
How We Engage.
Every household we support is different—but the vulnerabilities often rhyme.
Some clients need a fast diagnostic to confirm what’s working. Others are navigating transition, strain, or a buildup of small failures. A few require sustained operational leadership. That’s why our model is tiered.
We scale to match the risk. We start small, then expand only where needed.
01. Exposure Pulse
A discreet, rapid scan across the four core domains: staff, travel, digital systems, and estate operations. Designed to surface blind spots, build trust, and provide a clear entry point—all with minimal disruption.
Example: A principal rehires a former housekeeper without vetting—someone who still has access to old devices, passwords, and vendor accounts. Their advisor isn’t sure how much exposure remains, so we run a discreet pulse. In 10 days, we uncover cross-domain risks: shared credentials, expired NDAs, and uncontrolled access to two secondary properties. The family gets a 1-page heat map, priority fixes, and renewed confidence—all with under 3 hours of client time.
Best for: New relationships, early concern, or advisor referrals
Includes:
Principal or proxy intake (60–90 min)
Discreet scan across all domains
1-page Exposure Snapshot: top 3 risks and key notes
Optional domain scoring or heat map
Verbal debrief (call or in person)
Timeline: 1–2 weeks
Client time: ~2–3 hours
Outcome: Early visibility and directional insight
02. Exposure Study
A structured diagnostic of your private infrastructure. Ideal for households in transition, concern, or change. We map routines, roles, access, and weak points—and deliver a clear Exposure Profile to guide action.
Example: A family office notices growing friction in a household with three properties and legacy staff. Travel plans are going awry, daily operations lack oversight, and no one knows who is managing what. We conduct a full Exposure Study—mapping roles, routines, and vulnerabilities across staff, travel, digital, and estate operations. Our report gives the principal and family office team a clear picture of where risk lives, and a practical roadmap for stabilization.
Best for: Households under strain, facing transitions, or unclear risk
Includes:
Full household intake and light document review
On-site or virtual walk-through (as needed)
Domain-by-domain scan:
Staff structure and trust boundaries
Travel patterns and controls
Digital hygiene and credential exposure
Estate ops and points of dependency
Comprehensive Exposure Profile (written report)
Priority mitigation checklist
Executive debrief (principal, COO, or advisor)
Timeline: 2–4 weeks
Outcome: Clarity, prioritization, and an actionable map
03. Protective Architecture
For households that need new systems—designed, implemented, and stress-tested. Often follows an Exposure Study or begins when existing structure no longer fits the risk.
Example: After a major liquidity event, a newly relocated family faces a mess: inherited staff, unclear access, no emergency plans, and half the household running on default settings. Their attorney calls us in. Over 10 weeks, we restructure staff roles, reset digital access, implement SOPs, and built a secure vendor and comms system from the ground up. The result: clarity, control, and a private infrastructure that finally matches their needs.
Best for: Outdated systems, inherited complexity, or known gaps
Includes:
Infrastructure Design Plan
Role restructuring and access realignment
Vendor coordination and accountability
SOPs and contingency playbooks
Digital hygiene reset
Optional coordination with estate counsel, security, or family office
Final Systems Package: current state → secured state, contact/control map, emergency protocols
Light implementation oversight (60–90 days)
Timeline: 6–12 weeks
Outcome: A rebuilt, secured private infrastructure
04. Protective Oversight
For households requiring embedded leadership. We become the point of command—integrating with household staff, advisors, and security to maintain daily operational control and ensure readiness.
Example: A high-profile family splits time between four countries, with frequent media exposure and rotating security teams—but no one anchoring daily operations. Sensitive travel, household friction, and digital sprawl are starting to compound. We step in as the operational lead, coordinating with staff, security, and advisors across jurisdictions. With daily oversight, real-time communication, and command-level systems, we bring calm to a complex ecosystem.
Best for: Principals with elevated risk, sensitive logistics, or global movement
Includes:
Embedded point-of-contact (on-site or remote)
Daily household oversight and coordination
Calendar and movement control
Secure communication with principals and advisors
Visibility tools and ongoing updates
Emergency intervention protocols
Timeline: Ongoing
Outcome: Quiet, continuous command
Why we work this way
Most of our clients begin with a conversation or a pulse check. From there, we expand only when the risk calls for it. This keeps our work precise, unobtrusive, and aligned with the real needs of the household.
We’re not brought in to observe. We’re brought in to secure.