INITIALIZING SYSTEMS

0%
CYBERSECURITY MALAYSIA

Cybersecurity in Malaysia
PDPA Compliance, NACSA Standards & Enterprise Protection

The definitive guide to Malaysia's cybersecurity landscape covering PDPA 2010 compliance, CyberSecurity Malaysia (CSM) agency operations, NACSA directives, BNM RMiT for financial institutions, Cyber999 incident response, CNII protection, and SOC services for enterprises operating in Kuala Lumpur and across the Malaysian digital economy.

CYBERSECURITY January 2026 28 min read Technical Depth: Expert

1. Executive Summary: Malaysia's Cybersecurity Posture

Malaysia has positioned itself as one of Southeast Asia's most cyber-aware nations, ranking 5th globally in the ITU Global Cybersecurity Index (GCI) 2024 with a score of 98.06 out of 100. This ranking reflects decades of sustained investment in national cybersecurity infrastructure, beginning with the establishment of CyberSecurity Malaysia (CSM) in 2007 and reinforced by the National Cyber Security Policy (NCSP) and subsequent Malaysia Cyber Security Strategy (MCSS) 2020-2024. As Malaysia enters 2026, the cybersecurity ecosystem operates within a multi-layered governance structure encompassing NACSA (National Cyber Security Agency) under the Prime Minister's Department, CSM under the Ministry of Digital, and sector-specific regulators including Bank Negara Malaysia (BNM) for financial services and the Malaysian Communications and Multimedia Commission (MCMC) for telecommunications.

The country's cybersecurity landscape is defined by three interlocking pillars: the Personal Data Protection Act 2010 (PDPA) governing data privacy and protection, the Critical National Information Infrastructure (CNII) framework safeguarding essential services across 11 sectors, and the emerging Cyber Security Act 2024 establishing new licensing requirements for cybersecurity service providers. For enterprises operating in Kuala Lumpur's Golden Triangle, Cyberjaya's tech corridor, and across Malaysia's rapidly digitalizing economy, understanding and navigating this regulatory environment is not merely a compliance obligation but a competitive imperative.

This comprehensive guide provides in-depth analysis of every major component of Malaysia's cybersecurity framework, from PDPA compliance checklists and BNM RMiT requirements for financial institutions to practical guidance on engaging SOC services, conducting penetration testing for Bursa Malaysia-listed companies, and responding to the escalating ransomware threat targeting Malaysian enterprises. Whether you are a CISO at a KL-based conglomerate, a compliance officer at a fintech startup in Cyberjaya, or an international enterprise establishing operations in Malaysia, this resource delivers the actionable intelligence needed to build a resilient cybersecurity posture aligned with Malaysian regulatory expectations.

5th
Global ITU Cybersecurity Index Ranking (2024)
98.06
GCI Score out of 100
RM1.22B
Estimated Cybersecurity Market Size (2025)
73,000+
Cyber Incidents Reported to MyCERT (2019-2025)

2. Malaysia Cyber Threat Landscape & Statistics

2.1 Cybercrime Trends and Incident Volume

Malaysia's cybercrime landscape has evolved significantly since the COVID-19 pandemic accelerated digital adoption across the economy. MyCERT (Malaysia Computer Emergency Response Team) recorded a consistent increase in reported incidents, with the annual trend reflecting both greater detection capability and a genuinely expanding threat surface. In 2024, MyCERT processed over 12,800 incident reports spanning fraud, intrusion attempts, malicious codes, cyber harassment, and vulnerability reports. The financial impact of cybercrime on Malaysian individuals and organizations has been estimated to exceed RM2.5 billion annually, with business email compromise (BEC) and ransomware representing the highest-value attack categories.

The Royal Malaysia Police (PDRM) Commercial Crime Investigation Department (CCID) reported online scam losses exceeding RM1.6 billion in 2024 alone, with Macau scams, love scams, and investment fraud schemes accounting for the largest proportion of victim losses. This figure underscores the intersection between cybersecurity and financial crime that drives much of Malaysia's regulatory approach to digital security.

2.2 Incident Categories Breakdown

Incident Category2022 Reports2023 Reports2024 ReportsTrend
Fraud / Online Scams4,7415,9176,320+34% (2Y)
Intrusion / Unauthorized Access2,0122,2452,580+28% (2Y)
Malicious Code / Malware1,6981,4831,410-17% (2Y)
Cyber Harassment9621,1051,238+29% (2Y)
Content-Related487510542+11% (2Y)
Vulnerability Reports398445512+29% (2Y)
Denial of Service112138198+77% (2Y)

2.3 Threat Actors Targeting Malaysia

Malaysia faces a diverse threat landscape driven by nation-state APT groups, cybercriminal syndicates, hacktivists, and insider threats. Notable APT groups with documented activity targeting Malaysian entities include APT40 (attributed to China, targeting maritime and defense sectors), OceanLotus / APT32 (targeting ASEAN government and diplomatic entities), and Lazarus Group (North Korean actors targeting financial institutions and cryptocurrency exchanges operating in Malaysia). The proliferation of ransomware-as-a-service (RaaS) platforms has democratized extortion capabilities, enabling less sophisticated actors to deploy enterprise-grade ransomware against Malaysian SMEs that historically underinvested in cybersecurity controls.

The rise of AI-powered social engineering attacks has introduced new challenges for Malaysian organizations. Deepfake voice and video scams targeting corporate executives have been reported across the KL business district, with attackers exploiting publicly available media of Malaysian business leaders to construct convincing impersonation attacks. BNM issued specific advisories in 2024 urging financial institutions to implement out-of-band verification for high-value transactions initiated via voice or video calls.

Malaysia Cybersecurity Alert: Top 5 Threats for 2026

1. Ransomware targeting healthcare and manufacturing: Malaysian hospitals and factory operators reported a 45% increase in ransomware attempts in 2025.
2. Supply chain compromises: Attacks through Malaysian IT managed service providers affecting downstream clients across ASEAN.
3. Cloud misconfiguration: Rapid migration to public cloud without adequate security governance resulting in data exposure.
4. AI-enabled phishing: Bahasa Malaysia and multilingual phishing campaigns generated by LLMs with significantly improved social engineering quality.
5. IoT/OT attacks on manufacturing: Targeting Malaysia's E&E (electrical and electronics) manufacturing sector through vulnerable operational technology networks.

