Skip to content
Digital Jewels
Open: Mon - Fri | Time: 8am - 5pm
Menu
    MENUMENU
    • HOME
    • ABOUT US
      • About Us
      • Our Track Record
      • Board
      • Leadership Team
    • CONSULTING
          • widget-slider2
            widget-slider1
          • Information Security
            • - Information Security
            • - PCIDSS Consulting Services
            • - Network Security Testing
            • - ISMS ISO 27001
            • - Penetration Testing Services
          • Information Assurance
            • - IT Governance(COBIT)
            • - ITSMS ISO20000
            • - BCMS ISO2301
          • Project Management
            • - PM Health Checks
            • - PMO Setup & Management
            • - Project Assurance
    • ACADEMY
          • E-LEARNING
            • Custom Development
            • LMS Solutions
            • E-Learning Consulting
            • Support and Training
            • Mobile Learning
          • TRAINING
            • IT Service Management
            • Information Security
            • Info. Assurance, Governance & Leadership
            • E-Business And E-Commerce
          • -
            • Business Analysis And Productivity Enhancement
            • Project Management
            • Health Safety And Environment
    • RECRUITMENT
    • RESOURCE CENTRE
      • News and Reports
      • Newsletters
      • IVC Forums
      • DJ Cares
      • Photo Gallery
    • CONTACT
      • Nigeria
      • Ghana
      • Kenya
      • Rwanda
  1. IT Governance Services

  2. Information & Cyber Security Services

  3. The Leading Accredited IT GRC Firm in Africa

IT Governance Services

Enhance performance through effective governance & compliance (ISO 20000, COBIT and more)

Read More

Information & Cyber Security Services

Securing your information assets in the digital economy

Read More

The Leading Accredited IT GRC Firm in Africa

Over 40 IT Best Practice Standards Projects delivered end-to-end for top-tier firms.

Read More

TECH TIP:

Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust.

UPCOMING TRAINING
DJL IN THE NEWS
news hero section

Nigeria contentJewels is an Information value Chain Consulting & Building Firm..

READ MORE

About us

  • ABOUT US
  • /
  • Digital Jewels Limited is a leading IT Governance, Risk and Compliance (GRC) Consulting & Capacity Building Firm with deep competencies in Information Security, Information Assurance, Project Management, e-business and Knowledge Capacity Building.

    We are certified to the ISO27001:2013 (Information Security Management System) and ISO9001:2015 (Quality Management System) standards as well as being a Qualified Security Assessor for the Payment Card Industry Data Security Standard (PCIDSS QSA) with jurisdiction for the CMEA region. Making it the only such professional services Firm in Africa to be so accredited.

    Read more

About us

  • ABOUT US
  • /
  • OUR TRACK RECORD

OUR TRACK RECORD

WHY CHOOSE DIGITAL JEWELS?


Our Experience:
With over 40 IT Best Practice Standards Projects delivered end-to-end for top-tier firms, we are the most experienced in the Sub-Saharan African Region.

Diversity:
Our IT GRC Professionals have led the development and implementation of GRC programs across a diverse range of industry sectors building a wealth of knowledge.

Our References:
Our clients can attest to our focused, pain-staking and steadfast approach, our competence and resourcefulness.

Expert Knowledge:
Our team has a solid understanding of Best Practice Standards, industry guidelines, trends and prides itself on the ongoing enhancement of IT GRC in-line with the changing profile of global risks.

Multi-Disciplinary Skills Our IT GRC Team can leverage on the multi-disciplinary skills of the entire DJL organization, and offer an all-encompassing service addressing critical issues such as Business-IT Alignment, Benefits Realization, Resource Optimization, Service Management, Information Security, Cyber Security, Business Continuity Management, Crises Management, Occupational Health and Safety, Enterprise Architecture, Project Management amongst others.

Contextual Knowledge Our experience leading your Standards initiatives has equipped us with an understanding of your culture and pain points alongside our in-depth knowledge of IT Governance and best practice standards.

CONSULTING

CONSULTING SERVICES

We focus on institutionalizing global best practice standards, frameworks and methodologies to enhance the information value chain

    SECURE ASSURE MANAGE ENABLE EMPOWER .
Request a Quote

SECURE

Diagnostics, Audits, Assessments & Reviews
Gap Analysis (ISO27001/PCIDSS) Risk & Vulnerability Assessments Penetration Tests Information Security Audits


Direction Setting, Planning & Governance
Management Systems Design: ISMS Information Security Strategy, Architecture, Roadmaps & Blueprints Information Security Processes, Policies, Procedures IT Governance Frameworks
Project Assurance, Monitoring, Capacity Development
Project Remediation Management (ISMS/PCIDSS) Project Implementation Assurance Security Dashboard Information Security Training, Education & Awareness Building (Instructor-led & e-learning) Information Security Specialist Resourcing & Recruitment
Certification
ISO27001: Information Security Management System (ISMS) ISO27032: Lead Cyber Security Management PCIDSS: Payment Card Industry Data Security Standard CISSP

ASSURE

Diagnostics, Audits, Assessments & Reviews
Gap Analysis (ISO20000/22301/38500) Business Impact Analysis IT Infrastructure Audits IT Value for Money Audits IT Process Capability Assessments (using COBIT) IT Pain Points Assessments (using COBIT) Information Management Audits Capability Maturity Assessments CMMi Appraisals


