Our Compliance
& Risk Management
Services
We are the largest independent provider of compliance and regulatory risk management services to financial services businesses in South Africa.
With over 50 experienced Compliance Officers and Consultants country wide, we can provide our services at your office wherever you are located, irrespective of whether you are a small business or a national organisation with numerous branches.
How Will Your Company
Benefit from Our Services?
Experienced compliance
specialists
Operationalising Compliance
requirements
Access to
help desk
Industry &
legislation updates
Licensing and
Registration
Webinars & Events
Your Regulatory Specialists
We specialise in regulatory compliance and licensing solutions for the financial services and credit industry.
What we can help you with
Formal compliance monitoring
Regular reporting
Trends and management information
Compliance consultation
Development of bespoke risk management plans
Comprehensive information notifications
Customised Training sessions and workshops
Our Services Include
Regulatory
Guidance
Safeguarding your organisation and improving stakeholder relations by providing professional guidance and expert advice on the navigation of the ever-changing regulatory landscape.
Compliance
Monitoring
Continuous process of gathering information to identify risk and measuring adherence to best practice benchmarks. Thus, proactively preventing contraventions.
Analytical
Reporting
Providing a detailed representation and description of compliance activities within your organisation – through regular updates, feedback reports and completion of statutory returns.
Keeping You
Informed
Keeping you up to date on industry, compliance and legislative developments as well as market commentary through our weekly newsletters, events and various other communication initiatives.
Enquire About our Services
Ensure the management of your compliance risks.
Determine your licensing and registration needs.
Latest Employment Law News
August 07, 2023
Affirmative action is a way of making the workplace more representative and fair. It connects qualified people from designated groups with equal opportunities in the workplace. Affirmative action falls under the EEA and must be linked with your EEPlan to be lawful.
Read More
August 07, 2023
Quotas are prohibited by our Constitution, as it echoes the unlawful practices that took place during Apartheid. For example, a company places a moratorium on hiring any white candidates for the duration of its current EE plan. You know you are dealing with a quota, if the company is completely inflexible in how it implements its numerical goals/targets and places an absolute barrier on employment practices affecting a specific group of applicants.
Read More
August 07, 2023
The numerical goals are a designated employer's projection of what it aims to achieve at the end of its current employment equity plan regarding its entire workforce.
Numerical targets are a designated employer's projection of what it aims to achieve at the end of its current reporting period (annually).
Read More
August 07, 2023
You know you are dealing with misconduct, if the person has shown you, they can follow the rule, but they are choosing not to. Proof of this is, they have successfully completed this exact job, before.
You know you are dealing with incapacity, if the person wants to follow the rule, but for some reason they cant. Proof of this is, they are very ill, or the standard of work has been increased and they need more training.
Andrea de Jongh, Employment Lawyer and Privacy Governance Specialist. Making legal concepts accessible.
Read More
Latest Cybersecurity News
May 05, 2024
The Joint Standard 1 of 2023 and the draft Joint Standard: Cybersecurity and Cyber Resilience Requirements, published by the FSCA and the Prudential Authority (PA), set the bar for cybersecurity practices, aiming to protect data, systems, and reputation. These standards align closely with the NIST cybersecurity framework, which includes five key functions: Identify, Protect, Detect, Respond, and Recover.
Read More
May 05, 2024
Cybersecurity is more than just technology—it’s about the convergence of people, business processes, and technologies. In this interconnected landscape, people are the vital link that can either strengthen or weaken your defences. That’s why cybersecurity training is crucial – to empower individuals to become the first line of defence, creating a robust human firewall against cyber threats.
Read More
May 05, 2024
Securing email has become an indispensable aspect of modern cybersecurity strategy. As a primary communication channel, email is vulnerable to cyber threats such as phishing and malware. The concept of securing email revolves around ensuring the authenticity, integrity, and confidentiality of email communications. Robust security measures help organisations to protect sensitive data, prevent breaches, and maintain stakeholder trust.
Read More
May 05, 2024
A third-party backup provider is crucial for cloud data storage because it adds an extra layer of security and control. Relying solely on cloud providers to safeguard an organisation’s data may leave it vulnerable to various risks. With a third-party backup solution, the business maintains ownership and control of its data backups independently, ensuring quick access and recovery in emergencies.
Read More