Security Assessments

Security risk assessment is the process of managing all assessments in terms of risk for staff, resources, systems, finance, operation and more. Our security risk assessments are broken down into the following:

  • Security Integrity Assessments: Managing all internal and client security integrity assessments
  • Security Risk Assessments: Managing all internal and client security risk assessments
  • Initial Orientation Assessments: Managing all internal and client initial orientation assessments
  • Technical Surveillance Countermeasures: Managing all venue and device debugging and sweeping
  • Security Awareness Training: Managing internal and client security awareness training and campaigns

Intelligence collection

Intelligence collection management is the process of managing and organizing the collection of intelligence/information from various sources. The collection department of an intelligence organization may attempt basic validation of what it collects and provide raw information that can be used as required.

Intelligence drives success, in any environment information is key to making well-informed decisions, at times the fog of war in the corporate environment makes it difficult for decision makers to stay informed of what is happening at ground level. Good access to relevant information is necessary when making difficult decisions.

GRC Org Sec has well trained operators that can infiltrate your business in order to get answers to all the questions that you might have as to what is really happening within your organisation

Vetting

Vetting is primarily the process of performing a background check on someone before offering them employment, conferring an award, etc. A prospective person or project may be vetted before making a hiring decision. Vetting is however a continuous process as people do change over time and their circumstances may change and have a negative impact on security, therefore post-employment screening is important. Profiling, an advanced activity of vetting, can be performed for high-level or sensitive positions being filled.

Vetting has the following resources at its disposal:

  • AFISWITCH
  • Fingerprint criminal record clearance checks 4-48 Hours
  • Support Centre
  • All other departments within organisational security

Information Support Centre

All databases that GRC has access to are based in one centralised support centre that act as the nerve centre of GRC Organisational Security. All info requests are dealt with in this department and electronic gathering of various required information in support of all other departments internally and in support of customers externally.

Corporate Investigations

An exploratory exercise to learn the truth about something complex or hidden occurring/occurred within the mandating organisation.

GRC Org Sec Investigations can be divided into various categories, namely: 

  • Criminal investigations (transgression of law)
  • Negligent acts
  • Disciplinary investigations
  • Irregular conduct

Technical surveillance countermeasures

Technical Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover surveillance, electronic eavesdropping devices, security hazards or security weaknesses.

Debugging/ Sweeping
Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver.

Education, Training & Social/ Employee Development

Educating and training individuals in security matters; internally (to own staff members) and externally (youth development programs and security awareness presentations to employee groups) is expedited by trained and experienced facilitators.

Internal

GRC employees are re-trained internally for the specific function they perform for the company ensuring a single standard which can be maintained uniformly in the organisation.

External 

GRC Consultants offer security awareness training to security staff, line staff and senior staff members and can be specifically developed to fit the audience by conducting a risk analysis and security survey when receiving a request to present awareness at client’s organisation.

Policies

GRC Org Sec is able to provide expert security policy writers that can provide a range of services including:

  • Formulation of Security Policies
  • Drafting of Standard Operating Procedures
  • Assessment of current policies to determine security compliance
  • Business Continuity Plans
  • Emergency Response Plans

Research & Development

Research and development projects are assigned for new technology, systems, processes and new integration possibilities of all imminent or planned advancements in market, product/service, technology, and processes in preparation of implementation and roll out into its respective GRC departments.

Current R&D Projects

  • Shock-proof cctv cameras to withstand explosive blasts.
  • Un-manned Automated Vehicles (Drone technology)
  • GRC Security technology application software.
  • GRC Security Risk Management Model
  • Training Methods and learning material

Want to find out more?