Our offer includes a wide range of high-end services for
companies across industries
Companies' lives are not limited to doing business. They have countless laws to comply with, mandatory regulators requirements to meet, stakeholders to please. They also face soft challenges, such as finding their own identity, creating a better working environment, leveraging data to enhance governance and management, etc. With new competitors springing up every day, flexibility is the key to success. Smart Companies free themselves from unnecessary hassle by relying on third parties to resolve the most challenging of their concerns.
Whether you're in the public sector, or in the agriculture business, a financial institution or a tech pioneer, an energy giant or a learning provider, when it comes to attracting and retaining more customers, design a flexible yet performant control environment, survive in adverse circumstances, adapt to an increasingly digitized world, you need to be able to create a variety of plans and test, iterate, and ship what works. You need to stay up to date with important regulations. You need to be able to capture and understand relevant performance data and get insights to improve revenue generation and your business operations. You need to reduce exposition to cybercrime. You need to successfully structure your financing. Your need to know and manage your risk appetite. You need to successfully run your business through times of sinister. You need excellence.
Our catalogue contains solutions for Banks and Financial Institutions, IT and Data as well as custom-tailored training solutions.
Building your Risk Appetite Framework
Banking regulators anticipate that financial institutions will establish a risk appetite framework that is annually approved, overseen, and evaluated by their governing body and executed by their management body.
The risk appetite framework defines the level and type of risk that a financial institution is willing and able to assume in its exposures and operations, given its strategic and operational objectives and obligations. The risk appetite framework is an integral and critical part of the decision-making process. It is used for budget discussions with the various business lines, risk units and subsidiaries.
We support you in the end-to-end development of your risk appetite framework by helping you to:
- facilitate strategic dialogue between your Board and your executive body
- identify the desired risk levels
- identify the levels of unwanted risks
- formulate your risk tolerance
- determine risk limits in relation to your current and forecasted level of equity capital
- formulate your risk appetite statement
- communicate your risk appetite
- and set up a system for monitoring and reporting on the framework
Internal Capital Adequacy Assessment Process and Internal Liquidity Adequacy Assessment Process
Inadequate and low-quality capital frequently exacerbates the extent and severity of financial shocks in the banking sector. This was the case during the recent financial crisis, which forced banks to rebuild their capital bases at the most inopportune time.
ICAAP therefore plays a crucial role in the risk management of credit institutions.
According to the European Central Bank (ECB), "The Internal Capital Adequacy Assessment Process (ICAAP) and the Internal Liquidity Adequacy Assessment Process (ILAAP) are key risk management tools for credit institutions. If reliable, these processes can make a substantial contribution to the calculation of capital and liquidity requirements as part of the supervisors' review and assessment process."
As part of the ICAAP, credit institutions are expected to assess and quantify all risks that may have a significant impact on their capital or earnings, to reach a conclusion on their capital adequacy and to ensure capital adequacy from a global perspective over the long, medium and short term.
We will help you setup the essential elements of your ICAAP:
- Governance structure
- Scope in terms of risks and perimeter covered
- Time horizon
- Diversification assumptions
- Confidence levels
- Holding periods
Development and Update of your Risk Mapping
A risk map is a graphic representation of the risks related to an entity or a project, and their impact. It is an important management tool with multiple uses:
- Identification of the major risks impacting the company's activities
- Identification of risk sources and threat paths
- Implementation of mitigation or elimination actions for identified risks
To implement your risk mapping, we perform the following steps:
- Definition of the scope of the mapping: Determination of the scope of the study to be performed and the processes/data/tools or assets that will be included. Setting up the project teams on the client's side and ours. Determination of the security baseline, the feared events and the impact scales.
- Determination of risk sources and threat paths. Definition of risk scenarios.
- Definition of risk treatment strategies and security measures.
Our team will create a risk mapping based on the nature of your activities, your size and goals. We always take the time to listen to you in order to make a proposal tailored to your needs.
Development of your Preventive Recovery Plan
Within the WAMU zone, Circular n°001-2020/CB/C establishes the obligation to develop a Preventive Recovery Plan. This obligation applies to Finance Companies, Credit Institutions (including parent credit institutions), Electronic Money Institutions, microfinances supervised by the WAMU Banking Commission, or any other entity under the supervision of the WAMU Banking Commission.
A Preventive Recovery Plan must outline the steps taken by institutions to identify and respond to a severe worsening of their financial situation or that of the Group to which they belong, while maintaining the continuity of "essential" functions.
Our team of financial and risk management experts will assist you in developing your Preventive Recovery Plan in compliance with the Regulator's requirements.
Information Systems Audit
Why audit your information system?
The information system is often composed of several layers:
- The physical layer (physical access to premises, vaults and computer rooms, workstations, documents and files, network infrastructures, etc.)
- The logical layer (applications, operating systems, internet, networks)
- The data layer (databases)
Errors or anomalies on each of these layers can lead to substantial damage and high financial costs. A regular audit of information systems makes it possible to detect anomalies and monitor their correction over time.
Content of our Offer
We will perform an audit of your information system according to your needs. Our audit can cover several aspects:
- Audit of your IT General Controls
- Audit of your applications
- Security audit
Audit of your IT General Controls: Audit of ITGC is the basis of an information systems audit. It is usually carried out during statutory audits but can be performed at your request. It covers the following four (4) aspects: Access to programs and data - Change management - Project management - IT operations.
Audit of applications: Application audit involves reviewing the quality of data relating to your business applications (depending on the scope of the mission defined by mutual agreement), significant configurations, transaction logs, access protocols, compliance with supervisors' requirements, and the operational effectiveness of controls implemented within these applications.
