Home
About Us
Audit and Certification
PCI Certification
PCI DSS
PCI Secure SLC
PCI Secure Software
PCI 3DS
PCI PIN
PCI P2PE
ISO Certification
ISO/IEC 27001
ISO/IEC 27701
ISO 9001
ISO/IEC 42001
ISO 22301
Assessment Services
SWIFT CSCF
CSA STAR
SOC1 / SOC2 / SOC3
HIPAA
Privacy Assessments
GDPR
DPDP
CCPA/CPRA
New York SHIELD Act
Phillippines Data Protection
Saudi – SAMA
UAE-NESA Compliance
PDPL – UAE | Saudi | Qatar
CERT-IN Audits
RBI Audit
IRDA Audit
UIDAI – AUA & ASA
SEBI CSCRF
NABARD Security Audit
Information Systems Audit
Systems Audit
Data Center Audit
IOT and OT Assessment
Cybersecurity Audits
Cloud Security Audit
Third Party Vendor Assessments
Concurrent Audit
SOC Maturity Assessment
System Hardening Review
Security Testing
Infra Security Testing
Vulnerability Assessment(VA)
Penetration Testing(PT)
Approved Scanning Vendor(ASV)
Wireless Security Testing
Container and Kubernetes Security Assessment
Security Configuration Review
Cloud Security Assessment & Review
OT and IoT Security Assessment
Network Security Architecture Review
Network Segmentation Testing
Data Discovery – Card Data, PII, SSN, AADHAR
Application Security
Web & Mobile Application Penetration Testing
API Security Testing
POS Application Testing
Application Threat Modelling
Secure Code Review (SAST)
SCA & OSS Analysis
SBOM Assessment
Application Security Architecture Review Secure SDLC Review
Offensive Security
Red Teaming Exercises
Social Engineering Campaigns
Managed Security & Advisory
Managed Security Services
Security Operation Center (SOC)
Managed Detection and Response (MDR)
EDR and XDR Monitoring and Response
Security Orchestration, Automation and Response (SOAR) Services
Vulnerability Management (VMaaS)
Phishing Simulation Services (PhaaS)
Attack Surface Management (ASM)
Purple Teaming
Dark and Deep Web Monitoring
Security Solutions
Identity & Access Management (IAM)
Privileged Access Management (PAM)
Brand Protection Solutions
Advisory Services
Virtual CISO (vCISO)
Virtual DPO (vDPO)
Cybersecurity Resource Augmentation
Training & Learning
Basic | (Foundation & Awareness)
User Security Awareness
User Privacy Awareness
Software Security Architecture Fundamentals
Enterprise Security Architecture Fundamentals
SOC 2 Implementation
PCI DSS Implementation
ISMS Implementation
HIPAA Implementation
DPDP Implementation
Intermediate | (Audit & Expert Readiness)
Certified GRC Auditor
Certified Information Security Expert
Advanced | (Professional Certifications)
Certified Cyber Security Professional
Certified Privacy Professional
Certified GRC Professional
Home
About Us
Audit and Certification
PCI Certification
PCI DSS
PCI Secure SLC
PCI Secure Software
PCI 3DS
PCI PIN
PCI P2PE
ISO Certification
ISO/IEC 27001
ISO/IEC 27701
ISO 9001
ISO/IEC 42001
ISO 22301
Assessment Services
SWIFT CSCF
CSA STAR
SOC1 / SOC2 / SOC3
HIPAA
Privacy Assessments
GDPR
DPDP
CCPA/CPRA
New York SHIELD Act
Phillippines Data Protection
Saudi – SAMA
UAE-NESA Compliance
PDPL – UAE | Saudi | Qatar
CERT-IN Audits
RBI Audit
IRDA Audit
UIDAI – AUA & ASA
SEBI CSCRF
NABARD Security Audit
Information Systems Audit
Systems Audit
Data Center Audit
IOT and OT Assessment
Cybersecurity Audits
Cloud Security Audit
Third Party Vendor Assessments
Concurrent Audit
SOC Maturity Assessment
System Hardening Review
Security Testing
Infra Security Testing
Vulnerability Assessment(VA)
Penetration Testing(PT)
Approved Scanning Vendor(ASV)
Wireless Security Testing
Container and Kubernetes Security Assessment
Security Configuration Review
Cloud Security Assessment & Review
OT and IoT Security Assessment
Network Security Architecture Review
Network Segmentation Testing
Data Discovery – Card Data, PII, SSN, AADHAR
Application Security
