Business & Client Risk

Solutions that support the understanding and management of Business & Client Risk have become more important to the business needs of wealth managers, not least due to the changing expectations of regulation. Our Business & Client Risk business need is a resource to support your discovery, understanding and engagement of the various solutions, solution providers and relevant knowledge resources that are relevant to this need.

  • Total Solutions133
  • Solution Providers50
  • Knowledge Resources3
Business Needs Filters
Office Presence Clear

Featured Solutions

Greater Montreal, QC, Canada

Croesus Xpert

Portfolio management system adapted to your reality To stand out, wealth management professionals need reliable, performing and secured technologies that are adapted to their needs. Croesus Xpert portfolio management system offers a variety of powerful tools and modules that help professionals increase their productivity and provide unparalleled service to their clients.......

Client type
Relevant Regions
London, United Kingdom

Product Development & Governance

Successful product development requires a deep understanding of the firm’s strategy and operations, technical product expertise, excellent project management skills, a sound understanding of risk management, laser-focus on client outcomes and robust product governance to be in place. Product governance itself extends beyond developing policy, process and frameworks. How these are embedded into......

Client type
Relevant Regions

All Solutions

New York, NY, United States

24x7 Endpoint Detection and Response

Imagine being able to detect and respond swiftly to credible threats on your servers, laptops, and workstations backed by the world leaders in cyber investigations and continuous threat hunting and response solutions. Kroll’s CyberDetectER® Endpoint, in an exclusive partnership with Red Canary, gives you that confidence, relieving the burden and......

Chicago, IL, United States

Advisory Counsel and Support

Wealth and power attract attention. Yet often individuals of means neglect to take even basic steps to protect themselves and their families. Why? Many reasons. One is a concern that security will be too obvious, intrusive and restricting. But best practices in affluent protection and safety as well as family......

Chicago, IL, United States

Agile and differentiated operations

For most of the twentieth century, financial institutions were not known for their agility. But today, as technology turbocharges new product development and raises the expectations of both customers and decision makers, financial institutions must become as skilled in information management, organizational change, and real-time management as Silicon Valley high-tech firms. Increased......

relevant regions
Reykjavik, Iceland

Application Assessment/Code Review

What is Application Assessment/Code Review? As organizations produce applications that are used for various business critical features, it’s important to be sure that they do not contain serious vulnerabilities. With ever-changing attack surfaces, developers are often deficient when it comes to writing secure code, producing insecure programs that can result in......

Cheadle, United Kingdom

Assess

Cyber security starts here To make you secure we focus on 3 key pillars of your business: Technology People Process For any solution to work, all 3 must be secure and working together. So the first step of our process is to review all 3 areas to see where your technology, people and processes are......

relevant regions
London, United Kingdom

Assurance

On this foundation, we collaborate with clients to co-develop expectations, reduce risk and provide an audit tailored to their needs. Our audit services draw upon: An in-depth understanding of the industry supported by a professional team dedicated full time to the wealth and asset management sector Leading practice insights resulting in recommendations......

relevant regions
London, United Kingdom

ATRQ System

The Questionnaire There are three key components to assess when analysing an individual’s attitude to risk. Attitude to risk: This describes a person’s willingness to take risk, whether it is financial or in other parts of their life. This can inform how prepared they may be to take high levels of investment......

relevant regions
Chicago, IL, United States

Behavioral Threat Assessment and Management

Prevent harm to you and your family by assessing a person’s potential for violence. Employ strategies from behavioral threat assessment and early threat detection to pre-attack intervention and mitigation tactics including law enforcement liaison and consultation with mental health experts. Contain the threat, reduce risk and protect family members. When a......

New York, NY, United States

Blackpeak

Blackpeak is an international investigative research and risk advisory firm. We specialize in investigative due diligence, business intelligence research, political risk analysis, screening, and investigations and security. Diligence We are the industry leader in complex investigative due diligence – the discreet gathering and analysis of information to identify and assess undisclosed risks. Research We......

Vienna, Austria

BQ Select

BQ Select improves fund manager evaluation and selection by identifying latent behavioral risks and predicting potential for outperformance. It enhances investment outcomes using behavioral science and machine learning. Our platform evaluates individual and team decision-making through interactive surveys. Users receive immediate analytics, behavioral predictions, and specific recommendations to boost returns......

relevant regions
New York, NY, United States

Business Continuity

Anything that affects your facilities, operations, or people can put your business continuity at risk, from natural disasters like hurricanes that stall shipments of critical components, to infrastructure failures like overtaxed power grids, to civil unrest or labor strikes. Kroll’s expertise and knowledge to assess the effectiveness of your existing business......

London, United Kingdom

Business continuity / crisis management / exit planning / IT disaster recovery

Production of business impact analysis, risk assessments and strategic advice Production and audit of business continuity plans Creation and running of crisis management scenarios Support testing of plans and remediation of issues identified Assess and/or take clients through to full accreditation to the ISO22301 standard Assess the business continuity capability of third party suppliers ...

