RISK & RESILIENCE
Overview
Our practice strategy with a strong risk bias enables us to apply contemporary technology and best in class practices across industry verticals to offer unique and customized solutions that prioritizes customer expectations.
When the outcomes differ significantly from expectations, organization resort to escalating commitment and irrationally directing resources to the failed course of action. In the current capricious business environment dominated by disruption, we at S P R help businesses to tailor, prioritize and manage risk based on present state capability and maturity resulting in exploring un-tapped potential and securing a competitive edge.
Experience
Earn a living. Make a life.
Why Choose Us?
Baselining
High ROI
Structured Approach
Relationship Building
Digitization
Benchmarking
Our Experts
VIGNARAJAN RAMASWAMY
Partner
PRIYA ANAND
Partner
CATHERINE KALPANA
Partner
Key Offerings
Enterprise Risk Management
Risk Based Internal Audit
Internal audit provides independent assurance on the effectiveness of internal controls and risk management processes to enhance governance and achieve organizational objectives and supplements the efforts of the Board and Directors Responsibilities.
Internal Financial Controls
We help our clients with Internal Financial Control reviews to achieve the objectives viz. Safeguarding of assets, Policies and procedures adopted by the company for ensuring orderly and efficient conduct of its business, Timely preparation of reliable financial information, Accuracy and completeness of accounting records, Prevention and detection of frauds and errors. The IFC framework adopted by the company will have to address combination of internal controls on financial reporting and other controls.
Regulatory Compliance
- HIPAA
- ISAE 0402
- SOC 1, SOC 2, SOC 3
- Sarbanes-Oxley Act – Control Design & Operating Defectiveness Review
Corporate Governance
Third Party Risk Management
Application Security & Controls
Controls Integration
Process Mining
Access Rule Book Review
Unlock the full potential of your organization’s application access control framework with our Access Rule Book Review service. Our team conducts a thorough evaluation of your current rule book, evaluating its effectiveness and identifying any gaps or weaknesses. By leveraging our in-depth analysis and industry insights, we help you optimize access management strategies, mitigate risks, and fortify your security posture.
Fraud Due Diligence
- Background checks
- Investigation of Personnel
- Third Party Audits
- Employee Audits
- Market Surveys
- Vendor Due Diligence
Early Warning & Anti Fraud Framework
- Algorithmic Reviews
- Vulnerability Assessments
- Anti Fraud Policy
- Training
Antibribery & Anti Corruption
- Bribery and Corruption Investigations and Defense
- Whistle blower letter review
Fraud & Misconduct Investigation
- Anti — Money Laundering
- Data Discovery and Management
- Identifying fraudulent financial reporting
- Assets Tracing and Recovery
- Supply chain frauds
- Data Theft
- Embezzlement
- Diversion of funds
Insolvency & Bankruptcy Code
- Preference Transactions
- Undervalued Transactions
- Extortionate Transactions
- Fraudulent transactions
- Red Flags as defined by IBBI
Forensics Technology
- Digital Forensics
- Computer based forensics
- Data analysis tools
cyber strategy & Assurance
- Cyber Awareness
- Cyber Risk Assessments
- Cyber Strategy Framework
- Third Party Risk Management
- Emerging Technologies
- Threat & Vulnerability Management
- Network, Operating System, and Database Security & Hardening Standard review
- v-CISO
- Information Technology and Information Asset
- Anomaly Detection(Data Driven
- Data Governance as a service
- SOP and Policy Writing
- SOC 1, SOC 2, SOC 3 (System and organisation controls audit)
- HIPAA (Health Insurance Portability and Accountability Act)
- GLBA (Gramm-Leach-Bliley Act)
- FFIEC (Federal Financial Institutions Examination Council)
- NIST
- PCI DSS
- Compliance to Security Standards
Compliance to Security Standards
- Security Governance & Strategy
- IT Asset Management
- Global IT Operations
- Systems Development & IT Change Management
- Business Resiliency
- Cloud governance and compliance
- Cloud security management
- Cloud security strategy and planning
- Firewall Ruleset reviews
- Cloud IOT Security Assessments
- BCP / DR Readiness Assessments
- Data Centre / Call Centre / Third Party / IT - Risk Assessment & Internal Audits
Analytics
- Anomaly Detection
- Predictive Analytics
- Supervised Models
- Un-Supervised Models
- Process Contro
- Sampling & Simulation
ERP/Application Security/Project Assurance/Business Applications
- Application Security Validation (VAPT)
- Application Controls Review
- GRC dashboards
- Risk sensing
- Verification and validation
- Benefits Realization
- Business Process Controls
- User Access & Segregation of Duties
- System interfaces and data quality
- Automated Controls & Configurations
- Controls Outcome
Blue Team
- Monitoring Digital Foot Prints
- Threat modelling
- DNS Reviews and Audits
- SIEM Log Review and Action response alerts
- False alert analysis
- Anamoly Detection
- Anamoly Perimeter Security review
- Access monitoring and Governance
Infrastructure Security
- Asset Management
- Core Infrastructure Security
- Mobile & Endpoint Security
- Technical Resilience
- Penetration Testing
- Threat and Vulnerability Management
Data Privacy
- Privacy by Design
- Data Privacy Technologies
- Trust Experience (building customer trust through responsible data use)
- Accountability and Governance
- Data Management
- Privacy Assurance