LagosLagosLagos Mon - Fri 10:00-17:00 +234-706-2340-010 Mon - Fri 10:00-18:00 +234-706-2340-010
Email info@globalinfoswift.com

Technology

 

Digital & Technology Consulting  

Digital technology is changing how we work. To remain competitive, agile, innovative and responsive, your organisation needs to be part of the digital revolution. At Global Infoswift Consulting, we ensure you receive the most from your digital investments

Financial Technology

We’re proud to have earned an unrivalled international reputation providing clients with insight, leadership and innovative solutions to business problems. Powerful partnerships are at the heart of what we do. We leverage them to create extraordinary digital experiences for you.

a . Global Transaction Banking
Utilising our partnerships with Intellect, we help banks to implement a fully integrated, digital transaction banking platform, which serves seamless experiences across the corporate financial supply chain.

b. Digital Core
We help banks to eliminate serious transformational complexities by deploying Intellect Digital Core, which is designed by bankers and guarantees consistent customer experiences and operational excellence.

c. Global Consumer Banking
Intellect enables investment in the best products. Designed around a 360° digital approach, Intellect products represent the best of both worlds including customer experience and operational efficiency.

d. Quantum Central Banking
Intellect Quantum is designed specifically for Central Banks, reducing complexities and driving informed decision-making, risk management, flexibility, integrated analytics, and unparalleled security.

e. Insurance
Intellect SEEC guarantees complete digital transformation, raising the bar on user-experience and reducing overall IT costs by 60% with artificial intelligence and underwriting workstation solutions.

f. FinTech Advisory
Our Fin Tech solutions ensure seamless support and operations through extensive validations, radical simplifications of products, processes, and operations, as well as on-the-job learning for employees.

g. Risk and Treasury Management
State-of-the-art Intellect OneTREASURY empowers traders with two-click trade booking, powerful hedging tools for simulations and ‘what if’ analysis to increase revenue, reduce risk and highlight data.

Risk and Treasury Management

State-of-the-art Intellect OneTREASURY empowers traders with two-click trade booking, powerful hedging tools for simulations and ‘what if’ analysis to increase revenue, reduce risk and highlight data.

a. IT Assessment
Our IT assessment service provides businesses such as banking, healthcare and manufacturing with key components to ensure IT meets need. Our consultants are equipped with vast in-depth knowledge of latest IT requirements, issues, laws, and new developments.

b. IT Strategy
Our IT strategy initiatives align IT with the business and help to develop capabilities to address a wide spectrum of organisational scenarios, covering strategic IT planning, digital and operating model design, business architecture, and big data analytics.

c. IT Governance and Organization
Our IT governance services enables organisations to align their IT with business objectives, developing effective, efficient processes as a result therefore actualising opportunities, maximising gains, increasing efficiency and automation, and reducing costs.

d. IT Project Effectiveness
Using best practice IT project management, we support and advise the design, development, and implementation of IT initiatives and products, helping to pinpoint areas of success and failure in current and future projects, using Agile or Waterfall philosophy.

Technology Assurance

In an era of escalating IT security and safety threats, every business is vulnerable. At Global Infoswift Consulting, we have a professional, knowledgeable Technology Assurance team highly experienced in every aspect of IT risk including cyber security, data analytics and social media.

a. Systems and Compliance Assessment
We provide in-depth regulatory experience and know-how to help companies with compliance functions, building the vision and driving strategies, capabilities and reporting activities to conform with best practice standards and frameworks.

b. Risk Management
The Enterprise Risk Management service helps organisations integrate risk management into their business and strategic processes, enabling them to take initiatives to create value, as well as respond to and mitigate risks appropriately.

c. Information & Cyber Security
We provide a comprehensive range of high-level, fully integrated cyber security services to help organisations assess, build, and manage their protection and security, as well as fully understand and respond to any incidents or threats

d. Payment & Data Security
We support clients in designing and implementing security around their critical data and payment infrastructure to support business operations.

e. Forensics
We utilise technology to expertly gather and analyse large sets of data enabling our clients to gather information and knowledge that can be used effectively to conduct investigations, negotiate with regulators, and settle any disputes.

f. Business Continuity and Disaster Recovery Management
Our knowledge and experience enable us to support organisations in the design and implementation of business resilience and continuity for processes and operations, based on long-standing best practice implementations and tested approach.

