SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
RISE’s Profile
RISE is a company that works in a flexible environment, adjusting as
per our clients' requirements. Quality work is a prerequisite for every
task we undertake at RISE as we consider that "every day counts".
Rise for Information Technology Services
“47th Office Building Section 1,
Street 90-North, New Cairo”
Email: info@riseitadvisory.com
Website: www.riseitadvisory.com
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
About Us
RISE is a privately owned IT Development, Consulting and Training Services company
located at Cairo, Egypt offering Solutions to clients in Africa and Golf region. Our
services and solutions are designed with a focus on secure, scalable, expandable and
reliable processes. Through our low cost, high quality and reliable services, we serve
our clients giving them value for money and thus client satisfaction.
We Value our clients
RISE is a company that works in a flexible environment, adjusting as per our clients'
requirements. Quality work is a prerequisite for every task we undertake at RISE as we
consider that "every day counts". And why not; we know that good jobs always bring
new clients.
We believe in Quality
Attempting to provide world-class services, we always strive to provide you with
quality work and consider "every effort counts". Excellent and consistent quality at low
cost is what drives outsourcing business. And we play by the rules of the game.
We value our people
People are the key resources in any service industry. We highly value our people and
their performance. RISE ensures providing an environment to develop their skills and
offers them a rewarding career. Culture at RISE is governed by raising Innovate
Constantly, Illuminate its environment with learning and Integrate with knowledge
sharing.
Vision
To earn Global admiration as an IT & Information Security Service Provider by
delivering eminent Services.
Mission
To achieve our goal by providing distinguished software services in the global markets
by constant Innovation in Technology, Illuminating the surroundings by sharing our
knowledge and adopting an Integral approach towards work thus creating a congenial
and a nurturing environment that will enable us to increase our revenues consequently
increasing the assets for all our stakeholders.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Value
We are committed to deliver best industry practices coupled with emerging practical
and dependable technological solutions. Our team is specialized in every aspect of our
delivered Services.
We cherish and nurture our values and interactions with all our employees and clients.
We have high regards for individual value which creates a transparent atmosphere
ensuring outstanding teamwork and rapport, built within the company. We promise to
live up to our values.
Our values reflect in:
• Developing lasting beneficial relationships with our clients
• Confidentiality with respect to work
• Learning and Growing atmosphere
• Integrity expressed
• Independent and Reliable business objectives
Our approach
Our approach can be summed up by one phrase: Shared Ambition, True Results.
What does it mean?
Shared Ambition
RISE approaches every client's business as if it were our own. We believe a consulting
firm should be more than an advisor. We put ourselves in our clients' shoes, align our
incentives with their objectives, and collaborate to unlock the full potential of their
business. This builds deep and enjoyable relationships.
True Results
We were focused on results long before it became fashionable, and we continue to raise
the bar for the industry. True Results require tailored solutions not limited by
boundaries of departments, industries, geographies, or hierarchies. True Results are
pragmatic and action-oriented, enduring and repeatable
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Our Services:
 Our Consulting Services:
An effective, well-managed IT system is one of the most valuable business advantages
an organization can secure. The right technology, implemented properly, appropriately
managed and monitored, can lead to significant gains in growth and efficiency. It is
essential to ensure technology risks are managed. IT is challenging to get right and
expensive to get wrong — not only in terms of money spent, but also in lost efficiency
and potential regulatory infringements.
RISE’s IT Advisory services help the organizations to ensure of adequate preventative,
detective and corrective controls over IT systems.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
IT General controls
ITGCs apply to all systems
components, processes, and data
present in an organization or
systems environment.
The objectives of these controls are
to ensure the appropriate
development and implementation of
applications, as well as the integrity
of program and data files and of
computer operations.
The most common ITGCs are:
• Logical access controls over
infrastructure, applications, and
data.
• System development life cycle controls.
• Program change management controls.
• Physical security controls over the data center.
• System and data backup and recovery controls.
• Computer operation controls.
How we can help?
RISE’s IT General Control services help organizations ensure that adequate IT controls,
are in place and operating effectively.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
IT Application controls
Over the last several years, organizations around the world have spent billions of
dollars upgrading or installing new business application systems for different
reasons, ranging from tactical goals, such as year 2000 compliance, to strategic
