<!-- Additional Elements -->
                <section class="wrapper style1 align-center" id="risk-intelligence-solutions">
                    <div class="inner">
                        <h1>Risk Intelligence Solutions</h1>
                        <div class="box">
                           <p>Geographical areas of expertise: <strong>Southeast Asia</strong> (Cambodia, Indonesia, Laos, Malaysia, Myanmar, Singapore, Thailand, Vietnam), <strong>South Asia</strong> (India, Pakistan, Bangladesh), the <strong>Near East</strong> and <strong>North Africa</strong>, the <strong>Middle East</strong> (the Arabian Peninsula, Iran, Iraq) and <em>some</em> countries of <strong>Western Africa</strong>.</p>
                        </div>   
                        <div class="index align-left">

                            <!-- Definition List -->
                                <section>
                                    <header>
                                        <h3>Solutions</h3>
                                    </header>
                                    <div class="content">

                                        <dl>
                                            <dt>Asset Protection, Tracking and Recovery</dt>
                                            <dd>
                                                <ul class="alt">
                                                    <li>Assess and mitigate economic, security and criminal risks associated with business operations</li>                                            
                                                    <li>Identify risks of loss caused by flawed or failed processes, policies, systems or events that disrupt business operations</li>
                                                    <li>Secure assets that are mission-critical and business-critical, including both intellectual property and physical assets</li>
                                                    <li>Trace assets, identify and map beneficial owners and structures, and design recovery strategies</li>
                                                    <li>Align the asset governance structure with the objectives of the business</li>
                                                </ul>
                                            </dd>
                                            <dt>Strategic Risk Intelligence and Investigations</dt>
                                            <dd>
                                                <ul class="alt">
                                                    <li>Background check, due diligence, enhanced due diligence, business counter-intelligence</li>
                                                    <li>Intellectual Property rights infringement investigation & enforcement, fraud and counterfeiting search</li>
                                                    <li>Identify competitive strategies, regulatory or government interference, corruption, crime, fraud and intellectual property theft risks</li>
                                                    <li>Provision of actionable intelligence through advanced research and analysis, sourcing and developing human resources, and collecting non-public information</li>                                            
                                                    
                                                    <li>Design and implement effective intelligence collection methodologies</li>


                                                </ul>
                                            </dd>
                                            <dt>Information Security and Forensics</dt>
                                            <dd>
                                                <ul class="alt">
                                                    <li>Enforce the confidentiality, integrity, and availability of information systems and assets</li>
                                                    <li>Secure information systems assets that are mission-critical and business-critical</li>
                                                    <li>Perform business impact analysis, threat modeling, identify methods of attack, assess and mitigate information security risks, reduce the impact of security breaches</li>
                                                    <li>Enhance security posture, adopt defensive strategies, adopt industry standards, raise cybersecurity awareness and train end users</li>
                                                </ul>
                                            </dd>
                                        </dl>
                                    </div>
                                </section>
                        </div>
                        <ul class="actions stacked">
                            <li><a href="#contacts" class="button">Contact Us</a></li>
                        </ul>   
                    </div>  
                </section>