{"id":175,"date":"2017-09-10T03:12:37","date_gmt":"2017-09-10T03:12:37","guid":{"rendered":"http:\/\/wso-security.com\/consultoria-en-gestion-de-riesgos\/"},"modified":"2021-02-22T07:28:35","modified_gmt":"2021-02-22T07:28:35","slug":"risk-management-consulting","status":"publish","type":"page","link":"https:\/\/wso-security.com\/en\/risk-management-consulting\/","title":{"rendered":"Risk Management Consulting"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_section css=&#8221;.vc_custom_1509328054972{padding-bottom: 70px !important;}&#8221;][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_single_image source=&#8221;external_link&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; custom_src=&#8221;\/\/wso-security.com\/images\/rm-one.jpg&#8221; el_class=&#8221;rm-img-one&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2>Professionals with extensive experience in security and risk management<\/h2>\n<p style=\"text-align: justify\">In today&#8217;s versatile social, economic, geopolitical and entrepreneurial environment, companies must adapt their models to confront the evolving challenges imposed by new rules and threats. WSO helps you go through this evolution process to improve the operation of your business. We offer solutions that allow organizations to mitigate and manage risks maximizing their performance.<\/p>\n<p style=\"text-align: justify\">WSO expertise comes from decades of leadership, expertise and hands-on experience in the implementation of solutions (real cases) in complex environments with multiple threats and challenges. The methodology employed by WSO is based on the best practices and internationally recognized standards and it is adjusted to the unique needs of each organization.<\/p>\n<p style=\"text-align: justify\">Services rendered by WSO generate added value to your processes and provide readily accessible guides that help assess adequate efforts to protect your assets and control any critical process in your environment.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1509403915193{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #e2e2d3 !important;}&#8221;][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image source=&#8221;external_link&#8221; css_animation=&#8221;fadeIn&#8221; image_hovers=&#8221;false&#8221; custom_src=&#8221;\/\/wso-security.com\/images\/rm-two.jpg&#8221; el_class=&#8221;rm-img-two&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2>Strategic Corporate Security<\/h2>\n<p style=\"text-align: justify\">Our professionals are certified consultants and strategic analysts highly skilled in the quick and thorough implementation of each security program in different scenarios. As risk management consultants, we can cover the following programs and services:<\/p>\n<ul class=\"fa-ul sf-list\">\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Critical Asset Assessment<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Threat Identification and Assessment<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Impact and Likelihood Assessment<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Vulnerability Assessment and Control<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Risk Identification, Assessment, and Management<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Crisis Management<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Emergency Response Planning<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Evacuation Plans<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Business Continuity Plan (BCP)<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Critical Process Security<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Loss Prevention and Control Programs<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Corporate Investigations<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Background Check<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Computer Voice Stress Analysis (CVSA)<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Information Security<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Transport and Critical Freight Security<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Electronic Security Countermeasures<\/li>\n<li><i class=\"fa-li fa aga-wso-icon\"><\/i> Security Training<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1509403985901{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #082765 !important;}&#8221;][vc_row gap=&#8221;4&#8243; equal_height=&#8221;yes&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1509403437641{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;background-color: #042b78 !important;}&#8221; el_class=&#8221;rm-rounded&#8221;][vc_column_text]<\/p>\n<h2 class=\"wso-text-light\">We protect your interests and help you achieve your strategic objectives<\/h2>\n<p class=\"wso-text-light\" style=\"text-align: justify;padding-top: 20px\">We are interested in becoming a reliable strategic partner for your operations, helping you to meet your strategic goals under the highest quality standards and letting you experience an exceptional service.<\/p>\n<p class=\"wso-text-light\" style=\"text-align: justify\">We are interested in protecting your brand and interests under the most rigorous and unwavering ethical and professional principles. For years, large companies and corporations have entrusted the control and safeguarding of their assets and the value chain to us. At WSO, we carry out our daily operation in strict compliance with applicable laws and business ethical principles.<\/p>\n<p class=\"wso-text-light\" style=\"text-align: justify\">All the decisions are made in shareholders&#8217; meetings, a board of directors and managers which in turn creates the corporate governance structure of our company. We are in strict compliance with each and every formal commitment we have assumed with our clients, employees, laws, and shareholders (corporate success equation), all this framed within an environment of transparency and honesty.