Threat Assessment & Management

Effective threat management for your business
TAM
Service
Threat assassment and management
Problem
Individual's or groups of concern, whether known or anonymous can disrupt an individual's life or a companies operations by making threats which may or may not pose a real risk.
Solution
By implementing a holistic threat assessment and management process, companies can identify threats at an early stage, evaluate them and take effective measures to reduce risks.

Threat Assessment and Management (TAM) is the process of identifying, evaluating, and managing people or situations that could pose a threat to individuals or organizations.

Identifying threats

The process of identifying threats to individuals or organizations includes raising awareness and providing channels for reporting activities or messages that raise concern. At this point, the threat actor may be known or still anonymous.

Assessment of threats

Once a threat has been identified, it must be assessed to determine the level of risk to the affected individual or organization. This is a dynamic, ongoing process that continues until a complete resolution of the situation is achieved.

Managing threats

Managing the threat requires interdisciplinary and cross-agency collaboration and consensus. Once the initial level ofrisk has been identified, strategies are developed to increase the likelihood of a positive outcome. However, the threat management strategy must also remain dynamic and adapt to any change in circumstances.

Our trainings and workshops
Do you have any questions about our workshops? Get in touch with us and we'll be happy to discuss your questions with you.
Travel & international security
Chevron down

Basic workshop, 1 day, min/max Participants: 4/10

This workshop provides business travelers with the basics for a safe travel process.

Content:

  • Risk and risk assessment
  • Travel planning
  • travel equipment
  • Situational awareness
  • Accommodation & transportation
  • Practical exercises


Workshop, 3 days, min/max Participants: 6/10

International travelers face a wide range of risks in today's world, from crime, civil unrest to terrorism. In this intensive workshop, travelers are made aware of the real risks. They learn how to prepare for their next business trip, how to identify and avoid risks, and what to do in exceptional situations.

Content:

  • Knowledge protects — risk analyses countries
  • Who is responsible for my safety?
  • Before departure — travel preparation
  • Safe processes — arrival, transportation, hotel
  • information security
  • Danger vs. risk
  • Risk identification — perpetrator behavior and attention
  • Conduct in exceptional situations — attacks, riots, terrorist attacks
  • Useful equipment & “go-bag”


Workshop, 5 days, min/max Participants: 8/15

People who need to travel to countries or regions with complex risks need advanced knowledge on how to prepare for potential hazardous situations. Content: In addition to the topics of the 3-day workshop, other topics based on a country risk analysis of the target country will be discussed intensively.

For example:

  • Mines and ERW
  • Behavior under attack
  • Kidnappings/Surviving as a hostage
  • Tactical first aid
  • Personal protection equipment
  • Communication with radio device/satellite telephone
  • Orientation in the terrain
  • HRE planning

Behavioural Detection
Chevron down

Identifying indicators of violent intent in the pre-attack.

According to Paul Watzlawick, it is not possible not to communicate, i.e. perpetrators with intent to use violence cannot act without showing certain indicators.

Training to recognize these behavioral indicators can enable security personnel to potentially prevent attacks, assassinations, or other acts of violence.

In our basic training, participants learn how the human body reacts under stress and what effects automatic biological processes have on the body.

The basic indicators (tactical and emotional) are presented using practical examples. Finally, a systematic application method for use is explained.

The continuing education courses also offer participants the opportunity to apply what they have learned in practical exercises in various scenarios.

The training is not only aimed at security personnel, but can also provide additional security skills in any professional field that potentially involves violent opponents.

“The human body is the best image of the human soul” Ludwig Wittgenstein

OUR TRAINING COURSES
Close protection training

Close protection personnel must train regularly in order to be able to respond adequately to acute threat situations. However, the reality of many CP assignments usually excludes the possibility of attending longer training courses, which is why short training courses with a specific focus at regular intervals can enable optimum operational readiness.

Three Corners Risk Consulting's 1 to 2-day training courses focus on tactics for individual protectors or teams, from basics to advanced scenario training using Force-on-Force® ammunition. Exercises on foot and in vehicles, farveillance and counter-farveillance as well as operational planning, emergency management, tactical first aid and practical shooting training can be incorpararated.

Our training center

Mobile and foot scenarios, from elementary to advanced, can be played through and video debriefing guarantees the optimal training effect.

We use Speer Force-on-Force® training ammunition in 9mm and .223 Remington calibers to provide a safe yet realistic training experience.

Force-on-Force Training

Our training courses are structured in stages from level 1 — basic drills to level 5 — deployment scenarios, but can be designed according to customer requirements and focus of activity.

For more informations please contact us.

OUR PROMISE
“Your success and safety are our priority”
James R. Collier
In a constantly changing business environment, robust risk management is essential.
It creates the basis to protect your assets, employees, and reputation. We can help you implement an effective strategy to address your security risks.
Contact us today.
CONTACT