Effective security requires

  • a holistic approach

  • an experienced approach

 

Process

The focus of the Legacy Security Consulting process is to determine and implement a solution that is sensitive to the needs and requests of each company. Because of our diverse experience working with the different departments of a business, we are uniquely able to implement a Converged Security approach by extracting and leveraging the specific and pertinent information each department has available. Our informed process is built on both collaboration and cooperation for the most appropriate, cost effective solution. 

  1. Discovery

    The first step of our procedure is to identify and understand the issue causing concern for your company.  We will educate you on how Legacy goes about using their unique and fresh Converged Security approach to address your company’s Security or Fraud Management challenges.

  2. Assessment

    We will detail and outline the scope of the project.  Collaborating with your senior executives we will develop priorities and review various solution strategies that will align with your desired outcomes.  A key part of this phase is to identify the various trusted internal and external technological and talent sources that will be called upon to implement/affect a Converged Security solution. 

  3. Recommendations

    We will thoroughly discuss with you our recommended course of action and what each action is designed to accomplish.  Your expectations are important to us.  We will always be willing to openly discuss expectations in an honest and frank manner. 

  4. Implementation

    We will set forth on the agreed course of action keeping open lines of communication throughout the project. 

  5. Remedies

    Experience has shown us that solutions to prevent future issues or incidents are presented throughout the course of the project.  We will ensure recommended solutions are understood and an implementation strategy is explored.  Since our mutual desire is to avoid future Security and Fraud Management issues we stand ready to monitor solution compliance if necessary.

  6. Prevention

    Assuming your desire to avoid repeating costly past mistakes, we will work to educate your senior executives how they might monitor and audit the remediation and preventative steps we recommend for your company.

  7. Security Awareness Training

Education is the most cost effective method to minimize costly Security and Fraud Management incidents.  We can customize Security Awareness Training plans to protect all of your company’s assets including the most important investment, your employees and associates. 

 

Testimonials

  • “Ron's extensive experience in security and fraud prevention has been integral in protecting our company's reputation and preserving consumer confidence in our product offerings.”   Pat Butler, Western Union, VP - CFO Accounting

See what security we can provide: 

  • Converged Security
  • Fraud Management
  • Behavorial Threat Assessment
  • IT Risk Assessment
  • Product risk Assessment
  • Physical Security

 

Get to know Ron and see what he’s thinking: 

Ron’s blog offers information about effective security solutions that can benefit your staff and your office. Read the latest!