top of page

Threats Assessment

Wicked threats are unprecedented, however we are laser focused on finding the inherent vulnerabilities which may become a wicked risk

Image by Andrey Tikhonovskiy

People Assessment

 
  • ​Recruitment and termination procedures

  • Access-related security measures

  • Background checks for influence and interconnections

  • Our goal is to ensure that your workforce becomes an asset, not a liability, guarding your competitive edge at all times

Operations

 
  • Finding holes into your BCP/Crisis Planning

  • Wicked Attack Response Team Development

  • Leadership Training and Change Management

  • Wicked Attacks Simulations

Legal

  • Legal strategies are often weaponized to destabilize competitors.

  • With firsthand experience of defending against such tactics, we equip you with the know-how to pre-emptively safeguard your interests.

ESG

  • Wicked Attacks Assessment

  • Greenwashing Audit

  • Senior Leadership Training

  • Adversarial Review of Goals & Reporting

People, Process & Cyber

  • Criminal Minds Understanding

  • Know the danger - Wicked risk ABC:​

  • Know thy enemy - Threat landscape​

  • Know thySelf​

Public Affairs/Corp Communications

  • Stakeholders Mapping & Engagement

  • Issues Mapping

  • Competitive Wicked Attack Threat Landscape

  • Wicked Social Unreat Monitoring

  • Wicked Incident Reporting and Escalation

  • How to respond to Wicked Attacks

bottom of page