We examine your total threat-scape; catalog the types of potential threats that could affect your business, which threats are the most likely and which threats can cause the most damage.
Bad actors often “telegraph” their intentions before taking action. Detecting indications of ill-intent before the actor has the opportunity to act can prevent tragedies. By actively monitoring cyber and physical space we can separate signal from noise to get in front of threats before they become emergencies.
Survey current security posture and protocols and recommend adjustments as needed.
Before a crisis strikes, businesses should think about how a disaster would impact all facets of the business. The steps you take after crisis occurs is equally important to the ones you take prior to the disaster occurring.
You need to have a plan in place for how you will work with law enforcement BEFOREan emergency happens, waiting until after an emergency happens is too late. Our staff has extensive law enforcement experience and can work with local agencies to create a plan that will minimize business impact while providing the most effective response in the case of an emergency.
Being able to communicate is critical for your team members to be able to effectively operate. We will assess your communications platforms for potential vulnerabilities, and then recommend ways to mitigate or minimize those vulnerabilities.
We will provide an application plug-in which will allow for two-way emergency communications between event participants and venue staff, as well as collecting critical digital evidence for law enforcement.
The Internet of Things (IOT) is rapidly integrating cyber-security with physical-security. We will survey the spectrum of connected devices that your venue already has in place; and then provide recommendations for ways to increase both the security of these devices and improve the physical security posture of your company by integrating IOT technology into your security architecture.
When emergencies happen, you need to have a plan. We will evaluate your current operational process and develop responses for the major categories of emergencies that will maximize personnel safety while minimizing business impact.
Crowds of people create inherent security vulnerabilities. Managing crowds properly can minimize risks and prevent problems from happening. We will survey your events, obtain estimates of crowd sizes, and create a plan which minimizes the amassing of people at various choke points within your event. For example, simply putting up security checkpoints with magnetometers to deter an active shooter may create a more vulnerable target of opportunity with the amassing of people waiting to get through the security cue.
Assessment and screening of employees, contractors, vendors, and other persons with sensitive or critical access for indications of concerning behaviors and characteristics. Because purely automated solutions present high false alarm rates, human analysts still need to vet these alerts and further investigate any potential points of concern. We will utilize the latest behavioral analytics-based threat detection tools to identify potential points of concern, and then further scrutinize these concerns.
VIA - Vulnerability Intercept Assessment
Copyright © 2018 - All Rights Reserved.