Traditional and Cyber Security - Assessment and Policy Development
We conduct traditional and cyber security assessments for organisations and events including:
Traditional Access Management & Workplace Security
- Systems
- Policy
- Procedures
Cyber Security Assessments
- Identity Access Management (IAM)
- On-Site, Off-Site and Remote Working
- Onboarding and Exiting the Organisation
- IT Usage Security Policy
We Provide Consultancy Services to Clients in the Technology and Biometric Data Environments of:
- Artificial Intelligence (AI)
- Facial Recognition
- Crowd and Vehicle Monitoring and Counting
- Radio Frequency Identification
- Drones and Anti-Drone Technology
- Video Analysis Systems
- Video Synopsis
- Automated surveillance systems
- Thermal Imaging and Low Light Cameras
- High Resolution Imaging Satellite Technology
- Public Transport Efficiency Apps
- Personal Data Collection, Retention and Destruction


We Provide Consultancy Service to help you Address Your Cybersecurity Needs
- Adopting an appropriately long lead-in time.
- Ensuring collaboration in both research and response.
- Gaining international support early to secure CERT & CSIRT support.
- Establishing clear roles and responsibilities among stakeholders.
- Commissioning a government led cyber security risk assessment.
We Assist you with Stakeholder Interoperability Challenges
- Unified Command Centre
- Roles and Responsibilities
- Stakeholder Collaboration
- Joint Operational Learning
- Communication
- Integrated Security
- Emergency Procedures
- Training and Exercising


We Provide Consultancy Services on Planning and Legislation associated with Major Events:
- Planning Timeline and Approach
- Role of National Government
- Role of Local Authorities
- Role of the Police
- Stadium Safety and Security Design, Licensing and Certification
- International Cooperation
- Illegal Sports Betting
- Intellectual Property and Commercial rights protection
- Video Surveillance Systems
- Flight Restrictions
- Sale and Consumption of Alcohol