IT Advisory

Home IT Advisory

ERP Pre and Post Implementation Review

Our review of the security configuration of your ERP Systems (SAP, Oracle EBS, PeopleSoft, etc.) will assist in identifying any control gaps such as excessive privileges, segregation of duties conflicts, etc., that may have been overlooked during design and implementation of the system.

IT Governance

An IT Governance assessment is designed to evaluate the strategic and operational alignment of an IT organization with its enterprise's business strategy, to ensure that IT is providing the required support to meet the organization's overall goals. Five focus areas of this review are strategic alignment, value delivery, resource management, risk management, and performance measures.

Segregation of Duties (SoD) Review

Segregation of Duties is a fundamental Internal Control concept that requires all critical tasks within a business process or function to be performed by more than one person. However, achieving this goal may become a daunting task, especially for small and mid-sized companies.

Our SoD review process leverages best practices to identify known conflicts within your core business functions, and provide recommendations for implementing mitigating controls where these gaps cannot be readily resolved due to organizational constraints such as size, budget etc. Using a risk-based approach, our SoD review process utilizes five phases which focuses on sensitive transactions posing the highest risk to the Organization.

Policy and Procedure Development

We can also assist with the documentation of IT policies, standards, and procedures tailored to meet the specific needs of your organization in alignment with industry best practices and regulatory requirements.

IT Project Management

Our certified IT Project Management Consultants will provide the support for planning, executing and monitoring IT projects to ensure projects are delivered per scope, schedule, budget and quality.

Data Analysis

Business-related data is often dispersed across several systems in an organization which may be incomplete, inaccurate or obsolete. However, management still needs to utilize information from various data sources to make critical business decisions. By utilizing specialized business intelligence tools, we are able to provide in-depth analysis of your data, which may uncover data or process anomalies, provide a better understanding of the risks within a given business process and assist with the quantification of issues. Some of your business processes that can benefit from the application of data analytics include Information Security Management (e.g. Network access, Data Leakage, VPN Log Analysis), Purchase- to-pay, Order-to-cash, Payroll, Fixed assets etc.

Continuous Controls Monitoring

We provide advisory services to organizations seeking to implement a continuous controls monitoring (CCM) program in their business environments. With CCM, organizations are able to leverage data analytics to review 100% of transactional data which allows them to timely detect errors, non-compliant incidents, and potential fraud for appropriate follow-up and remediation. CCM is often implemented by organizations that have or are aspiring to achieve an optimized internal controls environment.