3. PDPA 2010: Personal Data Protection Act Compliance

3.1 Overview and Scope

The Personal Data Protection Act 2010 (Act 709) is Malaysia's principal legislation governing the processing of personal data in commercial transactions. Enacted on November 15, 2013, the PDPA is enforced by the Department of Personal Data Protection (Jabatan Perlindungan Data Peribadi, or JPDP) under the Ministry of Communications and Digital. The PDPA applies to any person or organization that processes personal data, or has control over or authorizes the processing of personal data, in respect of commercial transactions within Malaysia. This includes both domestic and foreign organizations that process personal data of individuals in Malaysia for commercial purposes.

The PDPA establishes seven foundational principles that all data users (the Malaysian term for data controllers) must adhere to. Compliance with these principles is not discretionary; violations can result in substantial penalties including fines of up to RM500,000, imprisonment for up to three years, or both. The seven principles form the backbone of any PDPA compliance program and serve as the basis for enforcement actions by the JPDP Commissioner.

3.2 The Seven Principles of PDPA

PrinciplePDPA SectionCore RequirementImplementation Guide
General PrincipleSection 6Personal data must not be processed unless the data subject consentsImplement consent collection mechanisms; maintain consent records; document lawful processing basis
Notice and ChoiceSection 7Data subjects must be informed of purpose, data categories, and their rightsPublish privacy notices in Bahasa Malaysia and English; provide opt-out mechanisms; update notices when purposes change
Disclosure PrincipleSection 8Personal data shall not be disclosed without consent for purposes other than statedMaintain data sharing agreements; track third-party disclosures; implement data classification
Security PrincipleSection 9Practical steps to protect personal data from loss, misuse, unauthorized accessDeploy encryption, access controls, DLP; conduct regular security assessments; implement incident response plans
Retention PrincipleSection 10Personal data shall not be kept longer than necessary for stated purposeDefine retention schedules; implement automated data deletion; maintain retention policy documentation
Data IntegritySection 11Data must be accurate, complete, not misleading, and kept up to dateImplement data quality controls; enable self-service data correction; schedule periodic data reviews
Access PrincipleSection 12Data subjects have the right to access and correct their personal dataBuild data subject access request (DSAR) workflows; respond within 21 days; maintain DSAR logs

3.3 PDPA Registration Requirements

Under the Personal Data Protection Regulations 2013, organizations falling within specified classes of data users are required to register with the JPDP. The registration requirement applies to eleven categories of data users, including communications, banking and financial institutions, insurance, health, tourism and hospitality, transport, education, direct selling, services, real estate, and utilities. Failure to register constitutes an offense punishable by a fine of up to RM500,000 or imprisonment for up to three years.

The registration process requires organizations to submit detailed information about their data processing activities, including the types of personal data processed, the purposes of processing, security measures implemented, and details of any cross-border data transfers. Organizations must appoint a registered compliance officer and renew their registration annually. As of 2025, the JPDP has processed over 14,000 data user registrations, though compliance rates in certain sectors, particularly SMEs, remain below expectations.

3.4 Cross-Border Data Transfer Restrictions

Section 129 of the PDPA restricts the transfer of personal data to jurisdictions outside Malaysia unless the destination country has been designated by the Minister as providing adequate data protection standards. As of early 2026, the Minister has not published a formal adequacy determination whitelist, creating practical challenges for multinational organizations operating in Malaysia. In practice, cross-border transfers are permitted where the data subject has given consent, the transfer is necessary for the performance of a contract, the transfer is required for legal proceedings, or the data user has taken reasonable precautions and exercised due diligence to ensure the receiving party will protect the data at a standard comparable to the PDPA. Organizations commonly rely on Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs), or explicit data subject consent to lawfully transfer personal data out of Malaysia.

PDPA Compliance Quick Checklist for Malaysian Enterprises

1. Register as a data user with JPDP if in a designated sector
2. Appoint a Data Protection Officer or compliance officer
3. Publish bilingual privacy notices (BM/EN) on all data collection points
4. Implement consent management system with audit trail
5. Encrypt personal data at rest and in transit (AES-256 / TLS 1.3)
6. Establish data retention schedules aligned with PDPA Section 10
7. Deploy DSAR workflow capable of responding within 21 days
8. Conduct annual security assessments on personal data systems
9. Implement cross-border data transfer safeguards (SCCs/BCRs)
10. Prepare and test data breach response plan (aligned with 2024 amendments)
11. Train all employees handling personal data annually
12. Maintain processing records and consent documentation for audit

4. CyberSecurity Malaysia (CSM) Agency & Services

4.1 Agency Overview and Mandate

CyberSecurity Malaysia (CSM) is the national cybersecurity specialist agency operating under the Ministry of Digital. Established in 2007 as a company limited by guarantee, CSM serves as the national technical coordination center for cybersecurity incident response, digital forensics, security assurance, and cybersecurity capacity building. The agency's mandate encompasses protecting Malaysia's cyberspace, building national cybersecurity capabilities, and fostering a secure digital ecosystem that supports the country's economic growth objectives.

CSM operates from its headquarters in Cyberjaya, the national technology hub located approximately 40 kilometers south of Kuala Lumpur. The agency maintains operational capacity across seven core service divisions, each addressing a specific domain of the national cybersecurity mission. CSM employs over 400 cybersecurity professionals and collaborates extensively with international partners including FIRST (Forum of Incident Response and Security Teams), APCERT (Asia Pacific Computer Emergency Response Team), and OIC-CERT (Organisation of Islamic Cooperation Computer Emergency Response Team).

4.2 Core Services Portfolio

Service DivisionKey FunctionsTarget Audience
Cyber99924/7 national cyber incident help center; incident triage, coordination, and advisoryAll Malaysian organizations and individuals
MyCERTComputer emergency response; threat intelligence; malware analysis; vulnerability coordinationCritical infrastructure, government, private sector
Digital Forensics (CyberCSI)Digital evidence collection and analysis; expert witness testimony; forensic readiness consultingLaw enforcement, corporate investigations
Security AssuranceISMS auditing; Common Criteria evaluation; security product certificationGovernment agencies, CNII operators, vendors
Cybersecurity Responsive ServicesVulnerability assessment; penetration testing; security posture assessmentGovernment agencies, CNII operators
CyberSAFEPublic awareness; school programs; community cybersecurity educationGeneral public, educational institutions
Industry & Capacity BuildingProfessional certification; workforce development; industry collaborationCybersecurity professionals, academia

4.3 CSM Certification and Standards Programs

CyberSecurity Malaysia operates several certification programs critical for organizations seeking to demonstrate cybersecurity competence in the Malaysian market. The CSM Information Security Management System (ISMS) auditing service provides third-party assessment against ISO/IEC 27001 standards, widely recognized as the baseline certification for organizations handling sensitive data in Malaysia. CSM also manages the Common Criteria Evaluation Facility (MyCC), one of the few such facilities in ASEAN, enabling Malaysian and regional security product vendors to obtain Common Criteria certification recognized under the Common Criteria Recognition Arrangement (CCRA) by 31 member nations.

