Transcript Document

Consultancy
1
Consultancy
Banking Process Consultancy
Quality Management System (QMS)
IT Governance
Information Security Management System
(ISMS)
ISO 9001/ 27001/ BS25999 Implementation
Risk Assessment and Mitigation
RFP management
2
Banking Process
Introduction

Market Drivers

An evolving industry – undergoing rapid transformation

Increasing regulation - Initiatives such as Basel II, etc.

Globalization - heavier trade volumes and 24/7 operations

Commoditization of instruments – less margins,
sophisticated instruments, more competitive pricing
3
Banking Process

Business Drivers

Revenue growth - to increase revenues with less margins

Risk management – more stringent regulations and to
manage risk early

Cost control – In particular banks seek to:
 Keep headcount low – run processes more effectively by
managing exceptions.
 Increase productivity – enable existing staff to work more
efficiently
 Decrease system costs – by using efficient systems to reduce
deployment costs.

Analytics – Banks need analysis of the market, history,
etc., to decide on the price in the competitive market
4
Banking Process

What we can do?

Review of existing processes

Gap analysis

Revision of existing processes

Development of new processes

Implementation of modified/ new processes
5
Banking Process

Benefits to the clients

Better processes

Globally standard practices

Adequate internal controls

Compliance facilitation

Achieving the market and business goals/ drivers

Alignment of IT strategy with business strategy
Back
6
Quality Management System (QMS)
Introduction

QMS is necessary for any organization for the following
needs.

Refined Processes – the need of the hour for the clients

Global best practices

Certifications

Improved efficiency
7
Quality Management System (QMS)

What we can do?

Training Programs
 General
 Specific as per requirement

Consultancy on specific areas like
 Review of existing processes
 Gap analysis
 Revision of existing processes
 Development of new processes
 Implementation of modified/ new processes
8
Quality Management System (QMS)

What we can do?

Metrics management

Corrective and Preventive actions

Quality Manual preparation

Development of policies, procedures and guidelines

Internal Audit and External Audit coordination

Implementation facilitation till certification like CMMi, ISO
9001-2000, etc.
9
Quality Management System (QMS)

Benefits to the clients

Integrated Quality Management System, meeting the
requirements of world class quality models

Provide ample space for flexibility and creativity

Adherence to SLA to ensure RoI

Greater degree of predictability through processes and
reuse

Continuous improvements through better QMS and
Breakthrough improvements through Six Sigma
Back
10
IT Governance
Introduction

An effective IT Governance model will be the one that is
carefully planned keeping in view the international best
practices as well as the organizational requirements and
implemented.
11
IT Governance

What we can do?

Review of existing Governance Model or defining a new
one keeping in view the international best practices and
the specific needs of the organization

Conducting the Gap analysis

Revision of existing model

Development of new processes/ guidelines to address the
gaps

Implementation of modified/ new processes

Keeping in place a monitoring mechanism
12
IT Governance

Benefits to the clients

Enable the monitoring and strategic development of the IT
Governance Models for optimum and most secure usage of
IT

Provide for better monitoring of and compliance with
Contractual, legal and operational risk requirements

Alignment of IT strategy with business strategy
Back
13
Information Security Management System (ISMS)
Introduction

Protecting Information is the most critical function of the
organizations as it is the most valuable asset of the organizations.
Whether it is customer data, software or hardware and the
networks used apart from the physical assets and all important
people (employees) careful planning and systems are required to
ensure their availability, integrity and confidentiality (depending
upon the nature of the asset).

ISMS will ensure the above, once it is planned in tune with the
international best practices and the organizational needs.
14
Information Security Management System (ISMS)

What we can do?

Review of existing policies, procedures etc that take care
of Information Security and comparing with the
international standards and the organizational needs

Gap analysis

Revision of existing policies/ procedures or defining new
ones

Implementation of the same

Institutionalising mechanism to monitor, evaluate and
review the same periodically

Facilitation to the organization for complying with and
getting certified for ISO 27001
15
Information Security Management System (ISMS)

Benefits to the clients

Better processes

Globally standard practices

Adequate internal controls

Compliance facilitation

Achieving the market and business goals/ drivers

Alignment of IT strategy with business strategy
16
ISO 9001/ 27001/ BS25999 Implementation
Introduction

We offer facilitation services for enabling the organizations to
get certified under International Standards in Quality,
Information Security and Business Continuity. Our consultants
will help the organizations to understand the standards, map
the organization’s requirements to the standards and define/
refine policies/ processes to ensure that they comply with all the
requirements of the standard.

We will hand-hold your employees in the implementation
process and enable them to successfully face the certification
audits leading to certifications in the respective systems.
17
ISO 9001/ 27001/ BS25999 Implementation

What we can do?

Review of existing processes

Gap analysis

Revision of existing processes

Development of new processes

Implementation of modified/ new processes
18
ISO 9001/ 27001/ BS25999 Implementation

Benefits to the clients

Better processes

Globally standard practices

Adequate internal controls

Compliance facilitation

Achieving the market and business goals/ drivers

Alignment of IT strategy with business strategy
19
Risk Assessment and Mitigation
Introduction

In the current pace of technological development in
Information Technology, new threats are being constantly
faced by organization to their information assets with a
potential risk of losing or compromising on information
assets which may lead to different losses including possible
closure of business.

We offer a comprehensive range of services that will help
organizations in identifying potential risks and we also will
recommend necessary mitigation measures to reduce the
risks.
20
Risk Assessment and Mitigation

What we can do?

Asset Identification and analysis

Identification of threats and vulnerabilities through series
of studies/ tests

Assessment of Risks

Measure the risks and evolve the risk matrix

Provide expert guidance on ways to mitigate the risks
21
Risk Assessment and Mitigation

The benefit to the clients

Proactively identifying the risks and taking steps to
mitigate them

Reduction in losses

Comfort to the management on the much needed Risk
Management

Compliance to client/ regulatory requirements
Back
22
RFP Management
Introduction

Procurement management is key for ensuring obtention of
required products/ services at an optimum ToC and not
compromising on the quality

Not all the clients are specialised in this area/ process
23
RFP Management

What we can do?

RFx preparation with detailed functional and technical
requirements and including global bidding standards

Evaluation of vendors with scientific approach considering
various parameters and weights

Managing vendors

Conducting UAT

Procurement Audit
24
The benefit to the clients

External professional services in the procurement

Service augmentation at the need of the hour

Professional and unbiased approach
25