Implementation & Protocols

Once thorough due diligence and a threat assessment have been conducted, the following step is a comprehensive consultation with the client regarding the findings thereof, which can then result in the development and implementation of security protocols which focus on maximum security with minimal footprint, and also transparency for the client.  S.I.S.S. believes that information is the key to all aspects of protection, whether of a client’s person, or business or reputation, and that client involvement and awareness is essential at all times.  Armed with a thorough threat assessment, guided by consultation, and with a cooperative mind toward a best practices security protocol, the client and S.I.S.S. can then turn to the company’s deep and global service set and human resources for implementation.

For high profile clients, be they individuals or corporations, acts of violence aren’t the only risk to be faced. Stalking and harassment are just as common, and in the modern online world, ever more prevalent. The risk of extortion, whether based on financial status or public image, is also greater than ever. S.I.S.S. understands these risks, and with a thorough threat assessment, is able to develop a client-specific strategic security plan designed not only to curtail potential behavior by wrongdoers, but also to minimize any physical, financial or emotional impact such behavior may have for the client and/or the client’s business.

Although S.I.S.S. and its personnel are constantly prepared to manage any crisis situation, the goal is first and foremost to avoid that crisis and prevent it from even occurring. In a world where “perception is reality,” the goal is the provision of security with as little footprint as possible, and the ability to provide high security for the client with a low-profile presence, ideally without that presence ever having to be felt. Threat assessment is the first essential step in this process.

Close