Chicago, IL, United States

Capital management and risk mitigation

Turbulent conditions over the past decade have prompted new regulations and calls for increased transparency, even as industry consolidation continues. As financial institutions continue to consolidate, understanding and managing the regulatory environment will remain a crucial area of consideration. In this challenging environment, Kearney helps financial institutions with end-to-end risk mitigation......

relevant regions
London, United Kingdom

CISO as a Service

ITC provide senior and board level advisory services using our industry recognised Chief Information Security Officers. This approach can be an effective way of providing security leadership into organisations who are developing their capabilities or where the challenge of attracting and retaining those skills is prohibitive. Our CISO service can be......

London, United Kingdom

Compliance, Conduct & Governance

Regulatory Change Extensive in-house and product knowledge which allows Insight to analyse, assimilate and provide guidance on the interpretation and the practical implementation of regulatory changes; and Deep knowledge and understanding of how businesses operate and how regulatory changes will affect them. Compliance Risk Frameworks Experience of dealing with regulators both in the UK......

relevant regions
Zurich, Switzerland

Compliance & Risk Management Consulting

We assist you with the implementation of your risk management function and the completion of compliance-related tasks with a view to implementing a customised and coherent internal control system (ICS). A robust ICS is the cornerstone of your compliance and ensures that your company is fully covered in terms of......

relevant regions
New York, NY, United States

Computer Forensics

Claims of fraud, financial tampering, computer crime, employee misconduct, and other wrongdoing require corporations, law firms, and government agencies to follow digital trails to piece together facts that lead to the truth. Kroll’s computer forensics experts help ensure no digital evidence is overlooked and assist at any stage of a digital......

London, United Kingdom

Consultancy and bespoke research solutions

Oxford Risk offers specialised consulting services at the intersection of behavioural science and quantitative finance. Our unique blend of deep financial services expertise and the latest academic insights into how people make decisions and react emotionally to that process can add valuable insight to many areas of financial services, from......

relevant regions
Reykjavik, Iceland

Consulting

What are our consulting services? Perhaps you don't need a full-on security assessment, penetration test, or in-depth technical security work. Syndis's team of security expert have in depth industry experience that can we utilise to help companies with their internal review and design processes. How does it work? It all depends on the situation......

London, United Kingdom

CORE

CORE provides incisive analysis and forecasting on geopolitical and security issues, a series of country risk ratings and an extensive database of incidents. Coupled with visualisation and analytics tools, these help you make informed business decisions and plan operations inconfidence. Daily global coverage Gain insight into the implications of key events and emerging......

relevant regions
Chicago, IL, United States

Corporate Security Risk Consulting

How do you apply a risk-based, strategy-driven approach to security across the organization? How do you align strategic security initiatives and capabilities with priorities in operations, supply chain, procurement, quality assurance, compliance, IT, HR or business continuity? How do you improve security risk consulting, capture program efficiencies, and control operational......

London, United Kingdom

Corruption, Fraud and Regulatory Investigations

Regulatory investigations response - internal investigations advisory - cross-border investigations - eDiscovery & eDisclosure services - forensic data analytics - digital forensics Control Risks employs a global complement of investigative professionals with real-world, relevant experience and a unique ability to apply local political and business context to your investigation. Global technical expertise With a combination......

London, United Kingdom

Crisis and Incident Readiness

Risk assessment and monitoring - crisis management technology - organisation design, governance and programme development - programme gap assessment and enhancement - scenario-based training and exercises - crisis management and business continuity strategy planning Control Risks helps your organisation prepare for, respond to and recover from a wide variety of disruptive events. Our focus......

New York, NY, United States

Crisis Management and Emergency Response

Out of nowhere, a crisis strikes. These events may include natural disasters, business interruptions, criminal or malfeasance perpetrated by individuals, or violent political activity. Do your business leaders and employees know how to react to an active shooter situation, political or social unrest, a medical emergency or a hazmat incident? We......

Bristol, United Kingdom

Cultural & Behavioural Analysis

As external and technical cyber defences improve, the role of an insider in any cyber-attack is becoming more important. A number of recently released surveys show that more than half of all people seeking to defraud a company are already on the inside. PGI's culture metrics will help you to......

relevant regions
Bristol, United Kingdom

Culture Metrics

Culture Metrics was created by John Taylor, Professor Adrian Furnham, and Luke Treglown; world-leading experts on the causes of employee disenchantment and the implementation of corrective measures. The Insider Threat is a major risk to businesses and governments the world over. A disgruntled employee or rogue business partner can cause catastrophic......

relevant regions
London, United Kingdom

Cyber Incident Response

Incident response - information security investigations - insider threat management - remediation planning and execution Control Risks is unique in its ability to combine 40 years of critical response heritage with cutting edge technical know-how to set direction for business managers dealing with cyber crises. Our global reach provides you with the......

New York, NY, United States

Cyber Policy Review and Design

Ensure corporate policy design is keeping pace with your dynamic risk environment Your organization likely has policies in place aimed at keeping information secure and responding to a data security incident. Such safety measures are required by a number of federal, state, and industry regulations. Yet policies aren’t just a matter......

New York, NY, United States

Cyber Risk

In an increasingly digital world, cyber brings new opportunities and threats. Our Cyber Risk services help clients address those threats to build smarter, faster, more connected futures. Using human insight, technological innovation, and comprehensive solutions, we manage cyber everywhere so society—and your organization—can go anywhere. Evolve securely in a dynamic, digital......

relevant regions
New York, NY, United States

Cyber Risk Assessments

When it comes to data breach prevention, what you don’t know can hurt you. Your company faces IT risk daily – whether you’re fending off internal threats or enhancing protection against external intrusions. How well are you balancing your need to lock down data with tighter security controls, while providing your......

