- 1. Executive Summary: Malaysia's Cybersecurity Posture
- 2. Malaysia Cyber Threat Landscape & Statistics
- 3. PDPA 2010: Personal Data Protection Act Compliance
- 4. CyberSecurity Malaysia (CSM) Agency & Services
- 5. NACSA: National Cyber Security Agency
- 6. CNII: Critical National Information Infrastructure
- 7. BNM RMiT: Cybersecurity for Financial Institutions
- 8. Cyber999 & MyCERT Operations
- 9. MyDIGITAL Cybersecurity Pillars
- 10. Ransomware Landscape Targeting Malaysian Enterprises
- 11. Data Breach Notification Under PDPA Amendments
- 12. Penetration Testing for Bursa-Listed Companies
- 13. SOC Services for KL Business District
- 14. Cyberjaya Security Ecosystem
- 15. Compliance Framework Comparison
- 16. Frequently Asked Questions
1. Executive Summary: Malaysia's Cybersecurity Posture
Malaysia has positioned itself as one of Southeast Asia's most cyber-aware nations, ranking 5th globally in the ITU Global Cybersecurity Index (GCI) 2024 with a score of 98.06 out of 100. This ranking reflects decades of sustained investment in national cybersecurity infrastructure, beginning with the establishment of CyberSecurity Malaysia (CSM) in 2007 and reinforced by the National Cyber Security Policy (NCSP) and subsequent Malaysia Cyber Security Strategy (MCSS) 2020-2024. As Malaysia enters 2026, the cybersecurity ecosystem operates within a multi-layered governance structure encompassing NACSA (National Cyber Security Agency) under the Prime Minister's Department, CSM under the Ministry of Digital, and sector-specific regulators including Bank Negara Malaysia (BNM) for financial services and the Malaysian Communications and Multimedia Commission (MCMC) for telecommunications.
The country's cybersecurity landscape is defined by three interlocking pillars: the Personal Data Protection Act 2010 (PDPA) governing data privacy and protection, the Critical National Information Infrastructure (CNII) framework safeguarding essential services across 11 sectors, and the emerging Cyber Security Act 2024 establishing new licensing requirements for cybersecurity service providers. For enterprises operating in Kuala Lumpur's Golden Triangle, Cyberjaya's tech corridor, and across Malaysia's rapidly digitalizing economy, understanding and navigating this regulatory environment is not merely a compliance obligation but a competitive imperative.
This comprehensive guide provides in-depth analysis of every major component of Malaysia's cybersecurity framework, from PDPA compliance checklists and BNM RMiT requirements for financial institutions to practical guidance on engaging SOC services, conducting penetration testing for Bursa Malaysia-listed companies, and responding to the escalating ransomware threat targeting Malaysian enterprises. Whether you are a CISO at a KL-based conglomerate, a compliance officer at a fintech startup in Cyberjaya, or an international enterprise establishing operations in Malaysia, this resource delivers the actionable intelligence needed to build a resilient cybersecurity posture aligned with Malaysian regulatory expectations.
2. Malaysia Cyber Threat Landscape & Statistics
2.1 Cybercrime Trends and Incident Volume
Malaysia's cybercrime landscape has evolved significantly since the COVID-19 pandemic accelerated digital adoption across the economy. MyCERT (Malaysia Computer Emergency Response Team) recorded a consistent increase in reported incidents, with the annual trend reflecting both greater detection capability and a genuinely expanding threat surface. In 2024, MyCERT processed over 12,800 incident reports spanning fraud, intrusion attempts, malicious codes, cyber harassment, and vulnerability reports. The financial impact of cybercrime on Malaysian individuals and organizations has been estimated to exceed RM2.5 billion annually, with business email compromise (BEC) and ransomware representing the highest-value attack categories.
The Royal Malaysia Police (PDRM) Commercial Crime Investigation Department (CCID) reported online scam losses exceeding RM1.6 billion in 2024 alone, with Macau scams, love scams, and investment fraud schemes accounting for the largest proportion of victim losses. This figure underscores the intersection between cybersecurity and financial crime that drives much of Malaysia's regulatory approach to digital security.
2.2 Incident Categories Breakdown
| Incident Category | 2022 Reports | 2023 Reports | 2024 Reports | Trend |
|---|---|---|---|---|
| Fraud / Online Scams | 4,741 | 5,917 | 6,320 | +34% (2Y) |
| Intrusion / Unauthorized Access | 2,012 | 2,245 | 2,580 | +28% (2Y) |
| Malicious Code / Malware | 1,698 | 1,483 | 1,410 | -17% (2Y) |
| Cyber Harassment | 962 | 1,105 | 1,238 | +29% (2Y) |
| Content-Related | 487 | 510 | 542 | +11% (2Y) |
| Vulnerability Reports | 398 | 445 | 512 | +29% (2Y) |
| Denial of Service | 112 | 138 | 198 | +77% (2Y) |
2.3 Threat Actors Targeting Malaysia
Malaysia faces a diverse threat landscape driven by nation-state APT groups, cybercriminal syndicates, hacktivists, and insider threats. Notable APT groups with documented activity targeting Malaysian entities include APT40 (attributed to China, targeting maritime and defense sectors), OceanLotus / APT32 (targeting ASEAN government and diplomatic entities), and Lazarus Group (North Korean actors targeting financial institutions and cryptocurrency exchanges operating in Malaysia). The proliferation of ransomware-as-a-service (RaaS) platforms has democratized extortion capabilities, enabling less sophisticated actors to deploy enterprise-grade ransomware against Malaysian SMEs that historically underinvested in cybersecurity controls.
The rise of AI-powered social engineering attacks has introduced new challenges for Malaysian organizations. Deepfake voice and video scams targeting corporate executives have been reported across the KL business district, with attackers exploiting publicly available media of Malaysian business leaders to construct convincing impersonation attacks. BNM issued specific advisories in 2024 urging financial institutions to implement out-of-band verification for high-value transactions initiated via voice or video calls.
1. Ransomware targeting healthcare and manufacturing: Malaysian hospitals and factory operators reported a 45% increase in ransomware attempts in 2025.
2. Supply chain compromises: Attacks through Malaysian IT managed service providers affecting downstream clients across ASEAN.
3. Cloud misconfiguration: Rapid migration to public cloud without adequate security governance resulting in data exposure.
4. AI-enabled phishing: Bahasa Malaysia and multilingual phishing campaigns generated by LLMs with significantly improved social engineering quality.
5. IoT/OT attacks on manufacturing: Targeting Malaysia's E&E (electrical and electronics) manufacturing sector through vulnerable operational technology networks.
