Ward Pearce provides services aligned with protective security industry best practice, including the Protective Security Policy Framework (PSPF). We ensure the holistic protection of your organisation's most critical assets. We guide entities through the complexities of the security governance by designing, implementing and maturing robust controls across four core domains: Physical, Personnel, Information and Supply Chain security.
By taking a multi-layered approach, we help you mitigate insider and external threats, safeguard sensitive data and maintain secure, resilient operations that meet stringent government standards. Our approach follows a six steps process:
SECURITY GOVERNANCE FRAMEWORK: 6 STEP PROCESS
A key component of our security portfolio comprises clients operating under the Security of Critical Infrastructure (SOCI) Act, where obligations have increased significantly in recent years.
Ward Pearce works with organisations to map workflows, processes and vulnerabilities in supply chains to develop comprehensive risk management programs and reporting mechanisms in line with SOCI legislation.
Security risk across critical infrastructure requires a deep knowledge of the sensitive nature of these industries and dependencies, requiring additional finesse to keep organisations compliant.

Ward Pearce specialises in identifying security vulnerabilities and partnering with organisations to implement holistic, long term risk mitigation strategies. Our approach spans physical, personnel, information and supply chain security. This ensures protective security is integrated and aligned to your organisation’s unique threat profile.
We support organisations in assessing both internal and external security controls, identifying Foreign Ownership, Control or Influence (FOCI) risks and establishing robust monitoring mechanisms to provide ongoing assurance. By designing effective detection processes and implementing best‑in‑class response frameworks, we help organisations reduce exposure and strengthen resilience. This multi‑layered protective security capability enables proactive threat management across all operational gateways, supporting secure and confident decision making.
Focus on facility access control, surveillance, intrusion detection
and vulnerability assessments in physical environments.
✓ Access control systems design
✓ Surveillance & CCTV advisory
✓ Intrusion detection review
✓ Physical vulnerability assessments
✓ Security technology uplift projects
Address insider threats through vetting, onboarding, training
and workforce cultural awareness programs.
✓ Security vetting program design
✓ Insider threat frameworks
✓ Onboarding security protocols
✓ Security awareness training
✓ Workforce culture programs
Strengthen confidentiality, integrity and availability of data
with governance, classification and security protocols.
✓ Data classification frameworks
✓ Information security governance
✓ Access rights management
✓ Data handling protocols
✓ Records management policy
Undertake vulnerability mapping, assess third-party supplier controls, foreign interference risks and monitoring for ongoing assurance.
✓ Supply chain vulnerability mapping
✓ FOCI risk assessment & management
✓ Supplier security controls
✓ Foreign interference monitoring
✓ Ongoing security assurance programs