SECURITY ADVISORY AND CONSULTING

Know your risk
Build your resilience

End-to-end security advisory from vulnerability assessments and penetration testing to architecture design, governance frameworks, and risk management. Delivered by practitioners who have operated security at scale across the region.

Speak to an Advisor
280
Penetration tests annually
400
API security tests per year
200
Third-party risk assessments
Top 30%
NIST CSF global maturity benchmark

CREST-Accredited Penetration Testing methodology, certified testers, and post-assessment support. First telco group in Axiata markets to be CREST accredited.

CREST-AccreditedPen Testing
HELIOS-PoweredAttack Surface Intelligence
NIST · ISO 27001 · BNM RMITAligned
Zero TrustProgramme Experience
CREST-AccreditedPen Testing
HELIOS-PoweredAttack Surface Intelligence
NIST · ISO 27001 · BNM RMITAligned
Zero TrustProgramme Experience
SECURITY ADVISORY & CONSULTING

Assessment, architecture, governance, and risk management under one practice.

Most organizations treat security assessment, architecture, maturity and compliance in silos. ACFC transforms IT and security to an integrated resilience framework which encapsulate cybersecurity, data privacy, business continuity management, risk management and compliance under one umbrella driven through 3 lines of defense model.

Your Assessment Begins With a Complete, Intelligence-Led View

Before we engage as advisors, we will leverage our HELIOS capability to conduct a threat assessment and help organizations prioritize assessments quick wins and long-term strategic road maps.

About HELIOS →

Our approach

NIST CSF
ISO 27001
OWASP
CREST
Zero Trust (NIST SP 800-207)
BNM RM1T
NACSA
MBSS
CIS Controls
01

Security Assessments

Identify gaps before your adversaries do. ACFC’s assessment services pair HELIOS external attack surface intelligence with CREST-accredited human testing to deliver validated, actionable findings across every layer of your technology environment.

CREST-Accredited
OWASP
ISO 27001
BNM RMiT
Bursa Malaysia
NACSA
02

Architecture & Governance

Security strategy without architecture is a list of intentions. ACFC's architecture and governance practice translates strategy into implementable design drawing on the experience of building and governing a multi-year Zero Trust programme across one of Southeast Asia's most complex digital groups.

Zero Trust (NIST SP 800-207)
SABSA
TOGAF
CIS Controls
ISO 27001
03

Compliance

Compliance is a floor, not a ceiling but it is a mandatory floor. ACFC turns regulatory requirements into practical security improvements. We have navigated Bursa Malaysia, BNM RMiT, NACSA, and CSA 2024 obligations across complex, multi-jurisdiction organisations and deliver assessments that satisfy regulators as well as genuinely improving security posture.

Bursa Malaysia
BNM RMiT
NACSA
CSA 2024
ISO 27001
PDPA
NIST SP 800-207

What Risk Advisory Covers

RETAINER OR PROJECT
04

Risk Advisory & Consultancy Services

Strategic counsel for CISOs, Boards, and Risk Committees who need more than an assessment report. ACFC's advisory team has operated at group CISO level with board reporting responsibility across a publicly listed organisation translating technical risk into business language, informing investment decisions, and guiding security programmes through regulatory scrutiny.

Board-Level Advisory
Cyber Risk Quantification
Regulatory Guidance
Security Programme Review
HELIOS-Informed

Risk Advisory & Consultancy Services

Bespoke advisory engagements for security leaders, Boards, and Risk Committees covering cyber risk quantification, security investment prioritisation, programme effectiveness review, regulatory interpretation, and strategic security planning. ACFC advisors have operated at group CISO level with board reporting responsibility across a publicly listed organisation spanning 12 entities and five countries. Every advisory engagement is informed by live HELIOS threat intelligence meaning advice is grounded in the actual adversary landscape facing your organisation, not generic industry benchmarks.

CYBER RISK QUANTIFICATION
SECURITY INVESTMENT PRIORITISATION
BOARD & EXECUTIVE BRIEFINGS
PROGRAMME REVIEW
REGULATORY COMPLIANCE
CISO as a SERVICE

TALK TO US

Ready to see your risk the way your adversaries see it?

Tell us which area concerns you most. We'll connect you with the right practitioner.

Book a Security ConsultationRequest a HELIOS DemoPartner with ACFC

Or email us directly at hello@axiatacfc.com

SECURITY ADVISORY AND CONSULTING

Know your risk

Build your resilience

End-to-end security advisory from vulnerability assessments and penetration testing to architecture design, governance frameworks, and risk management. Delivered by practitioners who have operated security at scale across the region.

280
Penetration tests conducted annually
400
API security tests performed per year
200
Third-party risk assessments annually
Top 30%
NIST CSF global maturity benchmark 2023
CREST-Accredited Penetration Testing methodology, certified testers, and post-assessment support. First telco group in Axiata markets to be CREST accredited.
CREST-AccreditedPen Testing
HELIOS-PoweredAttack Surface Intelligence
NIST · ISO 27001 · BNM RMITAligned
Zero TrustProgramme Experience
CREST-AccreditedPen Testing
HELIOS-PoweredAttack Surface Intelligence
NIST · ISO 27001 · BNM RMITAligned
Zero TrustProgramme Experience
SECURITY ADVISORY & CONSULTING

Assessment, architecture, governance, and risk management under one practice.