3. PDPA 2010: Personal Data Protection Act Compliance
3.1 Overview and Scope
The Personal Data Protection Act 2010 (Act 709) is Malaysia's principal legislation governing the processing of personal data in commercial transactions. Enacted on November 15, 2013, the PDPA is enforced by the Department of Personal Data Protection (Jabatan Perlindungan Data Peribadi, or JPDP) under the Ministry of Communications and Digital. The PDPA applies to any person or organization that processes personal data, or has control over or authorizes the processing of personal data, in respect of commercial transactions within Malaysia. This includes both domestic and foreign organizations that process personal data of individuals in Malaysia for commercial purposes.
The PDPA establishes seven foundational principles that all data users (the Malaysian term for data controllers) must adhere to. Compliance with these principles is not discretionary; violations can result in substantial penalties including fines of up to RM500,000, imprisonment for up to three years, or both. The seven principles form the backbone of any PDPA compliance program and serve as the basis for enforcement actions by the JPDP Commissioner.
3.2 The Seven Principles of PDPA
| Principle | PDPA Section | Core Requirement | Implementation Guide |
|---|---|---|---|
| General Principle | Section 6 | Personal data must not be processed unless the data subject consents | Implement consent collection mechanisms; maintain consent records; document lawful processing basis |
| Notice and Choice | Section 7 | Data subjects must be informed of purpose, data categories, and their rights | Publish privacy notices in Bahasa Malaysia and English; provide opt-out mechanisms; update notices when purposes change |
| Disclosure Principle | Section 8 | Personal data shall not be disclosed without consent for purposes other than stated | Maintain data sharing agreements; track third-party disclosures; implement data classification |
| Security Principle | Section 9 | Practical steps to protect personal data from loss, misuse, unauthorized access | Deploy encryption, access controls, DLP; conduct regular security assessments; implement incident response plans |
| Retention Principle | Section 10 | Personal data shall not be kept longer than necessary for stated purpose | Define retention schedules; implement automated data deletion; maintain retention policy documentation |
| Data Integrity | Section 11 | Data must be accurate, complete, not misleading, and kept up to date | Implement data quality controls; enable self-service data correction; schedule periodic data reviews |
| Access Principle | Section 12 | Data subjects have the right to access and correct their personal data | Build data subject access request (DSAR) workflows; respond within 21 days; maintain DSAR logs |
3.3 PDPA Registration Requirements
Under the Personal Data Protection Regulations 2013, organizations falling within specified classes of data users are required to register with the JPDP. The registration requirement applies to eleven categories of data users, including communications, banking and financial institutions, insurance, health, tourism and hospitality, transport, education, direct selling, services, real estate, and utilities. Failure to register constitutes an offense punishable by a fine of up to RM500,000 or imprisonment for up to three years.
The registration process requires organizations to submit detailed information about their data processing activities, including the types of personal data processed, the purposes of processing, security measures implemented, and details of any cross-border data transfers. Organizations must appoint a registered compliance officer and renew their registration annually. As of 2025, the JPDP has processed over 14,000 data user registrations, though compliance rates in certain sectors, particularly SMEs, remain below expectations.
3.4 Cross-Border Data Transfer Restrictions
Section 129 of the PDPA restricts the transfer of personal data to jurisdictions outside Malaysia unless the destination country has been designated by the Minister as providing adequate data protection standards. As of early 2026, the Minister has not published a formal adequacy determination whitelist, creating practical challenges for multinational organizations operating in Malaysia. In practice, cross-border transfers are permitted where the data subject has given consent, the transfer is necessary for the performance of a contract, the transfer is required for legal proceedings, or the data user has taken reasonable precautions and exercised due diligence to ensure the receiving party will protect the data at a standard comparable to the PDPA. Organizations commonly rely on Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs), or explicit data subject consent to lawfully transfer personal data out of Malaysia.
1. Register as a data user with JPDP if in a designated sector
2. Appoint a Data Protection Officer or compliance officer
3. Publish bilingual privacy notices (BM/EN) on all data collection points
4. Implement consent management system with audit trail
5. Encrypt personal data at rest and in transit (AES-256 / TLS 1.3)
6. Establish data retention schedules aligned with PDPA Section 10
7. Deploy DSAR workflow capable of responding within 21 days
8. Conduct annual security assessments on personal data systems
9. Implement cross-border data transfer safeguards (SCCs/BCRs)
10. Prepare and test data breach response plan (aligned with 2024 amendments)
11. Train all employees handling personal data annually
12. Maintain processing records and consent documentation for audit
4. CyberSecurity Malaysia (CSM) Agency & Services
4.1 Agency Overview and Mandate
CyberSecurity Malaysia (CSM) is the national cybersecurity specialist agency operating under the Ministry of Digital. Established in 2007 as a company limited by guarantee, CSM serves as the national technical coordination center for cybersecurity incident response, digital forensics, security assurance, and cybersecurity capacity building. The agency's mandate encompasses protecting Malaysia's cyberspace, building national cybersecurity capabilities, and fostering a secure digital ecosystem that supports the country's economic growth objectives.
CSM operates from its headquarters in Cyberjaya, the national technology hub located approximately 40 kilometers south of Kuala Lumpur. The agency maintains operational capacity across seven core service divisions, each addressing a specific domain of the national cybersecurity mission. CSM employs over 400 cybersecurity professionals and collaborates extensively with international partners including FIRST (Forum of Incident Response and Security Teams), APCERT (Asia Pacific Computer Emergency Response Team), and OIC-CERT (Organisation of Islamic Cooperation Computer Emergency Response Team).
4.2 Core Services Portfolio
| Service Division | Key Functions | Target Audience |
|---|---|---|
| Cyber999 | 24/7 national cyber incident help center; incident triage, coordination, and advisory | All Malaysian organizations and individuals |
| MyCERT | Computer emergency response; threat intelligence; malware analysis; vulnerability coordination | Critical infrastructure, government, private sector |
| Digital Forensics (CyberCSI) | Digital evidence collection and analysis; expert witness testimony; forensic readiness consulting | Law enforcement, corporate investigations |
| Security Assurance | ISMS auditing; Common Criteria evaluation; security product certification | Government agencies, CNII operators, vendors |
| Cybersecurity Responsive Services | Vulnerability assessment; penetration testing; security posture assessment | Government agencies, CNII operators |
| CyberSAFE | Public awareness; school programs; community cybersecurity education | General public, educational institutions |
| Industry & Capacity Building | Professional certification; workforce development; industry collaboration | Cybersecurity professionals, academia |
4.3 CSM Certification and Standards Programs
CyberSecurity Malaysia operates several certification programs critical for organizations seeking to demonstrate cybersecurity competence in the Malaysian market. The CSM Information Security Management System (ISMS) auditing service provides third-party assessment against ISO/IEC 27001 standards, widely recognized as the baseline certification for organizations handling sensitive data in Malaysia. CSM also manages the Common Criteria Evaluation Facility (MyCC), one of the few such facilities in ASEAN, enabling Malaysian and regional security product vendors to obtain Common Criteria certification recognized under the Common Criteria Recognition Arrangement (CCRA) by 31 member nations.
