Process and Infrastructure
The company has established an information security management system, including the security of personal data, which has been audited and certified in accordance with the ISO/IEC 27001:2022 and ISO/IEC 27701:2019 standards.
GC also conducts reviews and audits of systems and practices relating to information security and data privacy management by an internal audit function at least four times per year and external audits (by a third-party entity) on an annual basis to test for vulnerabilities in information security. Based on the assessment of the past year, GC’s information and cyber processes and infrastructures were in compliance with relevant standards, and no non-conformities were detected. In addition, the Company performs information security vulnerability testing at least once a month and conducts penetration testing at least once a year.
In addition, GC manages cyber risks in accordance with the NIST Framework to enhance security across all levels of the organisation. The framework is divided into six areas, with notable information security and cyber control projects in 2025 as follows:
NIST framework and key projects in 2025
| No. | Process | Key information security and cybersecurity control projects in 2025 |
|---|---|---|
| 1. | Govern |
|
| 2. | Identify | GC has conducted a cybersecurity operations assessment against the NIST Cybersecurity Framework version 2.0 to improve cybersecurity operations. |
| 3. | Protect |
|
| 4. | Detect |
|
| 5. | Respond | GC continuously prepares for abnormal situations by conducting cybersecurity incident response drills that simulate attacks on Information Technology (IT) systems, as well as reviewing and updating the Cybersecurity Incident Response Plan to respond to and mitigate potential incidents. |
| 6. | Recover |
|
Information security and cybersecurity performance results
| Year | Target | |||||
|---|---|---|---|---|---|---|
| 2022 | 2023 | 2024 | 2025 | 2025 | ||
| No. of cybersecurity incidents | 0 | 0 | 0 | 0 | 0 | |
| No. of complaints about information insecurity | 0 | 0 | 0 | 0 | 0 | |
| Total Number of Information Security Breach | 0 | 0 | 0 | 0 | 0 | |
| Total number of clients, customers and employees affected by the breach | 0 | 0 | 0 | 0 | 0 | |