Direction Setting, Planning & Governance
Management Systems Design: ITSMS/BCMS/ IT Strategy, Architecture, Roadmaps & Blueprints IT Processes, Policies & Procedures IT Governance Frameworks IT Performance Management Project Implementation Assurance 24 x 7 Infrastructure Monitoring
Project Assurance, Monitoring, Capacity Development
Project Remediation Management (ITSMS/BCMS) Project Implementation Assurance Information Technology Training, Education & Awareness Building (Instructor-led & e-learning) Information Technology Specialist Resourcing & Recruitment
Certification
ISO20000: Information Technology Service Management System (ISMS) ISO22301: Business Continuity Management System (BCMS) ISO38500: IT Governance TOGAF CGEIT ITIL: Foundation to Expert COBIT Foundation, Implementer, Assessor

MANAGE

Diagnostics, Audits, Assessments & Reviews
Gap Assessment (ISO21500) & Portfolio & Project Management Health Check/Maturity Assessments


Direction Setting, Planning & Governance
IT Processes, Policies & Procedures Project Governance Frameworks
Project Assurance, Monitoring, Capacity Development
PMO Set-up Project Remediation Management (ITSMS/BCMS) Project Implementation Assurance Project Management Training, Education & Awareness Building (Instructor-led & e-learning) Project Management Specialist Resourcing & Recruitment
Certification
PRINCE2 PMP MSP MOR

ENABLE

Diagnostics, Audits, Assessments & Reviews
Website Audits E-business Assessments


Direction Setting, Planning & Governance
E-business Strategy, Architecture, Roadmaps & Blueprints IE-business Processes, Policies & Procedures E-business Governance Project Implementation Assurance
Project Assurance, Monitoring, Capacity Development
Project Remediation Management Project Implementation Assurance E-Business Training, Education & Awareness Building (Instructor-led & e-learning) E-business Specialist Resourcing & Recruitment

EMPOWER

Diagnostics, Audits, Assessments & Reviews
IT Skills & Competence Assessments IT Job Evaluation Training Needs Assessment


Direction Setting, Planning & Governance
IT Career Planning Performance Management
Project Assurance, Monitoring, Capacity Development
Project Remediation Management Training, Education & Awareness Building (Instructor-led & e-learning) Specialist Resourcing & Recruitment

.

CONSULTING

TECHNICAL CONSULTING
  • PROCESS
  • /
  • TECHNICAL
  • /
  • REVENUE ASSURANCE

We focus on institutionalizing global best practice standards, frameworks and methodologies to enhance the information value chain

    PCI DSS Network Security Assessment Penetration Testing ISMS ISO 27001 Network Security consulting Network Security Consulting
Request a Quote

PCI DSS

Our approach to ensuring your organization achieves and maintains compliance to the Payment Card Industry Data Security Standard (PCIDSS) is aligned with the standard step approach; “Assess”, “Remediate” and “Report” but evolved to a four (4) phased approach for enhanced manageability:
  • Diagnostics: This phase involves project planning and the basic process of PCIDSS scoping; to determine what system components are to be governed by the PCIDSS.. A Gap/Readiness Assessment is also carried out to determine the level of compliance of the system components in scope. PCIDSS Awareness Sessions are also incorporated to this phase.
  • Design: This involves developing a compliance Blueprint to close the gaps identified during the Diagnostics phase as well as an the development of an Improvement Roadmap for improving enterprise-wide security.
  • Implementation/Remediation Management: This involves providing adequate guidance on implementation of controls (documentation, processes, technologies etc). It also involves quality assurance and project managing remediation of gaps.
  • Compliance and Certification: This involves performing a compliance and certification audit carried out by our Qualified Security Assessors (QSA) and a passing scan carried out by our Approved Scanning Vendor (ASV) partner. Prior to this a mock compliance audit is carried out to ensure the organization is ready for the certification audit. Post certification, on-going monitoring and compliance are provided as well as periodic vulnerability scans and penetration tests.

Network Security Assessment

Our network security services focus on the network layer of our clients’ information system. We review and test the network and security control architecture. The assessment is conducted using global best practice standards/methodologies – methodologies based on the successful combination of technical experience, professional security analysis tools, and knowledge of hacking techniques. Digital Jewels Limited can help you identify and mitigate vulnerabilities present in network devices, such as firewalls, routers and switches as well as the core servers in the environment running Windows, Linux or UNIX operating systems. To this end, we have adopted an effective and standard approach comprising of planning, assessing and testing, documenting, reporting and support geared towards identifying security weaknesses in your enterprise network and information systems environment and public facing web applications, preventing compromise of the valuable Information assets, evaluating security performance and ensuring security objectives of the enterprise information systems are met. This effort gives a snapshot of your current network infrastructure’s security posture. This snapshot provides a baseline from which to validate compliance (or non-compliance) to corporate and regulatory security requirements, as well as a roadmap for future security initiatives.

Penetration Testing

Whilst leveraging on our extensive knowledge, research, understanding and use of tools, techniques, standards, and our numerous assignments on Vulnerability Assessment and Penetration Test (VAPT) for financial institutions, telecommunication industry and government parastatals in Nigeria, we propose a holistic and cost-effective approach towards addressing the objective of your specific needs. We focus on establishing the areas of security weaknesses, defects or flaws within the organization`s information system with a view to promptly mitigate these vulnerabilities with appropriate countermeasures and controls in order to achieve an improved information security posture. Our approach includes:
  • Conducting vulnerability assessment to ascertain the inherent weaknesses within your organization`s information system.
  • Conducting penetration test to ascertain and exploit, based on the detected vulnerabilities using best practice approach and methodologies.
  • Conduct of a stress and load test to determine the applications vulnerable performance capability.
  • Submission of concise reports on Key findings and observations and Risk-based vulnerability remediation plan with an actionable roadmap and indicative timelines.

