How We Engage.

Every household we support is different—but the vulnerabilities often rhyme.

Some clients need a fast diagnostic to confirm what’s working. Others are navigating transition, strain, or a buildup of small failures. A few require sustained operational leadership. That’s why our model is tiered.

We scale to match the risk. We start small, then expand only where needed.

01. Exposure Pulse

A discreet, rapid scan across the four core domains: staff, travel, digital systems, and estate operations. Designed to surface blind spots, build trust, and provide a clear entry point—all with minimal disruption.

Example: A principal rehires a former housekeeper without vetting—someone who still has access to old devices, passwords, and vendor accounts. Their advisor isn’t sure how much exposure remains, so we run a discreet pulse. In 10 days, we uncover cross-domain risks: shared credentials, expired NDAs, and uncontrolled access to two secondary properties. The family gets a 1-page heat map, priority fixes, and renewed confidence—all with under 3 hours of client time.

Best for: New relationships, early concern, or advisor referrals

Includes:

  • Principal or proxy intake (60–90 min)

  • Discreet scan across all domains

  • 1-page Exposure Snapshot: top 3 risks and key notes

  • Optional domain scoring or heat map

  • Verbal debrief (call or in person)

Timeline: 1–2 weeks
Client time: ~2–3 hours
Outcome: Early visibility and directional insight

02. Exposure Study

A structured diagnostic of your private infrastructure. Ideal for households in transition, concern, or change. We map routines, roles, access, and weak points—and deliver a clear Exposure Profile to guide action.

Example: A family office notices growing friction in a household with three properties and legacy staff. Travel plans are going awry, daily operations lack oversight, and no one knows who is managing what. We conduct a full Exposure Study—mapping roles, routines, and vulnerabilities across staff, travel, digital, and estate operations. Our report gives the principal and family office team a clear picture of where risk lives, and a practical roadmap for stabilization.

Best for: Households under strain, facing transitions, or unclear risk

Includes:

  • Full household intake and light document review

  • On-site or virtual walk-through (as needed)

  • Domain-by-domain scan:

    • Staff structure and trust boundaries

    • Travel patterns and controls

    • Digital hygiene and credential exposure

    • Estate ops and points of dependency

  • Comprehensive Exposure Profile (written report)

  • Priority mitigation checklist

  • Executive debrief (principal, COO, or advisor)

Timeline: 2–4 weeks
Outcome: Clarity, prioritization, and an actionable map

03. Protective Architecture

For households that need new systems—designed, implemented, and stress-tested. Often follows an Exposure Study or begins when existing structure no longer fits the risk.

Example: After a major liquidity event, a newly relocated family faces a mess: inherited staff, unclear access, no emergency plans, and half the household running on default settings. Their attorney calls us in. Over 10 weeks, we restructure staff roles, reset digital access, implement SOPs, and built a secure vendor and comms system from the ground up. The result: clarity, control, and a private infrastructure that finally matches their needs.

Best for: Outdated systems, inherited complexity, or known gaps

Includes:

  • Infrastructure Design Plan

  • Role restructuring and access realignment

  • Vendor coordination and accountability

  • SOPs and contingency playbooks

  • Digital hygiene reset

  • Optional coordination with estate counsel, security, or family office

  • Final Systems Package: current state → secured state, contact/control map, emergency protocols

  • Light implementation oversight (60–90 days)

Timeline: 6–12 weeks
Outcome: A rebuilt, secured private infrastructure

04. Protective Oversight

For households requiring embedded leadership. We become the point of command—integrating with household staff, advisors, and security to maintain daily operational control and ensure readiness.

Example: A high-profile family splits time between four countries, with frequent media exposure and rotating security teams—but no one anchoring daily operations. Sensitive travel, household friction, and digital sprawl are starting to compound. We step in as the operational lead, coordinating with staff, security, and advisors across jurisdictions. With daily oversight, real-time communication, and command-level systems, we bring calm to a complex ecosystem.

Best for: Principals with elevated risk, sensitive logistics, or global movement

Includes:

  • Embedded point-of-contact (on-site or remote)

  • Daily household oversight and coordination

  • Calendar and movement control

  • Secure communication with principals and advisors

  • Visibility tools and ongoing updates

  • Emergency intervention protocols

Timeline: Ongoing
Outcome: Quiet, continuous command

Why we work this way

Most of our clients begin with a conversation or a pulse check. From there, we expand only when the risk calls for it. This keeps our work precise, unobtrusive, and aligned with the real needs of the household.

We’re not brought in to observe. We’re brought in to secure.