Your Leading Governance and Cyber Security Partner

Why Choose Us

Because we have a stronger desire to upkeep our reputation for excellence and integrity than to pursue profitable margins. We put passion and care in everything we do which is why we are trusted by some of the biggest names and largest government agencies across Southeast Asia.
Romain Rallu
CEO, Privasec

Featured Services

ISO 27001 (ISMS)

We will help you to achieve ISO 27001 certification.

Penetration Testing

We will help to secure your network and applications.

Vendor Management

We will help you in security assessments and management of third-party vendors.

attack simulations

We will help you run an adversarial simulation of potential attackers.

Insights

CRESTCon CORIE
Privasec RED

The Benefits Of Infrastructure As Code

Check out our Senior Red Consultant’s talk at the recent CRESTCon Australia 2021, on the ‘The benefits of Infrastructure as Code for Adversary Simulation’.

Read More →

A Dummy’s Guide to ACSC E8 Assessment Approach

Australian Cyber Security Centre’s (ACSC) Strategy to Mitigate Cyber Security Incidents provides a prioritised list of mitigation strategies to assist organisations in protecting their systems and their crown jewels against a range of adversaries. The mitigation strategies advised by ACSC vary and can be customised based on the risk profile, the industry sector and the adversaries the organisation is most concerned with.

Read More →

The Singapore Privacy Landscape

In a world full of costly data breaches and invasive privacy incidents, Singapore is not immune. It’s not just the big threats such as cyber criminals, nation-state hackers and cyber espionage—even simple employee mistakes can end up exposing private data and costing your organisation millions.

To combat the growing wave of privacy and cybersecurity issues, Singapore passed the Personal Data Protection Act (PDPA) 2012. These regulations are complemented by the Data Protection Trustmark (DPTM), a voluntary certification that helps organisations demonstrate that they have appropriate protection and privacy practices in place to guard their personal data.

Read More →

Latest News

ACSC Essential Eight Assessment Services
ACSC

ACSC Essential Eight Assessment Services

Australian Cyber Security Centre’s (ACSC) Strategy to Mitigate Cyber Security Incidents provides a prioritised list of mitigation strategies to assist organisations in protecting their systems and their crown jewels against a range of adversaries. The mitigation strategies advised by ACSC vary and can be customised based on the risk profile, the industry sector and the adversaries the organisation is most concerned with.

Read More →
CORIE framework
Australia

Cyber Resilience Testing Under The CORIE Framework

The Cyber Operational Resilience Intelligence-led Exercises (CORIE) framework is a pilot programme of exercises that will mimic the Tactics, Techniques and Procedures (TTPs) of real-life adversaries, creating and utilising tools, and using techniques that may not have been anticipated and planned for. Also known as red team exercises, these help Financial Institutions(FI) stay competitive and secure by leveraging an unbiased view, and by third-party providers mimicking real-world Advanced Persistent Threats (APTs).

Read More →
VeriSaaS IRAP Assessment
IRAP

VeriSaaS – The IRAP Journey

Meet the CEO at VeriSaaS, Brice Neilson, as he talks through their journey of undergoing an IRAP assessment up to PROTECTED status, what it means to be IRAP assessed, and why.

Read More →

Already know what you are after?

Get a quick quote from our consultants.

Scroll to Top