+27 82 883 0536 info@checkmark.co.za

Advisory

Advisory

Advisory

One in three companies has been hacked in South Africa as a result of IT security weaknesses that have been exploited.

We help manage your exposure to the cyber world by:

  • Making sure you understand all your cyber exposures (Risk Management)

  • Analysing and sizing potential exposure (Risk Quantification)

  • Determining factors that create, enhance or minimise your cyber exposures (KRIs)

  • Developing a strategy to address exposures by Treating, Tolerating, Terminating or Transferring the exposure (insurance).

One in three companies has been hacked in South Africa as a result of IT security weaknesses that have been exploited.

We help manage your exposure to the cyber world by:

  • Making sure you understand all your cyber exposures (Risk Management)

  • Analysing and sizing potential exposure (Risk Quantification)

  • Determining factors that create, enhance or minimise your cyber exposures (KRIs)

  • Developing a strategy to address exposures by Treating, Tolerating, Terminating or Transferring the exposure (insurance).

One in three companies has been hacked in South Africa as a result of IT security weaknesses that have been exploited.

We help manage your exposure to the cyber world by:

  • Making sure you understand all your cyber exposures (Risk Management)

  • Analysing and sizing potential exposure (Risk Quantification)

  • Determining factors that create, enhance or minimise your cyber exposures (KRIs)

  • Developing a strategy to address exposures by Treating, Tolerating, Terminating or Transferring the exposure (insurance).

Sophisticated Risk Management

At Checkmark we implement sophisticated risk management processes for clients to help them better understand and mitigate the various cyber-related risks to which they are exposed. These include:

  • IT General Control Reviews (GCR’s)

  • Application Control Reviews (ACR’s)

  • Disaster Recovery Plan Reviews

  • Data Integrity/Reports Integrity Reviews

  • User-Based Security Reviews
  • System Development Life Cycle Reviews

  • Performing ISAE 3402 Engagements

  • POPIA/GDPR Readiness Assessments

  • SAP Basis Reviews

  • Process Control Reviews

  • Enterprise Resource Planning (ERP) Reviews

  • Network Security Reviews

  • Logical Security Reviews

Sophisticated Risk Management

At Checkmark we implement sophisticated risk management processes for clients to help them better understand and mitigate the various cyber-related risks to which they are exposed. These include:

  • IT General Control Reviews (GCR’s)

  • Application Control Reviews (ACR’s)

  • Disaster Recovery Plan Reviews

  • Data Integrity/Reports Integrity Reviews

  • User-Based Security Reviews
  • System Development Life Cycle Reviews

  • Performing ISAE 3402 Engagements

  • POPIA/GDPR Readiness Assessments

  • SAP Basis Reviews

  • Process Control Reviews

  • Enterprise Resource Planning (ERP) Reviews

  • Network Security Reviews

  • Logical Security Reviews

Sophisticated Risk Management

At Checkmark we implement sophisticated risk management processes for clients to help them better understand and mitigate the various cyber-related risks to which they are exposed. These include:

  • IT General Control Reviews (GCR’s)

  • Application Control Reviews (ACR’s)

  • Disaster Recovery Plan Reviews

  • Data Integrity/Reports Integrity Reviews

  • User-Based Security Reviews
  • System Development Life Cycle Reviews

  • Performing ISAE 3402 Engagements

  • POPIA/GDPR Readiness Assessments

  • SAP Basis Reviews

  • Process Control Reviews

  • Enterprise Resource Planning (ERP) Reviews

  • Network Security Reviews

  • Logical Security Reviews

Technologies Used

  • ACL

  • Tableau

  • Power BI

  • Power Pivot

  • KnowRisk

Book a Meeting

Book a meeting with one of our advisory experts to find out more about how we can support your IT Security requirements.