Digital

Customers today require more personalised services. At Global Infoswift Consulting, our digital consultants provide technical solutions for unparalleled client experience, with a seamless strategic approach to state-of-the art digital acquisition and efficient, risk-free implementation.

1. API/Appification
The benefits of creating applications using APIs as building blocks are being recognised as the best way to keep pace with the business and economic challenges facing industries. We support organisations with dynamic solutions to redefine frontiers and innovate with agility and speed.

2. Cloud Computing
Our cross-functional cloud computing services across public, private or hybrid options unlock immeasurable business value, supporting growth, enabling innovation, competitive advantage, agility, scalability, and flexibility, while addressing governance, risk, and compliance requirements.

3. Block Chain
Blockchain vows to bring trust and transparency to a world filled with uncertainty and the threat of fraud. At Global Infoswift Consulting, we support organisations and help them to implement advanced blockchain technology to eliminate inefficiencies created by a lack of trust and transparency.

4. Internet of Things
We assist clients in formulating IOT strategies and ensures all IOT implementations realize intended objective. As industries and businesses explore the exciting topic of the Internet of Things (IoT), we support organisations to successfully compete in the Internet of Things, utilizing these technologies to capture data at every touch point into a centralize data store which is then analysed and insights extracted to facilitate data-driven decision making.

5. Enterprise Resource Planning
We support organisations with a comprehensive and robust implementation of Enterprise Resource Planning (ERP) solutions, overcoming the hurdles and challenges through complete and thorough project and change management, enabling business processes to be managed far more effectively.

6. SMS Business Hub
We provide services to support both small and medium-sized businesses in the optimisation of performance for their clients using technology. Services include strategic planning, product optimisation, process automation, business registration, financial advisory, and business modelling.

7. REGTECH
Through strategic partnerships and technology, we help banks and other financial institutions to comply with rapidly changing regulations in an agile, efficient way, focusing on regulation, data, and people, so that organisations are able to live in a culture of confidence and compliance.

Data & Web Analytics

It can be difficult for organisations to make the right decisions, select the best options or gain competitive advantage. Big Data and Web Analytics enable our clients to approach problems and make decisions with confidence based on evidence from logical, structured analysis.

1. ACL AX & Revenue Assurance
We provide support and training for ACL AX data analysis and revenue assurance tools, ensuring organisations have the appropriate strategies to allow for expert data management and analysis.

2. E-Business and Web Assessment
We support organisations in designing e-business strategy and assessing their e-business platforms to ensure the highest level of performance, security, optimisation, and value are attained.

3. Big Data & Analytics
Our big data approach adopts big data tools to provide in-depth insights into customer behaviours, expectations and responses, while also predicting customer needs to meet them in a tailored manner.

Information Security

The Courses offered in this category include:

ISO 22301: SOCIETAL PREPAREDNESS AND CONTINUITY MANAGEMENT SYSTEM LEAD IMPLEMENTER

ISO 22301: SOCIETAL PREPAREDNESS AND CONTINUITY MANAGEMENT SYSTEM LEAD AUDITOR

CISSP EXAM PREPARATION

ISO 27001 LEAD AUDITOR

ISO 27001 CERTIFIED IMPLEMENTER

FUNDAMENTALS OF PCIDSS

PCI DSS Consulting Services - Information Security

Seeking PCI DSS compliance or maintaining your current PCI DSS certification?
You couldn’t be in better hands as we leverage on our deep knowledge and experience garnered from the years of PCIDSS engagements we have undertaken for diverse clients since we became a Qualified Security Assessor (QSA).

So, should you be embarking on the journey to PCIDSS compliance, permit us to guide you through every step as we take you through our “3 steps to PCIDSS certification”

– Diagonostics
– Implementation
– Remendiation Management & Compliance Assessment

We would begin with a Diagnostics phase which would comprise of certain activities of which the first would be a scoping assessment whereby we would consult with your personnel to understand your business and technical operations that would require compliance to the standard. Once these areas have been identified and defined, we would then proceed to conduct a gap assessment on the defined areas i.e. your scope of assessment.

The gap assessment would seek to determine the compliance level of your documentation, processes and information technology infrastructure to the PCIDSS standard. Once this has been accomplished, we would move to the last activity whereby we develop a blueprint which would state the steps required to close the identified gaps as well as improve your organizations security posture.

