OUR SERVICES

Safeguard Your Business Today.

The SightSpan team is focused on its core set of services and expertise to provide the most value for each individual client. The firm has clear policies and repeatable methodologies to complete projects in a timely manner, with the focus always remaining on client goals, trust, effective communications and success.

76A98F0B-FFA9-49CC-8129-04CB8E40589E

Risk Management & Security

AML/CTF

Compliance

Sanctions

Data & Cyber Security

Insider Threat

AML/CTF

Our AML/CTF services help you establish, document and/or enhance your Anti-Money Laundering, Bank Secrecy Act and Combating Terrorist Financing programs, policies and procedures. Below list the program elements that we offer:

Program Establishment & Documentation

  • Program, policy and procedure development, documentation and enhancement
  • Account opening/closing policy development and documentation
  • Rules based, traditional, artificial intelligence/machine learning applications

 

Artificial Intelligence/Machine Learning AML/CTF Program Establishment

  • Program design, implementation, & testing
  • Machine learning vendor analysis
  • Artificial intelligence documentation & success criteria determination

 

Risk Rating Services/Assessments

  • Customer risk rating
  • Country risk rating
  • Entity and business score cards
  • Summary of enterprise-wide risk assessments

 

Additional Elements

  • Independent AML/CTF auditing (traditional, risk based and/or artificial intelligence)
  • Quality assurance & quarterly independent testing
  • Machine learning analytics project management services
  • AML/CTF investigations and look backs
  • Artificial intelligence AML audits

Compliance

SightSpan assists firms that deal with local, regional and international compliance and risk management issues within:

  • Enterprise-wide BSA/AML compliance programs
  • Financial crimes intelligence units
  • International information privacy programs
  • Foreign Corrupt Practices Act (FCPA)
  • Independent audits of compliance programs
  • Compliance training and awareness
  • Corporate governance
  • Regulation e audits
  • Privacy rules
  • Trade compliance
  • US, state and federal licensing, registration and renewal

Sanctions

Our sanctions experts are involved daily with the ever changing global sanctions environment. SightSpan offers a broad array of solutions and services related to this important area. Our solutions/services focus on:

  • Provide experts on OFAC, EU, FSA, and other international government programs
  • Enhance existing sanctions program design
  • Establish or enhance filtering and surveillance processes
  • Design and incorporate risk decision processes
  • Sanctions program requirements documentation
  • Perform independent testing and customized audits; pre-exam preparation

Data & Cyber Security

Virtual CISO+, Your security strategist, With our Virtual CISO+ (Chief Information Security Officer) service, you get a trusted resource who can virtually sit inside your company, understand your business goals and structure, and build a program that meets your needs and industry requirements. Ongoing guidance on cybersecurity policies and procedures to ensure safety and regulatory compliance for compliance standards such as PCI, Reg S-P, HIPAA, FINRA, GDPR, NYDFS, GLBA SightSpan also completed Risk Assessments performing A systematic process to detect potential hazards or gaps existing in your network and to gauge your level of vulnerability to phishing campaigns.

Insider Threat

Our insider threat investigations & techniques provide fast and functional services that are guaranteed to protect your corporation. our services include:

  • Artificial Intelligence Based Insider Threat Tools & Investigations
  • Ai Based Hr Systems With Built-In Logic To Monitor & Track Suspicious Employee Behavior
  • End User Behavior Monitoring That Determines If Activity Is In Users Day To Day Responsibility Or A Violation
  • Recovery Of Deleted Files, History, & Emails To Identify Any Corporate Violations
  • Identify Potential Or Past Leaks Related To Internal Policies, Personal Identifiable Information(Pii), Company Assets, Or Infrastructure
  • Identify Potential Or Past Leaks Related To Internal Policies, Personal Identifiable Information(Pii), Company Assets, Or Infrastructure
  • Time Card & Badge Reader Audits To Detect Abnormal Work Hours & Attempted Access To Unauthorized Or Secured Spaces

 

Tactical Insider Threat Programs & Evaluations

  • Identify Root Cause Of Potential Internal Threats Or Findings
  • Develop Strategies For Remediation Of Control Failures & Gaps In Internal Threat & Risk Programs
  • Understand & Evaluate Your Organizations Risk/Insider Threat Program & Policies To Enhance Detection Strategies

 

Insider Risk Assessments

  • Background Checks On High Risk Employees
  • Social Media Analysis Of High Risk Employees
  • 24/7 Continual Negative News Searches
  • Ongoing Terror Watchlist SearchesAnalysis Of Salary To Lifestyle On Employees Under Investigation
7F7675E0-6498-407B-A3AB-3227E15EB14D

Business Support

SightSpan has a team of highly experienced experts, ready to work for your organization remotely. We can work on a retainer basis or on demand for special projects.

