[vc_row css=”.vc_custom_1636979247058{margin-bottom: 50px !important;}” woodmart_css_id=”61925220b02e3″ responsive_spacing=”eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2MTkyNTIyMGIwMmUzIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnsibWFyZ2luLWJvdHRvbSI6IjQwIn0sIm1vYmlsZSI6eyJtYXJnaW4tYm90dG9tIjoiMjAifX19″ mobile_bg_img_hidden=”no” tablet_bg_img_hidden=”no” woodmart_parallax=”0″ woodmart_gradient_switch=”no” woodmart_box_shadow=”no” wd_z_index=”no” woodmart_disable_overflow=”0″ row_reverse_mobile=”0″ row_reverse_tablet=”0″][vc_column css=”.vc_custom_1508143071646{padding-top: 0px !important;}”][woodmart_title style=”bordered” color=”primary” title=”RISK ANALYSIS & MANAGEMENT” subtitle=”CONSULTING” css=”.vc_custom_1736934317194{margin-bottom: 30px !important;}” woodmart_css_id=”6787838132461″ responsive_spacing=”eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2Nzg3ODM4MTMyNDYxIiwic2hvcnRjb2RlIjoid29vZG1hcnRfdGl0bGUiLCJkYXRhIjp7InRhYmxldCI6e30sIm1vYmlsZSI6e319fQ==”][woodmart_timeline line_style=”dashed” item_style=”shadow” dots_color=”#bd6e4f” line_color=”#bd6e4f”][woodmart_timeline_breakpoint title=”Step One” color_bg=”#bd6e4f”][woodmart_timeline_item image_secondary=”10014″ img_size_secondary=”full” el_class=”text-larger” color_bg=”eyJwYXJhbV90eXBlIjoid29vZG1hcnRfY29sb3JwaWNrZXIiLCJjc3NfYXJncyI6eyJiYWNrZ3JvdW5kLWNvbG9yIjpbIi53ZC10aW1lbGluZS1pdGVtIiwiIC50aW1lbGluZS1jb2wtcHJpbWFyeSIsIiAudGltZWxpbmUtY29sLXNlY29uZGFyeSJdLCJjb2xvciI6WyIgLnRpbWVsaW5lLWFycm93Il19LCJzZWxlY3Rvcl9pZCI6IjY3ODhkY2VkYWJlZDkiLCJkYXRhIjp7ImRlc2t0b3AiOiIjZmZmZmZmIn19″ woodmart_css_id=”6788dcedabed9″ title_primary=”Expert team deployment”]Our carefully selected team of experts in research and analysis conducts thorough information gathering and interpretation, leveraging Canik Spy -CPU Africa’s unequalled market intelligence network throughout East Africa.[/woodmart_timeline_item][woodmart_timeline_breakpoint title=”Step Two” color_bg=”#bd6e4f”][woodmart_timeline_item position=”right” image_secondary=”9984″ img_size_secondary=”full” el_class=”text-larger” color_bg=”eyJwYXJhbV90eXBlIjoid29vZG1hcnRfY29sb3JwaWNrZXIiLCJjc3NfYXJncyI6eyJiYWNrZ3JvdW5kLWNvbG9yIjpbIi53ZC10aW1lbGluZS1pdGVtIiwiIC50aW1lbGluZS1jb2wtcHJpbWFyeSIsIiAudGltZWxpbmUtY29sLXNlY29uZGFyeSJdLCJjb2xvciI6WyIgLnRpbWVsaW5lLWFycm93Il19LCJzZWxlY3Rvcl9pZCI6IjY3ODhkZTEyYzkxMjUiLCJkYXRhIjp7ImRlc2t0b3AiOiIjZmZmZmZmIn19″ woodmart_css_id=”6788de12c9125″ title_primary=”Security Assessment”]Experienced consultants conduct a comprehensive investigation of existing security measures and test their effectiveness through rigorous evaluation methods.[/woodmart_timeline_item][woodmart_timeline_breakpoint title=”Step Three” color_bg=”#bd6e4f”][woodmart_timeline_item image_secondary=”10015″ img_size_secondary=”full” el_class=”text-larger” color_bg=”eyJwYXJhbV90eXBlIjoid29vZG1hcnRfY29sb3JwaWNrZXIiLCJjc3NfYXJncyI6eyJiYWNrZ3JvdW5kLWNvbG9yIjpbIi53ZC10aW1lbGluZS1pdGVtIiwiIC50aW1lbGluZS1jb2wtcHJpbWFyeSIsIiAudGltZWxpbmUtY29sLXNlY29uZGFyeSJdLCJjb2xvciI6WyIgLnRpbWVsaW5lLWFycm93Il19LCJzZWxlY3Rvcl9pZCI6IjY3ODhkZjIyOWZlNjMiLCJkYXRhIjp7ImRlc2t0b3AiOiIjZmZmZmZmIn19″ woodmart_css_id=”6788df229fe63″ title_primary=”Strategic Risk Analysis”]All gathered information is synthesized into a detailed, documented risk analysis strategy, enabling leadership to make well-informed business decisions based on our unique security consulting insights.[/woodmart_timeline_item][/woodmart_timeline][/vc_column][/vc_row]