ICG helps you maintain continuity of operations and deal with major uncertainty at the same time:
We provide early warning that gives the client time to develop and evaluate cost effective market-based risk management options. We provide intelligence, information security, and physical security that help clients ensure primacy and continuity in their business operations throughout a crisis
- Our supply chain analysis and business intelligence flag real risks and target weaknesses that can fold your global operations.
- We provide truly secure IT for your data, solutions integration, and risk assessment.
- We monitor threats to you, we tell you what is really worth worrying about, and we provide your people with basic skills to stay ahead of the risk.
- We deliver low profile in-country support and respond to your needs, at HQ and at the project -- no matter where you are.
We help remove you from your adversary’s target list:
Whether the threat is intellectual property theft, an antipersonnel strike, or a supply chain breach, we develop a method to operate within the threat -- employing rapid decision-making and maneuvering faster than the threat -- thereby removing the risk.
Expensive security is no guarantee of effectiveness. We help you respond proportionally to displace the risk and minimize distraction from your operations. We help make you less of a target by training, monitoring, assessment and planning, backed by interdiction when it is required. We intercept perpetrators while they are in surveillance mode -- before penetration or attack. You continue to build a reputation for reliability with your customers; you stay ahead by being alert and responsive.
Preparation and anticipation are king. Commercial firms are by nature soft and predictable targets in terms of their people and infrastructure. Governments can defend whereas the best that commercial firms can do is defer or deflect. We help you defer or deflect that risk.
ICG is expert at today’s highest priority tasks:
Intellectual property (IP) theft, (notably China): We analyze your infrastructure, its processes, partners, contractors, suppliers, and nascent competitors, even in “data poor” low cost and high risk areas to stop IP theft.
Risk pricing: We provide very early, gray-area event risk, strategic market risk, and supply chain evaluation -- when hedges are inexpensive and changes do not mean interruptions.
Active Sarbanes-Oxley compliance support: We eliminate your threat of fiduciary breach by extending a passive audit to include active risk remediation that flags omissions and recommends disciplined, monitoring protocols. We provide direct input to audit committees on investment risk.
Forensic support: We provide post-incident investigation, counterparty risk assessment.
Infrastructure defense: We design integrated, performance-based security programs for your business to secure your operating facilities and protect your supply chain.
Counterthreat: Depending upon need, we design, train, and execute personal protection programs. We will deploy to assist in managing crises, including extraction in extremis.
Tailored solutions: We unobtrusively enhance an operator’s profitability, continuity, and safety, so that you, “Make deadlines, not headlines.”