Hazard 360 Ltd

Hazard 360 Ltd an Independent Security Risk Mitigation and Training Consultancy, has been in operation since April 2014. Hazard 360 Ltd is not a one stop shop, we deal in specific areas of Physical Security Risk Management, Security Design, Security Training, Data Protection and Project Management, at which we are suitably qualified and certified to deliver this places Hazard 360 Ltd in the position of offering sound professional advice to a variety of business and high worth individuals based upon our considerable knowledge and experience.

Founder Alan Smith, CPP, PSP, DPI, SQSS, FSyl

Alan has some thirty years’ experience in the field of Physical Security, Risk Mitigation for Physical Security and Training within the United Kingdom, Australia and the Middle East.
The Company


Hazard 360’s varied services and experience, gained through over thirty years of industry knowledge and capability, enable us to manage projects from commencement to completion. Our aim is to provide a professional, high quality, reliable and cost-effective service. Our continued ambition is to be recognised throughout the commercial, private and Government security environments through the delivery of specialist services in this country and internationally. We deliver best expertise alongwith the whole scope of security risk mitigation and/or professional security courses.

Regulatory Compliance

Hazard 360 Ltd works in strict alignment with BS8549:2006, the Security Consultant Code of Practice.

Business Registration

Company Registered No: 8671851
HMRC Vat Registration No: 183944669
 Company Overview
Company Culture
Honesty & Integrity

At Hazard 360 Ltd we believe in demonstrating honesty and integrity and this is achieved by being transparent and giving others the opportunity to view our business operations and form their own opinion. 
We demonstrate our integrity by providing a culture of understanding, honesty, trustworthiness, openness, fairness, and self-respect in the place of work, integrity forms the cornerstone of professional attitude and behaviour in with Hazard 360 Ltd business operations.

Mission Statement:

Hazard 360 Limited has a continuing goal to provide a professional, high quality, reliable and cost-effective service. We aim to be recognised throughout the commercial, private and Government security environments through the effective delivery of wholly specialised security and training services within the UK and overseas. Our ongoing intent is to fully accomplish this objective by supporting and working closely with our clients to build strong working relationships therefore ensuring their requirements are held with a high standard of skilled service and professionalism.

Our Vision and Goals:

To deliver a high-quality service backed-up with many years of ‘from the ground up’ expertise within the security environment. We realise today's economic constraints affect everyone's budgets. So, we are fully understanding of our client's requirements, and would support them in their desire to work within their economic budget restraints, creating a trustworthy, dependable and reliable working relationship. In addition, our objective is to comply with all regulatory organisations and authorities including legal requirements, industry standards and guidelines, codes of practice, policies and procedures. It is also our responsibility to heighten our client’s awareness of all advanced security measures and hostile environments by providing in-depth security surveys and training.

Professional Memberships:

Member of ASIS International U.S.
Fellow of the Security Institute U.K.

Security Consulting

Learn More

Risk Control Framework

Learn More

Compliance and Audit

Learn More

Electronic Systems

Learn More

Technical Drawing

Learn More

Policies and Procedures

Learn More

Specialised Services

Learn More
Training Services
Training Delivery:

Since 2014 Hazard 360 Ltd has delivered ASIS Certification and DFT Port Facility Security Officer training to 296 students. The delivery method has been through face to face in class and webinar delivery.

Excellent Service Award ASIS Riyadh Saudi Arabia

Hazard 360 Ltd currently delivers four ASIS International Certifications and one (DfT) Port Facility Security Officer Certification.

1: ASIS Associate Protection Professional (APP)
2: ASIS Physical Security Professional (PSP)
3: ASIS Certified Protection Professional (CPP)
4: ASIS Certified Professional Investigator (PCI)
5: DFT Port Facility Security Officer (PFSO)

Delivery Methodology (ASIS)

ASIS Certifications are delivered in the following manner:
1: Five- or ten-day Webex Webinar online
2: Five Day in class face-to-face training

Delivery Method DFT (PFSO)

1: Five Day Webex Webinar online (Maximum Students (4)
2: Three Day in class face-to-face (Maximum Students (8) More if two trainers are instructing

Exam Invigilation

Where courses are being delivered online, students must have access to web cameras
ASIS Associate Protection Professional (APP) Preparation Training Program:
The Associate Protection Professional (APP) designation provides the first "rung" on the security manager's career ladder. It is for those with 1-3 years of security management experience and measures the professional’s knowledge of security management fundamentals, business operations, risk management and response management.

