Risk Management

risk management

RISK MANAGEMENT


We help you identify, reduce, and eliminate risks to your
business success.
LEARN MORE

RISK MANAGEMENT

rman-swirl

GOVERNANCE AND COMPLIANCE

  • Risk Tolerance Determination

    Risk Tolerance Determination consists of identifying the extent to which the organization is
    prepared to experience losses or opportunity costs in the effort to achieve organizational
    objectives
  • Unrelated organization Income Tax (UBIT)Analysis

    Unrelated organization Income Tax (UBIT)Analysis consists of evaluating income coming
    from trade or organization that is regularly carried on and not substantially related to the
    charitable, educational, or other purpose that is the basis of the organization’s exemption
  • Sarbanes-Oxley Readiness Assessment

    Sarbanes-Oxley Readiness Assessment consists of building a sustainable, comprehensive
    internal control environment sufficient to comply with the section 404 of the
    Sarbanes-Oxley act of 2002.
  • Compliance Training

    Compliance training consists of educating employees (such as boards, committees and
    responsible managers) on laws, regulations and company policies that apply to their
    day-to-day job responsibilities. This is to avoid and detect violations by employees that could
    lead to legal liability for the organization.
  • Governance Operating Model Development

    Governance Operating Model Development consists of designing and implementing the
    governance and compliance structure that may assist the board and
    management in fulfilling their governance roles.
  • Executive Remuneration Schemes Calibration

    Executive Remuneration Schemes Calibration consists of critical review in the existing
    executive compensation plans to seek more transparent compensation processes.
  • Advanced Sensitivity Analysis

    Advanced Sensitivity Analysis consists of determining how programed performance is
    affected by the changes in assumptions using advanced modeling and simulation
    techniques (often used for testing computer systems and IT scenarios).
  • Debt Repayment Evaluation

    Debt Repayment Evaluation consists of showing debt repayment capability, given different
    repayment options and different organization conditions.
  • Debt Covenants Breach Analysis

    Debt Covenants Breach Analysis consists of understanding and assessing the risk of
    breaching debt covenants.
  • Risk Management Benchmarking

    Risk Management Benchmarking consists of evaluating an organisation’s current approach
    to risk management against global and industry peer groups.
  • Risk Management Evaluation

    Risk Management Evaluation consists of assessing the most appropriate strategy for
    managing risk to minimize, monitor, and control the probability and/or impact of unfortunate
    events
  • Risk Management Culture Evaluation

    Risk Management Culture Evaluation consists of assessing the risk management culture and
    how it may be improved and sustained within the organization.
  • Enterprise Risk Framework Review

    Enterprise Risk Framework Review consists of complex risk framing, decision analysis and
    diagnostic review of an organization’s risk frameworks.
  • Risk Identification

    Risk Identification consists of identifying key risks impacting the execution of the organization
    plan and assessing the effectiveness of overall risk management.
  • Risk Quantification

    Risk Quantification consists of improving the quantification and measurement of risks, risk
    probability and its impact.
  • Risk Analysis

    Risk Analysis refers to the assessment of uncertainty about forecasted future cash flows
    streams, variance of portfolio/stock returns, statistical analysis to determine the probability
    of a program’s success or failure, and possible future economic states.
  • Insurance Needs Analysis

    Insurance needs analysis consists of reviewing the insurance and self insurance strategies
    through risk finance and insurance assessments.
  • Post Incident Review

    Post Incident Review consists of evaluating what happened and why after every major
    incident. This helps to reduce the probability of recurrence and improve response activities

INFORMATION TECHNOLOGY AND REVIEW

  • Database Security Controls Review

    Database Security Controls Review consist of evaluating the information security controls
    implemented by an organization. Database Security Controls protect databases (potentially
    including the data, the database applications or stored functions, the database systems, the
    database servers and the associated network links) against compromises of their
    confidentiality, integrity and availability.
  • IT General Controls Review

    IT General Controls Review consists of gaining an overall impression of the controls that are
    present in the environment surrounding the information systems. These include the
    organizational and administrative structure of the IS function, the existence of policies and
    procedures for the day-to-day operations, availability of staff and their skills and the overall
    control environment.
  • IT Application Controls Review

    IT Application Controls Review consists of evaluating the subset of internal controls that
    relate to an application system and the information managed by that application.  These
    include manual and automated activities that ensure that information conforms to certain
    criteria as business requirements. These criteria are effectiveness,efficiency,confidentiality,
    integrity, availability, compliance and reliability.