ERINT - Empower Responses via Intelligence Analisys

Dott. Maurizio Ognibene

We deliver actionable intelligence of excellence, grounded in knowledge, advanced analysis, and specialized expertise.

Geometric design with a central polygon surrounded by circular elements, locks, and targeting symbols.

Our Services

The product of our services are ‘actionables’, strategic modules that can be activated in response to questions or needs defined during project initiation with the client.

The client receives all the necessary advice and support, to make the best possible decision in terms of efficiency and effectiveness to harness threats and consolidate a winning strategy on both risk governance and security, and when necessary its timely review following a crisis event.

Circular logo representing the strategic plan, featuring distinct colors and design elements that symbolize forward-thinking goals

RISK GOVERNANCE

Informational & documentary.
Risk identification.
Risk assessment and analysis.
Treatment plan and risk response.
Execution of the plan.
Monitoring & Control.

Risk Appetite - Tolerable Risk at the Stakeholder and Enterprise Level: Assessment, Decision Support, Monitoring.

Potential Systemic Risk of a business through the examination of interactions among employees, managers, and customers, using the Cindynic scienze approach.

urgency analysis graph

URGENCY ANALYSIS

A strategic support for timely and targeted decisions. With our innovative system based on the Analytic Hierarchy Process (AHP), you can identify and manage your business critical priorities with precision and speed. Maximize operational efficiency, reduce risk, and make winning decisions every time.

Map of countries marked with various symbols to indicate risk areas.

COUNTRY PROFILE

Gathering information using OSINT techniques following the intelligence framework: STEMPLES+

Social, Technical, Economical, Military, Political, Legal, Environmental, Security+ (Demographic, Religious, Psychological)

Professional Bug Sweep Service – TSCM for businesses and vehicles

Protect your privacy and the security of your space with a highly specialized and discreet bug remediation service. Using the latest Technical Surveillance CounterMeasures (TSCM), we detect and remove any spy devices hidden in your environment, ensuring peace of mind and confidentiality. Service provided with our technicians and equipment in collaboration with a private investigation agency. NEW! Cell phone cleanups from spy software.

Network Security Service – Protect Your Network, Protect Your Business

In a constantly evolving digital world, safeguarding your business network is essential to keeping data, applications, and communications secure. Our Network Security service provides advanced, customized protection designed to block cyber threats, safeguard infrastructure, and ensure operational continuity.

Where excellence meets intelligence analysis.

The best experts connected to offer you exceptional decision-making support. When your goal is to master uncertainty, we are your strategic resource.

Competence NEXUS available for: early warning prevention of severe weaver events (example hail).

BRAZIL (Detailed risk by location, organized and local crime, project risk management).

Structured Intelligence Analysis Service for Business Strategy and Competitive Advantage

With the experience and expertise of a Certified Management Consultant (CMC Global), qualified APCO, we offer strategic analysis and structured intelligence services that support companies in building a solid and lasting competitive advantage, based on optimized costs and clear differentiation.

My Safety Circle

My Safety Circle (www.mysaferycircle.com) is a mobile app. designed to enhance personal safety.

It offers several key features:

Emergency Assistance, Real-Time Location Sharing, Automatic SOS in case of failure to return home. Application compatible with MySafetyCircle telemedicine devices, such as the Cardio Ring and Glucose Arm Pad.

It's a great tool for parents, individuals with elderly family members, employers with fieldworkers, and corporate travelers.

We can deliver a complete customisation service of the app.

How we work

Strategic phases of the risk governance domain

IPOE (Intelligence Preparation of Operational Environment)

Definition of the operational and strategic environment

Structured and in-depth intelligence analysis of the internal and external environment, client's objectives, assets, stakeholders, operational, interest and influence perimeters, to ensure that each decision is aligned with the priorities.

Intelligence analysis

Using structured analytical techniques, including: Starbursting, Mind Maps, Key Assumptions Check, Deception Detection, Structured Analogies, Cross-Impact Matrix, Multiple Hypothesis Generation, Analysis of Competing Hypotheses (ACH - Pherson-Heuer method), Quadrant Crunching, Key Drivers Generation, Indicators Generation - validation & Evaluation.

Using OSINT: Open Source INTelligence techniques by searching, collecting, and analyzing data and news of interest drawn from open, public, and freely accessible sources. Search engines and social media on the Internet with advanced techniques using search operators and employing professional data mining tools.

