Our Method

Our method gives you a fully integrated security and risk management structure across all three levels of operation. From head office, to field and theatre.

 Research

Identifying pressing needs and overhanging threats by understanding existing procedures, culture, key players, and red flags in every level of the organisation.

SECURITY STRUCTURE

Establishing an improved security structure that builds upon your existing structure. Tightening gaps, minimising vulnerabilities, repairing communication lines.

Routines

Integrating security measures across the organisation by enhancing information loops, decision tracks, communication maps and appropriate training.

Analyze

Constantly using stress-testing, monitoring and feedback loops that helps you implement constant improvements and enabling even better decisions.

Our method focuses on two main goals:

Keeping employees safe

A failure to adequately anticipate and plan for a serious incident can have catastrophic consequences for employees’ health and wellbeing. We work hard to provide the best security environment possible in any given situation, reducing the risk that they will be injured or kidnapped while working in the field.

Securing your responsibility

As an employer you have a clear legal duty of care. By providing an integrated security and risk management system you lay the groundwork for a positive outcome in the event of a serious incident. Documenting that you have anticipated and planned for this can prevent lawsuits, damage to client property and reputational damage which can result in loss of donor income.

Every organisation is different

To establish an advanced security structure we tailor our services to operations both on the ground and at a managerial level. Here are what we typically would assess:

Headquarters
  • Identifying needs
  • Identifying threats
  • Existing security structure
  • Communcation maps
  • Information loops
  • Maintenance procedures
Field
  • Identifying needs
  • Understanding grassroots
  • Identifying key players
  • Identifying red flags
  • Relevant training
Theatre
  • Identifying needs
  • Identifying threats
  • Existing security structure
  • Communcation maps
  • Information loops
  • Maintenance procedures

How we work

 

Since every client is different, you get an expert that works in and alongside your organisation in order to build a detailed risk response and exposure profile.

Download our free case study to understand how we assess security structures.

Keep operations running

 

Don´t let flawed security structures limit your ability to operate in challenging environments.

 

contact