- Threat Management
- Physical Security
- Counter-Espionage
- Training
- Enhanced Due Diligence
- Employment Screening
- Vulnerability Assessment
- Opensource Intelligence
- SightSpan Security International
-
Threat Management
The security of any company or of individuals and their families depends on the thoroughness of a Threat Assessment. It is the services of a security risk
management consultant company that can make the difference when conducting an assessment, to include an in-depth review of all business and family
activities, regional, political and religious risks, movement and logistics arrangements. SightSpan Security will continuously monitor identified risks and
threats and implement corrective or preventative measures to on-going plans as deemed necessary to counter identified changes and challenges.CRISIS RESPONSE PLANNING
Within the context of the threat assessment, be it that of an organization, individual(s) including that of their families, our company will plan for
unfavorable conditions, and take steps to pre-empt those conditions arising, or to have in place effective contingency procedures to minimize
their risk impact.This will include the extraction and safe passage to safe havens. Medical extractions and the important need of informing all registered
people who need to know the status of individuals during and after their extraction where possible.CRISIS PLAN REVIEW AND AUDIT
Once a Crisis Response Plan is defined and implemented organizations often believe that no further efforts are required. However,
as your organization changes and as time passes, it is crucial to periodically have your plan reviewed in order to make any updates
or adjustments that will align to the new organizational structure.SightSpan Security will review your organization’s Mitigation and Prevention controls, level of Preparedness, Response measures
and Recovery program.After a thorough review, recommendations will be made that will assist your organization ensure that all aspects of your crisis plan are both
sound and realistic.
-
- SightSpan Security International
-
Physical Security
Without reasonable physical security measures being in place, all other methods of combating risks presented by terrorism, criminals and other anti-social
groups or individuals will be seriously undermined. Crime Prevention through Environmental design is a strategy based upon the ability to reduce the level
of crime by proper design and effective use of a built environment. Physical security recommendations should also consider the aspects of the environment
that are capable of causing major disruption.Personal
Individuals exposed to a high degree of risk require a high degree of protection. SightSpan Security provides personal protection and security services
that keep people safe from the threats of danger that come along with high profiles. Our security professionals protect high profile individuals,
political figures, foreign dignitaries, corporate executives and other elevated-risk individuals with the highest levels of experience and security expertise.Prevention through awareness is key. Not only must security professionals respond quickly and effectively in emergency situations, but they must
also have the awareness and communication skills to identify suspicious activity and prevent threatening incidents from occurring. SightSpan Security
has the experience and expertise required to fully assess situations and plan efficient security strategies on the spot, and our security team works closely
with law enforcement and clients to provide personal protective services that keep people safe in any environment. By maintaining a low profile in
combination with high awareness, our security professionals allow our clients to go about their daily activities knowing they are in safe situations.Facilities
The safety and security of your facilities directly impacts your daily operations. Assessing, Staffing and supporting the right security posture to minimize
risk is vital to the success of your company.On-site Security Staffing
Technical Surveillance
Audio/Video Security System Design
Installation Audio/Video Security Monitoring and Incident Reporting
-
- SightSpan Security International
-
Counter-Espionage
Corporate defensive measures have become increasingly necessary in today’s highly competitive markets. Following a thorough Risk Analysis,
our company will advise clients on potential weaknesses within their organization and on any preventive measures necessary to safeguard the
integrity of new ideas or products.This may include electronic screening of premises, with specific emphasis on information hubs, board
and conference rooms, research laboratories and design facilities. The methods used as counter defenses will be within the laws of privacy of
the countries in which these measures are implemented and the information gathered will be treated as confidential.
