Diese Seite auf Deutsch, Français


    Cybersecurity – proactively combatting cyber attacks and risks

    The technology revolution has shifted traditional boundaries. Businesses now operate in an increasingly interconnected digital ecosystem. While offering opportunities for innovation and productivity, the Cyber era also presents new risks and challenges.

    An agile and commercially pragmatic approach is essential for the growth and innovation required to thrive in the new world. PwC's approach covers the five stages of the Cyber Lifecycle to provide an end-to-end service to our clients. It's our vision to protect businesses, people and society from Cyber risks. We've made this our core business. Is it yours?

    The Cyber Lifecycle

    The Cyber Lifecycle illustrates PwC's approach to cyber security. Click an area to learn more about how we can help you.

    Our Cybersecurity Services

    • Strategy, Governance & Management
      Security Strategy and Consulting, Security Integration & Management Services, Service Improvement, Service Acceptance, Service Transition Management, Vendor Management

    • Security, Architecture & Services
      Architecture and Design, Architecture Certification, Capability development, Architecture Governance, Roles and Responsibilities, Secure network design including zoning, perimeter and gateways

    • Threat, Intelligence & Vulnerability Management
      Threat Intelligence & Cyber Analytics, Research, Security Testing, Remediation, Build and Configuration Reviews, Security Advisory, Asset Inventory Planning, Secure Code Reviews, Malware Analysis, SAP security assessment, Security Operations Centre transformation, Monitoring and Reporting

    • Emerging Technologies & Trends
      Social Media, Mobile, Big Data, Cloud, 3D printing, Internet of Things

    • Identity & Access Management
      IAM Strategy and Consulting, Access Control Remediation, Application On-boarding, Systems Integration, Project management, advice and assurance

    • Risk & Compliance Management
      Technology Risk & Controls Frameworks and Processes, Technology and Security Risk Assessments (including Third Party Assessments), Controls Design, Implementation and Testing, Regulation, Governance, Compliance and Privacy, Information Records Management

    • Incident and Crisis Management
      Computer Forensics and Investigations, Breach Indicator Assessment, Computer Emergency Response Team (CERT), Incident Management, Planning and Response, Crisis Management, Planning and Response, Electronic Discovery, Litigation and Dispute Readiness, Business Resilience,
      IT Service Continuity

    • Data Protection
      Identify and protect customer, client & patient data based on sensitivity, Protect against data loss in communications and applications, including cloud solutions, Comply with privacy principles, Understand and comply with breach disclosure responsibilities and cross-border restrictions

    Reto Häni
    Partner and Leader Cybersecurity, Bern
    Tel.: +41 58 792 75 12


    Management of cyber risks: compliance with FINMA’s requirements for banks

    On 1 November 2016, FINMA published a revised version of circular 2008/21 ‘Operational risks – banks’. The Principle 4 of the updated circular (on technological infrastructure) includes requirements relating to the management of cyber risks. It...


    GDPR essentials and how PwC can help

    The General Data Protection Regulation (GDPR) entered into force on 24 May 2016. This creates a new regulatory framework unifying data protection laws across the 28 European Union (EU) member states and replaces the prior EU Data Protection...


    EU-GDPR: Are you ready?

    On 14 April 2016, the European Parliament approved the General Data Protection Regulation (GDPR). This creates a new regulatory framework unifying data protection laws across the 28 European Union (EU) member states and replaces the current EU...