Web & Mobile Application Penetration Testing
API Security Testing
POS Application Testing
Application Threat Modelling
Secure Code Review (SAST)
SCA & OSS Analysis
SBOM Assessment
Application Security Architecture Review Secure SDLC Review
Offensive Security
Red Teaming Exercises
Social Engineering Campaigns
Managed Security & Advisory
Managed Security Services
Security Operation Center (SOC)
Managed Detection and Response (MDR)
EDR and XDR Monitoring and Response
Security Orchestration, Automation and Response (SOAR) Services
Vulnerability Management (VMaaS)
Phishing Simulation Services (PhaaS)
Attack Surface Management (ASM)
Purple Teaming
Dark and Deep Web Monitoring
Security Solutions
Identity & Access Management (IAM)
Privileged Access Management (PAM)
Brand Protection Solutions
Advisory Services
Virtual CISO (vCISO)
Virtual DPO (vDPO)
Cybersecurity Resource Augmentation
Training & Learning
Basic | (Foundation & Awareness)
User Security Awareness
User Privacy Awareness
Software Security Architecture Fundamentals
Enterprise Security Architecture Fundamentals
SOC 2 Implementation
PCI DSS Implementation
ISMS Implementation
HIPAA Implementation
DPDP Implementation
Intermediate | (Audit & Expert Readiness)
Certified GRC Auditor
Certified Information Security Expert
Advanced | (Professional Certifications)
Certified Cyber Security Professional
Certified Privacy Professional
Certified GRC Professional
Contact Us
Home
About Us
Audit and Certification
PCI Certification
PCI DSS
PCI Secure SLC
PCI Secure Software
PCI 3DS
PCI PIN
PCI P2PE
ISO Certification
ISO/IEC 27001
ISO/IEC 27701
ISO 9001
ISO/IEC 42001
ISO 22301
Assessment Services
SWIFT CSCF
CSA STAR
SOC1 / SOC2 / SOC3
HIPAA
Privacy Assessments
GDPR
DPDP
CCPA/CPRA
New York SHIELD Act
Phillippines Data Protection
Saudi – SAMA
UAE-NESA Compliance
PDPL – UAE | Saudi | Qatar
CERT-IN Audits
RBI Audit
IRDA Audit
UIDAI – AUA & ASA
SEBI CSCRF
NABARD Security Audit
Information Systems Audit
Systems Audit
Data Center Audit
IOT and OT Assessment
Cybersecurity Audits
Cloud Security Audit
Third Party Vendor Assessments
Concurrent Audit
SOC Maturity Assessment
System Hardening Review
Security Testing
Infra Security Testing
Vulnerability Assessment(VA)
Penetration Testing(PT)
Approved Scanning Vendor(ASV)
Wireless Security Testing
Container and Kubernetes Security Assessment
Security Configuration Review
Cloud Security Assessment & Review
OT and IoT Security Assessment
Network Security Architecture Review
Network Segmentation Testing
Data Discovery – Card Data, PII, SSN, AADHAR
Application Security
Web & Mobile Application Penetration Testing
API Security Testing
POS Application Testing
Application Threat Modelling
Secure Code Review (SAST)
SCA & OSS Analysis
SBOM Assessment
Application Security Architecture Review Secure SDLC Review
Offensive Security
Red Teaming Exercises
Social Engineering Campaigns
Managed Security & Advisory
Managed Security Services
Security Operation Center (SOC)
Managed Detection and Response (MDR)
EDR and XDR Monitoring and Response
Security Orchestration, Automation and Response (SOAR) Services
Vulnerability Management (VMaaS)
Phishing Simulation Services (PhaaS)
Attack Surface Management (ASM)
Purple Teaming
Dark and Deep Web Monitoring
Security Solutions
Identity & Access Management (IAM)
Privileged Access Management (PAM)
Brand Protection Solutions
Advisory Services
Virtual CISO (vCISO)
Virtual DPO (vDPO)
Cybersecurity Resource Augmentation
Training & Learning
Basic | (Foundation & Awareness)
User Security Awareness
User Privacy Awareness
Software Security Architecture Fundamentals
Enterprise Security Architecture Fundamentals
SOC 2 Implementation
PCI DSS Implementation
ISMS Implementation
HIPAA Implementation
