Helpful Security Consulting Services in Seattle

Security Consulting Services in Seattle | Premier Risk SolutionsIs your company designing a new security program or attempting to retrofit an existing system to a new facility in Seattle? Seeking security consulting services may be the best course of action. A private security service company will be able to help achieve all your goals, no matter how big or complicated. They can also supplement your in-house team in many ways. Consider some of the most common ways consulting services can help.

Site Selection

Security consulting services include site selection assistance for expanding or transitioning companies. To ensure the success of your corporate security program right out of the gate, it’s important to include the security department in the planning process.Read More

Top 11 Event Safety Practices for Reopening

reopening safelyAs the United States continues to plan for its reopening post the COVID-19 pandemic crisis of early 2020, events of all scales and sizes from the small gathering of a handful of people to larger stadium-sized gatherings of thousands of people are a big part of the US economy.  Data sourced from the Events Industry Council in their 2016 US economic significance study indicated there were 5.9m jobs with $249b of labor income generated from them, $104b of taxes at all levels and $446b towards US gross domestic product.  Since the 2020 study is not yet available, 2016 was the most recent to review these statistics. … Read More

How to RedTeam Test to Address Security Flaws

Red Team testing, or otherwise known as physical security penetration testing (pen test), occurs more often than is typically discussed amongst perhaps more sexy topics in the security industry like Executive Protection, Workplace Violence Prevention, or Event Security.  However, the benefits learned if the red-teaming is done well can help solidify the very essential elements of a good security program.

Having administered in the proximity of 200+ pen tests over the course of the last half dozen years approximately I can say that no two tests often happen to be the same.  Varying up days of the week and times of the day that tests are conducted will help ascertain the most robust, holistic information regarding a security program. … Read More

The Value of Value Proposition for Security

Building a business case for security can often be a daunting task, presenting multiple challenges.  Now there’s a solution, one that works and makes good business sense.  It’s defining the real and measurable value your security business brings to any organization.  We’ll discuss how to calculate the real value Corporate Security brings to an organization.  It’s called Value Proposition, and it works.

The realization that the sum total of all our efforts was not producing the results we needed led us to look at applying proven business skills to Corporate Security. We asked ourselves about the basic business function of Security, that we couldn’t do today’s job with yesterday’s methods, and expect to be successful in the future.… Read More

We Cannot Forget the Importance of Operational Security

Being able to share information instantly with just a push of a button, the click on the keyboard, or in casual conversation, it’s easy to forget the importance of maintaining operational security for an EP assignment. Often, critical data is transmitted and shared throughout the assignment. Sometimes seemingly innocent factors such as particular Internet connections and casual conversation can be a hindrance and even potentially, a direct threat.

The five steps of operational security include determining the scope of critical information, developing threats, identifying weaknesses, calculating risks and ultimately implementing countermeasures. As professionals, when we address each of these areas there are multiple opportunities to make a mistake and reveal something that could be detrimental to the integrity of the assignment.… Read More

DOES YOUR ORGANIZATION NEED A SECURITY OPERATIONS CENTER (SOC) or a Global Operations Center (GSOC) ?

Whether your business is global or local, at some point real-time security information and operations will be vital to the continuity of your business. Some larger companies have created a Global Security Operations Center (GSOC) that may also include regional centers. Other firms create a Security Operations Center (SOC) that helps manage security and resources within a single state or region. For this article we will use the term SOC for simplicity, as not all companies are global in footprint.

This article will provide some insight into some of the considerations our clients have wrestled with, the GSOC/SOC benefits they seek, and some steps we use to design a SOC.… Read More

FSMA Intentional Adulteration Final Rule – US FDA Mitigation Strategies Update

This week afforded us another excellent installment of the webinar series with US Food and Drug Administration (FDA) experts. A further discuss of the Intentional Adulteration (IA) Rule was very informative. The focus of this call was Mitigation Strategies.

I thought I would highlight some important take-aways that I made note of and that may assist my Food Defense colleagues out there who missed this call.

  1. The FDA outlined several Key Terms with very specific meanings in the IA world worth noting:
    1. Vulnerability – The susceptibility of a point, step or procedure in a facility’s food process to IA.
    2. Significant Vulnerability (SV) – A vulnerability that, if exploited, could reasonably be expected to cause wide scale public health harm.
Read More

Security Changes on the Las Vegas Strip – FOX 5 Interview

Last week I interviewed with FOX5 in Las Vegas and was asked about changes in security on the Vegas Strip. The interview lasted quite a bit longer, but for the segment, they took a few soundbites and the story came out well. My colleague, Evan Levitt, advised that since 9/11, many of the casinos have already been doing quite a bit behind the scenes in working with The Fusion Center and Law Enforcement to identify and interview individuals who may cause concern. Another local colleague, Rich Diaz, has eight bomb dogs currently covering several of the major casinos and event centers.… Read More

Are You Impacted By KRACK?

If you use WiFi, most likely you are vulnerable to KRACK. Cyber Security exerts have found a major vulnerability with the most common security protocol used by those setting up WiFi networks at homes, cafes and more – WPA-2.

Key Reinstallation AttaCK (KRACK) allows hackers to steal and possibly disrupt your data flows. They not only can steal your sensitive data, but they can also inject ransomware or destructive code.

While updating your router’s firmware and ensuring all of your applications are updated on all devices will help, you need to think seriously beyond that.

Examine tools that offer two-factor authentication for email programs, data communications and more.… Read More

Workplace Violence – Are Your Canadian Operations Complying with the Law?

As many of our clients are discovering, offices and a host of other workplaces in the Province of Ontario, Canada are presenting them with new legal obligations to protect their employees from Workplace Violence and Harassment. The Ontario Ministry of Labour Health and Safety inspectors enforce the Occupational Health and Safety Act. This Act is to facilitate a strong Internal Responsibility System (IRS) in your workplace.

Most immediately, companies with operations in Ontario, Canada need to be aware of these requirements:

  1. An employer MUST assess the risk of workplace violence and present a full plan to the joint health and safety committee or to a health and safety representative [OHSA s.
Read More