IT internal audit resourcing
We work with our clients to achieve their internal audit objectives through co-sourcing, outsourcing, or bespoke models, in line with their business needs.
IT due diligence
In the event of mergers and acquisitions, we provide deep drill-downs and specific insights on the technology environment to help boards and investors make informed decisions, as part of buy-side or sell-side requirements.
Service organizations controls reporting
We provide independent assurance on the controls implemented by service organizations providing services to user organizations. Service organizations demonstrate their internal control environment for gaining business confidence from their existing or prospective customers. We assist our clients in gaining assurance in line with applicable standards such as AAF 01/06 ICAEW, AICPA SSAE18 (supersedes SSAE16) or ISAE 3402 (referred as SOC1), or AICPA AT101 (SOC2 or SOC3), or ISAE 3000. Our services cover design (Type 1 report) and operating effectiveness (Type 2 report) of controls at service organizations.
HITRUST compliance services
We offer HITRUST CSF compliance services in healthcare across a range of industries to help your organization gain peace of mind around your data integrity.
Diagnostic assessments
Our diagnostic assessments help clients understand the control gaps in their IT environment and improve the overall technology risk framework. We cover a range of specific risk areas such as cybersecurity, data privacy, IT strategy and capability, business continuity and disaster recovery, data quality, information governance, and data protection/GDPR, against leading industry practices.
Control optimization
We help clients evaluate and streamline their existing control frameworks in the organization.
Independent project assurance
We can act as an independent advisor to management and project boards for the effective implementation of new systems and projects, by identifying and mitigating project risks before they arise.
Application reviews
We assist clients in reviewing their business applications to assess the control environment within systems to address specific business or process risks. The review includes access reviews, configurations and setups, master data set up, transactions, and interfaces. Our recommendations are used for enhancing functionality, security, and control environment within applications.
This website uses cookies.
Some of these cookies are necessary, while others help us analyse our traffic, serve advertising and deliver customised experiences for you.
For more information on the cookies we use, please refer to our Privacy Policy.
-
This website cannot function properly without these cookies.
-
Analytical cookies help us enhance our website by collecting information on its usage.
-
We use marketing cookies to increase the relevancy of our advertising campaigns.