The diagnostic phase over, we would proceed to the next step: Implementation & Remediation Management. Here, we would proceed to provide support and guidance in the implementation of applicable PCIDSS controls. Our experience would be showcased here as we provide guidance on gap remediation and proffer alternate solutions, where necessary, to ensure the compliance requirements are met. Once all gaps have been closed, we would conduct a mock compliance assessment to ascertain the compliance posture of your firm.

Finally, the compliance assessment would be conducted by our team of certified Qualified Security Assessors (QSA) and the successful evidence of compliance delivered to you.

Our project management skills would be brought to the fore as the activities in each certification step would be conducted based on best practice project management methodologies. We also offer other value-added services such as PCIDSS post-certification support to ensure your on-going compliance journey is as hitch-free as possible.

Network Security Testing - Information Security

Our network security services focus on the network layer of our clients’ information system. We review and test the network and security control architecture. The assessment is conducted using global best practice standards/methodologies – methodologies based on successful combination of technical experience, professional security analysis tools, and knowledge of hacking techniques.

Digital Jewels Limited can help you identify and mitigate vulnerabilities present in network devices, such as firewalls, routers and switches as well as the core servers in the environment running Windows, Linux or UNIX operating systems.

To this end, we have adopted an effective and standard approach comprising of planning, assessing and testing, documenting, reporting and support geared towards identifying security weaknesses in your enterprise network and information systems environment and public facing web applications, preventing compromise of the valuable Information assets, evaluating security performance and ensuring security objectives of the enterprise information systems are met.

This effort gives a snapshot of your current network infrastructure’s security posture. This snapshot provides a baseline from which to validate compliance (or non-compliance) to corporate and regulatory security requirements, as well as a roadmap for future security initiatives.

ISMS ISO 27001 - Information Security

Thinking of adopting the Information Security standard (ISO 27001)?
Talk to Digital Jewels Limited today. Our experience in IT GRC consultancy spans banking, telecommunications, oil and gas servicing and government agencies in Africa, establishing our firm as a clear leader in Information Security Management Systems design.

WHY INFORMATION SECURITY?

In today’s fast-paced world we depend on IT systems. The convergence of information systems, multiple modes of business transactions in the cyberspace and communication systems has got the attention of miscreants and criminals (individuals and/or organizations).

These entities use old and existing attack tools and techniques to cause system and infrastructure failures, outright destruction of virtual and physical assets and reputational damage.

An effective way to confront all the risks organizations are exposed to involves a combination of strategies that include:

Implementation of information security best practice standards
State-of-the-art Technology solutions to protect stakeholders from security attacks
Enterprise wide Information Security Awareness to educate stakeholders on prevalent risks, mitigative and preventive measures.

HOW WE CAN HELP:

Digital Jewels key service offerings comprise of:

ISMS Training
Facilitation of hands-on ISMS awareness sessions
Information Security Assessments
Cybersecurity Assessments
ISMS development
Vulnerability Assessment and Penetration Testing
Risk assessments
Provision of quality assurance over the implementation of Risk Treatment Plans.
Development, execution and evaluation of compliance tests
Information Security Certification (ISO27001 Certification assistance)

OUR DIFFERENTIATORS:

Leader: The Firm is certified to the ISO27001:2013 (Information Security Management System) and ISO9001:2015 (Quality Management System) standards, and is a Qualified Security Assessor for the Payment Card Industry Data Security Standard (PCIDSS QSA). This makes it the only such professional services Firm in Africa to be so accredited.

Track Record: We have helped numerous clients attain ISO 27001 certification. Our Information Security Practice comprises of ISO 27001 Lead Implementers, ISO 27001 Lead Auditors, Lead Cyber Security managers (ISO 27032), CISSP, CISA, CISM and CRISC certified professionals who have helped organizations develop Information Security capabilities and programs, kindly explore our industry experience here…

Proven Solutions: we can meet any length of organizational Information Security requirement with our strengthened range of service offerings.

Expert Knowledge and Skills: Our team has a solid understanding of ISMS specific regulations, industry guidelines and trends, and prides itself on the ongoing enhancement of security and resilience solutions in line with the changing profile of global risks.

Multidisciplinary team: Our ISMS team leverages on the multi-disciplinary skills of the entire organization and offers an all-encompassing service

BENEFITS OF YOUR ORGANIZATION USING OUR APPROACH:

Our approach leads to cost effective outcomes. We have designed our framework to be flexible, so we can tailor our approach to meet your needs. We will get to know your organization and consider the current ISMS capabilities and business processes before making any recommendations.

Penetration Testing Services- Information Security

Whatever your reasons for seeking to conduct Risk or Vulnerability Assessment, a Stress or Penetration Test: regulatory, compliance, internal policy, etc., we would be pleased to avail you of our quality services in the execution of these tests as we leverage on our experience conducting technical security assessments for organisations in diverse industries

Our Security Assessments are based on best practice methodologies such as the Open Source Security Testing Methodology (OSSTMM), Open Web Application Security Project (OWASP) project, Penetration Testing Execution Standard (PTES), and the US National Institute of Standards and Technology (NIST) Technical guide to information security testing and assessment Special Publication 800-115. The application of these best practice methodologies, along with the accumulated knowledge and practical experience of our consultants from diverse IT backgrounds, ensure a focus on establishing the security weaknesses, defects, or flaws existent in your firm’s people, processes, and technologies with a view to mitigate and/or remediate these vulnerabilities with appropriate countermeasures and controls to attain an improved information security posture.

Our approach to a meaningful penetration test will commence with:

An intelligence gathering exercise where information concerning the people, processes, and technologies earmarked for the exercise would be gathered and analysed.
The conduct of a vulnerability assessment on the information assets whereby we would seek to confirm the existence of applicable vulnerabilities.
Vulnerabilities confirmed, we would seek to exploit them using various security techniques and tools.
Once the vulnerabilities have been exploited, our final exercise would be a risk assessment whereby we would rank the vulnerabilities based on the ease of exploitation and damage to your organisation if exploited, among other parameters.
Finally, we would submit reports listing our key findings and observations alongside an actionable roadmap with recommended timelines.

Overall, all our approach to the penetration test exercise would be based on best practice project management methodologies.

IT Gorvenance(COBIT ) - Information Assurance

IT Governance using COBIT 5 Framework
Information Technology has become pervasive and plays an increasingly significant role in organizations. Our approach towards the assessment of organizations’ IT Process capabilities and its subsequent improvement assist organizations in achieving their objectives for the governance and management of IT. This approach ensures that IT can continually provide benefit to the organization by optimizing resource, minimizing risk and thereby ensuring the strategic objective of value creation. We are effectively equipped to implement IT Governance using COBIT with our team of Certified Assessors and Implementers and our substantial track record in this area. Our four (4) phased approach which is based on COBIT 5 include:

Diagnostics: This phase involves project planning, using an assessment scoping methodology to define the scope of the assessment based on identifying relevant business drivers for IT, and the conduct of a rigorous assessment of organizations’ IT Process capabilities based on the COBIT 5 Process Assessment Model (PAM) and ISO/IEC 33002:2015, Information Technology—Process assessment. The targeted capability level for each IT Process is also defined and compared with the current capability level for each IT Process.
Design: This involves the development of an IT Process Improvement Blueprint and Roadmap based on the IT Process Assessment results which illustrate the as-is status of the selected IT Processes. Actionable improvement practices and activities for the Governance and Management of each of the selected IT Processes are recommended where deficiencies or gaps may exist between the current and targeted capability levels.
Implementation: This involves providing detailed guidance and project management support for establishing feasible and practical solutions for the implementation of the recommendation specified in the IT Process Improvement Blueprint and Roadmap. The improvement practices and activities for the selected IT Processes are prioritized into; immediate tactical, medium term strategic and long term game-changing for implementation. This phase also involves communication and awareness and project monitoring systems to ensure that recommendation are implemented.
Compliance and Assessment: This phase involves the review of the overall success of the IT Process improvement initiative based on the transition of the implemented management and governance practices and activities into normal business operations. Performance metrics are used to monitor the achievement of IT Process improvements and provide details of continuous improvement actions by focusing on the targeted capability level of each of the IT Processes as against the performance of the implemented practices and activities.

Our firms’ multidisciplinary consulting team is grounded in years of hands-on experience and our industry-leading Best Practices focus. With our guidance, companies have been able to maximize their business transformation value – from strategy to execution. We’ll bring lessons learned from those engagements to your unique initiative. Armed with insight from our client experiences, our consultants have the know-how to quickly assess your current performance and the expertise to accelerate your journey to operational excellence.

ITSMS ISO 20000 - Information Assurance

Our tested and proven methodology, along with our extensive experience ensures the effective and timely implementation of an IT Service Management System (ITSMS) and the eventual certification to the ISO/IEC 20000-1:2011 standard. This standard defines a comprehensive and closely related set of 13 service management processes to effectively deliver managed services to meet business and customer requirements.

Our consulting methodology follows the Plan-Do-Check-Act (PDCA) integrated process-based approach as adapted from the ISO/IEC 20000-1:2011,this approach is targeted at instituting a continuous improvement culture and is interpreted as follows:

Diagnostics: This phase involves project planning, defining the scope of the ITSMS and a rigorous Gap assessment aimed at examining the organization’s compliance to the mandatory requirements of the ISO/IEC 20000-1:2011 standard.
Design: An Implementation Blueprint is developed to address the gaps observed during the Diagnostics phase; this is to ensure conformity with the requirements of the standard.
Implementation/Remediation Management: The actual remediation of the gaps observed during the Gap Assessment is performed during this phase by leveraging on the guidance of the implementation blueprint from the Design Phase. This phase also involves wide-spread training and awareness sessions as well as the provision of adequate guidance on the implementation of the requirements (documentation, processes etc).
Compliance and Certification: The Information Technology Service Management System (ITSMS) certification audit is typically a two (2) stage audit exercise conducted by an Independent Registered Certification Body. The objective of Stage 1 Audit is to assess the readiness of the Service management system for the second phase (stage 2 Audit) which is the actual certification audit. Prior to this two-stage audit, we conduct a mock compliance audit to ascertain and guarantee the organization’s readiness.

BCMS ISO2301- Information Assurance

Thinking of adopting the Business Continuity standard (ISO 22301)?

Talk to Digital Jewels Limited today. Our experience in sub-Saharan Africa over the years in IT GRC consultancy spans banking, telecommunications, oil and gas servicing and government agencies, establishing our firm as a clear leader in Business Continuity Management Systems design.
Why Business Continuity:

No matter where you work or what security you have in place, there is a potential for “downside risk” [something unexpected to happen]. Everyday somewhere around the world, dangerous things happen:

Kidnaps
Insurgence
Cyber crime
Power failures
Security attacks
Technological failures
Reputational damage
Natural and Infrastructures disasters
Failure of Key dependencies /third party arrangements
Mass workforce absenteeism due to pandemics or civil unrest

We may not be able to stop disasters (man-made or natural) from happening but we can prepare for them. Trend analysis tells us that failure to develop Business continuity capabilities will have a devastating effect on organizations who fail to do so in this times.
How We Can Help:

Digital Jewels Limited will work with you to prepare for, respond to and recover from a crisis by building a reliable, pragmatic and long lasting business continuity program.

Digital Jewels Key Service Offerings in Business Continuity Management Comprise:

BCM Trainings
BCM Audits/review
BCMS development
Business Continuity Planning
Continuity Testing & Facilitation
Disaster recovery management development
Business Continuity Management (BCM) maturity assessment
Business Continuity certification (ISO22301 Certification assistance)

Where We Can Help:

Whether you are starting afresh, have existing continuity capabilities or with suave continuity capabilities, we can take you to the next level.

We can help asses existing capabilities and build a pragmatic programme to meet every business continuity programme requirements:

Cyber Resilience
Pandemic Planning
Succession Planning
Third Party Assurance
BC Audit & Gap Assessment
Towards a resilient Organization
Crisis Management planning & Communication
Outage Scenario Planning e.g. vendor, premise, staff
Building crisis ready Executives / Top Management
Anti- Kidnap Coping & Prevention Strategic Planning
ISO 22301 Certification to meet Regulatory Requirements

Our Differentiator:

Experience and track Record: We have helped numerous clients get their ISO 22301 certification. our continuity practise comprises of ISO 22301, Disaster Recovery Institute (DRI), British Continuity Institute (BCI) and BS 25999 professionals who have led organizations develop business continuity capabilities and programs, kindly explore our industry experience here.

