What is Threat Intelligence? The more complicated today’s organizational data systems, the higher the risk of cyber security breaches, and the greater the need for threat intelligence. As regards data systems, the threat intelligence expert(s) will implement systems and procedures to gather information concerning cyber threats. The data gathered will be analyzed, and the assessment […]
Travel Security Risk Management Programs
Travel security risk management involves all organization stakeholders in the assessment of potential risks to travellers and mitigation of risks for their safety. Travel Security Risk Management Preparation Preparation for the management of travel security will involve asking organization stakeholders a number of questions in order to assess travel risks and then to formulate a […]
Crisis Management – Programs and Plans Development
Crisis Management Expertise Mitch Price brings decades of crisis management experience to clients who want and need proactive planning for a crisis, from weather to pandemics, to terrorism. Selected by a Fortune 150 energy company as the initial executive to design, implement, and manage their enterprise crisis management program, Mitch aligned the program with the […]
Aviation Security – Global Cooperation for Safety
The Scope of Aviation Security Cooperation While global airline traffic dropped during the COVID pandemic, it is climbing again and expected to reach and exceed the 2021 count of more than 40 million flights that year. Global annual airline passengers are expected to reach 9.4 billion in 2024, certainly pointing out the grave importance of […]
Maritime Security – Internal and External Vessel Protection
What is Maritime Security? Maritime security is an overview term for the maritime industry. It involves protection from threats, both internal and external, to vessels. Thes threats may not necessaily be intentional, and these threats can include: illegal fishing pollution terrorism robbery piracy illegal trafficking (goods and people) Inspection, threat evaluation, and solutions proposals are […]
Executive Protection – a Higher Level Suite of Services
Executive Protection or Bodyguard? Many people may find that the role of bodyguard comes to mind when executive protection is mentioned. In international affairs, “executive protection” is at a far higher level than the duties of a bodyguard. The reality is that there are those with high corporate, institutional, or public profiles that place them […]
Security Risk Assessment – Consulting and Services
Kimmons Investigative Services, in working with Mitch Price, can deliver global experience and expertise in security risk assessment. This includes extensive consulting and work in security risk assessment with government and private sector entities. The process begins with a comprehensive overview of foreseeable and reasonable risk, including physical and cyber security. Mitigation strategies follow, with […]
UAV Detection (Unmanned Aerial Vehicle) – An Introduction
UAV Detection, or Unmanned Aerial Vehicle Detection, is becoming a focus for concern over these remote-controlled devices entering restricted airspace and possibly syping or collecting proprietary data. Detection in order to provide early warning of aerial intrusion is one piece of the puzzle, with mitigation being the other. This article will lay out the basics […]
Kimmons Investigations Breaks the Mold with Litigation Support Services
Kimmons Investigative Services offers all of the expected services of a full service private investigation firm. This announcement breaks out of those expected roles and offers our clients the additional resource of litigation support services. Attorney Maisie A. Barringer brings nearly two decades of trial experience and legal expertise to KIS through her ability to […]
Protection of Huge Amounts of Corporate Data in the Cloud
According to Statista.com, from 2015 to 2022, corporate data in the cloud and stored on cloud servers has doubled from 30% to 60% in that short seven year period. That growth curve hasn’t slowed according to many experts, so corporations today are increasingly seeking ways in which to protect their data. Computer Forensics and Corporate […]