activities, such as using technology as an enabler of company differentiation in the
marketplace. An application or application system is a type of software that enables
users to perform tasks by employing a computer’s capabilities directly.
Application controls are those controls that pertain to the scope of individual
business processes or application systems, including data edits, separation of
business functions, balancing of processing totals, transaction logging, and error
reporting.
Therefore, the objective of application controls is to ensure that:
• Input data is accurate, complete, authorized, and correct.
• Data is processed as intended in an acceptable time period.
• Data stored is accurate and complete.
• Outputs are accurate and complete.
• A record is maintained to track the process of data from input to storage and to
the eventual output.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Data Analysis
Although internal auditors have been
doing data analysis for more than 25
years, it has only recently started to
become standard practice. By our
nature, most accountants and auditors
are inclined to stick with what has
worked in the past, rather than reach
outside our comfort zones for an
alternative that could help us
accomplish more. What we should be
asking ourselves is, “Could we do
something electronically in 20 minutes
that would normally take us 20 hours,
and possibly improve the quality of our work as a result?”
There are many benefits that may be realized from the use of data analysis, including:
 Productivity and cost savings
Data analysis technology has enabled a number of organizations to realize
significant productivity improvements in audit planning, risk assessment, and
increasing the breadth and depth of audit coverage during the engagement.
Ultimately, this has enabled audit departments to broaden the scope of their
assurance activities, without having to increase audit staff. In some circumstances,
automation of analytic steps has lead to cost savings
through the reduction of staff necessary to complete the audit plan.
 Efficiency in data access
Data analysis technologies enable auditors to access and query data by themselves,
thereby decreasing their reliance on busy IT personnel having to run data extracts.
This helps provide a higher degree of confidence in the accuracy and completeness
of the data population being analyzed and introduces efficiencies in verifying the
accuracy of that information.
 Audit risk
The use of data analysis can significantly reduce audit risk by honing the risk
assessment and stratifying the population.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Security Review
Penetration Tests, Vulnerability Assessments and Security Audits,
External Attackers often make use of
already known vulnerabilities and exploits
in order to infiltrate in systems and
networks and then further extend their
position. This can actually be prevented in
advance, if one, in addition to taking
appropriate defensive measures and
adequate security design, is aware of the
already existing exposed systems and their
risks. If these examinations are carried out
at regular intervals an approved means is
available in order to recognize risks at an
early stage and derive appropriate
measures from here.
How we can help?
RISE’s Penetration Tests, Vulnerability Assessments and Security Audits services help
organizations ensure of the security over their Networks by using automated tools
which is useful for identifying known, standard vulnerabilities, and use manual
techniques to identify the system weaknesses which hackers could potentially use to
gain entry.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Business & System Process Controls
Business & System Process Controls, systems have over the years become the
foundation for many large and medium enterprises all over the world. Regardless of
whether applications are packages such as SAP, PeopleSoft, Oracle or custom built to
meet the specific business requirements. However, designing and implementing
effective controls and security is not often emphasized, leading to inadequate process
controls, high levels of security risk, or other system failures.
How we can help?
RISE’s Business & System Process Controls services help organizations ensure that
adequate systems controls, relating to a major application implementation, are in place
and operating effectively.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
 Our Development Services:
As a software development service provider, RISE strives to provide our customers
quality application development services and web development services that help them
to remain in step with their competitors.
 Our Training Services:
Our comprehensive, flexible training portfolio is focused on helping our customers
develop their Assurance Skills to be ready to meet any challenge. We offer the following
trainings:
1. Certified Information Systems Auditor "CISA", the CISA designation is a
globally recognized certification for IS audit control, assurance and security
professionals. Being CISA-certified showcases your audit experience, skills and
knowledge, and demonstrates you are capable to assess vulnerabilities, report on
compliance and institute controls within the enterprise.
2. Certified Information Security Manager "CISM", Demonstrate your
information security management expertise. The uniquely management-focused
CISM certification promotes international security practices and recognizes the
individual who manages designs, and oversees and assesses an enterprise’s
information security.
3. Certified in Risk and Information Systems Control "CRISC", CRISC is the only
certification that prepares and enables IT professionals for the unique challenges
of IT and enterprise risk management, and positions them to become strategic
partners to the enterprise.
4. COBIT 5 Assurance Course, COBIT 5 is the only business framework for the
governance and management of enterprise IT. Launched in April 2012, COBIT 5
helps maximize the value of information by incorporating the latest thinking in
enterprise governance and management techniques, and provides globally
accepted principles, practices, analytical tools and models to help increase the
trust in, and value from, information systems.
5. IT Audit For Non IT, this course is targeting non IT auditors (Financial and
Operational Auditors) who have limited experiences of IT systems and IT
controls, enabling them to perform General IT Controls testing over entities’ IT
environments. The main objectives of this course are to:
 Learn the fundamental concepts of IT systems.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
 Identify the resources and activities common to most IT systems.
 Testing GITCs.
 Understand the key concepts of applications controls.
6. Auditing SAP Application, in this course, attendees will investigate the risks
inherent in the SAP application, detailing some of the most effective control
opportunities one can configure or design into the application. We will cover the
critical business processes required to ensure that SAP is working as intended
and that processes/monitoring procedures support effective system control. We
will review the risks and general control opportunities provided by SAP, and
examine the security and basis configuration settings necessary to support a
strong control environment for the rest of the system.
7. Auditing Oracle Application, financial, operational, and IT auditors, members
of Oracle Applications implementation teams, along with financial and
accounting staff members concerned about internal controls, should acquire a
solid understanding of how the implementation and use of Oracle applications
will impact their organizations. This course will help attendees identify ways to
provide an effective and efficient audit in an Oracle applications environment as
well as how to audit Oracle applications security.
8. Data Analysis "ACL" Course, ACL’s integrated software solution standardizes
and streamlines key functions allowing you to increase team productivity and
efficiency by as much as 50% – materially increasing the value you bring to your
organization. ACL is the only software provider to seamlessly integrate the
industry’s standard data analytics capabilities into a comprehensive risk
assessment, audit management, workpapers, issue tracking and remediation
workflow with powerful visualization and dashboarding. In this course
attendees will know how to be professorial in using ACL tool.
9. Data Analysis "IDEA" Course, IDEA is easier to use than other analytics tools,
but learning a new technology on your own can be akin to taking a road trip
without a map. You may eventually get there, but it will probably take you
longer. We provide directions and short cuts that help you quickly navigate
through learning IDEA.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
Our People:
RISE prides itself on the quality of its administrative and academic staff. While
academic credentials and ability are important, we recruit staff primarily for their
passion, professionalism and team spirit.
Our administrative staff is responsible for the behind-the-scenes running of
courses. Since part of our ethos is to challenge delegates to push the boundaries of their
own capabilities, training can be a stressful process, especially when assignments and
exams come around. Their job is to ensure that our delegates experience the best
possible experience while they are on our training courses, and they need to be strict
but fair and caring when doing this.
Our academic staff is very special people indeed. Since our courses are much more
than a series of lectures, and are very practical in nature, our academic staff need to be
able to walk-the-walk, as well as talk-the-talk. They are not only great facilitators and
teachers, but they are able to coach, advice and mentor delegates as they complete their
practical work. Since a key objective of our training approach is to develop delegates
who have the self-confidence and knowledge to apply their skills when they leave us,
they have been carefully coached to 'facilitate learning' rather than 'teach'
The consulting staff in our Professional Services Division is experienced practitioners,
drawn from our academic staff, and practitioners from industry. We do not body-
shop. Instead, all resources are fully accredited in the products and services that they
are consulting in.
RISEfor Information Technology Services
‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬
“47th
Office Building Section 1,
Street 90-North, New Cairo”
www.riseitadvisory.com
RISE IT Advisory Services
IT Advisory Services focus on the risks inherent in the technology systems used to
support our clients' business objectives. Our team of highly skilled IT professionals has
the knowledge and experience to help clients manage technology risk and provide them
with the information they need to meet their strategic and financial goals.
Contact Us
Islam Ahmed
Managing Director & Co-Founder
RISE for IT Services
47th Office Building Section1,
Street 90-North, New Cairo.
Mobile :+(02) 012 222 122 79,
+ (02) 010 200 690 57
Email: i.ahmed@riseitadvisory.com
www.riseitservices.com
Ahmed El Noby
Senior Consultant
RISE for IT Services
47th Office Building Section1,
Street 90-North, New Cairo.
Mobile :+(02) 010 055 154 63
Email: a.elnoby@riseitadvisory.com
www.riseitservices.com

