Need for Cyber Security Framework for Depository Participants & Asset Management Companies
In today’s rapidly evolving securities market, strong cyber security and resilience frameworks are essential to protect data integrity and prevent privacy breaches. Stock brokers, depository participants, Mutual Funds, and AMCs must adhere to SEBI’s framework, ensuring the necessary facilities and operational risk management.Stay ahead of technological advancements and safeguard your operations effectively.
How it works?
Audit Methodology
We share audit charter with the auditee highlighting the roles and responsibilities of the audit function as well as the audit objectives.
Audit Initiation
We provide Auditee a DRL highlighting the required policies and further analysis of the same will be performed in line with the compliance.
Document Requirement List
Quantitative/Qualitative Risk Assessment will be conducted for every business process in scope and risk will be analyzed.
Identification & Analysis
Action points as well as risk response methodology will be suggested via GAP Assessment Report and an action plan will be asked from the auditee.
Risk Response
We conduct review again post-deployment of the mitigations.
Post-Deployment Review
RBI Circulars
In order to safeguard the interests of stockholders, encourage the growth of the
securities market, and regulate it, this circular is being issued in accordance with the
authority granted by Section 11 (1) of the Securities and Exchange Board of India Act,1992. Given this, all stock exchanges and depositories were sent the following circulars outlining fundamental cyber security controls:
Circular No: SEBI/HO/MIRSD/CIR/PB/2018/147
Circular No.: SEBI/HO/MIRSD/TPD/P/CIR/2022/80
Do you know?
40,000 crore
India's mutual fund industry is expected to face a cyber security breach by 2022.
Want a quick
Audit?
Detect & prevent attacks, before they succeed.
Stay ahead of the rapidly evolving threat landscape and keep your data protected without having to spend a fortune.
Download Your Comprehensive Guide to Threat Modeling Today!
Staffing Services
Threat Simulation
BOT Force
Fixed Force
Flex Force
Get CERT-In Audit
Get Started!
Get Started!
Get Started!
Get Started!
Get Started!
Get Started!
Get Started!
Get Started!
Get Started!
Get Started!
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok