• SightSpan Security International
    • Threat Management

      The security of any company or of individuals and their families depends on the thoroughness of a Threat Assessment. It is the services of a security risk
      management consultant company that can make the difference when conducting an assessment, to include an in-depth review of all business and family
      activities, regional, political and religious risks, movement and logistics arrangements. SightSpan Security will continuously monitor identified risks and
      threats and implement corrective or preventative measures to on-going plans as deemed necessary to counter identified changes and challenges.

      CRISIS RESPONSE PLANNING

      Within the context of the threat assessment, be it that of an organization, individual(s) including that of their families, our company will plan for
      unfavorable conditions, and take steps to pre-empt those conditions arising, or to have in place effective contingency procedures to minimize
      their risk impact.

      This will include the extraction and safe passage to safe havens. Medical extractions and the important need of informing all registered
      people who need to know the status of individuals during and after their extraction where possible.

      CRISIS PLAN REVIEW AND AUDIT

      Once a Crisis Response Plan is defined and implemented organizations often believe that no further efforts are required. However,
      as your organization changes and as time passes, it is crucial to periodically have your plan reviewed in order to make any updates
      or adjustments that will align to the new organizational structure.

      SightSpan Security will review your organization’s Mitigation and Prevention controls, level of Preparedness, Response measures
      and Recovery program.

      After a thorough review, recommendations will be made that will assist your organization ensure that all aspects of your crisis plan are both
      sound and realistic.

  • SightSpan Security International
    • Physical Security

      Without reasonable physical security measures being in place, all other methods of combating risks presented by terrorism, criminals and other anti-social
      groups or individuals will be seriously undermined. Crime Prevention through Environmental design is a strategy based upon the ability to reduce the level
      of crime by proper design and effective use of a built environment. Physical security recommendations should also consider the aspects of the environment
      that are capable of causing major disruption.

      Personal

      Individuals exposed to a high degree of risk require a high degree of protection. SightSpan Security provides personal protection and security services
      that keep people safe from the threats of danger that come along with high profiles. Our security professionals protect high profile individuals,
      political figures, foreign dignitaries, corporate executives and other elevated-risk individuals with the highest levels of experience and security expertise.

      Prevention through awareness is key. Not only must security professionals respond quickly and effectively in emergency situations, but they must
      also have the awareness and communication skills to identify suspicious activity and prevent threatening incidents from occurring. SightSpan Security
      has the experience and expertise required to fully assess situations and plan efficient security strategies on the spot, and our security team works closely
      with law enforcement and clients to provide personal protective services that keep people safe in any environment. By maintaining a low profile in
      combination with high awareness, our security professionals allow our clients to go about their daily activities knowing they are in safe situations.

      Facilities

      The safety and security of your facilities directly impacts your daily operations. Assessing, Staffing and supporting the right security posture to minimize
      risk is vital to the success of your company.

      • On-site Security Staffing
      • Technical Surveillance
      • Audio/Video Security System Design
      • Installation Audio/Video Security Monitoring and Incident Reporting

  • SightSpan Security International
    • Counter-Espionage

      Corporate defensive measures have become increasingly necessary in today’s highly competitive markets. Following a thorough Risk Analysis,
      our company will advise clients on potential weaknesses within their organization and on any preventive measures necessary to safeguard the
      integrity of new ideas or products.This may include electronic screening of premises, with specific emphasis on information hubs, board
      and conference rooms, research laboratories and design facilities. The methods used as counter defenses will be within the laws of privacy of
      the countries in which these measures are implemented and the information gathered will be treated as confidential.

