Our Programs

Payment Card Industry Data Security Standard Program
Payment Card Industry Data Security Standard Program
  • Gap Analysis & Scope Definition
  • PCI ASV Vulnerability Scanning
  • PCI DSS Penetration Testing
  • PCI DSS Vulnerability Assessment
  • PCI DSS Web Application Testing
  • PCI DSS Wireless Analysis & Reporting
  • PCI DSS Remediation Guidance & Support
  • PCI DSS SIEM/FIM/IEC/SOC/IPS/WAF
  • PCI DSS Report on Compliance (ROC)
  • PCI DSS Certified Attestation of Compliance (AOC)
  • PCI DSS Self-Assessment & Validation
  • PCI DSS Policy, Incident Responses, SDLC Development
    & Training
  • PCI DSS BOD, Top Management & staff Training
SWIFT CSP Program
SWIFT CSP Program
  • SWIFT CSP Gap assessment & Roadmap development
  • SWIFT CSP Guidance & on Remediation
  • SWIFT CSP Benchmarking and configuration review
  • SWIFT CSP Penetration Testing 
  • SWIFT CSP Independent Assessment 
    Framework (IFA)
  • SWIFT CSP Continues Audits & Improvements
ISO Compliance Program
ISO Compliance Program
 

ScanWave provides comprehensive implementation services for ISO 27001, 27002, 27005, 31000, and 27017 standards, ScanWave is a proven leader in providing Information Security services to the government and commercial organizations.

Our security professionals have developed a proven system to support the implementation and audit/ guidance on all sections of ISO Information Security Management System (ISMS) and supporting risk management frameworks.

EU GDPR Program
EU GDPR Program
  • Awareness session planning with core functions of the company 
  • Health check against central operations 
  • Production of a coordinated strategy and roadmap
  • Remediation program for GDPR policies and procedures
  • Action forthcoming changes to the company culture
  • Conduct Data Protection Impact Assessment
  • Risk management for personal data that you collect, process,  share, and store
  • Measure your current state of compliance with EU GDPR 
  • Data Protection Officer as a service
COBIT 2019 Program
COBIT 2019 Program
  • COBIT 2019 Overview
  • COBIT 2019 Designing a Tailored Governance System
  • COBIT 2019 Enterprise Goals & Alignment Goals Cascade
  • COBIT 2019 Process Capability Assessment
  • COBIT 2019 Adoption & Implementation
  • COBIT 2019 Training Workshops
Cyber Security Resilience Program
Cyber Security Resilience Program
  • Cyber Security Profile Development
  • Cyber Security Roadmap
  • Cyber Security Tailor-Made Program
  • Cyber Security Gap, Analyze, and Prioritization
  • Cyber Security Risk Assessment & Management
  • Cyber Security Testing and remediation Guidance
  • Cyber Security Awareness Program
  • Cyber Security Program Alignment with standards 
    Framework
  • Compliance with international and Local Regulations
Cyber Security Testing Program
Cyber Security Testing Program
  • Penetration Testing: Internal & External
  • Vulnerability Testing: Internal & External
  • Web Applications: Security Testing
  • Mobile Applications: Security Testing
  • Firewalls & Routers: Rules Review
  • Social Engineering: Digital Shadow
  • Configuration Review: Benchmarking Testing
  • Remediation Guidance: Network, Security & Systems
  • Policies, Procedures: Development
  • Risk Assessment & Management
  • Compliance: Standards, Frameworks & Regulations
SAMA Cyber Security Framework
SAMA Cyber Security Framework
  • SAMA Cyber Security Profile Development
  • SAMA Cyber Security Roadmap
  • SAMA Cyber Security Gap, Analyze, and Prioritization
  • SAMA Cyber Security Risk Assessment & Management
  • SAMA Cyber Security Testing and remediation Guidance
  • SAMA Cyber Security Awareness Program
  • Compliance with international and Local Regulations
NCA Essential Cybersecurity Controls (ECC)
NCA Essential Cybersecurity Controls (ECC)
  • ECC Security Roadmap
  • ECC Security Gap, Analyze, and Prioritization
  • ECC Security Risk Assessment & Management
  • ECC Security Testing and remediation Guidance
  • ECC Security Awareness Program
  • ECC Security Program Alignment with standards 
    Framework
  • Compliance with international and Local Regulations
Central Bank of Jordan - E-KYC (Electronic Know Your Customer)
Central Bank of Jordan - E-KYC (Electronic Know Your Customer)
  • E-KYC Cyber Security Readiness Assessment.
  • E-KYC Cyber Security Testing.
  • E-KYC Cyber Security Architecture Review.
  • E-KYC go live Cyber Security certification.
  • E-KYC Configuration Benchmarking Assessment.
  • E-KYC API Cyber Security Testing.
  • E-KYC Data Mapping and Classification.
  • E-KYC Risk Assessment and Treatment.
  • E-KYC Data Protection impact Assessment.
Central Bank of Jordan - Cyber Security Framework
Central Bank of Jordan - Cyber Security Framework
  • Cyber Security Current and Target Profile Development
  • Cyber Security Roadmap Development 
  • Cyber Security Tailor-Made Program
  • Cyber Security Gap Analyze, and Prioritization 
  • Cyber Security Risk Assessment & Management
  • Develop Comprehensive Incident Response Plan
  • Cyber Security Testing and Remediation Guidance 
  • Cyber Security Awareness Program
  • Cyber Security Program Alignment with standards & Framework
  • Compliance with International and Local Regulations
  • Outsource services covering Security Operation Center (SOC) Engineers
  • Outsource service for Cyber Security Function as per CBJ regulations and frameworks