Ready to elevate knowledge and strengthen defence?

Talk to our cyber security expert.

Please select the products you are interested in :
Name*
Email*
Job Title*
Company*
Industry*
Message
Send

Securing Your

Most Critical Digital Assets

Components of

SiberKASA

SiberKASA is developed based on holistic cyber security approach that covers three main components;

Addressing the aspects of skills, knowledge, ethics, behaviour and talent. Human factor is one of the biggest vulnerabilities in cyber security as most threats and crimes against individual, communities and organizations originated from human weakness or human errors. Ensuring people are sufficiently exposed, trained and empowered to act responsibly in managing cyber threats is a key component of holistic cyber security approach.

Technology involves matters related to initiatives / programs to minimize vulnerabilities, digital forensic analysis, malware and data, software and hardware patching.

 

Examples of technology includes Common Criteria Evaluation and Certification (CC); Data Leakage Protection Software.

Process includes guidelines, law or regulations, policy, strategy, Standard Operating Procedures and international standards recognition. Processes must be developed in line with organizational objectives including all aspects of organizational security, both physical security and cyber security. Some of the examples involving process are National Cyber Security Policy (NCSP) since 2006 and Malaysia Cyber Security Strategy (MSCC) launched recently; Standards Guidelines for ISO 27001 – Information Security Management System (ISMS; Personal Data Protection Act (PDPA 2010).

We are
CyberSecurity Malaysia

National CyberSecurity Agency serving Malaysian and international
public and private organizations.

History

CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Communications and Multimedia Malaysia (KKMM). Pursuant to the Federal Government Ministerial Order 2019, with effect from 21 May 2018, CyberSecurity Malaysia is placed under Minister of Communications and Multimedia Malaysia.

CyberSecurity Malaysia is committed to provide a broad range of cybersecurity innovation-led services, programmes, and initiatives to reduce vulnerability of digital systems, and at the same time strengthen Malaysia’s self-reliance in cyberspace.

The agency provides the following specialised cybersecurity services:

Cyber Security Responsive Services 


Cyber Security Proactive Services 


Outreach and Capacity Building 


Strategic Study and Engagement 


Industry and Research Development

Vision

World-class cyber
security specialist agency.

Mission

Leading the development of a safer and more resilient cyber ecosystem to enhance national security, economic prosperity, and social harmony through:

Provision of quality and impactful services

Frontier-expanding cyber knowledge and technical supremacy

Continuous nurturing of talent and expertise

Core Values

Trust

By maintaining social, ethical and organisational norms, we firmly adhere to codes of acceptable conduct and professional ethical principles.

IMPARTIALITY

By providing consultation, advice and decision making with professionalism based on established facts and rationale, and devoid of any personal or conflict of interest and bias.

PROACTIVE

By taking prompt action to accomplish objectives; anticipating challenges and identifying early solutions; taking action to achieve goals beyond what is required or expected.

Read insights from our experts.

Ready to elevate knowledge and

strengthen defense?
 

Talk to our cyber security expert.

Ready to elevate knowledge and strengthen defence?

Talk to our cyber security expert.

Please select the products you are interested in :
Name*
Email*
Job Title*
Company*
Industry*
Message
Send

Read insights from our experts to your inbox

 

We use cookies

We use cookies and other tracking technologies to improve your browsing experience on our website, to show you personalized content and targeted ads, to analyze our website traffic, and to understand where our visitors are coming from. By browsing our website, you consent to our use of cookies and other tracking technologies.