For cybersecurity professionals, CSM offers the CyberSecurity Malaysia Certified Professional (CSMP) program and partners with international certification bodies to deliver CISSP, CISM, CEH, and OSCP training through the CSM Academy. The agency also administers the MySEAL (Malaysia Security Evaluation and Labelling) scheme for IoT device security certification, an increasingly important requirement as Malaysia's IoT device deployments surge under the MyDIGITAL initiative.
5. NACSA: National Cyber Security Agency
5.1 Strategic Role and Authority
The National Cyber Security Agency (NACSA) was established in February 2017 under the National Security Council (MKN), which operates within the Prime Minister's Department. NACSA serves as Malaysia's national cyber security governance and policy body, responsible for coordinating the national cyber security strategy, overseeing the protection of Critical National Information Infrastructure (CNII), and advising the government on cyber security policy matters. Unlike CyberSecurity Malaysia, which focuses on technical operations and services, NACSA operates at the strategic and governance level, setting policy direction that shapes Malaysia's cyber defense posture.
NACSA's establishment represented a significant maturation of Malaysia's cybersecurity governance, consolidating strategic cyber defense coordination that was previously distributed across multiple agencies. The agency operates the National Cyber Coordination and Command Centre (NC4), which provides real-time monitoring of the national cyber threat landscape and coordinates inter-agency response to significant cyber incidents affecting national security. NC4 maintains connectivity with international partner agencies and intelligence-sharing platforms, enabling Malaysia to participate in collective defense arrangements with Five Eyes-adjacent partners and ASEAN member states.
5.2 Malaysia Cyber Security Strategy (MCSS) 2020-2024
NACSA developed and oversaw the implementation of the Malaysia Cyber Security Strategy (MCSS) 2020-2024, built around five strategic pillars:
- Effective Governance and Management: Strengthening the national cybersecurity governance framework, clarifying roles and responsibilities across agencies, and establishing the Cyber Security Act as enabling legislation.
- Strengthening Legislative Framework and Enforcement: Updating cybersecurity legislation including the Computer Crimes Act 1997, Communications and Multimedia Act 1998, and introducing the Cyber Security Act 2024.
- Catalyzing World-Class Innovation, Technology, and R&D: Fostering cybersecurity innovation through Cyberjaya's tech ecosystem, supporting homegrown cybersecurity product development, and establishing cybersecurity centers of excellence.
- Enhancing Capacity and Capability Building: Addressing the estimated 12,000-person cybersecurity workforce gap through professional development programs, academic partnerships, and international talent attraction.
- Strengthening Global Collaboration: Deepening bilateral and multilateral cybersecurity cooperation, participating in international cyber exercises, and contributing to global norms development.
5.3 Cyber Security Act 2024
The Cyber Security Act 2024 (Act 854) represents the most significant legislative development in Malaysian cybersecurity since the PDPA. Passed by Parliament in April 2024, the Act establishes a comprehensive framework for the management of national cybersecurity, with particular emphasis on CNII protection. Key provisions include mandatory cybersecurity standards for CNII entities, licensing requirements for cybersecurity service providers operating in Malaysia, incident reporting obligations with prescribed timeframes, and enforcement powers for NACSA including the ability to conduct cybersecurity audits and issue compliance directions. The Act introduces penalties of up to RM500,000 for non-compliance and establishes the Chief Executive of NACSA as the principal regulator for national cybersecurity matters.
6. CNII: Critical National Information Infrastructure
6.1 Sector Classification
Malaysia's Critical National Information Infrastructure (CNII) framework identifies and protects the information systems and infrastructure assets whose disruption would have severe consequences for national security, economic stability, or public welfare. The CNII framework encompasses 11 critical sectors, each overseen by a designated Lead Ministry and supported by sector-specific regulators responsible for ensuring cybersecurity compliance within their domain.
| CNII Sector | Lead Ministry/Agency | Key Entities | Risk Level |
|---|---|---|---|
| National Defense & Security | MINDEF / MKN | ATM, PDRM, intelligence agencies | CRITICAL |
| Banking & Finance | Bank Negara Malaysia | Commercial banks, Bursa Malaysia, payment systems | CRITICAL |
| Information & Communications | MCMC | Telcos (TM, Maxis, CelcomDigi), ISPs, data centers | CRITICAL |
| Energy | Ministry of Energy | TNB, Petronas, gas pipeline operators | CRITICAL |
| Transportation | MOT | MAHB (airports), MRT/LRT, Port Klang | HIGH |
| Water | KASA | Water treatment plants, SPAN, distribution systems | HIGH |
| Health Services | MOH | Public hospitals, MySejahtera platform, NPRA | HIGH |
| Government | MAMPU / PMO | MyGovernment portal, e-services, citizen databases | CRITICAL |
| Emergency Services | NADMA / MKN | MERS 999, fire and rescue, disaster management | HIGH |
| Food & Agriculture | MOA | FAMA, food supply chain systems, veterinary databases | MEDIUM |
| Science, Technology & Innovation | MOSTI | Research institutions, MIMOS, innovation labs | MEDIUM |
6.2 CNII Compliance Requirements
Organizations designated as CNII operators face enhanced cybersecurity obligations under both NACSA directives and the Cyber Security Act 2024. These requirements include mandatory baseline security controls aligned with international frameworks (ISO 27001, NIST CSF), annual cybersecurity risk assessments conducted by NACSA-approved assessors, mandatory incident reporting to NACSA within six hours of detection for critical incidents, participation in national cyber exercises (Cyber Drill) organized by NACSA, implementation of security operations center (SOC) capabilities either in-house or through approved managed security service providers (MSSPs), and regular penetration testing at minimum annually or after significant infrastructure changes.
CNII operators are also required to designate a Chief Information Security Officer (CISO) or equivalent role with direct reporting lines to senior management, ensuring cybersecurity governance receives appropriate board-level attention. NACSA conducts periodic compliance assessments and maintains the authority to issue enforcement directions to CNII operators that fail to meet prescribed security standards. Under the Cyber Security Act, non-compliant CNII operators face penalties of up to RM500,000 and potential designation as non-compliant entities, which can affect their ability to participate in government contracts and regulated activities.
