Browsing Category

Training

Training

Burglaries and agressions prevention

Prévention-braquage-cannes - nice- monaco -sécurité

Incivilities, threats, assaults, burglaries… In sectors where employees are in contact with the public, employers must assess such risks. In particular, anticipate with measures to prevent robberies, assaults and conflict management.

Upstream thinking

Upstream thinking is needed on how to prevent such incidents from occurring.
External violence is violence perpetrated against an employee at his or her workplace (or any other place where he or she goes for professional reasons), by an individual or individuals from outside the company (customers, users, patients, etc.). 

Cases of violence

A distinction is made between criminal violence, most often predatory violence (burglary, theft, racketeering, homicide) which affects a number of well-defined professions, and violence by the public against employees. This can take different forms: incivilities, threats, verbal or physical aggression or acts of vandalism. Whatever the form, this violence jeopardises the health and safety of the employees concerned…

Read also Training Terrorism Attacks Hostages

A new trend is emerging

Home robbery is on the rise. 
In order to be better protected against these dangers, we propose a course whose content allows :
1/ To address the criminological phenomena and operating modes that you may face.
2/ To make you aware of the behaviours to adopt in the face of aggressive attitudes of delinquents and to increase prevention in the face of the risks of aggression.
3/ To assimilate the processes and techniques adapted to provide support to those responsible in risky situations.

Attitudes and behaviour

– How to anticipate them
– Behaviour and gestural attitudes to adopt
– Instructions upstream
– Management of the aftermath of a robbery
– The psychological management of the traumatic situation

Audit of your environment

We propose to analyse your needs and the weaknesses of your immediate environment in the context of the prevention of hold-ups, aggressions and conflict management.

Read also Airport Safety and Security

Speakers : Manager of a partner company
Audience: All audiences 
Number of participants: 8 to 10
Duration: 6 hours
Location: In your company

Our golf partner: www.golf-mediterranee.com

Training

False transfer orders

faux-ordre-de-virement-escroquerie-au-président - cannes - nice- monaco -sécurité

False transfer orders. Hundreds of millions of euros are disappearing from the coffers of companies that are victims of the President’s Scam.

How it works

An unscheduled, urgent and confidential request for an international transfer 

Attitudes and behaviour

Beware of:

Any change of telephone or e-mail address. Beware: the communication of a new number with a French code is not a guarantee.

Direct contact from a scammer posing as a company member or manager who will use flattery or threats to manipulate the caller.

An abundance of details about the company and its environment: personal data about the company director, his employees, etc. The aim of the fraudster is to establish his credibility and usurp a position.

In case of doubt

In case of doubt, contact the person within the company directly, either physically or with the contact details known to the company

What to do in case of an attack?

Immediately ask the bank to return the funds
File a complaint with the police and gendarmerie, providing as much information as possible.
Filing a complaint quickly will optimise the chances of recovering the defrauded funds.

Read also: Cyber Attacks

SEPA scam

The so-called “SEPA” scams are carried out in the context of the harmonisation of payment methods in the euro zone. A bank employee offers to test a financial transaction that will not actually be fictitious to a financial manager. 
Also, the false transfer requested by e-mail is back in fashion. After the EDF payment orders, it is now fake tax services that are suing individuals and companies alike!

Read also: Anti-counterfeiting

Our golf partner: www.golf-mediterranee.com

Surveys Training

Anti-Counterfeiting

Joint partnership

The balance sheet and the results policy are the guarantee of a joint partnership between the company and our anti-counterfeiting partner. 

Businesses as victims

Companies are the main victims of counterfeiters. 
You lose turnover and market share. 
– You become more reserved in selling your products.
– Counterfeiting devalues your image, your reputation, and the institutional company.
Loss of return on investment in research and development, advertising, marketing and communication to build your image.

Read also: Airport safety and security

How to fight against counterfeiting

Your products are in the following areas:
Alcohol, Spirits
– Perfumes and cosmetics
– Watches and clocks
– Clothing, shoes, luggage
– Pharmacy
– Household appliances and electronics
– Administrative documents

Read also: Protection of properties and persons

Investigation and training partners

We can help you in the anti-counterfeiting
Our partner investigators can meet your needs in the fight against counterfeiting.
Their organisation allows them to travel to any point in the world.
They have the capacity to deploy concrete measures to defend your brand and guarantee the success of the operation.
We also train your staff in identity fraud, which is either usurpation or improper acquisition.

