Bespoke Risk Solutions

Risk Management

Risk management specialisits in Public Health, Local and Federal Government, , High risk deployments, Aviation, Defence and NGO travel

Business Resilience

Business Continuity and Operational Resilience, specialising in APRA CPS230 and CPS232 implementation

Crisis Management

Inicdent and Crisis Management policy, process and software development. 

Services

Security consultation

Specializing in the assessment, development, and implementation of security risk management strategies, programs, and capabilities, our Security Consulting team is dedicated to ensuring the safety and resilience of your organization. We provide customized consulting services tailored to align seamlessly with the unique requirements of your business.

Regardless of your business's size or sector, our security consultants possess the expertise to evaluate your organization's resilience to risk. We go beyond assessment by offering strategic guidance and providing essential support to elevate your security program. Collaborating with us empowers your organization to strengthen readiness and response capabilities, addressing a broad spectrum of security risks, including specialized areas such as hostile environment residential and travel security.


Our security consulting services

To connect with our experts regarding our security consulting services, consider the following key areas of expertise:

  1. Strategic vision:

    • Validating the vision for your program.
    • Delivering strategic roadmaps to support program establishment, optimization, and transformation.

  2. Digital solution design:

    • Identifying, simplifying and systemizing processes.
    • Custom design and implementation of end to end process based digital applications resulting in increased workforce efficiency and reduced duplication of effort.

  3. Governance Development:

    • Examining frameworks, policies, standards, and guidelines to formalize your security program.
    • Ensuring consistent application of security practices within your organization.

  4. Contract Structure:

    • Establishing a structure, staffing, and operating model aligned with your strategy and organizational needs.

  5. Benchmarking:

    • Allowing you to assess how your security programs and practices compare against industry standards such as ISO31000

Physical and electronic security

Third Wave Consulting specializes in threat-based and risk-appropriate security designs, integrating layered technological and physical security controls into the planning of infrastructure projects. Identifying key stakeholders, we collaborate to understand your specific security risks, operational requirements, and design needs.


Our Consulting Team utilisies it's decades of relevant, real world experience as former Heads of Security to ensure clarity of purpose, holistic security, and cost-effectiveness.


Whether the objective is updating or integrating CCTV, systems, access control points, alarm systems, guard force or patrols, we have the necessary experience and skill set to quickly assess, advise, and implement security plans.


Fundamental aspects of our approach include:


Risk Assessment:

  • Developing bespoke risk-appropriate practices to identify controls that effectivey mitigate risks and align to the overall strategic vision.
  • Assessing the vulnerability of people and physical assets against recognized threats.
  • Review the effectiveness of risk recording tools used to inform decison makers.
  • software Identify and document potential hazards or risks associated with the activity, process, or project.
  • Establish contingency plans for high-priority risks that cannot be fully eliminated.
  • Define actions to be taken if a risk event occurs to minimize its impact.
  • Regularly review and monitor the effectiveness of risk mitigation measures.
  • Update the risk assessment as the project or environment evolves.
  • Clearly communicate the identified risks, their potential impact, and the mitigation strategies to relevant stakeholders.
  • Document the entire risk assessment process, including assumptions and methodologies used.
  • Prepare and distribute reports on the status of identified risks and the effectiveness of mitigation strategies.
  • Assign responsibility for managing specific risks to individuals or teams.
  • Clearly define roles and responsibilities related to risk management.
  • Ensure that the risk assessment process complies with relevant laws, regulations, and industry standards.

Risk Culture and Training:

  • Foster a culture that encourages proactive risk management at all levels.
  • Provide training and awareness programs to enhance risk management skills with key staff and the wider organization.


Crime Prevention through Environmental Design (CPTED):

  • Implementing strategies such as natural surveillance, territorial reinforcement, lighting and defensible space to create environments with greater resilience to crime and other threats.

Control Design:

  • Delivering solutions that are not only risk-based and proportionate but also robust, integrateable, data-informed, and cost effective.


Bespoke Solutions:

  • Tailoring security measures to the unique characteristics and requirements of each project, considering factors like location, industry, sensitivity and risk tolerance.

Bespoke Software:

  • Tailored software applications or systems designed to address specific business processes or requirements. These solutions are developed to fit the unique workflows and needs of a particular organization.

Bespoke Training Programs:

  • Tailored training programs designed to meet the specific learning objectives and requirements of an organization or individual. This could include customized content, delivery methods, and assessment criteria.


Risk Based Designs:

  • Using data to ensure designs are not only effective in enhancing security but also provide the best return for investment, ensuring optimal use of resources.

Contract optimisation

Our Security Consulting Team specialises in the review, development, and streamlining of security risk contracts. 


With our thorough knowledge of operational security risk management, and extesnive experience managing and optimising security contracts, we assist you in maximising the performance of your security contract.  

Whether you are considering an in-house security model or wanting to ensure your contract is performing at its best, Third Wave Consulting has the skills and  experience to tailor a solution to your needs and provide advice on where to find efficiencies in resources, rostering and contractual terms.

With decades of real world application experience in contract management, Third Wave Consulting are perfectly positioned to enhance value alignment, interteam cohesion and cultural uplift. We are dedicated to providing insights and solutions that ensure your organization remains agile and resilient in the face of constant change. 

Occupational Violence and Aggression

At Third Wave Consulting, we are committed to providing comprehensive support in workplace violence prevention and response, ensuring that your organization's safety measures align with the highest industry standards.

