ABOUT NEWRISK LIMITED
  Dr Sally Leivesley
  Catastrophic Risk
  Smart Cities
  Recent Media Commentary
  Contact Newrisk Limited
    - Media Enquiries
     
    SERVICES
  Lectures & Conferences
  Exercises
  The Exercise Group7
  Papers & Publications
  Workshops
  Risk Assessments
  Post Incident Analyses
  Continuity Planning
  Crisis Communications
    -  Media & Social Media
  Employee Preparedness
     
    EXPERTISE
  Audit Assurance Risk
  Aviation Security
  Biological Threats
  Catastrophic Risk
  CBRNE
  Chemical Threats
  Continuity Planning
  Criminal Justice
  Cyber Security
  Defence & Policing
  Disasters
  Education & Training
  Emergency Services
  Explosives
  Financial Threats
  Insurance
  London in 2012 Security
  Nuclear
  Radiological & Dirty Bombs
  Reputation Risk Management
  Risk Management
  Terrorism & Security
  Transportation Security
     
     

 

Risk Assessments

Newrisk Limited can assist clients to identify and assess relevant risks so as to determine prevention counter measures and responses. This identification and assessment process involves catastrophic risk analysis based on a model developed from the original doctorate research work by Newrisk Limited's principal adviser, Dr Leivesley. For further details of this risk assessment modelling process as applied by Newrisk Limited, please follow this link.

Newrisk Limited's principal adviser, Dr Leivesley, has designed stress tests of critical functions for companies and govenrments so that analysis of, and responses to, identified lacunae and vulnerabilities can be based on outcomes which have been quantified from the stress test workshop and field exercises.

Brief exercising and testing is recommended and timing is based on an analysis of each client's "critical period": this may be an hour or even a five minute period, depending on the critical period when an organisation may self-protect or when people are deciding whether to evacuate or shelter in the workplace. In the cyber realm, decisions may be taken within a tight time frame and therefore responses to critical decisions may need to be pre-empted for the purposes of systems design, so as to recognise and respond to threats - for example, when milliseconds may impact on the integrity of a communications system.

Critical infrastructure such as power stations, petrochemical and gas plants, rail control rooms and rail tunnels always benefit from extremely brief field exercises that use maintenance time or other opportunities (such as board meetings) to test systems and personnel in a practical and cost effective manner. Workshop exercises in certain sectors, such as the banking and finance sectors, may be conducted via an international video conference or other form of social media.

For previous lectures, conference papers and workshops on risk assessments, please click here.

To request Newrisk Limited's assistance in connection with a risk assessment or to discuss a tailored package of services, please contact Newrisk Limited directly.

 

Sally Leivesley


       DR SALLY LEIVESLEY




          BREAKING NEWS

  • Security 2018
  • Cyber!

Walk-in attacks by terrorists with guns, improvised explosive devices, knives & other weapons are happening in 2018. France has started to suffer significant threats from attacks directed at police using vehicles & guns.  Heroic police actions to protect the public have united the country.  In England, an attack using Novichok nerve agent on the former Russian Spy Sergei Skripal in Salisbury  has increased business sensitivity to international tensions & unconventional weapons.

Regulatory compliance with GDPR will be the top challenge for companies in 2018.   Nation State, organised crime and individual hostile cyber actors can be mitigated by well-trained workforce teams & confident, adaptive & innovative leaders. Cloud & third party providers & insider threats add to the regulatory burden on business. When one mastermind criminal can take a billion dollars out of the financial sector in four years the scale of business losses to poor performance in cyber operations is obvious.  Energy, banking and transportation are high risk targets and organisations with static unchanging security practices are possible consequential victims.