Temporary or long-term management of security & safety operations, bringing best practices in:
Procedures
Policies
Operational effectiveness
Security technology
Security risk assessments and plans
Technical security counter measures and assessments
Project security management
Technical solutions
Physical solutions
Psychological & behavioral solutions
Intelligence in support of stabilization
Tackling of:
Extortion, blackmail, sabotage, threats to life, cyber ransom, reputational damage, malicious litigation, IP theft, etc.
Information security posture review
Threat risk assessment
Executive/staff cyber training
Security policies and procedures review