Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

http://www.pwc.

ro/technology-solutions

Our services
Cyber Security
We help you choose the direction

Information
Preparation of strategy and organization for effective
information asset protection, security policy, management
reporting, approach to secure business processes
Building confidence in your digital
Security Strategy We help to create
efficient control system
future
Business
We help to survive Information
Audits, risk management approach,
Continuity implementation of methodologies
Building and testing procedures, Security
business continuity, crisis
Planning (SABSA, ISO27000, SecurityAtlas),
& Disaster Management certifications (SOC / SysTrust SM / TM,
management, disaster recovery
solutions Recovery STRIKE ISAE 3402, PCI DSS),
communication and training, ensuring
People

compliance with regulations


Assesment
We help to detect and handle of the 𝟏𝟏𝒔𝒔𝒔𝒔 line We help to build secure solutions
security incidents Incident Architecture and solutions for
handling of defense Architecture, application network and mobile
Building and benchmarking of SOC, application & technology security, security "in the
optimization of processes for Monitoring
monitoring and incident handling, network security, cloud", identity and access Technology
infrastructure management, DLP systems, ERP
construction of CERTs, conducting Investigations security Security ATLAS,
investigations, computer forensics
SOCCER
Threat SCADA Security
& Vulnerability
We help to understand the threat Management
Penetration testing, vulnerability monitoring, continuous
monitoring of global threats PENTESTS
Connections

Our team
Risk

We have the largest practice of security in the world, In CEE, our team relies on experts with many years of
employing over 3 500 highly qualified experience in the role of heads of IT security or key Is your business
professionals in the field of information security, with specialists largest technology companies and financial structured for the
over 1 200 in Europe. Every year, our company services in Poland, and experienced security auditors. Leading organisations can future? Doyou have
As a result, we are able to be your trusted confidently deal with cyber
carries out globally over 20 000 projects in the fields the right culture?
of security, of which 75% are consulting projects or partner for fully understands the needs and attacks and continue to Crisis

assurance, and 25% are associated with the challenges faced by you. prosper. Can you?
implementation of security solutions.

Complete security is not possible. Would you know


what to do if you were compromised? Are you Priorities
Contacts
prepared?
Mircea Bozga Robert Stoicescu Low efficiency Fear
Partner, Risk Assurance Leader Risk Assurance Manager
and effectiveness?
+40 722 200 909 +40 728 182 371 of the Cloud?
mircea.bozga@ro.pwc.com robert.stoicescu@ro.pwc.com
Too much data outside
data centres?
Laszlo Kereszturi Majority of organisations
Risk Assurance Technical Manager had a security breach. How
do you know that you
+40 720 028 619
laszlo.kereszturi@ro.pwc.com
hadn’t?
© 2016 PricewaterhouseCoopers Audit S.R.L.. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers Audit S.R.L.
which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.
Building confidence How can we help?
Areas of focus

Is your business structured for the future? Do you have


We view cyber security through a series of interconnected lenses. This rounded approach is designed to provide
you with confidence: in your people, technology and connections, how you manage risk, set priorities and
the right culture?
respond to an incident or during a crisis. Our approach typically begins with an assessment of your current • Building security strategy: analysis of the current state and gaps in relation to
capability and a recommendation of areas for improvement. This will enable you to develop a cyber security expectations, best practices and benchmarks; design and implementation of the
strategy to build confidence in your digital future. changes, preparation of KPIs and reporting

Complete security is not possible. Would you know what


You can’t secure Seize the advantage to do if you were compromised? Are you prepared?
everything We help you exploit digital • Audits and vulnerability assessment: automatic and targeted intrusion attempts,
We help you set the right opportunity with confidence. organizational audits, use of social engineering
priorities. • Digital trust is embedded in
the strategy
• Measuring and benchmarking: development of
• Enterprise security a set of KPIs and management reporting; benchmarking to other organizations
architecture Priorities Risk • Privacy and cyber security legal
• Protect what matters compliance • Certification: assessment and independent confirmation of the level of security
• Strategy, organisation and • Risk management and risk
governance appetite
Too much data outside data centres?
• Threat intelligence
• BPMS Solutions: replacement of systems created by the users themselves with safe,
flexible and effective solution that supports and allows to optimize business
It’s not if but Their risk is processes
when Crisis
your risk • Mobility management: solutions for keeping your information secure in the age of
We help you build an Connections
We help you mobile devices
intelligence-led understand and
defence, enabling rapid manage risk in your
detection and interconnected
containment. business ecosystem.
Staff shortages or lack of experience?
• Continuity and • Digital channels • Training and recruitment: organization of specialized trainings, workshops for
resilience • Partner and supplier management, assessment and certification of personnel;
• Crisis management management • Outsourcing: support of IT security experts in the implementation of all or selected
• Incident response Technology People • Robust contracts security management functions.
and forensics
• Monitoring and
detection
Low efficiency and effectiveness?
• Cost-effectiveness analysis: analysis of architecture and organizational structure of
Fix the basics People matter IT or Information Security function to optimize the return on investment
We help you use technology to your We help you build and maintain a • Support in choosing solutions: support in the selection of tools and solutions that
advantage, deriving maximum return secure culture, where people are aware
support risk and security management processes, including identity and access
from your technology investments. of their critical security decisions.
management
• Identity and access management • Insider threat management
• Information technology, operations • People and ”moments that matter”
technology and consumer • Security culture and awareness
technology Fear of the cloud?
• Mobility
• IT security hygiene • Support for Cloud Computing customers: security analysis of Cloud Computing
• Security intelligence and analytics providers; analysis of legal and formal aspects; support in supplier selection and
migration
• SOC/Support for service providers: ISAE 3402/SSAE 16 certifications

You might also like