Contenu connexe

Tendances (14)

LAKKI Services
LAKKI ServicesLAKKI Services
LAKKI Services
 
Shi Capabilities Pdf
Shi Capabilities PdfShi Capabilities Pdf
Shi Capabilities Pdf
 
Erzam profl oct18
Erzam profl oct18Erzam profl oct18
Erzam profl oct18
 
Hello. We are ITS
Hello. We are ITSHello. We are ITS
Hello. We are ITS
 
IT Partners Capability Statement
IT Partners Capability StatementIT Partners Capability Statement
IT Partners Capability Statement
 
Corporate Booklet
Corporate BookletCorporate Booklet
Corporate Booklet
 
TNI Corporate Booklet
TNI Corporate BookletTNI Corporate Booklet
TNI Corporate Booklet
 
CORPORATE BOOKLET
CORPORATE BOOKLETCORPORATE BOOKLET
CORPORATE BOOKLET
 
brochure-kpo-services
brochure-kpo-servicesbrochure-kpo-services
brochure-kpo-services
 
Incedo corporate brochure brochure
Incedo corporate brochure brochureIncedo corporate brochure brochure
Incedo corporate brochure brochure
 
HANSA KPO Brochure
HANSA KPO BrochureHANSA KPO Brochure
HANSA KPO Brochure
 
Realtech Company Profile
Realtech Company ProfileRealtech Company Profile
Realtech Company Profile
 
Euro Consulting EMEA Company Profile
Euro Consulting EMEA Company ProfileEuro Consulting EMEA Company Profile
Euro Consulting EMEA Company Profile
 
Oracle partner
Oracle partnerOracle partner
Oracle partner
 

En vedette

OCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open Wide
OCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open WideOCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open Wide
OCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open WideOCCIware
 
OCCIware presentation at Cloud Expo Europe, March 11-12, London
OCCIware presentation at Cloud Expo Europe, March 11-12, LondonOCCIware presentation at Cloud Expo Europe, March 11-12, London
OCCIware presentation at Cloud Expo Europe, March 11-12, LondonOCCIware
 
OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...
OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...
OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...OCCIware
 
Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8
Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8
Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8Đại Học FPT, FPT university
 
React, Flux, ES6 and problems we met
React, Flux, ES6 and problems we metReact, Flux, ES6 and problems we met
React, Flux, ES6 and problems we metIhor Harahatyi
 
Sara chamali museum
Sara chamali museumSara chamali museum
Sara chamali museumSara_Chamali
 
OCCIware, a formal framework for Everything as a Service. OW2con'15, November...
OCCIware, a formal framework for Everything as a Service. OW2con'15, November...OCCIware, a formal framework for Everything as a Service. OW2con'15, November...
OCCIware, a formal framework for Everything as a Service. OW2con'15, November...OCCIware
 
WHINT Solutions Turn-key integration content 2017-01
WHINT Solutions Turn-key integration content 2017-01WHINT Solutions Turn-key integration content 2017-01
WHINT Solutions Turn-key integration content 2017-01Adam Kiwon
 
forms of literary criticism.
forms of literary criticism.forms of literary criticism.
forms of literary criticism.nicalim
 
Разработка технологии разделения суммарного редкоземельного концентрата на гр...
Разработка технологии разделения суммарного редкоземельного концентрата на гр...Разработка технологии разделения суммарного редкоземельного концентрата на гр...
Разработка технологии разделения суммарного редкоземельного концентрата на гр...didym
 

