RSM Hong Kong


Cybersecurity Consulting and IT Assurance

Cybersecurity Consulting and IT Assurance


Any organisation can be vulnerable to attack or the break down and failure of their IT systems. This can be due to flaws in the design of the infrastructure, weak configuration settings, failure to apply security patches, or poor security management. Unauthorised access to your systems and your data can have serious operational, financial or legal implications, as well as damaging your reputation. Even firewalls and antivirus technologies are prone to vulnerabilities and hackers are constantly developing new ways of exploiting security weaknesses.

We offer a variety of of specialised information security services designed to reduce the risk and impact of unauthorised access to your systems and data. Information systems assurance professionals provide advice to help you make your systems, and the processes they support, function as intended and that appropriate contingencies are in place to allow your organisation to operate business as usual in the event of not being able to access systems. By assessing all significant risks and ensuring they are being appropriately managed, we can also help you consider how to use your IT systems to better achieve your objectives.

RSM has the knowledge and experience in information technology reviews, information security and internal audits to provide you with the insight necessary to fully understand how your IT systems are being used and where the risks are.

Our services include:

ai_arificial_intelligence_machine_technology_innovation_simple_blue-10_75x75.png Cybersecurity Review: assess your company’s current cyber risk exposure following industry standards including ISACA CSX, AICPA SOC for Cybersecurity, CSA STAR Attestation
Ethical Hacking: perform vulnerability scanning and penetration testing over IT infrastructure, business/web applications and SQL databases


Webtrust Audit: perform WebTrust audit for certificate authority under AICPA/CICA Trust Service principles and provide WebTrust Seal on company’s website
IT Audit: perform IT review procedures using industry-leading audit software to support financial audit or independent IT attestation requirements, including ISO27001, ISAE3402, SSAE 16 SOC etc.
ai_arificial_intelligence_machine_technology_innovation_simple_blue-03_75x75.png Post implementation review: review whether there are adequate logical and system controls and assist in setting up the appropriate configurations in the system
ai_arificial_intelligence_machine_technology_innovation_simple_blue-02_75x75.png System UAT test: provide independent user acceptance testing (UAT) for business applications by RSM certified consultants
ai_arificial_intelligence_machine_technology_innovation_simple_blue-01_75x75.png Business continuity planning: review and streamline existing IT business continuity plan (BCP) plan for network, infrastructure, business applications and data backups 


How can we help you?

Contact us by phone +852 2598 5123 or submit your questions, comments, or proposal requests.

Email us