For cybersecurity professionals, CSM offers the CyberSecurity Malaysia Certified Professional (CSMP) program and partners with international certification bodies to deliver CISSP, CISM, CEH, and OSCP training through the CSM Academy. The agency also administers the MySEAL (Malaysia Security Evaluation and Labelling) scheme for IoT device security certification, an increasingly important requirement as Malaysia's IoT device deployments surge under the MyDIGITAL initiative.

5. NACSA: National Cyber Security Agency

5.1 Strategic Role and Authority

The National Cyber Security Agency (NACSA) was established in February 2017 under the National Security Council (MKN), which operates within the Prime Minister's Department. NACSA serves as Malaysia's national cyber security governance and policy body, responsible for coordinating the national cyber security strategy, overseeing the protection of Critical National Information Infrastructure (CNII), and advising the government on cyber security policy matters. Unlike CyberSecurity Malaysia, which focuses on technical operations and services, NACSA operates at the strategic and governance level, setting policy direction that shapes Malaysia's cyber defense posture.

NACSA's establishment represented a significant maturation of Malaysia's cybersecurity governance, consolidating strategic cyber defense coordination that was previously distributed across multiple agencies. The agency operates the National Cyber Coordination and Command Centre (NC4), which provides real-time monitoring of the national cyber threat landscape and coordinates inter-agency response to significant cyber incidents affecting national security. NC4 maintains connectivity with international partner agencies and intelligence-sharing platforms, enabling Malaysia to participate in collective defense arrangements with Five Eyes-adjacent partners and ASEAN member states.

5.2 Malaysia Cyber Security Strategy (MCSS) 2020-2024

NACSA developed and oversaw the implementation of the Malaysia Cyber Security Strategy (MCSS) 2020-2024, built around five strategic pillars:

  1. Effective Governance and Management: Strengthening the national cybersecurity governance framework, clarifying roles and responsibilities across agencies, and establishing the Cyber Security Act as enabling legislation.
  2. Strengthening Legislative Framework and Enforcement: Updating cybersecurity legislation including the Computer Crimes Act 1997, Communications and Multimedia Act 1998, and introducing the Cyber Security Act 2024.
  3. Catalyzing World-Class Innovation, Technology, and R&D: Fostering cybersecurity innovation through Cyberjaya's tech ecosystem, supporting homegrown cybersecurity product development, and establishing cybersecurity centers of excellence.
  4. Enhancing Capacity and Capability Building: Addressing the estimated 12,000-person cybersecurity workforce gap through professional development programs, academic partnerships, and international talent attraction.
  5. Strengthening Global Collaboration: Deepening bilateral and multilateral cybersecurity cooperation, participating in international cyber exercises, and contributing to global norms development.

5.3 Cyber Security Act 2024

The Cyber Security Act 2024 (Act 854) represents the most significant legislative development in Malaysian cybersecurity since the PDPA. Passed by Parliament in April 2024, the Act establishes a comprehensive framework for the management of national cybersecurity, with particular emphasis on CNII protection. Key provisions include mandatory cybersecurity standards for CNII entities, licensing requirements for cybersecurity service providers operating in Malaysia, incident reporting obligations with prescribed timeframes, and enforcement powers for NACSA including the ability to conduct cybersecurity audits and issue compliance directions. The Act introduces penalties of up to RM500,000 for non-compliance and establishes the Chief Executive of NACSA as the principal regulator for national cybersecurity matters.

6. CNII: Critical National Information Infrastructure

6.1 Sector Classification

Malaysia's Critical National Information Infrastructure (CNII) framework identifies and protects the information systems and infrastructure assets whose disruption would have severe consequences for national security, economic stability, or public welfare. The CNII framework encompasses 11 critical sectors, each overseen by a designated Lead Ministry and supported by sector-specific regulators responsible for ensuring cybersecurity compliance within their domain.

CNII SectorLead Ministry/AgencyKey EntitiesRisk Level
National Defense & SecurityMINDEF / MKNATM, PDRM, intelligence agenciesCRITICAL
Banking & FinanceBank Negara MalaysiaCommercial banks, Bursa Malaysia, payment systemsCRITICAL
Information & CommunicationsMCMCTelcos (TM, Maxis, CelcomDigi), ISPs, data centersCRITICAL
EnergyMinistry of EnergyTNB, Petronas, gas pipeline operatorsCRITICAL
TransportationMOTMAHB (airports), MRT/LRT, Port KlangHIGH
WaterKASAWater treatment plants, SPAN, distribution systemsHIGH
Health ServicesMOHPublic hospitals, MySejahtera platform, NPRAHIGH
GovernmentMAMPU / PMOMyGovernment portal, e-services, citizen databasesCRITICAL
Emergency ServicesNADMA / MKNMERS 999, fire and rescue, disaster managementHIGH
Food & AgricultureMOAFAMA, food supply chain systems, veterinary databasesMEDIUM
Science, Technology & InnovationMOSTIResearch institutions, MIMOS, innovation labsMEDIUM

6.2 CNII Compliance Requirements

Organizations designated as CNII operators face enhanced cybersecurity obligations under both NACSA directives and the Cyber Security Act 2024. These requirements include mandatory baseline security controls aligned with international frameworks (ISO 27001, NIST CSF), annual cybersecurity risk assessments conducted by NACSA-approved assessors, mandatory incident reporting to NACSA within six hours of detection for critical incidents, participation in national cyber exercises (Cyber Drill) organized by NACSA, implementation of security operations center (SOC) capabilities either in-house or through approved managed security service providers (MSSPs), and regular penetration testing at minimum annually or after significant infrastructure changes.