7. BNM RMiT: Cybersecurity for Financial Institutions
7.1 Framework Overview
Bank Negara Malaysia's Risk Management in Technology (RMiT) policy document, issued in June 2020, establishes comprehensive technology risk management expectations for all financial institutions regulated by BNM. RMiT applies to licensed banks, licensed investment banks, licensed Islamic banks, licensed insurers, licensed takaful operators, prescribed development financial institutions, approved issuers of designated payment instruments, and approved insurance brokers. The framework represents one of the most detailed financial sector cybersecurity regulations in ASEAN, reflecting BNM's recognition that technology risk is a first-order threat to financial stability.
RMiT is structured around several key domains that collectively address the full lifecycle of technology risk management in financial institutions. The framework explicitly requires financial institutions to adopt a risk-based approach to cybersecurity, proportional to the nature, scale, and complexity of their operations and the sensitivity of data they process. BNM conducts regular assessments of financial institutions' RMiT compliance through its supervisory examination process, and non-compliance can result in enforcement actions ranging from supervisory directions to financial penalties.
7.2 RMiT Key Domains and Requirements
| RMiT Domain | Key Requirements | Compliance Priority |
|---|---|---|
| Technology Risk Governance | Board-approved technology risk framework; CISO appointment; risk appetite statement; quarterly board reporting | MANDATORY |
| Technology Operations Management | Change management; capacity planning; IT asset management; business continuity (RTO/RPO targets) | MANDATORY |
| Cybersecurity Management | Threat intelligence; SOC operations; vulnerability management; penetration testing; red teaming | MANDATORY |
| Technology Audit | Independent technology audit function; annual audit plan; findings tracking; regulatory reporting | MANDATORY |
| Cloud Services | Cloud risk assessment; data residency requirements; exit strategy; ongoing monitoring of CSP | HIGH |
| Data Management | Data classification; data loss prevention; encryption standards; data lifecycle management | HIGH |
| Access Management | Privileged access management; multi-factor authentication; access certification; segregation of duties | MANDATORY |
| Incident Response | Incident response plan; BNM notification within 1 hour for significant incidents; root cause analysis; lessons learned | MANDATORY |
7.3 BNM Incident Reporting Obligations
RMiT imposes strict incident reporting timelines on financial institutions. Significant technology-related incidents, including cybersecurity breaches, system failures affecting customer services, and data breaches involving customer information, must be reported to BNM within one hour of confirmation. This is among the most stringent reporting requirements in the ASEAN region, reflecting BNM's focus on maintaining financial system stability and consumer confidence. The initial report must include the nature of the incident, estimated impact on customers and operations, containment measures taken, and expected recovery timeline. A detailed post-incident report must follow within 14 days, including root cause analysis, full impact assessment, and remediation plans with implementation timelines.
Financial institutions adopting cloud services must conduct a comprehensive risk assessment prior to migration, including evaluation of the CSP's security certifications (SOC 2, ISO 27001, CSA STAR), data residency requirements (BNM prefers data to remain in Malaysia or Singapore), contractual provisions for audit rights and incident notification, and an exit strategy ensuring data portability. BNM must be notified of material outsourcing arrangements to cloud service providers, and institutions must maintain the ability to demonstrate compliance with RMiT requirements regardless of the deployment model (IaaS, PaaS, SaaS). Contact Seraphim for BNM RMiT gap analysis.
8. Cyber999 & MyCERT Operations
8.1 Cyber999 Help Centre
Cyber999 is Malaysia's national cyber security incident response help center, operated by CyberSecurity Malaysia under the MyCERT division. The service provides 24/7 incident reporting, triage, and advisory services to Malaysian organizations and individuals experiencing cybersecurity incidents. Cyber999 serves as the first point of contact for cyber incident reporting in Malaysia and acts as the coordination hub connecting affected organizations with relevant response capabilities, law enforcement agencies, and sector-specific regulators.
The Cyber999 reporting channels include telephone (1-300-88-2999), email ([email protected]), the online reporting form at mycert.org.my, the Cyber999 mobile application (available on iOS and Android), and walk-in reporting at CSM headquarters in Cyberjaya. All reports are assessed against a severity classification framework that determines the response priority and resources allocated to each incident. Critical incidents affecting CNII sectors or involving large-scale data breaches are escalated to NACSA for national-level coordination.
8.2 MyCERT Operational Capabilities
MyCERT (Malaysia Computer Emergency Response Team) is the operational cybersecurity arm of CyberSecurity Malaysia, functioning as the national CERT with responsibilities spanning incident response, threat intelligence, vulnerability coordination, and security advisory publication. MyCERT maintains membership in FIRST and APCERT, enabling real-time threat intelligence sharing with 600+ CERTs worldwide. Key operational capabilities include:
- Incident Coordination: Triaging reported incidents, coordinating response across affected organizations, and liaising with international CERTs for cross-border incidents.
- Malware Analysis: Operating a malware analysis laboratory capable of dynamic and static analysis of malicious samples, providing IOCs (Indicators of Compromise) to Malaysian organizations and international partners.
- Vulnerability Coordination: Managing the responsible disclosure process for vulnerabilities discovered in Malaysian systems and products, working with vendors to ensure timely patching.
- Security Advisories: Publishing regular security advisories, alerts, and threat intelligence reports covering vulnerabilities affecting widely-used systems in Malaysia (e.g., Microsoft, Cisco, Fortinet, Palo Alto Networks).
- Cyber Threat Intelligence: Monitoring global threat feeds, dark web forums, and malware repositories for threats specifically targeting Malaysian entities, sectors, or infrastructure.
- Sensor Network: Operating the Malaysian Honeynet Project, a distributed network of honeypots providing visibility into attack patterns, scanning activity, and exploitation attempts targeting Malaysian IP address space.
9. MyDIGITAL Cybersecurity Pillars
9.1 MyDIGITAL Blueprint Overview
The Malaysia Digital Economy Blueprint (MyDIGITAL), launched by Prime Minister Muhyiddin Yassin in February 2021, outlines Malaysia's aspiration to become a regional leader in the digital economy by 2030. The blueprint targets the digital economy contributing 22.6% of GDP by 2025 (up from 19.1% in 2018), creating 500,000 new digital jobs, and achieving 100% broadband coverage. Cybersecurity is embedded as a foundational enabler across all six strategic thrusts of MyDIGITAL, recognizing that digital economic growth cannot be sustained without a secure and trusted digital environment.
