PwC
Speciality: Comprehensive Penetration Testing including Red Teaming, Web Application, Infrastructure/Network, Mobile Application, OT/ICS, and IoT Hardware Hacking
PwC (PricewaterhouseCoopers LLP) is a professional services firm with 120,836 employees and $55.4B annual revenue, based in Charlotte, NC; offers assurance, tax, advisory, and cybersecurity penetration testing services, including Red Teaming, Web, Infrastructure, Mobile, OT/ICS, and IoT Hacking, recognized as a CHECK-approved provider.
ISO/IEC 27001: Information Security Management System Certification
Origin
ISO/IEC 27001 was developed jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), first published in 2005 and most recently updated in 2022. It evolved from the British Standard BS 7799, which was created in the 1990s by the UK government and industry experts to address growing information security concerns. The standard was developed to provide organizations with a systematic framework for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS), helping them protect sensitive data in an increasingly digital business environment.
Industry Value and Importance
ISO/IEC 27001 is globally recognized as the gold standard for information security management, valued because it demonstrates an organization's commitment to protecting confidential information through risk-based controls and continuous improvement. The certification is particularly important for organizations handling sensitive data, as it helps them comply with legal and regulatory requirements, win contracts (especially with government entities and large enterprises), and build customer trust. Many industries require or strongly prefer vendors with ISO 27001 certification, as it provides independent verification that appropriate security controls are in place, reducing the risk of data breaches and ensuring business continuity in the face of evolving cybersecurity threats.
SOC 2 Certification Overview
Origin
SOC 2 (Service Organization Control 2) was developed by the American Institute of Certified Public Accountants (AICPA) in 2011 as part of their Service Organization Control reporting framework. It was created to address the growing need for standardized security evaluations as businesses increasingly moved to cloud-based services and outsourced IT operations. The AICPA developed SOC 2 to provide a framework that service providers could use to demonstrate their commitment to protecting customer data across five "Trust Service Criteria": security, availability, processing integrity, confidentiality, and privacy.
Industry Value
SOC 2 certification has become a critical trust signal in the technology and service provider industry, particularly for SaaS companies, cloud hosting providers, and data centers. Organizations value SOC 2 compliance because it provides third-party validation that a vendor has implemented appropriate controls to protect sensitive data, reducing the risk and liability associated with outsourcing. For service providers, achieving SOC 2 compliance is often a competitive necessity, as many enterprise customers and partners require it before entering into business relationships. The certification helps streamline vendor security assessments, as clients can rely on the audited report rather than conducting their own lengthy security reviews.
CREST Cybersecurity Certification
Origin
CREST (Council of Registered Ethical Security Testers) was established in 2006 in the United Kingdom by a group of cybersecurity professionals and industry representatives. It was created to address the growing need for standardized, recognized qualifications in penetration testing and cybersecurity services. The organization emerged from concerns about the quality and professionalism of security testing services, aiming to provide a framework that would certify both individual practitioners and the companies that employ them.
Industry Value
CREST certifications are highly valued in the cybersecurity industry because they demonstrate a practitioner's technical competence and adherence to professional ethical standards. Many government agencies, financial institutions, and large corporations specifically require CREST-certified professionals when procuring penetration testing or security assessment services. The certification provides assurance to employers and clients that certified individuals have been independently verified to possess the necessary skills and knowledge, and that they follow established codes of conduct. This makes CREST credentials particularly important for cybersecurity professionals working in regulated industries or seeking to work with organizations that have stringent security requirements.
CHECK Certification
The CHECK (CHecklist Evaluating Computers and Key security) scheme was established by CESG (the UK government's National Technical Authority for Information Assurance, now part of the National Cyber Security Centre) in 1997. It was created to provide a structured framework for conducting information technology security assessments and penetration testing within UK government and critical national infrastructure environments. The scheme was designed to ensure that individuals performing security testing on sensitive systems possessed verified skills and adhered to established standards and methodologies.
The CHECK certification is highly valued because it represents government-endorsed validation of a security professional's ability to conduct rigorous, methodical security assessments. Organizations handling sensitive government data or operating within critical national infrastructure sectors often require CHECK-certified testers to ensure compliance with UK security standards. The certification's importance stems from its strict vetting process, which includes security clearance requirements and demonstration of technical competency, making CHECK holders trusted to access and test sensitive systems where standard commercial certifications may not suffice.
- Bank of America
- American International Group
- Chase
- Goldman Sachs
- Prudential Financial
- IBM
- United Technologies
- Ford Motor Co
- Johnson & Johnson
- Caterpillar
- Dell
- Merck
- Exxon
- CIT Group
- Interpublic Group
- Chevron
- Exelon
- Johnson Controls
- Freddie Mac
- American Express
- Allergan
- Cisco Systems
- Thomson Reuters
- OneMain Holdings
- Phillip Morris International
- PNC Financial Services Group
- Xerox
- Walt Disney
- Platform Specialty Products Corporation
- Thermo Fisher Scientific
- Alere Inc.
- Mondelez International
- XL Capital
- 3M Co.
- Acronic Inc.
- Laureate Education
- Inc.
- El Dupont de Nemours
- L3 Technologies
- Schlumberger
- Hertz Global
- Raytheon
- Assurant Inc.
- Ingersoll-Rand
- Ecolab
- Ball Corporation
- Cigna Corporation
- Viacom
- CBS Inc.
- Goodyear Tire
- Endo International
- General Electric
- Sinopec Group
- Toyota Motor