·
Carry out a series of threat, vulnerability and
risk assessments across a portfolio of hotels
·
Design and train crisis management plans for
relevant business risks covering information or cyber security, fires, floods,
medical emergencies, earthquakes, civil unrest and bomb/terror threats
·
Manage security and logistics for a corporate
event with thousands of attendees
·
Protect personnel during periods of transition,
downsizing and restructuring
·
Assess locations and evaluate facilities’ access
points, perimeter and environment
·
Provide comprehensive crisis planning, training
and including risk assessments for many international schools across Asia
Our
Capabilities
Crisis Management
- Risk Assessment & Contingency Planning
- Crisis Management Training & Support
- Business Continuity Risk Management
Operations & Facility Risk
- Threat, Vulnerability & Risk Assessment (TVRA)
- Security Review
- Technical Security Design
- Capital Projects Risk Management
- Supply Chain Risk Management
- Technical Surveillance Countermeasure (TSCM) Services
Travel & Event Risk Management
- Risk Assessment & Review
- Travel Facilitation & Support
- Venue and Event Planning & Support
- Executive, Personal & Family Protection
Corporate
Intelligence
Counterparty Risk
- Due Diligence and Investment Appraisal
- Strategic & Market Intelligence
- Executive Profiling and Vendor Screening
- Pre-Employment Screening
- Shareholder Action Services
- Litigation Support
Fraud Prevention
& Integrity Risk Management
Integrity Risk
- Fraud & Compliance Risk Training and Management
- Fraud and Corruption Enquiries
- Litigation Support
Brand & IP Risk
- Risk Assessment and Controls Review
- IP & Trade Secret Protection
- Intelligence Gathering and Analysis
- Program Design and Enforcement Actions
Risk Information
·
GIS (Global Intelligence Service)
·
Country Risk Reports
·
Commissioned Reporting
Cyber Security
Cyber / Information Security
- Incident Response and Planning
- Bespoke Advisory Services
- Risk Assessment, Controls and Security Review
- Technical Security Design
- Cyber Situational Awareness
- Threat Intelligence
- Training and Workshops
- Perimeter & System Hardening and Application
Security Testing
- Penetration Testing and Vulnerability Assessments
- Digital Due Diligence, Expert Witness Services
- Computer Forensics and Digital Preservation
- Data Recovery and Secure Destruction
No comments:
Post a Comment