Our golf partner: www.golf-mediterranee.com

Training

Fighting Cyber Attacks

Cyber-attaque - Cannes - Nice -Monaco - sécurité

Fighting Cyber Attack Unit that addresses the attitudes and behaviours of team managers and employees in the face of cyber attacks.

We know that cyber-attacks take place at times when teams and their managers are least available (weekends, nights, reduced HR teams, etc.) so we propose solutions to best deal with this type of situation.

Read also Terrorism Training Armed Individuals Hostages

FILM OF A CYBER ATTACK

Many companies are victims of cyber attacks and very often do not know the purpose of the attacker: ramsonware, ideology, politics, competition… To tell the truth, no matter the motive, the reason or the motive, the result can be catastrophic for the company if all employees are not made aware of the possibility of this type of aggression and especially trained in the behaviours and attitudes that can help them save.

No matter how many walls of computer technology and virtual bastions are built, the breach, flaws and weaknesses will be in human behaviour.

“CONSTANT WATCH”

A cyber attack often comes at a time when there are fewer staff (at night, break times, holiday periods, reduced staff, etc.) to set up a computer intrusion operation. 

Whatever the case, staff must be able to respond quickly and effectively.

Read also: Anti-counterfeiting

THE FIRST STEP IS THE “TRIGGERING OF THE ALERT”.

the attack will be taken into account by the IT monitoring service, one of whose missions is to detect the viral intrusion as soon as possible

Within the company there are dozens of people who each work in their own sphere of competence to ensure the smooth running of the work tool. In the event of a cyber attack, each person must be able to contribute their professional capital either to counter the attack or to compensate for it by proposing parallel solutions, solutions which will have had to be tested and then confirmed.

“MANAGEMENT AND ADRENALINE”

Take into account that an attack, whether physical or virtual, triggers an anxiety-inducing phenomenon. If the attack is minor, the adrenaline level of the personnel will not be affected more than that, but if the attack is brutal and consequent, general panic may set in.

Take into account the physiological reactions of each person with an adrenaline rush that can totally block initiatives, paralyse any decision if you are not trained. As the old saying goes: “easy training, hard work – hard training, easy work”.

Read also: Burglaries and agressions prevention

“PRIORITISATION”

To do this, it is necessary to set up a protocol that will define the “priorities” in view of the description of the situation. It is necessary to consider several scenarios in order to anticipate the cyber attack.

As soon as the attack is launched, the notion and management of time is essential, primordial, even vital for the company. Any minute, any quarter of an hour lost can be fatal if priorities have not been established and validated beforehand.

The virulence of the attacks is all the more important as the attackers have equipment in relation to their targets and the interests they are pursuing.

“CYBER ATTACK = STATE OF WAR”

The company must be able to draw on all its human resources and even recall those who are unavailable at the time: leave, internships, sick, etc.

A period of crisis is a time of war, each decision is taken according to the situation: observation, validation or invalidation and then we start again.

Take into consideration that the virtual attack affects all the links in the company’s chain, not just the IT department, in order to counter the attack or even to take decisions that are worse than the attack in order to preserve the company’s treasure, heritage and wealth. Each department must be able to communicate with each other.

It may be that all the decisions that will be taken will resemble an industrial gas factory, but the main thing is that it does not explode. It is also possible that the company will use obsolete skills that have become important again.

Read also: False transfer orders

“COLLATERAL DAMAGE: PARTNERS, CUSTOMERS

Next, know how to manage the clientele who may be the “collateral damage” of the situation despite themselves; this is the meeting point between the real world and the virtual attack. Communicate well with partners so that they protect themselves in turn, comment on what is happening and appear responsible.

A cyber attack is a painful experience and can be fatal in the face of this kind of disaster and the damage is irreversible if you are not prepared. Raising the level of security is not an option but a burden that must be part of security development.

“COST OF THE CYBER ATTACK”

A cyber attack has a cost: delay in projects, management of the attack (overtime, employee bonuses) and possibly in the extreme case a ransomware attack even if paying plays into the hands of the attackers.

“MAFIAS AND CYBER CRIME”

It is important to know that all the mafias in the world are moving towards cybercrime, a situation that is also very much taken into account by the ANSSI.

If total immunity seems unattainable, the responsibility of the head of the company is to put himself out of danger from these virtual attacks. To do this, investing in the training of his staff in this type of situation will prove judicious.

TRAINING

Realistic situations and stress

Our partner places your teams in a realistic situation of cyber attacks where each of the actors must take the high impact decision(s) with a minimum of information.
The participants are brought together in a room specially designed for this type of exercise.

Unique and innovative training

The training participants are fully immersed for a period of one to two hours in a cyber-attack.

