Securing Your

Most Critical Digital

Assets

SiberKASA Aspirations

SiberKASA is a initiative by CyberSecurity Malaysia exclusively to develop, empower, sustain and strengthen cyber security infrastructure and ecosystem in Malaysia to combat the growing complex and sophisticated cyber threats and cyber attacks. This is an effort to ensure continued development of cyber security solutions and make avail  CyberSecurity Malaysia’s products and services to industries and individuals in the country.

How can we help you

get started?

We can suggest the best solution by selecting the topics.

I want cybersecurity training for me and my staff to be better prepared for any form of cyber attack.

I need guidance for ISMS and usage of Evaluation Labs and have my source codes reviewed.

I fear my system may have been attacked and would like to find out. What security assessments are available?

I want to get my company and products certified to take my organization to the next level and ensure our compliance with relevant security standards

I need to ensure my Cloud is secure and all my websites are secure to provide uninterrupted service to my clients

My hard disk crashed and I need to recover all my important data. Any tools that can help me?

I want cybersecurity training for me and my staff to be better prepared for any form of cyber attack.

I need guidance for ISMS and usage of Evaluation Labs and have my source codes reviewed.

I fear my system may have been attacked and would like to find out. What security assessments are available?

I want to get my company and products certified to take my organization to the next level and ensure our compliance with relevant security standards

I need to ensure my Cloud is secure and all my websites are secure to provide uninterrupted service to my clients

My hard disk crashed and I need to recover all my important data. Any tools that can help me?

I'm an organization
with a unique need.

Name *
Email *
Job Title *
Company *
Industry *
Message

We Have Solution

For Every Cyber Security Problems

In the ISMS Guidance Series, Organizations will be guided in the establishment of information security management framework based on ISO/IEC 27001:2013. Organizations will be able to implement ISMS procedures efficiently and effectively with support from our domain expert in safeguarding critical information and digital assets.

Name *
Email *
Job Title *
Company *
Industry *
Message

Providing on going upskilling to beginner and seasoned security professionals to ensure highest levels of technical capability and proficient in implementation of security solutions. CyberGuru is the platform for you to find out and learn necessary skills to secure both your IT and OT systems.

Name *
Email *
Job Title *
Company *
Industry *
Message

Get your globally recognized cyber security certifications in various skills programs through our GlobalACE Scheme. GlobalACE Scheme is an cyber security education scheme designed to grow cyber security professionals that are capable of strategizing, planning and executing cyber security initiatives within their organizations in accordance to international standards

Name *
Email *
Job Title *
Company *
Industry *
Message

Protecting corporate data with a military grade AES encryption has been made possible with CSM Secure Suite. A 2 factor-authentication solution for organizations such as government agencies and financial institutions. Securing end points with ease and confidence with CSM Secure Suite.

Name *
Email *
Job Title *
Company *
Industry *
Message

Sanitize your storage devices during hardware upgrades to ensure highest level data security Sanitizing the storage devices that are being replaced mitigates the risk of data leak if and when the replaced drives are reused by other organizations

Name *
Email *
Job Title *
Company *
Industry *
Message

Tools for Digital Forensic Practitioners developed based on more than 20 yers of experience in the field.

  1. x-Forensik Kloner - a tool that comes with cloning, imaging and wiping capabilities developed by in compliance to the specifications of international digital forensic standards, with a write-protect function and hashing function.
  2. x-Forensik DataHapus - A portable data sanitization tool specifically developed to assist government and private sectors to securely wipe confidential data from storage devices. Also used to verify content of storage device after the wiping process as to give guarantee before it is disposed or transferred to other party.
  3. x-Forensik Pendua - A portable digital document duplicator used at incident scene to forensically copy data from suspect’s computer. The output of this PenDua can be used in litigation process.
  4. x-Forensik EPA - A tool to extract and analyze video evidence from heterogenous CCTV with reporting that is developed locally, operational and functional requirement and according to experience-based.
Name *
Email *
Job Title *
Company *
Industry *
Message

A forensic laboratory does not only deal with evidence analysis; it also involves well- trained and skilled personnel, well-functioned equipment, well-established methods, preservation of evidence and ensuring that confidential data is protected and well-secured. CSM can assist organization in setting up a digital forensics lab at its best quality and credibility.

