A global leader in providing technology enabled business solutions and services

  • Cybersecurity in Financial Services — A CSC Point of View
  • CSC Global CIO Survey and Cybersecurity
  • #SecureWater
  • Overview

      Our global cybersecurity services, which clients have trusted for more than 35 years, give you the confidence to securely open your systems to partners, customers and suppliers. As you move into the 3rd Platform and leverage big data & analytics, the cloud, mobility, social media and the Internet of Things, you can trust us to secure your operations.

      Check out upcoming Cybersecurity Events

       Contact Us

      Services to formulate an effective security strategy, including organization, governance, metrics, process and technology deployment, and meet legal and regulatory compliance.

      When it comes to cybersecurity, enterprises need to know how they stand in reality — not where their policy says they stand. Today, regulatory and compliance mandates demand it.

      With IT budget constraints remaining the norm, everyone needs to keep costs contained while also remaining competitive. Security is no exception.

      BC/DR plans are the bedrock of preparedness. For organizations, they are components of sound risk management; a means of preserving resiliency during extreme duress.

      Our practical, comprehensive and efficient approach to cybersecurity risk management complements the dynamic business nature of the cloud.

      Identifying, managing, measuring, and reporting on IT security compliance requirements through a complete end-to-end framework and program of standards, processes and tools.

      Trusted identities and controlling access to information are crucial when it comes to the delivery of commercial and government services.

      The chances are high that an organization will suffer some sort of breach that will require a skilled response. Executing an incident response plan is the ultimate test of readiness.

      CSC is accredited to perform common criteria IT security evaluations in the U.S., Canada and Australia. Our proven processes and experienced security experts can help you quickly and cost-effectively certify your products to the standard required by many government and civilian agencies.

  • Success Stories
  • Latest Insights
  • Cybersecurity Blogs
    • Cybersecurity Blogs

      by Rob Carey — I was asked to read and review the newly published FEDRAMP FISMA HIGH Cloud security controls and, as written, this guidance may have been forged out of a very precious metal: unaffordium.

      by Hank Hensel — When ICS-CERT confirmed in its newsletter that a public utility had been hacked successfully, many skipped the more important message made in that issue.

      by Joel Finkle and Edward Liebig — While movie-style hacking plots aimed at medical devices used by the general public remain unlikely, securing medical records and systems remains critical for reducing medical devices’ susceptibility as tempting targets.

      by Stephen Brennan — Recently I had the opportunity to host a collaborative webinar between Co3 Systems and CSC on incident response. In the webinar, I focused on the challenging task of identifying and managing a cyber incident.

  • IDC iView
pixel pixel