Areas of Practice
Executive protection
D1 Risk is the premier executive protection company for professional executive protection services in South Africa, Africa and the Middle East.
We are leading the way in the provision of discreet executive protection with bespoke services that are designed to safeguard you, your family and your assets at home, on vacation or whilst travelling overseas on business.
D1 Risk has successfully conducted bodyguard operations for more than a decade in more than 30-countries worldwide. Our clients have included Heads-of-State, Diplomats, Government Officials, Military Officers, Witness Protection Programs, Celebrities, Multi-National Corporations and High Net-Worth Individuals (HNW).
D1 Risk was one of the pioneering African based companies that offered executive protection services throughout Africa and the Middle East; at a time when these private and corporate services were dominated by government and diplomatic bodyguards and close protection teams.
For a tailored solution to your executive protection or close protection needs; please contact us directly with your requirements.
Covert surveillance
Our surveillance services are conducted by surveillance specialists and surveillance operatives that were previously employed by the South African and United Kingdom Governments. These surveillance specialists conducted covert surveillance and intelligence operations across the globe.
Surveillance operations may be implemented in support of fraud investigations, protective surveillance in executive protection or as part of a larger intelligence gathering operation at a national, trans-national or international basis.
Surveillance operations will typically consist of any of the following combinations of foot, mobile or fixed surveillance through the deployment of surveillance specialists. These surveillance operations are further supported through the use of specialist technical surveillance equipment.
All our surveillance operatives hold formal United Kingdom Edexcel BTEC qualifications in Surveillance operations.
business continuity
From outbreaks of violence to natural disasters, we respond to unforeseen situations that occur both locally and globally. Our preferred operational methodology is through pro-active planning, intelligence, avoidance and risk mitigation strategies. Our security and risk consultants, intelligence analysts, and operational specialists, will provide clients with fast and strategic solutions to unexpected events that require experience and leadership.
Investigations
The term ‘fraud’ commonly includes activities such as:
Theft
Corruption
Conspiracy
Embezzlement
Money laundering
Bribery
Extortion
Fraud essentially involves using deception to dishonestly make a personal gain for oneself and/or create a loss for another.
The risks of fraud are increasing with growing globalisation, more competitive markets, rapid developments in technology, and periods of economic difficulty.
Fraud surveys highlight that:
Organisations may be losing as much as 7% of their annual turnover as a result of fraud
Corruption is estimated to cost the global economy about $1.5 trillion each year
Only a small percentage of losses from fraud are recovered by organisations
A high percentage of frauds are committed by senior management and executives
Greed is one of the main motivators for committing fraud
Fraudsters often work in the finance function
Fraud losses are not restricted to a particular sector or country
The prevalence of fraud is increasing in emerging markets.
Despite the serious risk that fraud presents to businesses, many organisations still do not have formal systems and procedures in place to prevent, detect and respond to fraud.
From the perspective of a Risk Management Framework against Fraud, D1 Risk has the expertise to assist companies in implementing fraud prevention policies and procedures to mitigate their exposure to fraud.
Suspicions around fraudulent activity can be investigated by our experienced fraud examiners.
D1 Risk is proud to employ and staff Certified Fraud Examiners (CFEs)
Cyber Security
“Nearly 60% of small to medium sized businesses will close within 6-months after a cyber attack” Every minute of every day there are governments, organised crime and hacker groups turning the doorknobs on your house looking for an unlocked entry. They are rattling the windows and circling your domicile, looking for a weakness, a vulnerability, or a way into your house. Non-technical Attacks Exploits that involve manipulating people are the greatest vulnerability within any computer or network infrastructure. Humans are trusting by nature, which can lead to ‘social engineering’ exploits. Physical break-ins to buildings, computer rooms or other areas containing sensitive information and servers. Dumpster diving – rummaging through trash. Network infrastructure attacks Hacker attacks against network infrastructures are easy achieved from anywhere in the world through the internet. Operating system attacks Hacking an operating system (OS) is a preferred method and makes up a large percentage of hacker attacks. Application and other specialised attacks Applications take a lot of hits by hackers. Programs such as e-mail server software and Web applications are often beaten down. Cyber Security Solutions We can assist you in developing strategies to answer the following questions: Why do I need cyber security? What is necessary and cost-effective? How do I implement it? How do I recover from a breach?
Intelligence
No matter what the assignment, an in-depth intelligence gathering task is undertaken as the preliminary step in any operation that we undertake.
The world’s leading government and business entities have dedicated intelligence units and corporate intelligence groups that are mandated to supply them with foresight and insight to maintain their leading edge and dominance over competitors.
Intelligence empowers the decision maker to make informed decisions based on facts; irrespective of whether those decisions are tactical, operational or strategic in nature.
Our intelligence operatives are specialists in HUMINT, SIGINT, IMINT and OSINT disciplines.
We supply intelligence on:
Business conduct
Criminal activity
Armed conflict
Political conditions
Civil unrest
Corruption
Environmental hazards
Insurgency
Transportation
Terrorism
Unexploded ordnance
Travel security
Frequent travellers face diverse safety and security challenges in unfamiliar environments; compounded by language barriers, local bureaucracy and limited support. Besides these travel set-backs, a traveller can be exposed to emergencies and crises such as terror attacks, natural disasters, civil unrest, medical emergencies, accidents and logistical failures or delays.
These challenges can be overcome. We implement the latest technology to deliver products and services that give corporations and individuals the ability to easily manage their traveller’s safety and security 24/7. Traveller information is easily accessible through our online security management system and map interfaces to better understand the risks associated with specific locations.
Consulting
Risk Analysis
Risk in all its forms remains one of the most significant issues facing any business.
Comprehending the full spectrum of risk requires the security practitioner to understand the client’s business and how it relates to the reality on the ground and there after provide recommendations in risk mitigation strategies.
Security Audits and Risk Management Surveys
Risk management is a process which begins with a detailed and thorough security survey. Information is the key to threat and risk mitigation. A detailed analysis of the client and his environment will facilitate the planning and risk management process.
The collection and accurate assessment of information is a critical component of any risk analysis process and our security consultants have developed unique skills sets in this area.
Security Consulting
D1 Risk supply co-ordination, consultation and management services for:
Project Risk Assessments
Due Diligence into joint venture partners and local contractors
Security Planning and Development of Project Security Programmes
Design of Security Systems and Facilities
Writing of Contingency Plans
Manage security-related incidents and Emergency Evacuation Operations
Recruitment, training and supervision of security guard forces
Problem Solving and Response to Crisis Situations