9.2 Cybersecurity Objectives Within MyDIGITAL
MyDIGITAL establishes several cybersecurity-specific targets and initiatives that shape the national cybersecurity investment agenda through 2030:
- National Cybersecurity Workforce: Training and certifying 20,000 cybersecurity professionals by 2030 to address the estimated workforce deficit of 12,000-15,000 specialists. Programs include NACSA scholarships, CSM Academy certifications, and university curriculum alignment with NICE Framework competency areas.
- SME Cybersecurity Adoption: Achieving 80% cybersecurity baseline compliance among Malaysian SMEs through subsidized security assessments (the CyberSAFE program), MDEC digital grants for security tool adoption, and industry-specific cybersecurity toolkits.
- Secure Digital Government: Implementing Zero Trust Architecture across all government digital services by 2027, migrating sensitive government systems to Malaysia's Government Cloud (MyGovCloud) operated under enhanced security controls, and deploying government-wide SOC monitoring through NACSA's NC4.
- Digital Identity Infrastructure: Deploying secure digital identity verification across government and commercial services, building on the MyDigital ID platform to enable secure authentication for e-government, financial services, and healthcare applications.
- Cybersecurity Innovation Ecosystem: Establishing Malaysia as an ASEAN cybersecurity product development hub, with Cyberjaya as the anchor ecosystem. MDEC provides incentives for cybersecurity startups including MSC Malaysia status, tax exemptions, and access to government procurement opportunities.
10. Ransomware Landscape Targeting Malaysian Enterprises
10.1 Current Ransomware Threat Assessment
Ransomware attacks targeting Malaysian organizations have escalated dramatically since 2022, with the country experiencing an estimated 57% increase in ransomware incidents year-over-year in 2024. Malaysian enterprises, particularly in healthcare, manufacturing (especially the E&E sector), and financial services, have emerged as high-value targets for both established ransomware syndicates and emerging RaaS (Ransomware-as-a-Service) operators. The average ransom demand for Malaysian enterprises reached RM3.2 million (approximately USD 685,000) in 2025, while the total cost of ransomware incidents including downtime, recovery, regulatory penalties, and reputational damage averaged RM12.8 million per impacted organization.
The Malaysian ransomware threat landscape is dominated by several prolific threat actor groups. LockBit 3.0, despite law enforcement disruption operations, continued to list Malaysian victims on its data leak site through affiliate operations. BlackCat/ALPHV successors, Akira, and Play ransomware groups have all been documented targeting Malaysian organizations. The emergence of double and triple extortion tactics, where attackers combine file encryption with data exfiltration threats and DDoS attacks, has significantly increased the pressure on Malaysian organizations to pay ransoms, despite guidance from NACSA and CyberSecurity Malaysia advising against payment.
10.2 Common Attack Vectors in Malaysia
- Phishing and Spear-Phishing (42% of incidents): Bahasa Malaysia-language phishing emails impersonating LHDN (Malaysian tax authority), BNM, Pos Malaysia, and major Malaysian banks remain the most common initial access vector. AI-generated content has improved the linguistic quality of these campaigns.
- VPN and Remote Access Exploitation (28%): Exploitation of unpatched VPN appliances (Fortinet FortiGate, Pulse Secure, Citrix ADC) remains widespread among Malaysian organizations that accelerated VPN deployment during COVID-19 without adequate patch management.
- Remote Desktop Protocol (RDP) Brute Force (15%): Exposed RDP services, particularly among Malaysian SMEs without network segmentation, continue to provide low-barrier entry points for ransomware operators.
- Supply Chain Compromise (10%): Attacks through Malaysian IT managed service providers (MSPs) and software vendors have increased, with threat actors compromising MSP remote management tools to deploy ransomware simultaneously across multiple client organizations.
- Insider Threat / Initial Access Brokers (5%): The dark web marketplace for Malaysian corporate network access credentials (Initial Access Brokers) has grown, with access to Malaysian enterprise networks advertised for between USD 500-10,000 depending on organization size and sector.
10.3 Ransomware Preparedness Framework
Prevention: Patch critical vulnerabilities within 48 hours of advisory (especially VPN/firewall appliances); deploy EDR on all endpoints; implement email security gateway with sandboxing; enforce MFA on all remote access and privileged accounts; conduct monthly phishing simulations for all staff.
Detection: Deploy 24/7 SOC monitoring (in-house or MSSP); implement network traffic analysis (NTA) for lateral movement detection; monitor for anomalous data exfiltration patterns; maintain updated threat intelligence feeds with Malaysian-specific IOCs.
Response: Maintain offline, immutable backups tested quarterly; develop and rehearse ransomware-specific incident response playbook; establish pre-arranged retainer with digital forensics firm; document regulatory notification obligations (BNM: 1 hour; NACSA: 6 hours; JPDP: as prescribed).
Recovery: Maintain documented system rebuild procedures; test backup restoration quarterly; establish communication templates for customers, regulators, and media; engage cyber insurance provider early in incident.
11. Data Breach Notification Under PDPA Amendments
11.1 Mandatory Breach Notification Framework
The 2024 amendments to the Personal Data Protection Act 2010 introduced mandatory data breach notification requirements, aligning Malaysia with global best practices already established in the EU (GDPR), Singapore (PDPA 2020 amendments), Thailand (PDPA), and Australia (NDB scheme). Under the amended provisions, data users (controllers) are required to notify the Personal Data Protection Commissioner and affected data subjects when a data breach is likely to result in significant harm to the data subjects. The notification must be made within a prescribed timeframe following the data user becoming aware of the breach, with the specific timeline to be detailed in implementing regulations.
The breach notification framework represents a paradigm shift for Malaysian organizations accustomed to a regulatory environment where data breach disclosure was not legally mandated. Organizations must now invest in breach detection capabilities, establish internal assessment procedures to determine notification obligations, and prepare notification templates and processes capable of meeting prescribed timelines. The amendments also expand the extraterritorial scope of the PDPA, potentially capturing foreign data processors handling Malaysian personal data.