Name *
Email *
Job Title *
Company *
Industry *
Message

Concern to manage and protect organizations information security is at its top level when practitioners are constantly assessed. Through which improvement can be made and strategies can be well implemented. BCA helps organizations predict job-fit, training and development roadmap, and job performance that drives better business outcomes while ensuring the confidentiality, integrity and availability of organizations’ information.

Name *
Email *
Job Title *
Company *
Industry *
Message

In the activity of identifying and detecting vulnerabilities in your organization’s digital ecosystem it is critical to keep your security posture in check. SPA is a comprehensive exercise that will identify security loopholes in the digital eco system of the organization hence Improve readiness of the business against any potential cyber risks.

Name *
Email *
Job Title *
Company *
Industry *
Message

This assessment is specifically designed to cater Critical Industries needs to secure its industrial control system. Industries such s oil and gas, electricity, water and waste treatment, manufacturing, chemical and transportation are main users of SCADA system and they are also key drivers for National economy. Having the system constantly in checked is the smartest way possible for a secured operations.

Name *
Email *
Job Title *
Company *
Industry *
Message

App development is an increasing critical area in the digital world as many businesses rely on apps to act as the new age marketplace. The PSCA is specially designed to review source code for PHP programming and structural faults that may lead to possible security defects in the developed apps. This assessment will arm developers with information in order to make application source code more secure and comply with safe development technique.

Name *
Email *
Job Title *
Company *
Industry *
Message

TTSA aims to help validate legality of an organization involved in e-business. Through which consumer can identify which website belongs to a trustworthy e-business operator.

Name *
Email *
Job Title *
Company *
Industry *
Message

Backdoor in a computer system, network, or software application often used by cybercriminals to steal personal and financial data, install additional malware, and hijack devices. CSM offer a backdoor scanning services to ensure the systems in the organization are clean from backdoor infection for a more secured and efficient operations.

Name *
Email *
Job Title *
Company *
Industry *
Message

Lebahnet is a honeypot system sensors that is set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. LebahNet will allow users to get first hand cyber attacks and malware samples as well as the latest cyber threat trends. It comes with a sensor that will be installed at organizations’ network and centralized management server for dashboard, log management, analysis platform and alert management.

Name *
Email *
Job Title *
Company *
Industry *
Message

ISGRiC, which stands for Information Security Governance, Risk and Compliance is a solution by CSM that aims to enable the measurement of the performance and effectiveness of information security controls in an organization. It features an interactive and practical dashboard that are accessible in any device with an internet connection.

Name *
Email *
Job Title *
Company *
Industry *
Message

Good news to organization and public whose mobile devices has been compromised or facing security issues. CSM is offering a mobile incident analysis service that will provide detailed analysis report for mobile incidents for a more secured usage of mobile devices.

Name *
Email *
Job Title *
Company *
Industry *
Message

Targeted to Government and Law Enforcement Agencies, the DF Case Management System is built and designed based on ISO 17025 requirement to efficiently conduct Digital Forensics Cases.

Name *
Email *
Job Title *
Company *
Industry *
Message

This service addresses concern on Electronic Stored Information (ESI) in order to provide solution to civil litigation or government investigation.

Name *
Email *
Job Title *
Company *
Industry *
Message

As cloud has become the major platform for organizations to store corporate information and data, the security of it has also become one of the major concern. The Cloud security assessment service is able to enhance governance and control for cloud infrastructure deployment. It will identify and fix system weakness on the implementation of cloud computing environment.

