Uncertainty is part of the human experience, yet 84% of people fear the unknown.
Learning to predict what is coming next can be daunting if you don’t know where to begin.
So how do you prevail? The answer is simple -- invest in preparedness to predict what happens next and protect your people. Establish a foundation of counter-threat training and tactics to enhance critical infrastructure security.
Invest in your workforce so they have the knowledge, skills, and support to ensure the world’s critical infrastructures are more safe and secure.
AVIAN’s team is comprised of highly skilled counter-threat experts with prior military, special forces, law enforcement, intelligence, and national security experience.
Our instructors understand the value of countermeasures and a comprehensive understanding of critical responses to complex hybrid threats.
We develop training material and curriculum to meet your needs ranging from management overviews to full tactics, techniques, and procedures (TTP) and execution for security personnel including field exercises.
AVIAN is currently the sole source provider through New Mexico Tech (NMT) for counter unmanned (C-UAS) training to first responders and emergency management personnel from around the country on behalf of the National Domestic Preparedness Consortium (NDPC).
In collaboration with NMT and the Federal Emergency Management Agency (FEMA), AVIAN provides courseware development and instruction.
AVIAN recognizes risk as a function of consequence, vulnerability, and threat.
Our team will predict threats in your environment through:
We will work to identify threat capabilities, vulnerabilities, and consequences while conducting our comprehensive assessments.
AVIAN’s CTS team provides tailored capacity-building assessments and analysis to assist national governments, private entities, security agencies, and defense forces in developing their counter-threat capabilities.
We assist with requirements development, technology vetting, system selection, and integration based on site-specific vulnerabilities. We have experience in the complete spectrum of technologies employed to find, fix, and track threats.