forked from Git/hugo-story
59 lines
4.9 KiB
HTML
59 lines
4.9 KiB
HTML
|
<!-- Additional Elements -->
|
||
|
<section class="wrapper style1 align-center" id="risk-intelligence-solutions">
|
||
|
<div class="inner">
|
||
|
<h1>Risk Intelligence Solutions</h1>
|
||
|
<div class="box">
|
||
|
<p>Geographical areas of expertise: <strong>Southeast Asia</strong> (Cambodia, Indonesia, Laos, Malaysia, Myanmar, Singapore, Thailand, Vietnam), <strong>South Asia</strong> (India, Pakistan, Bangladesh), the <strong>Near East</strong> and <strong>North Africa</strong>, the <strong>Middle East</strong> (the Arabian Peninsula, Iran, Iraq) and <em>some</em> countries of <strong>Western Africa</strong>.</p>
|
||
|
</div>
|
||
|
<div class="index align-left">
|
||
|
|
||
|
<!-- Definition List -->
|
||
|
<section>
|
||
|
<header>
|
||
|
<h3>Solutions</h3>
|
||
|
</header>
|
||
|
<div class="content">
|
||
|
|
||
|
<dl>
|
||
|
<dt>Asset Protection, Tracking and Recovery</dt>
|
||
|
<dd>
|
||
|
<ul class="alt">
|
||
|
<li>Assess and mitigate economic, security and criminal risks associated with business operations</li>
|
||
|
<li>Identify risks of loss caused by flawed or failed processes, policies, systems or events that disrupt business operations</li>
|
||
|
<li>Secure assets that are mission-critical and business-critical, including both intellectual property and physical assets</li>
|
||
|
<li>Trace assets, identify and map beneficial owners and structures, and design recovery strategies</li>
|
||
|
<li>Align the asset governance structure with the objectives of the business</li>
|
||
|
</ul>
|
||
|
</dd>
|
||
|
<dt>Strategic Risk Intelligence and Investigations</dt>
|
||
|
<dd>
|
||
|
<ul class="alt">
|
||
|
<li>Background check, due diligence, enhanced due diligence, business counter-intelligence</li>
|
||
|
<li>Intellectual Property rights infringement investigation & enforcement, fraud and counterfeiting search</li>
|
||
|
<li>Identify competitive strategies, regulatory or government interference, corruption, crime, fraud and intellectual property theft risks</li>
|
||
|
<li>Provision of actionable intelligence through advanced research and analysis, sourcing and developing human resources, and collecting non-public information</li>
|
||
|
|
||
|
<li>Design and implement effective intelligence collection methodologies</li>
|
||
|
|
||
|
|
||
|
</ul>
|
||
|
</dd>
|
||
|
<dt>Information Security and Forensics</dt>
|
||
|
<dd>
|
||
|
<ul class="alt">
|
||
|
<li>Enforce the confidentiality, integrity, and availability of information systems and assets</li>
|
||
|
<li>Secure information systems assets that are mission-critical and business-critical</li>
|
||
|
<li>Perform business impact analysis, threat modeling, identify methods of attack, assess and mitigate information security risks, reduce the impact of security breaches</li>
|
||
|
<li>Enhance security posture, adopt defensive strategies, adopt industry standards, raise cybersecurity awareness and train end users</li>
|
||
|
</ul>
|
||
|
</dd>
|
||
|
</dl>
|
||
|
</div>
|
||
|
</section>
|
||
|
</div>
|
||
|
<ul class="actions stacked">
|
||
|
<li><a href="#contacts" class="button">Contact Us</a></li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
</section>
|