Name *
Email *
Job Title *
Company *
Industry *
Message

Cloud Security Audit for ISMS requirements focuses on cloud security audit on IaaS, PaaS and SaaS platform for Cloud Service Subscribers (CSS), Cloud Service Providers (CSP) and Cloud Service Brokers.

Name *
Email *
Job Title *
Company *
Industry *
Message

CSM CSIRT Consultation will guide organization in setting up their own Cyber Security Incidents Response Team to help reduce financial or reputational losses during cyber incidents. By having an Incident Respond Team being set up at an organization, they will have the benefit of containing incident at early stage before it propagates the entire network which will results in huge damage.

Name *
Email *
Job Title *
Company *
Industry *
Message

CyberDrill Exercise will involved setting up scenarios that simulate real world cyber attacks by CSM Analyst. This will increase organizations’ ability and knowledge in handling cyber attacks or incidents. As a result, organizations will be more ready and resilient in the digital world.

Name *
Email *
Job Title *
Company *
Industry *
Message

Stands for Cyber Detection, Eradication and Forensics, CyberDEF is a service that provides pro-active cyber defence forensics services to mitigate operational risk in the cyber space. CyberDEF will Ensure cyber incidents happened in an organization are investigated thoroughly by identifying caused of cyber intrusion, APT malware and ransomware by detecting threat, eradicate source and conduct forensic investigation.

Name *
Email *
Job Title *
Company *
Industry *
Message

MyCSC Data Recovery is a solution offered by CSM to recover data from damaged, failed, corrupted or inaccessible digital storage media. Data security and confidentiality is a core component of the service and is emphasized at each step of the process.

Name *
Email *
Job Title *
Company *
Industry *
Message

To improve competitiveness of Malaysian ICT products globally hence gain access to international market, CSM is offering MyCC evaluation and certification scheme to ICT product developers both local and international. This Scheme is a systematic process for evaluating and certifying security functionality of ICT products based on defined criteria or standards. This scheme ensures high standards of competence and impartiality as it is based on the international standards of ISO/IEC 15408 which is known as Common Criteria (CC).

Name *
Email *
Job Title *
Company *
Industry *
Message

BCMS Certification Scheme is based on the ISO 22301 international standard for organization that envisions for resiliency in their business operations. BCMS certification helps organisations to plan an effective business continuity management to protect against, reduce the likelihood of, and ensure business recovers from disruptive incidents.

Name *
Email *
Job Title *
Company *
Industry *
Message

Service offered by CSM to give assurance to businesses on website security and privacy protection by conducting compliance checking on Content and Multimedia Act based on Content Code.

Name *
Email *
Job Title *
Company *
Industry *
Message

The ISMS Certification scheme will help organizations in ensuring the confidentiality, integrity and availability of its information that shall result in achieving business efficiency and minimized business loss. The ISMS certification scheme is based on the ISO/IEC 27001 international standard that focuses on the aspect of information security.

Name *
Email *
Job Title *
Company *
Industry *
Message

The Penetration Tester Service Provider (PTSP) scheme focuses on the development and competitiveness of local companies and penetration testing consultants. As the increasing demands for professionalism in the cyber security job market specifically penetration testing, this scheme provides assurance to organization in engaging a well trained and top quality ethical hacker. The PTSP also act as a platform to foster cooperation and industry collaborations among players.

Name *
Email *
Job Title *
Company *
Industry *
Message

CyberSecurity Malaysia Randomness Test Tool (CRTT) is a product based on NIST Statistical Test Suite package. CRTT is a cryptographic tool to evaluate randomness of binary sequences produced by either hardware or software based random or pseudorandom number generators. Specifically developed to cater the needs of cryptographic product developers, testers and evaluators.

Name *
Email *
Job Title *
Company *
Industry *
Message

The MyCEL Lab is the only lab in Malaysia that has been awarded with National Voluntary Laboratory Accreditation Program (NVLAP) accreditation for cryptographic and security testing. MyCEL is able to perform testing of cryptographic modules and cryptographic algorithm implementations against the security requirements set forth in FIPS 140-2. Local Products certified according to FIPS 140-2 will have higher market value and meet the procurement requirements set by some external government agencies.

