Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

BT Launches Virtual CSO Service

BT has launched a new managed security service designed to provide customers with the full development, management and operation of an enterprise information security team.

BT has launched a new managed security service designed to provide customers with the full development, management and operation of an enterprise information security team.

The service, called the virtual Chief Security Officer (vCSO), was designed to help security executives address the growing challenge of managing a world-class security function, the company said.

With vCSO from BT Advise Assure, an organization can take advantage of a full service that covers all the duties of a Chief Security Officer (CSO) at a lower cost, enabling them to better balance security demands with strategic business needs.

“With the pace of change in business and technology advances today, it’s never been harder to protect your business. However, for most businesses, IT resources are already constrained and there may be no budget to hire a dedicated security professional,” said Bas Burger, president of US & Canada at BT Global Services. 

The vCSO service can be tailored to fit the unique needs of each company, BT said, and is available on both a project basis for specific security initiatives, including emergency scenarios, as well as an on-going retainer for more long-term support.

Specific areas where a vCSO can help include:

• Development, implementation and updates of global security policies, standards, guidelines and procedures.

• Reviewing current IT risk assessment processes and conducting Rapid Risk Assessments (RRA) to determine vulnerabilities in the business.

Advertisement. Scroll to continue reading.

• Designing an information security program roadmap to support specific business requirements.

• Managing and directing the team of security professionals and vendors that maintain the IT infrastructure, including network connectivity, Internet presence, applications and servers, clients, networked devices, wireless, telephony, e-business, IDS, anti-virus, authentication, authorization and firewalls.

• Leading internal management teams across different business functions, internal security councils and governance forums.

• Acting as a consultant and liaison to other IT groups on security matters.

“While many companies are looking at how to build this role into their future organizations, BT has already been thinking about how to solve this problem,” Burger said. “With our vCSO service, companies can get the expert, board-level resources they need to drive security, compliance and governance programs without a costly staffing investment.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem