Cyber Security

Using your systems and data with confidence

Organisations operate in an increasingly interconnected world of digital opportunity. While technology can drive innovation and productivity, it also presents new risks and challenges that need to be understood to be overcome. With our approach to Cyber Security, we give businesses the confidence to use their systems and data to help them identify and address digital risk and realise opportunities safely. 

Our focus is on helping you to understand digital risk in your business context,  providing you with insightful advice, innovative solutions, and data based assurance to manage these risks and unlock value.

Our four pillars:

  • Cloud security transformation
  • Cyber threat operations
  • Business security, data, trust and privacy
  • Digital identity

 

Our services

Find out more

Find out more

Find out more

Find out more

Find out more

Find out more

Find out more

Find out more

Find out more

Find out more

Find out more

< Back

< Back
[+] Read More

Consumerisation of IT and the adoption of cloud is driving uncontrolled sharing of information.

We can help you to:

  • Discover where your information is

  • Identify and address risks associated with information sharing and cloud

  • Develop and adopt strategies for information classification, storage, and management

  • Take advantage of the reduced costs, flexibility, and accessibility of the cloud

Understanding your cyber and privacy risks in your context is key to cost effective and pragmatic responses.

We can help you to:

  • Understand if any of the myriad of security threats, intelligence and headlines should concern you

  • Understand what’s important to your business and what impacts your objectives

  • Understand real time insights into your use of sanctioned and shadow digital services

  • Develop and implement strategies and frameworks to comprehensively manage information security and privacy.

The widely distributed nature of digital services is driving the requirement for widely distributed identity and access management.

We can help you to:

  • Understand your identity and access requirements and maturity

  • Develop strategies for managing identity and access across multiple perimeters / channels

  • Implement effective solutions and technologies to facilitate secure access to information assets

It’s not ‘if’ but ‘when’ a breach occurs. Detecting breaches and responding quickly and appropriately is critical.

We can help you to:

  • Identify a severity breach using market leading technologies

  • Respond to breaches with our specialist forensic and incident response capabilities

  • Recover quickly and prevent re-occurrence with root cause analysis and strategies for remediation

How do I know if my cyber controls are working, if my security investments are sound and my risks are addressed?

We can help you to:

  • Obtain confidence in your internal or third party security controls

  • Understand vulnerabilities and weaknesses in your control environment

  • Develop metrics and indicators to demonstrate the effectiveness of your cyber activities

Related content

Contact us

Craig Maskell

Cyber Consulting Partner, Wellington, PwC New Zealand

+64 21 915 380

Email

Robyn Campbell

Cyber Consulting Partner, Wellington, PwC New Zealand

+64 462 7092

Email

Nouras Hasan

Partner, Risk Services, Auckland, PwC New Zealand

+64 21 070 8823

Email

Anthony Steele

Partner, Risk Services, Auckland, PwC New Zealand

+64 21 221 4514

Email

Mark Hewson

Director, Wellington, PwC New Zealand

+64 27 283 8475

Email

Tom Zukowski

Director, Wellington, PwC New Zealand

+64 27 370 9287

Email

Follow us