ISMS ISO 27001

Our tested and proven methodology and extensive experience ensure the effective and timely implementation of an Information Security Management System (ISMS) and the eventual certification to the ISO/IEC 27001:2013 standard. Our consulting methodology follows the Plan-Do-Check-Act (PDCA)) process-based approach as adapted from the ISO/IEC 27001:2013 standard for implementing any management system within an organization. This approach, targeted at instituting a continuous improvement culture is interpreted as follows:
  • Diagnostics: This phase involves project planning, defining the scope of the ISMS and a rigourous Controls Gap aimed at examining the organization’s compliance to the mandatory clauses and 114 control objectives and controls of the ISO/IEC 27001:2013 standard. A Risk and Vulnerability Assessment of information assets within the scope of the ISMS is also performed.
  • Design: An Implementation Blueprint is developed to address the gaps observed to ensure conformity with the requirements of the standard. A Work and priority matrix for the technical security vulnerabilities and risk treatment is also provided as well as an enterprise wide improvement roadmap for information security. The Statement of Applicability (SoA) for the applicable controls from the 114 controls objectives and controls is also documented and developed in accordance with the standard. Implementation/Remediation Management: The actual remediation of the gaps, vulnerabilities and weakness observed during the Controls Gap Assessment, Technical Security Assessment and Risk Assessment is performed during this phase by leveraging on the guidance of the implementation blueprint from the Design Phase. This phase also involves wide-spread training and awareness sessions as well as the provision of adequate guidance on the implementation of controls (documentation, processes, technologies etc) as well as monitoring and measuring the effectiveness of the controls implemented.
  • Compliance and Certification: The Information Security Management System (ISMS) certification audit is typically a two (2) stage audit exercise conducted by an Independent Registered Certification Body. The first stage involves a document review and the second phase is the actual certification audit. Prior to this two-stage audit, we conduct mock compliance audit to ascertain and guarantee the organization’s readiness for the certification audit. Post certification, on-going monitoring and compliance support is provided to ensure continuous compliance and successful surveillance audits and re-certification.

Network Security consulting

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Nihil odit magnam minima, soluta doloribus reiciendis molestiae placeat unde eos molestias. Quisquam aperiam, pariatur. Tempora, placeat ratione porro voluptate odit minima. Lorem ipsum dolor sit amet, consectetur adipisicing elit. Nihil odit magnam minima, soluta doloribus reiciendis molestiae placeat unde eos molestias. Quisquam aperiam, pariatur. Tempora, placeat ratione porro voluptate odit minima.

Network Security Consulting

CONSULTING

REVENUE ASSURANCE
  • PROCESS
  • /
  • TECHNICAL
  • /
  • REVENUE ASSURANCE

We focus on institutionalizing global best practice standards, frameworks and methodologies to enhance the information value chain

    Business Continuity Management Information Security Management IT Service Management (ISO 20000) IT Governance using COBIT 5 Framework Occupational Health and Safety Project Management Consulting
Request a Quote

Business Continuity Management

Thinking of adopting the Business Continuity standard (ISO 22301)? Talk to Digital Jewels Limited today. Our experience in sub-Saharan Africa over the years in IT GRC consultancy spans banking, telecommunications, oil and gas servicing and government agencies, establishing our firm as a clear leader in Business Continuity Management Systems design.

Why Business Continuity:

No matter where you work or what security you have in place, there is a potential for “downside risk” [something unexpected to happen]. Everyday somewhere around the world, dangerous things happen:

• Kidnaps

• Insurgence

• Cybercrime

• Power failures

• Security attacks

• Technological failures

• Reputational damage

• Natural and Infrastructures disasters

• Failure of Key dependencies /third party arrangements

• Mass workforce absenteeism due to pandemics or civil unrest

We may not be able to stop disasters (man-made or natural) from happening but we can prepare for them. Trend analysis tells us that failure to develop Business continuity capabilities will have a devastating effect on organizations who fail to do so in this times.

How We Can Help: Digital Jewels Limited will work with you to prepare for, respond to and recover from a crisis by building a reliable, pragmatic and long lasting business continuity program.

Digital Jewels Key Service Offerings in Business Continuity Management Comprise:

• BCM Training

• BCM Audits/review

• BCMS development

• Business Continuity Planning

• Continuity Testing & Facilitation

• Disaster recovery management development

• Business Continuity Management (BCM) maturity assessment

• Business Continuity certification (ISO22301 Certification assistance)

Where We Can Help:

Whether you are starting afresh, have existing continuity capabilities or with suave continuity capabilities, we can take you to the next level.

We can help assess existing capabilities and build a pragmatic programme to meet every business continuity programme requirements:

• Cyber Resilience

• Pandemic Planning

• Succession Planning

• Third Party Assurance

• BC Audit & Gap Assessment

• Towards a Resilient Organization

• Crisis Management planning & Communication

• Outage Scenario Planning e.g. vendor, premise, staff

• Building crisis ready Executives / Top Management

• Anti- Kidnap Coping & Prevention Strategic Planning

• ISO 22301 Certification to meet Regulatory Requirements

Our Differentiator:

• Experience and Track Record: We have helped numerous clients get their ISO 22301 certification. our continuity practice comprises of ISO 22301, Disaster Recovery Institute (DRI), British Continuity Institute (BCI) and BS 25999 professionals who have led organizations develop business continuity capabilities and programs, kindly explore our industry experience here.

