Security and Risk Reviews
Connley Walker provides security and risk reviews in accordance with the Australian Standard for Risk Management AS/NZS ISO 31000:2009 and the Australian Government Protective Security Policy Framework (PSPF).
Security and Technology Design
Our design expertise includes physical security measures, CCTV, access control, intruder alarms, Type 1 alarms, perimeter security, biometrics, weapons detection, IT security, communications, AV systems and architectural design.
Our security management service includes the provision of staff on a full or part time basis to manage an organisation's security needs and the security contractors that they employ. This service often results in lower operational costs to the client..
What We Offer
REVIEW AND AUDIT
Reviews and audits provide a realistic picture of a company's position. The areas that Connley Walker specialises in are: Security reviews and risk assessments Operational risk management reviews Technology reviews of security IT and communications systems Maintenance and Procedure Audits.
- Security Risk Assessments.
- PSPF Compliance Audits.
- Technology Audits.
- Operational procedure compliance.
Design services offered by Connley Walker include complete system design of security, communications and information technology systems. The designs provided are completely independent and as such represent the client's best interests. Our design services include:
- Development of client needs brief.
- Detailed design.
- Specification documentation.
- CAD drawings.
- Documentation of tenders.
- Tender issue and evaluation.
Connley Walker offers risk and project management services. These services include:
- Review of management strategies.
- Development of policy for acceptable level of risk.
- Review of current risk management strategies.
- Provision of benchmark comparative costing for risk management of similar industries.
- Development of risk management policy and procedures.
- Development of risk management strategies.
- Development of security operational and emergency procedures.
- Development of business continuity plans.
Our professional project management ensures that suppliers implement systems in accordance with required designs. Project management services typically include the following components:
- Issue of tender documentation to suppliers.
- Evaluation of tender bids.
- Establishment of works program.
- Coordination with other services.
- Evaluation of samples.
- Administration of progress claims.
- Regular progress reporting.
- Inspection of works in progress.
- Commissioning of systems.
- Final inspections.
- Review of final documentation.
- Coordination of training.
- Implementation of procedures
Why Choose Us
We are SCEC Endorsed Security Zone Consultants
Why choose SCEC Endorsed Security Zone Consultants?
The Australian Government encourages its departments and agencies to utilise the services of a Security Construction and Equipment Committee (SCEC) Endorsed Security Zone Consultant to establish appropriate physical security environments for the protection of official information and assets.
SCEC Endorsed Security Zone Consultants have been trained and examined by ASIO. Security consultants that are not SCEC Endorsed do not have the same level of training or access to information.
We have ISO 9001:2008 Quality Procedures
Our Quality Procedures include Security and Risk
Our ISO 9001:2008 compliant procedures specifically includes Security and Risk management capability. This ensures that our methods for carrying out reviews and designs are delivered within a quality assured framework.
Many organisations have basic quality assurance, but are not accredited for Security and Risk.
Our staff have government security clearances
Why are security clearances important?
A government security clearance is granted after a series of assessments and background checks have been successfully completed. These are undertaken to ensure that people entrusted with access to security classified information or resources are eligible, suitable and can be trusted to safeguard them.
If your security consultant does not have a security clearance, it will be important to ask why.
We are fully independent and have high intregity
Why does independence matter?
Our independence ensures our integrity. As independent security and risk consultants we do not provide any insurance, guards, equipment, installation services, investigation services, employment services or any other item that may be a recommendation in our reports. In this way clients can be confident that our recommendations are free from pecuniary interests.
All staff are provided with training in relation to conflicts of interest and we have clear policies to prevent the giving or accepting of gifts.
We contribute to security research
Our research partners
Connley Walker is currently in partnership with the University of Western Sydney, Western Australian Department of the Attorney-General, Family Court of Australia, Courts Administration Authority, Magistrates Court of Victoria on a significant security related research project.
By contributing to research Connley Walker have access to the latest thinking in security.
We represent Engineers Australia on Aust. Standards.
This contribution to the development of security related Australian Standards ensures that we are always up to date with current best practice and can advise clients of impending changes to standards.
We are genuine specialists
We are genuine security and risk consulting specialists. Unlike IT, building services or general technology consultancies, we are genuine security and risk specialists.The solutions we offer will therefore take into account all environmental, physical, managerial, procedural and technology security and risk treatments, not just technology. Our research is focused on developments and current best practice in this specialty.
At Connley Walker, security and risk is not simply an add on to the services we provide, it's our core business.