Rectangle8061 An Information Systems audit evaluates an organisation's information technology infrastructure, business software & applications, business processes, data use and management, policies, procedures, and operational processes against recognised standards or established guidelines. Audits evaluate whether the controls to protect information technology assets for ensuring integrity and controls are aligned with organisational goals and objectives.
  • We will help your Organization with:

  • Audit Planning We begin with a pre-planning meeting to ensure that management’s expectations and our expectations are communicated before commencing the assignment. We will confirm our understanding of the engagement deadlines and ensure these are met timely.

  • Risk Assessment and Business Process Analysis: Risk is the possibility of an act or event hurting the Organization and its information systems. Risk can also be the potential that a given threat will exploit vulnerabilities of an asset or group of assets to cause loss or damage to the support. A combination of effect and the likelihood of occurrence ordinarily measures it.

  • Performance of Audit Work: As part of our extensive planning phase, the engagement team will discuss with Organization’s management and assess its information processing system, internal & external environment, significant events, and social factors to determine and document areas of risk. Once areas of risk have been identified, the following process will be to review the control environment.

  • Social engineering: Our team will test your organisation's human defences by tricking employees into giving up sensitive information or compromising security protocols. This will help you understand the human factor in your security posture and identify areas for improvement.

  • Reporting: Work papers are reviewed throughout the audit by the EIC professionals. Before we leave your offices, the file will be substantially reviewed, and any issues will be discussed and resolved. Upon approval, we will issue drafts of all reports based on a predetermined schedule, allowing adequate time to review and distribute information.

Vector0970
Enterprise InfoSec Consultants (EIC) has been serving many financial companies, including the leading banks, NBFI, and other clients. We also have clients in the USA and Sri Lanka. Our Clients
image30747
image80749
image90751
image100753
image110755
image120758
image130760
image140762
image150764
image160766
image170769
image190771
image210773
image230775
image250777
image180780
image200782
image220784
image240786
image260788
Contact
Vector4190707 Union0708
Shape0713 Oval0714
+88 09 617204204

info@eic.com.bd

House 15 (5th Floor), Road 7, Block C, Niketon, Gulshan, Dhaka 1212, Bangladesh
Follow Us
XMLID8020726
XMLID8020726
© Copyrights. 2023. All rights reserved.
Line30732 Screenshot20230212at70210733 Screenshot20230212at70210733
group