diff --git a/layouts/partials/solutions.html b/layouts/partials/solutions.html new file mode 100644 index 0000000..1f0ac9a --- /dev/null +++ b/layouts/partials/solutions.html @@ -0,0 +1,58 @@ + +
+
+

Risk Intelligence Solutions

+
+

Geographical areas of expertise: Southeast Asia (Cambodia, Indonesia, Laos, Malaysia, Myanmar, Singapore, Thailand, Vietnam), South Asia (India, Pakistan, Bangladesh), the Near East and North Africa, the Middle East (the Arabian Peninsula, Iran, Iraq) and some countries of Western Africa.

+
+
+ + +
+
+

Solutions

+
+
+ +
+
Asset Protection, Tracking and Recovery
+
+
    +
  • Assess and mitigate economic, security and criminal risks associated with business operations
  • +
  • Identify risks of loss caused by flawed or failed processes, policies, systems or events that disrupt business operations
  • +
  • Secure assets that are mission-critical and business-critical, including both intellectual property and physical assets
  • +
  • Trace assets, identify and map beneficial owners and structures, and design recovery strategies
  • +
  • Align the asset governance structure with the objectives of the business
  • +
+
+
Strategic Risk Intelligence and Investigations
+
+
    +
  • Background check, due diligence, enhanced due diligence, business counter-intelligence
  • +
  • Intellectual Property rights infringement investigation & enforcement, fraud and counterfeiting search
  • +
  • Identify competitive strategies, regulatory or government interference, corruption, crime, fraud and intellectual property theft risks
  • +
  • Provision of actionable intelligence through advanced research and analysis, sourcing and developing human resources, and collecting non-public information
  • + +
  • Design and implement effective intelligence collection methodologies
  • + + +
+
+
Information Security and Forensics
+
+
    +
  • Enforce the confidentiality, integrity, and availability of information systems and assets
  • +
  • Secure information systems assets that are mission-critical and business-critical
  • +
  • Perform business impact analysis, threat modeling, identify methods of attack, assess and mitigate information security risks, reduce the impact of security breaches
  • +
  • Enhance security posture, adopt defensive strategies, adopt industry standards, raise cybersecurity awareness and train end users
  • +
+
+
+
+
+
+ +
+