60 WASCO BERHAD SECTION 3 VALUE CREATION The risk of a breach in our information management system arising from cyberattacks, data misuse, hardware failures, or other malicious actions targeting our IT systems. INFORMATION RISK 5 Medium Our increasing reliance on digital technologies and data, coupled with the rapid evolution of sophisticated cyber threats (including AI-driven attacks), exposes us to significant risk. A breach could lead to operational disruption, leakage of confidential information, reputational damage, and regulatory penalties under laws like the General Data Protection Regulation and the Personal Data Protection Act. We are committed to staying ahead of emerging threats by investing in advanced, multi-layered cybersecurity defences, including: • Advanced Security Technology: We leverage a state-of-the-art SOC and deploy modern technologies like AI-powered threat detection and Multi-Factor Authentication (“MFA”) across our systems. • System Resilience and Testing: We conduct annual Vulnerability Assessments and Penetration Tests (“VAPT”) to identify and remediate vulnerabilities. Our Disaster Recovery Plan (“DRP”) is also tested annually to ensure business continuity. • Certified Information Security: Our ISMS is compliant with ISO/IEC 27001:2022, ensuring our security posture meets international standards. • Continuous Cybersecurity Capability Development: We conduct ongoing awareness campaigns and training programmes to equip our employees with the knowledge to identify and report cyber threats, making them a critical part of our defence. Risk Trends and Impacts Mitigation Measures KEY RISK & MITIGATION
RkJQdWJsaXNoZXIy NDgzMzc=