Opportunities in Risk Assurance Services (RAS)



Similar documents
Governance, Risk and Compliance Assessment

Kuala Lumpur, Malaysia, May Report

Michelle Govan & Anand Philip Network & Security Engineering

The Value of Information Security Certifications

Developing a robust cyber security governance framework 16 April 2015

External Supplier Control Requirements

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

Cybernetic Global Intelligence. Service Information Package

AVANTGARD Hosting and Managed Services

Business Continuity. Is your Business Prepared for the worse? What is Business Continuity? Why use a Business Continuity Plan?

Medical Tourism Malaysia. Tan Sri Dato Dr Abu Bakar Suleiman President International Medical University (IMU), Kuala Lumpur, Malaysia

Need to protect your business from potential disruption? Prepare for the unexpected with ISO

AVANTGARD Private Cloud and Managed Services

CONSULTING IMAGE PLACEHOLDER

Cloud Readiness Consulting Services

Navigate the regulatory maze

Vulnerability Assessment & Compliance

KEY CRITERIA TO SELECT AN IT SERVICES PROVIDER IN ASIA

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32

Crisis and issues management

KPMG Information Risk Management Business Continuity Management Peter McNally, KPMG Asia Pacific Leader for Business Continuity

Raising Business Continuity Management Awareness in Malaysia

CYBER SECURITY TRAINING SAFE AND SECURE

Defensible Strategy To. Cyber Incident Response

ESKISP Direct security testing

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Canadian ISO User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799

Business Continuity Management Policy

Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services

BUSINESS CONTINUITY POLICY

Websalad Connect. A fresh approach to digital marketing... PAGE 1

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council

Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response.

IT Risk Closing the Gap

Business Continuity Planning in IT

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

UNIVERSITY BOARD SKILLS REVIEW MATRIX Page 1 of 5

Intel Business Continuity Practices

Into the cybersecurity breach

Penetration Testing Services. Demonstrate Real-World Risk

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment

Cloud Readiness Workshop

Report on CAP Cybersecurity November 5, 2015

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

DESCRIBING OUR COMPETENCIES. new thinking at work

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Five keys to a more secure data environment

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

IT Security. Securing Your Business Investments

AVANTGARD RECEIVABLES. Predictive Metrics for Debt Buyers

BT Conferencing Business Continuity Management. Planning to stay in business

Provide administrative & sales support role to CEO Office & Investor relation dept.

Information Security Services

The Southeast Asia Data Centre Market A look at new players and key drivers as well as the opportunities and challenges in Asia

eet Business continuity and disaster recovery Enhancing enterprise resiliency for the power and utilities industry Power and Utilities Fact Sheet

ABB s approach concerning IS Security for Automation Systems

CYBER SECURITY GUIDANCE

Enterprise Security Tactical Plan

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Security Consulting. Services Overview

Strategy 2020 Building A Future-Focused Business School

Introduction to Business Continuity Planning

ALS Food & Pharmaceutical Asia - Capability Statement

Things To Do After You ve Been Hacked

Cutting through the insurance jargon!

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Business Continuity and Crisis Management. Interactive workshop on the application of best practice (and more)

A GUIDE TO BUSINESS CONTINUITY PLANNING

Overview of Asian Insurance Markets

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

Cyber Risks in the Boardroom

Global Information Security Survey 2002

IP Trading Solutions

opinion piece IT Security and Compliance: They can Live Happily Ever After

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

Advanced IT Audit Training

Cybersecurity The role of Internal Audit

Overview TECHIS Manage information security business resilience activities

Protecting critical infrastructure from Cyber-attack

CFIR - Finance IT 2015 Cyber security September 2015

Ethical Hacking and Penetration Testing Presented by: Adam Baneth Managing director

BUSINESS CONTINUITY PLAN. Specific Issues for Public Health Emergencies. Guidelines for Air Carriers

QBE Dubai The specialist in business insurance

Executive Management of Information Security

NNIT Cybersecurity. A new threat landscape requires a new approach

Application Security in the Software Development Lifecycle

Transcription:

www.pwc.com/my Opportunities in Risk Assurance Services (RAS) RAS Information Sheet

An experience that stays with you At PwC, we focus on three things: advisory, assurance and tax services. But we don t think off-the-shelf products and services are always the way to go. How we use our knowledge and experience depends on what our clients and people want to achieve. So we ll start by getting to know you. You do the talking. We ll do the listening. The relationships we build through sharing and collaborating with clients and teams alike, shapes how we use our network of 169,000 people around the world connections, contacts and expertise come together to create value that our stakeholders are looking for. The experience you gain with us will stay with you no matter where your career takes you.

