Loading...
Loading...
Download our expert-curated security checklists used by 500+ Malaysian organizations. From PDPA compliance to penetration testing preparation.
Essential checklist covering all requirements of Malaysia's Personal Data Protection Act 2010. Includes data inventory, consent management, and breach notification procedures.
Bank Negara Malaysia's Risk Management in Technology framework checklist. Covers governance, security operations, and technology risk management requirements.
Prepare your organization for a successful penetration test. Includes scoping questions, access requirements, and communication templates.
Essential checklist covering all requirements of Malaysia's Personal Data Protection Act 2010. Includes data inventory, consent management, and breach notification procedures.
Bank Negara Malaysia's Risk Management in Technology framework checklist. Covers governance, security operations, and technology risk management requirements.
Complete checklist of ISO 27001:2022 Annex A controls. Track your implementation progress for information security certification.
Payment Card Industry Data Security Standard checklist for merchants. Covers all 12 requirements with implementation guidance.
Prepare your organization for a successful penetration test. Includes scoping questions, access requirements, and communication templates.
Self-assessment checklist for evaluating your organization's security controls. Perfect for identifying gaps before external audits.
OWASP Mobile Top 10 testing checklist for iOS and Android applications. Covers authentication, data storage, and API security.
Step-by-step incident response template covering detection, containment, eradication, and recovery phases. Includes role assignments and communication templates.
72-hour data breach response checklist aligned with PDPA notification requirements. Includes communication templates for regulators and affected individuals.
Evaluate third-party vendor security posture with this comprehensive questionnaire. Covers data handling, access controls, and compliance requirements.
Security best practices for AWS, Azure, and GCP environments. Covers IAM, encryption, network security, and monitoring.
New employee security checklist covering access provisioning, security awareness, acceptable use policies, and device security.
Subscribe to receive new security templates and checklists as they're released.
Get the latest cybersecurity insights delivered to your inbox.
We can create customized security policies and procedures for your organization.
Contact UsOur security experts can help you implement these frameworks and achieve compliance faster.