24-Stunden-Rufbereitschaft und rasche Incident Response Unterstützung
An intelligent approach to digitization.
Worried about cyberattacks? We’ll tackle your cyber anxieties!
Let’s build a secure digital society together.
Driven by events no one could have foreseen, leaders in recent years have pushed their companies and themselves beyond their comfort zone: out of the office to remote workplaces; into the cloud; along chains of supply that are almost completely digital. And with each new venture has come new cyber risks.
Good news: CISOs and cyber teams have risen to the challenge and other C-suite executives have joined forces with them. More than 70% of 3,522 respondents observed improvements in cybersecurity in the past year — thanks to cumulative investments and C-suite collaboration.
Ransomware attacks make headlines again and again. Unfortunately, the reality is even grimmer. Most victims never appear in the media because they quietly give in and pay up. The threat is increasing because the hackers' methods are becoming more effective and their ransom demands are getting higher.
>> Find out more (German)
“PwC surpasses its peers with platforms and board-relevant services”
The Forrester Wave™: European Cybersecurity Consulting Providers, Q4 2021
Experience a cyber threat “live” and up-close together with your team
A strategy simulation based on the real world: In this simulation we challenge business leaders and teams to make quick, highly effective decisions and test their readiness in the event of a cyberattack.
Put your VR glasses on and you’ll find yourself in the middle of a crisis.
Your organisation is under attack and you need to decide what to do – quickly. Step into the role of the CEO, CFO or CISO. Can you cope with the pressure and take the right decision?
We support you to protect your company against digital threats in the best possible way. To ensure the effectiveness of your cybersecurity, our experts evaluate your degree of readiness. We work together with you to create a risk-based plan of action and prepare effective defence measures to make sure your company is armed in the event of a cyberattack. Cybersecurity is more than just technology and processes. We help our clients to make changes in security behaviours through security awareness. We help your staff to achieve the paradigm shift and make cybersecurity the DNA of all business processes.
Information security is an ongoing management process. For sustained, long-term information security, all parts of the company need to contribute – from employees and the information security officer through to management.
Our experts can support you with:
Status analysis of your information security
Security risk analyses to determine level of threats and required protection, as well as a risk-oriented package of measures (in accordance with ISO 27002, BSI baseline protection etc.)
Derivation of measures to secure IT infrastructure in accordance with company-specific needs and the required level of protection
Preparing or adapting security policies
All information processes will be optimally integrated into all parts of the company and business processes.
Certification of security and proper IT processes and ISMS in accordance with ISO 27001 or industry-specific certification such as TISAX.
Companies face many challenges related to data protection. With our comprehensive portfolio of services, we support companies to design and implement control mechanisms within existing processes and control systems (e.g. ICS), as well as to implement all-round data protection management systems. In doing so, we refer to standardised control benchmarks and the data protection standards of data protection authorities.
Our experts can support you in the following areas:
strategy, governance and accountability
data processing and rights of the data subject
internal policies and related data protection processes
risk management and compliance
information lifecycle management
crisis management and data protection breaches
risk management in relation to third parties
data security (see also information security)
Through the digitalisation of business processes, IT environments are becoming more complex. In parallel with increasing digitalisation, the risk of cyberattacks is growing, which increases the level of security required. In this way, companies are confronted with an increasing HR workload (building and increasing know-how), infrastructure and technical measures (protection measures, log management etc.), as well as security operation processes (false positive triage and incident response).
As a partner who understands technology and business, PwC provides managed security services (MSS) to companies, helping them to improve IT security and cut costs. Our clients profit from the international, multi-industry expertise of around 350 cyber experts within the PwC network in six European countries (Austria, Belgium, Germany, the Netherlands, Switzerland, Turkey).
PwC supports you during the entire lifecycle from early recognition and resolution of IT security threats to checks of applications and IT systems for vulnerabilities.
Are your systems and applications sufficiently protected against attacks (penetration testing / red team testing)?
Were threats considered and risks minimised when developing/introducing new IT systems (threat analysis / secure architecture / secure coding)?
Are your employees aware of the current threat level, and do they recognise threats early and report them via the appropriate channels (security awareness training / simulation phishing / social engineering)?
Has a simulation of a realistic attack been carried out to check your processes, staff, and protection measures (red team testing)?
We would be glad to support you to select the required services and prepare an individual proposal for you.
Maintaining or restoring critical business activities after an incident is of major importance for the resilience of a company. Significant disruptions of operations caused by major incidents or outages frequently cause financial and reputational damage. With an effective business continuity management (BCM) system, you can restore important services in a timely manner and avoid lasting damage.
BCM systems need to be based on organisational strategies, structures, and priorities, but should also be sustainable and adjust to changes. Our business continuity specialists help companies to establish a reliable and efficient BCM programme. In this way, BCM becomes an integral part of your company.
Digital identities are core components of digital services, which represent important information about individuals, data and devices. PwC supports you during the entire lifecycle from planning through to the implementation of Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions.
Our experts can support you in the following tasks:
survey and analysis of the current situation
design and planning of IAM/PAM strategies
preparing of policies and controls
preparation and verification of role and authorisation concepts
advice on the selection of software providers and services
implementation and go-live of IAM/PAM solutions
identification of rights and roles within the company
implementation of network scans to recognise vulnerabilities and anomalies in relation to privileged accounts
quality assurance for IAM/PAM programmes
How would you respond to a threat? Our experts offer you the opportunity to experience a cyber threat “live” and up-close together with your team.
Game of Threats
Virtual reality cyber experience