Security Risk Management
Kenton Rogers uses a holistic approach that addresses all aspects of your security and operational risks,
providing an extremely robust security plan. Our diverse skill-sets enable our experts to manage projects
from inception to completion, to include a sustainable inspection and management plan.
Our team has experts in multiple related operational disciplines such as information security,
infrastructure and physical security as well as crisis management. We also have some of the best guard
force trainers in the world. Our knowledge and insight translates into best practices and proven
strategies that will help you anticipate and respond to a myriad of operational and employee safety
challenges with confidence.
Kenton Rogers has a tremendous depth of knowledge and experience in many fields of security risk management and security. Specializing in security education and inspection regiments, basic and advanced guard force training, hospitality, transportation, and energy conservation and management. Due to security risks being interconnected and ever-evolving, customers can count on Kenton Rogers for expert advice on the widest range of security services to manage organizational or individual risk mitigation services.
Kenton Rogers can help you create a robust security environment with services that include threat
assessments, policy reviews and development, as well as evaluating and developing an overarching
Security decisions you make today can determine your organizations security and resilience for years to come. Our comprehensive security consulting services enable you to feel more confident about the actions you take to protect your family, office, employees, facilities and assets.
Our security consultants have decades of experience advising Department of Defense, individual and corporate clients that cover the vast industry, from construction, manufacturing, education and government agencies. We can help you create a robust security environment with services that include current and emerging threat assessments, policy review and development, and master planning.
There are physical, operational and cyber components to protecting intellectual property. By looking at your security challenges from several vantage points, a Kenton Rogers security specialist can help you better prevent, plan for, and respond to threats.
Our Vulnerability assessment methodology begins with an in-depth security review.
No matter the focus of your assessment, we apply a time-tested methodology where we:
- Look at current areas of exposure and any past security incidents to identify potential vulnerabilities.
- Interview employees and other key individuals for critical insights and information about situations, policies, and procedures.
- Provide a gap analysis to isolate areas where your security program does not meet industry best practices.
- Make recommendations and guide you in implementing measures to mitigate any areas of vulnerability to reduce your risk.
Security Policy and Procedure Development
Do you have policies and procedures that cover risk like workplace violence, bomb threats, active
shooters or natural disasters? How about executive protection or travel to high-risk areas? How do you
know if current procedures will be sufficient or effective?
Given the complexity of most organizations, developing effective security programs can be an overwhelming task. As a world leader in physical, cyber, and corporate security, we can help you create security policies and procedures that work together to close the gaps that might otherwise expose your organization to greater risks.
An effective security program must cover many scenarios and clearly define the duties and expectations for everyone in your organization. From the security department to management and employees as well as third parties like local emergency responders. Taking a multidisciplinary approach, we can review your current security policies to ensure they cover your current risks and vulnerabilities. If you find that your current policies are insufficient or ineffective, we can develop security policies and services tailored to the exact risks you face. Ensuring that all are within the laws and regulations of each country in which you operate. Depending on your needs, we can assist with either comprehensive security programs or individual components, such as access control, workplace violence prevention, or executive protection.
Security Training Services
Kenton Rogers has extensive experience providing security training calibrated to each client’s needs.
Whether they’re brief, one-day introductory sessions, refresher programs, or multi-day training
Our training can encompass broad points of view or it can cover narrow solution-oriented presentations to meet the challenges of specific business units. We work with the individual business to understand their needs and what training they need, then customize presentations and training around the staff, facility and risks. Our work is tailored to each client because we understand that each client is unique and so are their requirements.
Travel Security Training
Kenton Rogers’ training programs will educate your organization to protect professionals traveling the
globe and detect the warning signs of an incident before it occurs. We will dive into a rich understanding
of the information that is accessible in each country, it’s relative accuracy and reliability, and the
frequently delicate balance between politics and business.
We can provide scalable travel security training sessions for as many as 50 people or for a small team of senior executives at any location.
- Extensive presentations to your security professionals, which can be shared and passed on through your organization.
- Open discussion with the employees responsible for travel security implementation and monitoring.
- Easy to implement introduction to company travel policy and procedures.
- Table-top and scenario based learning to build the confidence of your team.
CEO, Kenton Rogers
Jason Beighley is an accomplished product consultant and user-focused developer. He served 25 years in the United States Army, retiring as a Sergeant Major in 2009 as the Senior Enlisted Advisor for the R&D Directorate in the highest-priority combat unit in the Army. His acute sense for what works in a high-performance environment helps guide product-development for his clients.
He served as the lead for the R&D team that fielded the Heckler & Koch 416 rifle to Army SOF in 2005. His efforts directly contributed to the timely release of this new rifle and a huge leap forward in capability for SOCOM elements. He possesses a deep understanding of the intersection that exists between the two opposing sides of the design and development equation: the on-the-ground need for performance of the end user, and the real obstacles that are faced by the design/engineering team. He is also an accomplished trainer of tactics and decision-making for military SOF and local law enforcement across the US.
COO, Kenton Rogers
Ken Shriver Army Veteran, serving 21 years. He is a graduate of the Army Sniper School, where he earned the honor of “Top Gun” for best shot in his class. He later served as an instructor at the U.S. Army sniper school, and served in a variety of real world sniper operations in multiple theatres. He conducted Counter IED training for the 101st Airborne Division as part of the first division level Counter-IED unit, as well as serving as a Brigade Senior Counter-IED team lead while deployed. He has conducted Anti-terrorism and force protection duties for multiple unit locations and has helped to advice on security related issues while serving as a First Sergeant at Ft. Irwin. He has also deployed three times as an Infantry Platoon Sergeant and served as a First Sergeant for three separate Companies including serving as a Sergeant Major an Observer Controller Team at the National Training Center.
His Antiterrorism training has given him the appropriate background, skills, and abilities to qualify as an Antiterrorism Officer (ATO) and conduct Level 1 Antiterrorism (AT) briefings. He was trained in the duties and responsibilities of ATOs at DoD facilities or installations around the world; able to discuss AT awareness, terrorist group operations, terrorist use of weapons of mass destruction, active shooter threat, and insider threat; and can explore the companies AT plan by examining physical security considerations, the antiterrorism planning process, and the Companies resource management. He can help Companies understand the National Industrial Security Program (NISP) policy requirements, best practices, and instructional methods for developing and implementing a security education and training program.