1
0
forked from Git/hugo-story
agr.asia/layouts/partials/solutions.html

59 lines
4.9 KiB
HTML
Raw Normal View History

2024-04-19 18:16:12 +02:00
<!-- Additional Elements -->
<section class="wrapper style1 align-center" id="risk-intelligence-solutions">
<div class="inner">
<h1>Risk Intelligence Solutions</h1>
<div class="box">
<p>Geographical areas of expertise: <strong>Southeast Asia</strong> (Cambodia, Indonesia, Laos, Malaysia, Myanmar, Singapore, Thailand, Vietnam), <strong>South Asia</strong> (India, Pakistan, Bangladesh), the <strong>Near East</strong> and <strong>North Africa</strong>, the <strong>Middle East</strong> (the Arabian Peninsula, Iran, Iraq) and <em>some</em> countries of <strong>Western Africa</strong>.</p>
</div>
<div class="index align-left">
<!-- Definition List -->
<section>
<header>
<h3>Solutions</h3>
</header>
<div class="content">
<dl>
<dt>Asset Protection, Tracking and Recovery</dt>
<dd>
<ul class="alt">
<li>Assess and mitigate economic, security and criminal risks associated with business operations</li>
<li>Identify risks of loss caused by flawed or failed processes, policies, systems or events that disrupt business operations</li>
<li>Secure assets that are mission-critical and business-critical, including both intellectual property and physical assets</li>
<li>Trace assets, identify and map beneficial owners and structures, and design recovery strategies</li>
<li>Align the asset governance structure with the objectives of the business</li>
</ul>
</dd>
<dt>Strategic Risk Intelligence and Investigations</dt>
<dd>
<ul class="alt">
<li>Background check, due diligence, enhanced due diligence, business counter-intelligence</li>
<li>Intellectual Property rights infringement investigation & enforcement, fraud and counterfeiting search</li>
<li>Identify competitive strategies, regulatory or government interference, corruption, crime, fraud and intellectual property theft risks</li>
<li>Provision of actionable intelligence through advanced research and analysis, sourcing and developing human resources, and collecting non-public information</li>
<li>Design and implement effective intelligence collection methodologies</li>
</ul>
</dd>
<dt>Information Security and Forensics</dt>
<dd>
<ul class="alt">
<li>Enforce the confidentiality, integrity, and availability of information systems and assets</li>
<li>Secure information systems assets that are mission-critical and business-critical</li>
<li>Perform business impact analysis, threat modeling, identify methods of attack, assess and mitigate information security risks, reduce the impact of security breaches</li>
<li>Enhance security posture, adopt defensive strategies, adopt industry standards, raise cybersecurity awareness and train end users</li>
</ul>
</dd>
</dl>
</div>
</section>
</div>
<ul class="actions stacked">
<li><a href="#contacts" class="button">Contact Us</a></li>
</ul>
</div>
</section>