En vedette (14)

OCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open Wide
OCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open WideOCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open Wide
OCCIware Project at EclipseCon France 2016, by Marc Dutoo, Open Wide
 
OCCIware presentation at Cloud Expo Europe, March 11-12, London
OCCIware presentation at Cloud Expo Europe, March 11-12, LondonOCCIware presentation at Cloud Expo Europe, March 11-12, London
OCCIware presentation at Cloud Expo Europe, March 11-12, London
 
OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...
OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...
OCCIware Contribution to the EU consultation on Cloud Computing Research Inno...
 
RISE's Training Catalog
RISE's Training CatalogRISE's Training Catalog
RISE's Training Catalog
 
Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8
Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8
Câu lạc bộ Truyền thông Cóc Sài Gòn , Đại học FPT báo cáo hoạt động tháng 8
 
React, Flux, ES6 and problems we met
React, Flux, ES6 and problems we metReact, Flux, ES6 and problems we met
React, Flux, ES6 and problems we met
 
Sara chamali museum
Sara chamali museumSara chamali museum
Sara chamali museum
 
OCCIware, a formal framework for Everything as a Service. OW2con'15, November...
OCCIware, a formal framework for Everything as a Service. OW2con'15, November...OCCIware, a formal framework for Everything as a Service. OW2con'15, November...
OCCIware, a formal framework for Everything as a Service. OW2con'15, November...
 
02744
0274402744
02744
 
Kharkivpy
KharkivpyKharkivpy
Kharkivpy
 
Andrew O'Mahony CV PDF
Andrew O'Mahony CV PDFAndrew O'Mahony CV PDF
Andrew O'Mahony CV PDF
 
WHINT Solutions Turn-key integration content 2017-01
WHINT Solutions Turn-key integration content 2017-01WHINT Solutions Turn-key integration content 2017-01
WHINT Solutions Turn-key integration content 2017-01
 
forms of literary criticism.
forms of literary criticism.forms of literary criticism.
forms of literary criticism.
 
Разработка технологии разделения суммарного редкоземельного концентрата на гр...
Разработка технологии разделения суммарного редкоземельного концентрата на гр...Разработка технологии разделения суммарного редкоземельного концентрата на гр...
Разработка технологии разделения суммарного редкоземельного концентрата на гр...
 

Similaire à RISE's Profile

Similaire à RISE's Profile (20)

Cylsys Software Solution Profile
Cylsys Software Solution Profile Cylsys Software Solution Profile
Cylsys Software Solution Profile
 
electrical vendor india
electrical vendor indiaelectrical vendor india
electrical vendor india
 
electrical vendor india
electrical vendor indiaelectrical vendor india
electrical vendor india
 
DEPL Consulting Brochure
DEPL Consulting BrochureDEPL Consulting Brochure
DEPL Consulting Brochure
 
Cat Technologies Ltd.
Cat Technologies Ltd.Cat Technologies Ltd.
Cat Technologies Ltd.
 
Systematix_Portfolio
Systematix_PortfolioSystematix_Portfolio
Systematix_Portfolio
 
Overview
OverviewOverview
Overview
 
HUMAN RESOURCE MANAGEMENT REPORT
HUMAN RESOURCE MANAGEMENT REPORTHUMAN RESOURCE MANAGEMENT REPORT
HUMAN RESOURCE MANAGEMENT REPORT
 
TekWissen LLC
TekWissen LLCTekWissen LLC
TekWissen LLC
 
Tek Wissen LLc
Tek Wissen LLcTek Wissen LLc
Tek Wissen LLc
 
Tek Wissen Llc
Tek Wissen LlcTek Wissen Llc
Tek Wissen Llc
 
Tek wissen llc
Tek wissen llcTek wissen llc
Tek wissen llc
 
Vrx outsourcing profile
Vrx outsourcing profileVrx outsourcing profile
Vrx outsourcing profile
 
Office Centre Credentials
Office Centre CredentialsOffice Centre Credentials
Office Centre Credentials
 
