Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Controls
You are here: Home \ Controls
executive insights on IT pros challenges
Posted on Tuesday, October 23rd, 2018 by
Security executives from different industries and backgrounds chat about common challenges for IT professionals. Our executives shared great tips for building a solid cybersecurity pitch to the Board of Directors and the executive management team.

Topics: CISO, Controls, Cybersecurity Posture, Internet of Things, Tips & Tricks

Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

where-do-i-start
Posted on Tuesday, June 19th, 2018 by
If you’re going through a merger and acquisition, adding new office locations, hiring new members, dealing with integrating technologies or signing up new third-party vendors, you’ll need to figure out if your cybersecurity strategy is resilient and effective enough to deal with these changes.

Topics: CISO, Controls, Cybersecurity Posture, Risk management, Security Practices, Threat Risk Assessments

Risk ahead sign
Posted on Thursday, May 24th, 2018 by
Establishing partnerships, outsourcing, or purchasing different products from multiple third-party vendors frequently involve risks. Here is how to assess third-party vendors and mitigate security risks.

Topics: Controls, Risk management, Security Practices

cis controls and gdpr compliance
Posted on Tuesday, May 15th, 2018 by
The Center for Information Security (CIS) provides some highly-effective and adequate security controls that help organizations comply with GDPR. The following sections describe some top CIS controls as well as their benefits for GDPR compliance.

Topics: CISO, Compliance, Controls, Privacy & Security

questions
Posted on Tuesday, March 6th, 2018 by
We’ve gathered a collection of the most frequently asked questions around security controls that may help your organization identify the types of controls that will be most helpful to improve your security maturity, achieve compliance and strengthen your defenses against data breaches and security incidents.

Topics: CISO, Control Assessment, Controls

20 cis controls
Posted on Monday, February 12th, 2018 by
Issued by the Center for Internet Security (CIS), the so-called Critical Security Controls for Effective Cyber Defense present 20 effective actions an organization can take to reduce its risk, strengthen its security posture and lower operational costs. A security control is a safeguard or countermeasure to avoid, detect, counteract or minimize “security” risks to a company’s assets. If you'd like to learn more, here is an overview of the 20 CIS Controls.

Topics: CISO, Controls, Cybersecurity Platform ArkAngel

security controls
Posted on Tuesday, February 6th, 2018 by
The implementation of security controls generally requires a comprehensive strategy and an investment of time, resources, and money. Despite clear controls and descriptions, many organizations still struggle to achieve basic security. Today’s security professionals need to ensure that they can effectively analyze their investments and that the controls that they have in place are in fact reducing risk to a level that is acceptable to the organization. When it comes to implementing and evaluating the CIS controls for effective cyber defense, many organizations are at a loss of where to start because security is still not a major business decision.

Topics: Control Assessment, Controls, Cybersecurity Platform ArkAngel, Managed Security Services, Uncategorized

Control assessments - where to start
Posted on Tuesday, September 5th, 2017 by
Security Control Assessments have become critical tools for organizations due to the growing number of destructive cyberattacks across the world. Increasingly, organizations need to strengthen their defenses against data breaches, cybercrime and fraud to ensure even the most basic security posture. Frameworks such as NIST, CIS/SANS 20 or ISO 27001 have separated themselves as the best practice frameworks for organizations to assess their current IT security maturity and set goals to improve the procedures that they use to protect sensitive data, perform change management, and provide access to critical assets. We’ve gathered today’s most common security control frameworks to simplify the complex world of compliance and and security control assessments.

Topics: CISO, Compliance, Control Assessment, Controls, Managed Security Services, PCI DSS, Penetration Testing, Security Practices

ashley madison
Posted on Tuesday, September 27th, 2016 by
Every now and then, a data breach is widely publicized by the media. Obviously, the Ashley Madison breach had all of the characteristics to attract such coverage. The case constitutes an opportunity to exemplify the legal obligations of businesses under PIPEDA, while illustrating the numerous issues that fast-growing and emerging companies are faced with when trying to keep up with their obligations. Here are five lessons drafted from the joint report which I believe to be valuable when evaluating how to protect your organization’s most valuable asset – data.

Topics: Control Assessment, Controls, Penetration Testing, Privacy & Security, Risk management, Threat Risk Assessments

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More