PVQ Master Introduction V3 21
PVQ Master Introduction V3 21
PVQ Master Introduction V3 21
We are Qatar based international setup, – we plan to work closely with the local agencies to support their project delivery
in the domain of information security, data protection & compliance..
Leadership behind the PRICORIS brings to their clients more than 50 years of cumulative experience of IT and ITeS projects
delivered internationally including many critical projects in GCC.
Our expertise, are based on simple, sustainable and strategic ties with strong regional partners. We believe in providing the
muscle and delivery engine for your Information Security and data Protection projects.
PVQ is a specialized services group focused on managing the delivery of projects related to Information Security and
regulatory compliance programs, by bringing best-in-class cross industry knowledge. Our delivery methodology includes
employing program and project managers who are subject matter experts of IS and IT.
At a strategic objective layer - we enable our clients to gain a sustainable competitive advantage, optimize business
performance and increase bottom line revenues.
pvq
WE SUPPORT REGULATORY REQUIREMENTS OF AND FROM
pvq
WE SUPPORT A FIXED SET OF SERVICES DOMAIN
ü We will never cross your line of relationship with your accounts/end customer
ü Flexible with both Onsite and Offsite Model of engagement
ü Flexible with pricing models and payment milestones
ü We believe in sharing success and risk with our partners
pvq ü We are a services company, and your products will be always our priority.
INFORMATION SECURITY OR CYBERSECURITY AUDIT
We understand the subtle differences of Information security which deals with information, regardless of its format.
Our security audit identifies network and systems weaknesses, so organizations are better equipped to avoid the
cost and damage that result from a security incident.
An information security or cybersecurity audit assesses data security practices within an organization and addresses
gaps that could result in information systems being compromised.
PVQ and its partners have extensive experience in conducting technical assessments and providing services related
to enhancing an organization’s security program, including:
QATAR
PRIVACY LAW
FIFA CSF22
EU GDPR
ISO 27701
pvq
WE SUPPORT FIFA CSF22 UNIVERSE (selected layers)
pvq
CSF INDIVIDUAL CAPABILITIES SUPPORTED BY PVQ
ISO
NIA ON CLOUD
CSF22 ON PREM
NIST HYBRID
pvq
CYBER SECURITY CONSULTING
Cyber Security Consulting Services and Strategies to put you on top.
Every business faces its own set of challenges, from rules and regulations to highly sophisticated data security
threats. And regardless of company size, one-on-one counsel from a dedicated cyber security engineer is often
essential to keep pace. Still short of hiring a CTO, it can be challenging to pinpoint hidden vulnerabilities, draft the
right action plan, or choose the best technologies for your environment to safeguard data assets and comply with
new laws—particularly within our fast-paced and ever-adapting threat landscape.
• But with our Cyber Security Consulting, we offer a no-compromise solution that eliminates new hire commitments
while delivering the executive-level counsel needed to succeed. Gain a level of service previously only afforded by
larger enterprises. We’ll work alongside management to best align security policies and practices with business
objectives to advance your operational goals.
• Tap into a vast knowledge base while implementing cyber security strategies that work perfectly with your
business model and budget. Enjoy on-demand and as-needed support from experienced consultants who are able
to step in when you need us most. We specialize in executive advisory support, vendor assessment, and policy and
technical implementation. And we’re available on a one-time or ongoing basis to ensure you address the myriad of
security situations that present themselves throughout the year.
pvq
WHY HIRE AN INFORMATION SECURITY CONSULTANT?
• Our advisory services are designed to meet security project goals in shorter time periods.
• We provide product specific experts to configure systems that reduce cyber threats.
• We alleviate staff to focus on other goals while we focus our attention on risk management.
• We can provide on-demand, hourly, or by project security consulting throughout the year.
We shelter our clients from cyber risk with collaboration of services and best industry tools
• We take an impartial look at operations, benchmarking your environment with comparable organizations and
situations. From security program design through audit preparation, our clients benefit from insight gleaned from
our unique vantage point.
