MELVILLE, N.Y., Aug. 24, 2021 /PRNewswire/ — Building on its commitment to help companies achieve their workplace security goals, Canon Solutions America, Inc., a wholly owned subsidiary of Canon U.S.A., Inc., is pleased to announce the expansion of its cybersecurity portfolio to include Virtual Chief Information Security Officer CISO (vCISO) Services by Agile Cybersecurity Solutions (ACS). The vCISO program provides customers a 12-month annual subscription that includes a variety of discretionary cybersecurity services. Ideal for small to mid-sized organizations that do not have an on-site Information Security (InfoSec) team, as well as large enterprise organizations, vCISO enables subscribers to leverage the full range of ACS’s services—complementing the existing ACS Cybersecurity Integrity Audit services that deliver vulnerability assessments and penetration testing to help organizations uncover potential gaps in their security posture.
All vCISO services are provided by ACS, a group of seasoned cybersecurity industry professionals, all of whom are credentialed and maintain various levels of security clearances. An organization’s dedicated ACS virtual CISO team works to provide continued oversight, both on-site and remotely—whichever is appropriate to the specific task at hand. This can include the oversight of additional vulnerability assessments and penetration testing or social engineering simulations to help with understanding and mitigating unsafe online behavior by employees.
“Throughout our experience with ACS, it was clear that this offering was not only carefully measured and thoughtfully curated to provide customers with a full end-to-end solution, but it was apparent that this was designed by individuals with a deep understanding and experience with cybersecurity in complex midsize organizations,” said Chaim Yudkowsky, chief information officer, The American Israel Public Affairs Committee (AIPAC). “After multiple engagements with this service and utilizing a wide range of its cybersecurity specific elements to meet our goals, I would recommend that others consider incorporating this unique and invaluable service to their operation as we found it to be extremely beneficial in our day-to-day activities.”
Designed to help mitigate damage and prevent future security crises, vCISO Services offers expert guidance and services all throughout the cybersecurity lifecycle. A vCISO can help guide an organization’s executive team through the assessment phase and assist in developing and implementing the necessary policies, procedures, guidelines, and technologies to protect against threats. This service can also help ensure that the proper controls are in place, as well as the monitoring and measurement methods to effectively identify ways to manage risk exposure. Furthermore, vCISO Services offer customers assistance in developing effective security policies, disaster recovery plans, business impact assessments and business continuity plans.
Consultations can also uncover other areas of concern such as breach readiness, personnel security, third-party service provider selection, and the accompanying service level agreements (SLAs). A dedicated vCISO can help an organization get started on the road to certifications such as ISO 27001, meet the standards of PCI-DSS, or prepare for SOC 2 Type 2 audit for the coveted SSAE-18 attestation. These important certifications and accreditations can help efforts to comply with regulations such as SOX, HIPAA, GLBA, the GDPR, and the associated mandates towards protecting personally identifiable information (PII) and protected health information (PHI).
“It is more important than ever for organizations to keep their data secure and private, and we are proud to introduce vCISO to the marketplace,” said Peter P. Kowalczuk, president, Canon Solutions America. “At Canon Solutions America, we are constantly looking for innovative solutions and services to help protect our customers against data breaches and other harmful events that may cause damaging results. The vCISO program provides a dedicated expert that can lead to a complete, carefully curated, end-to-end security policy, while also overseeing and monitoring various potential vulnerabilities.”
Have news to share? We want to help you spread the word. Submit your media releases to firstname.lastname@example.org. Please submit releases in Word or text docs or in the body of an email. Please do NOT send PDF documents.