forked from Git/hugo-story
		
	
		
			
				
	
	
		
			59 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
			
		
		
	
	
			59 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
				<!-- Additional Elements -->
 | 
						|
                <section class="wrapper style1 align-center" id="risk-intelligence-solutions">
 | 
						|
                    <div class="inner">
 | 
						|
                        <h1>Risk Intelligence Solutions</h1>
 | 
						|
                        <div class="box">
 | 
						|
                           <p>Geographical areas of expertise: <strong>Southeast Asia</strong> (Cambodia, Indonesia, Laos, Malaysia, Myanmar, Singapore, Thailand, Vietnam), <strong>South Asia</strong> (India, Pakistan, Bangladesh), the <strong>Near East</strong> and <strong>North Africa</strong>, the <strong>Middle East</strong> (the Arabian Peninsula, Iran, Iraq) and <em>some</em> countries of <strong>Western Africa</strong>.</p>
 | 
						|
                        </div>   
 | 
						|
                        <div class="index align-left">
 | 
						|
 | 
						|
                            <!-- Definition List -->
 | 
						|
                                <section>
 | 
						|
                                    <header>
 | 
						|
                                        <h3>Solutions</h3>
 | 
						|
                                    </header>
 | 
						|
                                    <div class="content">
 | 
						|
 | 
						|
                                        <dl>
 | 
						|
                                            <dt>Asset Protection, Tracking and Recovery</dt>
 | 
						|
                                            <dd>
 | 
						|
                                                <ul class="alt">
 | 
						|
                                                    <li>Assess and mitigate economic, security and criminal risks associated with business operations</li>                                            
 | 
						|
                                                    <li>Identify risks of loss caused by flawed or failed processes, policies, systems or events that disrupt business operations</li>
 | 
						|
                                                    <li>Secure assets that are mission-critical and business-critical, including both intellectual property and physical assets</li>
 | 
						|
                                                    <li>Trace assets, identify and map beneficial owners and structures, and design recovery strategies</li>
 | 
						|
                                                    <li>Align the asset governance structure with the objectives of the business</li>
 | 
						|
                                                </ul>
 | 
						|
                                            </dd>
 | 
						|
                                            <dt>Strategic Risk Intelligence and Investigations</dt>
 | 
						|
                                            <dd>
 | 
						|
                                                <ul class="alt">
 | 
						|
                                                    <li>Background check, due diligence, enhanced due diligence, business counter-intelligence</li>
 | 
						|
                                                    <li>Intellectual Property rights infringement investigation & enforcement, fraud and counterfeiting search</li>
 | 
						|
                                                    <li>Identify competitive strategies, regulatory or government interference, corruption, crime, fraud and intellectual property theft risks</li>
 | 
						|
                                                    <li>Provision of actionable intelligence through advanced research and analysis, sourcing and developing human resources, and collecting non-public information</li>                                            
 | 
						|
                                                    
 | 
						|
                                                    <li>Design and implement effective intelligence collection methodologies</li>
 | 
						|
 | 
						|
 | 
						|
                                                </ul>
 | 
						|
                                            </dd>
 | 
						|
                                            <dt>Information Security and Forensics</dt>
 | 
						|
                                            <dd>
 | 
						|
                                                <ul class="alt">
 | 
						|
                                                    <li>Enforce the confidentiality, integrity, and availability of information systems and assets</li>
 | 
						|
                                                    <li>Secure information systems assets that are mission-critical and business-critical</li>
 | 
						|
                                                    <li>Perform business impact analysis, threat modeling, identify methods of attack, assess and mitigate information security risks, reduce the impact of security breaches</li>
 | 
						|
                                                    <li>Enhance security posture, adopt defensive strategies, adopt industry standards, raise cybersecurity awareness and train end users</li>
 | 
						|
                                                </ul>
 | 
						|
                                            </dd>
 | 
						|
                                        </dl>
 | 
						|
                                    </div>
 | 
						|
                                </section>
 | 
						|
                        </div>
 | 
						|
                        <ul class="actions stacked">
 | 
						|
                            <li><a href="#contacts" class="button">Contact Us</a></li>
 | 
						|
                        </ul>   
 | 
						|
                    </div>  
 | 
						|
                </section>
 |