In recent years, targeted attacks have been enforced on many entities, both private and public. The ability of the individual to harm human life or cause critical damage to infrastructure has become increasingly easy and common.
It is now evident that proper preparation, premature and professional, creates an integrated protective strip similar to a sophisticated lock for a routine burglar. While it seems the attacking and defending sides will continue to wage war on each other, once the system makes sure it is professionally one step ahead, it’s more likely to avoid casualties.
- Threat and Risk Assessment
- Development of a Security Concept of Operation (CONOP)
- Development of a site-based Security Operational Procedure (SOP)
- On-site Staff support – security manager placement
- Information security management
- VIP protection
- Security engineering
- Development of a Security Concept of Technology (CONTHEC)
- Plan, establish and supervise technological security systems designed to facilitate and maintain the required security level
- Plan, establish and supervise security control rooms
- Intelligence and credibility
- Business credibility check
- Employee Vetting – Background check
- Technical Surveillance Countermeasures (TSCM)
- Investigations
- Red teams
- Professional training