• Partnerships and Strong References: We are a premier partner of the British Standard Institute (BSI) and have served the unique needs of organizations of all sizes and across industries, we invite you to explore our positive client feedback here.

• Proven Solutions: we can meet any length of organizational resilience or business continuity requirement with our strengthened range of service offerings.

• Expert Knowledge and Skills: Our team has a solid understanding of continuity specific regulations, industry guidelines, trends and prides itself on the ongoing enhancement of continuity and resilience solutions in line with the changing profile of global risks.

• Multidisciplinary team: Our Business Continuity team leverages on the multi-disciplinary skills of the entire organization and offer an all-encompassing service, covering topics like organizational resilience, threat analysis, emergency response, risk intelligence, crisis communication, cyber resilience.

Benefits to your business using our approach:

Our approach leads to cost-effective outcomes. We have designed our framework to be flexible, so we can tailor our approach to meet your needs. We will get to know your organization and consider the current business continuity capabilities and business processes before making any recommendations.

1. Effective facilities management:

Facilities are prone to diverse threats e.g. fire, robbery, insurgent attacks and so on, but using our approach proper business continuity planning, facilities can be designed for resilience.

2. Effective Crisis communication:

You can come out stronger after a crisis hits but this depends on how you communicate with your stakeholders during a crisis, safeguarding stakeholder confidence. Our proven Crisis communication strategy includes communicating the changes to business operation, managing relatives of affected personnel, facility shut-down or updates on service limitations.

3. Health & Safety:

We create systems to mitigate conceivable threats to staff or customers e.g. environmental hazards, chemical hazards, physical hazards, security threats, medical (disease outbreak) threats, workplace violence etc.

4. A blueprint for survival, resiliency and availability:

We prepare your organization to react quickly and decisively when the inevitable occurs.

5. Disaster Recovery:

Our approach addresses Disaster Recovery – the effective and timely resuscitation of the heart of your enterprise. Preparing the most critical IT systems for doomsday.

6. Knowledge Management

In many organizations, the unavailability of a one or more key staff or executives due to illness, resignation, sudden death or other causes would affect the continuity of business operations. We ensure that through knowledge management critical information can survive beyond the lifetime of any staff.

7. Education, Awareness & Risk Reduction.

We educate your staff on prevention and coping strategies that help your organization reduce or totally avert the risks to the business.

8. Emergency management: Our approach ensures that your Personnel will have access to BC Plans that ensure they know how to respond and recover from different outage scenarios. E.g. Unavailability of key staff or mass absenteeism, unavailability of site, unavailability of technology etc.

9. Security:

Data systems are prepared to withstand hacking or electronic tampering as BC strategies can be implemented to address security, integrity and availability issues.

10. Third Party Assurance:

Our approach provides the continuation of business in the event of a disruption to your supply chain. Resiliency checks would be done to ensure that key vendors have continuity arrangements to adequately support your business.

Information Security Management

IT Service Management (ISO 20000)

Our tested and proven methodology, along with our extensive experience ensures the effective and timely implementation of an IT Service Management System (ITSMS) and the eventual certification to the ISO/IEC 20000-1:2011 standard. This standard defines a comprehensive and closely related set of 13 service management processes to effectively deliver managed services to meet business and customer requirements. Our consulting methodology follows the Plan-Do-Check-Act (PDCA) integrated process-based approach as adapted from the ISO/IEC 20000-1:2011, this approach is targeted at instituting a continuous improvement culture and is interpreted as follows:

  • Diagnostics: This phase involves project planning, defining the scope of the ITSMS and a rigorous Gap assessment aimed at examining the organization’s compliance to the mandatory requirements of the ISO/IEC 20000-1:2011 standard.
  • Design: An Implementation Blueprint is developed to address the gaps observed during the Diagnostics phase; this is to ensure conformity with the requirements of the standard.
  • Implementation/Remediation Management: The actual remediation of the gaps observed during the Gap Assessment is performed during this phase by leveraging on the guidance of the implementation blueprint from the Design Phase. This phase also involves wide-spread training and awareness sessions as well as the provision of adequate guidance on the implementation of the requirements (documentation, processes etc).
  • Compliance and Certification: The Information Technology Service Management System (ITSMS) certification audit is typically a two (2) stage audit exercise conducted by an Independent Registered Certification Body. The objective of Stage 1 Audit is to assess the readiness of the Service management system for the second phase (stage 2 Audit) which is the actual certification audit. Prior to this two-stage audit, we conduct a mock compliance audit to ascertain and guarantee the organization’s readiness for the certification audit. Post certification, on-going monitoring and compliance support is provided to ensure continuous compliance and successful surveillance audits and re-certification.

IT Governance using COBIT 5 Framework

Information Technology has become pervasive and plays an increasingly significant role in organizations. Our approach towards the assessment of organizations’ IT Process capabilities and its subsequent improvement assist organizations in achieving their objectives for the governance and management of IT. This approach ensures that IT can continually provide benefit to the organization by optimizing resource, minimizing risk and thereby ensuring the strategic objective of value creation. We are effectively equipped to implement IT Governance using COBIT with our team of Certified Assessors and Implementers and our substantial track record in this area. Our four (4) phased approach which is based on COBIT 5 include:

• Diagnostics: This phase involves project planning, using an assessment scoping methodology to define the scope of the assessment based on identifying relevant business drivers for IT, and the conduct of a rigorous assessment of organizations’ IT Process capabilities based on the COBIT 5 Process Assessment Model (PAM) and ISO/IEC 33002:2015, Information Technology—Process assessment. The targeted capability level for each IT Process is also defined and compared with the current capability level for each IT Process.

