Security Programme and Strategy Understand and manage evolving cyber threats with confidence. Protiviti’s cybersecurity strategy experts help organisations understand information security and privacy risks while providing innovative solutions to reduce exposures. We refine security and privacy strategies, practices, and technology architectures.Protiviti can assess your environment and provide a roadmap so you can make smart cybersecurity strategy investments to serve your customers and grow your business.We help our clients take a holistic business and technology view of their risk posture, and we use industry-accepted information security frameworks to evaluate current capabilities. Better understand and manage your organisation's cyber risks Our Cybersecurity Strategy Services Pro Briefcase Assess Cybersecurity Risks Understand and prioritise cyber risks based on your unique risk landscape and cybersecurity maturity. Pro Building office Assess Capabilities Leverage global and industry frameworks and our depth of expertise to understand current capabilities and create a roadmap towards the target security posture. Pro Document Consent Programme Benchmarking, Strategy, and Governance Assess your organisation against industry benchmarks and design a go-forward structure. Pro Document Files Board Communication and Reporting We provide support for meaningful cybersecurity strategy discussions with senior leadership and the board. Pro Document Stack Cyber Programme Office Cybersecurity risks are never static. A successful cyber programme office adapts accordingly. Our team serves as an on-demand “virtual CISO” providing hands-on support, transparency, and structure to respond to changing demands. Make smart cybersecurity strategy investments World-class security A world-class security organisation is nimble, efficient, self-improving, adaptive, and effective. Protiviti helps you maintain your cybersecurity strategy to your specifications and remains aligned with your business objectives. Make smart cybersecurity strategy investments Leading the way on cyber risk quantification As the founding advisory partner to the FAIR Institute, Protiviti provides the FAIR Institute with experience, thought leadership, and sponsorship to promote the adoption and growth of FAIR. Featured insights INSIGHTS PAPER Best Practices for Building a Sustainable PCI DSS Compliance Programme Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years... FLASH REPORT The American Privacy Rights Act of 2024: Could this framework become the data privacy panacea? On April 8, 2024, U.S. Representative Cathy McMorris Rodgers (R-WA) and U.S. Senator Maria Cantwell (D-WA) announced the American Privacy Rights Act. This act aims to establish a comprehensive set of rules that govern the usage of citizens' data. The... INSIGHTS PAPER Mastering Data Dilemmas: Navigating Privacy, Localisation and Sovereignty In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with... FLASH REPORT NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organisation On February 26, 2024, The National Institute of Standards and Technology (NIST) released version 2.0 of its updated and widely used Cybersecurity Framework (CSF). This latest edition of the CSF is designed for all audiences, industry sectors and... BLOGS The importance of dark web monitoring In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of... INSIGHTS PAPER How data sovereignty and data localisation impact your privacy programmes The concepts of data sovereignty and data localisation stem from a desire to keep data within a country’s borders for greater control. While the broad strokes of various privacy laws may be consistent across jurisdictions, governments will dictate... BLOGS Metrics’ role in cyber transformation We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is... BLOGS Cybersecurity risk assessments vs. gap assessments: Why both matter This blog post was authored by Rob Woltering - Associate Director, Security and Privacy on the technology insights blog. As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of... Button Button Leadership Michael Pang Michael is a managing director with over 20 years’ experience. He is the IT consulting practice leader for Protiviti Hong Kong and Mainland China. His experience covers cybersecurity, data privacy protection, IT strategy, IT organisation transformation, IT risk, post ... Learn More Alan Wong Alan is a director at Protiviti Hong Kong with over 21 years of experience in IT and security solutions and project management. He specialises in IT governance, risk assessment, regulatory compliance, and cybersecurity assessment and consulting. He also has an extensive ... Learn More Key success factors for strong cybersecurity management Building a strong cybersecurity management practice is a long journey involving financial and human resource investments. Watch now to learn how Protiviti Hong Kong can help you uplift your operation with cybersecurity management. What is next for CISOs? The CISO Next initiative produces content and events crafted exclusively for CISOs, with CISOs. The resources focus on what CISOs need to succeed. The first step is finding out “What CISO type are you?” Get Involved Case Studies Risk mitigation through cybersecurity strategy and programming Situation: This international, not-for-profit healthcare provider operating over 60 hospitals and 350 clinics in four countries knew its high-priority business demands created issues with information security. Business leaders lost confidence in the organisation’s delivery quality and ability to protect its digital assets. Value: A long-standing relationship with Protiviti yielded significant improvements in the client’s cybersecurity capabilities, programme maturity, and risk mitigation. Critical outcomes included a 53% reduction in superfluous active directory (AD) groups and the standardisation of AD management tool kits, a reduction in phishing campaign testing click-through and compromise failures from 15% to 7%, and a risk indicator reduction of an average of 80%. Financial services firm gains greater control of global cybersecurity position Situation: The fast-track growth of an international financial services firm through numerous acquisitions led to security challenges. Value: We improved the client’s security posture through standardisation of patching and remediation—implemented across the enterprise—gaining real-time status on the environment. We enhanced the visibility of cybersecurity and data privacy risks across key business units. Protiviti helps financial services firm tighten cybersecurity and technology control Situation: A leading corporation in the financial services and insurance industry acquired several companies without conducting robust due diligence, neglecting to identify cyber risks and to strategise seamless integration with the existing IT infrastructure. Value: With enhanced cybersecurity metrics, the client increased its visibility of cybersecurity and data privacy risks to internal business partners for each targeted company acquisition. The client integrated enterprise security policies and standards into the vendor procurement process to mitigate third-party risks. Supporting and documenting cybersecurity strategies for an international bank Situation: An international bank wanted to define and document its three-year cyber security strategy. Value: The bank gained a digital visualisation of the control blueprint, giving users a quick snapshot of threat analysis activity and the ability to gauge the necessary actions to further reduce risk.