www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services



Similar documents
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Legislative Language

SYRACUSE CITY SCHOOL DISTRICT

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Case Study: Smart Phone Deleted Data Recovery

Information Security Program Management Standard

Case Study: Hiring a licensed Security Provider

LaSorsa & Associates

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

Introduction. Industry Changes

Leveraging Network Infrastructure to Bring Critical Information to Users

Surveillance and Security Systems

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

National Cyber Security Policy -2013

Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

CYBER SECURITY Audit, Test & Compliance

PHYSICAL SECURITY. A Primer and a Story of Why it s Necessary

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

DATA BREACH COVERAGE

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Corporate Spying An Overview

Security Measures at Toronto Public Library

Physical Security Services

EMC INFORMATION INFRASTRUCTURE SOLUTIONS FOR THE PUBLIC SECTOR. Delivering constituent value through government innovation

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Security Solutions for HIPAA Compliance

El Camino College Homeland Security Spring 2016 Courses

CYBER SECURITY GUIDANCE

Comprehensive Emergency Management Education

CISM Certified Information Security Manager

In an age where so many businesses and systems are reliant on computer systems,

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

ISO Controls and Objectives

Executive Protection Training Program

Lessons from Defending Cyberspace

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

Science/Safeguards and Security. Funding Profile by Subprogram

Stay ahead of insiderthreats with predictive,intelligent security

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

HIPAA Security. assistance with implementation of the. security standards. This series aims to

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

CCTV Surveillance: Business Security & Video Best Practices

The remote CCTV monitoring specialists CCTV Monitoring

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

How To Solve A Violent Home Invasion With A United Force

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Contra Costa Community College District Business Procedure SECURITY CAMERA OPERATING PROCEDURE

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

Court Security Guidelines

G4S Secure Solutions for Hospitals and Healthcare Facilities

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Security Systems Surveillance Policy

Organizational Security Track FAQ

A Risk Assessment Methodology (RAM) for Physical Security

The Impact of HIPAA and HITECH

Intelligence expertise and psychological insights to help Governments and Corporate Clients identify and manage risk. Company

Physical Security Reliability Standard Implementation

U.S. DoD Physical Security Market

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Establishing a State Cyber Crimes Unit White Paper

e-discovery Forensics Incident Response

How To Defend Yourself Against Cyber Attacks

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Guidance on data security breach management

Law Enforcement Consolidation Task Force INVESTIGATIONS TEAM REPORT

SECTION 15 INFORMATION TECHNOLOGY

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Homeland Security for Schools: Threat Status Alert Worksheet

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Employee ID Theft Resource Guide

Mitigating and managing cyber risk: ten issues to consider

Cyber Security solutions

Transcription:

www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services

Setting the Standard in Risk Management Consulting and Investigation Services AN INTRODUCTION Lions Gate Risk Management Group (LGRMG) is a client focused, full service firm that provides a range of investigation, intelligence, security and protection services. Our team consists of law enforcement, military and security industry specialists who have the knowledge, skills and experience to provide our clients with a superior level of service and expertise. Our objective is to identify, assess and prioritize your risks and vulnerabilities, and to respond with a coordinated and economical application of resources. Our team will create and implement mitigation strategies to prevent a negative event or control the impact that it could have on your business. Lions Gate Risk Management Group. Empowering clients today - for a more secure tomorrow.

SECURITY PROGRAM DEVELOPMENT & INTEGRATION OF SECURITY SERVICES Corporate executives are seeking effective techniques and approaches to deliver and manage their corporate security requirements. We are committed to the design and implementation of effective, coordinated and economical security programs that focus on detection, deterrence, delay and response to security breach events. The integration of all the necessary elements of your security posture are considered during the consultation, assessment and implementation process. SECURITY PROJECT MANAGEMENT Corporations face different levels of risk and must implement programs to manage the fluctuations of those risks. Security management can be accomplished by incorporating security guidance and best practices into their program, or by reacting to failures after the fact. Many clients do not have a centralized or even an effectively coordinated response to security. High risk, off-site or special projects can present unique challenges and risks. Projects of this nature can benefit from a dedicated security and response plan. SECURITY SYSTEM DESIGN Our security consultants will work with architects at the design stage to develop complete security systems for new construction projects or we can recommend enhancements of existing systems or replacement systems. We have the knowledge and experience to make a valuable contribution to the design and implementation process for any project.

THREAT RISK ASSESSMENTS A threat assessment is an examination process that considers the full spectrum of threats... natural, criminal, terrorist, accidental and internal for a specific facility or location. We will identify the risk areas and vulnerabilities of your operation and infrastructure, then make reasonable, cost effective recommendations for countermeasures and upgrades that will reduce or lessen the impact of a negative event. CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED) ASSESSMENTS A CPTED assessment is a multi-disciplinary approach to deterring criminal behaviour through environmental design. This process focuses on making design decisions around the areas that you live and work to deter criminals from committing crimes in and around your building. This is about safety...feeling safe and living safe.

SECURITY INTELLIGENCE A service dedicated to collecting, analyzing, reporting and disseminating intelligence on threats that could negatively impact your business. We monitor your industry sector, your business and outside influences to keep you informed of security risks that could impact your operations and reputation. This information is used to set the operational requirements for your corporate security posture. INVESTIGATIONS Our investigators are professionally trained and experienced collectors of facts and information. They have acquired this through many years of practical experience with law enforcement and military agencies. We provide leading edge investigation services that are tailored specifically to the needs of our client and the requirements of the assignment. Our investigators have experience with a wide range of investigative techniques and methodologies. We will recommend an approach that is appropriately suited to the situation.

