Chameleon Associates has been providing comprehensive threat mitigation solutions, training and products to government, law enforcement and the private sector since 1992.
Nouveau!! Predictive Profiling en français pour nos clients francophones. Il s’agit d’une méthode qui vous permet, étape par étape, d’évaluer la menace dans le cadre du modus operandi d’un criminel ou d’un terroriste. L’objectif de ce cours est d’amener les participants à penser de manière différente et surtout, de se positionner à la place de l’adversaire.Pour en savoir plus, veuillez cliquer ici.
Chameleon brings a unique, no nonsense approach to school security that begins with a study of the adversary's capabilities against the school. Taking into consideration each school's individual needs, we offer sensible and do-able security solutions that mesh with our clients' organizational culture and their practical constraints.
Read rave reviews from Security Management (ASIS)magazine for Security Questioning 101 online course. Questioning is a critical component of an effective security system. It's cost effective and hardens a target. Yet, questioning training is hard to come by. Not any more! Link here to check it out.
NEW Principles of Proactive Security on-Demand Webcast
Principles of Proactive Security brings you into the classroom from wherever you may be. It is internet based, so that you can view and learn from this full 3.5 hour webcast presentation from the office or home, at your convenience and leisure. This webcast is the perfect alternative for those unable to attend a Chameleon face-to-face training.
The NEW Countering the Insider Threat seminar hosted by the European Corporate Security Association covers a wide range of potential threats that come from within an organization, and plague both private companies and government or military entities alike. This unique course offers students step by step methods for understanding and mitigating those threats. Insider Threat is suitable for anyone tasked with preventing any kind of threat that comes from within: theft, espionage, sabotage, hacking, infiltration, whistle-blowers and much more