as the best practice frameworks for organizations to assess their current IT security maturity and set goals to improve the procedures that they use to protect sensitive data, perform change management, and provide access to critical assets. We’ve gathered today’s most common security control frameworks to simplify the complex world of compliance and and security control assessments.

Topics: CISO, Compliance, Control Assessment, Controls, Managed Security Services, PCI DSS, Penetration Testing, Security Practices

How Banks Avoided the WannaCry Cyberattacks
Posted on Tuesday, July 18th, 2017 by
The WannaCry attack started in May of 2017, and within one day it was reported to have affected more than 230,000 devices in over 150 different countries. It hit major hospitals, car manufacturers, and even large telecommunications companies, yet one industry seemed to escape largely unscathed -- banking. While banks have been among the most popular targets for cyberattacks in the past, it seems this is at least one clear instance where the banks have benefited from adopting and evolving better cybersecurity practices and controls. Let’s take a closer look at what types of practices enabled banks to avoid the WannaCry ransomware epidemic.

Topics: Control Assessment, Ransomware, Security Practices

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now