11.2 Breach Notification Decision Framework
| Assessment Criteria | Notification Required | Notification May Not Be Required |
|---|---|---|
| Type of data | Sensitive personal data (health, financial, biometric, political/religious beliefs) | Non-sensitive data that is publicly available |
| Volume of records | Large-scale breach (>500 data subjects) | Minor breach (<10 data subjects) with low harm potential |
| Encryption status | Data was unencrypted or encryption key also compromised | Data was encrypted with strong algorithm and key is secure |
| Containment status | Data exfiltrated or accessed by unauthorized party | Breach contained before unauthorized access occurred |
| Potential harm | Risk of financial loss, identity theft, discrimination, or physical safety | No material risk of harm to data subjects |
| Remediation | Unable to fully remediate risk to data subjects | Complete remediation achieved (e.g., unauthorized recipient confirmed deletion) |
11.3 Notification Content Requirements
When a breach notification is required, the data user must provide the Commissioner and affected data subjects with comprehensive information including: a description of the nature of the breach including the categories and approximate number of data subjects affected; the categories and approximate number of personal data records affected; the name and contact details of the data protection officer or point of contact; a description of the likely consequences of the breach; a description of the measures taken or proposed to address the breach and mitigate potential adverse effects; and recommendations for data subjects to protect themselves from potential harm resulting from the breach. Notifications to data subjects must be in clear, plain language accessible to the average consumer, and should be provided in both Bahasa Malaysia and English where the affected population includes speakers of both languages.
12. Penetration Testing for Bursa-Listed Companies
12.1 Regulatory Expectations
Companies listed on Bursa Malaysia face growing cybersecurity expectations from multiple regulatory bodies. While Bursa Malaysia's listing requirements do not currently mandate specific penetration testing frequencies, the Securities Commission Malaysia (SC) has issued guidance encouraging listed entities to adopt robust cybersecurity practices including regular security assessments. For financial services companies listed on Bursa, BNM's RMiT requirements mandate annual penetration testing at minimum, with additional testing required after significant infrastructure changes. CNII-designated listed companies must comply with NACSA's enhanced security assessment requirements, which include annual penetration testing by qualified assessors.
The Malaysian Code on Corporate Governance (MCCG) 2021 promotes best practices in board governance that increasingly encompass cybersecurity oversight. Practice 11.2 states that the board should ensure the company has a robust risk management framework covering cyber risks. Institutional investors and proxy advisory firms in Malaysia are increasingly scrutinizing cybersecurity governance disclosures in annual reports, creating market-driven pressure for Bursa-listed companies to demonstrate proactive security testing practices beyond minimum regulatory requirements.
12.2 Penetration Testing Standards and Scope
| Test Type | Scope | Standard/Methodology | Typical Frequency | Estimated Cost (RM) |
|---|---|---|---|---|
| External Network Pentest | Internet-facing infrastructure, firewalls, VPN gateways, web servers | OWASP, PTES, OSSTMM | Annually | 30,000 - 80,000 |
| Web Application Pentest | Customer portals, APIs, e-commerce platforms, mobile backends | OWASP ASVS, OWASP Testing Guide | Annually + after major releases | 25,000 - 120,000 |
| Internal Network Pentest | Active Directory, lateral movement, privilege escalation, segmentation | PTES, MITRE ATT&CK | Annually | 40,000 - 150,000 |
| Red Team Exercise | Full-scope adversary simulation including physical, social, and technical vectors | TIBER-EU adapted, CBEST | Every 2-3 years (financial sector) | 150,000 - 500,000 |
| Cloud Security Assessment | AWS/Azure/GCP configuration review, IAM analysis, data exposure | CIS Benchmarks, CSA CCM | Annually + after architecture changes | 35,000 - 100,000 |
| OT/SCADA Pentest | Industrial control systems, SCADA networks, HMI systems | IEC 62443, NIST SP 800-82 | Annually (E&E, energy sector) | 80,000 - 250,000 |
| Social Engineering | Phishing campaigns, vishing, physical intrusion attempts | SE Framework, custom TTPs | Quarterly (phishing), annually (physical) | 15,000 - 60,000 |
12.3 Selecting a Penetration Testing Provider in Malaysia
When selecting a penetration testing firm for Bursa-listed company engagements, organizations should evaluate providers against several key criteria. CREST accreditation is considered the gold standard for penetration testing firms in Malaysia and is increasingly expected by regulators and audit committees. Teams should hold individual certifications including OSCP, OSCE, CREST CRT/CCT, or GPEN. The provider should demonstrate familiarity with the Malaysian regulatory environment including BNM RMiT, PDPA, and NACSA requirements, and should be capable of delivering findings reports aligned with both technical remediation teams and board-level governance reporting. Organizations processing payment card data should ensure the provider holds PCI QSA certification for PCI DSS compliance assessments.
13. SOC Services for KL Business District
13.1 Managed SOC Market in Kuala Lumpur
The Kuala Lumpur metropolitan area, home to more than 70% of Malaysia's Fortune 500 and MNC regional headquarters, represents the largest concentration of managed SOC (Security Operations Center) demand in the country. The KL business district, encompassing the KLCC area, Bangsar South, KL Sentral, and the broader Golden Triangle, houses organizations ranging from global bank regional hubs to fintech startups, each with distinct cybersecurity monitoring requirements. The Malaysian managed security services market has grown to an estimated RM680 million in 2025, with SOC services representing the largest segment at approximately 35% of total spend.
Enterprise demand for managed SOC services in KL is driven by several converging factors: the BNM RMiT requirement for continuous cybersecurity monitoring, the scarcity and cost of qualified SOC analysts (a senior SOC analyst in KL commands RM8,000-15,000 monthly salary), the 24/7 operational requirement that is impractical for most organizations to staff internally, and the increasing sophistication of threats requiring advanced detection capabilities including behavioral analytics, threat hunting, and deception technology. Mid-size enterprises in KL typically find that managed SOC services deliver 40-60% cost savings compared to building and staffing an equivalent in-house capability.
13.2 SOC Service Tiers for Malaysian Enterprises
| Service Tier | Capabilities | Best For | Monthly Cost (RM) |
|---|---|---|---|
| Essential SOC | 24/7 SIEM monitoring; alert triage and escalation; monthly reporting; basic incident response coordination | SMEs with <500 employees; non-CNII, non-financial sector | 8,000 - 18,000 |
| Advanced SOC | All Essential + EDR management; threat hunting (weekly); vulnerability management; SOAR automation; dedicated analyst | Mid-size enterprises; Bursa-listed companies; non-bank financial institutions | 18,000 - 45,000 |
| Enterprise SOC | All Advanced + custom detection rules; red/purple team integration; threat intelligence platform; executive reporting; regulatory liaison | Large enterprises; banks and financial institutions; CNII operators | 45,000 - 120,000 |
| Sovereign SOC | All Enterprise + Malaysia-resident data processing; security-cleared analysts; government liaison capability; classified threat intel | Government agencies; defense contractors; critical infrastructure | 100,000 - 250,000+ |
13.3 SOC Technology Stack for Malaysian Deployments
14. Cyberjaya Security Ecosystem
14.1 Cyberjaya as Malaysia's Cybersecurity Hub
Cyberjaya, Malaysia's flagship technology city located within the Multimedia Super Corridor (MSC), has evolved into the nation's preeminent cybersecurity ecosystem. The city hosts the headquarters of CyberSecurity Malaysia, the operations center of MDEC (Malaysia Digital Economy Corporation), and a growing cluster of cybersecurity companies spanning MSSPs, security product vendors, digital forensics firms, and cybersecurity training academies. Cyberjaya's designation as an MSC Malaysia Cybercentre provides qualifying cybersecurity companies with significant incentives including Pioneer Status (100% tax exemption for 10 years) or Investment Tax Allowance (60% for 5 years), exemption from local equity requirements, and unrestricted employment of foreign knowledge workers.