• Design: This involves the development of an IT Process Improvement Blueprint and Roadmap based on the IT Process Assessment results which illustrate the as-is status of the selected IT Processes. Actionable improvement practices and activities for the Governance and Management of each of the selected IT Processes are recommended where deficiencies or gaps may exist between the current and targeted capability levels.

• Implementation: This involves providing detailed guidance and project management support for establishing feasible and practical solutions for the implementation of the recommendation specified in the IT Process Improvement Blueprint and Roadmap. The improvement practices and activities for the selected IT Processes are prioritized into; immediate tactical, medium-term strategic and long-term game-changing for implementation. This phase also involves communication and awareness and project monitoring systems to ensure that recommendation are implemented.

• Compliance and Assessment: This phase involves the review of the overall success of the IT Process improvement initiative based on the transition of the implemented management and governance practices and activities into normal business operations. Performance metrics are used to monitor the achievement of IT Process improvements and provide details of continuous improvement actions by focusing on the targeted capability level of each of the IT Processes as against the performance of the implemented practices and activities.

Our firms’ multidisciplinary consulting team is grounded in years of hands-on experience and our industry-leading Best Practices focus. With our guidance, companies have been able to maximize their business transformation value – from strategy to execution. We’ll bring lessons learned from those engagements to your unique initiative. Armed with insight from our client experiences, our consultants have the know-how to quickly assess your current performance and the expertise to accelerate your journey to operational excellence.

Occupational Health and Safety

Thinking of adopting the Occupational Health and Safety Assessment Series standard (OHSAS 18001)? Talk to Digital Jewels Limited today. Our experience in sub-Saharan Africa over the years in Health and safety consultancy spans banking, telecommunications, oil and gas servicing and government agencies, establishing our firm as a clear leader in Occupational Health and Safety Assessment Series systems design.

Why OHSAS 18001:

OHSAS 18001 is the right choice when it comes to identifying and managing occupational health and safety risks and hazards. It provides guidance to help you design your own health and safety framework; allowing you to bring all relevant controls and processes into one management system. Occupational health and safety management paves the way for safer working conditions and improved performance in your organization. It provides guidelines on how to identify hazards and put in place the correct controls to manage them which can help you to: things happen:

• reduce workplace accidents, cutting related costs and downtime.

• enhance accident investigation.

• establish a positive health and safety culture.

• give your company preferred supplier status.

• reduce your insurance premiums and meet insurance requirements.

• protect your brand and image.

• provide a framework to ensure compliance with legislation is continually reviewed.

 

How we can Help: Digital Jewels Limited will work with you to prepare for, respond to and recover from health-threatening situations by building a reliable, pragmatic and long lasting Occupational health and safety management program. Digital Jewels Key Service health and Safety Offerings Comprise:

• OHSAS Training

• OHSAS Audits/review

• OHSAS Testing & Facilitation

• Disaster recovery management development

• Occupational health and safety assessment

• Occupational health and safety certification (OHSAS Certification assistance)

 

Our Differentiator:

• Experience and Track Record: We have helped numerous clients get their OHSAS 18001 certification, we also Integrate this management system into existing management systems (ISO 22301 and OHSAS Implementation). our Health and Safety practise comprises of seasoned OHSAS 18001 lead Auditors and Implementers.

 

• Proven Solutions: we can meet any length of organizational resilience or OHSAS 18001 requirement with our strengthened range of service offerings.

 

• Expert Knowledge and Skills: Our teams have a solid understanding of OHSAS 18001 specific regulations, industry guidelines, trends and prides itself on the ongoing enhancement of continuity and resilience solutions in line with the changing profile of global risks.

 

• Multidisciplinary team: Our OHSAS 18001 Implementation team leverages on the multi-disciplinary skills of the entire organization and offer an all-encompassing service, covering topics like organizational resilience, threat analysis, emergency response, risk intelligence, crisis communication, cyber resilience.

Project Management Consulting

Managing Projects without a proper structure or framework can be likened to embarking on a journey without a map. You might have a clear idea about your chosen destination, but how are you going to get there? What should you take with you? What will happen if you encounter problems or threats along the way? All these questions are what a structured project management practice tends to answer in a proactive way even before they are asked on the projects Do your projects overrun the agreed timelines? Are your planned project costs always exceeded, do you find out at the end of every project the initial planned scope is not what is eventually delivered? Do you always have issues around having the necessary governance and assurance on your projects? If you answered yes to any of these questions, then DJL Project Management Consulting will be more than willing to put a smile on your face and control to these pain points Our services are around:

1. Project Management health check

2. Project Management Office Set up

3. Project Management Support

4. Project Management Maturity Assessment

  The approach of our qualified and experienced professionals is to conduct a painstaking gap assessment to identify the key areas that could pose as bottlenecks in the system and design best-fit solutions to the identified gaps while handholding as well as coaching our clients in the implementation of the designed solution. We don’t do a one size fit all solution, but solutions that best address identified pain points to ensure delivery of intended value and a better system that promotes effective project management.

