Aligning security with your business goals

IT security and risk management

Aligning security with your business goals

Aligning security with your business goals

You’re facing more demands than ever—compliance, performance and shareholder pressure aren’t going away. Relying on patchwork security doesn’t cut it anymore. Truly protect your intellectual property and sensitive data by weaving security needs into your business objectives from the start.

Drawing on our global experience, we bring you security advice you can trust. We’ll help you build enterprise security suited to your organisation—and the future. We support audit and non-audit clients in 153 countries so your security and risk management can cover the globe. Let’s move ahead together.

IT security and risk management

Our Capabilities

Enterprise Security Strategy

  • Information Security Governance
  • Security Metrics
  • Organisational Security Structure Design
  • Security Strategic Plan
  • Security Awareness
Enterprise Security Strategy

PCI Compliance

  • PCI Impact Assessment
  • PCI Readiness Assessment
  • PCI Readiness Scanning
  • PCI Audits
  • PCI Reporting
PCI Compliance

Security Policy Compliance

  • Security Policy Readiness Assessment
  • Security Policy Management Framework
  • Security Policy Compliance Framework
  • Definition of Roles & Responsibilities
  • Automate Security Policy Compliance
  • Program Awareness
Security Policy Compliance

Vulnerability Management

  • Security Configuration Review
  • Network Vulnerability Assessment
  • Host Vulnerability Assessment
  • Wireless Vulnerability Assessment
  • Data Centre Physical Access Assessment
  • Social Engineering Protection Assessment
  • Web Application Penetration Test
  • External Network Penetration Test
  • Internal Network Penetration Test
  • Modem Penetration Test
  • Wireless Network Penetration Test

 

Security Policy Compliance

Security Architecture

  • Security Architecture Assessment
  • Security Architecture Design
  • Security Architecture Deployment
Security Architecture

Data Leakage Protection (DLP)

  • Sensitive Data Assessment
  • Data Protection Strategy & Framework
  • Data Classification
  • DLP Technology Selection
  • DLP Technology Deployment
Data Leakage Protection (DLP)

Identity Management (IdM)

  • IdM Strategy
  • IdM Organisation & Process Design
  • IdM Enterprise Architecture
  • IdM Directory Design
  • IdM Technology Selection
  • IdM Technology Deployment
Identity Management (IdM)

Security Incident Management

  • Incident Management Framework
  • Incident Classification
  • Event Tree Analysis & Design
  • SIEM Architecture
  • SIEM Technology Selection
  • SIEM Technology Deployment
Security Incident Management

IS27001/27002

  • ISMS Readiness Assessment
  • Security Management Framework
  • IT Risk Management
  • ISMS Policy & Procedure Development
  • Security Awareness

Value for Our Clients

Value for Our Clients
  • Assess how security governance and planning are aligned to support business and compliance requirements.
  • Evaluate security prioritisation processes by analysing key program drivers and industry practices.
  • Assess current security strategy and provide actionable recommendations to improve program sustainability.
  • Leverage PwC’s SecurityATLAS toolset and overall security taxonomy including various capability and process models to evaluate security programs.
  • Provide industry-related security benchmarks and metrics.
  • Security architecture/design
  • Application security as well as architecture and code reviews
  • Sensitive data protection
  • Identity and access management solutions
  • Integrated threat and vulnerability management solutions
  • Mobile security strategy, analysis, design and assessment services
  • Key security processes such as those supporting security communications and reporting
  • Emerging technologies, such as Cloud Computing and Social Media
  • Working with you to identify risk areas and recommend improvement options.
  • Utilising proven methodologies and industry knowledge to identify security measures (people, processes and technology) and process standardisation opportunities.
  • Assessing current compliance monitoring capabilities against established standards and policies to identify compliance gaps and continuous improvement opportunities.
  • Security-related cyber crime dispute analysis and digital forensics.
  • Security crisis and response policies and procedures.
  • Post-mortem security processes which analyse and help prevent future incidents.
  • Security monitoring processes, and incident response policies and procedures.
  • Drive privacy awareness programs.
  • Reporting process of privacy related risks at the board, executive management and task force level.
  • Integration of privacy and security assessment activities.
  • Examine current inventory and map business processes that involve high-risk data elements throughout the data lifecycle.
  • Third-party privacy and security oversight program including contractual safeguards, manual or automated pre-contract risk-based assessments and ongoing program.

Data Protection Services

Organisational compliance requirements vary depending upon the industry as well as the nature of the business and its customers and employees. When data breaches happen, organisations can risk incurring lawsuits, fines, regulatory sanctions, and reputational damage. As organisations increasingly adopt highly complex and collaborative business models predicated on the sharing of sensitive information (most notably personally identifiable information), the focus on privacy and compliance continues to rise in proportion to the legal, regulatory, and reputational risks associated with such business practices. In response to this threat we can assist you to protect sensitive data. Our key service offerings include:

  • Risk assessment
  • Enterprise Data Protection Framework development
  • Data protection technology deployment
  • Data classification and ownership
  • Business process creation
Data protection services
Disaster Recovery Planning (DRP) services

Disaster Recovery Planning (DRP) services

DRP encompasses any activity proactively executed focusing exclusively on the recovery of technology infrastructure (hardware, software, data communications, telecommunications, electronic information assets) from a disaster event and ensuring continuity of operations at established service levels.

We provide you with a holistic framework for enterprise survival planning to deliver a reliable, resilient, secure, and performance-driven enterprise environment to meet current and future business needs.

Contact us

Simon Gealy

Simon Gealy

CEO of PwC South East Asia Consulting and Consulting Lead Partner, PwC Thailand

Follow us