Bath, United Kingdom

Cyber Security

Cyber Security threats are multiplying and increasing in sophistication. However, cyber-attacks too often succeed because of known vulnerabilities or poor or non-existent cyber security practices. While sophisticated hostile state attacks make exciting headlines, more damage is done daily by social media, denial of service, and ransomware attacks. Every organisation’s journey to......

relevant regions
London, United Kingdom

Cyber Security

Cyber security represents a huge challenge in an era shaped by digital transformation and disruption. As digital technology transforms the way businesses operate and deliver products and services, the potential impact of cyber attacks grows exponentially. Cyber criminals and their attacks are becoming increasingly sophisticated; phishing has given way to sophisticated......

London, United Kingdom

Cyber Security

Cyber threat intelligence - threat, risk & maturity assessments - executive advisory - cyber security training - cyber incident response Using our global reach and local risk expertise we have a unique approach to identifying and mitigating information security risks. Control Risks has pioneered the intelligence- and threat-led approach to cyber and......

London, United Kingdom

Cyber Security

Information security governance and security risk management Security architecture and/or policy design and implementation Virtual Chief Information Security Officer (vCISO) Cloud – Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS) Security awareness training and security architecture design Access control management, incident and response management Code reviews or penetration testing......

London, United Kingdom

Cyber Security Compliance

Cyber due diligence - cyber threat intelligence - threat and risk assessments - cyber maturity assessments - cyber security training Your cyber security and that of your partners, acquisition targets and third parties is a critical part of your regulatory environment. Businesses are increasingly understanding that cyber threats cannot be approached in......

Greenwich, CT, United States

Cybersecurity Consulting

When it comes to cybersecurity, once confidence is lost, investors will simply take their capital elsewhere. Rest easy. Our cybersecurity consulting and suite of solutions will provide you the peace of mind you need. Proactive prevention boosts investor confidence Banks and credit card companies work hard every day to protect their customers......

relevant regions
Boca Raton, FL, United States

Cybersecurity Program For RIAs

Because regulators have made cybersecurity policy a high priority, investment advisers must be prepared to demonstrate what steps they have taken to fulfill their obligations in this area. Designed for use by small and mid size investment advisers, RIA Compliance Group’s Cybersecurity Readiness Program can help investment advisers get ready for......

Bristol, United Kingdom

Cyber Security Services For Corporates

Our cyber security specialists offer guidance in the area of strategic policy development and address specific areas of concern. Large organisations are big targets for hostile actors and as such your security needs to be robust enough to counter the threats you face. PGI’s bespoke range of cyber security services......

relevant regions
Bristol, United Kingdom

Cybersecurity Services For SMEs

Practical and easy to use, it’s a fast and cost-effective solution to improve online security and meet the expectations of clients, staff, suppliers, regulators and associated organisations. The straightforward self-assessment process explains a business’s online vulnerabilities and how best to mitigate them. Our Cyber Services Portal then enables you to......

relevant regions
London, United Kingdom

Cyber Threat Management

Cyber-crime is becoming increasing costly for organisations as they face an alarming rise in targeted cyber-attacks committed by activists, criminals and nation states whose sophisticated methods are now bypassing traditional defences. The latest annual survey published in October 2016 by The Ponemon Institute shows that the UK has the highest cost......

London, United Kingdom

Data Analytics

Business insights, visualisation and dashboarding - compliance monitoring - commercial data reporting The data analytics team at Control Risks helps organisations acquire and analyse high volumes of financial, operational and transactional data. This uncovers actionable insights to improve operational margins and mitigate compliance risks. Business insights, visualisation and dashboarding Analysing enterprise data to......

London, United Kingdom

Data Protection

Global data protection legislation advice eg General Data Protection Regulation (GDPR) EU-US Privacy Framework; Data Protection Act 1998 (UK) Data protection compliance reviews and gap analysis Data security audits Information Commissioner’s Office (ICO) registration Data permeation maps Data privacy, analytics and forensics Data warehousing and storage architecture Virtual Data Protection Officer (vDPO) ...

New York, NY, United States

Data Protection Officer (DPO) Consultancy Services

Preparing for GDPR compliance Article 37 of the General Data Protection Regulation (GDPR) mandates the appointment of a Data Protection Officer (DPO) for all public authorities and other organisations where the core activities of the controller or the processor involve “regular and systematic monitoring of data subjects on a large scale” or......

New York, NY, United States

Data Recovery and Forensic Analysis

Data recovery: extending your window of opportunity When a data breach event occurs, your company only has a short window of time to gather critical evidence. Internal IT resources are often forced to act as a first line of defense — but first responders who are untrained in data recovery and......

Zurich, Switzerland

DeleQt

DeteQt is an explainable, Machine Learning-powered AML/CTF transaction monitoring solution that integrates seamlessly into existing IT architecture within a bank or financial institution. By significantly increasing detection rates and reducing instances of false positives, DeteQt provides compliance teams with holistic oversight into customer activities and empowers them to allocate valuable......

relevant regions
New York, NY, United States

Dow Jones RiskReports

Packed with essential information, RiskReports identify legal, regulatory and reputational issues using open source research, Dow Jones Factiva and in-person record retrieval to help compliance teams accurately assess risk levels. Due diligence reviews of suppliers, customers and third parties help companies identify potential red flags, which help mitigate against financial crime and......

