Identify, manage, measure and report on IT security compliance requirements through a complete end-to-end framework and program of standards, processes and tools.
- On Demand: Guidance to NIST Framework Requirements Video:On Demand: Guidance to NIST Framework Requirements
- Sound Bites: Cyberattacks in the Insurance Industry Video:Sound Bites: Cyberattacks in the Insurance Industry
- #Securewater: Defending Critical Infrastructure Video:#Securewater: Defending Critical Infrastructure
- Cyberconfidence with Horizon Video:Cyberconfidence with Horizon
- Incidents Happen: A Five Step Approach to Cybersecurity Video:Incidents Happen: A Five Step Approach to Cybersecurity
CSC CYBERSECURITYOur global cybersecurity services, which clients have trusted for more than 35 years, give you the confidence to securely open your systems to partners, customers and suppliers. As you move into the 3rd Platform and leverage big data & analytics, the cloud, mobility, social media and the Internet of Things, you can trust us to secure your operations.
Services to formulate an effective security strategy, including organization, governance, metrics, process and technology deployment, and meet legal and regulatory compliance.
When it comes to cybersecurity, enterprises need to know how they stand in reality — not where their policy says they stand. Today, regulatory and compliance mandates demand it.
Confidently adopt an Outside-In approach and securely embrace third-platform and disruptive trends while guarding against rapidly changing risks.
BC/DR plans are the bedrock of preparedness. For organizations, they are components of sound risk management and preserve resiliency during extreme duress.
CSC is accredited to perform common criteria IT security evaluations in the U.S., Canada and Australia. Our proven processes and experienced security experts can help you quickly and cost-effectively certify your products to the standard required by many government and civilian agencies.
Success StoriesLearn how CSC has delivered mission-critical security solutions around the globe. Browse all Success Stories.
Attaining deep cybersecurity knowledge is essential in the ongoing war against hackers and other cyber criminals.
CSC implemented cybersecurity solutions and enterprise security roadmap to address ongoing cybersecurity concerns.
CSC’s strategic threat assessment ensures Australia’s first electronic voting system provides the secrecy, transparency and trust that voters and candidates expect.
MWH Global is partnering with CSC to provide cybersecurity services that help utilities and municipalities worldwide better identify and manage vulnerabilities, mitigate risk and improve the security of their systems and critical infrastructure.
Latest InsightsBrowse all of our Cybersecurity Insights.
This paper highlights the cybersecurity challenges the financial services industry faces due to the changing nature of threats and business, and provides a view on mitigation strategies to strengthen security.
Once again, cybersecurity ranked top of mind — in initiatives, investment, impact on business and productivity — in CSC's sixth annual survey, which reports on CIOs’ priorities and the IT plans they’ve made to address their biggest challenges.
As manufacturers enter a new era of connected products, systems and things, they face a complex range of challenges when working to secure their intellectual property, infrastructure and sensitive information.
Forrester Research Inc. has named CSC a “Leader,” the evaluation’s highest designation, in the report, “The Forrester Wave: Managed Security Services: North America, Q4 2014."Read more cybersecurity articles in our latest issue of CSC World.
by Christian Foetinger — Given the evolving information security threats to any organization, it’s imperative that you set the security standards of your organization. Consider the following 10 principles.
by Eric Pinkerton — “You are more likely to be killed by a vending machine than by a shark.” An InfoSec professional, whom I respect greatly, proffered this cheery prediction to me to illustrate just how poorly we, as humans, evaluate risk.
by Bill Harshbarger — More than 70 percent of global organizations have not yet remediated the Heartbleed vulnerability. Those 70 percent can assume that massive amounts of data have leaked from their systems.
by Peter Rehäußer — Many still don’t understand what cloud computing really means, what the major differences from classical hosting or outsourcing are, and how they need to protect their own data.