Hitachi Systems Security
Follow
203 Followers
Follow Hitachi Systems Security on their other social channels!
About Us
Founded:
1999
Company Size:
51-200 employees
Company Type:
Public
Location:
Quebec, Canada
Website:
Hitachi Systems Security Inc. is a Global IT Security Service Provider who builds and delivers customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7. Our mission is to deploy information security solutions that protect our ...
Read more
Promoted Content
[E-Book] The 5 Proven Benefits of a Managed Security Services Provider
Follow
Cybersecurity Challenges & Organizational Change Management
If you’re going through a merger and acquisition, adding new office locations, hiring new members, dealing with integrating technologies or signing up new third-party vendors, you’ll need to figure out if your cybersecurity strategy is resilient and effective enough to deal with these changes. The post Cybersecurity Challenges & Organizational Change Management appeared first on Hitachi Systems Security | Managed Security Services Provider.
Follow
What is a Cybersecurity Posture Assessment?
When it comes to choosing the right cybersecurity strategy, how are organizations supposed to know what is best? Should you conduct regular penetration testing, vulnerability assessments, control assessments, compliance audits, risk assessments, security program reviews, etc.? The list goes on! How often should this be done? And how can you be sure that these initiatives will actually pay off? The post What is a Cybersecurity Posture Assessment? appeared first on Hitachi Systems Security | Mana ...
Follow
GDPR: Privacy by Design
The GDPR imposes Privacy by Design and privacy as the default setting to all controllers. This does not translate in a to do list for the controller. Instead, the controller is expected to implement “appropriate” technical and organizational measures that are designed to implement data protection principles in an effective manner and to ensure that, by default, only personal data is processed that is necessary for each specific purpose of the processing. The post GDPR: Privacy by Des ...
Follow
Vulnerability Scan vs Vulnerability Assessment
Knowing how to run a vulnerability scan and getting a list of vulnerabilities doesn’t make you a security specialist. You may think you know what a security assessment is, but the reality is that you might not. The post Vulnerability Scan vs Vulnerability Assessment appeared first on Hitachi Systems Security | Managed Security Services Provider.
Follow
Third-Party Security: Vendor Classification, Assessment & Management
Establishing partnerships, outsourcing, or purchasing different products from multiple third-party vendors frequently involve risks. Here is how to assess third-party vendors and mitigate security risks. The post Third-Party Security: Vendor Classification, Assessment & Management appeared first on Hitachi Systems Security | Managed Security Services Provider.
Follow
GDPR Compliance in Canada
Canadian companies, even those located outside of the EU, must comply with GDPR requirements if they are controlling or processing data from EU residents. Performing assessments or better yet, building a comprehensive compliance program, does not only help Canadian organizations achieve GDPR compliance but also help align with other compliance requirements on an ongoing basis. The post GDPR Compliance in Canada appeared first on Hitachi Systems Security | Managed Security Services Provider.
Follow
How can the CIS controls help you become compliant with the GDPR?
The Center for Information Security (CIS) provides some highly-effective and adequate security controls that help organizations comply with GDPR. The following sections describe some top CIS controls as well as their benefits for GDPR compliance. The post How can the CIS controls help you become compliant with the GDPR? appeared first on Hitachi Systems Security | Managed Security Services Provider.
Follow
GDPR Compliance: What You’re Doing Wrong
Understand what GDPR compliance is really about, why ticking a checkbox is not enough, and how you can approach your GDPR compliance efforts for lasting success. The post GDPR Compliance: What You’re Doing Wrong appeared first on Hitachi Systems Security | Managed Security Services Provider.
Follow
How to Address SIEM Limitations
Having a SIEM doesn’t automatically mean that your organization is secure. However, there are several possible solutions that can help organizations address their SIEM limitations. The post How to Address SIEM Limitations appeared first on Hitachi Systems Security | Managed Security Services Provider.
Follow
How Effective is your SIEM Solution?
SIEMs don’t fully protect your corporate’s IT environment against newly emerging cyber-attacks. Much like other technology solutions, they need continuous 24/7 maintenance and some additional controls to be deployed to work effectively. The post How Effective is your SIEM Solution? appeared first on Hitachi Systems Security | Managed Security Services Provider.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel