SEBI Cyber Security & Cyber Resilience Framework

Need for Cyber Security Framework for Depository Participants

In order to provide necessary facilities and carry out systemically important functions related to the securities market, it is desirable that stock brokers and depository participants have strong cyber security and cyber resilience frameworks.

Need for Cyber Security Framework for Asset Management Companies

In order to provide necessary facilities and services and carry out key tasks in the securities market, Asset Management Companies (AMCs) must have a strong cyber security and cyber resilience framework as part of operational risk management.

How it works?

Audit Methodology

We share audit charter with the auditee highlighting the roles and responsibilities of the audit function as well as the audit objectives.

Audit Initiation

We provide Auditee a DRL highlighting the required policies and further analysis of the same will be performed in line with the compliance.

Document
Requirement List

Quantitative/Qualitative Risk Assessment will be conducted for every business process in scope and risk will be analyzed.

Identification &
Analysis

Then the action points as well as risk response methodology will be suggested via GAP Assessment Report and an action plan will be asked from the auditee.

Risk Response

Then we conduct review again post-deployment of the mitigations.

Post-Deployment
Review

RBI Circulars

In order to safeguard the interests of stockholders, encourage the growth of the securities market, and regulate it, this circular is being issued in accordance with the authority granted by Section 11 (1) of the Securities and Exchange Board of India Act,1992. Given this, all stock exchanges and depositories were sent the following circulars outlining fundamental cyber security controls:
Circular No: SEBI/HO/MIRSD/CIR/PB/2018/147
Circular No.: SEBI/HO/MIRSD/TPD/P/CIR/2022/80

Do you know?

40,000 crore
According to a report by Deloitte, India's mutual fund industry is expected to face a cyber security breach by 2022

Want a quick Audit?

Detect & prevent attacks, before they succeed.

Stay ahead of the rapidly evolving threat landscape and keep your data protected without having to spend a fortune.

What do you get?

Audit Draft
Report
Draft report of the audit emphasizing the initial discoveries/findings.
Remediation
Support
Through a GAP Assessment Report, remediations to the identified non-compliant controls will be advised.
Final Audit
Report
A comprehensive report that elaborates the final audit findings.
Compliance
Letter
A letter that confirms that the requirements are met and all the applicable controls/regulations are fulfilled.

Take a peek into sample report

Our deliverables are comprehensive in nature that addresses both technical and business audiences.

Businesses love us

Learn what our customers say about our work.

Have you implemented the right security practice?

Take a peek into sample report

By failing to prepare, you are preparing to fail

Homepage: By failing to prepare, you are preparing to fail
Enter the Captcha

Take a peek into sample report

By failing to prepare, you are preparing to fail

Case Study Form
Enter the Captcha

Take a peek into sample report

Case Study Form
Enter the Captcha

Get Started!

Case Study Form
Enter the Captcha

By failing to prepare, you are preparing to fail

Case Study Form
Enter the Captcha

Take a peek into sample report

Case Study Form
Enter the Captcha

Get Started!

Case Study Form
Enter the Captcha

By failing to prepare, you are preparing to fail

Case Study Form
Enter the Captcha

Take a peek into sample report

Case Study Form
Enter the Captcha

Get Started!

Case Study Form
Enter the Captcha

Subscribe to Our Podcasts

Blog Write For Us

By failing to prepare, you are preparing to fail

Get Started!

Get Started!

Get-started-WebServices-API
Enter the Captcha

Get Started!

Get Started!

Get Started!

Get Started!

Get Started!

Get Started!

Get Started!

Get Started!

Get Started!

Get Started!

Get Started!

navy_bubble.png