Home  >   Services  >   Technology Advisory

Technology Advisory



In the digital age, cybersecurity is a major threat that can potentially cause massive financial losses or severe business disruptions. In addition, consequential losses, such as reputational damage and legal implications may be more severe than the incident itself.


Drawing from a deep well of experience, our Technology Advisory services team offers solutions that deliver the difference. We are able to assist you to effectively manage cybercrime incidents, detect IP infringement and to minimise business risks. We can also help to optimise the return of investment in IT spend and build stronger IT capabilities to enhance the overall business performance within the company.


Information Security Controls Assessment

• Design internal control based on globally accepted frameworks such as ITIL, ISO 27000 series and COBIT
• Ensure adequate protection of IT systems
• Reduce risk of data loss or leakage, service disruption and poor management of IT systems


Vulnerability Assessment and Penetration Test

• Simulate actual cyber-attacks to provide a detailed view of cybersecurity threats
• Protect systems and data from malicious attacks
• Comply with industry standards and regulations


Software Asset Management

• Develop and implement software asset management processes
• Achieve recordable licensing compliance and avoid risks of unintentional non-compliance
• Take inventory of computer usage, network devices, hardware and software installation and licenses


PCI-DSS Compliance Assessment

• Pre-compliance gap analysis to establish a baseline level of compliance and to address areas of non-compliance
• Network vulnerability scans to ensure ongoing protection from cyber threats and to meet annual PCI-DSS compliance requirements
• Penetration tests to ensure protection of card holders’ data against potential exploitation by internal or external hackers
• Remediation services to ensure that all deviations from PCI-DSS requirements are properly remediated and/or compensating controls are designed to mitigate risks


Licensing and Royalty Compliance

• Assist IP owners to detect revenue leakage resulted from non-compliance
• Conduct on-site audits or review on licensing/royalty/vendor agreement compliance
• Design and implement software license compliance programmes
• Identify software license infringement incidents
• Assist to close the compliance gap


Personal Data Protection Compliance

• Assist organisations to understand the overall impact of Personal Data Protection legislations
• Ensure efficient performance of personal data protection practice and effective compliance to the Act


Speak to our Specialist(s)

Mr Darwin Thio
Associate Director
Forensic & Litigation Support
Mr Tennant Chong
Technology Advisory