Customized based on each individual’s lifestyle, family, assets, actual and perceived threats, AEGIS conducts broad scope security, risk, and vulnerability assessments to identify and mitigate areas of concern. Encompassing safety at home, at work, or while traveling, AEGIS has the expertise and tools to support the mission.
Risk management is activity directed towards the assessing, evaluating, measuring, and ultimately mitigating risk to an acceptable level. In some cases the acceptable risk may be near zero. Risk can come in person and virtually, business activity, family, associates, accidents, natural causes, human error, and intentional targeted acts. AEGIS employs a range of all-hazards techniques and tools to observe, orient, decide, and act, creating deployable plans that enable our clients to remain safe and secure.
AEGIS’ goal is to maximize the existing framework by facilitating effective improvements with a high ROI resulting in detailed but easily followed deployable plans. Retained consulting services allows clients to gauge the effectiveness of their current security program with current industry standards.
While these assessments are focused on personal security, there is crossover covering material from residential security assessments which can be conducted simultaneously.
AEGIS’ Investigators support intelligence gathering efforts on historical threats to the client as well as perceived and expected future threats. The risk associated is measured against the clients’ physical residence, work locations, travel, and virtual patterns to identify single point of failures and areas/times of elevated risk. AEGIS’ Consultants analyze the data collected and considering all hazards/all threat vectors, organize the data to prioritize high ROI changes against potential losses and operational failures to extrapolated where efforts must be made to harden the client’s environment.
Risk Management Consulting:
Our risk management solutions are designed around the specific needs of individual client and are implemented to mitigate and minimize risk. Site visits are conducted as needed to establish environmental and situational risk and reporting is discussed to identify remaining vulnerabilities.Options for consideration are discussed with the client and relevant stakeholders and deliverables are drafted as an action plan.
Technical Surveillance Counter Measures (TSCM Bug Sweep) Surveys:
AEGIS Security Consultants deploy industry leading technology to conduct bug sweeps in support of government agencies, corporate and commercial organizations, and private individuals. Our analysis includes counter measures against traditional and state of the art eavesdropping and data skimming devices.
The final deliverable includes a color coded summary that easily defines in multiple categories the current standing of the facility, policies, procedures, and staff. The coding is implied based on the following:
GREEN – The current security framework is generally acceptable by industry standards such as: effective and proper use of security techniques, secure facilities/access control, effective use of technology and physical security improvements, and well defined security and emergency plans.
YELLOW – The current security framework has minor or elevated issues that could be detrimental to the limitation of liability, impede risk management, or affect contract stability. Examples may include: customer service issues, potential safety hazards, exploitable gaps in security operations, observational training deficiencies, improper use of equipment, and incomplete or deficient security plans.
RED – The current security framework has severe issues that could immediately affect liability, can be considered dangerous or negligent, or compromises safety or security of people or property. Examples may include: no formalized policies or procedures, no contingency planning, no or minimal training, excessive use of force, dereliction of duty, safety hazards, and clearly visible gaps in security operations.
Immediate value is benefited from a reduction in risk or liability, lost materials, excessive labor, maximizing efficiency and a possible reduction in general liability and workers compensation insurance premiums. Indirect value comes for preventing injury or property damage resulting from an incident that could be valued in the tens of millions of dollars.
Upon the conclusion, our firm is capable of facilitating additional processes required to complete the security program including sourcing, staffing, plan development, and managing improvements. Our cross functional analysis and end-to-end support differentiates from other firms by allowing us to manage the entire process from inception through full scale deployment and operation, all while supporting core business strategies of high ROI, open communication, and efficiency.
- High net worth individuals and their families
- Government entities foreign and domestic
- Corporate and satellite offices
- Public, private and charter elementary, middle and high schools, colleges and universities
- Property management and HOAs
- Hotels and resorts
- Shipping and distribution centers
- Religious institutions and places of worship including Jewish temples, churches and mosques
- Manufacturing plants
- Theaters, public events, shopping malls
- Law firms and attorneys
- Retail and wholesale businesses
- Venues, restaurants, clubs and lounges
- Individuals experiencing a threat
- Entertainment and production companies
- Soft services companies including landscaping, janitorial and maintenance