• Providing Insights and analysis of the existing security situation
  • Conducting a risk assessment
  • Creating instructions on how to deal with regular and exceptional business processes
  • Proposing, implementing and controlling measures aimed at increased security level
  • Performing business internal controls
  • Selection, deployment, mode of use and adequate implementation of technical protection systems (GPS, fuel consumption probes, video surveillance, access control) and business organization methods.