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1509403449633{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 30px !important;padding-left: 30px !important;background-color: #042b78 !important;}&#8221; el_class=&#8221;rm-rounded&#8221;][vc_single_image source=&#8221;external_link&#8221; image_hovers=&#8221;false&#8221; custom_src=&#8221;\/\/wso-security.com\/images\/rm-three-en.png&#8221; el_class=&#8221;rm-img-three&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section css=&#8221;.vc_custom_1510603439366{padding-top: 50px !important;}&#8221;][vc_row gap=&#8221;2&#8243; equal_height=&#8221;yes&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_raw_html]JTNDaDMlMjBzdHlsZSUzRCUyMnRleHQtdHJhbnNmb3JtJTNBJTIwdXBwZXJjYXNlJTNCJTIwZm9udC1zaXplJTNBMjFweCUzQiUyMiUzRSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnZjX2ljb25fZWxlbWVudC1pY29uJTIwZmElMjBmYS1maWxlLXBkZi1vJTIyJTIwc3R5bGUlM0QlMjJjb2xvciUzQSUyM2U4MTEyZCUyMCUyMWltcG9ydGFudCUzQiUyMHBhZGRpbmctcmlnaHQlM0EyMHB4JTNCJTIyJTNFJTNDJTJGc3BhbiUzRSUyMERvd25sb2FkJTIwb3VyJTIwUmlzayUyME1hbmFnZW1lbnQlMjBDb25zdWx0aW5nJTIwYnJvY2h1cmUlM0MlMkZoMyUzRQ==[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-d4fe181a36ea6e456e3ddcf33c00d172 {\n  border-radius: 0px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-d4fe181a36ea6e456e3ddcf33c00d172 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-d4fe181a36ea6e456e3ddcf33c00d172:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-3d#default-btn-d4fe181a36ea6e456e3ddcf33c00d172 {\n  box-shadow: 0px 2px 0px 0px #9c2030;\n}\n.btn-3d#default-btn-d4fe181a36ea6e456e3ddcf33c00d172:hover {\n  box-shadow: 0px 2px 0px 0px #851a1a;\n}\n.btn-flat#default-btn-d4fe181a36ea6e456e3ddcf33c00d172 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-d4fe181a36ea6e456e3ddcf33c00d172:hover {\n  box-shadow: none;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172 > i {\n  margin-right: 8px;\n  font-size: 14px;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172:not(:hover) {\n  border-width: 0px;\n  color: #ffffff;\n  background: #e8112d !important;\n  padding: 10px 16px 10px 16px;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172:not(:hover) * {\n  color: #ffffff;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172:hover {\n  border-width: 0px;\n  color: #ffffff;\n  background: #ce0e0e !important;\n  padding: 10px 16px 10px 16px;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172:hover * {\n  color: #ffffff;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-d4fe181a36ea6e456e3ddcf33c00d172 > i {\n  margin-right: 8px;\n}\n<\/style><a href=\"\/\/wso-security.com\/images\/pdf\/2021\/risk-management.pdf\" class=\"default-btn-shortcode dt-btn link-hover-off full-width-btn btn-inline-left btn-flat \" target=\"_blank\" id=\"default-btn-d4fe181a36ea6e456e3ddcf33c00d172\" rel=\"noopener\"><i class=\"fa fa-cloud-download\"><\/i><span>Brochure (PDF)<\/span><\/a>[\/vc_column][\/vc_row][vc_row gap=&#8221;2&#8243; equal_height=&#8221;yes&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_raw_html]JTNDaDMlMjBzdHlsZSUzRCUyMnRleHQtdHJhbnNmb3JtJTNBJTIwdXBwZXJjYXNlJTNCJTIwZm9udC1zaXplJTNBMjFweCUzQiUyMiUzRSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnZjX2ljb25fZWxlbWVudC1pY29uJTIwZmElMjBmYS1maWxlLXBkZi1vJTIyJTIwc3R5bGUlM0QlMjJjb2xvciUzQSUyM2U4MTEyZCUyMCUyMWltcG9ydGFudCUzQiUyMHBhZGRpbmctcmlnaHQlM0EyMHB4JTNCJTIyJTNFJTNDJTJGc3BhbiUzRSUyMERvd25sb2FkJTIwb3VyJTIwRm9vdHByaW50JTIwSW50ZWxsaWdlbmNlJTIwRGl2aXNpb24lMjBicm9jaHVyZSUzQyUyRmgzJTNF[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-fb3aa6642f8eb251f42da6f38035d086 {\n  border-radius: 0px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-fb3aa6642f8eb251f42da6f38035d086 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-fb3aa6642f8eb251f42da6f38035d086:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-3d#default-btn-fb3aa6642f8eb251f42da6f38035d086 {\n  box-shadow: 0px 2px 0px 0px #9c2030;\n}\n.btn-3d#default-btn-fb3aa6642f8eb251f42da6f38035d086:hover {\n  box-shadow: 0px 2px 0px 0px #851a1a;\n}\n.btn-flat#default-btn-fb3aa6642f8eb251f42da6f38035d086 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-fb3aa6642f8eb251f42da6f38035d086:hover {\n  box-shadow: none;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086 > i {\n  margin-right: 8px;\n  font-size: 14px;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086:not(:hover) {\n  border-width: 0px;\n  color: #ffffff;\n  background: #e8112d !important;\n  padding: 10px 16px 10px 16px;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086:not(:hover) * {\n  color: #ffffff;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086:hover {\n  border-width: 0px;\n  color: #ffffff;\n  background: #ce0e0e !important;\n  padding: 10px 16px 10px 16px;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086:hover * {\n  color: #ffffff;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-fb3aa6642f8eb251f42da6f38035d086 > i {\n  margin-right: 8px;\n}\n<\/style><a href=\"\/\/wso-security.com\/images\/pdf\/2021\/footprint-intelligence.pdf\" class=\"default-btn-shortcode dt-btn link-hover-off full-width-btn btn-inline-left btn-flat \" target=\"_blank\" id=\"default-btn-fb3aa6642f8eb251f42da6f38035d086\" rel=\"noopener\"><i class=\"fa fa-cloud-download\"><\/i><span>Brochure (PDF)<\/span><\/a>[\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_section css=&#8221;.vc_custom_1509328054972{padding-bottom: 70px !important;}&#8221;][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_single_image source=&#8221;external_link&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; custom_src=&#8221;\/\/wso-security.com\/images\/rm-one.jpg&#8221; el_class=&#8221;rm-img-one&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text] Professionals with extensive experience in security and risk management In today&#8217;s versatile social, economic, geopolitical and entrepreneurial environment, companies must adapt their models to confront the evolving challenges imposed by new rules and threats. WSO helps you go through this evolution process to improve&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-175","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/wso-security.com\/en\/wp-json\/wp\/v2\/pages\/175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wso-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wso-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wso-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wso-security.com\/en\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":0,"href":"https:\/\/wso-security.com\/en\/wp-json\/wp\/v2\/pages\/175\/revisions"}],"wp:attachment":[{"href":"https:\/\/wso-security.com\/en\/wp-json\/wp\/v2\/media?parent=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}