Audit & Advisory Solutions
Audit & Advisory Solutions
Information technology compliance and security
We help your company identify and assess IT security risks and develop a control environment which complies with South African legislation as well as with international standards. Risk X assists your company in forming a clear and true picture of the value-creating potential, weaknesses and future challenges related to your organisation’s information technology. Our services prepare your organisation for the early detection and standard-compliant management of risks which arise during its business operations. As independent auditors we can verify the adequate operation of your organisation’s IT systems for supervisory authorities.
GENERAL DATA PROTECTION REGULATION
Our team specialises in all aspects of the requirements from discovery of data locations, to a Privacy Information Management System (PIMS) framework, to the security of the systems that this information is housed on.
ISO 27001:2022
Risk X has developed methodologies over many engagements that assist with governance, policy and the technical controls required.
PCI DSS QUALIFIED ASSESSOR
Risk X’s overall approach and the services it offers to achieve PCI DSS compliance has been tried and tested. As a PCI QSA company we offer both advisory and audit services in this area.
OUTSOURCED CISO
CISO assist and provide quidance with integration of security within business processes. Establishing and retaining the necessary in-depth knowledge can be difficult and expensive for an organisation. Risk X can provide you with the assurance and backup that you require on an ad-hoc or scheduled basis with one of our Outsourced CISOs.
PCI P2PE QUALIFIED ASSESSOR
Risk X is an experienced advisor, and PC SSC qualified assessor of PCI Point-to-Point Encryption (P2PE) Solutions and P2PE Components. Through secure encryption, these solutions significantly reduce merchants’ PCI DSS validation efforts, while providing robust protection of cardholder data from its encryption at the POI device until decryption in the Decryption Environment.