Implementation and Operations

 

Security solutions to build resilience

Architect, design, implement, and enhance the use of technology.

Massive cybersecurity breaches have become almost commonplace, regularly grabbing headlines that alarm organisations and consumers. Despite all the attention that such incidents create, many organisations worldwide still struggle to comprehend and manage emerging cyber risks in an increasingly complex digital society.

To achieve greater cyber resilience as a society and within organisations will require a more concerted effort to uncover and manage new risks inherent in emerging technologies.

Browse our focus areas

Our services cover different technical and organisational domains such as cloud security and access management among others and we provide advice on the areas of improvements.

Cloud security design and implementation

Your Challenges

  • How can the cloud infrastructure be effectively governed?
  • How can the implementation complexities of cloud be managed, and its benefits be measured?
  • What are the regulations to be considered to ensure compliance of the cloud’s global infrastructure?
  • How can cloud implementation be kept aligned to the overall business strategy and objective?
  • What would the operating model and shared responsibility model look like over the cloud?
  • How can company and user data be secured across different borders?
  • Do you have the right controls in place for the business applications and data that are moved to the cloud?
  • Do you know how data is handled and processed by third party service providers in the cloud?
  • Are the security baseline for the applications in the cloud at least as secure as on premise and securely configured?

Identity and access management (IAM)

Our aim is to help clients address all of their IAM related business challenges, ranging from supporting your digital transformation, securing and governing access, managing access during mergers and divestments, enabling a seamless customer experience, advising on more effective risk-based governance and more

 

Your Challenges

  • How can IAM be exploited to support your business and digital transformations?
  • Have you adopted a strong, effective access management that enables the access of authorised workers while restricting the access of outsiders?
  • Do you have the right security controls in place to manage and protect privileged credentials for third-party applications?
  • Do you have the right policy and procedure in place when it comes to password management for privileged users?
  • Do you have the right security controls in place to manage and protect privileged credentials for third-party applications?
Follow PwC Mauritius
Hide

Contact Us

Required fields are marked with an asterisk(*)

By submitting your email address, you acknowledge that you have read the Privacy Statement and that you consent to our processing data in accordance with the Privacy Statement (including international transfers). If you change your mind at any time about wishing to receive the information from us, you can send us an email message using the Contact Us page.

Contact us

Vikas Sharma

Vikas Sharma

Regional Consulting & Risk Services (C&RS) Leader, PwC Mauritius

Tel: +230 404 5015

Diya Guttoo

Diya Guttoo

Partner, Consulting & Risk Services, PwC Mauritius

Tel: +230 404 5014

Jean-Pierre Young, ACA, CIA

Jean-Pierre Young, ACA, CIA

Chief Innovation Officer, PwC Mauritius

Tel: +230 404 5028