ATRIM-GROUP PROTECTING CRITICAL INFRASTRUCTURE
  • HOME
  • About
    • OUR TEAM
    • Our Services and Mindset
  • Services
    • Anti-Terror & Other Crime Risk Assessment
    • Insider Threats
    • Healthcare Abuse & Fraud
    • Education & Training
    • Prevention Science Consulting
  • CONTACT US

PROTECTING CRITICAL INFRASTRUCTURE with SCIENCE & TECHNOLOGY 

Threat Risk Assessment...e-Learning...Facilitation: Based in crime prevention, social psychology and behavioral biology science


What we deliver

Picture
RISK ASSESSMENTS

Threats posed from the Outside

​Our anti-terror and other crime risk identification matrix (ATRiM) is the only threat risk assessment tool of its kind for critical infrastructure that is based in prevention science.

​It blends 1st with 2nd Generation Crime Prevention Through Environmental Design into the risk assessment process. One of its features adds employee and community collaboration for preventing and responding to attacks to the mix.
  
Learn More

​

​Threats posed from the Inside


Our insider threat risk assessment draws from behavioral biology, social psychology and social physics research to identify and mitigate environmental conditions in the workplace which influence insider behaviors. and why this is the case.  

cyber insider threats      occupational fraud      theft        corruption     workplace sabotage     workplace violence ​
Learn More
Picture
Learning and consulting
 t
 New: Security e-learning: 
ATRiM Frontline: Effective Information Gathering

ATRIM Frontline e-Learning was created for frontline security and employees who must depend on identification and other types of documents to make business decisions. 

This entry level training improves information gathering, unbiased time-sensitive judgments and skills for gathering all information need to make make sound decisions. With this training, while treating people with dignity and respect, outlier patterns of verbal and nonverbal behaviors emerge, which may require further explanation.  
  

This e-learning fills gaps left by the security trade-offs made document issuers and left unattended to by the Security Exchange Commission, "Red Flags Rules".​ 

Talk to us about our professional level train the trainer's security strategy. We help you develop in-house, post e-learning, frontline skills. This professional level training is seamless with more advanced interviewing skills required by auditors and inquiries officers. 
​​​​
Learn More

Who we work with

Picture
Picture

 Frontline Employees


​Point-of-contact security and employees must be engaged in security. Their work environment either contributes to, or takes away from staying focused, vigilant and not giving in to bad things when psychological resiliency is depleted. 

Security and frontline employees need the confidence to trust their experience, when they feel something isn't quite right about a person, or their story.

They need clearly defined escalation protocols that treats everyone with dignity and respect, while their concerns are affirmed or refuted. All this must take place in a positive environment where coaching feedback is welcomed as an opportunity to learn and grow in the role.  
Picture

Supervisors & Managers


Managers ought to be well informed on how mood influences perception; and how emotions inform intuition judgment and decision making. 

They need to deliver on skills implementation that assures employees are applying their ATRiM Frontline training in a structured information gathering format. They maintain a positive, work safe, unbiased judgment service environment.

Line managers must remain vigilant for negative insider "noise" in the workplace and  for it to be addressed. 

​They identify situational environments where it might provided rationalizes, or excuses when insiders and independent contractors are tempted to do bad things.
 
​
Picture

Facilitation

 
Crime prevention, social psychology and behavioral biology insights are transferred for incorporation into 2nd Generation security as learning cultures. Learning cultures add capacity to more effectively resolve nonlinear human-centered security threats.  

Our facilitation tools include:

Search Conferencing that involves employees from all levels in designing a security learning culture.  

Planning-in-action, problem solving, workshops for employees looking for situational specific security solutions.  ​
Learn More

The Roots of our Services

Outsider Acts of Terror and Predatory Crime Threats

​There is inherent weakness in threat risk assessment and vulnerability analysis that is limited to determining likelihood of an event, but not what to do about it.

Urban planner and criminologist, Gregory Saville, designed  ATRiM. He is cofounder of the ​International CPTED Association.

ATRiM is a multi-disciplinary approach for reducing threats. 

