The hidden and at times open potential for misuse and damage in complex, historically grown IT infrastructures provides opportunities for multiple misuse. Wilful or negligent damaging of the asset status in connection with the use of technology shows an increasing tendency in the global, but also in the European context. Investigating such suspicious circumstances requires both professional and methodical competence while at the same time maintaining organizational independence. Furthermore, confidentiality, accuracy and highly professional standards are the basis for successful action on behalf of committees of affected institutions under suspicion.
The coordination of the work assignment, the preliminary definition of the circumstances, which does not yet claim to define these circumstances exhaustively, usually serves as a working basis for our experts of the COREadvisory regarding confidential questions of our clients' committees. In the course of the investigation, precision is provided which often lasts until the end of the mandate or investigation. It is essential that the questions' exactness correlates with the anticipated exactness of the expected response canon.
Audit cases of the COREadvisory regularly represent individual situations whose methodical and procedural processing does not make economic sense. However, this circumstance leads to a situation in which, especially in systems with a high functional scope and high functional complexity, the depth of penetration into the facts is low, provided that standard audit procedures are used. Meaningful audits can therefore only be ensured if a high level of experience, methodological and procedural strength and broad technological knowledge are combined. The institutional capabilities of the COREadvisory are aimed at being able to deal with these issues competently, profoundly and efficiently and therefore represent a singular offer.
The results of our audits or consultations regularly affect aspects regarding business strategy and those critical to the success within our clients' business set-up. For this reason, we are committed to the highest degree of confidentiality in the early phases of cooperation, the interim analyses and, in particular, in the later phases of cooperation. Due to this circumstance, corresponding mandates are processed in secure system environments with highly effective encryption and cannot be detected by third parties using state-of-the-art technology.