Home   /   Cyber Catalogue   /  

Crowe Horwath First Trust Risk Advisory Pte Ltd

Crowe Horwath First Trust Risk Advisory Pte Ltd

Company UEN Number

200711011C

Company Website

Geographical Markets Served

Singapore

Industry Served

Aerospace

Air Transport

Cleaning

Construction (incl/ Archi & Engineering services) 

Data Centers

Defence

Education

Electronics

Energy & Chemical

Financial Services and Insurance

Food Manufacturing

Food Services

Government

Healthcare

Hotels

ICT and Media

Land Transport (incl. Public Transport)

Logistics

Manufacturing

Marine & Offshore

Non - Profit/Charity

Pecision Engineering

Professional Services

Public Sector

Real Estate

Retail

Sea Transport

Security

Telecommunication

Trade Associations & Chamber

Utilities

Wholesale Trade

Solution Categorisation

Detect-Anomalies and Events

Detect-Detection Processes

Detect-Security & Continuous Monitoring

Identify-Asset Management

Identify-Business Environment

Identify-Governance

Identify-Risk Assessment

Identify-Risk Management

Protect-Access Control

Protect-Awareness & Training

Protect-Data Security

Protect-Information Protection & Procedures

Protect-Maintenance

Recovery-Improvements

Recovery-Recovery Planning

Respond-Analysis

Respond-Improvements

Respond-Response Planning

Company Description

As a member of Crowe Global, a top-10 accounting network, Crowe Horwath First Trust (“Crowe Singapore”) is an award-winning firm that leverages its core strengths in Audit, Advisory, Tax, Transfer Pricing, Risk Advisory, Corporate Services, Outsourcing, Fund Administration, Corporate Finance, Valuation and IT Consulting and Assurance Services to bring smart decisions that create lasting value for its clients. With a global reach, and a local expertise, Crowe Singapore is well positioned as a one-stop, integrated solutions provider of a full suite of professional services to a diverse and international clientele, including public-listed entities, multinational corporations, and financial institutions.

-Led by 24 Partners and Directors

-More than 100 Experienced Professional Staff

-Winner of the Best Practice Award 2016 and the Growth Award 2018

-More than 20 Years in Service

-Over 15 Professional Services and Counting

Crowe Singapore is an Accredited Cybersecurity Consultant
Licensed Penetration Testing Service Provider
-In June 2022, Crowe was among the first in Singapore to receive a Penetration Testing Service Licence from the Cybersecurity Services Regulation Office of the Singapore Government.

Cyber Essentials Mark-Certified Organisation
-Crowe Singapore is a Cyber Essentials Mark certified organisation, by the Cybersecurity Agency of Singapore. The Cyber Essentials mark recognises that organisations have implemented robust cybersecurity practices to safeguard their operations and customers from common cybersecurity threats.

Appointed and Onboarded Chief Information Security Officer as a Service (CISOaaS) Consultant – Cyber Essentials
-Crowe Singapore is among only a handful of cybersecurity consultants appointed and onboarded by the Cybersecurity Agency of Singapore to provide CISOaaS solutions to assist enterprises achieve their Cyber Essentials Mark.

Product Description

Cybersecurity Consulting
•Baseline Health Check
Our baseline health check services provide a baseline gap analysis for our clients to have a bird’s eye view of their current cybersecurity posture. This covers IT Security Governance, Risk and Compliance. With this baseline health check report, you will be able to define and plan a cost-effective strategy to meet your compliance and cybersecurity objectives.

˗Quick and accurate report under a week
˗Cost-effective health check on current environment
˗Identify maturity level of current information security posture

•Cybersecurity Assessment
With evolving cybersecurity threats, it is critical for businesses to perform cybersecurity assessments periodically. A Cybersecurity assessment will help to identify potential vulnerabilities and threats that may exist in your current network. This activity also helps to identify weaknesses, so that we can work together with you to build a more resilient environment against threats.