Name *
Email *
Job Title *
Company *
Industry *
Message

The TSA stands for Technology Security Assurance aims to test the security functions of developed technologies or digital products. The process of evaluation is shorter than MyCC certification and the cost is cheaper. Targeting developers whose intention is to market their product locally.

Name *
Email *
Job Title *
Company *
Industry *
Message

IPSA aims to assess the security function of locally built ICT products. It is relatively quicker and more cost-efficient assessment compared to MyCC Scheme.

Name *
Email *
Job Title *
Company *
Industry *
Message

The Cloud Security Compliance Audit is specifically built for Cloud service providers and developers in ensuring the compliance of security function of their platform being offered.

Name *
Email *
Job Title *
Company *
Industry *
Message

Everyone Else Has Claims.
We Have Proof.
Read our case study.

What client say

about us

  • The ProximaX Sirius blockchain was certified by Cybersecurity Malaysia under Cryptographic Algorithm Conformance testing. It's a great assurance to both the users of the Sirius blockchain and clients of ProximaX that the Sirius blockchain adheres to Malaysian national and international standards and practices.
    Joe Chai
    Solutions Architect, ProximaX
  • CyberSecurity Malaysia has proved itself again to be one of the most efficient and effective government organization that spurs cyber security awareness among Malaysians and SMEs as to be as par with worldwide level of preparedness (in cyber security). We adore CyberSecurity Malaysia's multi-talented teams that adhere to adapt and adopt latest technologies to overcome the becoming- more complex cat-and-mouse situation in cyber security while keeping it the simplest way to implement and educate cross- vertical industries in Malaysia. Kudos to CyberSecurity Malaysia, and we hope to see more and continuous endless support from CyberSecurity Malaysia to Malaysians as a whole.
    Nurazam Malim
    CEO, Twistcode Technologies Sdn Bhd

Latest Updates

Ready to elevate knowledge and

strengthen defense?
 

Talk to our cyber security expert.

Name *
Email *
Job Title *
Company *
Industry *
Message

Read insights from our

experts to your inbox
 

Cybersecurity Malaysia

Custodian of the most advanced cybersecurity labs in Malaysia
How can we help you get started?

I want cybersecurity training for me and my staff to be better prepared for any form of cyber attack

I need guidance for ISMS and usage of Evaluation Labs and have my source codes reviewed

I fear my system may have been attacked and would like to find out. What security assessments are available?

I want to get my company and products certified to take my organization to the next level and ensure our compliance with relevant security standards

I need to ensure my Cloud is secure and all my websites are secure to provide uninterrupted service to my clients

My hard disk crashed and I need to recover all my important data. Any tools that can help me?

We can suggest the best solution for you by selecting the answer above.

We want to train and create awareness among our staff on the latest cyber threats

We want to take our company cybersecurity to the next level

I want to upgrade my skills as cybersecurity professionals

We want to get our product tested and certified

CYBER SECURITY EVOLVED

{ WE FORESEE, ADAPT AND PROTECT YOUR CYBER SECURITY }

Get To

Know Us

Custodian of the most advanced

cybersecurity labs in Malaysia

Get To Know Us

Custodian of the most advanced cybersecurity labs in Malaysia

WE HAVE SOLUTION FOR EVERY CYBER SECURITY PROBLEMS
Manage &
Protect
Identify &
Detect
Respond &
Recover
Governance &
Compliance
WE HAVE SOLUTION FOR EVERY CYBER SECURITY PROBLEMS

Manage & Protect

Identify & Detect

Respond & Recover

Governance & Compliance

We use cookies

We use cookies and other tracking technologies to improve your browsing experience on our website, to show you personalized content and targeted ads, to analyze our website traffic, and to understand where our visitors are coming from. By browsing our website, you consent to our use of cookies and other tracking technologies.