  • Training

INSTRUCTOR LED

TRAINING
Our Capacity Building programs feature international best practice seminars, industry conferences and in-depth workshops to World Class Standards.

OUR TRAINING PROGRAMMES

IT Management Development & Management Development
Information Assurance, Governance and Leadership
Information Security and Risk Management
IT Service Management
IT Strategy & Project Management
Project Management Courses
OTHERS

REQUEST A PROGRAM

 Technology-empowered Marketing Skills Training (CGEIT Bootcamp)  Business Skills for IT Professionals  Personality Profile Assessment Workshop (DISC)  High Impact Business Writing & Presentation Skills Coaching
 Governance of Enterprise IT (CGEIT Bootcamp)  COBIT 5 Foundation Course  COBIT 5 Implementation Course  COBIT 5 Assessor Course  TOGAF: The Open Architecture Framework Training  IT Governance for Board & Executive Directors  A – Z CBN Standards Blueprint (ISMS, BCMS, PCIDSS, ITSM, COBIT)  Integrated Management System (ISMS, BCMS, ITSM & QMS)  IT Leadership Institute (Dubai)
 ISO 27001 Lead Implementer Certification Course  ISO 27001 Lead Auditor Certification Course  ISO 22301 Lead Implementer Course+Exam  ISO 22301 Lead Auditor Course+Exam  Advanced Information Security Workshop  Fundamentals of Cyber Security  ISO 31000 Lead Risk Manager+Exam  ISO 27035 Information Security Incident Manager+Exam  ISO 27032 Lead Cybersecurity Manager+Exam  Penetration Testing and Ethical Hacking Training  Business Continuity Management in sub-Sahara Africa
 ITIL® 2011 Foundation Course  ITIL® 2011 Service Strategy Lifecycle  ITIL® 2011 Service Design Lifecycle  ITIL® 2011 Service Transition Lifecycle  ITIL® 2011 Service Operation Lifecycle  ITIL®2011 Expert: Managing Across the Lifecycle  ITIL®2011 Expert: Bootcamp (Lifecycle Track: Excluding MALC)  ISO 20000 Foundation Course  ISO 20000 Practitioner Course  ISO 20000 Auditor Course  IT Service Management in developing Countries
 Managing Projects Successfully in Nigeria (a hybrid of frameworks for the Nigerian environment)  ISO 21500 Lead Project Manager Course  Project Management Professional (Fast Track) – PMP  Managing Projects the PRINCE2 Way – Foundation + Practitioner Course  Practical Project management with Business Simulation  IT Strategy & Governance (Fundamentals & Techniques)  Business Systems Simulation (ITIL, COBIT, PMP, CYBER SECURITY)
 Negotiation Skills  Business Case Writing Skills  Managing Project Stakeholders  Effective Management of Project Risks  Project Management Tools  Quality Management (introduction of Lean six sigma and ISO 9001)  Effective Communication Skills for Project Managers  Managing Successful Programmes (Foundation & Practitioner)  Managing an effective PMO
 OHSAS 18001 Lead Implementer Course  OHSAS 18001 Lead Auditor Course

OUR PARTNERS

  • E-LEARNING

E-LEARNING

OFFERINGS

https://digitaljewels.net/wp-content/uploads/2018/11/E-learning-promo.mp4
https://digitaljewels.net/wp-content/uploads/2018/11/E-learning-promo.mp4
https://digitaljewels.net/wp-content/uploads/2018/04/Digital-Jewels-on-Channels.mp4
Previous Next

We have deep competencies in E-learning Course Conversion, Learning Management System (LMS) Deployment and Administration.

NEED AN LMS? TAKE A DEMO

REQUEST A
QUOTE
FOR COURSE CONVERSION

E-learning offering Guide
  • E-Learning
  • /
  • Training

INSTRUCTOR LED

TRAINING
Our Capacity Building programs feature international best practice seminars, industry conferences and in-depth workshops to World Class Standards.
UPCOMING TRAINING

ITIL FOUNDATION
28th Aug - 3rd Sept

Add to iCal Google Cal

OUR TRAINING PROGRAMMES

IT Management Development & Management Development
Information Assurance, Governance and Leadership
Information Security and Risk Management
IT Service Management
IT Strategy & Project Management
Project Management Courses
OTHERS

