Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Risk management
You are here: Home \ Risk management
Posted on Tuesday, March 24th, 2020 by
What guidelines should your organization be concerned with regarding information security when working from home? The world has entered “uncharted territory”. This was a statement from the World Health Organization (WHO) about the current COVID-19 pandemic. In reaction to this, companies across the world have fallen in line with health guidance on social distancing and...

Topics: Coronavirus, COVID-19, Data Protection Impact Assessment, DPIA, Pandemic Response Planning, Penetration Testing, Phishing, PIA, Ransomware, Remote working, Risk management, Social Engineering, wfh, Working from home

Posted on Friday, February 21st, 2020 by
Data privacy is critical for your organization as consumer pressure and regulatory fines is helping turn the tide on privacy attitudes by many enterprises including the tech giants. In our previous article on data privacy for businesses, we discussed what is meant by a Privacy Impact Assessment (PIA) and a Data Protection Impact Assessment (DPIA)....

Topics: Canada Privacy Act, Compliance, DPIA, GDPR, PIA, PIPEDA, Privacy & Security, Privacy Impact Assessment, Risk management, Uncategorized

Posted on Tuesday, August 27th, 2019 by
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house? In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.

Topics: Cloud Security, Compliance, Cybersecurity Posture, Managed Security Services, MSS, Risk management, Security Operations Center, Threat Risk Assessments

Artificial-Intelligence_Hitachi-Systems-Security
Posted on Tuesday, December 4th, 2018 by
How can next-generation Managed Security Service Providers (MSSPs) make their threat hunting activities more proactive? Learn more about the role of big data, artificial intelligence and machine learning for an actionable risk management strategy.

Topics: Artificial Intelligence, BIg Data, Machine Learning, Managed Security Services, MSS, Risk management, Trends & Technologies

RIsk Management_Hitachi Systems Security

Topics: Managed Security Services, MSS, Risk management

Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

where-do-i-start
Posted on Tuesday, June 19th, 2018 by
If you’re going through a merger and acquisition, adding new office locations, hiring new members, dealing with integrating technologies or signing up new third-party vendors, you’ll need to figure out if your cybersecurity strategy is resilient and effective enough to deal with these changes.

Topics: CISO, Controls, Cybersecurity Posture, Risk management, Security Practices, Threat Risk Assessments

Risk ahead sign
Posted on Thursday, May 24th, 2018 by
Establishing partnerships, outsourcing, or purchasing different products from multiple third-party vendors frequently involve risks. Here is how to assess third-party vendors and mitigate security risks.

Topics: Controls, Risk management, Security Practices

Vulnerability Management - Hitachi Systems Security
Posted on Friday, January 26th, 2018 by
What is Vulnerability Management?Vulnerability management is the process of identifying, analyzing, fixing, and reporting on security vulnerabilities in systems and the software that runs them. Once vulnerabilities are found, they must be prioritized based on which ones pose the most dangerous threat to the organization.

Topics: Managed Security Services, Risk management

Cybersecurity Talent Shortage
Posted on Tuesday, January 2nd, 2018 by
We currently experience a shortage between 1 million and 1.8 million qualified people in the physical and cyber security industry. Today’s CISOs struggle between choosing to build their own IT security dream teams or outsourcing their security to a trusted security service provider. Now the question is, if we put 1 million people in a college and train them for 4-5 years every year for 20 years, would there be such a talent shortage? Did we miss the window to get that done?

Topics: CISO, Penetration Testing, Risk management

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now