IT Solutions END-TO-END CYBER SECURITY

November 8, 2018

We assist nuclear operators and suppliers in complying with the most up-to-date cyber security regulatory requirements for Industrial Control Systems. Let us help you adapt to the latest in industry best practice and meet your regulatory needs, including: NIST SP800-82, NIST SP800-53, NRC RG5.71 and CSA N290.7-14. In conjunction with Alithya's hardware and software services, we provide a suite of services tailored to enhance the overall cyber security posture of our clients.

Spotlight

Disruptive Solutions, LLC

Disruptive Solutions is an employee and Veteran-owned Small Business focused on providing niche technical services. We are a team of experienced computer forensics, security and intelligence professionals with a track record of success in the Federal, Commercial and Academic work spaces. Specialties computer forensics, mobile device forensics, technical exploitation, vulnerability research, reverse-engineering, malware analysis, technical intelligence analysis, cyber security, incident response, penetration testing, vulnerability assessments, and security assessment.

OTHER WHITEPAPERS
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | December 28, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face.

Read More
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

CyberSecurity Under Stress

whitePaper | August 11, 2022

SecOps teams in the US and UK are being asked to do more with less, leading to higher stress levels that impact both their work and personal lives. The growing risk from cyber attacks is also compounded by significant recruitment and retention issues within cybersecurity.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More

Spotlight

Disruptive Solutions, LLC

Disruptive Solutions is an employee and Veteran-owned Small Business focused on providing niche technical services. We are a team of experienced computer forensics, security and intelligence professionals with a track record of success in the Federal, Commercial and Academic work spaces. Specialties computer forensics, mobile device forensics, technical exploitation, vulnerability research, reverse-engineering, malware analysis, technical intelligence analysis, cyber security, incident response, penetration testing, vulnerability assessments, and security assessment.

Events