REQUEST A PROGRAM

 Technology-empowered Marketing Skills Training (CGEIT Bootcamp)  Business Skills for IT Professionals  Personality Profile Assessment Workshop (DISC)  High Impact Business Writing & Presentation Skills Coaching
 Governance of Enterprise IT (CGEIT Bootcamp)  COBIT 5 Foundation Course  COBIT 5 Implementation Course  COBIT 5 Assessor Course  TOGAF: The Open Architecture Framework Training  IT Governance for Board & Executive Directors  A – Z CBN Standards Blueprint (ISMS, BCMS, PCIDSS, ITSM, COBIT)  Integrated Management System (ISMS, BCMS, ITSM & QMS)  IT Leadership Institute (Dubai)
 ISO 27001 Lead Implementer Certification Course  ISO 27001 Lead Auditor Certification Course  ISO 22301 Lead Implementer Course+Exam  ISO 22301 Lead Auditor Course+Exam  Advanced Information Security Workshop  Fundamentals of Cyber Security  ISO 31000 Lead Risk Manager+Exam  ISO 27035 Information Security Incident Manager+Exam  ISO 27032 Lead Cybersecurity Manager+Exam  Penetration Testing and Ethical Hacking Training  Business Continuity Management in sub-Sahara Africa
 ITIL® 2011 Foundation Course  ITIL® 2011 Service Strategy Lifecycle  ITIL® 2011 Service Design Lifecycle  ITIL® 2011 Service Transition Lifecycle  ITIL® 2011 Service Operation Lifecycle  ITIL®2011 Expert: Managing Across the Lifecycle  ITIL®2011 Expert: Bootcamp (Lifecycle Track: Excluding MALC)  ISO 20000 Foundation Course  ISO 20000 Practitioner Course  ISO 20000 Auditor Course  IT Service Management in developing Countries
 Managing Projects Successfully in Nigeria (a hybrid of frameworks for the Nigerian environment)  ISO 21500 Lead Project Manager Course  Project Management Professional (Fast Track) – PMP  Managing Projects the PRINCE2 Way – Foundation + Practitioner Course  Practical Project management with Business Simulation  IT Strategy & Governance (Fundamentals & Techniques)  Business Systems Simulation (ITIL, COBIT, PMP, CYBER SECURITY)
 Negotiation Skills  Business Case Writing Skills  Managing Project Stakeholders  Effective Management of Project Risks  Project Management Tools  Quality Management (introduction of Lean six sigma and ISO 9001)  Effective Communication Skills for Project Managers  Managing Successful Programmes (Foundation & Practitioner)  Managing an effective PMO
 OHSAS 18001 Lead Implementer Course  OHSAS 18001 Lead Auditor Course

OUR PARTNERS

RESOURCE CENTRE
NEWS

.
  • Visit our web TV

  • INFORMATION VALUE CHAIN

    BREAKFAST FORUM
  • Responsive image
  • DJCARES OUR CSR INITIATIVE

    OUR CSR INITIATIVE

    PHOTO GALLERY SPECTACULAR MOMENTS

    SPECTACULAR MOMENTS

    • NEWS
    • /
    • RESEARCH
    • /
    • Facility Rentals
    • /
    • DJ CARES
    • /
    • PHOTO GALLERY
    • /
    • IVC Forums
    • /
    • Newsletters

    Independent Research Projects

    As part of our capacity development initiatives we conduct insightful surveys and researches to buoy knowledge. Within our stable are:

    • The 2014 Nigeria Cyber Security Barometer Report
    • The Learning and Development Benchmark Survey 2016
    Click here to see synopsis of survey reports

    DJL QUARTERCAST 2012

    DJL QUARTERCAST 2012

    DJL QUARTERCAST 2012

    DJL QUARTERCAST 20

    DJL QUARTERCAST 2012

    SECURING CRITICAL NATIONAL ASSETS

    SECURING CRITICAL NATIONAL ASSETS

    • NEWS
    • /
    • RESEARCH
    • /
    • Facility Rentals
    • /
    • DJ CARES
    • /
    • PHOTO GALLERY
    • /
    • IVC Forums
    • /
    • Newsletters

    Facility Rentals

    The task of getting an Ideal venue for your meetings and conferences can be very demanding and time-consuming because the ideal venue is essential to make a lasting impression on your business associates. Our world-class training facility located in the serene and secure Osborne Estate is tailored to address your training and advisory needs. Our Learning Centre is adequately furnished for effective and efficient learning. We have various learning rooms, well equipped to adequately make learning interesting and conducive. Our flexible and affordable conference and meeting facilities provide the perfect environment for business productivity. The rooms are exquisitely furnished with a seating capacity of 8 to 30 persons

    Our Meeting and conference rooms could be used for the following: Business Meetings; Presentations; Interviews; Strategy Sessions; Training; Seminars; Board Meetings.
    • NEWS
    • /
    • RESEARCH
    • /
    • Facility Rentals
    • /
    • DJ CARES
    • /
    • PHOTO GALLERY
    • /
    • IVC Forums
    • /
    • Newsletters

    CARES

    Our Corporate Social Responsibility (CSR) initiative, Digital Jewels Cares is a demonstration of our quest to build capacity for specialized skills for the development of the African economy. With the Firm’s vision of becoming Africa’s trusted guide in the emerging knowledge economy by providing high quality classroom based training, e-learning and specialised recruitment services, Digital Jewels Cares seeks to provide career guidance to enable professionals, experienced and inexperienced alike, to develop skills relevant to the information age. DJ Cares has to date provided high impact career counselling seminars to the following institutions:

    2015

    First Quarter The Nigerian Association of Computer Science Students (NACOSS Moshood Abiola Polytechnic chapter) organized a week long orientation programme in February with the theme: ‘Professionalism’. DJ cares had her consultant on ground to handle an aspect of the seminar on the topic given by the association- ‘Becoming an IT Expert’. DJ Cares was also able to support the seminar/workshop with relevant materials/souvenirs. By popular demand, the DJL 2015 Scholarship scheme has been expanded to include indigent students of State Universities in Nigeria.

