top of page


Information &

Technology Risk


Cybersecurity &



  • Assessment of the information risks to people, processes, technology, and determining the likelihood and impact of the risk events, tolerance, and the threat environment

  • Audit the implementation, adequacy, and effectiveness of the security controls, existing safeguards and vulnerabilities,

  • Advisory to management on risk management matters, and as an independent reviewer to provide assurance on management’s capability and performance in risk management.


  • Creating organizational Cybersecurity awareness

  • Improving mechanisms for Authentication and Authorization

  • Strengthening End-Point protection (desktops, laptops, mobile devices, PDAs)

  • Conducting Penetration Tests

  • Improving Patch Management, Log Monitoring and Security Incident Response processes

SWIFT CSP Compliance

  • Expertise in providing cyber security and audit services to global financial institutions and central banks

  • Identify any gaps within the SWIFT CSCF requirements and propose a timely remediation for the independent assessment results to be compliant

  • Review companies documented policies, processes, business practices, and technical controls

  • Conduct stakeholder meetings with security and technology run teams

  • Provide final documentation

Data Privacy & 


  • Establishing and implementing security-related policies

  • Overseeing regulatory compliance and ensuring data privacy

  • Establishing and overseeing the organization's security architecture

  • Supervising identity and access management

  • Establishing business continuity and disaster recovery

  • Conducting electronic discovery and digital forensic investigations

bottom of page