|We help you identify, reduce, and eliminate risks to your
GOVERNANCE AND COMPLIANCE
Risk Tolerance Determination
Risk Tolerance Determination consists of identifying the extent to which the organization is
prepared to experience losses or opportunity costs in the effort to achieve organizational
- Unrelated organization Income Tax (UBIT)Analysis
Unrelated organization Income Tax (UBIT)Analysis consists of evaluating income coming
from trade or organization that is regularly carried on and not substantially related to the
charitable, educational, or other purpose that is the basis of the organization’s exemption
- Sarbanes-Oxley Readiness Assessment
Sarbanes-Oxley Readiness Assessment consists of building a sustainable, comprehensive
internal control environment sufficient to comply with the section 404 of the
Sarbanes-Oxley act of 2002.
- Compliance Training
Compliance training consists of educating employees (such as boards, committees and
responsible managers) on laws, regulations and company policies that apply to their
day-to-day job responsibilities. This is to avoid and detect violations by employees that could
lead to legal liability for the organization.
- Governance Operating Model Development
Governance Operating Model Development consists of designing and implementing the
governance and compliance structure that may assist the board and
management in fulfilling their governance roles.
- Executive Remuneration Schemes Calibration
Executive Remuneration Schemes Calibration consists of critical review in the existing
executive compensation plans to seek more transparent compensation processes.
- Advanced Sensitivity Analysis
Advanced Sensitivity Analysis consists of determining how programed performance is
affected by the changes in assumptions using advanced modeling and simulation
techniques (often used for testing computer systems and IT scenarios).
- Debt Repayment Evaluation
Debt Repayment Evaluation consists of showing debt repayment capability, given different
repayment options and different organization conditions.
Debt Covenants Breach Analysis
Debt Covenants Breach Analysis consists of understanding and assessing the risk of
breaching debt covenants.
- Risk Management Benchmarking
Risk Management Benchmarking consists of evaluating an organisation’s current approach
to risk management against global and industry peer groups.
- Risk Management Evaluation
Risk Management Evaluation consists of assessing the most appropriate strategy for
managing risk to minimize, monitor, and control the probability and/or impact of unfortunate
- Risk Management Culture Evaluation
Risk Management Culture Evaluation consists of assessing the risk management culture and
how it may be improved and sustained within the organization.
- Enterprise Risk Framework Review
Enterprise Risk Framework Review consists of complex risk framing, decision analysis and
diagnostic review of an organization’s risk frameworks.
- Risk Identification
Risk Identification consists of identifying key risks impacting the execution of the organization
plan and assessing the effectiveness of overall risk management.
- Risk Quantification
Risk Quantification consists of improving the quantification and measurement of risks, risk
probability and its impact.
- Risk Analysis
Risk Analysis refers to the assessment of uncertainty about forecasted future cash flows
streams, variance of portfolio/stock returns, statistical analysis to determine the probability
of a program’s success or failure, and possible future economic states.
- Insurance Needs Analysis
Insurance needs analysis consists of reviewing the insurance and self insurance strategies
through risk finance and insurance assessments.
- Post Incident Review
Post Incident Review consists of evaluating what happened and why after every major
incident. This helps to reduce the probability of recurrence and improve response activities
INFORMATION TECHNOLOGY AND REVIEW
- Database Security Controls Review
Database Security Controls Review consist of evaluating the information security controls
implemented by an organization. Database Security Controls protect databases (potentially
including the data, the database applications or stored functions, the database systems, the
database servers and the associated network links) against compromises of their
confidentiality, integrity and availability.
- IT General Controls Review
IT General Controls Review consists of gaining an overall impression of the controls that are
present in the environment surrounding the information systems. These include the
organizational and administrative structure of the IS function, the existence of policies and
procedures for the day-to-day operations, availability of staff and their skills and the overall
- IT Application Controls Review
IT Application Controls Review consists of evaluating the subset of internal controls that
relate to an application system and the information managed by that application. These
include manual and automated activities that ensure that information conforms to certain
criteria as business requirements. These criteria are effectiveness,efficiency,confidentiality,
integrity, availability, compliance and reliability.