All Pretium Brochure
All Pretium BrochureAll Pretium Brochure
All Pretium Brochure
 
UVIA Technologies Profile
UVIA Technologies ProfileUVIA Technologies Profile
UVIA Technologies Profile
 
Arokia IT Pvt Limited - Company Profile
Arokia IT Pvt Limited   - Company ProfileArokia IT Pvt Limited   - Company Profile
Arokia IT Pvt Limited - Company Profile
 
HW Profile
HW Profile HW Profile
HW Profile
 
company profile for SH
company profile for SHcompany profile for SH
company profile for SH
 
Orkest company profile
Orkest company profile    Orkest company profile
Orkest company profile
 

RISE's Profile

  • 1. RISE’s Profile RISE is a company that works in a flexible environment, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at RISE as we consider that "every day counts". Rise for Information Technology Services “47th Office Building Section 1, Street 90-North, New Cairo” Email: info@riseitadvisory.com Website: www.riseitadvisory.com
  • 2. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com About Us RISE is a privately owned IT Development, Consulting and Training Services company located at Cairo, Egypt offering Solutions to clients in Africa and Golf region. Our services and solutions are designed with a focus on secure, scalable, expandable and reliable processes. Through our low cost, high quality and reliable services, we serve our clients giving them value for money and thus client satisfaction. We Value our clients RISE is a company that works in a flexible environment, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at RISE as we consider that "every day counts". And why not; we know that good jobs always bring new clients. We believe in Quality Attempting to provide world-class services, we always strive to provide you with quality work and consider "every effort counts". Excellent and consistent quality at low cost is what drives outsourcing business. And we play by the rules of the game. We value our people People are the key resources in any service industry. We highly value our people and their performance. RISE ensures providing an environment to develop their skills and offers them a rewarding career. Culture at RISE is governed by raising Innovate Constantly, Illuminate its environment with learning and Integrate with knowledge sharing. Vision To earn Global admiration as an IT & Information Security Service Provider by delivering eminent Services. Mission To achieve our goal by providing distinguished software services in the global markets by constant Innovation in Technology, Illuminating the surroundings by sharing our knowledge and adopting an Integral approach towards work thus creating a congenial and a nurturing environment that will enable us to increase our revenues consequently increasing the assets for all our stakeholders.
  • 3. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com Value We are committed to deliver best industry practices coupled with emerging practical and dependable technological solutions. Our team is specialized in every aspect of our delivered Services. We cherish and nurture our values and interactions with all our employees and clients. We have high regards for individual value which creates a transparent atmosphere ensuring outstanding teamwork and rapport, built within the company. We promise to live up to our values. Our values reflect in: • Developing lasting beneficial relationships with our clients • Confidentiality with respect to work • Learning and Growing atmosphere • Integrity expressed • Independent and Reliable business objectives Our approach Our approach can be summed up by one phrase: Shared Ambition, True Results. What does it mean? Shared Ambition RISE approaches every client's business as if it were our own. We believe a consulting firm should be more than an advisor. We put ourselves in our clients' shoes, align our incentives with their objectives, and collaborate to unlock the full potential of their business. This builds deep and enjoyable relationships. True Results We were focused on results long before it became fashionable, and we continue to raise the bar for the industry. True Results require tailored solutions not limited by boundaries of departments, industries, geographies, or hierarchies. True Results are pragmatic and action-oriented, enduring and repeatable
  • 4. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com Our Services:  Our Consulting Services: An effective, well-managed IT system is one of the most valuable business advantages an organization can secure. The right technology, implemented properly, appropriately managed and monitored, can lead to significant gains in growth and efficiency. It is essential to ensure technology risks are managed. IT is challenging to get right and expensive to get wrong — not only in terms of money spent, but also in lost efficiency and potential regulatory infringements. RISE’s IT Advisory services help the organizations to ensure of adequate preventative, detective and corrective controls over IT systems.
  • 5. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com IT General controls ITGCs apply to all systems components, processes, and data present in an organization or systems environment. The objectives of these controls are to ensure the appropriate development and implementation of applications, as well as the integrity of program and data files and of computer operations. The most common ITGCs are: • Logical access controls over infrastructure, applications, and data. • System development life cycle controls. • Program change management controls. • Physical security controls over the data center. • System and data backup and recovery controls. • Computer operation controls. How we can help? RISE’s IT General Control services help organizations ensure that adequate IT controls, are in place and operating effectively.
