Most crisis events can be prevented by implementing effective planning and policies!

Proactive Services

  • Security Assessments

    The first step is to identify threats, vulnerabilities, and cost-effective ways to mitigate them within your organization. These assessments apply to secure travel, information security, physical site security, and employee safety.

  • Policy Development and Integration

    It's important to integrate risk mitigating factors into day-to-day processes to develop a comprehensive security program that contributes to organizational growth.

  • Change Management and KPI's

    Implementing new security programs is challenging. Proper processes are required to evaluate performance and adapt to changing risks.

  • Tailored Technology Solutions

    We combine proven standard operating procedures with tailored technology platforms, building databases that cater to your unique objectives and security management needs.

  • Security Management Online

    Predictions is Morton Executive Decisions' integrated security, journey, and crisis management solution, which is built and ready to use.

  • Unique Project Management

    Our team of experienced security professionals is equipped to handle any project, from program development to crisis response.

Operational Continuity in a High Threat Environment

Summary: This case study describes how a non-profit organization providing orphan and adoption services worldwide retained Pete Morton to assess operational risk and create policies for an at-risk orphanage in one of the world's most volatile countries. The orphanage, which accommodates over two hundred children and staff, including special needs children, was at risk of being taken over by local militia due to civil unrest and indications that the host nation's federal government was heading towards a failed state status.

Problem: Pete Morton identified the vulnerabilities in the organization's security program and recommended mitigating services and procedures, including developing policies and training local employees on-site. The threats to the property and people on campus identified included theft of equipment, militia seizure of the campus by force, kidnapping/hostage of vulnerable children and staff, assault/abuse of children on campus, murder of residents on campus, and targeting of the campus due to perceived access to resources.

Solution: A new security company was contracted through Pete's trusted network of security providers, which provided an additional headcount of professionally trained and equipped guards at less cost. He also recommended and oversaw the construction of evacuation routes off-campus and additional physical security measures, including lighting, interlocking security walls, and gates. He provided policies for managing contracted security guards, emergency evacuation (country and local levels), crisis response, and security transportation in high-threat environments. He also trained employees and contracted security guards to ensure a smooth transition.

Results: Due to the implementation of comprehensive and effective security policies, the orphanage is still in operation, and the children housed there live in a relatively safe environment despite the country spiraling into a failed state without elected officials or reliable law enforcement. The organization saved resources that could be spent growing its ability to help other orphans and special needs children worldwide.

Conclusion: The proactive approach taken by Pete's client and the implementation of commonsense security measures allowed the organization to continue functioning and provide critical services in a high-threat environment, demonstrating the importance of risk assessment, policies, and security training in ensuring operational continuity.