Sample of Consulting Contract Report Intro Summary to Customer (released with their permission and redacted at their request)

The following summary came from a physical and internet security assessment completed by CGPGMG, LLC and Countermeasure Consulting Group, LLC a few weeks ago at no cost to the business because of serious mitigating factors. One, the company has major threats daily and second, employees were not feeling safe at work. The company also believed…

Consulting Legal Teams in Police Related Strategies

Legal Team Consulting in Police Related Strategies The unique service, consulting defense attorneys, is a hard find because more often than not, officers do not want to delve back into the situations from which they just departed. The services offered through CGPGMG, LLC include consulting prosecution and defense teams utilizing strategies from a police officers…

Thoughts About Security and Risk Management Consulting – Who to Hire?

As a requirement dictated by Occupational Safety and Health Act (OSHA) requirements and Civil law, the growing number of companies purporting to provide security and risk management training is increasing with each violent workplace incident. The solution to selecting a qualified company for this delicate task is expertise in the field and qualified individuals with…

Limit Lines as they Pertain to Perimeter Security

The typical purposes for perimeter security is to ensure the first step in a layered approach of boundaries exist.  Protection has several facets that include layering, architectural, environmental (natural or by design), and achieving this comes from planning.  The purpose of any portion of security begins with the planning process to discover what is in…