  • SightSpan Security International
    • Training

      Hands on training is part of the implementation of the security design and every risk analysis will have recommendations of key person training
      to up hold the standard emergency procedures. This will ensure that prompt action is taken and nothing is left to guess work, making sure everything
      possible is done to minimize loss and manage risk. A few of the primary training courses offered are:

      • EXPLOSIVE ORDINANCE DEVICE TRAINING COURSE
      • SPECIAL WEAPONS AND TACTICS (SWAT) TRAINING COURSE
      • HOSTAGE NEGOTIATION TRAINING COURSE
      • TERRORIST RISK MANAGEMENT TRAINING COURSE
      • EMERGENCY INCIDENT RESPONSE TRAINING

  • SightSpan Security International
    • Enhanced Due Diligence

      Information is the key to any decision making process and at times required by local and international regulations to help identify and prevent illicit
      money movement and terrorist activities.

      • HIGH RISK CLIENT REVIEW
      • BENEFICIAL OWNER INVESTIGATIONS
      • BEHAVIOR PATTERN IDENTIFICATION AND BASELINE SETTING, BASED ON ENTITIY TYPE, RISK LEVLS AND LOCATIONS
      • CLIENT IDENTIFICATION PROCESS (CIP)
      • KNOW YOUR CLIENT (KYC) PROCESSES
      • BOARD INVESTIGATIONS
      • ON DEMAND SUPPORT FOR INFORMATION GATHERING, POLICY AUDITS AND INCIDENT ANALYSIS VETTING POTENTIAL DIRECTORS
      • PREVIOUS EMPLOYMENT HISTORY, CRIME REPORTS, NEGATIVE NEWS, AND VALIDATION OF PRIVATE AND PUBLIC INFORMATION
      • CORPORATE INVESTIGATIONS FOR MERGER AND ACQUSITIONS
      • PROVIDING DECISION CRITICAL INFORMATION, PERFORM OUTCOME-BASED ANALYSIS WITH EMOTION FEE , EXPERIENCED INPUT
      • SURVEILLANCE
      • OPEN SOURCE/SOCIAL MEDIA INVESTIGATIONS, CORPORATE COMMUNICATION SURVEILLANCE

  • SightSpan Security International
    • Employment Screening

      Employees are a representation of your company and throughout the hiring process are vetted for competency, experience and suitability to support and
      expand your brand. In a global marketplace third party screening of potential employees becomes a necessary investment in the vetting process to ensure
      the information presented by a candidate is accurate and complete.

      • PREVIOUS EMPLOYMENT HISTORY RESEARCH
      • DOCUMENT VALIDATION
      • NEGATIVE NEWS AND GOVERNMENT SANCTIONS CHECKING
      • SOCIAL MEDIA AND PUBLIC INFORMATION INVESTIGATIONS

  • SightSpan Security International
    • Vulnerability Assessment

      All facilities face a certain level of risk associated with various threats. These threats may be the result of natural events, accidents, or intentional acts
      to cause harm. Regardless of the nature of the threat, facility owners have a responsibility to limit or manage risks from these threats to the extent possible.

      The first step in a risk management program is to complete a threat/vulnerability assessment (TVA). A TVA assessment considers the full spectrum of threats
      (i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location/organization. A SightSpan Security TVA will examine supporting information to
      evaluate the likelihood of occurrence for each threat. For terrorist threats, the attractiveness of the facility as a target is a primary consideration.
      In addition, the type of terrorist act may vary based on the potential adversary and the method of attack most likely to be successful for a given scenario.

      Once the credible threats are identified, a vulnerability assessment will be performed. The SightSpan Security vulnerability assessment considers the potential impact of loss from a successful attack as well as the vulnerability of the facility/location to an attack. A combination of the impact of loss rating and the vulnerability rating is then used to evaluate the potential risk to the facility from a given threat. Based on the findings from the risk analysis, SightSpan Security executives will then identify countermeasure upgrades that will lower the various levels of risk to you and your organization and assist with the management of the program based on the TRA.

       

  • SightSpan Security International
    • Opensource Intelligence

      SightSpan Security utilizes OSINT, which is a form of intelligence collection management that involves finding, selecting, and acquiring information from
      publicly available sources and analyzing it to produce actionable intelligence. In the intelligence community (IC), the term “open” refers to overt, publicly
      available sources (as opposed to covert or classified sources); it is not related to open-source software or public intelligence.