Leveraging our extensive operational and program management expertise, Third Wave Consulting collaborate with clients to develop occupational workplace violence prevention proven in their application. 

Key approaches include:

Contextual application:

  • Assisting in prevention and threat management with expert operational guidance.
  • Providing effective, real-world strategies based on our extensive experience to assess and mitigate threats to workplace safety.

Education:

  • Collaborating to implement a robust and auditable duty of care program for employees, emphasizing both prevention and response considerations.
  • Offering tailored, in-person workshops and virtual courses designed to suit specific threat environments and accommodate hybrid working environments.

Policy and Control Gap Analysis:

  • Assisting in building a workplace violence program or identifying vulnerabilities in existing structures.


Business resilience

Leveraging our extensive operational risk and crisis management expertise, we collaborate with clients to develop robust business resilience frameworks that enhance their ability to anticipate, respond to, and recover from various challenges, ensuring long-term sustainability and success.

Our approach to enhacing business resilience includes:

Risk Management:

  • Identify and assess potential risks to the organization, including financial, operational, strategic, and reputational risks.
  • Develop strategies to mitigate, transfer, or accept identified risks.
  • Developing and maintaining a business continuity plan outlining procedures to ensure critical business functions can continue during and after a disruption.
  • Identifying key personnel, resources, and technology necessary for business continuity.

Crisis Management:

  • Establishing a crisis management team and define their roles and responsibilities.
  • Developing communication plans and protocols for internal and external stakeholders during a crisis.

Emergency Response Planning:

  • Developing plans for responding to immediate threats or emergencies, including natural disasters, cyber-attacks, or public health crises.
  • Conducting drills and training to ensure employees are prepared to respond effectively.

Adaptability and Flexibility:

Foster an organizational culture that values adaptability and innovation.

  • Develop flexible business models that can adjust to changing market conditions.

Training and Awareness:

  • Educate employees at all levels on the importance of business resilience.
  • Provide training and awareness programs to ensure employees understand their roles in implementing resilience measures.

Continuous Improvement:

  • Regularly review and update business resilience plans based on lessons learned from previous disruptions.
  • Conduct post-event analyses to identify areas for improvement.


 

About us

Excellence in all aspects


Third Wave Consulting is a nationally recognized specialist risk consultancy dedicated to fostering secure, compliant, and resilient organizations. Leveraging unparalleled expertise, extensive experience, and a wide-reaching network, we harness the potential of data and technology to offer the insight and intelligence necessary for staying on course, seizing opportunities, and fostering growth.

At Third Wave Consulting, we possess a profound understanding of risk, enabling us to navigate uncertainty and empower our clients to make informed decisions. Our commitment to progress keeps opportunities advancing, allowing organizations to contribute positively to the communities and environments they operate in. Through a combination of insightful analysis and extensive experience, we work towards mitigating threats in all their forms.

 

Meet the founder

James Field is a seasoned professional in incident and crisis management. With a wealth of experience in the field, James is currently at the forefront of ensuring operational resilience and security for a major financial institution.

Previously, James held the position of Head of Security for local government entities and private health organizations, where he successfully implemented robust security protocols and safeguarded staff, customers and critical assets. His strategic leadership played a pivotal role in creating secure environments for both public and private sectors.

Beyond his expertise in security and crisis management, James is deeply passionate about process optimization through digital platform development. He thrives on leveraging technology to streamline operations and enhance efficiency. His innovative approach to integrating digital solutions has contributed significantly to the overall effectiveness of various organizations he has been associated with.

One of James' key focal points is preventing occupational violence and aggression. He is dedicated to creating safe and supportive workplaces by implementing proactive measures and fostering a culture of respect. His commitment to this cause extends beyond his professional roles, as he actively advocates for strategies to mitigate workplace violence risks.

James is not only a professional in his field but also a thoughtful leader, sharing insights on risk management, crisis response, and digital transformation. His multifaceted background and commitment to excellence make him a valuable asset in navigating the complexities of modern security challenges.

Outside of his professional pursuits, James enjoys staying abreast of the latest developments in technology, reading on various topics, and engaging in activities that promote personal and professional growth.

Connect with James to explore the intersection of security, technology, and workplace well-being, and witness firsthand the impact of his dedication to creating resilient and efficient organizations.

Our clients


Maintaining confidentiality is paramount in our work with a diverse range of organizations, and as a standard practice, we refrain from disclosing client identities. Our clientele encompasses both national and multinational enterprises across various industries, law firms, government departments from diverse regions, and an expanding array of non-governmental organizations. Additionally, we extend our support to small and medium-sized companies, both nationally and internationally, guiding them on their path towards enhanced security, compliance, and resilience. Regardless of the size or nature of the organization, our commitment to ensuring confidentiality remains unwavering.

Security consulation

" I  just wanted to say thank you for all your leadership and innovation when you worked with us. We continue to benefit from having had you as a member of our leadership team and your legacy lives on." 

Security training

" Our security group are well embedded, valued and trusted now.  You set us up for success and I find myself returning to your advice and suggestions repeatedly around setting clear objectives and rehearsing the preferred skills rather than allowing rehashing of incorrect actions. "

Crisis Management Application

" You have clearly found your purpose in life, my only worry now is that when we implement our enterprise solution it will be taking a step backwards in capability. "

Contact us