Cybersecurity Approach

 

Cybersecurity approach
  • Cybersecurity training & drill
  • Incident response readiness assessment
  • Technology risk & cybersecurity advisory
  • Business continuity & disaster recovery planning
  • SIEM & security analytics 
  • IT managed services (AvailEase)
  • Incident response management
  • Technical analysis of threats & incidents
  • Digital forensic preservation & investigation
  • Claims resolution advisory  
  • Incident documentation & post-mortem review
  • IT & Cyber security audit
  • Incident response testing & validation
  • IT systems & remediation programme enhancement

Backed by strong internal controls and safeguards of the highest standards, our IT services are ABS OSPAR-certified to serve financial services institutions. We also have a strong track record in serving the government sector and mid to large size corporations across Asia-Pacific.

OSPAR
consulting 

Cybersecurity advisory


Assess your security posture, understand and tackle cyber risks and opportunities cost-effectively and with minimum disruption.

  • Audit and compliance – General IT controls/ Application controls / Network security controls
  • IT governance and oversight – Customised cybersecurity training and drills
  • Assessment and penetration testing
  • Recovery and continuity
  • Secure data erasure

cyber-security 

Security Information And Event Management (SIEM)


Proactively detect, protect and correct security incidents within your network environment. Our comprehensive SIEM solution provides:


  • Centralised visibility of all machine data across your network, applications and security devices
  • Collection of logs for retention requirements
  • Real-time integrity monitoring and continuous compliance with IT security policies with automatic alerts and control of changes
  • Predictive analytics and smart automation to prioritize and respond to threats

confidential 

File Integrity Monitoring (FIM)


Enhance your data security programme and keep your systems in a trusted state real-time with FIM.


  • Flag out unauthorised actions by tracking files and folders access and movement
  • Detect zero-day malware and advanced persistent threats
  • Support adherence to compliance requirements

security-configuration 

Security Configuration Management (SCM)


Our SCM solution increases operational efficiency by combining vulnerability assessment, automated remediation and configuration assessment to deliver a defence-in-depth strategy against cyber threats.


  • Automate security checks such as firewall settings, security patches, event log policy and more
  • Periodic system setting assessment against security guidelines for compliance management

big-id-card 

Identity and Access Management (IAM)


Mitigate risks of shadow IT and meet compliance requirements with our managed IAM solutions. With IAM, you can always ensure that the appropriate individuals in your organisation have the proper access to the right resources (applications, databases, networks, etc.), at the right times and for the right reason. 


  • User administration & provisioning
  • Access management
  • Password management
  • Privileged account management
  • IAM governance

building 

Incident Response (IR) Readiness Assessment


Identify your business risk exposure level and the security gaps. We will also validate and enhance existing incident response plan with your security needs in mind.


Determine your current state of preparedness against internal and external threats with our IR readiness assessment.

 


research 

Digital Forensics Preservation & Investigation


We support law firms and business owners in forensic analysis to recover digital audit trails as evidence for formal investigations into areas such as industrial espionage, copyright infringement and fraud.