CNII operators are also required to designate a Chief Information Security Officer (CISO) or equivalent role with direct reporting lines to senior management, ensuring cybersecurity governance receives appropriate board-level attention. NACSA conducts periodic compliance assessments and maintains the authority to issue enforcement directions to CNII operators that fail to meet prescribed security standards. Under the Cyber Security Act, non-compliant CNII operators face penalties of up to RM500,000 and potential designation as non-compliant entities, which can affect their ability to participate in government contracts and regulated activities.

7. BNM RMiT: Cybersecurity for Financial Institutions

7.1 Framework Overview

Bank Negara Malaysia's Risk Management in Technology (RMiT) policy document, issued in June 2020, establishes comprehensive technology risk management expectations for all financial institutions regulated by BNM. RMiT applies to licensed banks, licensed investment banks, licensed Islamic banks, licensed insurers, licensed takaful operators, prescribed development financial institutions, approved issuers of designated payment instruments, and approved insurance brokers. The framework represents one of the most detailed financial sector cybersecurity regulations in ASEAN, reflecting BNM's recognition that technology risk is a first-order threat to financial stability.

RMiT is structured around several key domains that collectively address the full lifecycle of technology risk management in financial institutions. The framework explicitly requires financial institutions to adopt a risk-based approach to cybersecurity, proportional to the nature, scale, and complexity of their operations and the sensitivity of data they process. BNM conducts regular assessments of financial institutions' RMiT compliance through its supervisory examination process, and non-compliance can result in enforcement actions ranging from supervisory directions to financial penalties.

7.2 RMiT Key Domains and Requirements

RMiT DomainKey RequirementsCompliance Priority
Technology Risk GovernanceBoard-approved technology risk framework; CISO appointment; risk appetite statement; quarterly board reportingMANDATORY
Technology Operations ManagementChange management; capacity planning; IT asset management; business continuity (RTO/RPO targets)MANDATORY
Cybersecurity ManagementThreat intelligence; SOC operations; vulnerability management; penetration testing; red teamingMANDATORY
Technology AuditIndependent technology audit function; annual audit plan; findings tracking; regulatory reportingMANDATORY
Cloud ServicesCloud risk assessment; data residency requirements; exit strategy; ongoing monitoring of CSPHIGH
Data ManagementData classification; data loss prevention; encryption standards; data lifecycle managementHIGH
Access ManagementPrivileged access management; multi-factor authentication; access certification; segregation of dutiesMANDATORY
Incident ResponseIncident response plan; BNM notification within 1 hour for significant incidents; root cause analysis; lessons learnedMANDATORY

7.3 BNM Incident Reporting Obligations

RMiT imposes strict incident reporting timelines on financial institutions. Significant technology-related incidents, including cybersecurity breaches, system failures affecting customer services, and data breaches involving customer information, must be reported to BNM within one hour of confirmation. This is among the most stringent reporting requirements in the ASEAN region, reflecting BNM's focus on maintaining financial system stability and consumer confidence. The initial report must include the nature of the incident, estimated impact on customers and operations, containment measures taken, and expected recovery timeline. A detailed post-incident report must follow within 14 days, including root cause analysis, full impact assessment, and remediation plans with implementation timelines.

BNM RMiT Compliance Tip: Cloud Adoption

Financial institutions adopting cloud services must conduct a comprehensive risk assessment prior to migration, including evaluation of the CSP's security certifications (SOC 2, ISO 27001, CSA STAR), data residency requirements (BNM prefers data to remain in Malaysia or Singapore), contractual provisions for audit rights and incident notification, and an exit strategy ensuring data portability. BNM must be notified of material outsourcing arrangements to cloud service providers, and institutions must maintain the ability to demonstrate compliance with RMiT requirements regardless of the deployment model (IaaS, PaaS, SaaS). Contact Seraphim for BNM RMiT gap analysis.

8. Cyber999 & MyCERT Operations

8.1 Cyber999 Help Centre

Cyber999 is Malaysia's national cyber security incident response help center, operated by CyberSecurity Malaysia under the MyCERT division. The service provides 24/7 incident reporting, triage, and advisory services to Malaysian organizations and individuals experiencing cybersecurity incidents. Cyber999 serves as the first point of contact for cyber incident reporting in Malaysia and acts as the coordination hub connecting affected organizations with relevant response capabilities, law enforcement agencies, and sector-specific regulators.

The Cyber999 reporting channels include telephone (1-300-88-2999), email ([email protected]), the online reporting form at mycert.org.my, the Cyber999 mobile application (available on iOS and Android), and walk-in reporting at CSM headquarters in Cyberjaya. All reports are assessed against a severity classification framework that determines the response priority and resources allocated to each incident. Critical incidents affecting CNII sectors or involving large-scale data breaches are escalated to NACSA for national-level coordination.

8.2 MyCERT Operational Capabilities

MyCERT (Malaysia Computer Emergency Response Team) is the operational cybersecurity arm of CyberSecurity Malaysia, functioning as the national CERT with responsibilities spanning incident response, threat intelligence, vulnerability coordination, and security advisory publication. MyCERT maintains membership in FIRST and APCERT, enabling real-time threat intelligence sharing with 600+ CERTs worldwide. Key operational capabilities include:

# Cyber999 Incident Reporting: Severity Classification Matrix # Used by MyCERT analysts for triage and resource allocation SEVERITY_LEVELS: CRITICAL: # Response within 1 hour - CNII sector compromise confirmed - Active data exfiltration in progress - Ransomware affecting essential services - Nation-state APT activity confirmed - Large-scale DDoS affecting national infrastructure HIGH: # Response within 4 hours - Corporate network breach confirmed - Personal data breach > 10,000 records - Financial system compromise - Active lateral movement detected - Supply chain compromise affecting multiple orgs MEDIUM: # Response within 24 hours - Malware infection (contained) - Phishing campaign targeting organization - Unauthorized access (single system) - Website defacement (non-CNII) - Vulnerability report (exploitable, unpatched) LOW: # Response within 72 hours - Spam/scam reports - Vulnerability report (low severity) - Cyber harassment (non-threatening) - General security advisory request - Proactive threat intelligence sharing REPORTING_CHANNELS: phone: "1-300-88-2999" email: "[email protected]" web: "https://www.mycert.org.my/portal/online-reporting" app: "Cyber999 Mobile (iOS / Android)"

9. MyDIGITAL Cybersecurity Pillars

9.1 MyDIGITAL Blueprint Overview

The Malaysia Digital Economy Blueprint (MyDIGITAL), launched by Prime Minister Muhyiddin Yassin in February 2021, outlines Malaysia's aspiration to become a regional leader in the digital economy by 2030. The blueprint targets the digital economy contributing 22.6% of GDP by 2025 (up from 19.1% in 2018), creating 500,000 new digital jobs, and achieving 100% broadband coverage. Cybersecurity is embedded as a foundational enabler across all six strategic thrusts of MyDIGITAL, recognizing that digital economic growth cannot be sustained without a secure and trusted digital environment.

