services-icon-drk@4x.png
Services
A Family Office working with RFI can expect the following:
pexels-gustavo-fring-3874035.jpg

01

ASSESSMENT

Conduct a thorough review of the family members, their staff and their assets, looking at both the security measures currently in place compared to Best Practice appropriate to the vulnerabilities. This review should look at each residence and other assets, their locations, operations, people, digital footprints, processes and systems to find weaknesses, assess security risks and evaluate exposures. Upon completion, clients will be presented with a detailed Threat and Vulnerability Report providing both physical and online vulnerabilities.

indentifying-risks-graphic5.png
 
strategy.jpg

02

STRATEGY

Build a balanced security strategy that draws from the Threat and Vulnerability Report, suggest recommendations and present mitigating factors. The strategy development forms an integral part of the security framework, consisting of controls, practical policies, procedures, and continuous improvement.

 
meeting.jpg

03

PLAN

Building on the strategy framework, a detailed plan will be developed, incorporating adequate, tailored solutions. The plan will mitigate the determined risks and allocate costs and resources.

 
serverroom_574000213.jpg

04

IMPLEMENT

Select the right people, implement policies and procedures, install the right systems and infrastructure, monitor media and cyber threats - train, test and prepare. Plan ahead - keep an eye on potential points of concern, upcoming travel, local, regional and international security dynamics – anything that may affect your most precious asset – family.

 
Family-Web_edited.jpg

05

SUPPORT

Ongoing monitoring, assistance, and advice to ensure a complete evolving solution that can grow with you.

  • Residential & Commercial Security

  • Staff & Vendor Vetting

  • Property Security Assessments

  • Concierge & Logistical Support

  • Travel Planning and Security

  • Social Media Monitoring

  • Predictive Risk Reporting

  • VIP Meet and Greet

  • Due Diligence & Investigations

  • Surveillance

  • Response & Recovery

  • Individual & Asset Tracking and Monitoring

  • Bug Sweeps / TSCM