Effective Interviewing
A structured approach to interviewing whether as part of a recruitment process, ongoing personal development interviews, discipline related issues, or any workplace interaction where establishing the facts is the objective.
Supporting the Research Sector
A structured approach to interviewing whether as part of a recruitment process, ongoing personal development interviews, discipline related issues, or any workplace interaction where establishing the facts is the objective.
Using our unique experience in the arena of AR Extremism throughout the UK and globally. This input provides all participants with a context for Animal Rights activity and the tactics involved outlining effective mitigation measures for the individual and the organisation. An opportunity to provide reassurance to staff with an up to date and realistic perspective.
Equally applicable when travelling abroad or commuting, in a potential crime or extremist scenario, early recognition of a developing situation provides the option to calculate a response rather than to simply react. The input identifies options to enhance the ability to observe the environment and recognise risks as well as places of safety.
After ensuring that staff are aware of the manner in which information posted on Social Media and other internet sites may be misused both in a criminal and protest context, this input outlines effective options to mitigate online vulnerability.
This training module is focussed upon heightening awareness of staff, principally those engaged in security and reception duties whose role includes the handling of packages on a day to day basis. This input is designed to ensure that relevant staff have a clear understanding of the current threat of improvised explosive devices (IED’s).
Establishing appropriate Research Continuity and other Contingency Plans is central to achieving an acceptable level of organisational preparedness. We assist organisations to review, revise or rewrite Continuity Strategies and the associated Plans, ensuring they are complimentary to overall Critical incident Plans.
Criminal or extremist event may be preceded by an aspect of observations and planning, at which point the perpetrators are considerably more vulnerable to exposure.
This input enhances the ability of an individual, at perceived higher risk, to identify and confirm whether they are under surveillance, and to take proportionate action to minimise their individual vulnerability.
Good Practice doctrine dictates that those tasked with managing a Critical Incident or Business Continuity issue, should be afforded opportunity to practice the necessary skills within a realistic timetable. We facilitate a live time or desk top exercise allowing individuals and teams to practice responsibilities and procedures in relevant scenarios that could have arisen.
Each organisation has a duty to maintain a safe working environment. Research1 has shown that organisations which are appropriately prepared have a substantially greater chance of surviving a catastrophe than those less prepared. We assist organisations in reviewing, revising and re-establishing Critical Incident Management Strategies and associated Structures, Plans and Procedures, by mentoring and developing individuals involved, and providing support from outset to resolution of a critical incident.
1 Knight and Pretty – The impact of a Catastrophe on Shareholder Values
Undertaken against a threat assessment providing the baseline against which all subsequent security measures will be evaluated, the Security Vulnerability Analysis appraises all aspects of security during in and out of hours periods against the documented security schemer and industry security standards, the knowledge of security requirements and its application and the associated security related documentation, to deliver a comprehensive appraisal and recommendations for enhancement in the short and longer terms for inclusion in future budgeting.
An Infiltration is defined as ‘to enter or gain access to an organisation, surreptitiously and gradually, especially in order to acquire secret information’.
The master-class will review how Infiltration has been used as a tactic, reveal the reality behind the associated myths, identifying the needs of the infiltrator and the concept of targeting, explore effective preparedness and mitigation measures and practices to invoke where infiltration is suspected.
An opportunity to review organisational vulnerability will be available.
Watch this space for our newest course