This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print page

Technology Risk Advisory

The Technology Risk Advisory includes the following service offerings:


IT Governance

We are at the forefront in assisting our clients with their IT Governance concerns. Our product in the spotlight assists clients to reduce IT costs and spending by optimising their current IT processes.


We also assist clients to ensure that they are obtaining maximum benefit from their investment in IT by examining the key IT processes that support the organisation in achieving its business goals.


King III has recently taken centre stage with the release of the draft standard. To this end, we are already well equipped with a King III assessment tool for IT Governance to assist clients in implementing or assessing King III practices.


We also provide IT process maturity assessments and implementations by leveraging off best practice frameworks like COBIT and ITIL.


Business continuity management (BCM)

In a Deloitte survey of information gathered from the top 1000 global organisations over a 10 year period, almost half of them suffered share price declines of more than 20% within one month. Some of the greatest losses were caused by exceptional events such as the Asian financial crisis, the bursting of the technology bubble, and the September 11th terrorist attacks. Yet many firms apparently fail to plan for these rare but high-impact risks. (“Disarming the Value Killers”, a research paper by Deloitte).


The business case for Business Continuity Management (BCM) is thus self evident. BCM is about much more than backing up data to tapes and restoring from these tapes, in fact it is about ensuring that your products and services of your business, is available to clients, even when your business is in the midst of an unplanned disruption. Furthermore, it is about having a competitive advantage because you have planned for the high impact, low likelihood risks.


Project risk services (PRS)

The ultimate objective of organisations is to achieve business goals, and many business today are “project dominant” i.e. they rely on portfolios/programmes/projects to achieve business goals. Portfolios/programmes/projects are the tentacles that enable the business to achieve the desired goals. Understanding the problems, not the symptoms, which cause projects to fail, and being geared to effectively resolve the problems is critical in ensuring business growth and sustainability.


What does PRS offer our clients?


Our PRS professionals have the bigger picture mindset i.e. business success, combined with a robust project risk approach and are dedicated to assisting the operational enablers (portfolios/program/projects) to be successful, ultimately contributing positively to the business.


We do this by:


  • Performing regular Project Assessments to identify and mitigate project risks;
  • Assisting organisations improve project management, control and IT governance processes;
  • Performing on-going project oversight and independent verification and validation services to identify risks and status issues, recommend improvement strategies and assist in mitigation of project control gaps;
  • Working with organisations to enhance change control tools and methods;
  • Working with organisations and with client projects teams to enhance software development, testing and implementation practices; and
  • Performing pre- and/or post- implementation reviews.


Security and privacy services

Security issues have a potentially significant impact on business and can result not just in financial losses, but damage to reputation and operational downtime. In addition, demonstrating system security, regulatory compliance and good governance is now expected by customers, partners and shareholders alike. Loss of sensitive data stored on disks and memory sticks, sale of personal information by outsourced companies and daily incidents of identity theft and fraud all underline the fact that companies today need to analyse how to improve security through the implementation of cost effective security controls aligned with business risk.

Cyber Security Round Table

IT-Business Balance Survey 2011

Stay connected: