1. RISE’s Profile
RISE is a company that works in a flexible environment, adjusting as
per our clients' requirements. Quality work is a prerequisite for every
task we undertake at RISE as we consider that "every day counts".
Rise for Information Technology Services
“47th Office Building Section 1,
Street 90-North, New Cairo”
Email: info@riseitadvisory.com
Website: www.riseitadvisory.com
2. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
About Us
RISE is a privately owned IT Development, Consulting and Training Services company
located at Cairo, Egypt offering Solutions to clients in Africa and Golf region. Our
services and solutions are designed with a focus on secure, scalable, expandable and
reliable processes. Through our low cost, high quality and reliable services, we serve
our clients giving them value for money and thus client satisfaction.
We Value our clients
RISE is a company that works in a flexible environment, adjusting as per our clients'
requirements. Quality work is a prerequisite for every task we undertake at RISE as we
consider that "every day counts". And why not; we know that good jobs always bring
new clients.
We believe in Quality
Attempting to provide world-class services, we always strive to provide you with
quality work and consider "every effort counts". Excellent and consistent quality at low
cost is what drives outsourcing business. And we play by the rules of the game.
We value our people
People are the key resources in any service industry. We highly value our people and
their performance. RISE ensures providing an environment to develop their skills and
offers them a rewarding career. Culture at RISE is governed by raising Innovate
Constantly, Illuminate its environment with learning and Integrate with knowledge
sharing.
Vision
To earn Global admiration as an IT & Information Security Service Provider by
delivering eminent Services.
Mission
To achieve our goal by providing distinguished software services in the global markets
by constant Innovation in Technology, Illuminating the surroundings by sharing our
knowledge and adopting an Integral approach towards work thus creating a congenial
and a nurturing environment that will enable us to increase our revenues consequently
increasing the assets for all our stakeholders.
3. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Value
We are committed to deliver best industry practices coupled with emerging practical
and dependable technological solutions. Our team is specialized in every aspect of our
delivered Services.
We cherish and nurture our values and interactions with all our employees and clients.
We have high regards for individual value which creates a transparent atmosphere
ensuring outstanding teamwork and rapport, built within the company. We promise to
live up to our values.
Our values reflect in:
• Developing lasting beneficial relationships with our clients
• Confidentiality with respect to work
• Learning and Growing atmosphere
• Integrity expressed
• Independent and Reliable business objectives
Our approach
Our approach can be summed up by one phrase: Shared Ambition, True Results.
What does it mean?
Shared Ambition
RISE approaches every client's business as if it were our own. We believe a consulting
firm should be more than an advisor. We put ourselves in our clients' shoes, align our
incentives with their objectives, and collaborate to unlock the full potential of their
business. This builds deep and enjoyable relationships.
True Results
We were focused on results long before it became fashionable, and we continue to raise
the bar for the industry. True Results require tailored solutions not limited by
boundaries of departments, industries, geographies, or hierarchies. True Results are
pragmatic and action-oriented, enduring and repeatable
4. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Our Services:
Our Consulting Services:
An effective, well-managed IT system is one of the most valuable business advantages
an organization can secure. The right technology, implemented properly, appropriately
managed and monitored, can lead to significant gains in growth and efficiency. It is
essential to ensure technology risks are managed. IT is challenging to get right and
expensive to get wrong — not only in terms of money spent, but also in lost efficiency
and potential regulatory infringements.
RISE’s IT Advisory services help the organizations to ensure of adequate preventative,
detective and corrective controls over IT systems.
5. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
IT General controls
ITGCs apply to all systems
components, processes, and data
present in an organization or
systems environment.
The objectives of these controls are
to ensure the appropriate
development and implementation of
applications, as well as the integrity
of program and data files and of
computer operations.
The most common ITGCs are:
• Logical access controls over
infrastructure, applications, and
data.
• System development life cycle controls.
• Program change management controls.
• Physical security controls over the data center.
• System and data backup and recovery controls.
• Computer operation controls.
How we can help?
RISE’s IT General Control services help organizations ensure that adequate IT controls,
are in place and operating effectively.
6. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
IT Application controls
Over the last several years, organizations around the world have spent billions of
dollars upgrading or installing new business application systems for different
reasons, ranging from tactical goals, such as year 2000 compliance, to strategic
activities, such as using technology as an enabler of company differentiation in the
marketplace. An application or application system is a type of software that enables
users to perform tasks by employing a computer’s capabilities directly.
Application controls are those controls that pertain to the scope of individual
business processes or application systems, including data edits, separation of
business functions, balancing of processing totals, transaction logging, and error
reporting.
Therefore, the objective of application controls is to ensure that:
• Input data is accurate, complete, authorized, and correct.
• Data is processed as intended in an acceptable time period.
• Data stored is accurate and complete.
• Outputs are accurate and complete.
• A record is maintained to track the process of data from input to storage and to
the eventual output.
7. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Data Analysis
Although internal auditors have been
doing data analysis for more than 25
years, it has only recently started to
become standard practice. By our
nature, most accountants and auditors
are inclined to stick with what has
worked in the past, rather than reach
outside our comfort zones for an
alternative that could help us
accomplish more. What we should be
asking ourselves is, “Could we do
something electronically in 20 minutes
that would normally take us 20 hours,
and possibly improve the quality of our work as a result?”
There are many benefits that may be realized from the use of data analysis, including:
Productivity and cost savings
Data analysis technology has enabled a number of organizations to realize
significant productivity improvements in audit planning, risk assessment, and
increasing the breadth and depth of audit coverage during the engagement.
Ultimately, this has enabled audit departments to broaden the scope of their
assurance activities, without having to increase audit staff. In some circumstances,
automation of analytic steps has lead to cost savings
through the reduction of staff necessary to complete the audit plan.
Efficiency in data access
Data analysis technologies enable auditors to access and query data by themselves,
thereby decreasing their reliance on busy IT personnel having to run data extracts.
This helps provide a higher degree of confidence in the accuracy and completeness
of the data population being analyzed and introduces efficiencies in verifying the
accuracy of that information.
Audit risk
The use of data analysis can significantly reduce audit risk by honing the risk
assessment and stratifying the population.
8. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Security Review
Penetration Tests, Vulnerability Assessments and Security Audits,
External Attackers often make use of
already known vulnerabilities and exploits
in order to infiltrate in systems and
networks and then further extend their
position. This can actually be prevented in
advance, if one, in addition to taking
appropriate defensive measures and
adequate security design, is aware of the
already existing exposed systems and their
risks. If these examinations are carried out
at regular intervals an approved means is
available in order to recognize risks at an
early stage and derive appropriate
measures from here.
How we can help?
RISE’s Penetration Tests, Vulnerability Assessments and Security Audits services help
organizations ensure of the security over their Networks by using automated tools
which is useful for identifying known, standard vulnerabilities, and use manual
techniques to identify the system weaknesses which hackers could potentially use to
gain entry.
9. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Business & System Process Controls
Business & System Process Controls, systems have over the years become the
foundation for many large and medium enterprises all over the world. Regardless of
whether applications are packages such as SAP, PeopleSoft, Oracle or custom built to
meet the specific business requirements. However, designing and implementing
effective controls and security is not often emphasized, leading to inadequate process
controls, high levels of security risk, or other system failures.
How we can help?
RISE’s Business & System Process Controls services help organizations ensure that
adequate systems controls, relating to a major application implementation, are in place
and operating effectively.
10. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Our Development Services:
As a software development service provider, RISE strives to provide our customers
quality application development services and web development services that help them
to remain in step with their competitors.
Our Training Services:
Our comprehensive, flexible training portfolio is focused on helping our customers
develop their Assurance Skills to be ready to meet any challenge. We offer the following
trainings:
1. Certified Information Systems Auditor "CISA", the CISA designation is a
globally recognized certification for IS audit control, assurance and security
professionals. Being CISA-certified showcases your audit experience, skills and
knowledge, and demonstrates you are capable to assess vulnerabilities, report on
compliance and institute controls within the enterprise.
2. Certified Information Security Manager "CISM", Demonstrate your
information security management expertise. The uniquely management-focused
CISM certification promotes international security practices and recognizes the
individual who manages designs, and oversees and assesses an enterprise’s
information security.
3. Certified in Risk and Information Systems Control "CRISC", CRISC is the only
certification that prepares and enables IT professionals for the unique challenges
of IT and enterprise risk management, and positions them to become strategic
partners to the enterprise.
4. COBIT 5 Assurance Course, COBIT 5 is the only business framework for the
governance and management of enterprise IT. Launched in April 2012, COBIT 5
helps maximize the value of information by incorporating the latest thinking in
enterprise governance and management techniques, and provides globally
accepted principles, practices, analytical tools and models to help increase the
trust in, and value from, information systems.
5. IT Audit For Non IT, this course is targeting non IT auditors (Financial and
Operational Auditors) who have limited experiences of IT systems and IT
controls, enabling them to perform General IT Controls testing over entities’ IT
environments. The main objectives of this course are to:
Learn the fundamental concepts of IT systems.
11. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Identify the resources and activities common to most IT systems.
Testing GITCs.
Understand the key concepts of applications controls.
6. Auditing SAP Application, in this course, attendees will investigate the risks
inherent in the SAP application, detailing some of the most effective control
opportunities one can configure or design into the application. We will cover the
critical business processes required to ensure that SAP is working as intended
and that processes/monitoring procedures support effective system control. We
will review the risks and general control opportunities provided by SAP, and
examine the security and basis configuration settings necessary to support a
strong control environment for the rest of the system.
7. Auditing Oracle Application, financial, operational, and IT auditors, members
of Oracle Applications implementation teams, along with financial and
accounting staff members concerned about internal controls, should acquire a
solid understanding of how the implementation and use of Oracle applications
will impact their organizations. This course will help attendees identify ways to
provide an effective and efficient audit in an Oracle applications environment as
well as how to audit Oracle applications security.
8. Data Analysis "ACL" Course, ACL’s integrated software solution standardizes
and streamlines key functions allowing you to increase team productivity and
efficiency by as much as 50% – materially increasing the value you bring to your
organization. ACL is the only software provider to seamlessly integrate the
industry’s standard data analytics capabilities into a comprehensive risk
assessment, audit management, workpapers, issue tracking and remediation
workflow with powerful visualization and dashboarding. In this course
attendees will know how to be professorial in using ACL tool.
9. Data Analysis "IDEA" Course, IDEA is easier to use than other analytics tools,
but learning a new technology on your own can be akin to taking a road trip
without a map. You may eventually get there, but it will probably take you
longer. We provide directions and short cuts that help you quickly navigate
through learning IDEA.
12. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Our People:
RISE prides itself on the quality of its administrative and academic staff. While
academic credentials and ability are important, we recruit staff primarily for their
passion, professionalism and team spirit.
Our administrative staff is responsible for the behind-the-scenes running of
courses. Since part of our ethos is to challenge delegates to push the boundaries of their
own capabilities, training can be a stressful process, especially when assignments and
exams come around. Their job is to ensure that our delegates experience the best
possible experience while they are on our training courses, and they need to be strict
but fair and caring when doing this.
Our academic staff is very special people indeed. Since our courses are much more
than a series of lectures, and are very practical in nature, our academic staff need to be
able to walk-the-walk, as well as talk-the-talk. They are not only great facilitators and
teachers, but they are able to coach, advice and mentor delegates as they complete their
practical work. Since a key objective of our training approach is to develop delegates
who have the self-confidence and knowledge to apply their skills when they leave us,
they have been carefully coached to 'facilitate learning' rather than 'teach'
The consulting staff in our Professional Services Division is experienced practitioners,
drawn from our academic staff, and practitioners from industry. We do not body-
shop. Instead, all resources are fully accredited in the products and services that they
are consulting in.
13. RISEfor Information Technology Services
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
RISE IT Advisory Services
IT Advisory Services focus on the risks inherent in the technology systems used to
support our clients' business objectives. Our team of highly skilled IT professionals has
the knowledge and experience to help clients manage technology risk and provide them
with the information they need to meet their strategic and financial goals.
Contact Us
Islam Ahmed
Managing Director & Co-Founder
RISE for IT Services
47th Office Building Section1,
Street 90-North, New Cairo.
Mobile :+(02) 012 222 122 79,
+ (02) 010 200 690 57
Email: i.ahmed@riseitadvisory.com
www.riseitservices.com
Ahmed El Noby
Senior Consultant
RISE for IT Services
47th Office Building Section1,
Street 90-North, New Cairo.
Mobile :+(02) 010 055 154 63
Email: a.elnoby@riseitadvisory.com
www.riseitservices.com