We build defensible security programs that produce predictable outcomes.

Brian Claman & Associates

866-494-1349

  • Home
  • Why Choose Us?
  • Service Offering
  • Advisory Board
  • Our Blog
  • Podcast
  • Contact Us
  • Legal
  • More
    • Home
    • Why Choose Us?
    • Service Offering
    • Advisory Board
    • Our Blog
    • Podcast
    • Contact Us
    • Legal

866-494-1349

Brian Claman & Associates
  • Home
  • Why Choose Us?
  • Service Offering
  • Advisory Board
  • Our Blog
  • Podcast
  • Contact Us
  • Legal

Service Offering

Managed Security Services

RFP and Contract Creation/Management

RFP and Contract Creation/Management

Managed services are the practice of outsourcing to subject matter experts on an ongoing basis, specific processes and functions intended to improve operations and cut expenses. The client and the MSP (managed service provider) are governed by a contractual, service-level agreement that states the performance and quality metrics related to the relationship.


Our SMEs can manage part of, or your entire program, at a fraction of the cost of hiring a comparable security management expert. 


With managed services, you control all of the costs. You are not required to increase headcount or adhere to the applicable labour code regulations applicable to an in-house employee and complicated labour code regulations. 

RFP and Contract Creation/Management

RFP and Contract Creation/Management

RFP and Contract Creation/Management

Starting with an RFI (Request for Information) process, we identify and pre-qualify potential service providers capable of doing the work in a manner consistent with the client’s needs. Next, we create a short list of potential proponents that will be invited to participate in the RFP process. and create a short list of those who should be invited to participate in the upcoming RFP. Finally, we create the RFP documentation and manage the entire process using our multi-phase approach: 

Security Program Review

RFP and Contract Creation/Management

Security Program Review

The Security Program Review looks at the current state of an organization's security program to determine if it effectively addresses its security risk management needs. The Review evaluates the security program against best practices and current legislative requirements to ensure that it is optimally focused and provides the desired results.  

Security Program Design

Development of Emergency Management & Response Plans

Security Program Review

We work with clients to create business-specific security programs or, following a security program review, to refresh a current program.


Effective security programs are predicated on a solid governance model, mission-focused, and capable of producing predictable, defensible and cost-effective security risk management outcomes.

Development of Emergency Management & Response Plans

Development of Emergency Management & Response Plans

Development of Emergency Management & Response Plans

An emergency management plan is a course of action developed to mitigate the damage of potential events that could endanger an organization's ability to function. 


Such a plan should include measures that provide for the safety of personnel and, if possible, property and facilities

Emergency Management Table-Top Exercises

Development of Emergency Management & Response Plans

Development of Emergency Management & Response Plans

Tabletop exercises are discussion-based sessions where team members meet in an informal, classroom setting to discuss their roles during an emergency and their responses to a particular crisis. 


We can design and facilitate exercises to occur on a regularly scheduled basis, helping to ensure that the management team remains knowledgeable of the business's EMP and prepared to respond whenever a significant emergency event occurs.

Security Vulnerability Assessments

Security Vulnerability Assessments

Security Vulnerability Assessments

A security vulnerability
assessment identifies, assesses, and implements critical security controls at a particular facility

.

It focuses on identifying potential vulnerabilities and determining its probability of occurrence and then potential consequence. Next, countermeasures are proposed to protect them from being exploited and causing harm to the property and/or its occupants.


Carrying out a vulnerability assessment allows an organization to view the business holistically from an attacker's perspective.

Security Management Recruiting

Security Vulnerability Assessments

Security Vulnerability Assessments

Are you looking to hire a security supervisor, manager, or senior security executive? If yes, we can help. Our new recruitment service allows clients to identify potential candidates and recruit the best talent available to fill their security management needs.

Security Engineering & Design

Security Vulnerability Assessments

Security Engineering & Design

Our team of professional engineers can provide comprehensive physical security and access control into and within buildings. We address our clients’ needs for integrated design and planning services such as;


· building audits

· conceptual designs

· security technology RFP development

· project management

CPTED

White Label Services for the Security Industry

Security Engineering & Design

Space protection is more than just camera’s, locks, access control, alarms and other mechanical means.

Crime Prevention Through Environmental Design (CPTED) is a multi-disciplinary approach of crime prevention that uses urban and architectural design and the management of built and natural environments. CPTED aims to reduce victimization, deter offender decisions that precede criminal acts, and build a sense of community among inhabitants so they can gain territorial control of areas, reduce crime, and the its perception. 

White Label Services for the Security Industry

White Label Services for the Security Industry

White Label Services for the Security Industry

White label refers to a fully supported product or service that's made by one company but sold by another. White label products and services are purchased by the latter company without branding.


We can partner with security service providers and guard companies to provide consulting and/or managed services under their brand. 

Workplace Violence Training

White Label Services for the Security Industry

White Label Services for the Security Industry

Workplace violence is any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site. It ranges from threats and verbal abuse to physical assaults and even homicide. It can affect and involve employees, clients, customers and visitors. In Canada, incidents of workplace violence are on the rise.  Employee training is an important first step at creating a safe work environment.

Fraud Risk & Awareness

Executive Protection Programs

Executive Protection Programs

Fraud risk and awareness training is an essential aspect of preventing fraud in any organization. The training is designed to educate employees on how to identify potential fraud risks and how to respond appropriately if fraud occurs. Here are some key elements that may be covered in fraud risk and awareness training:


  1. Understanding Fraud
  2. Red Flags
  3. Reporting Procedures 
  4. Consequences
  5. Prevention Techniques 
  6. Ongoing Training


By providing comprehensive fraud risk and awareness training, organizations can help ensure that employees are equipped to identify potential fraud risks and respond appropriately if fraud occurs. This can help minimize the risk of financial loss and reputational damage for the organization.

Executive Protection Programs

Executive Protection Programs

Executive Protection Programs

Developing a corporate executive protection program involves careful planning, implementation, and ongoing evaluation to ensure the safety and security of executives and key personnel. Here are some key steps to consider:


1. Conduct a risk assessment

2. Set goals and objectives

3. Develop policies and procedures

4. Determine resource needs

5. Hire and train personnel

6. Implement and test the program

7. Continuously evaluate and update the program


Remember, developing a successful executive protection program requires ongoing commitment and investment. By prioritizing the safety and security of your executives, you can help protect your company's reputation and bottom line


Copyright © 2019 - 2023  Brian Claman & Associates Ltd. - All Rights Reserved.

Helping organizations manage security risk.

  • Podcast

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close