SMI Philosophy

SMI - Security Management International
Steve Filyo, Director of Training and Tactical Operations at SMI
 
Mr. Filyo has over 32 years of continuous and uninterrupted Military, law enforcement, and intelligence community experience, the last 24 of which were devoted to tactical operations, multi-agency contingency planning, homeland security initiatives, and counterintelligence and anti/counter-terrorism initiatives.

Mr. Filyo has performed operations in over 2 dozen countries on 5 continents. In addition to his extensive counter-terrorism and intelligence analysis experience, Mr. Filyo has served as Central SWAT Officer, as well as SME instructor in counter-intelligence, hostage rescue, counter-sniper operations, and high-risk raids and dynamic entries. He developed highly sought-after training courses in the aforementioned areas, and currently holds certifications as an instructor in the RAM-C methodology for cities and communities and the CARVER Target Analysis Methodology.

Mr. Filyo’s SWAT responsibilities included responding to hostage/barricade incidents, service of high-risk search and arrest warrants, vehicle takedowns, and participation in all manners of violent crime resolution. He was also responsible for assisting other agencies in developing their own SWAT programs, command post and staff training, as well as developing and maintaining the coordination of major SWAT teams. Mr. Filyo also supervised the development training of SWAT officers.
Critical aspect of a security program
Perhaps the most critical aspect of a security program is with the understanding of the persons or organizations being protected, its services, and the location(s) of the assets involved. With a clear view of the setting, the steps necessary to secure those items become clear and the resulting solutions are appropriate to the scenario. Our initial step in the development of a security program is to conduct preliminary performance testing to gain critical knowledge regarding the ongoing operations. This testing, sometimes referred to as assessment, will outline the vital operational areas and current performance levels associated with each. For example, a contract guard force often appears to be “effective” as they have pressed uniforms and greet guests cordially. However, upon close inspection of their policies and investigation of their capabilities, it becomes clear that in the event of a crisis, the effectiveness is limited at best.
Approach to security
Our comprehensive approach to security is first to conduct a threat analysis followed by a vulnerability assessment of the assets to be protected, whether those assets are political leaders, businessmen, office buildings, industrial factories, computers, electronic data, shipments, or other valuable resources. Once a thorough assessment has been completed, and the material risks and threats are identified, we determine the best approach to eliminating, thwarting or offsetting the vulnerabilities, and recommend appropriate security systems, protocols and countermeasures to be implemented. Our solutions take into account all applicable cultural, financial, operational, and technical limitations. We provide executive summaries, detailed analyses and reports, formal recommendations, implementation plans, and cost estimates. We also offer, where appropriate, turn-key systems, installation, testing, training, operational assistance, maintenance, and other support services.
Belief about security
We believe that security, to be most effective, must not only prevent potential vulnerabilities, but also discourage and defeat would-be aggressors, whether they are unauthorized insiders or disgruntled employees, known competitors or opponents, unknown outsiders, criminals, malicious vandals, terrorists, political activists, or others. SMI’s ability to perform such security support functions is based in large part on the international technical and operational experience acquired in combating terrorists, narco-traffickers, insurgents, intelligence organizations and criminals. Our principles and associates are former officers of national intelligence organizations, Military special operations forces, national law enforcement agencies and corporate security directorates. They are well conditioned to implement the preventive and preemptive techniques necessary to reduce the vulnerability of persons, property and organizations.

Security Consulting in 100 Words

“Establishing a brand where clients ask for you by name when their security situation requires immediate – and often discrete - solutions. Building a global reputation that has been forged throughout the years by consistently delivering results, and displaying unmatched dependability and integrity – with no excuses. Rather than simply solving problems, a world-class security consultant should improve their clients’ overall condition and must be viewed as a trusted advisor, who has their clients’ best interests in mind, rather than being just another contractor. He/she must intimately follow, and operate within, the global security environment.”

- Luke Bencie, SMI Managing Director

SMI - Security Management International Training Courses
security consulting education
SMI -  CARVER Training
SMI -  Counter Espionage Training
SMI -  Hostile Environment Training
SMI
SMI - Among Enemies Counter-Espionage for the Business Traveler
SMI -  Global Security Consulting University
SMI -  Clandestine Consultant
SMI - Logo
 

SMI Social Media

White Papers

Testimonials