GRC Services

Get in Touch with us for more information

GRC Services

Until the need for GRC convergence is felt, governance, risk management and compliance were seen as separate entities. However, challenges posed by evolving technologies, hackers, cyber criminals, and legal and regulatory requirements etc., have instilled a growing awareness that governance, risk management and compliance (GRC) efforts must be integrated to achieve optimal organizational performance and secured posture. Consequently, today, GRC sits atop the corporate pyramid.

At macro level, our services in the context of GRC touches on,

  • IT governance policies and procedures

  • Risk Management involving,

    • Identification of key Information assets

    • Assessing the vulnerability levels of the key information assets

    • Assessing the probability of the threat upon vulnerability exploitation

    • Assessing the impacts on confidentiality, integrity, availability upon such exploitation (both qualitative and quantitative)

    • Evaluating the resultant risk level for each key information asset or group of assets

    • Assessing information security requirements

    • Evaluating the prevailing controls (if any)

    • Gap analysis over the effectiveness of the prevailing controls vis-à-vis the level of security requirements

    • Recommending appropriate risk treatment plan taking into consideration the residual risk, risk appetite of the client organization, additional controls where necessary

  • Ideally, risk assessment should be a continual process. And, we support clients in performing such assessments.

  • Information Systems Assessment/Audit

    • Conducting design assessment with a walkthrough of the business / IT processes and verify if the applicable controls are placed appropriately in the business / IT processes

    • Performing operational effectiveness assessment to verify if the controls placed in the business /IT processes are operating and such operation is effective to mitigate the risks per control objective

    • Gaps identified will be put to analysis and necessary remediation is recommended

    • Remediation testing is performed to verify the effectiveness of such remediation

    • Submitting necessary reports to the management on the assessment/audit performed

  • Unless specified, we perform the IS assessment/audit based on various best practices and standards appropriate for the client’s IT infrastructure and business.

Copyright © 2021 Confinav Consulting Pvt Ltd. All Rights Reserved.
Maintained by ImagiNET Ventures