TM Safety and Risk Management

We offer:

Threat and vulnerability assessments

  • Observe current areas of exposure and any past security incidents in order to identify potential vulnerabilities.
  • Interview employees and other key individuals for critical insights and information about situations, policies, and procedures.
  • Provide a gap analysis to isolate areas where your security program does not meet industry best practices.
  • Make recommendations and guide you in implementing measures to mitigate any areas of vulnerability to reduce your risk.

Policy and procedure review and development

  • Review and assess policies and procedures

Security audits

  • Assess effectiveness of organization’s security policies are being implemented
  • Physical Penetration Testing

Security training may consist of:

  • Basic threat and risk analysis
  • Basic risk management and mitigation strategies
  • Preparation and implementation of security plans
  • Basics of security methodologies (concentric layers of protection, use of personnel, processes and technology, information security) and references for further study
  • Specific skills necessary to the particular situation of the trainees. This may include: Basics of procurement and contracting of services
  • Incident response and crisis management
  • Communication skills
  • Hostile environment training
  • Interaction with local authorities
  • Governance issues, such as the organization’s code of conduct, local regulation, international principles.
  • Detecting hostile or suspicious activity in the workplace
  • Implementation and training of EAP (Emergency Action Plan)
  • Chemical Biological and Radiological hazards and awareness training
  • Travel Security Training
  • Workplace Violence
  • Crisis Management Training

Security master planning

  • Asset Definition to establish priorities for the security master plan. It is not realistic to assume that every asset can be or should be protected against every possible threat. Assets will be identified on how critical each is to the organization.
  • Threat Assessment that includes the identification and analysis of potential threats against your organization. Events are typically categorized as criminal, natural, or accidental.
  • Vulnerability Analysis where we correlate assets and threats and define the method or methods for compromise. We will analyze the existing security program to identify any physical, operational, and procedural weaknesses that may exist and identify potential countermeasures that could be implemented to minimize the probability of an event. The primary goal of this analysis is to develop a profile that defines overall threats that may affect your organization. A profile is developed that would categorize threats as highly probable, possible, or unlikely.
  • Security Measures are selected for implementation. The selection process is intended to channel resources to protect the most vital assets against the most probable threats. Security measures for a comprehensive security master plan typically addresses the following:

Security System Design

  • Security Planning
  • Integrated System Design
  • Security System Procurement and Implementation Assistance
  • Security Standards Development and Peer Review

Resilience Consulting

  • Business Continuity
  • Crisis Management and Emergency Response Plans
  • Crisis Management and Emergency Response Training
  • Crisis Management and Emergency Response

Social Media


(304) 550 – 9116

Associate Company

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Consent to display content from Youtube
Consent to display content from Vimeo
Google Maps
Consent to display content from Google