Chicago, IL, United States

Due Diligence Background Investigations

Effective negotiations depend upon accurate information – as does any major decision involving strategic risk to the family. Hillard Heintze investigators and research analysts specialize in transactional and corporate due diligence services in the U.S. and around the world. Uncover critical information before hiring personal assistants or household staff, committing......

London, United Kingdom

E-Learning

Advanced security training - cyber and information security Our E-Learning resources provide comprehensive and detailed training options covering a range of security and travel risk. Designed to be scalable, flexible and relevant they allow your employees to supplement their training when and where they wish, helping you fulfil your duty of care. Advanced......

London, United Kingdom

Engage Risk

We now live in a world of verification. The discerning public has become mistrusting of both the private and public sector industries, having suffered historically from a lack of information and understanding. In the past this was tempered with ethics, which (although important) is not enough. With the rise of social media, access to information......

London, United Kingdom

Enterprise Resilience

Risk assessment and monitoring - risk governance and organisational design - enterprise risk management - supply chain resilience - Nnational risk assessments and resilience planning Organisational resilience is essential to successfully navigate and capitalise on a complex risk and opportunity landscape. Resilient organisations are able to respond rapidly to a disruptive event in......

London, United Kingdom

Enterprise Security Strategy

Security Consulting and Planning - Individual, Facility and Location Threat Assessments - Organisation Design, Governance and Programme Development - Workplace & Insider Threat Management - National Risks Assessments - On-line Global Security Risk Monitoring & Analysis Enterprise security strategy at Control Risks identifies threats and risks and combines these with our understanding of......

London, United Kingdom

Ethics and Compliance Consulting

Company, country and industry risk assessment - corruption risk assessment and analysis - anti-money laundering consultancy - supply chain and labour welfare consulting - training: anti-bribery and corruption, anti-fraud and anti-money laundering Ethics and compliance is a boardroom issue, with regulatory enforcement strengthening worldwide in tandem with opportunities, sourcing and production. Understanding compliance challenges US......

Newbury, United Kingdom

EV Report

EV Fund Risk Rating Service Quickly and accurately risk rate any portfolio or fund range. We do this by applying a consistent and robust approach to determining the fund’s risk compared to the asset allocation benchmarks from any standard risk profiling questionnaire or process. EV Bulk Client Review Quickly identify those at risk......

relevant regions
New York, NY, United States

Executive Protection

Executives face threats that vary widely depending on the industry, size of the company, geopolitical locations, and the individual’s profile. Our aim is to establish and maintain a safe working and living environment for our clients while continually minimizing risk. We achieve this by providing executive protection operatives to support......

Chicago, IL, United States

Executive Protection Program Services

Planning, designing and implementing highly customized executive protective services demands a nuanced approach that respects the goals, preferences, lifestyle and privacy of the executives and individuals afforded protection. As a leader among the top executive protection companies in the U.S. and worldwide, Hillard Heintze helps clients develop and manage executive protection......

Chicago, IL, United States

Family Emergency Planning

We employ rigorous fact-finding and analytical techniques to identify, assess and manage organizational risks, threats and vulnerabilities confronting your business using the techniques below. Family safety program design Establishment of crisis management and communications plan ...

London, United Kingdom

Finance, Risk & Compliance

Finance and risk convergence Volatility in the regulatory landscape has deeply impacted financial and risk management practices. New regulations have created new complexities, high implementation costs and an increase in risk reporting. Although subject to different schedules, these new regulations – CCAR, DFAST and others – intertwine and should be dealt......

relevant regions
London, United Kingdom

Financial Crime Compliance

Financial crime systems & controls Mitigating the risk of financial crime means much more than simply fulfilling regulatory requirements. Companies with ineffective systems and controls in place to identify, monitor and manage financial crime risk may be subject to civil or criminal prosecution. Our team's approach to governance, risk management and compliance helps you......

relevant regions
London, United Kingdom

Financial Crime Risk

Under its objective to ensure the integrity of the UK financial markets, the FCA requires all authorised firms to have robust governance, effective risk procedures and adequate internal control mechanisms to manage their financial crime risk. Some of these firms will also have additional obligations placed on them. Over the last two......

Zug, Switzerland

Financial Services Consulting

In the highly regulated financial services industry, being compliant and mitigating risk are as important as understanding your customers and market. We have over 15 years' experience working with capital markets and commercial, retail and investment banks. We've channeled that knowledge into developing research and analytics systems to help our......

relevant regions
London, United Kingdom

Firewall & Intrusion Prevention

The insatiable demand for information and communication is increasingly at odds with IT security and business risk. This has led to a whole new generation of Firewalls that according to Gartner are “no longer a commodity”. Expert capability is required to specify and manage next-generation firewalls, keeping up with ever changing......

Reykjavik, Iceland

Forensics

What is computer forensics? Syndis offers full computer forensics services to meet the needs of companies and government agencies to investigate potential incidents or data leaks. While not all cases that arise will result in a lawsuit or go to court, they still need to be investigated. Law enforcement agencies are......