    2014

    First Quarter The 1st Quarter in 2014 began with a visit to Obafemi Awolowo University Ife. The Nigerian Association of Computer Science Students (NACOSS OAU chapter) organized a week long programme with the theme: ‘Exploring Technology: Stepping Up Your Game in the ICT World’. DJ cares had her consultant on ground to handle an aspect of the seminar on the topic given by the association‐ Technology as a value driver. DJ cares was also able to support the seminar/workshop with relevant materials/souvenirs. Second Quarter In Q2, there were no Secondary school nor University visitations. However, efforts were intensified to ensure a final shortlist was done for candidates who applied for the 2014 DJL scholarship. The DJL Scholarship scheme is an offshoot of DJ cares and it commenced in 2013. Third Quarter The Nigerian Association of Computer Science Students (NACOSS University of Ibadan Chapter) organized a seminar in the course of quarter 3 and Digital Jewels ltd was invited to speak on ‘The marriage of Project Management and Information Technology’. The firm was also able to support the seminar with a few relevant materials. Fourth Quarter After an intense screening process for the award of the DJL 2014 Scholarship scheme, four candidates emerged successful and are beneficiaries of a yearly grant to aid their academic pursuits. The four successful candidates are: Ibrahim Usman Opeyemi- a final student at the University of Ilorin studying Electrical Engineering, Jamiu Abdulmujeeb- a final student at the University of Ilorin studying Electrical Engineering, Urama Charles Chiemeka- a 400L student at the Federal University of Technology Owerri studying Computer Science and Babalola Omodolapo Victor- a 400L student at the Ladoke Akintola University of Technology Ogbomoso studying Computer Science and Engineering.

    2013

    First Quarter DJ Cares team was at the Lagos State University, Ojo in the first quarter of 2013 to conduct another session of DJ Cares Career Counseling seminar for the students of the Computer Science Department. The seminar was held in collaboration with the Counseling Unit of the institution. Second Quarter The final year students of Computer Science and Electrical Electronics Engineering departments of the prestigious Obafemi Awolowo University, Ile-Ife were the beneficiaries of DJ Cares Career Counseling seminar in the second quarter 2013 edition. The career seminar was well attended with about 200 students at the First Bank Lecture Hall where the seminar was held. Third Quarter In the 3rd Quarter, DJ Cares returned on invitation by the NACOSS Executives, to Lagos State Polytechnic, LASPOTECH Ikorodu Campus. The event was the NACOSS Day Lecture and their theme was “Awareness of Cyber‐Crime and Youth Dangers in the Digital World”. A contentious topic amongst young Nigerians one will say. Nevertheless, our consultants did justice to the topic and delivered excellently by drawing examples from both personal experiences and factual data. It was a very interactive and educative presentation. Fourth Quarter To wrap up 2013 in the 4th Quarter, the team visited two Senior Secondary Schools in the Mainland area of Lagos to provide Career Guidance to the SSS students. The consultants had an engaging and interactive session with the students on Charting a successful career.

    2012

    Second Quarter DJ Cares team was in Lagos State Polytechnic, LASPOTECH in the second quarter of 2012. The seminar tagged “See the Need and Take the Lead” was held in conjunction with the institution’s NACOSS executives and it featured HND2 and ND2 students of the Computer Science department. Third Quarter The team was at Yaba College of Technology, YABATECH in the third quarter 2012 and the session was an outstanding success. The National Association of Computer Science Student (NACOSS) played significant role in ensuring the session was well attended.

    2011

    Second Quarter In 2011 DJ Cares successfully held a Career Counseling session for selected students from Government Senior College, Government College Maroko, Wahab Folawiyo Senior School, Akande Dahunsi Senior School and Ilado Community Senior High School all in Lagos State Government Education District 3, Ikoyi. Fourth Quarter The team was in University of Lagos, Akoka  for the fourth quarter  of DJ Cares Career Counseling. The session was with the Department of Computer Sciences. It was very insightful as it was exciting.
    • NEWS
    • /
    • RESEARCH
    • /
    • Facility Rentals
    • /
    • DJ CARES
    • /
    • PHOTO GALLERY
    • /
    • IVC Forums
    • /
    • Newsletters

    Contact us

    WE WANT TO HEAR FROM YOU
    Click on the flag for country contact details

    DIGITAL JEWELS LTD. NIGERIA

    LAGOS: Plot 12, Frajend Close. Osborne Foreshore Estate. lkoyi, Lagos.

    ABUJA: Plot 85. Apo Annex behind PHCN Sub-station. AMVE Avenue. Apo. Abuja.

    info@digital.jewels.net.
    Lagos: +234-8152000120
    Abuja: +234-8172435139, +234-8172435143

    DIGITAL JEWELS LTD, GHANA

    34, 1st ILGS Link Road, (Off ILGS Street, Off Boundary Road), Madina Estate, Accra Ghana

    ghanaoffice@digitaljewels.net
    +233 549 596 627,
    +233 553 647 355

    DIGITAL JEWELS LTD, KENYA

    Riverside Park 2nd Floor, ICEA Lion Centre, West Wing, Wayaki Way, Kenya

    kenyaoffice@digitaljewels.net
    +254 (0) 722 318 095

    DIGITAL JEWELS LTD, RWANDA

    Cedar Ark Law, 14th Floor, Kigali City Tower (KCT), Avenue du Commerce Rwanda, P.O Box 6428, Kigali, Rwanda

    rwandaoffice@digitaljewels.net
    +254 (0) 722 318 095

    Drop us a line

    Copyright © 2019 Digital Jewels – Digital Jewels Limited
    Site Credit: Design by Digital Jewels Ltd Academy;
    Developed by Arcadia Technology Services Limited (Arcadia Media)
    Select your Country

    You are currently viewing the website for Digital Jewels Limited Nigeria and would therefore be served content based on the aforementioned Country. Kindly select from the dropdown to switch to your preferred country.

    NEED AN LMS

    REQUEST A QUOTE