DPDP Implementation
Intermediate | (Audit & Expert Readiness)
Certified GRC Auditor
Certified Information Security Expert
Advanced | (Professional Certifications)
Certified Cyber Security Professional
Certified Privacy Professional
Certified GRC Professional
Home
About Us
Audit and Certification
PCI Certification
PCI DSS
PCI Secure SLC
PCI Secure Software
PCI 3DS
PCI PIN
PCI P2PE
ISO Certification
ISO/IEC 27001
ISO/IEC 27701
ISO 9001
ISO/IEC 42001
ISO 22301
Assessment Services
SWIFT CSCF
CSA STAR
SOC1 / SOC2 / SOC3
HIPAA
Privacy Assessments
GDPR
DPDP
CCPA/CPRA
New York SHIELD Act
Phillippines Data Protection
Saudi – SAMA
UAE-NESA Compliance
PDPL – UAE | Saudi | Qatar
CERT-IN Audits
RBI Audit
IRDA Audit
UIDAI – AUA & ASA
SEBI CSCRF
NABARD Security Audit
Information Systems Audit
Systems Audit
Data Center Audit
IOT and OT Assessment
Cybersecurity Audits
Cloud Security Audit
Third Party Vendor Assessments
Concurrent Audit
SOC Maturity Assessment
System Hardening Review
Security Testing
Infra Security Testing
Vulnerability Assessment(VA)
Penetration Testing(PT)
Approved Scanning Vendor(ASV)
Wireless Security Testing
Container and Kubernetes Security Assessment
Security Configuration Review
Cloud Security Assessment & Review
OT and IoT Security Assessment
Network Security Architecture Review
Network Segmentation Testing
Data Discovery – Card Data, PII, SSN, AADHAR
Application Security
Web & Mobile Application Penetration Testing
API Security Testing
POS Application Testing
Application Threat Modelling
Secure Code Review (SAST)
SCA & OSS Analysis
SBOM Assessment
Application Security Architecture Review Secure SDLC Review
Offensive Security
Red Teaming Exercises
Social Engineering Campaigns
Managed Security & Advisory
Managed Security Services
Security Operation Center (SOC)
Managed Detection and Response (MDR)
EDR and XDR Monitoring and Response
Security Orchestration, Automation and Response (SOAR) Services
Vulnerability Management (VMaaS)
Phishing Simulation Services (PhaaS)
Attack Surface Management (ASM)
Purple Teaming
Dark and Deep Web Monitoring
Security Solutions
Identity & Access Management (IAM)
Privileged Access Management (PAM)
Brand Protection Solutions
Advisory Services
Virtual CISO (vCISO)
Virtual DPO (vDPO)
Cybersecurity Resource Augmentation
Training & Learning
Basic | (Foundation & Awareness)
User Security Awareness
User Privacy Awareness
Software Security Architecture Fundamentals
Enterprise Security Architecture Fundamentals
SOC 2 Implementation
PCI DSS Implementation
ISMS Implementation
HIPAA Implementation
DPDP Implementation
Intermediate | (Audit & Expert Readiness)
Certified GRC Auditor
Certified Information Security Expert
Advanced | (Professional Certifications)
Certified Cyber Security Professional
Certified Privacy Professional
Certified GRC Professional
Contact Us
Home
Category: Press Release
Press Release
March 24, 2025
Southeast Asia private equity braces for more uncertainty ahead despite a sharp rebound in 2024
Press Release
March 20, 2025
Execor’s social impact pledge: $2 billion in pro bono consulting by 2035
Press Release
February 10, 2025
Protection gaps expected to worsen across all lines of insurance business through 2030, finds Execor
Press Release
February 5, 2025
How the World’s Most Admired Companies Are Change Ready and Leading the Disruption
Press Release
January 25, 2025
John Smith Joins Execor as Senior Client Partner in Technology Practice
Press Release
January 24, 2025
Rene Morales Joins Execor as Senior Client Partner in Healthcare Practice
Stay Ahead.
Subscribe for Expert Insights.
Email
Subscribe
You can unsubscribe at any time using the link in the footer of our emails. View our
Privacy Policy
.
top