Helsinki, Finland

F-Secure Rapid Detection & Response Service

World-class threat identification team at your service F-Secure's elite threat identification team prepare your organization for advanced cyber attacks, before and after they happen. Our fully managed service is designed to detect the most skilled of attackers within minutes, with around-the-clock coverage. F-Secure Rapid Detection & Response Service gives you a......

Reykjavik, Iceland

Goal Oriented Attack Simulation

What is goal Oriented Attack Simulation? In an attempt to counter the shortcomings in the practices of “pen-testing-as-usual”, we pursue our own unique methodology we call Goal Oriented Attack. We engage our customers in a manner that far more closely mirrors the process an actual malicious attacker would use. How does it......

Washington, DC, United States

Guidehouse Financial Crime Solutions

As masters of financial crime risk, Guidehouse has all bases of the governance ecosystem covered. Whether a client needs to improve sanctions compliance, enhance transaction monitoring, or drive convergence between AML and fraud functions – we’ve helped similar companies overcome these issues. Armed with top former prosecutors, regulators, compliance officers,......

relevant regions
New York, NY, United States

Identity Monitoring

When compromised, criminals can take advantage of sensitive data like Social Security Numbers and Medical ID Numbers for months, or even years, before suspicious activity appears in credit reports.  Organizations often choose to provide consumers with Kroll's identity monitoring solution to reveal known triggers of identity theft that credit monitoring alone......

New York, NY, United States

IDShield Powered by Kroll

IDShield, powered by Kroll, is built on decades of experience in helping people secure their personal information. This powerful service monitors identities from multiple angles – keeping a watchful eye for theft and fraud and alerting you to changes we detect. With IDShield, you receive 24/7 monitoring of the information you......

Reykjavik, Iceland

Incident Response

What is Incident Response? Incident response is the set of actions taken once an adverse event has occurred that affects a company’s assets or its network. It is extremely important to react correctly when a security incident occurs to control the damages and preserve the evidence and traceability. When a breach occurs,......

New York, NY, United States

Incident Response Management

Even with the most robust controls in place, a data breach may still occur Kroll has helped countless organizations worldwide respond to data loss — and we can help you. We respond quickly when your confidential information is compromised, no matter the source of the data breach, whether it’s the result......

London, United Kingdom

Information Governance

Data lifecycle management - data regulatory obligations, security and privacy - enterprise content assessment - cyber security consulting Effective information governance boils down to two guiding principles: keep only what you need and protect everything that you can. Getting it wrong risks violating regulations, stumbling when facing an investigation or a critical......

New York, NY, United States

Information Security

When organizations lose information, the cause can be traced to one — or more — of five risk factors: people, paper documents, information technology systems, other electronic devices, such as tablets or memory sticks, and surveillance devices (bugs). Our experts can guide you in the selection and implementation of security controls......

London, United Kingdom

Information Security & Risk Management

ITC believes you have to take a risk-based approach to deliver appropriate security. Our Information Security Risk Management consultants can help you through the full lifecycle of risk management stages to ensure you know what the right things to do for your business are, how to implement them and also......

London, United Kingdom

Internal Audit

Internal audit on an outsourced or co-sourced basis Specialist audits covering all aspects of technology, risk, compliance, finance and business operations IT audit Project and change audits Computer Assisted Audit Techniques (CAATs) End-User Computing Excel and Access analytics and forensics Effectiveness reviews of internal audit methodology, policies and procedures Training and methodology development support to improve the performance......

London, United Kingdom

Internal Controls and Monitorships

Government-mandated monitorships - internal controls & monitoring Settlements with government enforcement and regulatory agencies can require an independent compliance monitor. Monitoring has also become an expected component of a functional compliance programme. End-to-end compliance programme review Control Risks compliance experts help with the evaluation and enhancement of your existing policies, procedures and practices......

Zurich, Switzerland

Investigation & Remediation

As an independent third party, we support you in situations like these. We review the facts and, if desired, provide concrete recommendations to fix the problem and restore order. Geissbühler Weber & Partner is regularly appointed by FINMA as special audit or enforcement agent....

relevant regions
London, United Kingdom

Investigations, Litigation Support & Asset Tracing

Investigations, litigation support & asset tracing Asset profiling Intelligence & evidence gathering Internal investigations Witness development ...

relevant regions
London, United Kingdom

Investment and Risk Advisory

Asset allocation Combining years of experience building multi-asset mandates and performing risk allocation, Landy Partners helps clients make sense of their portfolios. In particular, Landy Partners is expert in portfolio diversification and downside protection. Manager selection With 15 years of experience in the manager selection and hedge funds industry, the team at Landy Partners helps......

relevant regions
London, United Kingdom

ITC 5 Steps To Security Model

ITC’s 5 Steps to Security Model is fundamental to the successful delivery of our NetSure360° Security Management Services. Our refreshing approach to infrastructure security focuses on the critical assets of your business using our straightforward ‘5 Steps to Security’ programme which is simple and structured way of identifying genuine and......

London, United Kingdom

IT Risk Management & Governance

Exerting control over critical IT risk A key requirement for a well-managed organisation is that it has a mechanism for proactively identifying and evaluating risks. Typically this would sit in the first line of defence and include the population and maintenance of risk registers and a governance structure for discussing risk,......

