Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Security Practices
You are here: Home \ Security Practices
Plan Your Cybersecurity Projects
Posted on Tuesday, November 13th, 2018 by
Are you managing several cybersecurity projects at the same time? Do you feel that you could manage your projects more effectively, but don’t know where to start? We’ve compiled 6 steps that will help you plan your cybersecurity projects more effectively

Topics: Security Practices, Tips & Tricks

cybersecurity project management challenges and solutions
Posted on Tuesday, November 6th, 2018 by
Are you struggling with managing your cybersecurity projects? Are you facing challenges during your project and don’t know how to deal with them? We’ve put together several common cybersecurity project challenges and propose solutions for what you can do about them.

Topics: Security Practices, Tips & Tricks

cybersecurity project management best practices
Posted on Tuesday, October 30th, 2018 by
Are you struggling with managing several cybersecurity projects at the same time? Would you like some guidance when selecting the “right” cybersecurity projects for your business context? Do you have a feeling that you could manage them more effectively, for your own sake and for the sake of your organization? If you’ve answered yes to any of these questions, we’ve compiled several best practices that can help you manage your cybersecurity projects more effectively.

Topics: Cybersecurity Posture, Security Practices, Tips & Tricks

cybersecurity project management
Posted on Tuesday, October 16th, 2018 by
For cybersecurity projects to be effective, IT and security professionals need to implement a solid project management practice. An experienced project management team can help ensure that your projects are executed smoothly, stay on budget and are completed within the timeframe that was agreed upon.

Topics: Security Practices

IT pros challenges

Topics: Security Practices, Tips & Tricks

Posted on Thursday, August 30th, 2018 by
In general, security should be looked at as striking the balance between access and control. Too much access may disclose too much information; too much control could be a burden. Security should be a regular part of your best practices to ensure the success of your business.

Topics: Control Assessment, Controls, Cybersecurity Posture, Managed Security Services, Penetration Testing, Risk management, Security Practices, Threat Risk Assessments, Vulnerability Assessment

Cybersecurity Strategy FAQ
Posted on Tuesday, August 14th, 2018 by
We’ve gathered the most frequently asked questions to help organizations develop an effective cybersecurity strategy that reflects best practices, is aligned with their overall business objectives, delivers measurable ROI and protects their critical data assets against breaches and intrusions.

Topics: CISO, Cybersecurity Posture, Security Practices

Cybersecurity-How to Convince the Board
Posted on Tuesday, July 31st, 2018 by
Cybersecurity has moved up from the server room to the boardroom in recent years, and more and more board members understand how crucial a strong cybersecurity posture is in today’s digitalized business environment. As stated by Help Net Security: “Cybersecurity strategy needs to be led by the board, executed by the C-Suite and owned at the front lines of the organization.” If you are responsible for implementing security strategies for your organizations, chances are you will need to present your ideas to the BOD in a way that’s clear, relevant and convincing. Here are 10 best practices to follow to convince the Board.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, July 24th, 2018 by
Aligning your cybersecurity posture with your overall business objectives is essential to protect your business against breaches and intrusions. Security leaders are charged with implementing impactful and effective cybersecurity strategies that improve the organization’s cybersecurity posture.

Topics: CISO, Cybersecurity Posture, Security Practices

Posted on Tuesday, July 10th, 2018 by
To find out how mature you are in terms of cybersecurity, you have to undertake 6 simple steps to define your security posture.

Topics: CISO, Cybersecurity Posture, Security Practices

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More