​ Assisted by a grant from  U.S. Homeland Security, ATRiM introduces prevention science to critical infrastructure risk assessment.​ 

Insider Threats

​Combined with recent and rising concerns about cyber attacks and insider threats; other behaviors including occupational fraud, theft, corruption, workplace sabotage and workplace violence ought to concern. They share  some of the same environmental triggers.  

Crime prevention, social psychology and behavior science provide security with:


  • ​insights on why people behave the way they do,  and ​
  • mitigation responses to situational  environmental conditions contributing to  unwanted behaviors. ​​​​​

Personation and Identity Fraud 

The 9/11 Commission found that terrorists boarded aircraft with fraudulently obtained State Identification Cards.   

This comes as no surprise when this happens to  anyone with international terror and other crime law enforcement experience.  

​Our e-Learning and skills development is for detecting red flag indicators potential ruse hat ought to raise concerns, while mindful that our brain in this role will have a tendency to find problems where the don't exist. 

To counter this the training delivers on information gathering skills for getting information accurately in the words of the interviewee, and for detecting potential verbal ruses. The training includes implicit bias and the consequences if not mindful. ​







CONTACT US

We'll find the right package for your organization.

email

john.lyons@atrim-group.org
​

phone

506.461.1951
613.453.1910 ​

location

Gary Hall
Fredericton, New Brunswick, Canada
     and
John Lyons
​Kingston, Ontario, Canada


This website uses marketing and tracking technologies. Opting out of this will opt you out of all cookies, except for those needed to run the website. Note that some products may not work as well without tracking cookies.

Opt Out of Cookies

Threat Assessment and Security
...​adding new science 

Critical infrastructures are dynamic, complex systems made up of many smaller ecosystems. Within this context, insider behaviors rarely tightly fit into the orderly and linear boxes of policy and guidelines.  
​
For generations, security has be fixated on prevention through target hardening and detection. Recent science tells more of more complex security story on why people behave the way they do and on what influences this behavior. 

Some behaviors are controllable with linear cause and effect security solutions. Others are not. Some insider threats are predictable, others seemingly come out of no where.

Everything to do with human behavior is messy and every individual behavior must be analyzed within evolutionary and behavioral context,  as no two people respond exactly the same way. Thus, with insiders there is a element of unpredictability - stuff of nonlinearity - in even the mostly orderly of business environments.

​M
ore subtle insider concerns include lack of engagement in your security concerns, poor attention (focus) on details and yielding to temptations, especially when resiliency is depleted. 

​Environment is the most significant player in human behavior.  

​Is it time to introduce science to security practice in practical, meaningful ways in order to meet new realities of the 21st Century?

​We think, yes!
 

Project Symphony​
...an idea

Have you ever listened to an orchestra warming up? Each masters of their individual instruments making noise. When they begin working collaboratively...that's when great things start to happen.  
​
​
The idea is simple enough. Security learning cultures getting deep inside individual critical infrastructure ecosystems and making adjustments and get things function in harmony.  Security that pays attention for, and gets on top of, insider "noise" early on/ Solutions in the framework of everything about human behavior being analyzed in its environmental context. 
​
​Thoughts on nonlinearity

The question is what insider "noise" - the business of nonlinearity - is going on in each of the ecosystems of critical infrastructure that, if left unattended, amplifies metaphorically into a storm?  

Dynamical systems theorists playing with chaos would ask risk management and security: "Does this unwanted behavior in the system depend on some initial condition?" 
​
​Insider threat mitigation is best served when looking at insider behaviors in situational specific contexts. Practitioner based prevention science that is always learning through doing and evaluation; leading to security risk assessment and prevention matrices unique to each ecosystem - a security "learning culture".  

​It takes systems thinking to understand the relationship between all parts security for figuring out how individual parts influence and impact on each other, and how to collective optimize security assets, including people.   

Proudly powered by Weebly
  • HOME
  • About
    • OUR TEAM
    • Our Services and Mindset
  • Services
    • Anti-Terror & Other Crime Risk Assessment
    • Insider Threats
    • Healthcare Abuse & Fraud
    • Education & Training
    • Prevention Science Consulting
  • CONTACT US