Using IMINT techniques: IMagery INTelligence, with information gathering activities by analyzing aerial or satellite photographs, e.g., on the Sentinel-hub EO-Browser3 platform of the ESA Copernicus project, utilizing Sentinel-2 satellites.

Threat Identification and Mapping

Identification of threats through proactive evaluation with inductive and deductive methods, covering all operational, strategic, and compliance aspects, preventing surprises and preparing for challenges.

Risk Assessment & Balanced Risk Treatment

Action on the Risk Register by grouping risks by affinity and triggering events (triggers), as well as extrapolating risks deemed to have negligible impact on the project at the moment. These will not be removed but placed on a ‘Watch List’ for easy retrieval and periodic verification.

- Quantitative risk analysis with non-probabilistic techniques

Quantitative analysis, or ‘measurement’ of the elements constituting the risk impact, namely the vulnerability and exposure index, to which we must add: “Sensitivity” which will examine: the project team’s experience in handling risks of this type, client perception level (EMV – Expected Monetary Value), visibility.

Extension/Propagation of impact across the project network based on the interconnection and amplification between individual risks using intelligence techniques: Cross Impact Matrix.

High occurrence index (high frequency).

Urgency index

- Treatment Strategy and Risk Response Planning

Development of response plans tailored to mitigate, transfer, accept or avoid risks, optimizing costs and improving operational efficiency.

- Contingency Plan & Events
- Contingency Reserve
- Fallback Plan

A ‘Plan B’ should be created in case the risk response strategies prove ineffective.

- Execution of the risk management plan

Structured and integrated implementation of risk treatment actions, ensuring that each measure is applied promptly and in a coordinated manner.

- Continuous monitoring and control

Regular verification and adaptation of risk management strategies to respond to internal and external changes, ensuring that the organization is always one step ahead of threats.

- Continuous improvement and strategic feedback

Reviewing performance and the risk management process to identify improvement opportunities and continually strengthen business resilience.

- Residual Risk Auditing

Residual risk should be broken down into its smallest components, re-identified through structured intelligence analysis, evaluated, analyzed, and subjected to the ‘Risk Treatment & Response Planning’ process.

Decision Making

Multi-Criteria Decision Making: using the Analytic Hierarchy Process (AHP) technique. This core competency enables the determination of priorities in decision-making scenarios involving complex risks, operational theaters with diverse sensitive targets evaluated across multiple criteria, and the high dislocation of sensitive assets/targets.

Risk Management

Employing cindynics science, which differs from traditional risk management disciplines that focus primarily on probabilistic measurements. Cindynics adopts a qualitative-quantitative index approach, translating the psychological, cultural, organizational, and structural mechanisms of communication and negotiation between individuals that influence risk perception and sizing. This methodological framework is at its best when dealing with new scenarios without historical precedents, commonly referred to as ‘black swans’.

Fish-bone cause-and-effect analysis

Fish-bone Type Cause-Effect Analysis: utilizing the Ishikawa method for comprehensive cause-and-effect analysis, alongside process mapping and management, and stakeholder classification using the Salience model.

Criminodynamic analysis of the event

Multidisciplinary and Interdisciplinary Analysis: an extensive examination of the perpetrators, criminal behavior, and the vulnerabilities of the organization subject to threats.

Psychological Reconstruction: an analysis aimed at reconstructing the mental state of the offender by exploring the underlying reasons that led to the criminal action. This includes studying the precursor drivers to the criminal event, as well as psycho-physical and environmental trends that may have induced the individual to engage in deviant and/or antisocial acts, such as burglary, theft, vandalism, etc.

Clinical Condition Analysis: an investigation into potential clinical conditions of dependency or pathologies associated with the crime, alongside non-pathological conditions related to cultural, social aspects, and affiliations with organized groups or gangs. More broadly, this encompasses the criminological profile of the offender.

Book an appointment for free

Decide with yours private intelligence services

Get in touch with us

Are you an expert in Security, Intelligence & Geopolitical analysis, security technical specialties?

Explosive science, ballistics, forensic toxicology, cybersecurity, travel security, counter-surveillance measures, drones, environmental remediation from spying technology, knowledge of languages such as Arabic, Chinese, Russian, business continuity, Disaster Recovery, DPO, White Hat Hacker, VAPT Specialist. Personnel on leave: Armed Forces Veteran, Public Safety Veteran, Firefighter Veteran, D.Lgs 81/08 Security Manager.

Are you interested in working with us?

info@erint.studio

Send a message

Copyright © 2024 Erint.studio | P.IVA 03931840981