Cheadle, United Kingdom

Maintain

Helping you stay cyber secure Getting cyber secure can be a complex journey so our process is designed to make it simpler for you, but it would be a wasted trip if you couldn’t maintain it. After you’ve implemented our recommendations, we then work with you to ensure they keep you safe.......

relevant regions
New York, NY, United States

Malware and Advanced Persistent Threat Detection

Malicious software attacks that succeed in infiltrating a company’s network pose a strong threat to commercial and public sector interests. At Kroll, we help organizations identify and analyze suspected malware to determine exactly what it was — or was not — capable of doing. Understanding the threat from viruses and spyware No......

Reston, VA, United States

Manage Your Risk

The challenge companies face today is staying ahead of cyber threats before they become a business liability, all while balancing overworked and understaffed teams. Depending on your security team’s size, workload, and available resources, considering a managed service offering might be a key component to handling your
 organization’s risk. Extend your......

London, United Kingdom

Mobile Device Management

IT departments are faced with a dilemma as users and applications are being pulled further apart. On one end you have virtualisation and consolidation efforts that are centralising applications and data into fewer locations, on the other you have users who are increasingly distributed and mobile. Progressive organisations are today therefore......

London, United Kingdom

Neotas Platform

We gather, and process data from an unlimited number of open sources including social media, and the deep, and dark web. This provides clients with clear, easy to understand reports and dashboards to enhance their decision making. Neotas are the next level of due-diligence. We leverage the power of our platform......

relevant regions
London, United Kingdom

Operational and Protective Security

Operational security management - high risk protective security - executive protection - major events and sports security - technical countermeasures - physical intrusion testing - maritime security Operational and protective security solutions from Control Risks are tailored to the threat environment and the business context of your operations. They integrate client culture and......

London, United Kingdom

Operational Risk Management

Operational Risk (OR) due to people, process and system failures, or from external events, is one of the most important risk categories in many financial services firms such as investment firms, insurance intermediaries and central securities depositories. Our team of consultants led by Mariano Selvaggi assists clients in optimising their operating......

Bath, United Kingdom

PEAK: Regulation

In addition, PEAK automatically scans for new regulatory papers every day and intelligently analyses these papers for potential impacts on a model, using your mappings of regulations to capabilities. Along with the ability to visualise those impacts in bulk across multiple regulatory changes, this means you can manage your response......

relevant regions
Bath, United Kingdom

PEAK: SMCR

An optional additional module provides the ability to not just report those controls but to actively manage them and oversee compliance. The result is a comprehensive SMCR solution which enables clients to be confident that all angles have been covered, nothing has been forgotten and appropriate controls are established and......

New York, NY, United States

Penetration Testing Services

Your organization’s data and networks are under siege by cyber criminals. As a security-conscious organization, you continually try to protect against the many threats and vulnerabilities facing your cyber assets. How confident are you that your protective measures are effective against current and emerging cyberattacks? The way cyber professionals recommend to......

Reykjavik, Iceland

Phishing & Awareness Training

What is Phishing & Awareness Training? Over 90% of all cyber-attacks and consequent data breaches begin with a phishing email, according to a recent Trend Micro study. We provide our customers with visibility into the security awareness of their employees, giving the opportunity to improve the organization’s resilience towards phishing attacks,......

London, United Kingdom

Portfolio Bespoke Mapping Service

An investor's risk profile should be mapped to a level of suitable portfolio risk (and hence to asset allocations) using quantitative risk bands. The Oxford Risk approach is unique in applying a robust academic methodology to this process. An investment solution should be mapped to a risk profile that accounts for both risk......

relevant regions
Utrecht, Netherlands

PredictR

PredictR is a modular set of industrialised software components to manage and forecast credit risk requirements. The PredictR toolkit enables high speed and accurate regulatory compliance optimising operational performance whilst delivering additional business value. Including a Basel Calculation Engine, Credit Risk Forecaster, and expert credit and financial risk consultancy provided by......

relevant regions
Cambridge, MA, United States

Privacy and Security

There is a lot of risk out there: Privacy will soon be the law of the land and security threats abound. This is not simply a question of managing risk or minimizing financial loss; this is now a fundamental question of trust. Any decline in trust — real or perceived......

relevant regions
New York, NY, United States

Private Client and Family Office Services

Kroll provides a variety of security risk management services to family offices and high net worth individuals. Threats to personal security can surface in varied and unexpected ways, including opportunistic street crime, obsessive stalkers, medical emergencies, accidents, fires and natural disasters. Our objective is to recommend a security strategy that provides......

London, United Kingdom

Regulatory Due Diligence

When looking to acquire a new business regulated by the FCA it is important that you carry out regulatory due diligence to fully understand the business’s history and quantify the potential historical risks attached to the acquisition. Failure to undertake appropriate due diligence can have far reaching consequences. Purchasing a business......