Partnerships and Strong References: We are a premier partner of the British standard institute (BSI) and have served the unique needs of organizations of all sizes and across industries, we invite you to explore our positive client feedback here.

Proven Solutions: we can meet any length of organizational resilience or business continuity requirement with our strengthened range of service offerings.

Expert Knowledge and Skills: Our team has a solid understanding of continuity specific regulations, industry guidelines, trends and prides itself on the ongoing enhancement of continuity and resilience solutions in line with the changing profile of global risks.

Multidisciplinary team: Our Business Continuity team leverages on the multi-disciplinary skills of the entire organization and offer an all-encompassing service, covering topics like organizational resilience, threat analysis, emergency response, risk intelligence, crisis communication, cyber resilience.
Benefits to your business using our approach:

Our approach leads to cost effective outcomes. We have designed our framework to be flexible, so we can tailor our approach to meet your needs. We will get to know your organisation and consider the current business continuity capabilities and business processes before making any recommendations.
1. Effective facilities management:

Facilities are prone to diverse threats e.g. fire, robbery, insurgent attacks and so on, but using our approach proper business continuity planning, facilities can be designed for resilience.
2. Effective Crisis communication:

You can come out stronger after a crisis hits but this depends on how you communicate with your stakeholders during a crisis, safeguarding stakeholder confidence. Our proven Crisis communication strategy includes communicating the changes to business operation, managing relatives of affected personnel, facility shut-down or updates on service limitations.
3. Health & Safety:

We create systems to mitigate conceivable threats to staff or customers e.g. environmental hazards, chemical hazards, physical hazards, security threats, medical (disease outbreak) threats, workplace violence etc.
4. A blueprint for survival, resiliency and availability:

We prepare your organization to react quickly and decisively when the inevitable occurs.
5. Disaster Recovery:

Our approach addresses Disaster Recovery – the effective and timely resuscitation of the heart of your enterprise. Preparing the most critical IT systems for dooms day.
6. Knowledge Management:

In many organizations, the unavailability of a one or more key staff or executives due to illness, resignation, sudden death or other causes would affect the continuity of business operations. We ensure that through knowledge management critical information can survive beyond the lifetime of any staff.
7. Education, Awareness & Risk Reduction:

We educate your staff on prevention and coping strategies that help your organization reduce or totally avert the risks to the business.
8. Emergency management:

Our approach ensures that your Personnel will have access to BC Plans that ensure they know how to respond and recover from different outage scenarios. E.g. Unavailability of key staff or mass absenteeism, unavailability of site, unavailability of technology etc.
9. Security:

Data systems are prepared to withstand hacking or electronic tampering as BC strategies can be implemented to address security, integrity and availability issues.
10. Third Party Assurance:

Our approach provides the continuation of business in the event of a disruption to your supply chain. Resiliency checks would be done to ensure that key vendors have continuity arrangements to adequately support your business.

PM Health Checks - Project Management

Our programme and project management capabilities blend our expertise of best practice methodologies with local knowledge garnered from our wide range of experience. Our project management support portfolio includes Health Checks, Capacity Development, Project Management Office Implementation Support, Project Management Outsourcing and Resourcing Services.

Our Project Management support consists of:

Diagnostics and Assessment: Determining the improvement requirements and agreeing parameters for measuring impact and effectiveness of the improvement intervention.

Capacity Development: Equipping project staff with the knowledge, skills and techniques to understand and implement Project Management through certification‐based training. This service helps to institutionalize the adopted Project Management methodology and address skill gaps. View our Project Management Training courses.

Implementation of a Project Management Office: Setting up a Project Management Office through which the adopted methodology is customized for the Organization’s use and rolled out.

Project Management Outsourcing and Resourcing: Digital Jewels has a professional network and access to a pool of skillful professionals relevant to projects of any kind and scale. We are able to take up your project management responsibilities or assist to recruit personnel for it.

Our Trading helps clients run and transform their front, middle and back-office trading operations. We provide buy-side, sell-side and market infrastructure firms with a full-service offering, including systems integration and technology consulting services, to assist in delivering high performance trading and settlement capabilities across all asset classes. This includes strategy, architecture design, operating model work, process improvement, systems building and trading p

Our Partners