Cybersecurity and privacy

Balance security and opportunity to move boldly forward

Multiplying cyber threats have made an effective cybersecurity programme a critical business requirement. We help organisations protect against threats, propel transformation and pursue growth.

Focus on cybersecurity and privacy to achieve your goals

We don’t just protect business value, we create it – using cybersecurity and privacy as a tool to transform businesses. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. Business digitisation also exposes companies to new digital vulnerabilities, making effective cybersecurity and privacy more important than ever. We incorporate four key elements to help you take a broader view of cybersecurity and privacy as both protectors and enablers of the business.

Strategy and transformation; Privacy and consumer protection; Incident and threat management; Implementation and operations

Four components to propel transformation and achieve growth

Strategy and transformation: growth through new technologies

Many organisations are pursuing emerging technologies to develop new products, services, or ways of doing business. However, companies don’t always consider the emerging cybersecurity threats that could impact these systems after they’re implemented. We can help you assess, manage and design transformation strategies to enhance your cybersecurity capabilities that will enable the business, sustain and simplify compliance, and build trust with stakeholders.  

Our services:

  • Strategy development and transformation
  • Cybersecurity risk and governance
  • Third party security risk management
  • Emerging technology security
  • Cloud security

Privacy and consumer protection: build trust and spark growth

Companies face a growing patchwork of new data protection and privacy laws in different territories (particularly the EU). This creates doubts when using data, resulting in missed business opportunities or regulatory breaches through inappropriate use, leading to loss of trust. We can help you craft a privacy programme compliant with global data-privacy regulations that can help you use data with confidence to create value and enhance customer trust.

Our services:

  • General Data Protection Regulation (GDPR)
  • Personal data governance
  • Privacy assessment
  • Privacy transformation

Implementation and operations: integrate, manage and improve technologies

Leaders seek to focus on opportunities that move their business forward, yet they’re often mired by today’s urgent cybersecurity and privacy challenges. We can help you efficiently integrate new and existing technology systems into your business, as well as actively manage them to deliver continuous operational improvements and increase your cybersecurity investment.

Our services:

  • Identity and access management
  • Analytics and monitoring
  • Data protection
  • Enterprise security architecture
  • Managed security solutions

Incident and threat management: identify, respond to and remediate threats

Leaders know they need to rapidly and effectively respond to threats, but many lack confidence in their plans. A clear view of the strengths and weaknesses in your incident response plan is the first step in preparing you to confidently manage a potential security incident. We can help detect, respond to, investigate and remediate threats across the incident-management life cycle. Our team can assist you to understand dynamic cybersecurity challenges, adapt and respond to risks inherent to your business ecosystem, and prioritise and protect the most valuable assets fundamental to your business strategy.

Our services:

  • Incident readiness (Game of Threats)
  • Incident response
  • Threat management
  • Information sharing

Digital products

PwC’s Privacy Operation Hub is the first digitalised privacy compliance management application rooted in China that provides go-global enterprises an unified, compliant and efficient solution throughout the privacy management life cycle.

Read More

PwC's Privacy Ready digital solution ensures compliance with China’s Personal Information Protection Law (PIPL). The platform automates the accurate identification of compliance issues for companies involved in the collection and processing of personal information in China while continuously monitoring the risk treatment process.

Read More

Ethical Hack Bot is an integrated platform using robotics technology and approach to automate and strengthen your threat and vulnerability management process. Ethical Hack Bot helps you detect security vulnerabilities early, prevent cyber attacks and identify immediate solutions for your organisation.

Read More


{{contentList.dataService.numberHits}} {{contentList.dataService.numberHits == 1 ? 'result' : 'results'}}

Contact us

Hong Kong / South China

Kenneth Wong

Mainland China and Hong Kong Digital Trust & Risk - Cybersecurity and Privacy Leader, PwC Hong Kong

+[852] 2289 2719


Kok Tin Gan

Partner, PwC Hong Kong

+[852] 2289 1935


Danny Weng

Partner, Guangzhou, PwC China

+[86] (20) 3819 2629


Daryl Li

Partner, PwC Hong Kong

+[852] 2289 2724


Jenius Shieh

Partner, PwC Hong Kong

+[852] 2289 2086


Central China

Chun Yin Cheung

Partner, Shanghai, PwC China

+[86] (21) 2323 3927


Ray Tan

Partner, Shanghai, PwC China

+[86] (21) 2323 2336


Miles Huang

Partner, Shanghai, PwC China

+[86] (21) 2323 2605



Lisa Li

Mainland China Digital Trust & Risk - Cybersecurity and Privacy Leader, PwC China

+[86] (10) 6533 2312


Ryan Yao

Partner, Beijing, PwC China

+[86] (10) 6533 7576


Follow us