New York, NY, United States

Regulatory Risk

Deloitte helps clients become more proactive in their regulatory functions and unlock value. Our regulatory compliance solutions offer a comprehensive approach to helping clients strengthen their reputations while enhancing business performance and improving customer service. Deloitte provides advice and delivers innovative regulatory requirements management solutions that help our clients deliver......

relevant regions
London, United Kingdom

Reputation & Crisis Management

Reputation & crisis management Media monitoring Digital footprint & profile management Intelligence support Investigation into counterparties ...

relevant regions
Chicago, IL, United States

Residential Physical and IT Security Assessment

Ensure your home and family are secure with technical and physical measures such as panic alarms, intrusion detection and CCTV coverage with redundant communication channels and connectivity between family residences and a corporate security operations center, if possible. We employ rigorous fact-finding and analytical techniques to identify, assess and manage organizational......

Toronto, ON, Canada

Risk Consulting

Risk management is not the responsibility of a single department It is the responsibility of everyone, from the chief executive down. Past corporate failings have been attributed to lack of accountability, strategy and transparency. Tougher expectations by regulators and other stakeholders now mean that corporates and financial institutions should demonstrate better discipline,......

relevant regions
London, United Kingdom

Risk Management and Governance

Technical support on specialist risk areas Outsourced or co-sourced risk management solutions Design and implementation of pragmatic risk and governance frameworks Assessing the effectiveness of existing risk frameworks Risk management project / programme management and assurance Training, education and updates on latest risk management trends Board effectiveness reviews ...

New York, NY, United States

Risk Management & Regulation

Working closely with our Finance & Risk Management Practice we support our clients on a broad array of risk-, compliance- and regulated related considerations. We advise our clients in defining their risk appetite, developing processes, and policies and establishing the required infrastructure....

Cheadle, United Kingdom

Secure

Securing your business Once we’ve assessed your business the next step is to work with you to get it cyber secure. How and what needs to happen is different for every business. So we put together a clear and easy-to-follow plan across technology, people and process, that will make your business cyber......

relevant regions
New York, NY, United States

Securing Intellectual Property

It is not uncommon today to find that individuals involved in compromising a company’s intellectual property (IP) are a combination of current or former employees, competitors, trusted customers, distributors, or vendors. For this reason, the security equation must encompass issues of management structure, operational security, and cyber security. Protecting your intellectual......

New York, NY, United States

Security Audits

Security measures are of little use if they are not enforced. A security audit assesses how effectively your organization’s security policies are being implemented. Our audits will show you where gaps and vulnerabilities might exist in your current systems and procedures. In more than 40 years, we have seen countless reasons......

New York, NY, United States

Security Master Plans

Good security risk management begins with a master plan — a vision of the security department, its roles and responsibilities, and how it fits into the overall organization. We have found that security is more effective when you look at your organization as a whole. Accordingly, we address all aspects of......

New York, NY, United States

Security Planning

While many consultants view security strictly from the electronic system perspective, our security planning philosophy is grounded in our experience designing comprehensive security programs for clients across a multitude of industries. In our approach, we balance the three basic elements of security: architecture, operations and electronic systems. Under this philosophy, we......

New York, NY, United States

Security Policy and Procedure Development

Do you have policies and procedures that cover risks like workplace violence, bomb threats, active shooters or natural disasters? How about executive protection or travel to high-risk areas? How do you know if current procedures will be sufficient or effective? Given the complexity of most organizations, developing effective security programs can......

Bloomfield, NJ, United States

Security Risk Assessment

Technical Controls Assessment Discovery Tasks Issues Summary External & Internal Vulnerabilities Automated Vulnerability Scan NetworkPenetration Testing Unrestricted Web Content Local Security Policy Consistency Onboarding & Decommission Device Process Review Identification of Unfollowed Technical Governance Procedures Risk Score Evidence Screenshots & Pictures Summary & Detailed Reports Plan of Actions & Milestones Remediation Recommendation Pricing based on Number of domains, networks, servers, and endpoints Number of assessment teams for multiple......

relevant regions
Chicago, IL, United States

Security Risk Management Program Development

To manage risk to a business or government agency, security program management needs to evolve continually. Gaps can emerge and undermine the program’s effectiveness. Deficits in leadership can be costly. The absence of a clear, multi-year strategy can muddy priorities. A “bolt-on” approach to security after a wave of M&A......

New York, NY, United States

Security System Procurement and Implementation Assistance

Security system procurement and implementation can be overwhelming responsibilities. Kroll understands. Our systems experts and security specialists will ensure that the systems you choose not only meet the functional and technical requirements, but are also installed on time and within budget and represent the best value for you. During system procurement,......

Paris, France

Sigma Map™ & Framework

The risk management maturity of an organization is measured along six distinct components which allow firms to manage their risk profile. ...

relevant regions
Chicago, IL, United States

Social Media Intelligence and Reputation Monitoring

Why is this service offering so valued by clients? One reason is executive concerns about risks to their workforce as well as to corporate reputations, brand, key executives and critical facilities. Another is their interest in cost-effective, actionable risk management strategies. And a third is growing awareness among executives responsible......

Chicago, IL, United States

Social Media Monitoring and Analysis

Why is this service offering so valued by clients? One reason is executive concerns about risks to their workforce as well as to corporate reputations, brand, key executives and critical facilities. Another is their interest in cost-effective, actionable risk management strategies. And a third is growing awareness among executives responsible......

