Risk Strategy
A key element of addressing today’s threat environment is emulating practices that have had success. “Lessons Learned – Evidence Based – Effective Collaboration” It is important to incorporate a plan that is holistic, one that spans the requirements of the authority, and one that will…
2 min read
Behaviour Risk Assessment and Verification Operations (BRAVO)
What is Insider Threat? An insider is someone who (knowingly or unknowingly) misuses legitimate access to commit a malicious act or damage their employer. These days, most insider acts involve the physical environment and cyber insider threat”. Monitoring capabilities to identify insider precursors...
1 min read
Griffin on the Go
Griffin on the GO is proven and well used method to detect, deter, deny and disrupt criminal activity program focusing on issues as minor crime such as theft to human trafficking and terrorism at the same time engaging and reassuring the public within the environment. ...
2 min read
Tech Resources
Innovation in technology and assisting the human element is a key factor in security. However, such technology must provide necessary outcomes to justify the use and cost. Our endeavor is to provide insight and useful knowledge. Research, innovative products, and pilot programs are included in…
1 min read
Mass Event Crisis
L earning from history would, one would think, is an insight to better understand the types of risks an authority could examine to prepare and train against in the event a similar incident happened. Looking at one incident, the report from the Los Angeles World...
1 min read
Implementing Port Security Community Best Practices
The principles of PSeMS and the learnings from Project Griffin form a methodology and approach that supports security resilience. CSBP observations and recommendations are incorporated into the program guide and provide insight based on evidence-based practices. Security starts with prevention requiring the implementation of structured...
1 min read
Stay connected