Global Security & Risk Consultants

Services

Global Support for Oil & Gas Projects to Driver training and everything in-between

Areas of Practice

 

Executive protection

EP.jpg

D1 Risk is the premier executive protection company for professional executive protection services in South Africa, Africa and the Middle East.

We are leading the way in the provision of discreet executive protection with bespoke services that are designed to safeguard you, your family and your assets at home, on vacation or whilst travelling overseas on business.

D1 Risk has successfully conducted bodyguard operations for more than a decade in more than 30-countries worldwide. Our clients have included Heads-of-State, Diplomats, Government Officials, Military Officers, Witness Protection Programs, Celebrities, Multi-National Corporations and High Net-Worth Individuals (HNW).

D1 Risk was one of the pioneering African based companies that offered executive protection services throughout Africa and the Middle East; at a time when these private and corporate services were dominated by government and diplomatic bodyguards and close protection teams.

For a tailored solution to your executive protection or close protection needs; please contact us directly with your requirements.


Covert surveillance

Surveillence-and-covert-Surveillance.jpg

Our surveillance services are conducted by surveillance specialists and surveillance operatives that were previously employed by the South African and United Kingdom Governments. These surveillance specialists conducted covert surveillance and intelligence operations across the globe.

Surveillance operations may be implemented in support of fraud investigations, protective surveillance in executive protection or as part of a larger intelligence gathering operation at a national, trans-national or international basis.

Surveillance operations will typically consist of any of the following combinations of foot, mobile or fixed surveillance through the deployment of surveillance specialists. These surveillance operations are further supported through the use of specialist technical surveillance equipment.

All our surveillance operatives hold formal United Kingdom Edexcel BTEC qualifications in Surveillance operations.


business continuity

Business-continuity.jpg

From outbreaks of violence to natural disasters, we respond to unforeseen situations that occur both locally and globally. Our preferred operational methodology is through pro-active planning, intelligence, avoidance and risk mitigation strategies.  Our security and risk consultants, intelligence analysts, and operational specialists, will provide clients with fast and strategic solutions to unexpected events that require experience and leadership.



Investigations

Fraud-Investigations-and-Investigations.jpg

The term ‘fraud’ commonly includes activities such as:

  • Theft

  • Corruption

  • Conspiracy

  • Embezzlement

  • Money laundering

  • Bribery

  • Extortion

Fraud essentially involves using deception to dishonestly make a personal gain for oneself and/or create a loss for another.

The risks of fraud are increasing with growing globalisation, more competitive markets, rapid developments in technology, and periods of economic difficulty.

Fraud surveys highlight that:

  1. Organisations may be losing as much as 7% of their annual turnover as a result of fraud

  2. Corruption is estimated to cost the global economy about $1.5 trillion each year

  3. Only a small percentage of losses from fraud are recovered by organisations

  4. A high percentage of frauds are committed by senior management and executives

  5. Greed is one of the main motivators for committing fraud

  6. Fraudsters often work in the finance function

  7. Fraud losses are not restricted to a particular sector or country

  8. The prevalence of fraud is increasing in emerging markets.

Despite the serious risk that fraud presents to businesses, many organisations still do not have formal systems and procedures in place to prevent, detect and respond to fraud.

From the perspective of a Risk Management Framework against Fraud, D1 Risk has the expertise to assist companies in implementing fraud prevention policies and procedures to mitigate their exposure to fraud.

Suspicions around fraudulent activity can be investigated by our experienced fraud examiners.

D1 Risk is proud to employ and staff Certified Fraud Examiners (CFEs)

Certified-Fraud-Examiner.jpg

Cyber Security

Computer-security-Internet-security-and-network-security.jpg

“Nearly 60% of small to medium sized businesses will close within 6-months after a cyber attack” Every minute of every day there are governments, organised crime and hacker groups turning the doorknobs on your house looking for an unlocked entry. They are rattling the windows and circling your domicile, looking for a weakness, a vulnerability, or a way into your house. Non-technical Attacks Exploits that involve manipulating people are the greatest vulnerability within any computer or network infrastructure. Humans are trusting by nature, which can lead to ‘social engineering’ exploits. Physical break-ins to buildings, computer rooms or other areas containing sensitive information and servers. Dumpster diving – rummaging through trash. Network infrastructure attacks Hacker attacks against network infrastructures are easy achieved from anywhere in the world through the internet. Operating system attacks Hacking an operating system (OS) is a preferred method and makes up a large percentage of hacker attacks. Application and other specialised attacks Applications take a lot of hits by hackers. Programs such as e-mail server software and Web applications are often beaten down. Cyber Security Solutions We can assist you in developing strategies to answer the following questions: Why do I need cyber security? What is necessary and cost-effective? How do I implement it? How do I recover from a breach?



Intelligence

Tactical-and-operational-Intelligence.jpg

No matter what the assignment, an in-depth intelligence gathering task is undertaken as the preliminary step in any operation that we undertake.
The world’s leading government and business entities have dedicated intelligence units and corporate intelligence groups that are mandated to supply them with foresight and insight to maintain their leading edge and dominance over competitors.
Intelligence empowers the decision maker to make informed decisions based on facts; irrespective of whether those decisions are tactical, operational or strategic in nature.

Our intelligence operatives are specialists in HUMINT, SIGINT, IMINT and OSINT disciplines.

We supply intelligence on:

  • Business conduct

  • Criminal activity

  • Armed conflict

  • Political conditions

  • Civil unrest

  • Corruption

  • Environmental hazards

  • Insurgency

  • Transportation

  • Terrorism

  • Unexploded ordnance


Travel security

Travel-Security-and-Travel-Risk-Management.jpg

Frequent travellers face diverse safety and security challenges in unfamiliar environments; compounded by language barriers, local bureaucracy and limited support. Besides these travel set-backs, a traveller can be exposed to emergencies and crises such as terror attacks, natural disasters, civil unrest, medical emergencies, accidents and logistical failures or delays.

These challenges can be overcome. We implement the latest technology to deliver products and services that give corporations and individuals the ability to easily manage their traveller’s safety and security 24/7. Traveller information is easily accessible through our online security management system and map interfaces to better understand the risks associated with specific locations.


Consulting

Security-and-risk-Management-Consulting.jpg

Risk Analysis

Risk in all its forms remains one of the most significant issues facing any business.

Comprehending the full spectrum of risk requires the security practitioner to understand the client’s business and how it relates to the reality on the ground and there after provide recommendations in risk mitigation strategies.

Security Audits and Risk Management Surveys

Risk management is a process which begins with a detailed and thorough security survey. Information is the key to threat and risk mitigation. A detailed analysis of the client and his environment will facilitate the planning and risk management process.

The collection and accurate assessment of information is a critical component of any risk analysis process and our security consultants have developed unique skills sets in this area.

Security Consulting

D1 Risk supply co-ordination, consultation and management services for:

  1. Project Risk Assessments

  2. Due Diligence into joint venture partners and local contractors

  3. Security Planning and Development of Project Security Programmes

  4. Design of Security Systems and Facilities

  5. Writing of Contingency Plans

  6. Manage security-related incidents and Emergency Evacuation Operations

  7. Recruitment, training and supervision of security guard forces

  8. Problem Solving and Response to Crisis Situations