Project Management

Vendor Selection

Technology

Project Management

The SightSpan Payments group partners with Fintechs, Payment Firms, Crypto/FX, and Banks as an extension of their AML Compliance and Operations departments. The SightSpan team will identify and define critical programs, policies, and procedures for the proposed product/service offerings in alignment with industry best practices and any regulatory or contractual requirements. SightSpan supports our Clients with the implementation and management of critical partners, including but not limited to: Processors, Banks, Networks, CIP Vendors, etc. SightSpan’s team serves as hands-on analysts, resolving escalations, grounding, and driving improvement projects to launch new programs and improve customer experiences.

Vendor Selection

The SightSpan Vendor Selection planning process is customized to the individual organization or agency. A custom Request for Proposal (RFP) will be drafted to detail the buyer’s requirements, to solicit proposals, and to detail how the mathematical modeling used by the team will evaluate and negotiate a future contract. The process is broken down into five phases of work: Pre-solicitation Planning, Vendor Selection, Award Contract, Contract Management, Contract Closure.

Technology

Security and compliance needs can require a wide range of technologies. Our industry leading technology services include:

  • Block Chain
  • Program Design And Documentation
  • Project Management
  • Functional Testing And Success Metrics
  • Machine Learning Project Management And Testing
  • Machine Learning (Behavioral Analysis, Human Resources, Alert Management)
  • Compliance Big Data Management
  • Information And Data Analytics
  • Third Party Vendor Analysis And Assessments
  • Quality Assurance Services
  • Internal Software Audits & Testing
  • Quality Assurance (QA), Stress Testing And Quality Controls (QC)

We have the Risk Management & Security Solutions you need.

74723EDC-A4CF-4169-A49B-44F2A8AF67B1

SightSpan Security International

Our partner, SightSpan Security International, conducts physical security evaluations, designs security programs and provides key personal protection services for both private and government clients.

/ 01

Threat Management

The security of any company or of individuals and their families depends on the thoroughness of a Threat Assessment. It is the services of a security risk management consultant company that can make the difference when conducting an assessment, to include an in-depth review of all business and family activities, regional, political and religious risks, …

/ 02

Physical Security

Without reasonable physical security measures being in place, all other methods of combating risks presented by terrorism, criminals and other anti-social groups or individuals will be seriously undermined. Crime Prevention through Environmental design is a strategy based upon the ability to reduce the level of crime by proper design and …

/ 03

Counter-Espionage

Corporate defensive measures have become increasingly necessary in today’s highly competitive markets. Following a thorough Risk Analysis, our company will advise clients on potential weaknesses within their organization and on any preventive measures necessary to safeguard the integrity of new ideas or products. This may include electronic…

/ 04

Training

Hands on training is part of the implementation of the security design and every risk analysis will have recommendations of key person training to up hold the standard emergency procedures. This will ensure that prompt action is taken and nothing is left to guess work, making sure everything possible is done to minimize loss and manage risk…

/ 05

Enhanced Due Diligence

Information is the key to any decision making process and at times required by local and international regulations to help identify and prevent illicit money movement and terrorist activities.

/ 06

Employment Screening

Employees are a representation of your company and throughout the hiring process are vetted for competency, experience and suitability to support and expand your brand. In a global marketplace third party screening of potential employees becomes a necessary investment in the vetting process to …

/ 07

Vulnerability Assessment

All facilities face a certain level of risk associated with various threats. These threats may be the result of natural events, accidents, or intentional acts to cause harm. Regardless of the nature of the threat, facility owners have a responsibility to limit or manage risks from these threats to the extent possible. The first step in a risk management …

/ 08

Open Source Intelligence

SightSpan Security utilizes OSINT, which is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed to covert or …

Threat Management

The security of any company or of individuals and their families depends on the thoroughness of a Threat Assessment. It is the services of a security risk management consultant company that can make the difference when conducting an assessment, to include an in-depth review of all business and family activities, regional, political and religious risks, movement and logistics arrangements. SightSpan Security will continuously monitor identified risks and threats and implement corrective or preventative measures to on-going plans as deemed necessary to counter identified changes and challenges.

Crisis Response Planning
Within the context of the threat assessment, be it that of an organization, individual(s) including that of their families, our company will plan for unfavorable conditions, and take steps to pre-empt those conditions arising, or to have in place effective contingency procedures to minimize their risk impact.
This will include the extraction and safe passage to safe havens. Medical extractions and the important need of informing all registered people who need to know the status of individuals during and after their extraction where possible.

Crisis Plan Review and Audit
Once a Crisis Response Plan is defined and implemented organizations often believe that no further efforts are required. However, as your organization changes and as time passes, it is crucial to periodically have your plan reviewed in order to make any updates or adjustments that will align to the new organizational structure. SightSpan Security will review your organization’s Mitigation and Prevention controls, level of Preparedness, Response measures and Recovery program. After a thorough review, recommendations will be made that will assist your organization ensure that all aspects of your crisis plan are both sound and realistic.