Most organizations treat security assessment, architecture, maturity and compliance in silos. ACFC transforms IT and security to an integrated resilience framework which encapsulate cybersecurity, data privacy, business continuity management, risk management and compliance under one umbrella driven through 3 lines of defense model.

Your Assessment Begins With a Complete, Intelligence-Led View

Before we engage as advisors, we will leverage our HELIOS capability to conduct a threat assessment and help organizations prioritize assessments quick wins and long-term strategic road maps.

About HELIOS →

Our approach

NIST CSF
ISO 27001
OWASP
CREST
Zero Trust (NIST SP 800-207)
BNM RM1T
NACSA
MBSS
CIS Controls
01

Security Assessments

Identify gaps before your adversaries do. ACFC’s assessment services pair HELIOS external attack surface intelligence with CREST-accredited human testing to deliver validated, actionable findings across every layer of your technology environment.

CREST-Accredited
OWASP
ISO 27001
BNM RMiT
Bursa Malaysia
NACSA
Axiata Cyber Fusion Center (ACFC)

Penetration Testing

OWASP aligned penetration testing across web applications, mobile (iOS/Android), APIs, network infrastructure, cloud environments, and OT/SCADA systems. Each engagement follows a six phase methodology: Pre engagement, Vulnerability Analysis, Exploitation, Post Exploitation, Reporting, and Remediation Verification. We support black-box, grey-box and white box testing approaches where applicable. Every finding is clearly explained, reproducible, and demonstrated, no unvalidated or “rat rated” issues. Post remediation testing is conducted to verify fixes and confirm vulnerabilities remain closed.

WEB, MOBILE/NATIVEMOBILE ENVIRONMENTAPIsNETWORK + INFRA
Axiata Cyber Fusion Center (ACFC)

Vulnerability Management

Continuous, risk-based VM programme identifying, prioritising, and tracking remediation of vulnerabilities across your entire attack surface. Combines automated scanning tools directly into the programme. Risk-based prioritisation. We deploy scanners into your environment not just reports. Includes CVE scores, CVSS scores so your team can address what matters most.

CONTINUOUS
Axiata Cyber Fusion Center (ACFC)

Risk Assessment & Gap Analysis

Structured risk assessment identifying security controls against a defined standard NIST CSF, ISO 27001, PCI DSS, RMiT, or a bespoke baseline. Produces a risk-rated gap register, ownership assignment, and a prioritised remediation roadmap with business impact assessments at every finding level.

FRAMEWORK-ALIGNEDRISK-RATEDNIST SP 800-207 (Zero Trust Architecture)
Axiata Cyber Fusion Center (ACFC)

Source Code Review

Manual and automated review of application source code to uncover logic flaws, hardcoded credentials, insecure cryptography, injection vulnerabilities, and architectural weaknesses invisible to runtime testing. Line-level findings with developer-ready remediation guidance.

SASTMANUAL
Axiata Cyber Fusion Center (ACFC)

Cloud Security Posture Assessment

Assessment of AWS, Azure, or GCP environments against our MBSS, CIS Benchmark, or your organization's baseline.

AWS + AZURE + GCP
Axiata Cyber Fusion Center (ACFC)

Network & Infrastructure Security Review

Manual or network segmentation (firewall rules, ACLs, routing policies), hardening baselines (servers, network devices), hardening baselines (servers, network devices), insecure protocols, and weak cryptographic configurations. Includes initial access as authorised.

L2 — L7 + CLOUD
Axiata Cyber Fusion Center (ACFC)

SOC Maturity Assessment

Independent maturity assessment of your Security Operations function against the CMMI Security Maturity Model covering people, process, technology, governance, risk and compliance. Delivered as a risk-rated Maturity Report. Aligned with NIST CSF, MITRE ATT&CK, and CREST. All benchmarks against industry SOC maturity levels. Includes a prioritised improvement roadmap.

SOC-CMMI MODEL + CREST
Axiata Cyber Fusion Center (ACFC)

Cybersecurity Posture Assessment

HELIOS-powered comprehensive assessment combining external attack surface intelligence, dark web monitoring, code repository scanning, cloud container discovery, and governance control review. Produces a board-ready risk score and remediation roadmap.

HELIOS-POWERED
Axiata Cyber Fusion Center (ACFC)

Red Team Exercises

ACFC’s Red Team conducts APT-simulated, multi-vector adversarial exercises using TTPs aligned with real adversary groups, simulating attacks across digital, social engineering, and physical vectors. These exercises are mapped to the Cyber Kill Chain framework to assess the effectiveness of your detection, response, and technical controls.

MITRE ATTACK
Axiata Cyber Fusion Center (ACFC)

MBSS Assessment

Assessment against Malaysia's Minimum Baseline Security Standards the national cybersecurity baseline for government agencies and CNII operators. ACFC has implemented MBSS assessments across 12 operating entities covering 575+ standards, 1,000+ automated compliance scripts, and five technology domains.

