Sort Alphabetically

A. Fraud/Threat Assessment:

Initial Focuses:

1. What anti-fraud/anti-threat strategy, policies, systems, procedures and automated processes presently exists within the clients operation

2. Internal fraud/threat risks specific to client’s operation

3. External fraud/threat risks specific to client’s operation

4. Weaknesses and areas of exposure

B. Analysis and Prioritization:

A full-scale assessment of the clients operation, includes, but is not limited to:

1. An in-depth analysis is performed of the company operations, on a global basis, and drilling down to divisional and departmental levels examining both the administrative (manual) and technological (automated) side. This is done to clearly understand the client’s operation and methodology.

2. Examination of the existing policies, protocols, systems and procedures dealing with security, ant-threat and anti-fraud operations (if formally existing)

3. Interviews with applicable personnel on a company-wide basis, to identify the present operations methodology and identify weaknesses, areas of exposure or missing components

4. Define the objectives and policies of the client in relation with anti-fraud/anti-threat operations

5. Identify, with client, any current frauds/threats that exist or have taken place that are in progress, being addressed or not addressed

6. Identify applicable staffing that will be directly involved with the development, management and maintenance of anti-fraud/anti-threat operations, methodology and policies

7. Examination and analysis of the manual operations relating to fraud/threat control

8. Examination of the automated operations relating to fraud/threat control

9. Examination of company formal strategy and policies addressing frauds and threats (if formally in place)

C. Report Generation and Recommendations:

Analyze and distill the information acquired into:

1. A summary of the present operations, its weaknesses or missing components, rated on a priority scale (e.g. from minor to major, and/or through numeric rating)

2. Summarizing the priorities into two categories, manual and automated

3. Provide a list of recommendations for each category (manual and automated), addressing the recommended solutions, steps and procedures to be used to build an anti-fraud/anti-threat operation for the client, including strategy, methodology, policies, systems, procedures and the like

4. Provide a list of recommendations for the integration of such work into the existing operation of client

5. Provide a list of recommendations addressing response methodology, mitigation strategy, policies and procedures

6. Provide a list of recommendations addressing post-fraud follow-through and future maintenance.

7. Provide a cost justification for such recommendations

8. Provide a clear, detailed cost proposal of services to be provided to client

9. Provide an initial “raw” timetable projecting the amount of time for each phase of the anti-fraud/anti-threat operations to be researched, developed and implemented

10. Present the issues, plan and proposal

D. Implementation:

Research, development and delivery of the recommended tailored solutions that will use best reasonable effort (BRE) to contain/reduce frauds and threat within the client operations, both internally and externally. This will include, but is not limited to:

1. Formation of company initial strategy and recommended policies

1. Full installation of technical tools (if applicable)

2. Full integration of manual operations, systems, procedures, protocols, and policies

3. Training and education

4. Management and personnel auditing controls and recommendations

5. A best, reasonable effort time table for such steps of both implementation and integration into client’s operation

E. Testing, Auditing and Support:

Upon implementation, various testing and simulated trial attacks will be performed (both manually and automated) on the anti-fraud / anti-threat systems and operation. From such tests, we will be able to:

1. Evaluate with the client the results, weaknesses and effectiveness of the implemented operations (both manual and automated), systems, procedures and policies and the necessary steps to correct issues, problems or functionality.

2. Gauge response time and adaption to the processes.

3. Perform support and required follow-up.

F. Post-Implementation and Support

Establish with client a schedule of reviews and follow-ups to fine-tune company strategy, policies and procedures, as well as institute an ongoing maintenance plan that addresses all applicable facets of company anti-fraud/anti-threat operations.

G. Business/Institution Rescue

1. Stage 1 – Analysis/Diagnosis

a. What can be done to mitigate the damage incurred

b. What can be done to mitigate the ongoing and projected damages

c. Determine if the condition of the business can be stabilized or not

d. What can be done to immediately stabilize the present condition of the business/institution

e. What can be done to establish the necessary management and personnel (either permanently or on an interim basis) who are capable of performing the necessary rescue operations

f. Establish the necessary strategy and policies to perform the rescue operation

g. Should it be determined that the business/institution cannot be stabilized, then what are the necessary steps to terminate the operation (e.g. liquidate, close down) and to use best reasonable effort to mitigate the damages and losses

h. Establish immediate dialog with creditors (e.g. banks, lending institutions, governmental agencies) to determine what can / cannot be done

i. Coordinate with the legal department/corporate counsel(s) to determine both liabilities and threats, specifically of litigation and forced closure

j. Determine if the public relations issues can/cannot be contained

H. Submit a summary report with a determination of condition and a recommendation whether or not to rescue the operation or recommend for termination

2. Stage 2 – Submit a Plan Proposal

Includes costs and raw time schedule for the recommended recovery/termination. Such a plan would include but not be limited to:

1. Analyze and assess the Current Status of Operations (CSO)

2. Opening dialog with creditors

3. Meeting with banks and lending institutions

4. Open direct lines of communication with stakeholders

5. Open direct lines of communication with management and staffing personnel

6. Establish public relations policy formation and responsible parties

7. Meet with clients/customers

8. Meet with vendors and suppliers

9. Meet with sub-contractors

10. Meet with partnership parties

11. Establish ongoing communications/dialog with subsidiaries

12. Research and develop strategic planning and policy formation

13. Establish interim budgets and caps

14. Research, develop and implement new/updated policies, systems and procedures

Contact Research Solutions today and inquire about a consultation.