Security audit: We will perform a general security audit based on the ISO 27x standard and best practices from NIST and COBIT5 framework. The scope of this mission will depend on your company's expectations.
Deliverables
- For the audit of general IT controls and applications: a detailed report of risks/vulnerabilities and suggestions.
- For the security audit: a detailed report of risks/vulnerabilities and suggestions.
Developing your Information Systems Security Policy (ISSP)
The Information Systems Security Policy (ISSP) defines the security policy of a specific entity which can be a technological system, an automated function or an application but also an entire organization such as a company, a ministerial department, etc. It is a body of coherent rules established to maintain security at a given level.
The ISSP provides a consistent framework:
- For integration of security in designing information systems (mobile applications, business software developed internally or by a service provider, purchase of applications or equipment, etc.),
- To the company's activities and stakeholders in relation to which any change in the information systems must be justified,
- To help those responsible for developing and implementing coherent measures, instructions and procedures ensure the security of information systems.
Our approach
We shall take the subsequent actions:
- Documentation evaluation and formation of your reference team
- Formulation of strategic elements
- Selection of the principles and formulation of the rules
- Presentation of the final document
The mission will last at least four (4) months and will be proportionate to the specified deliverables and the study's scope.
Deliverables
- An information systems security policy (ISSP) detailing ISO27001-compliant measures and their implementation as rules (default deliverable),
- An optional document, the general information systems security policy (PGSSI), provided to facilitate the validation of the ISSP by your board of directors, which only includes the titles of the selected rules and does not detail them (default deliverable),
- An information security management policy (PMSI) that formalizes the organization of information security management within the company (available upon request; additional fees apply),
- A matrix that links the ISSP rules to the business domains they impact (available upon request; additional fees apply),
- An action plan template for the implementation of an Information Security Management System (ISMS) (available upon request; additional fees apply).
Developing or Updating your Business Continuity Plan (BCP)
A business continuity plan (BCP) describes the strategy and all the measures that are planned to guarantee the recovery and continuity of an organization's activities following a disaster or an event that seriously disrupts its normal operations. It must enable the organization to meet its external (legislative or regulatory, contractual) or internal obligations (risk of market loss, survival of the company, image, etc.) and to achieve its objectives.
The development of a BCP involves the following steps:
- Define the context and scope of the BCP,
- Identify the organization's objectives and obligations within the scope,
- Formulate continuity requirements to facilitate the achievement of objectives and the respect of obligations,
- Identify the crisis scenarios that justify a continuity approach and define an order of priority among them,
- Confront continuity requirements with the selected scenarios,
- Design and formalize a continuity strategy (and recovery strategy) to respond to the selected scenarios,
- Define, within the strategy, the priorities in terms of resources and procedures,
- Define the roles of the various people responsible for implementing the resources and procedures within the prescribed timeframe,
- Design and implement the plan's verification, control, and ongoing evolution.
The Business Continuity Plan can be global or broken down by major activity lines, by location or by risk. Additionally, it is crucial that the BCP be tested and that an awareness campaign be run concurrently with its creation. The Business Continuity Plan (BCP) is governed by the ISO 22301 international standard.
Deliverables
At the end of the designing process summarized above, you will receive two (2) main documents: A Business Continuity Plan (BCP) and an IT Continuity Plan (ICP).
Developing or updating your IT Strategy and Master Plan
The IT master plan is the IT strategic plan of the company. It allows the company to clearly predict the evolution of its information system over a defined horizon. Its objectives can be multiple: urbanization, implementation or improvement of governance, implementation of a dashboard, etc.
Main stages
Steps
Project scope definition
- Definition of the organization of the mission
- Validation of workshops schedule
- Kick-off meeting
Evaluation of the current system
- Mapping of the current IT architecture
- Assessment of the maturity level of IT processes (COBIT)
- Gap analysis by functional area
- Inventory and analysis of ongoing projects
- Summary of the diagnosis
Definition of the target IT architecture
- Definition of the founding principles
- Definition of the Target IS architecture
- Analysis of IS impacts and quotation of scenarios
IS trajectory and communication
- Definition and formalization of the trajectory
- Internal (ISD) and external (MD, Business Units) communication
We work with businesses of all industries
The services we primarily provide to financial institutions, such as risk mapping, preventive recovery plan, risk appetite framework, audit and internal control services, and all data analytics and information system services, are also offered to businesses in all other industries.
We also provide quality financial and administrative solutions to businesses in many industries:
- Valuation of your company in the context of a financing project
- Change of accounting standards
- Detailed financial analysis
- Evaluation of your Board of Directors
- Outsourcing of audit and internal control functions
- Support in the creation of a microfinance institution within the WAMU zone
- Assistance to project management
- Development of your financial and internal control procedures
Institutional trainings
We provide institutional training and have a successful track record in this area. In 2022 and 2023, we will be able to address the following topics:
- Governance
- Risk Management
- Information Systems Audit
- Professional Excel
We are also available to conduct trainings for your Board of Directors.
Your expertise starts here.Hire excellence today!
Download our Solutions Catalog
Don't limit to the Catalog.
Watch our Skills.
We will take the time to understand your requirements and then recommend the best possible solutions.
Conception
Our experts and dedicated teams listen to you and conceptualize your needs.
Turnkey solutions
Then, we suggest a variety of options tailored to your challenges and work with you to design THE solution that best suits your needs.
Implementation
Together with your teams, we will fully implement the adopted solution and monitor it until it is successful.
Continuous education
We make research and continuous education our fundamental principles. Our experts are therefore at the forefront of technology and knowledge in their areas of expertise.
Hire excellence Today
Book a call to learn more about how we can help you solve your challenges.
Work with us