  • 6. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com IT Application controls Over the last several years, organizations around the world have spent billions of dollars upgrading or installing new business application systems for different reasons, ranging from tactical goals, such as year 2000 compliance, to strategic activities, such as using technology as an enabler of company differentiation in the marketplace. An application or application system is a type of software that enables users to perform tasks by employing a computer’s capabilities directly. Application controls are those controls that pertain to the scope of individual business processes or application systems, including data edits, separation of business functions, balancing of processing totals, transaction logging, and error reporting. Therefore, the objective of application controls is to ensure that: • Input data is accurate, complete, authorized, and correct. • Data is processed as intended in an acceptable time period. • Data stored is accurate and complete. • Outputs are accurate and complete. • A record is maintained to track the process of data from input to storage and to the eventual output.
  • 7. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com Data Analysis Although internal auditors have been doing data analysis for more than 25 years, it has only recently started to become standard practice. By our nature, most accountants and auditors are inclined to stick with what has worked in the past, rather than reach outside our comfort zones for an alternative that could help us accomplish more. What we should be asking ourselves is, “Could we do something electronically in 20 minutes that would normally take us 20 hours, and possibly improve the quality of our work as a result?” There are many benefits that may be realized from the use of data analysis, including:  Productivity and cost savings Data analysis technology has enabled a number of organizations to realize significant productivity improvements in audit planning, risk assessment, and increasing the breadth and depth of audit coverage during the engagement. Ultimately, this has enabled audit departments to broaden the scope of their assurance activities, without having to increase audit staff. In some circumstances, automation of analytic steps has lead to cost savings through the reduction of staff necessary to complete the audit plan.  Efficiency in data access Data analysis technologies enable auditors to access and query data by themselves, thereby decreasing their reliance on busy IT personnel having to run data extracts. This helps provide a higher degree of confidence in the accuracy and completeness of the data population being analyzed and introduces efficiencies in verifying the accuracy of that information.  Audit risk The use of data analysis can significantly reduce audit risk by honing the risk assessment and stratifying the population.
  • 8. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com Security Review Penetration Tests, Vulnerability Assessments and Security Audits, External Attackers often make use of already known vulnerabilities and exploits in order to infiltrate in systems and networks and then further extend their position. This can actually be prevented in advance, if one, in addition to taking appropriate defensive measures and adequate security design, is aware of the already existing exposed systems and their risks. If these examinations are carried out at regular intervals an approved means is available in order to recognize risks at an early stage and derive appropriate measures from here. How we can help? RISE’s Penetration Tests, Vulnerability Assessments and Security Audits services help organizations ensure of the security over their Networks by using automated tools which is useful for identifying known, standard vulnerabilities, and use manual techniques to identify the system weaknesses which hackers could potentially use to gain entry.
  • 9. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com Business & System Process Controls Business & System Process Controls, systems have over the years become the foundation for many large and medium enterprises all over the world. Regardless of whether applications are packages such as SAP, PeopleSoft, Oracle or custom built to meet the specific business requirements. However, designing and implementing effective controls and security is not often emphasized, leading to inadequate process controls, high levels of security risk, or other system failures. How we can help? RISE’s Business & System Process Controls services help organizations ensure that adequate systems controls, relating to a major application implementation, are in place and operating effectively.