The cybersecurity cluster in Cyberjaya has grown to over 60 companies as of 2025, employing more than 4,000 cybersecurity professionals. Notable organizations headquartered or maintaining significant operations in Cyberjaya include CyberSecurity Malaysia, LGMS (one of Malaysia's largest homegrown security firms), Securemetric (biometric security), Firmus (managed SOC provider), and regional offices of international firms including Fortinet, Palo Alto Networks, and CrowdStrike. The proximity to CyberSecurity Malaysia's headquarters facilitates close collaboration between the private sector and government on threat intelligence sharing, standards development, and workforce programs.
14.2 Key Cyberjaya Ecosystem Components
- CyberSecurity Malaysia HQ: Cyber999 operations center, MyCERT, digital forensics lab, Common Criteria evaluation facility, and CSM Academy training center.
- Global Technology Research & Innovation Park (GTRIP): Hosts cybersecurity R&D labs for domestic and international companies, with shared testing infrastructure for security product development.
- Cyberview Sdn Bhd: The township developer that actively recruits cybersecurity companies through incentive packages, co-working spaces, and industry networking events.
- APNIC (Asia Pacific Network Information Centre) Training Center: Located in Cyberjaya, providing DNS security, RPKI, and network security training for APAC professionals.
- Multimedia University (MMU) Cyberjaya: Offers specialized cybersecurity degree programs with industry placement partnerships, feeding graduates directly into the Cyberjaya ecosystem.
- MIMOS Berhad: Malaysia's applied research institute with cybersecurity research programs in post-quantum cryptography, AI-driven threat detection, and secure IoT architectures.
15. Compliance Framework Comparison
15.1 Malaysia vs ASEAN Cybersecurity Frameworks
Understanding how Malaysia's cybersecurity regulatory framework compares to those of its ASEAN peers is essential for multinational organizations operating across the region. The following comparison highlights the key regulatory instruments, enforcement maturity, and compliance expectations across major ASEAN markets.
| Dimension | Malaysia | Singapore | Thailand | Indonesia | Philippines |
|---|---|---|---|---|---|
| Primary Data Protection Law | PDPA 2010 | PDPA 2012 | PDPA 2019 | PDP Law 2022 | DPA 2012 |
| Data Breach Notification | Mandatory (2024 amendment) | Mandatory (2021 amendment) | Mandatory (within 72 hours) | Mandatory (14 days) | Mandatory (within 72 hours) |
| Cybersecurity Act | Cyber Security Act 2024 | Cybersecurity Act 2018 | Cybersecurity Act 2019 | PP 71/2019 | Pending |
| National CERT | MyCERT / Cyber999 | SingCERT / CSA | ThaiCERT | ID-SIRTII/CC, BSSN | NCERT (DICT) |
| Financial Sector Regulation | BNM RMiT | MAS TRM | BOT IT Risk | OJK POJK/SEOJK | BSP Circulars |
| Max Data Protection Fine | RM500K (~USD 107K) | SGD 1M (~USD 740K) | THB 5M (~USD 140K) | IDR 50B (~USD 3.1M) | PHP 5M (~USD 87K) |
| ITU GCI Ranking (2024) | 5th | 5th (tied) | 39th | 24th | 43rd |
| CNII Framework | 11 sectors defined | 11 CII sectors | 8 CI sectors | 8 vital sectors | 18 CI sectors |
| Cross-Border Transfer | Restricted (no whitelist) | Restricted (exceptions apply) | Adequate protection required | Equivalent protection | Restricted |
15.2 Compliance Cost Estimation for Malaysian Enterprises
| Compliance Program | SME (< 100 employees) | Mid-Market (100-1000) | Enterprise (1000+) | Financial Institution |
|---|---|---|---|---|
| PDPA Compliance Program | RM20K - 50K | RM50K - 150K | RM150K - 400K | RM200K - 600K |
| ISO 27001 Certification | RM40K - 80K | RM80K - 200K | RM200K - 500K | RM300K - 800K |
| BNM RMiT Gap Assessment | N/A | N/A | N/A | RM100K - 500K |
| Annual Penetration Testing | RM15K - 40K | RM40K - 120K | RM120K - 350K | RM150K - 500K |
| Managed SOC (Annual) | RM96K - 216K | RM216K - 540K | RM540K - 1.44M | RM1.2M - 3M |
| Incident Response Retainer | RM30K - 60K | RM60K - 150K | RM150K - 300K | RM200K - 500K |
| Total Annual Investment | RM201K - 446K | RM446K - 1.16M | RM1.16M - 2.99M | RM2.15M - 5.9M |
Malaysian enterprises should benchmark their cybersecurity investment against industry averages. According to IDC's ASEAN Security Spending Guide 2025, Malaysian organizations allocate an average of 4.2% of their IT budget to cybersecurity, compared to Singapore (5.8%), Australia (6.1%), and the global average (5.4%). Financial institutions in Malaysia typically invest 6-8% of IT spend on security, aligned with BNM's expectations. Organizations below the 4% threshold should consider accelerating investment, particularly given the rising ransomware threat and new compliance obligations under the Cyber Security Act 2024 and PDPA amendments. Speak with Seraphim about cybersecurity investment planning for Malaysia.
16. Frequently Asked Questions
The Personal Data Protection Act 2010 (PDPA) is Malaysia's primary data protection legislation, enforced by the Department of Personal Data Protection (JPDP). It applies to any person or organization that processes personal data in commercial transactions within Malaysia. This includes companies registered in Malaysia, foreign companies processing data of Malaysian citizens for commercial purposes, and any entity handling personal data in the course of business. The PDPA establishes seven key principles: General, Notice and Choice, Disclosure, Security, Retention, Data Integrity, and Access. Non-compliance can result in fines up to RM500,000 (approximately USD 107,000) or imprisonment of up to three years, or both.
