Safe Travel in Risky Environments Seminar

Hostile Environment Awareness Training (HEAT)

In today’s world, risks can emerge anywhere—whether you’re traveling for business, working in a high-risk region, or navigating unfamiliar environments. Are you prepared to stay safe and in control?

Our expert-led training, delivered by seasoned security professionals with government, commercial, and nonprofit experience, covers critical skills:

  • Situational Awareness: Learn to identify threats before they escalate.

  • Risk Mitigation: Master strategies to reduce vulnerabilities.

  • Crisis Response: Act decisively in emergencies, from evacuations to medical incidents.

  • Secure Travel: Navigate high-risk destinations with confidence.

Security and Safety Training

  • Basic Courses

    Our basic security training can be easily completed on your schedule via virtual platforms like Zoom.

  • Hybrid Courses and Seminars

    Unable to attend a 3-day seminar? No worries! We can provide virtual coursework and schedule the hands-on portion at your convenience.

  • Mission Focused

    Each organization has its unique needs. We will assess your mission and customize your training accordingly.

  • Mobile Training Teams

    Our training has been conducted all over the world, including some of the most challenging environments. We offer training through our partners in the United States, or we can come to you wherever you are.

  • Interactive

    Practical application is the most effective way to affirm understanding in safety training. Our trainings are relevant to crisis avoidance and reaction.

  • Curriculum Development

    We can create a curriculum, train your people, and teach your internal personnel to continue the training long term.

Peter Morton Peter Morton

Secure Comms in Risky Environments

Secure communications while operating in risky environments is critical to mission success as well as the safety of employees. Join Peter L Morton CPP of Morton Executive Decisions as he discusses some of the platforms he is comfortable using as well as techniques to ensure information security.

Read More