London, United Kingdom

Strategic Intelligence

Strategic intelligence Market entry / exit Political analysis Government relations & advocacy ...

relevant regions
Chicago, IL, United States

Technical Surveillance Countermeasures (TSCM)

Commercial secrets worth tens of billions of dollars have been stolen from companies in recent years as a result of economic and corporate espionage and information theft. And these losses don’t account for unreported or undetected thefts – or the cost of diminished brand value. Don’t underestimate the risks of......

London, United Kingdom

Technology Resilience

The growing digital transformation agenda and expectations of the consumer will continue to place greater pressure on IT services. It is essential that Boards and Senior Management have confidence that the technologies and processes in place are resilient, and recovery plans are effective if required. Technology resilience remains one of the......

relevant regions
Aventura, FL, United States

Teramind DLP

Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques and contextual analysis to identify and categorize sensitive data and IP. Next, policies and rules......

relevant regions
Aventura, FL, United States

Teramind Starter

Organizations looking to protect their intellectual property and sensitive data from falling into the wrong hands, and looking to optimize processes and maximize employee productivity, are looking to implement employee monitoring (aka user activity monitoring) software that allows for user session recording and analysis. Employee monitoring can ensure business continuity......

relevant regions
London, United Kingdom

TGP Verified

Each TGP Verified engagement is: Focused solely on client priorities Practitioner centric bringing proven experience Personally managed and overseen by a TGP partner, and Leverages our proprietary SME database TGP Verified covers all aspects of the client engagement lifecycle: Governance Demand management Deployment Execution, and Handover TGP Verified – the TGP delivery model TGP Verified, our TGP delivery model enables us to effectively meet your......

relevant regions
New York, NY, United States

Third Party Cyber Audits and Reviews

No matter how secure your company’s IT system is, sometimes your risk of data breach depends on who you associate with. In today’s complex business environment, large amounts of sensitive data are often shared with partners, outside vendors and service providers — who all have their own dedicated IT systems,......

New York, NY, United States

Threat and Vulnerability Assessments

Comprehensive threat and vulnerability assessments are essential to securing your organization. Our multidisciplinary approach looks at security from every angle to mitigate risks — from the physical environment to the human element to the role of technology. Effective security starts with a clear understanding of your vulnerabilities. We can help you......

New York, NY, United States

Threat Management

Corporate and social disaffection is a breeding ground for threatening behavior from individuals aimed at institutions, corporations, or their personnel. This can take many forms — from stalking and harassment to unwanted communications and disruptions. Our staff of former prosecutors, law enforcement officers and security specialists can investigate the source of......

Basildon, United Kingdom

Timeline Poster

One A1 size poster…. four sub-charts Using historical data from 1900 to 2016, Timeline shows key risk and return metrics that every every investor needs to know.  Timeline poster comes in A1 size, 200gsm paper with silk finish. All orders come with digital (pdf and png) copies of the poster and all......

Chicago, IL, United States

Travel Risk Management

Some of the greatest risks to executives occur when they are in transit – commuting to or from their residence or travelling overseas. How can you reduce this risk? Get real-time, up-to-date insights and information on your destinations. And take practical steps – before incidents occur – to prepare security......

London, United Kingdom

VANTAGE

VANTAGE means end-to-end third-party management. From initial screenings using the world’s largest risk databases, to deeper levels of research and on-the-ground investigative work, as well as automated cloud-based compliance solutions. VANTAGE enables you to focus your efforts on mitigating risk, and facilitates the management of multiple vendors, tools and services. VANTAGE......

relevant regions
London, United Kingdom

Vendor Due Diligence

What We Do We work with mid-market companies helping them prepare for investment or sale. Our independent view of the business helps all parties understand what your business is today, where it could be, and how to get there. There’ll be no surprises with Armstrong acting as your trusted advisor and......

relevant regions
New Bedford, MA, United States

Virtual CISO Service

Adelia Risk offers a Virtual Chief Information Security Officer (vCISO) service designed perfectly for small and mid-sized financial advisor firms who want to strengthen their cybersecurity program.  An outsourced (or ‘fractional’) CISO provides expert cybersecurity help without the cost of a full time employee. We provide advice and take action to......

relevant regions
New York, NY, United States

Virtual CISO (vCISO) Advisory Services

Irrespective of regulatory scrutiny in your industry or your organization, too much is at stake to not have a CISO on your team. A full-time data security leader has the specialized technical knowledge and corporate governance experience to help build not only a strong cyber security foundation, but also the......

London, United Kingdom

Vulnerability Management

Managed threat and vulnerability services Patching for Linux™ and Android™ platforms ...

London, United Kingdom

Vulnerability Management

The rules for secure network management have changed, putting many companies directly in harm’s way. Quarterly security audits once deemed precautionary safeguards are no longer enough. Networks and systems need to be tested more frequently in order to give early warnings of any potential vulnerability. Every Internet-connected network is potentially at......

New York, NY, United States

Vulnerability Scanning

Knowledge is power Is your company’s IT system vulnerable to attacks by malicious outsiders? Could internal enemies damage your data security? Kroll’s vulnerability scanning services can help you answer these important questions — mapping out a prioritized pathway to increased cyber security for your business. Kroll’s team of licensed experts will run......

Knowledge Resources

Keep up-to-date with the most dedicated resource for wealth managers which includes relevant news, developments and industry trends.