...the facilities we have in Dubai, they would be broadly similar – you can access all of the normal services and so on," he added.
It's when Control Risks clients want to work away from these offices and the larger towns that supporting technology becomes trickier: "If you step out of the 'office environment', we don't have lots of high-technology in the field. You just don't have a fibre-optic cable running across the desert."
A more common infrastructure challenge is maintaining simple things like an electricity supply. In Lagos, Nigeria, copper being stolen from cabling is a relatively common occurrence.
"It sounds bonkers but it actually happens. Not only do we have no power so we can't run our servers but on top of that it's probably caused a power flux in the server which has caused a fault," Scott said.
In response to these kinds of challenges the CIO is keen not to deploy heavyweight technology - such as servers - if it can be possibly avoided.
"Our strategy is to not do things if we can get away with it, simply because we end up with a management problem. There's one thing have a bunch of servers in Kabul but what happens if they go down and there's no-one there?" he said.
Turning to application virtualisation
Technology such as application virtualisation will increasingly be used in regional offices so that systems run in the UK can be accessed from a device rather than having systems hosted locally in each region the company operates in.
"That takes away this need for this server in Lagos problem because it's devices in Lagos, with servers somewhere else," Scott said.
The company is already using application virtualisation to an extent, but is looking at using it more widely to make sure staff can access the same applications wherever they are in the world.
"Essentially you end up needing a device plus an internet connection – that's kind of where we're trying to get to."
Virtualisation will also help ensure the integrity and security of data, as devices hold little data that could be exploited if it fell into the wrong hands.
"We don't want devices with lots of confidential data on them and the whole concept of using an enhanced desktop or client helps us with the security on that," Scott said.