IT NETWORKS SECURITY ASSESSMENT Information may be the most important asset that a corporation owns. Protecting it from unauthorized access, misuse, modification, theft and loss is of paramount importance. Our IT specialists can test, design and implement fraud prevention, risk mitigation and policy and procedural protocols to protect corporate information. ELECTRONIC COUNTERMEASURES (ECM) ECM refers to a defensive process that is deployed by our specialists to detect and locate electronic devices or signals that are designed to intercept or steal information from corporate facilities. Our specialists deploy portable equipment that sweeps for bugs to protect against the theft of corporate intellectual property. COMPUTER & CELL PHONE FORENSIC ANALYSIS Our experts will examine all forms of digital media using forensically approved software and procedures. Our objective is to identify, preserve, recover and analyze all system data and then present that information in a factual, professional manner. We have the ability to recover deleted information including documents, emails, texts and photos from desktops, laptops, tablets and a wide range of handheld phones and devices.

SURVEILLANCE Refers to the physical or electronic monitoring of behaviour and activities for the purpose of collecting intelligence or evidence. Surveillance can be deployed to collect information to support business decisions or for the protection of physical and human assets. Our operators are trained and experienced working in urban, rural and electronic environments. COVERT OPERATIONS Refers to investigative techniques and methodologies focused on the collection of information and evidence through the use of covert identities, personas and infiltration strategies. The objective is to gain the trust of a targeted individual or organization through relationship building exercises. The undercover operator acquires the relevant information via newly established relationships, employment, social interactions and access to systems and protocols that are benefits of the new persona or position.

EXECUTIVE PROTECTION Refers to security measures that can be applied to protect persons who are exposed to elevated levels of risk. Our style of personal protection is based on the collection of intelligence, operational planning and the seamless integration of our service into the clients daily operating protocol. We reserve the right to identify security concerns and recommend adjustments to the clients routines and schedules as required. Our personal protection specialists and security drivers are law enforcement trained and experienced. BEHAVIOURAL THREAT ASSESSMENT (TA) Refers to the process of collecting information about a threatener and the threatening situation; assessing threatening communications or behaviour; and determining the potential of someone to act out violently. Equally important elements in the process include the development of risk mitigation strategies, intervention strategies, communication to and education of corporate decision makers and monitoring of the situation to ensure the safety of the targeted employee(s). BEHAVIOURAL ANALYSIS Involves the application of assessment, analysis and investigative methodologies focused at understanding and interpreting violent or deviant behaviour. The behaviour based approach to our analysis applies real case experience, research and training to complex and sensitive situations. The failure to examine, understand and properly manage inappropriate or violent behaviour could impact the safety and security of a corporate environment and the people who work within it.

GUARD SERVICE Our security personnel, both uniform and plain clothes officers, are selected for their ability to work in diverse environments while maintaining a high level of service for our clients. We focus on our dual responsibility of protecting our clients assets and on representing our client in a very positive and professional way during interactions with the public. We maintain a high visibility presence to deter illegal activity and unauthorized access to our clients facilities. K9 SERVICES Our commitment to our canine division is evident in the way we conduct our business. We offer patrol, narcotics and explosives detection services. All of our K9 teams are professionally trained and have been examined and certified by the Justice Institute of British Columbia canine certification program. Our canines always work on leash to maximize the handler s control over his dog. To promote accountability, our handlers wear an audio and video recording device that captures all interactions with the public or perpetrators who have illegally accessed our clients secured facilities. We promote a highly visible, but controlled deterrent to protect our clients assets.

MARINE SECURITY PATROL For companies that have waterside access, operations and security vulnerabilities, a marine patrol capacity can mitigate some of the risk you are exposed to from the water. Our marine patrol is a contributing element in the overall security envelope that we can engage for high risk clients. Our operators are properly licensed and trained boat operators and private investigators / security officers pursuant to provincial and federal legislation. Operators have the following training and applicable licensing: Small Vessel Operator Proficiency (SVOP), Small Non-Pleasure Vessel Basic Safety (Med A3) Restricted Operator Certificate (Mar itime) with DSC Endorsement (ROC(M) DSC) for operating a VHF radio. Private Investigator Security Guard

BUSINESS RESILIENCY & EMERGENCY PLANNING Business continuity is transitioning to business resilience. The elements of availability, recovery, security and compliance processes and techniques have merged and must be managed concurrently to create an infrastructure that can sustain true business resiliency. To survive a serious event, businesses must dedicate themselves to the development of procedures to restore normal operations following a disaster with maximum speed and minimal impact on operations. HEALTH, SAFETY & EMERGENCY SERVICES We work with our clients to promote and manage workplace safety by reducing workplace risks and injuries. We will assess existing health and safety programs, suggest enhancements, or develop an effective and synchronized health, safety and emergency service for your company.

INTRODUCTION SECURITY PROGRAM DEVELOPMENT & INTEGRATION OF SECURITY SERVICES SECURITY PROJECT MANAGEMENT SECURITY SYSTEM DESIGN THREAT RISK ASSESSMENTS CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED) ASSESSMENTS SECURITY INTELLIGENCE INVESTIGATIONS IT NETWORKS SECURITY ASSESSMENT ELECTRONIC COUNTERMEASURES (ECM) COMPUTER & CELL PHONE FORENSIC ANALYSIS SURVEILLANCE COVERT OPERATIONS EXECUTIVE PROTECTION BEHAVIOURAL THREAT ASSESSMENT (TA) BEHAVIOURAL ANALYSIS GUARD SERVICE K9 SERVICE MARINE SECURITY PATROL BUSINESS RESILIENCY & EMERGENCY PLANNING HEALTH, SAFETY & EMERGENCY SERVICES phone: info@lgrmg.ca toll free: 604 383 0020 www.lgrmg.ca 888 212 2026