What is RAS? These are some of the things we do Ethical Hacking Information Security Business Continuity Data Loss Prevention Disaster Recovery Data Management Personal Data Protection

Who we are Today s high-risk business environment calls for strong defenses against threats, both expected and unexpected. A company s information systems, network security, operations and people must be protected. Our RAS professionals are at the forefront of technology and security developments in the nation. They provide in-depth solutions that protect our clients business, reputation and operations. Clients turn to us for assurance on the integrity of their information systems. We help them protect their networks from malicious hackers and fortify their companies and people to build a strong line of defense against unpredictable disasters. We provide comprehensive services to clients in the following lines of service: Information Assurance Threat & Vulnerability Management Business Continuity Management Slide 4

What we do Information Assurance (IA) Secure and accurate information are essential in any business. As an IA professional, you will analyse information technology infrastructures for each client and provide assurance on the integrity of their systems and data. You will also evaluate their compliance with the relevant security and control policies, procedures and international best practices. Within IA, our services include: IT General Controls Review Application Systems Review System Pre/Post Implementation Review Data Management Services Project Assurance Personal Data Protection Act extensible Business Reporting Language (XBRL) Third Party Assurance IT Internal Audit Outsourcing/C0- sourcing IT Governance Review IT Due Diligence Information Security Policy & Framework Information Security Management System (ISMS) Slide 5

What we do Threat & Vulnerability Management (TVM) Enterprise-wide information systems have become increasingly complex, requiring equally sophisticated security defenses. As a TVM specialist, you will work with ethical hackers and travel around the world to assess system safety and work at preventing cyber crime. Our TVM services include: Network and Security Assessment Web Application Vulnerability Assessment (WAVA) Penetration Testing Wireless Security Assessment (WiSA) WebTrust Slide 6

What we do Business Continuity Management (BCM) You never know what to expect in today s unpredictable world. Global pandemics, typhoons, landslides and computer viruses are just some of the disasters that can disrupt a business. Our BCM professionals work with clients to prevent operational interruptions in the event of a disaster. We help organisations prepare to return to a state of business as usual as quickly as they can. Take pride in joining the country s leading BCM team. We provide the following services: BCM Framework Development Risk Assessment and Business Impact Analysis Recovery Strategy Selection BCM Plan Development and Supporting Infrastructure Testing and Ongoing Maintenance of the BCM Plan Monitoring and Enforcement Crisis Simulations Slide 7

Meet the team Meet the RAS Team. We re from diverse backgrounds and all have different points of view. But we form a close and cohesive unit that will support you throughout your career development. Being in RAS gives me the opportunity to interact and learn from working in different industries. This helps me develop my skills as a professional and is a place where my opinion and work is valued. Wong Hon Chien Associate It s the people, their energy, the ideas and the great team spirit which makes RAS a wonderful place to be for continuous career development. Gayathri Jaganathan Assistant Manager "If there's a place in this world for me to learn about commitment, creativity and thought leadership, it will be RAS. I believe what sets us apart is our bold perspective - while most people perceive only with their eyes, we envision with our minds." Yap Pei-Shan Assistant Manager Slide 8

Meet the team We ve influenced national and corporate policies, and changed the way people do business. And we re not stopping there. We ve worked extensively in Malaysia, the United Arab Emirates, the Philippines, Hong Kong, Bangladesh, Singapore, Cambodia, Thailand and Taiwan, and that s just scratching the surface Where do you see yourself next? Slide 9

Join us The Risk Assurance Services team thrives because of our people s diversity. We value and recognise fresh perspectives from our new hires. If you re someone looking to hone your individual specialist skill set, embrace change, confront new challenges and experience life from a different point of view then Risk Assurance Services is definitely the team for you! Malaysia's graduate employer of the year (2011, 2009) Ranked #1 in he Consulting Sector (2011) Ranked #1 in the Accounting and Professional Services Sector (2010, 2009, 2008) Slide 10

pwc.com/my Contact Us PricewaterhouseCoopers Level 10, 1 Sentral Jalan Travers Kuala Lumpur Sentral 50470 Kuala Lumpur Phone +60(3) 2173 1188 Fax +60(3) 2173 1288 pwcmsia.info@my.pwc.com twitter.com/pwc_malaysia facebook.com/pwcmsia youtube.com/pwcmalaysia 2012 PricewaterhouseCoopers. All rights reserved. "PricewaterhouseCoopers" and/or "PwC" refers to the individual members of the PricewaterhouseCoopers organisation in Malaysia, each of which is a separate and independent legal entity. Cs04617