-
- SightSpan Security International
-
Training
Hands on training is part of the implementation of the security design and every risk analysis will have recommendations of key person training
to up hold the standard emergency procedures. This will ensure that prompt action is taken and nothing is left to guess work, making sure everything
possible is done to minimize loss and manage risk. A few of the primary training courses offered are:EXPLOSIVE ORDINANCE DEVICE TRAINING COURSE
SPECIAL WEAPONS AND TACTICS (SWAT) TRAINING COURSE
HOSTAGE NEGOTIATION TRAINING COURSE
TERRORIST RISK MANAGEMENT TRAINING COURSE
EMERGENCY INCIDENT RESPONSE TRAINING
-
- SightSpan Security International
-
Enhanced Due Diligence
Information is the key to any decision making process and at times required by local and international regulations to help identify and prevent illicit
money movement and terrorist activities.HIGH RISK CLIENT REVIEW
- BENEFICIAL OWNER INVESTIGATIONS
- BEHAVIOR PATTERN IDENTIFICATION AND BASELINE SETTING, BASED ON ENTITIY TYPE, RISK LEVLS AND LOCATIONS
- CLIENT IDENTIFICATION PROCESS (CIP)
- KNOW YOUR CLIENT (KYC) PROCESSES
BOARD INVESTIGATIONS
- ON DEMAND SUPPORT FOR INFORMATION GATHERING, POLICY AUDITS AND INCIDENT ANALYSIS VETTING POTENTIAL DIRECTORS
- PREVIOUS EMPLOYMENT HISTORY, CRIME REPORTS, NEGATIVE NEWS, AND VALIDATION OF PRIVATE AND PUBLIC INFORMATION
- CORPORATE INVESTIGATIONS FOR MERGER AND ACQUSITIONS
- PROVIDING DECISION CRITICAL INFORMATION, PERFORM OUTCOME-BASED ANALYSIS WITH EMOTION FEE , EXPERIENCED INPUT
- SURVEILLANCE
- OPEN SOURCE/SOCIAL MEDIA INVESTIGATIONS, CORPORATE COMMUNICATION SURVEILLANCE
-
- SightSpan Security International
-
Employment Screening
Employees are a representation of your company and throughout the hiring process are vetted for competency, experience and suitability to support and
expand your brand. In a global marketplace third party screening of potential employees becomes a necessary investment in the vetting process to ensure
the information presented by a candidate is accurate and complete.PREVIOUS EMPLOYMENT HISTORY RESEARCH
DOCUMENT VALIDATION
NEGATIVE NEWS AND GOVERNMENT SANCTIONS CHECKING
SOCIAL MEDIA AND PUBLIC INFORMATION INVESTIGATIONS
-
- SightSpan Security International
-
Vulnerability Assessment
All facilities face a certain level of risk associated with various threats. These threats may be the result of natural events, accidents, or intentional acts
to cause harm. Regardless of the nature of the threat, facility owners have a responsibility to limit or manage risks from these threats to the extent possible.The first step in a risk management program is to complete a threat/vulnerability assessment (TVA). A TVA assessment considers the full spectrum of threats
(i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location/organization. A SightSpan Security TVA will examine supporting information to
evaluate the likelihood of occurrence for each threat. For terrorist threats, the attractiveness of the facility as a target is a primary consideration.
In addition, the type of terrorist act may vary based on the potential adversary and the method of attack most likely to be successful for a given scenario.Once the credible threats are identified, a vulnerability assessment will be performed. The SightSpan Security vulnerability assessment considers the potential impact of loss from a successful attack as well as the vulnerability of the facility/location to an attack. A combination of the impact of loss rating and the vulnerability rating is then used to evaluate the potential risk to the facility from a given threat. Based on the findings from the risk analysis, SightSpan Security executives will then identify countermeasure upgrades that will lower the various levels of risk to you and your organization and assist with the management of the program based on the TRA.
-
- SightSpan Security International
-
Opensource Intelligence
SightSpan Security utilizes OSINT, which is a form of intelligence collection management that involves finding, selecting, and acquiring information from
publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term “open” refers to overt, publicly
available sources (as opposed to covert or classified sources); it is not related to open-source software or public intelligence.
-