Practice Areas

Security and Safety Management

Security Management competencies:

Knowledge Skill Attitudes
Understand the law and community relations in the applicable country. Conduct a threat assessment. Be able to apply the rule of law and natural justice.
Understand security technology. Apply asset management. Display a problem solving attitude.
Develop and implement security plans and Security Management Systems (SecMS).
Conduct business investigations and competitive intelligence gathering.

Safety Management competencies:

Knowledge Skill Attitudes
Understand community and industrial norms in the applicable Sector or across Sectors. Apply the systems approach. Demonstrate risk-averse attitude to life, property and environment.
Understand goal-setting and legislative objectives. Produce and apply Safety Procedures and Safety management Systems (SMS).
Apply appropriate regulatory standards (eg. AS/NZ4801).

We deliver Security Management advice through specialist Crisis Practitioners with expertise in physical security, threat assessments, security Risk Management, executive protection and training for high threat environments.

Development of Facility and Site Security Survey
  • Building & Perimeter Security
  • Vehicle Access Control
  • Lighting External & Internal
  • Locking Controls
  • Alarm Systems
  • Physical Guards & Security Controls
  • Access Control
  • Product Controls
  • Money Controls
  • Proprietary Information
  • Vulnerabilities
  • Personnel Security
Development and Auditing of Security Management Systems
  • CPTED
  • Approach to Physical Security
  • Physical Barriers
  • CCTV
  • Internal & External Intrusion Detection Systems
  • Physical Access Control
  • Biometrics
  • Electronic Access Control & System Integration
  • Safes, Vaults & Accessories
Provisions of Internal Theft Investigations and Control Measures
  • Security Intervention
  • Theft Trigger Mechanisms
  • Physical & Electronic Safeguards
  • Confidential Numbering
  • Security for Deterring Theft
  • Theft Policies
  • Confronting a Theft Suspect
  • Theft Investigation
  • Use of Investigative & Undercover Personnel
  • Employee Awareness & Accountability
Security and Asset Loss Investigations
  • Undercover Investigations
  • Interviewing Techniques
  • Drafting Investigation Reports
Personnel Security Awareness Programs
  • Personal Security Awareness Training
  • Threat Observation Skills
  • Identifying Security Hazards
  • Self Protection Measures
Sabotage and Terrorist Awareness Program
  • What is Terrorism?
  • Terrorist Organizations who are a threat
  • Australian Nation Counter Terrorism Policy
  • Prevention & Preparedness
  • First Line of Defence
  • Protecting the Organization from Terrorist Attack
  • Incident Response
  • How to Respond To & Survive a Terrorist Attacks
Workplace Violence: Prevention and Intervention Awareness Training
  • Threats
  • Attack
  • Harassment
  • The Work Environment and Violence
  • Profiling Violent Behavior
  • Levels of Violence
  • Preventing Workplace Violence
  • Intervention Methods & Education
  • Post-violence Procedures
Provision of Security Personnel Training
  • Observing & Monitoring People
  • Working in Small Teams
  • Leading Small Teams
  • Interpret Information and Security Equipment
  • Managing Individual Performances
  • Provide Safety of Personnel
  • Plan & Conduct Evacuation of Premises
  • Security Officer's Ten Commandments
  • Dealing with an Armed or Violent Situation
  • Searching and Detaining Procedures
Security Risk Assessment Plans
  • Vulnerability and Threat Identification
  • Asset Identification, Threat Assessment
  • Quantifying and Prioritizing Loss Potential
  • Cost/Benefit Analysis, Risk Management of the Organization
  • Construct and Development of Risk Assessment Plans
Development of Facility Risk Management Plans (RMP)
  • Risk Management Purpose
  • Roles & Responsibilities of Management
  • Risk Management Process & Assessment
  • Risk Identification
  • Risk Evaluation
  • Risk Treatment
  • Risk Treatment Plan
  • Risk Monitoring
  • Risk Reviewing
  • Communication & Consultation
  • ALARP Principle
  • Risk Register
  • Risk Treatment Plans
Loss Prevention Strategy Training
  • Understanding Why Employees Steal
  • Identify what Employees Steal
  • Methods of Theft
  • The Erosion of Honesty
  • Managing Conditioned Honesty
  • Carson's Laws of Honesty
  • Identifying Specific Problem Areas
  • Theft Triangle
Bomb Threat Awareness Training
  • Bomb Types
  • How to Prepare for a Bomb Threat Situation
  • Search Techniques
  • Identifying Suspect Packages
  • Telephone Operator Response
  • Bomb Threat Checklist
  • Evacuation of a Bomb Site
  • Handling the Media
Hostage Incident Awareness Training
  • 10 Key Steps to Surviving a Hostage Situation
  • Adapting to Captivity
  • Stress Reduction Techniques
  • The Stockholm Syndrome
Provisions of International Ship and Port Security Code Training
  • Provisions of Ship Security Plans (SSP)
  • Provisions of Port Facility Security Plans (PFSP)
  • Provisions of Ship Security Officer Training (SSO)
  • Ship and Facility Search Planning
Development of Information Security Plans
  • Information Control Measures
  • Controlling the Risk to Information Loss
  • Classification/De-classification of Materials
  • Threats to Information
  • Computer Abuse
  • Information Access Control
  • Preparing the Information Security Plan
  • Document Control
  • Employee Computer Security Awareness

site design by scott young
valid xhtml 1.0 strict | designed for internet explorer 6/7, opera and firefox