Threat and Vulnerability Management

  • Vulnerability assessment and penetration testing
  • Application security and source code review
  • Mobile and cloud application security review
  • Payment devices security review
  • Financial inclusion compliance audits
  • Insider threat management
  • Context-sensitive vulnerability advisories

Identity and Access Management

  • Identity and access management architecture definition
  • Enterprise and consumer identity and access management solution implementation
  • IAM business value health-check and enhancement advisory services
  • Privileged identity management solution implementation and operations
  • Identity governance administration and ongoing operations maintenance

Risk and Compliance

  • IT risk management
  • Information lifecycle management services
  • Industry-specific security compliance reviews
  • Business continuity management services
  • Third-party vendor security governance

Incident Management

  • Incident response and crisis management
  • Breach remediation
  • Forensic investigations
  • Third-party reporting, notification and disclosure
  • Remediation planning and implementation

Active Defence Services

  • Active Discovery
  • Cyber Response Team
  • Threat Intelligence
  • Overview of PwC Active Defence Services Platforms

Security Implementation

  • Security product/solution selection
  • Security product/solution effectiveness review
  • Security solution implementation
  • SoC transformation

Managed Services

  • Facility with high-end technology and best resources in the industry with 24×7 security events monitoring
  • Merging of deep security domain expertise with consulting experience through Cyber Protection Centre, thus providing a differentiated experience
  • Industry-specific threat intelligence with 150+ feeds
  • Signature-less user behaviour analytics for detecting insider and targeted attacks
  • Automated end-to-end incident management workflows from event collection, detection and response
  • Continuous network security through automated vulnerability management and remediation
  • Best-in-class zero-day malware analysis lab with automated malware detection, analysis and report submission

Strategy, Governance & Architecture

  • Cyber threat assessment
  • Enterprise cybersecurity architecture design and definition
  • Supply chain security architecture and implementation
  • Cloud and mobility security architecture
  • SCADA security
  • Internet of Things Security (IoT)