9.2 Cybersecurity Objectives Within MyDIGITAL

MyDIGITAL establishes several cybersecurity-specific targets and initiatives that shape the national cybersecurity investment agenda through 2030:

22.6%
MyDIGITAL Target: Digital Economy % of GDP
20,000
Cybersecurity Professionals Target by 2030
80%
SME Cyber Baseline Compliance Target
2027
Zero Trust Target for Government Services

10. Ransomware Landscape Targeting Malaysian Enterprises

10.1 Current Ransomware Threat Assessment

Ransomware attacks targeting Malaysian organizations have escalated dramatically since 2022, with the country experiencing an estimated 57% increase in ransomware incidents year-over-year in 2024. Malaysian enterprises, particularly in healthcare, manufacturing (especially the E&E sector), and financial services, have emerged as high-value targets for both established ransomware syndicates and emerging RaaS (Ransomware-as-a-Service) operators. The average ransom demand for Malaysian enterprises reached RM3.2 million (approximately USD 685,000) in 2025, while the total cost of ransomware incidents including downtime, recovery, regulatory penalties, and reputational damage averaged RM12.8 million per impacted organization.

The Malaysian ransomware threat landscape is dominated by several prolific threat actor groups. LockBit 3.0, despite law enforcement disruption operations, continued to list Malaysian victims on its data leak site through affiliate operations. BlackCat/ALPHV successors, Akira, and Play ransomware groups have all been documented targeting Malaysian organizations. The emergence of double and triple extortion tactics, where attackers combine file encryption with data exfiltration threats and DDoS attacks, has significantly increased the pressure on Malaysian organizations to pay ransoms, despite guidance from NACSA and CyberSecurity Malaysia advising against payment.

10.2 Common Attack Vectors in Malaysia

10.3 Ransomware Preparedness Framework

Malaysia Ransomware Resilience Checklist

Prevention: Patch critical vulnerabilities within 48 hours of advisory (especially VPN/firewall appliances); deploy EDR on all endpoints; implement email security gateway with sandboxing; enforce MFA on all remote access and privileged accounts; conduct monthly phishing simulations for all staff.

Detection: Deploy 24/7 SOC monitoring (in-house or MSSP); implement network traffic analysis (NTA) for lateral movement detection; monitor for anomalous data exfiltration patterns; maintain updated threat intelligence feeds with Malaysian-specific IOCs.

Response: Maintain offline, immutable backups tested quarterly; develop and rehearse ransomware-specific incident response playbook; establish pre-arranged retainer with digital forensics firm; document regulatory notification obligations (BNM: 1 hour; NACSA: 6 hours; JPDP: as prescribed).

Recovery: Maintain documented system rebuild procedures; test backup restoration quarterly; establish communication templates for customers, regulators, and media; engage cyber insurance provider early in incident.

11. Data Breach Notification Under PDPA Amendments

11.1 Mandatory Breach Notification Framework

The 2024 amendments to the Personal Data Protection Act 2010 introduced mandatory data breach notification requirements, aligning Malaysia with global best practices already established in the EU (GDPR), Singapore (PDPA 2020 amendments), Thailand (PDPA), and Australia (NDB scheme). Under the amended provisions, data users (controllers) are required to notify the Personal Data Protection Commissioner and affected data subjects when a data breach is likely to result in significant harm to the data subjects. The notification must be made within a prescribed timeframe following the data user becoming aware of the breach, with the specific timeline to be detailed in implementing regulations.

The breach notification framework represents a paradigm shift for Malaysian organizations accustomed to a regulatory environment where data breach disclosure was not legally mandated. Organizations must now invest in breach detection capabilities, establish internal assessment procedures to determine notification obligations, and prepare notification templates and processes capable of meeting prescribed timelines. The amendments also expand the extraterritorial scope of the PDPA, potentially capturing foreign data processors handling Malaysian personal data.

11.2 Breach Notification Decision Framework

Assessment CriteriaNotification RequiredNotification May Not Be Required
Type of dataSensitive personal data (health, financial, biometric, political/religious beliefs)Non-sensitive data that is publicly available
Volume of recordsLarge-scale breach (>500 data subjects)Minor breach (<10 data subjects) with low harm potential
Encryption statusData was unencrypted or encryption key also compromisedData was encrypted with strong algorithm and key is secure
Containment statusData exfiltrated or accessed by unauthorized partyBreach contained before unauthorized access occurred
Potential harmRisk of financial loss, identity theft, discrimination, or physical safetyNo material risk of harm to data subjects
RemediationUnable to fully remediate risk to data subjectsComplete remediation achieved (e.g., unauthorized recipient confirmed deletion)

11.3 Notification Content Requirements

When a breach notification is required, the data user must provide the Commissioner and affected data subjects with comprehensive information including: a description of the nature of the breach including the categories and approximate number of data subjects affected; the categories and approximate number of personal data records affected; the name and contact details of the data protection officer or point of contact; a description of the likely consequences of the breach; a description of the measures taken or proposed to address the breach and mitigate potential adverse effects; and recommendations for data subjects to protect themselves from potential harm resulting from the breach. Notifications to data subjects must be in clear, plain language accessible to the average consumer, and should be provided in both Bahasa Malaysia and English where the affected population includes speakers of both languages.

12. Penetration Testing for Bursa-Listed Companies

12.1 Regulatory Expectations

Companies listed on Bursa Malaysia face growing cybersecurity expectations from multiple regulatory bodies. While Bursa Malaysia's listing requirements do not currently mandate specific penetration testing frequencies, the Securities Commission Malaysia (SC) has issued guidance encouraging listed entities to adopt robust cybersecurity practices including regular security assessments. For financial services companies listed on Bursa, BNM's RMiT requirements mandate annual penetration testing at minimum, with additional testing required after significant infrastructure changes. CNII-designated listed companies must comply with NACSA's enhanced security assessment requirements, which include annual penetration testing by qualified assessors.

