About Us

We are a Business Technology Risks Management Consulting Practice.

Our people are Certified Information Systems & Security Professional (CRISC, CISM, CISSP, CISA, SCF, & PRInCE II) with backgrounds from Information Systems Management, Engineering, System Architecture, Business Process Engineering and Project Management. We have extensive Technology Risk Management & Information Systems Security governance, management and architecture experience from both private and public corporate environments. We also have extensive experience in Financial and Business Audit Support, including but not limited to regulatory –e.g. Sarbanes Oxley, BASEL I & II, HIPAA, Cloud Computing Standards, AIPAC SOCs, etc.); Industry standards, ISO 2700x, PCIDSS, etc.).

Our people are world-class, industry thought leaders and have been part of Big4 Professional Services environment in New Zealand and internationally. Our people have had the privilege to pioneer and setup Information Systems Security and Control teams both within New Zealand and internationally. We bring a special understanding and experience of both consulting and corporate know-how.

We understand that technologies are not just implemented in businesses for the sake of themselves but to drive and deliver values.  We also understand that technologies can lead to value leakage if not risks optimised.  We have developed best-in-breed technology risks optimisation approaches and concepts and can help you achieve both of these objectives.

We can help you and your organisation optimise your technology enabling capabilities by optimising the dynamic mix of your technology risks and rewards.  We understand and have been at the forefront of technology risks management concepts and have delivered great values to clients like you. We have helped many corporate achieve these objectives. So, let us help you.

We have helped many corporate achieve these objectives. So, we can help you. We can help with any business technologies related risk management activities, including but not limited to:

  • Business technology risk assessment along the entire lifecycle of business technology assets from concepts through to asset decommissioning
  • Information asset protection strategies, implementation and operations
  • Business technology risk management strategies and implementations
  • Information security architectures and frameworks– design, implementation and operations

Leave a Reply

Your email address will not be published. Required fields are marked *