The accelerated Associate Protection Professional (APP) Review Program is designed to provide a high-level overview of the four APP Certification knowledge domains in an environment that facilitates professional knowledge assessments, discussions with colleagues, and guidance from instructors.

The APP Training Programme covers four specific domain learning:

Domain 1: Security Fundamentals
Domain 2: Business Operations
Domain 3: Risk Management
Domain 4: Response Management

ASIS Physical Security Professional (PSP) Preparation Training Program:

The Physical Security Professional (PSP) demonstrates your knowledge in physical security assessments, application, design and integration of physical security systems, including implementation of security measures. Eligibility requirements include 3-5 years of experience in the physical security field.

The Physical Security Professional (PSP) Review Programme is an accelerated course that provides a high-level overview of the security concepts and practices assessed on the PSP exam. This class enables the trainer and trainee to identify areas of strength and weakness in the three key domains to develop a personalised study plan - focused on the areas the trainee needs most. The classroom experience encourages networking with peers and instructors.

The PSP Training Programme covers three specific domain learning:

Domain 1: Security Assessment
Domain 2: Application, Design, and Integration of Physical Security Systems
Domain 3: Implementation of Physical Security Measures

ASIS Certified Protection Professional (CPP) Preparation Course or Review Program:

The Certified Protection Professional (CPP) is considered the "gold standard" for security management professionals. This certification validates your knowledge in all areas of security management. Eligibility requirements include 5-7 years of security experience and 3 years in responsible charge of a security function.

The Certified Protection Professional (CPP) Review Program is an accelerated course that provides a high-level overview of the security concepts and practices assessed on the CPP exam. This class enables to identify areas of strength and knowledge gaps in the seven key domains to develop a personalised study plan - focused on the areas the trainee needs most. The classroom experience encourages networking with peers and instructors.

The CPP Training Programme covers seven specific domain learning:

Domain 1: Security Principles and Practices
Domain 2: Business Principles and Practices
Domain 3: Investigations
Domain 4: Personnel Security
Domain 5: Physical Security
Domain 6: Information Security
Domain 7: Crisis Management

ASIS Certified Professional Investigator (PCI) Preparation Training Program:

The Professional Certified Investigator (PCI) certification provides demonstrable proof of an individual's knowledge and experience in case management, evidence collection, and preparation of reports and testimony to substantiate findings. Requirements include 3-5 years of investigations experience, with at least two years in case management.

The Professional Certified Investigator (PCI) credential provides demonstrable proof of knowledge and experience in case management, evidence collection and preparation of reports and testimony to substantiate findings.
Earning a PCI provides objective evidence of an advanced level of investigative knowledge and skills, including, not limited to, validating your ability to collect information through the effective use of surveillance, interviews and interrogations.

The PCI Training Programme covers three specific domain learning:

Domain 1: Case Management
Domain 2: Investigative Techniques and Procedures
Domain 3: Case Presentation

DFT Port Facility Security Officer Course (PFSO):

The course should focus on giving candidates a comprehensive understanding of the International Ship and Port Security (ISPS) Code and the Maritime Transportation and Safety Act (MTSA). These pertain to the security officers both on-board the vessel, and onshore through company designations at the port facility.

The PFSO Training Programme covers nine specific modules of learning:

Module 1: Introduction and Course Framework
Module 2: Maritime Security Framework
Module 3: Port facility Security Assessments
Module 4: Port Facility Security Plans
Module 5: Security Measures and Procedures
Module 6: Security Awareness and Vigilance
Module 7: Contingency Planning
Module 8: Security Training
Module 9: Incident Response Management

Project Management
Project Management Service:

Hazard 360 Ltd can assist in the development and configuration of the Project Plan to meet your company’s needs - the critical starting point is Stage 1: Feasibility this is where all the ground work is carried out to establish if the project is feasible, and to see of it will meet the needs and objectives of the organisation in compliance with the company’s present security strategy and culture.