The Malaysian Code on Corporate Governance (MCCG) 2021 promotes best practices in board governance that increasingly encompass cybersecurity oversight. Practice 11.2 states that the board should ensure the company has a robust risk management framework covering cyber risks. Institutional investors and proxy advisory firms in Malaysia are increasingly scrutinizing cybersecurity governance disclosures in annual reports, creating market-driven pressure for Bursa-listed companies to demonstrate proactive security testing practices beyond minimum regulatory requirements.

12.2 Penetration Testing Standards and Scope

Test TypeScopeStandard/MethodologyTypical FrequencyEstimated Cost (RM)
External Network PentestInternet-facing infrastructure, firewalls, VPN gateways, web serversOWASP, PTES, OSSTMMAnnually30,000 - 80,000
Web Application PentestCustomer portals, APIs, e-commerce platforms, mobile backendsOWASP ASVS, OWASP Testing GuideAnnually + after major releases25,000 - 120,000
Internal Network PentestActive Directory, lateral movement, privilege escalation, segmentationPTES, MITRE ATT&CKAnnually40,000 - 150,000
Red Team ExerciseFull-scope adversary simulation including physical, social, and technical vectorsTIBER-EU adapted, CBESTEvery 2-3 years (financial sector)150,000 - 500,000
Cloud Security AssessmentAWS/Azure/GCP configuration review, IAM analysis, data exposureCIS Benchmarks, CSA CCMAnnually + after architecture changes35,000 - 100,000
OT/SCADA PentestIndustrial control systems, SCADA networks, HMI systemsIEC 62443, NIST SP 800-82Annually (E&E, energy sector)80,000 - 250,000
Social EngineeringPhishing campaigns, vishing, physical intrusion attemptsSE Framework, custom TTPsQuarterly (phishing), annually (physical)15,000 - 60,000

12.3 Selecting a Penetration Testing Provider in Malaysia

When selecting a penetration testing firm for Bursa-listed company engagements, organizations should evaluate providers against several key criteria. CREST accreditation is considered the gold standard for penetration testing firms in Malaysia and is increasingly expected by regulators and audit committees. Teams should hold individual certifications including OSCP, OSCE, CREST CRT/CCT, or GPEN. The provider should demonstrate familiarity with the Malaysian regulatory environment including BNM RMiT, PDPA, and NACSA requirements, and should be capable of delivering findings reports aligned with both technical remediation teams and board-level governance reporting. Organizations processing payment card data should ensure the provider holds PCI QSA certification for PCI DSS compliance assessments.

13. SOC Services for KL Business District

13.1 Managed SOC Market in Kuala Lumpur

The Kuala Lumpur metropolitan area, home to more than 70% of Malaysia's Fortune 500 and MNC regional headquarters, represents the largest concentration of managed SOC (Security Operations Center) demand in the country. The KL business district, encompassing the KLCC area, Bangsar South, KL Sentral, and the broader Golden Triangle, houses organizations ranging from global bank regional hubs to fintech startups, each with distinct cybersecurity monitoring requirements. The Malaysian managed security services market has grown to an estimated RM680 million in 2025, with SOC services representing the largest segment at approximately 35% of total spend.

Enterprise demand for managed SOC services in KL is driven by several converging factors: the BNM RMiT requirement for continuous cybersecurity monitoring, the scarcity and cost of qualified SOC analysts (a senior SOC analyst in KL commands RM8,000-15,000 monthly salary), the 24/7 operational requirement that is impractical for most organizations to staff internally, and the increasing sophistication of threats requiring advanced detection capabilities including behavioral analytics, threat hunting, and deception technology. Mid-size enterprises in KL typically find that managed SOC services deliver 40-60% cost savings compared to building and staffing an equivalent in-house capability.

13.2 SOC Service Tiers for Malaysian Enterprises

Service TierCapabilitiesBest ForMonthly Cost (RM)
Essential SOC24/7 SIEM monitoring; alert triage and escalation; monthly reporting; basic incident response coordinationSMEs with <500 employees; non-CNII, non-financial sector8,000 - 18,000
Advanced SOCAll Essential + EDR management; threat hunting (weekly); vulnerability management; SOAR automation; dedicated analystMid-size enterprises; Bursa-listed companies; non-bank financial institutions18,000 - 45,000
Enterprise SOCAll Advanced + custom detection rules; red/purple team integration; threat intelligence platform; executive reporting; regulatory liaisonLarge enterprises; banks and financial institutions; CNII operators45,000 - 120,000
Sovereign SOCAll Enterprise + Malaysia-resident data processing; security-cleared analysts; government liaison capability; classified threat intelGovernment agencies; defense contractors; critical infrastructure100,000 - 250,000+

13.3 SOC Technology Stack for Malaysian Deployments

# Recommended SOC Technology Stack - Malaysia Enterprise Deployment # Aligned with BNM RMiT and NACSA requirements SIEM_PLATFORM: primary: "Microsoft Sentinel" # Market leader in MY enterprise alternatives: - "Splunk Enterprise Security" # Preferred by large banks - "IBM QRadar" # Legacy install base in MY - "Elastic Security" # Cost-effective for mid-market - "Google Chronicle" # Growing adoption in MY ENDPOINT_DETECTION: primary: "CrowdStrike Falcon" # Strongest APT detection alternatives: - "Microsoft Defender for Endpoint" # Bundled with M365 E5 - "SentinelOne Singularity" # Strong in MY market - "Palo Alto Cortex XDR" # Integrated with NGFW NETWORK_DETECTION: primary: "Darktrace" # AI-driven NDR, strong MY presence alternatives: - "ExtraHop Reveal(x)" # Excellent for encrypted traffic - "Vectra AI" # Good for cloud workloads SOAR_PLATFORM: primary: "Palo Alto XSOAR" # Most deployed in MY SOCs alternatives: - "Splunk SOAR (Phantom)" - "Microsoft Sentinel SOAR" # Native Sentinel integration THREAT_INTELLIGENCE: feeds: - "MyCERT advisories and IOCs" # MANDATORY for MY operations - "Mandiant Advantage" - "Recorded Future" - "MISP (open source)" local_sources: - "NACSA threat bulletins" - "BNM security advisories" - "MCMC threat intelligence" COMPLIANCE_REPORTING: - "BNM RMiT quarterly technology risk report" - "NACSA CNII compliance dashboard" - "PDPA breach detection metrics" - "Bursa Malaysia corporate governance disclosure"

14. Cyberjaya Security Ecosystem

14.1 Cyberjaya as Malaysia's Cybersecurity Hub

Cyberjaya, Malaysia's flagship technology city located within the Multimedia Super Corridor (MSC), has evolved into the nation's preeminent cybersecurity ecosystem. The city hosts the headquarters of CyberSecurity Malaysia, the operations center of MDEC (Malaysia Digital Economy Corporation), and a growing cluster of cybersecurity companies spanning MSSPs, security product vendors, digital forensics firms, and cybersecurity training academies. Cyberjaya's designation as an MSC Malaysia Cybercentre provides qualifying cybersecurity companies with significant incentives including Pioneer Status (100% tax exemption for 10 years) or Investment Tax Allowance (60% for 5 years), exemption from local equity requirements, and unrestricted employment of foreign knowledge workers.