Our Strategy and Advisory Services
• Every business reaches a point that necessitates the level of insight unattainable through in-house staff. We help
you better compete, innovate, and grow by augmenting your existing expertise with the right blend of business
and cybersecurity counsel. Define your direction and priorities while appropriately allocating resources to grow
and advance your business.
pvq
WE DO SOC II BASED COMPLIANCE PROGRAMS FOR BFSI
SOC 2 Compliance attestation helps you provide services to the largest organizations around the globe.
• SOC 2 GAP Assessment
• SOC 2 Audit Assistance
• SOC 2 Complete Management and Outsourcing
pvq
PENETRATION TESTING
The different types of penetration testing services.
• External Network Penetration Testing. We pinpoint potential avenues of network attack where access might be gained through
internet-connected servers or network equipment by individuals outside of your organization who lack appropriate rights or
credentials. We then conduct a mock attack to test security controls, developing and presenting you with a cybersecurity
assessment on findings along with solutions and recommendations you can use to remediate the issue.
• Internal Network Penetration Testing. We help companies mitigate risk due to internal threats against their corporate network.
While external testing investigates avenues that remote hackers might use to enter networks, internal testing looks at ways
employees or insiders might lead to a breach either through neglect, malice, or the accidental download of an application, such
as ransomware or malware, which has the potential to bring an entire network down.
• Application Penetration Testing. We investigate potential threats and vulnerabilities posed by the many internet-based
applications in use throughout your enterprise. Conveniently accessed from any location worldwide and just as easily breached,
web applications offer significant points of access into credit card, customer, and financial data. Vulnerability assessment services
investigate the security of those solutions and controls in place, providing recommendations and strategies to block access to any
data that might be stored within.
• Wireless Penetration Testing. We bring advanced expertise in a range of wireless technologies, offering ethical hacking services
to investigate and identify potential access points where hackers could enter your internal network. This involves threat
assessment and security control audits for traditional Wi-Fi and specialized systems. We then compile findings into a
cybersecurity assessment report complete with recommendations you can put into place to mitigate damage.
• Social Engineering Penetration Testing. We survey employees to see how well they understand your organization’s information
security policies and practices, so you know how easily an unauthorized party might convince staff into sharing confidential
information. Social engineering penetration testing might include badge access points and mock phishing attacks or password
pvq update requests. We’ll then recommend ways to improve success through training or new processes that help employees better
protect sensitive data.
OUR IoT UNIVERSE
IoT security includes both physical device security and network security, encompassing the processes, technologies,
and measures necessary to protect IoT devices as well as the networks they’re connected to. It spans industrial
machines, smart energy grids, building automation systems, employees’ personal IoT devices, and more, including
devices that often aren’t designed for network security.
Our consultants help our client discover and design IoT device security to protect systems, networks, and data from a
broad spectrum of IoT security attacks, we target four types of vulnerabilities:
• Communication attacks, which put the data transmitted between IoT devices and servers at risk.
• Lifecycle attacks, which put the integrity of the IoT device as it changes hands from user to maintenance.
• Attacks on the device software.
• Physical attacks, which target the chip in the device directly.
•Security Audit
•Migration and integration
•Secure Product Design/deployment
•Secure Architecture
•Compliance & Certification
pvq
OUR SERVICES ON MICROSOFT AZURE IoT SUIT
pvq
OPERATIONS & TECHNOLOGY CONSULTING - UNIVERSE
Our expert insurance Operations & Technology consulting group advises you through the planning, deployment and
ongoing usage of new technology solutions and the operational changes that accompany them. During decades of
serving all aspects of business for insurance organizations of all sizes, we understand how the moving pieces of the
insurance industry fit together. We offer advice and consulting services that eliminate the guesswork and help you
make smart, well-informed and fact-based decisions.
PLANNING & STRATEGY
We help you figure out how to get what you’re looking for. By reviewing your priorities and gaining an in-depth understanding of your business goals,
we create an actionable plan to move you forward, supported by a compelling business case and logical solution architecture.
