The Threat of Violence in the Public Arena has changed so rapidly that aggressive and innovative Vulnerability Assessments must be taken. We protect Schools, Government Facilities, Public and Private buildings and complexes, and Events. These New Challenges can be countered with a Non-Lethal approach focusing on Prevention, Preparedness, Response, and Recovery by:
• Reducing the ability for unauthorized individuals to Enter Facilities and Structures and Events.
• Training personal on actions when Unauthorized Individuals or an Active Shooter compromises Infrastructure Facilities and Events.
• Implementing formal plans to bridge the Gap between Personnel in a crises and First Responders to reduce chaos in a crises.
Vulnerability Assessments Validation
Phantom Services Vulnerability Assessments capability has been validated with the Department of Defense and U.S. State Department. These assessments are structured in the same manner as assessments completed in High Treat Critical for U.S. Embassies, Consulates, and Sensitive Areas/Events abroad.
The “Keys” coming out of Vulnerability Assessments are the integration of Technical and Personal Security, Communications, and Actions within a Crisis. Technical Security involves identifying gaps in the Electronic Security and Implementing strategies to reduce the risk of technical failure, Insider Threat, and/or Hacking.
The increase in mobile devices (i.e. smart phones and tablets), cloud base services, and mobile apps has created the greater demand for Technical Security professionals. Individuals and Businesses can be severally damaged if their systems are breached. The damage can happen in the loss of valuable data and also the impact upon their reputation.
Mobile devices such as smart phones and tablets are at a higher risk of exposure than desktop and laptop computers. The rapid change and growth within this area means that risk management plans required constant review, implantation, and regulation. Increased threats are due to:
• No physical security controls
• Using untrusted devices and networks
• Apps from unknown parties
• Using untrusted content
• Interaction with unknown systems and location services
Actions within a Crisis planning introduces methods for identifying and assessing threats and vulnerabilities that require a crisis management and emergency response from the individual to the organization level.
Phantom Services develops a standard methodology for organizing, drafting and implementing. We use crisis preparedness training and emergency action plans, along with related procedures. These designate how individuals and/or response teams will respond and document actions related to specific incidents. These emergency action plans detail the decision authorities, identifying an Incident manager and designated back-up, specific protocols for dealing with scenarios most likely to occur in crisis situations. They detail protocols to coordination with security and recovery elements, and notification/communication methods. These emergency action plans are provided in coordination with the client’s representatives.