Physical Security

Without reasonable physical security measures being in place, all other methods of combating risks presented by terrorism, criminals and other anti-social groups or individuals will be seriously undermined. Crime Prevention through Environmental design is a strategy based upon the ability to reduce the level of crime by proper design and effective use of a built environment. Physical security recommendations should also consider the aspects of the environment that are capable of causing major disruption.

Personal

Individuals exposed to a high degree of risk require a high degree of protection. SightSpan Security provides personal protection and security services that keep people safe from the threats of danger that come along with high profiles. Our security professionals protect high profile individuals, political figures, foreign dignitaries, corporate executives and other elevated-risk individuals with the highest levels of experience and security expertise. Prevention through awareness is key. Not only must security professionals respond quickly and effectively in emergency situations, but they must also have the awareness and communication skills to identify suspicious activity and prevent threatening incidents from occurring. SightSpan Security has the experience and expertise required to fully assess situations and plan efficient security strategies on the spot, and our security team works closely with law enforcement and clients to provide personal protective services that keep people safe in any environment. By maintaining a low profile in combination with high awareness, our security professionals allow our clients to go about their daily activities knowing they are in safe situations.

Facilities

The safety and security of your facilities directly impacts your daily operations. Assessing, Staffing and supporting the right security posture to minimize risk is vital to the success of your company.
  • On-site Security Staffing
  • Technical Surveillance
  • Audio/Video Security System Design
  • Online AML Training Programs
  • Installation Audio/Video Security Monitoring and Incident Reporting

Counter-Espionage

Corporate defensive measures have become increasingly necessary in today’s highly competitive markets. Following a thorough Risk Analysis, our company will advise clients on potential weaknesses within their organization and on any preventive measures necessary to safeguard the integrity of new ideas or products. This may include electronic screening of premises, with specific emphasis on information hubs, board and conference rooms, research laboratories and design facilities. The methods used as counter defenses will be within the laws of privacy of the countries in which these measures are implemented and the information gathered will be treated as confidential.

Training

Hands on training is part of the implementation of the security design and every risk analysis will have recommendations of key person training to up hold the standard emergency procedures. This will ensure that prompt action is taken and nothing is left to guess work, making sure everything possible is done to minimize loss and manage risk. A few of the primary training courses offered are:
  • Explosive Ordnance Device Training Course
  • Special Weapons and Tactics (Swat) Training Course
  • Hostage Negotiation Training Course
  • Terrorist Risk Management Training Course
  • Emergency Incident Response Training

Enhanced Due Diligence

Information is the key to any decision making process and at times required by local and international regulations to help identify and prevent illicit money movement and terrorist activities. High Risk Client Review
  • Beneficial Owner Investigations
  • Behavior Pattern Identification And Baseline Setting, Based On Entity Type, Risk Levels And Locations
  • Client Identification Process (CIP)
  • Know Your Client (KYC) Processes
  • Board Investigations
  • On Demand Support For Information Gathering, Policy Audits And Incident Analysis Vetting Potential Directors
  • Previous Employment History, Crime Reports, Negative News, And Validation Of Private And Public Information
  • Corporate Investigations For Merger And Acquisitions
  • Providing Decision Critical Information, Perform Outcome-based Analysis With Emotion Fee , Experienced Input
  • Surveillance
  • Open Source/Social Media Investigations, Corporate Communication Surveillance

Employment Screening

Employees are a representation of your company and throughout the hiring process are vetted for competency, experience and suitability to support and expand your brand. In a global marketplace third party screening of potential employees becomes a necessary investment in the vetting process to ensure the information presented by a candidate is accurate and complete.
  • Previous Employment History Research
  • Document Validation
  • Negative News And Government Sanctions Checking
  • Social Media And Public Information Investigations

Vulnerability Assessment

All facilities face a certain level of risk associated with various threats. These threats may be the result of natural events, accidents, or intentional acts to cause harm. Regardless of the nature of the threat, facility owners have a responsibility to limit or manage risks from these threats to the extent possible. The first step in a risk management program is to complete a threat/vulnerability assessment (TVA). A TVA assessment considers the full spectrum of threats (i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location/organization. A SightSpan Security TVA will examine supporting information to evaluate the likelihood of occurrence for each threat. For terrorist threats, the attractiveness of the facility as a target is a primary consideration. In addition, the type of terrorist act may vary based on the potential adversary and the method of attack most likely to be successful for a given scenario. Once the credible threats are identified, a vulnerability assessment will be performed. The SightSpan Security vulnerability assessment considers the potential impact of loss from a successful attack as well as the vulnerability of the facility/location to an attack. A combination of the impact of loss rating and the vulnerability rating is then used to evaluate the potential risk to the facility from a given threat. Based on the findings from the risk analysis, SightSpan Security executives will then identify countermeasure upgrades that will lower the various levels of risk to you and your organization and assist with the management of the program based on the TRA.

Open Source Intelligence

SightSpan Security utilizes OSINT, which is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed to covert or classified sources); it is not related to open-source software or public intelligence.