Our services are listed in bullet points on this page, grouped into these three categories:
- Security Leadership and Management (Strengthening the security function and its business alignment, as well as your own position as a security leader and manager or executive.)
- Technology Command (Ensuring electronic security systems meet operational needs, and that your technology infrastructure serves you well and not the other way around.)
- Security Operational Excellence (Measures and metrics for staff performance and security effectiveness, plus service delivery model implementation)
Security Leadership and Management
Organizational Resilience
Resilience is the ability of an organization to anticipate, respond and adapt to change and sudden disruption.
This is not something that you “add on” to your organization. It is a set of capabilities that you build into it.
- Strategic Risk Assessment
- Threat and Business Impact Analysis
- Resilience Capabilities Audit
- Readiness Assessments
- Extreme Security Threat Preparedness
- Emergency & Crisis Response Planning
- Command & Control Center Functional Design
Security Master Planning
Vision, Strategy, and Implementation Planning for Compliance and Risk-Related Security Program Elements
- National, regional or local level planning
- Security management system implementation
- Security technology planning
- Departmental Skills and Knowledge needs assessment
- Personnel planning
- M&A-related Security program transition/integration
Security Assessments
Assessments form the basis for much of security management and planning. Here are the most popular types of assessments we perform or help clients perform themselves.
- Facility Physical Security Risk Assessment Services – “All Hazards” or Special Scope
- Review of your self-directed assessment work product
- Guidance and daily support for internally-resourced assessments
- Assessments performed by RBCS
- Hybrid internal/external assessment execution
- Physical Security for Critical IT Assets
- School, College and University Campus Security Assessments
- Video Surveillance Quality and Objectives Audit
- Electronic Security Systems Strengths and Weaknesses Audit
- Time-to-Target Facility Access Control Assessment
- C-TPAT Compliance Assessment and Planning
- NERC CIP-014-1 Third Party Evaluation and Security Plan Reviews
- Security department third party review and evaluation
Other Assessments
- Insider Threat Mitigation Assessment
- Workplace Violence Threat Assessment
- Proprietary Information Risk Assessment
- Board Level Risk Concerns Assessment
- Micro-Assessments for Decision & Planning Support
Security Branding, Communications and Messaging
Establishing and communicating Security’s role in the business
- Internal “branding” for the security function
- Security stakeholder communications plan
- Assistance with briefings and reports
Rate Your Security Program
Gain more insight from a business perspective
- Scope and Authority
- Manageability and Maturity Model Rating
- Business Alignment
- Relationships and Allies
- Security Stakeholder (and Decision Maker) Involvement
Technology Command
Back to TopGetting your security systems to do what you need them to do
- Security Technology Investment Strategic Planning
- Sensibly Apply IT Practices Including Governance
- Data & Practice Governance
- Cybersecurity Framework
- Automated Infrastructure Management Capabilities
- Device and System Uptime Performance Metrics
- System and Device Lifecycle Management
- Continuous Improvement (for risk and business change)
- Future-Ready System Design Elements
- Hardening (Cyber-Securing) Electronic Physical Security Systems
- Existing Security Technology Evaluation
- Vendor Proposal Evaluations
- RFP and RFQ Review
- Security Operations Center (SOC) Planning and Implementation
Operational Excellence
Back to Top- Implementing Effective Measures and Metrics
- Establishing Security’s service delivery model (also applies to EHS and compliance functions)