˗Evaluate current business process and policy
˗Identify vulnerabilities and risks
˗Review cybersecurity compliance according to your industry requirements
˗Providing a risk matrix on current environment according to various international frameworks
˗Aligning the organisation with cybersecurity industry standards
˗Comprehensive report including recommendation and remediations

•Penetration Test
A holistic cybersecurity approach is multi-faceted, integrating various components together to deal with current threats. Penetration testing is one of the keys to the puzzle, which completes the cybersecurity total defense. A penetration test is a simulated attack done by qualified expert to exploit your network in a controlled manner, under noble intentions. By investing in a regular penetration testing regimen, an organisation is able to reap many benefits such as:

˗Evaluating how your current defense mechanism fares against simulated cyber attacks
˗Quantifying, evaluating, and prioritising your cybersecurity investments
˗Discovering hidden vulnerabilities and exploits
˗Providing insightful reports on strength and weaknesses of the current infrastructure
˗Vulnerability Assessment and Penetration Testing to get your TrustMark certification which can be used for your website and promotional materials

•Red Teaming
As cyber threat actors are getting more creative, penetration testing alone at times is not enough to cater for large-scale sophisticated, targeted attacks. While the main objective of penetration testing is to identify as many vulnerabilities and exploits as possible of the targeted environment, the main focus of Red teaming is to sneak into the environment stealthily, bypassing detection, with a precise target. As an organisation matures in their cybersecurity posture, this service is the next step forward upon conducting penetration testing.

˗An adversarial approach which helps to identify and attack the organisation’s security posture via technical, physical, and process-based means
˗Access the organisation’s cyber mechanism to detect such attacks
˗Providing the organisation insights on the modus operandi that bad actors may deploy
˗Giving the organisation confidence in addressing such attacks

•Incident Response Services
Preparedness is identified as one of the critical assets in a holistic cybersecurity defense mechanism. To effectively combat against any cyber threats, incident response plan and guidelines must be in place to contain, eradicate and recover during a cybersecurity incident. IT cybersecurity resources are scarce.
Therefore, our incident response service comes in to fill this critical gap due to the lack of available resources.
˗Identify critical stakeholders during a cyber incident
˗Define the roles and responsibilities in the organisation during a cyber breach
˗Assessment of our client’s current critical business assets
˗Provide a well-defined response plan during an incident
˗Have an Incident Response team on contract for your Incident Response needs

•Security Awareness and Training Our comprehensive IT security awareness training programme helps to maintain high levels of awareness for your staff/members, contractors, and service providers. It includes the individual’s responsibility to safeguard information assets, the current cyber threat landscape, and their implications.
We have standard and tailored programmes catered for organisations, and these will be conducted on a periodic basis, such as yearly or every six (6) months. Our programmes are reviewed and updated regularly.

Our programmes are conducted online at the convenience of the individuals, and reports will be generated based on their awareness. Further tests such as email phishing and USB drops, can also be arranged to validate the level of awareness on top of the tests, during the training programme.

•Chief Information Security Officer (CISOaaS) Consulting
As a sanctioned CISOaaS provider, we offer comprehensive cybersecurity solutions to help SMEs meet the Cyber Essentials Certification benchmark

1.Assets
•People: Equipping your staff in cyber-preparedness
•Hardware & Software: Understanding the range of hardware and software in use by your organisation and safeguarding them
•Data: Be informed of the kinds of data that your organisation stores, where they are stored and to secure them

2.Secure/Protect
•Virus/Malware Protection: Protection against malevolent software like viruses and malware
•Access Control: Gatekeeping access to critical data and services
•Secure Configuration: Put in place secure settings for your enterprise’s hardware and software

3.Updates
•Software Updates: Ensuring software on your devices and systems are updated in a timely manner

4.Backup
•Backup: Ensure that essential data have been backed up and stored offline

5.Respond
•Incident Response: Be prepared to detect, respond to, and recover from cyber incidents