OPERATIONS ASSESSMENTS
You need to see the big picture of how well-considered organizational changes can positively impact your business. We conduct a comprehensive
review of your internal operations and the external relationships that support them, and compare it against industry benchmarks for efficiency,
effectiveness and agility.
IMPLEMENTATION SUPPORT
We support you throughout your new technology initiatives by providing project oversight, redesigning impacted workflows and documenting
insurance product requirements to accelerate delivery and dramatically reduce project risks.
pvq
OUR PROFESSIONAL SERVICES
PRODUCT-SPECIFIC EXPERTISE
Simple strategies go only so far to take organizations where they need to be. That’s why we take an individualized
approach, connecting management with the most suitable firewall consultants, intrusion prevention consultants,
SIEM consultants, network access control (NAC) security consultants, antivirus security consultants, and vulnerability
scanning consultants. Our team is expert in delivering projects for your Data Governance, Data Classification and DLP.
We know the leading security products. We understand how to implement them in very unique environments. Our
team of hands-on experts focus on security controls and standards specific to your business.
DPO
AS A SERVICE
pvq
HOW WE OPERATE IN QATAR
• We plan to support your delivery
• Without facing client or representing you
• We would selectively partner in the region
• No plans to sell products
• Building a long term pipeline is goal
CLIENTS
LOCAL CONSULTING PARTNER
TECH PARTNER
PARTNER(S)
He is instrumental in regional market for working closely with regulators and developing
various industrial laws, by law and industrial guidelines which shapes the requirements of
and for Cyber Security, Data Protection and related domains. With detailed understanding
of FIFA Cybersecurity Framework 22, Qatar NIA and QCB’s requirements pertaining to
information security controls – he is considered one of the key resources on the
aforementioned matters and have been appointed by clients in Doha to re-design their
internal frameworks.
He will lead the strategic alliance with all regional and international stakeholders that would
be required for timely delivery of proposals, successful winning and final delivery of project.
This will include managing operations, resource manage net and project management .
Read more at - https://www.linkedin.com/in/rickyjha/
pvq
OUR LEADERSHIP
SANDHYA KHAMESRA
PRINCIPAL – PVQ & MENA DELIVERY
CEO – PRICORIS INDIA
She is a qualified charted accountant, and has certifications including DISA(ICAI), CISM, Lead
Auditor and Implementer - ISO 22301, ISO 27001, ISO 20000, ISO 31000, BS 65000 and BS 10012.
(35 Years)
Driven by her passion to assist organizations create cybersecurity, conscious environments,
Sandhya advises businesses in a range of industries on cybersecurity and data security best
practices. Her past engagements include consulting and project delivery for large marketing
firms, insurance and health sectors, banks, technology companies, defence, financial service
providers and the public sector.
Sandhya’s ability to lead engaging strategic cybersecurity discussions and project delivery is
highly commended by PRICORIS clients internationally.
Prior to pursuing entrepreneurial journey, she was leading BSI (British Standard Institute) as a
Chief Operating Officer for their consulting and business resilience practices.
She will lead the delivery and technical aspects of all the project proposal, drafts and deliverable
definition.
pvq Read more at : https://www.linkedin.com/in/sandhya-khamesra-3087766/
OUR LEADERSHIP
ASEEM MUKHI (CISM, CSA-STAR, DCPLA)
CONSULTANT – CYBERSECURITY
EX Director PWC
He is experienced professional with a demonstrated history of working on projects related to
Information security, Cybersecurity, Data Privacy, IT Security Strategy and Technology Risk
assurance. (20 Years)
Over 20 years’ rich experience with organizations like EY, PWC and DSCI he has demonstrated
expertise in a wide gamut of projects in Cybersecurity strategy and transformation, security
risk assessment, review and advise on security architecture, Risk management, Compliance,
Policy development, Privacy assessment and Business Continuity Management
He will lead the design and project aspects of all the engagements, proposal, drafts and
deliverable definition.
Read more at : https://www.linkedin.com/in/aseem-mukhi-cism-csa-star-dcpla-1544854/
pvq
We thank you for your time and consideration,
and we will wait to hear more from you.