Gallagher and AnotherDay have engineered a best-in-class approach to managing the risk posed by political violence anywhere in the world, combining intelligence, risk consulting, insurance placement and crisis response – all underpinned by advanced data and analytics.
We help clients understand their exposure to political violence risks, and build the most cost-effective insurance solutions in the market.
"By staying on top of developments and providing actionable intelligence we act as our clients' ‘rear view mirror’, and feel this approach helps them best protect their assets, locations and people."
Laura Hawkes - Head of Intelligence
"Our consultative approach changes conversations with underwriters, away from the nature and perception of the client’s business, to specific ways in which the client is minimising the likelihood and impact of a potential loss in the future."
Adam Carrier - Head of Consulting
"We continue to drive innovation into the insurance market through our data-driven approach to understanding the political violence risk."
Max Richardson - Associate, Crisis & Security Strategy
"We have a unique modelling capability that enables clients to understand and quantify the impact of terrorist events and other perils, enabling them to build appropriate limits based on the threat."
George Dagnall - Consultant, Crisis & Security Strategy
"We help clients understand the total cost of risk by ensuring any risk mitigation and prevention measures are articulated when broking the risk into the insurance market"
Charlie Howard - Director, Crisis Management & Terrorism Broking
"The Terrorism / PV market is entering a hard market due to the global geopolitical landscape; clients who provide timely, detailed risk information will be in a much stronger position when going to the market"
Justin Priestley - Executive Director, Crisis Management Lead
Political Violence insurance is becoming increasingly challenging due to the continuous global disruption and uncertainties, and we believe it will become even harder. AnotherDay’s consultative approach supports clients in translating this risk at a time that is needed more than ever.
Our dedicated intelligence team have access to some of the most comprehensive terrorism and political violence datasets available, sourced from our many partnerships, covering the globe. This feeds directly into our clients on a real-time basis, and we can work closely and in a tailored way to ensure that useful intelligence and information plays a key role during the risk assessment and risk transfer process.
AnotherDay fuses open-source information with the insights drawn from our extensive global footprint and on-the-ground networks in more than 90 countries to provide incisive foresight and informed strategic advice to companies, governments and individuals working in these challenging, unfamiliar or opaque markets.
Intelligence collection to support operations on the ground cannot be too high level, and must be based on tools and human networks that reflect a constantly changing threat environment at a very local level. We have extensive experience in intelligence collection and analysis with exactly this goal in mind, and must utilize specialist technologies and contacts on the ground to succeed.
Threat assessment, or ‘risk identification’ could be the most important component of the entire risk management process. This stage takes and analyses intelligence, identifies threat actors’ capability and intent, and sets the scene for assessing what risk scenarios could feasibly affect clients.
The intelligence collected on a constant basis by our consultants identifies the most relevant threat actors for a client - for example, Islamic State, or a local insurgent group, or a restive tribe. We then use the intelligence collected to identify the intent of each group to attack or impact our client’s operations: this mainly focuses on the crossover of the groups ideology and aims with the function and profile of the client assets, and considers their own writings, communications, and previous attack history.
Similarly, we use our data to identify the capability of each of these threat groups to attack our client’s operations in the country too: we’ll look to previous attacks, intelligence that we have on law enforcement operations against such groups, and their own communications to identify how capable they are of carrying out an attack against a hardened target, the likely number of attackers, and weapons used.
From this step, clients have visibility of:
These provide the core foundation of how security professionals should be mitigating risk and planning their future risk reduction measures, including risk transfer into the insurance market.
We were approached to carry out a threat and risk assessment for an international corporation with sites throughout Ukraine. Many of these sites were situated in close proximity to the ‘line of contact’, in the Donbass region, where an armed conflict between ...
Risk analysis begins to bring the client’s assets into the assessment process: this step ensures that the risk scenarios identified have been evaluated in comparison to the nature of the client’s assets to be protected. It also considers the influence of vulnerabilities and tactics, both of which are key drivers in whether an attack (or other risk scenario) would likely meet with success or failure.
This phase will produce the risk register – that brings together the intelligence, threat assessment, and our understanding of the operations and protection measures associated with the client’s operations built by our team.
We supported one of the world’s largest insurance brokers to help them respond to a direct attack on a client by a party to the Libyan Civil War, tasking, receiving and analysing sensitive satellite imagery to assess damage and come up with analysis on how the ...
Once the team has completed the threat and risk assessment, we then compile a comprehensive analysis of security countermeasures and solutions with the client. This document will form the basis of how we believe the client should mitigate the identified threats and risks which have been identified, assessed, and evaluated.
The aims of the Risk Treatment Plan will be to ensure the client appropriately protects expatriates, local staff, ongoing operations, and significant capital investment into assets.
Crucially, the risk treatment plan will seek to match residual risk exposures with heads of coverage in collaboration with broking teams, to prepare for risk transfer.
We provided end-to-end, multi-year travel security support for a major oil and gas contractor deploying individuals on projects in high risk locations around the world, including Algeria, Iraq, Israel/Palestine, Papua New Guinea and Nigeria. We provided ...
By its very nature, insurance broking is effectively consulting: but this is slightly different from taking a ‘consultative approach’ to a particularly complex client. The latter is a decision which is taken to focus the engagement on advisory and risk assessment, which subsequently creates a foundation stone for a very stable (and appropriate) insurance programme. This is a process which involves both consultants and brokers.
This approach lends itself particularly well to the Political Violence market, where there is a dynamic and ever evolving threat which affects complex organisations in wildly different ways. The main steps to this approach are shown above, which integrates consulting (in orange) and broking (in blue) to achieve a number of objectives for clients.
The ever-evolving geopolitical landscape and workplace mean that client risks are constantly changing. We take pride in our team’s ability to identify risks and advise clients on the appropriate levels of coverage they might need. Combined with a consultative approach, we build insurance solutions that cover physical assets, balance sheets and, most importantly, employees. This ensures that our clients are covered with the correct insurance solutions and are aligned with the current terrorist threat.
Heads of Coverage:
Supported by a wealth of experience working closely with top-level decision-makers, we help our clients respond efficiently and effectively to organisational crises ranging from insider threats, kidnapping and piracy, terrorist attacks, political upheaval, disease outbreaks and epidemics to cyber-attacks and information security breaches.
Complementing our wider intelligence and consulting services, in the immediate aftermath of an incident or crisis, we partner closely with senior leaders, including organisational crisis management teams, to provide support and advice at both the strategic and tactical levels, thus enabling an appropriate response to protect people, assets, and reputation under frequently dynamic and uncertain conditions.
Whether it be avoiding injury and harm to people or assets, obtaining the release of detained staff, executing local or country-level evacuations, halting the leak of personal data or intellectual property, or navigating the media to avoid reputational catastrophe, we are on hand 24/7/365 – either remotely or in-person – to provide time-critical information, intelligence updates, strategic and tactical advice, and third-party liaison.
We were engaged by one of the largest law firms in the Middle East for a scenario-specific security assessment following a US strike on an Iranian military leader. This programme included the collection of relevant threat intelligence on the current ...