NACSA + CNII
02

Architecture & Governance

Security strategy without architecture is a list of intentions. ACFC's architecture and governance practice translates strategy into implementable design drawing on the experience of building and governing a multi-year Zero Trust programme across one of Southeast Asia's most complex digital groups.

Zero Trust (NIST SP 800-207)
SABSA
TOGAF
CIS Controls
ISO 27001

Enterprise Security Architecture & Roadmap

Security Architecture Assessments

Third-Party Security Management Blueprint

Reference Architecture & Models

Cybersecurity Architecture Governance

03

Compliance

Compliance is a floor, not a ceiling but it is a mandatory floor. ACFC turns regulatory requirements into practical security improvements. We have navigated Bursa Malaysia, BNM RMiT, NACSA, and CSA 2024 obligations across complex, multi-jurisdiction organisations and deliver assessments that satisfy regulators as well as genuinely improving security posture.

Bursa Malaysia
BNM RMiT
NACSA
CSA 2024
ISO 27001
PDPA
NIST SP 800-207

Cybersecurity Posture Assessment -Regulatory Grade

ACFC's flagship compliance assessment a comprehensive evaluation combining HELIOS external attack surface intelligence, governance control reviews, and technical testing into a single, regulator-ready deliverable. Used by Bursa Malaysia-regulated investment banks for mandatory regulatory exercises, covering internet-exposed vulnerabilities, dark web credential exposure, code repository leaks, cloud container exposure, and governance controls. Produces a scored assessment report, risk register, and prioritised remediation roadmap ready for board and regulatory submission.

BURSA MALAYSIABNM RMITISO 27001NACSACSA 2024

Country Security Compliance Assessments

Jurisdiction-specific compliance assessments for organisations operating across multiple Southeast Asian and South Asian markets. ACFC understands the regulatory landscape across Malaysia, Indonesia, Bangladesh, Cambodia, Sri Lanka, and Nepal assessing compliance with local cybersecurity laws, data protection regulations, and sector-specific requirements in each market.

MULTI-JURISDICTION

Third-Party Risk Assessments

Point-in-time and ongoing security assessments of your critical vendors, technology suppliers, and outsourced service providers producing a tiered risk rating, findings report, and remediation engagement path. ACFC conducts 200+ third-party risk assessments annually and addresses the supply chain risk requirements under BNM RMIT and ISO 27001.

VENDOR DUE DILIGENCE

NIST Zero Trust Maturity Assessment

Assessment of your organisation's Zero Trust maturity across the five NIST pillars Identity, Devices, Networks, Applications & Workloads, and Data. ACFC has designed and implemented a multi-year Zero Trust programme for the Axiata Group. This assessment draws directly from that experience to produce a credible maturity score with a phased improvement roadmap.

NIST SP 800-207
04

Risk Advisory & Consultancy Services

Strategic counsel for CISOs, Boards, and Risk Committees who need more than an assessment report. ACFC's advisory team has operated at group CISO level with board reporting responsibility across a publicly listed organisation translating technical risk into business language, informing investment decisions, and guiding security programmes through regulatory scrutiny.

Board-Level Advisory
Cyber Risk Quantification
Regulatory Guidance
Security Programme Review
HELIOS-Informed

Risk Advisory & Consultancy Services

Bespoke advisory engagements for security leaders, Boards, and Risk Committees covering cyber risk quantification, security investment prioritisation, programme effectiveness review, regulatory interpretation, and strategic security planning. ACFC advisors have operated at group CISO level with board reporting responsibility across a publicly listed organisation spanning 12 entities and five countries. Every advisory engagement is informed by live HELIOS threat intelligence meaning advice is grounded in the actual adversary landscape facing your organisation, not generic industry benchmarks.

CYBER RISK QUANTIFICATION
SECURITY INVESTMENT PRIORITISATION
BOARD & EXECUTIVE BRIEFINGS
PROGRAMME REVIEW
REGULATORY COMPLIANCE
CISO as a SERVICE

What Risk Advisory Covers

Cyber risk quantificationtranslating technical exposure into financial risk for Board-level decision-making.
Security investment prioritisationbuilding evidence-based business cases for security programme spend.
Security programme reviewindependent assessment of programme effectiveness against defined benchmarks.
Regulatory interpretationpractical guidance on emerging obligations before mandatory compliance deadlines.
Board & executive briefingsprivate, HELIOS-informed threat intelligence sessions for senior leadership.
TALK TO US

Ready to see your risk the way your adversaries see it?

Tell us which area concerns you most. We'll connect you with the right practitioner.

Book an Assessment

Pen test, VM programme, Red Team, Cloud Security, or Posture Assessment tell us your environment and we'll scope the right engagement.

Start the conversation

Request a HELIOS Demo

See your attack surface the way HELIOS maps it live. We'll show you what's exposed about your organisation right now, before any engagement begins.

Request Demo

Strategic Advisory

CISO-level advisory, board briefing, risk programme review, or regulatory preparation speak with an advisor who has operated at the same level.

Book an advisory session
Or email us directly at hello@axiatacfc.com