Reaction and interaction

The exercise highlights the attitudes and behaviours of each person faced with the actions to be taken, the reactions and interactions caused by the situation. The solution will come from them.

Debriefing

The Anti-Cyber Attack exercise concludes with an in-depth debriefing to then communicate the keys and tools of crisis management.

Audience for the training

99% of companies are victims of cyber-attacks at least once a year.

Speakers: Company manager experienced in cyber-attack management and cyber security
Audience: IT Department, Senior Managers, Executives, Managers, Human Resources, Marketing, Sales, Legal and Finance
Number of participants: limited to 8 to 10 per session
Duration: 3 hours
Locations: Toulouse – Paris – Luxembourg

Our golf partner: www.golf-mediterranee.com

Skills Training

Airport safety and security

Aeroport_conseil_securite_protection_cannes-nice-monaco-france-russie-thailande

Building a project

It means knowing the airport safety and security issue from both an operational and institutional point of view.
More broadly, our partner acts as a legal and structural advisor in the airport field. 

Read also Terrorism Training Attacks Hostages

Areas of intervention

Air Transport and Airport Cargo Training offers programmes in airport security and safety.
The effectiveness of civil aviation security is the result of a commitment shared by all the actors involved. 
DGAC is developing a doctrine that defines a common framework for action, so that all stakeholders are involved on a daily basis in the implementation of security measures.

The French security doctrine

French security doctrine develops a prospective vision of security. First of all, to prepare, to draw up adapted action plans, and then to serve as a framework for international action. These are the conditions for the sustainable development of air transport.
Secretary of State for Transport emphasised the importance of sharing a doctrine. But also values in the service of ever safer air transport.

Read also Video alarm camera system

Audit, support and exercises

We use our skills in the context of an audit and pre-audit on site.
To this end, we propose the drafting of programmes and the drafting of specifications.
Following this, we carry out performance tests in an operational situation for security agents. For this purpose, we carry out intrusion exercises on site and the introduction of prohibited objects. 
We also address crisis management and the improvement of the crisis management plan.

Safer travel” film

To ensure the safety of air travel, it is not enough to multiply regulations and control procedures. It is a whole strategy that is implemented by all the players in the air transport sector (Ministry of Ecological Transition and Solidarity)

Read also: Closed Circuit Television CCTV

Our golf partner: www.golf-mediterranee.com

Training

Anti Terrorism Hostage Attacks

Terrorisme-attentats-otageconseil-securite-protection-nice-cannes-monaco-france-russie-thailande

Anti Terrorism Hostage Attacks Training: Attitudes and Behaviours to adopt.
Given the current national and even international events, many schools and companies are dreading this situation.
Being confronted with terrorist violence and finding themselves totally helpless in the face of individuals determined to harm and destroy.

Fighting terrorism

The course is therefore aimed at people of legal age who are in contact with open environments that are accessible to all individuals.
The module lasts 4 hours. 2.5 hours of theoretical presentation and 1.5 hours of containment/evacuation exercise depending on the size of the establishment.

Read also Installation of a video alarm camera system

Containment or evacuation

The advantage of this training is that all staff can be trained in a very short space of time. This is the practical solution for the employer and employees because everything is done on site and in half a day!

Read also: Airport Safety and Security

This module is divided into two parts:

Attacks

The first part deals with the active, violent section of the intrusion of an armed individual. The victim learns how to gain precious time to save his life and moreover the lives of the people around him. 
We insist on the acquisition of automatisms to have an effective reaction at the moment “T”. 

We are not talking about “good or bad reflexes”. Both safety and security require the acquisition of automatisms. 
We insist on the fact that this acquisition of automatisms has a positive effect on the stress experienced.

Read also: Protection of goods and people

Hostage taking

The second part deals with the passive, or even relatively calm, section experienced in the case of hostage taking.
It is a question of knowing how to manage a situation that is likely to last for some time. People deal with a psychological, behavioural and environmental sector involving physical and psychological management.

Read also: Fighting Cyber Attacks

Training – Session -Support

The session takes place with a pedagogical support (Keynote/PP) and video with reactivity.
Questions and answers are exchanged between speakers and listeners.

Public: All audiences
Number of participants: limited to 40 per session
Duration: 4 hours – 2.5 hours of theory and 1.5 hours of simulation exercises.
Location: Within your company

Formation Terrorisme Attentats Otages
Terrorism – Armed individuals – Hostages camps

Report NICE MATIN Training session at Royal Mougins Golf Club

Discover also: Video Alarm Camera System

Our golf partner: www.golf-mediterranee.com