CyberSecurity Malaysia (CSM) is the national cybersecurity specialist agency under the Ministry of Digital. Established in 2007, CSM operates Cyber999 (the national cyber incident help center), MyCERT (Malaysia Computer Emergency Response Team), CyberSAFE (community awareness programs), and provides digital forensics, security assurance, and vulnerability assessment services. CSM also manages the Common Criteria Evaluation Facility and Information Security Management System (ISMS) auditing for Malaysian organizations. The agency is headquartered in Cyberjaya and employs over 400 cybersecurity professionals.
BNM RMiT (Risk Management in Technology) is a policy document issued by Bank Negara Malaysia that establishes technology risk management standards for all BNM-regulated financial institutions. It covers technology risk governance, operations management, cybersecurity management, technology audit, and internal awareness. Financial institutions must implement robust cybersecurity controls, conduct regular penetration testing, maintain incident response capabilities, and report significant cyber incidents to BNM within one hour of confirmation. Non-compliance can result in enforcement actions including fines and restrictions on business operations.
Cybersecurity incidents in Malaysia should be reported to Cyber999, the national cyber incident help center operated by CyberSecurity Malaysia. Reports can be submitted via email to [email protected], by phone at 1-300-88-2999, via the Cyber999 mobile app, or through the online reporting form at www.mycert.org.my. For CNII sectors, incidents must also be reported to NACSA. Financial institutions must additionally report to Bank Negara Malaysia under RMiT requirements (within 1 hour for significant incidents). Organizations experiencing personal data breaches must notify JPDP under the amended PDPA.
CNII (Critical National Information Infrastructure) refers to the interconnected information infrastructure essential to Malaysia's national security, economic stability, and public welfare. The framework covers 11 critical sectors: national defense and security, banking and finance, information and communications, energy, transportation, water, health services, government, emergency services, food and agriculture, and science, technology and innovation. CNII operators must comply with enhanced cybersecurity requirements under NACSA directives and the Cyber Security Act 2024, including mandatory security assessments, incident reporting within 6 hours, and baseline security controls.
Under the PDPA 2010 and its amendments, organizations that fail to protect personal data face fines of up to RM500,000 (approximately USD 107,000), imprisonment for up to three years, or both. The 2024 amendments introduced mandatory data breach notification requirements. Additional penalties apply for failure to register as a data user, unauthorized disclosure of personal data, and non-compliance with enforcement notices. Repeat offenses carry enhanced penalties. Directors and officers of non-compliant companies may also face personal liability.
Key certifications recognized in Malaysia include: ISO/IEC 27001 for information security management (widely adopted and often required for government contracts); CREST accreditation for penetration testing firms; (ISC)2 CISSP and CISM for cybersecurity professionals; PCI DSS for payment card processing; SOC 2 for service organizations; and CSM's own professional certification programs. CyberSecurity Malaysia also operates the Common Criteria Evaluation Facility (MyCC) for product security certification. Under the Cyber Security Act 2024, cybersecurity service providers will need to obtain specific licenses from NACSA to operate in Malaysia.
Costs vary by scope and organization size. A basic vulnerability assessment for an SME costs RM15,000-50,000 (USD 3,200-10,700). Comprehensive penetration testing ranges from RM30,000-150,000 (USD 6,400-32,000). ISO 27001 certification audits cost RM50,000-200,000 (USD 10,700-42,800). BNM RMiT compliance assessments for financial institutions typically cost RM100,000-500,000 (USD 21,400-107,000). Annual managed SOC services for mid-size KL enterprises range from RM180,000-600,000 (USD 38,500-128,400) per year. Contact Seraphim for a customized quotation based on your specific requirements.
Yes, cyber insurance is available in Malaysia through both domestic and international insurers. Major providers include AIG Malaysia, Allianz Malaysia, Chubb Insurance Malaysia, and Zurich Insurance Malaysia. Policies typically cover first-party losses (incident response costs, business interruption, data restoration, extortion payments) and third-party liabilities (regulatory fines where insurable, defense costs, settlements). Premiums for Malaysian enterprises range from RM15,000-200,000 annually depending on revenue, sector, coverage limits, and security posture. Insurers increasingly require evidence of basic cybersecurity controls including MFA, endpoint protection, backup procedures, and employee training before issuing policies.
NACSA (National Cyber Security Agency) operates under the Prime Minister's Department (National Security Council) and focuses on strategic cybersecurity governance, policy development, CNII protection, and national-level incident coordination. CyberSecurity Malaysia (CSM) operates under the Ministry of Digital and focuses on technical cybersecurity operations including Cyber999 incident response, MyCERT threat intelligence, digital forensics, security assurance, and industry capacity building. In simplified terms, NACSA sets the cybersecurity strategy and policy, while CSM provides the technical execution and operational services. Both agencies collaborate closely, particularly on CNII protection and national cyber incident response.
The Cyber Security Act 2024 introduces a licensing regime for cybersecurity service providers operating in Malaysia. Providers offering services such as penetration testing, managed security operations (SOC/MSSP), digital forensics, and cybersecurity auditing will need to obtain licenses from NACSA. The licensing requirements include demonstrating technical competence, maintaining qualified personnel, adhering to prescribed standards and methodologies, and submitting to regulatory oversight. Foreign cybersecurity service providers will need to establish a local presence or partner with licensed Malaysian entities. The implementation timeline and detailed licensing criteria are being developed through subsidiary legislation, with full enforcement expected to begin in phases from 2025-2026.
Immediately isolate affected systems from the network to prevent lateral spread. Do not shut down systems as this may destroy volatile forensic evidence. Activate your incident response plan and engage your pre-arranged digital forensics provider. Report the incident to Cyber999 (1-300-88-2999 or [email protected]). If you are a financial institution, notify BNM within 1 hour. If you are a CNII operator, notify NACSA within 6 hours. Assess whether personal data has been compromised and prepare for PDPA breach notification if required. Do not pay the ransom without consulting legal counsel and law enforcement. Begin recovery from offline backups once forensic preservation is complete. Document all actions taken for regulatory reporting and potential insurance claims.
Seraphim Vietnam provides comprehensive cybersecurity consulting services for organizations operating in Malaysia, including PDPA compliance programs, BNM RMiT gap assessments, penetration testing, managed SOC services, and incident response planning. Our team understands the Malaysian regulatory landscape and delivers solutions aligned with NACSA, CSM, and BNM expectations. Schedule a consultation to discuss your cybersecurity requirements.

