loader image

Our Services

Combining extensive international experience with a well-established local footprint.

7

Red Teaming

Red Teaming is a targeted and objective-led exercise that is designed to identify weaknesses in all layers of a company’s defences to protect its assets. Unlike traditional penetration testing that concentrates on identifying vulnerabilities in technological applications, Red Teaming will equally expose vulnerabilities regarding people and physical risks.

Anti-Counterfeit Operations

Brand infringement and the counterfeiting of commercial goods has a detrimental effect on the corporate sector, causing financial and reputational harm to the licensed manufacturers and brand holders of these items. Africa has not been spared the global threat that the trade and distribution in counterfeit goods poses, often being used as a conduit for the movement of such goods.

Crisis Management

A crisis can occur because of an unpredictable event and usually requires that decisions be made timeously to limit damage to humans, the environment, and the assets of the organisation.

C2 Capabilities is a consulting firm developing and implementing risk and security management strategies for South African companies who want to align their strategies with international standards, as well as international companies operating in South Africa.

Market Intelligence

Market entry intelligence gathers information relevant to a company’s market, trends, competitors, as well as customers. The intelligence often assists in determining market opportunity and how to best enter the market. Market entry intelligence additionally looks at the regulatory environment and how this can impact a business’s operations.

We often consult local competitors in the industry, industry experts and officials to give commentary on various aspects of the market and give the client an on-the-ground picture of how business really is conducted, what is happening at the time and possible predictions for the future. Based on the intelligence provided, the client can make an informed decision on how to enter a market or increase its competitive advantage and thus maximise its gains.

Anti-Counterfeit Operations

Brand infringement and the counterfeiting of commercial goods has a detrimental effect on the corporate sector, causing financial and reputational harm to the licensed manufacturers and brand holders of these items.

Africa has not been spared the global threat that the trade and distribution in counterfeit goods poses, and is often used as a conduit for the movement of such goods.

The success of our service is based on credible and actionable intelligence, in an environment where a deep understanding of the counterfeiting problem combined with strong working relationships are key to positive outcomes.

Crisis Management Training

All entities need to conduct initial and refresher crisis management trainings. The scope and depth of the training depends on the nature of the entity’s activities and can involve the crisis management team only or all employees.

Training must be reinforced and tested with periodic drills and exercises and can be conducted as tabletop exercises in a conference room; evacuation and shelter-in-place drills for all employees; walk-through of an emergency plan; or a full exercise simulating a crisis and involving other departments and outside response agencies.

Conducting regular trainings enables companies to confirm the workability of a plan or a part thereof; determine the level of staff awareness and training; and evaluate the adequacy of emergency communications, evacuation procedures and other elements of their crisis management plan.

Security Awareness Training

Research suggests that the majority of security breaches involve human error. Security Awareness is the knowledge and attitude of staff members or business owners regarding the protection of informational and physical corporate assets. Effective Security Awareness Training assists staff in understanding their role in combating security breaches, the risks associated with some of their actions, as well as learning how to mitigate and counter these risks. Additionally, the training is making staff aware of (new) modus operandi of adversaries which equips them with the necessary skills to address potential threats.

Background Checks

A thorough, fairly executed Background Checks and Pre-Employment Screening program is key to the success of any business. Losses due to employee misconduct, internal theft, workplace violence or inadequate qualifications can cause significant damage. However, these losses can be mitigated or even prevented by conducting confirmatory yet investigative Background Checks to find the most appropriate person for a position or as an outside expert.

In a global business environment, multinational candidates to positions can pose a unique challenge to Pre-Employment Screening. While easier to conduct in some countries, in many African countries the lack of databases makes it more challenging. Our network allows us to conduct Background Checks for you in jurisdictions that may not be as easily accessed. Varying data protection legislation can pose additional obstacles and need to be observed whilst still obtaining as much of the required information as legally permissible.

Red Teaming

Red Teaming is a targeted and objective-led exercise that is designed to identify weaknesses in all layers of a company’s defences to protect its assets. Unlike traditional penetration testing that concentrates on identifying vulnerabilities and exposing them in technological applications, Red Teaming will equally expose vulnerabilities regarding people and physical risks.

The purpose of a Red Team is to simulate real-world attack scenarios by identifying vulnerabilities and exposing them, using a clandestine approach, thereby ensuring impartiality and confidentiality in a realistic environment.

By adopting a strategy commensurate with a company’s needs, Red Teaming can be upscaled or downscaled, thus not only being flexible but cost-effective for the business.

Crisis / Emergency Management

A crisis can occur because of an unpredictable event and usually requires that decisions be made timeously to limit damage to humans, the environment, and the assets of the organisation.

The severity of an event can be distinguished by the level of impact it has on the business itself. Crisis Management (also referred to as Emergency Management) usually becomes necessary when a situation with a high level of uncertainty disrupts the core activities and/or credibility of an organisation and requires an urgent and highly structured response.

C2 uses an All-Hazard Approach to draw up crisis plans, that can be utilised in a variety of different scenarios but contain threat-specific annexes, which include more detailed instructions. This approach acknowledges the fact that regardless of the nature of the crisis, many managing and organising requirements are similar.

Business Continuity

Business Continuity is the capability of an organisation to sustain an acceptable level of operations or reinstate operations as quickly as possible following a disruptive incident. Whilst Crisis Management deals with the disruptive event itself, Business Continuity handles the resumption of business operations.

A Business Continuity Plan focuses on a company’s ability to identify and sustain core operations, functions and services through formal recovery processes and strategies.

Business Continuity Management is based on a Business Impact Analysis that identifies and prioritises all activities which contribute to the processes that deliver the prioritised products or services. By defining a maximum tolerable downtime period and identifying contingencies and required resources to resume operations as quickly as possible, the company can mitigate the consequences of an undesired event and institute recovery in a timely manner.

Security Audits

Security systems protecting residential or corporate premises are an intricate system of physical, technical and procedural measures that – in a best-case scenario – work in unison to achieve the best overall protection possible. A Security Audit is the assessment of an existing security situation and recommending positive changes and modifications. During the audit, existing measures and potential vulnerabilities are evaluated during a site survey. Often, measures are redundant or not fit-for-purpose because they have not been revised or additional measures have since been implemented.

A Security Audit takes a holistic approach and considers security systems in their entirety, takes into account the interdependencies of the components, and recommends the streamlining of processes to achieve the best possible synergies and avoid redundancies.

Due Diligence

By definition, Due Diligence is the research and analysis of a company or organisation that is to be expected from a reasonable and prudent person under particular circumstances; not measured by an absolute standard, but dependent upon the circumstances of a particular case.

The difficulty of gaining intelligence in foreign countries and a lack of specified resources, to determine the reliability of potential collaborations and joint ventures with unknown companies or individuals, can often pose risks that could be detrimental to the success of any business venture. One of the most efficient methods to avoid these risks is to undertake a Due Diligence investigation.