The cybersecurity cluster in Cyberjaya has grown to over 60 companies as of 2025, employing more than 4,000 cybersecurity professionals. Notable organizations headquartered or maintaining significant operations in Cyberjaya include CyberSecurity Malaysia, LGMS (one of Malaysia's largest homegrown security firms), Securemetric (biometric security), Firmus (managed SOC provider), and regional offices of international firms including Fortinet, Palo Alto Networks, and CrowdStrike. The proximity to CyberSecurity Malaysia's headquarters facilitates close collaboration between the private sector and government on threat intelligence sharing, standards development, and workforce programs.

14.2 Key Cyberjaya Ecosystem Components

15. Compliance Framework Comparison

15.1 Malaysia vs ASEAN Cybersecurity Frameworks

Understanding how Malaysia's cybersecurity regulatory framework compares to those of its ASEAN peers is essential for multinational organizations operating across the region. The following comparison highlights the key regulatory instruments, enforcement maturity, and compliance expectations across major ASEAN markets.

DimensionMalaysiaSingaporeThailandIndonesiaPhilippines
Primary Data Protection LawPDPA 2010PDPA 2012PDPA 2019PDP Law 2022DPA 2012
Data Breach NotificationMandatory (2024 amendment)Mandatory (2021 amendment)Mandatory (within 72 hours)Mandatory (14 days)Mandatory (within 72 hours)
Cybersecurity ActCyber Security Act 2024Cybersecurity Act 2018Cybersecurity Act 2019PP 71/2019Pending
National CERTMyCERT / Cyber999SingCERT / CSAThaiCERTID-SIRTII/CC, BSSNNCERT (DICT)
Financial Sector RegulationBNM RMiTMAS TRMBOT IT RiskOJK POJK/SEOJKBSP Circulars
Max Data Protection FineRM500K (~USD 107K)SGD 1M (~USD 740K)THB 5M (~USD 140K)IDR 50B (~USD 3.1M)PHP 5M (~USD 87K)
ITU GCI Ranking (2024)5th5th (tied)39th24th43rd
CNII Framework11 sectors defined11 CII sectors8 CI sectors8 vital sectors18 CI sectors
Cross-Border TransferRestricted (no whitelist)Restricted (exceptions apply)Adequate protection requiredEquivalent protectionRestricted

15.2 Compliance Cost Estimation for Malaysian Enterprises

Compliance ProgramSME (< 100 employees)Mid-Market (100-1000)Enterprise (1000+)Financial Institution
PDPA Compliance ProgramRM20K - 50KRM50K - 150KRM150K - 400KRM200K - 600K
ISO 27001 CertificationRM40K - 80KRM80K - 200KRM200K - 500KRM300K - 800K
BNM RMiT Gap AssessmentN/AN/AN/ARM100K - 500K
Annual Penetration TestingRM15K - 40KRM40K - 120KRM120K - 350KRM150K - 500K
Managed SOC (Annual)RM96K - 216KRM216K - 540KRM540K - 1.44MRM1.2M - 3M
Incident Response RetainerRM30K - 60KRM60K - 150KRM150K - 300KRM200K - 500K
Total Annual InvestmentRM201K - 446KRM446K - 1.16MRM1.16M - 2.99MRM2.15M - 5.9M
Strategic Advisory: Cybersecurity Investment Benchmarking

Malaysian enterprises should benchmark their cybersecurity investment against industry averages. According to IDC's ASEAN Security Spending Guide 2025, Malaysian organizations allocate an average of 4.2% of their IT budget to cybersecurity, compared to Singapore (5.8%), Australia (6.1%), and the global average (5.4%). Financial institutions in Malaysia typically invest 6-8% of IT spend on security, aligned with BNM's expectations. Organizations below the 4% threshold should consider accelerating investment, particularly given the rising ransomware threat and new compliance obligations under the Cyber Security Act 2024 and PDPA amendments. Speak with Seraphim about cybersecurity investment planning for Malaysia.

16. Frequently Asked Questions

What is PDPA Malaysia and who does it apply to?

The Personal Data Protection Act 2010 (PDPA) is Malaysia's primary data protection legislation, enforced by the Department of Personal Data Protection (JPDP). It applies to any person or organization that processes personal data in commercial transactions within Malaysia. This includes companies registered in Malaysia, foreign companies processing data of Malaysian citizens for commercial purposes, and any entity handling personal data in the course of business. The PDPA establishes seven key principles: General, Notice and Choice, Disclosure, Security, Retention, Data Integrity, and Access. Non-compliance can result in fines up to RM500,000 (approximately USD 107,000) or imprisonment of up to three years, or both.

What is CyberSecurity Malaysia (CSM) and what services does it provide?

CyberSecurity Malaysia (CSM) is the national cybersecurity specialist agency under the Ministry of Digital. Established in 2007, CSM operates Cyber999 (the national cyber incident help center), MyCERT (Malaysia Computer Emergency Response Team), CyberSAFE (community awareness programs), and provides digital forensics, security assurance, and vulnerability assessment services. CSM also manages the Common Criteria Evaluation Facility and Information Security Management System (ISMS) auditing for Malaysian organizations. The agency is headquartered in Cyberjaya and employs over 400 cybersecurity professionals.

What is BNM RMiT and how does it affect Malaysian financial institutions?

BNM RMiT (Risk Management in Technology) is a policy document issued by Bank Negara Malaysia that establishes technology risk management standards for all BNM-regulated financial institutions. It covers technology risk governance, operations management, cybersecurity management, technology audit, and internal awareness. Financial institutions must implement robust cybersecurity controls, conduct regular penetration testing, maintain incident response capabilities, and report significant cyber incidents to BNM within one hour of confirmation. Non-compliance can result in enforcement actions including fines and restrictions on business operations.