Project Management Vulnerability. It is critical to establish that the person being appointed as project manager has a very clear understanding of all the elements of the project and is suitably qualified in the operability, compatibility of the various elements being installed. This person should be experienced and certified in the subject matter applicable to project management components.


When a security project is being conceived there are some fundamental guidelines that need to be followed to ensure if the project is feasible. Does it have senior management support, will the project produce a reduction in risk, will it save money in the long term, does it fit in with the company’s security strategy, and can it be implanted on a cost benefit basis?
These are some very simple questions, but can have a massive impact and financial loss is not managed correctly.


Within the project management process there are four main stages and six phases. Each of the elements are critical to ensure the success of the project delivery.

Stage 1: Feasibility

  • Phase 1: Business Case, Planning, and Assessment
Stage 2: Development

  • Phase 2: Design and Estimation of project costs
Stage 3: Execution

  • Phase 3: Procurement
  • Phase 4: Installation, Operation, Training
  • Phase 5: Commissioning and Warranty
Stage 4: Project Close Out

  • Phase 6: Maintenance, Evaluation, Replacement

Case Scenario:

A company has several sites around the UK and the security manager comes up with an idea on how to save the company £1,000000 one million pounds in manned guarding costs. This is going to be achieved by removing gatehouse guarding and replace the human element by installing automated gates.

Where did it all go wrong:

  • The security manager was not qualified or certified to actually deliver the project
  • A formal Business Case and feasibility study was not carried out
  • The business stakeholders at each site were not consulted
  • A Functionality, operability, capability, and compatibility was not carried out to integrate system
  • No formal project plan was developed every contractor doing their own thing
  • Incorrect foundations laid to support automated gates
  • Equipment wiring not installed in protective piping, trays.
  • Electronic controls systems of automated gates were not compatible with onsite system
  • Security Manager resigned one month into the project, the writing was on the wall.

It was quite clear from the outset that the security manager was out of his depth procurement and facilities had no formal contract or project plan to work with, as result costs overrun and the project was doomed to failure.

Instead of saving a £ 1,000000 pounds the cost of the project has been just over £6,00000 six hundred thousand pounds and there is still the manned guarding cost as the automated gates cannot be integrated on all sites.

It is the old adage! Fail to Plan – Plan to Fail
  • Calne, Wiltshire, United Kingdom

What is a Security Survey?

A Security Survey is a thorough physical examination at a given point in time of a facility and its operations with respect to personnel and company assets.

It examines the risks these assets are exposed to, and reviews the measures that are in place to protect them and to mitigate liability. It identifies vulnerabilities and makes recommendations on how these can be improved.

This can be relevant for new locations or existing facilities, particularly after a loss or incident has occurred.

The objective of the survey is to produce a report based upon factual information, recommendations that allow the client to make sound financial decisions based on a cost benefit basis and (ROI) return on investment.

What is a Security Audit?

A Security Audit is different in as much that the survey is a process to assess whether an existing security system and procedures are operating to set of standards or criteria they were designed to. It evaluates the administration of the system, security awareness of employees, the management controls and compliance with standards. This is a valuable tool to give an accurate overview to the senior management.
The objective of the survey is to produce a report based upon factual information to demonstrate compliance with the current security posture of the premises.

What is a Qualitative Security Survey?

A qualitative analysis is more suitable when evaluating lower security applications. These facilities will have lower consequence loss assets and so will be better able to withstand loss or damage of an asset.
Some examples might include retail stores, apartment buildings, small businesses, and restaurants.

What is a Quantitative Security Survey ?

A rigorous quantitative analysis is required for protection of assets with unacceptably high consequence of loss, even if the probability of an adversary attack is low. This is a characteristic of high security systems typically found at pharmaceutical facilities, nuclear power plants, prisons, government and military installations, plus some museums, refineries, utilities, airports, telecommunications hubs and large industrial complexes. In each of these cases the loss of or damage to at least some of these assets can have high consequences.

 1: ICO Registration

ICO Registration Certificate

 2: DPA Policy

Hazard Policy

 3: Info Sec Policy

Hazard Policy

 4: Website Policy

Hazard Policy

 5: H&S Policy

Hazard Policy.

10: Company Registration

Company House Registration Certificate


This page is used for listing the services offered by your company on your website.


You can add any service you want or edit the ones that are already listed.


You can edit all of this text and replace it with what you want to write.