DRAGON Operational Security
EXPERTISE IN HIGH RISK ENVIROMENTS
The first step in security management in a violent environment is the consideration of two external realities: the nature and mission of our agency and the nature of our operating environment.
The nature of our agency and its particular mission in a region, country or part of a country will influence whether we enter a violent environment or stay in it, what types of programmes we may choose to implement, and probably what security strategies we will have a preference for. Next to that, we need to acquire a good understanding of the risks in our operating environment: what are the threats and what are our particular vulnerabilities
OUR OPERATIONAL SERVICES
DRAGON-OPSEC is well placed to provide a global solution for corporations who require occasional support or longer term solutions in several areas. We offer a broad range of services to support clients’ requirements.
Outsource Security and Crisis Manager Services
DRAGON-OPSEC can provide your organization with the senior leadership you need—whether full time, part time or on an as needed basis.
Our OpSec Services include:
- Situation Analysis
- Security Strategies & Armed Protection
- Threat Management
- Information & Communication Management
- Security Management and Security Plans
- Security Management and the Authorities
- Vehicle Safety and Travel Security
Executive Protection
DRAGON-OPSEC has more than twenty five years of successful corporate and field experience in both the private and public sectors. Demonstrated leaders with the ability to manage corporate security programs, protective operations, and public sectors.
The proper approach to executive protection has been, and always will be, preventive, proactive steps taken to reduce the likehood of attack. Proactive security can be defined as a security program designed to anticipate and avoid danger. Proactive security suggests a comprehensive approach involving protectee with proper security procedures, and a thorough emergency response/crisis management plan. An executive protection provider operates most effectively when he or she understands the risks facing their clients, prepare to reduce or avoid those risks, and have the ability to react properly while maintaining a comfort level suitable to their protectee.
We carry out:
- Project & Vendor Management
- Risk & Vulnerability Assessments
- Presentations & Public Speaking
- Security Inspections & Investigations
- Crisis Management & Planning
- Recruiting / Training / Development
- Executive Protection
- Emergency Preparedness
- Data Collection & Analysis
Meet & Greet Services
Foreign business travelers and their families arriving in an unfamiliar country present an attractive target for unscrupulous criminals, who often target personnel as they arrive at the airport. With the DRAGON-OPSEC “Meet & Greet” service, we can provide experienced consultants that can meet you or your company staff at the airport, and provide safe transportation to their destination.
If the level of threat requires it, DRAGON-OPSEC Land Services can also assist by offering executive protection services and journey management.
Key Services include:
- Secure Transportation
- Airport Meet & Greet Service
- Pre- Journey Management & Risk Assessment
- In-country (in situ) Intelligence
- Route & Venue Reconnaissance
- Safety assessments, control and lifestyle assessment
Security Reviews, Audit & lifestyle evaluation
Security reviews and audits are vital to security risk management. Reviews help decide what resources are needed, while audits are critical to the quality assurance process that strengthens implementation of the overall security management process. DRAGON-OPSEC offers its clients two key advantages in this area: we use proven risk mitigation methodologies and our staff understands that our services must be tailored to the specific security context.
Security reviews assess your existing security infrastructure, policies & procedures. They identify gaps and make recommendations so that each of the client’s security solutions can best mitigate risks associated with its individually identifiable threats. Security audits ensure that policies and procedures are implemented correctly. Both activities should be supported by a security risk assessment to help maintain a balanced approach to security risk management.