  • 10. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com  Our Development Services: As a software development service provider, RISE strives to provide our customers quality application development services and web development services that help them to remain in step with their competitors.  Our Training Services: Our comprehensive, flexible training portfolio is focused on helping our customers develop their Assurance Skills to be ready to meet any challenge. We offer the following trainings: 1. Certified Information Systems Auditor "CISA", the CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. 2. Certified Information Security Manager "CISM", Demonstrate your information security management expertise. The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security. 3. Certified in Risk and Information Systems Control "CRISC", CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise. 4. COBIT 5 Assurance Course, COBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques, and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. 5. IT Audit For Non IT, this course is targeting non IT auditors (Financial and Operational Auditors) who have limited experiences of IT systems and IT controls, enabling them to perform General IT Controls testing over entities’ IT environments. The main objectives of this course are to:  Learn the fundamental concepts of IT systems.
  • 11. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com  Identify the resources and activities common to most IT systems.  Testing GITCs.  Understand the key concepts of applications controls. 6. Auditing SAP Application, in this course, attendees will investigate the risks inherent in the SAP application, detailing some of the most effective control opportunities one can configure or design into the application. We will cover the critical business processes required to ensure that SAP is working as intended and that processes/monitoring procedures support effective system control. We will review the risks and general control opportunities provided by SAP, and examine the security and basis configuration settings necessary to support a strong control environment for the rest of the system. 7. Auditing Oracle Application, financial, operational, and IT auditors, members of Oracle Applications implementation teams, along with financial and accounting staff members concerned about internal controls, should acquire a solid understanding of how the implementation and use of Oracle applications will impact their organizations. This course will help attendees identify ways to provide an effective and efficient audit in an Oracle applications environment as well as how to audit Oracle applications security. 8. Data Analysis "ACL" Course, ACL’s integrated software solution standardizes and streamlines key functions allowing you to increase team productivity and efficiency by as much as 50% – materially increasing the value you bring to your organization. ACL is the only software provider to seamlessly integrate the industry’s standard data analytics capabilities into a comprehensive risk assessment, audit management, workpapers, issue tracking and remediation workflow with powerful visualization and dashboarding. In this course attendees will know how to be professorial in using ACL tool. 9. Data Analysis "IDEA" Course, IDEA is easier to use than other analytics tools, but learning a new technology on your own can be akin to taking a road trip without a map. You may eventually get there, but it will probably take you longer. We provide directions and short cuts that help you quickly navigate through learning IDEA.
  • 12. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com Our People: RISE prides itself on the quality of its administrative and academic staff. While academic credentials and ability are important, we recruit staff primarily for their passion, professionalism and team spirit. Our administrative staff is responsible for the behind-the-scenes running of courses. Since part of our ethos is to challenge delegates to push the boundaries of their own capabilities, training can be a stressful process, especially when assignments and exams come around. Their job is to ensure that our delegates experience the best possible experience while they are on our training courses, and they need to be strict but fair and caring when doing this. Our academic staff is very special people indeed. Since our courses are much more than a series of lectures, and are very practical in nature, our academic staff need to be able to walk-the-walk, as well as talk-the-talk. They are not only great facilitators and teachers, but they are able to coach, advice and mentor delegates as they complete their practical work. Since a key objective of our training approach is to develop delegates who have the self-confidence and knowledge to apply their skills when they leave us, they have been carefully coached to 'facilitate learning' rather than 'teach' The consulting staff in our Professional Services Division is experienced practitioners, drawn from our academic staff, and practitioners from industry. We do not body- shop. Instead, all resources are fully accredited in the products and services that they are consulting in.
  • 13. RISEfor Information Technology Services ‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ ‫ـ‬‫ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬‫ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‬ “47th Office Building Section 1, Street 90-North, New Cairo” www.riseitadvisory.com RISE IT Advisory Services IT Advisory Services focus on the risks inherent in the technology systems used to support our clients' business objectives. Our team of highly skilled IT professionals has the knowledge and experience to help clients manage technology risk and provide them with the information they need to meet their strategic and financial goals. Contact Us Islam Ahmed Managing Director & Co-Founder RISE for IT Services 47th Office Building Section1, Street 90-North, New Cairo. Mobile :+(02) 012 222 122 79, + (02) 010 200 690 57 Email: i.ahmed@riseitadvisory.com www.riseitservices.com Ahmed El Noby Senior Consultant RISE for IT Services 47th Office Building Section1, Street 90-North, New Cairo. Mobile :+(02) 010 055 154 63 Email: a.elnoby@riseitadvisory.com www.riseitservices.com