How do I report a cybersecurity incident in Malaysia?

Cybersecurity incidents in Malaysia should be reported to Cyber999, the national cyber incident help center operated by CyberSecurity Malaysia. Reports can be submitted via email to [email protected], by phone at 1-300-88-2999, via the Cyber999 mobile app, or through the online reporting form at www.mycert.org.my. For CNII sectors, incidents must also be reported to NACSA. Financial institutions must additionally report to Bank Negara Malaysia under RMiT requirements (within 1 hour for significant incidents). Organizations experiencing personal data breaches must notify JPDP under the amended PDPA.

What is CNII Malaysia and which sectors are included?

CNII (Critical National Information Infrastructure) refers to the interconnected information infrastructure essential to Malaysia's national security, economic stability, and public welfare. The framework covers 11 critical sectors: national defense and security, banking and finance, information and communications, energy, transportation, water, health services, government, emergency services, food and agriculture, and science, technology and innovation. CNII operators must comply with enhanced cybersecurity requirements under NACSA directives and the Cyber Security Act 2024, including mandatory security assessments, incident reporting within 6 hours, and baseline security controls.

What are the penalties for data breaches under the amended PDPA Malaysia?

Under the PDPA 2010 and its amendments, organizations that fail to protect personal data face fines of up to RM500,000 (approximately USD 107,000), imprisonment for up to three years, or both. The 2024 amendments introduced mandatory data breach notification requirements. Additional penalties apply for failure to register as a data user, unauthorized disclosure of personal data, and non-compliance with enforcement notices. Repeat offenses carry enhanced penalties. Directors and officers of non-compliant companies may also face personal liability.

What cybersecurity certifications are recognized in Malaysia?

Key certifications recognized in Malaysia include: ISO/IEC 27001 for information security management (widely adopted and often required for government contracts); CREST accreditation for penetration testing firms; (ISC)2 CISSP and CISM for cybersecurity professionals; PCI DSS for payment card processing; SOC 2 for service organizations; and CSM's own professional certification programs. CyberSecurity Malaysia also operates the Common Criteria Evaluation Facility (MyCC) for product security certification. Under the Cyber Security Act 2024, cybersecurity service providers will need to obtain specific licenses from NACSA to operate in Malaysia.

How much does a cybersecurity audit cost in Malaysia?

Costs vary by scope and organization size. A basic vulnerability assessment for an SME costs RM15,000-50,000 (USD 3,200-10,700). Comprehensive penetration testing ranges from RM30,000-150,000 (USD 6,400-32,000). ISO 27001 certification audits cost RM50,000-200,000 (USD 10,700-42,800). BNM RMiT compliance assessments for financial institutions typically cost RM100,000-500,000 (USD 21,400-107,000). Annual managed SOC services for mid-size KL enterprises range from RM180,000-600,000 (USD 38,500-128,400) per year. Contact Seraphim for a customized quotation based on your specific requirements.

Is cybersecurity insurance available in Malaysia?

Yes, cyber insurance is available in Malaysia through both domestic and international insurers. Major providers include AIG Malaysia, Allianz Malaysia, Chubb Insurance Malaysia, and Zurich Insurance Malaysia. Policies typically cover first-party losses (incident response costs, business interruption, data restoration, extortion payments) and third-party liabilities (regulatory fines where insurable, defense costs, settlements). Premiums for Malaysian enterprises range from RM15,000-200,000 annually depending on revenue, sector, coverage limits, and security posture. Insurers increasingly require evidence of basic cybersecurity controls including MFA, endpoint protection, backup procedures, and employee training before issuing policies.

What is the difference between NACSA and CyberSecurity Malaysia (CSM)?

NACSA (National Cyber Security Agency) operates under the Prime Minister's Department (National Security Council) and focuses on strategic cybersecurity governance, policy development, CNII protection, and national-level incident coordination. CyberSecurity Malaysia (CSM) operates under the Ministry of Digital and focuses on technical cybersecurity operations including Cyber999 incident response, MyCERT threat intelligence, digital forensics, security assurance, and industry capacity building. In simplified terms, NACSA sets the cybersecurity strategy and policy, while CSM provides the technical execution and operational services. Both agencies collaborate closely, particularly on CNII protection and national cyber incident response.

How does Malaysia's Cyber Security Act 2024 affect cybersecurity service providers?

The Cyber Security Act 2024 introduces a licensing regime for cybersecurity service providers operating in Malaysia. Providers offering services such as penetration testing, managed security operations (SOC/MSSP), digital forensics, and cybersecurity auditing will need to obtain licenses from NACSA. The licensing requirements include demonstrating technical competence, maintaining qualified personnel, adhering to prescribed standards and methodologies, and submitting to regulatory oversight. Foreign cybersecurity service providers will need to establish a local presence or partner with licensed Malaysian entities. The implementation timeline and detailed licensing criteria are being developed through subsidiary legislation, with full enforcement expected to begin in phases from 2025-2026.

What should Malaysian companies do immediately after a ransomware attack?

Immediately isolate affected systems from the network to prevent lateral spread. Do not shut down systems as this may destroy volatile forensic evidence. Activate your incident response plan and engage your pre-arranged digital forensics provider. Report the incident to Cyber999 (1-300-88-2999 or [email protected]). If you are a financial institution, notify BNM within 1 hour. If you are a CNII operator, notify NACSA within 6 hours. Assess whether personal data has been compromised and prepare for PDPA breach notification if required. Do not pay the ransom without consulting legal counsel and law enforcement. Begin recovery from offline backups once forensic preservation is complete. Document all actions taken for regulatory reporting and potential insurance claims.

Strengthen Your Cybersecurity Posture in Malaysia

Seraphim Vietnam provides comprehensive cybersecurity consulting services for organizations operating in Malaysia, including PDPA compliance programs, BNM RMiT gap assessments, penetration testing, managed SOC services, and incident response planning. Our team understands the Malaysian regulatory landscape and delivers solutions aligned with NACSA, CSM, and BNM expectations. Schedule a consultation to discuss your cybersecurity requirements.

Get a Malaysia Cybersecurity Assessment

Receive a customized cybersecurity gap analysis covering PDPA compliance, BNM RMiT alignment, NACSA readiness, and a prioritized remediation roadmap for your Malaysian operations.

© 2026 Seraphim Co., Ltd.