Skip to Content
Advisory Services Case Studies IRS 132 Intelligence FAQ Request Consultation Engage HCI

Where Institutional
Security
Meets Independent
Counsel

Independent security advisory for corporations, family offices, and senior executives who require strategic counsel, not a vendor relationship.

HIGH CALIBER INSIGHT
The HCI Difference

What Enterprise
Vendors Can't
Deliver

Enterprise security firms protect the average principal. Your principal is not average.

HCI functions as an independent advisory partner: no agents to deploy, no headcount to protect, no vendor contract to renew. Every recommendation is made without a financial interest in the outcome.

Capability Enterprise Vendor HCI
Independent advisory
Fortune 500 principal experience
Program audit capability
IRS 132 program structuring
ISS report production
Professional liability insurance
In-house program development
Principal threat intelligence profiles
Federal & diplomatic security network
Single accountability contact
Who Engages HCI
Client Profile
RoleChief Security Officer, VP Corporate Security, General Counsel
NeedIndependent program audit before board presentation
RoleFamily Office Principal or Private Equity Executive
NeedEP program design with lifestyle integration and IRS compliance
RoleHR or Legal Counsel at Fortune 500
NeedDuty of care framework and vendor selection guidance
RoleBoard of Directors or Risk Committee
NeedStrategic security posture review for executive population
RoleCorporate Security or Operations Leadership
NeedIn-house EP program architecture, hiring criteria, and SOP development
RoleFamily Office Director or Principal
NeedInternal security team buildout with professional-grade training and operational frameworks
Advisory Network
Specialized Capability
FederalU.S. Secret Service protective operations
DiplomaticState Department Diplomatic Security Service
Law EnforcementFederal & municipal LE backgrounds
MilitarySpecial operations & security contracting
CorporateFortune 500 CSO & program director level
InternationalHigh-threat environment EP operations
Network practitioners engaged per-engagement. All engagements led by HCI senior advisory.
Practice Areas

Five Lines
of Advisory

Each engagement is scoped around the client's actual threat environment, organizational structure, and risk tolerance, not a templated service package. This includes organizations that have chosen to build and operate programs in-house rather than through an external vendor. HCI does not deploy agents. We design, build, audit, and advise.

01

EP Program Design & Architecture

Full-cycle EP program development: threat assessment, SOP development, agent selection criteria, advance protocol design, and IRS 132 compliance structuring. Built as a duty-of-care asset, not a reactive cost center.

Threat Assessment SOP Development IRS 132 Advance Protocols Principal Profiling
02

Interim Program Leadership

Director-level program oversight, deployable within 72 hours. Provides continuity, agent accountability, and principal confidence during leadership transitions or organizational restructuring.

Rapid Deployment Team Accountability Continuity Transition Support
03

Security Consulting & Program Audits

Independent program audits and strategic advisory for CSOs, General Counsel, and boards. Vendor-independent recommendations aligned with ISO standards, FBI and DHS risk frameworks, and board-level fiduciary requirements.

Program Audits Vendor Assessment Risk Analysis Board Advisory Family Offices
04

In-House Program Development

For organizations building internal EP capability. HCI provides the institutional framework: hiring criteria, org structure, SOP development, training standards, and technology selection, so the program operates at a professional standard from day one.

Internal Hiring Criteria Program Architecture SOP Development Training Frameworks Technology Selection Org Design
05

Individual Security Study & IRS 132 Qualification

IRS Section 132(d) requires a formal Individual Security Study to qualify EP expenditures as tax-exempt working condition fringe benefits. HCI produces audit-ready ISS documentation that turns your security budget into a defensible fiduciary position.

ISS Documentation IRS 132 Qualification CFO & GC Ready Audit Defensible Annual Review Board Documentation
06

Principal Threat Intelligence & Risk Profiles

A written threat profile for a specific principal: digital exposure, residential vulnerability, travel risk, and reputational targeting vectors. Distinct from the ISS, this is operational intelligence for program directors and CSOs who need a current threat picture.

Principal Risk Profile Digital Exposure Residential Vulnerability OSINT Analysis Travel Risk Reputational Targeting
Field Experience

Case Studies

The following case studies are composite scenarios drawn from HCI's advisory practice. All identifying details have been altered or omitted to protect client confidentiality.

01
Fortune 500 · Technology Sector

Program Audit Following a Material Threat Escalation

Engagement Type
Independent Program Audit
Client
Fortune 500 CEO, Technology
Duration
6 Weeks
Deliverable
Audit Report + Remediation Plan

A Fortune 500 technology company retained HCI following a credible threat incident; the existing EP program, managed by a national vendor for three years, had never undergone an independent audit.

No current ISS. Threat assessment 27 months old, prepared by the vendor itself. SOPs never updated. Agent selection entirely at the vendor's discretion. IRS 132 documentation absent, with retroactive tax exposure estimated at over $180,000.

HCI conducted a structured 50-point audit over six weeks (agent interviews, SOP review, threat reassessment, and contract analysis), entirely independent of the existing vendor.

50-point program audit delivered in 6 weeks with a prioritized remediation roadmap across governance, operations, and compliance
New ISS produced and reviewed by outside tax counsel; retroactive IRS 132 exposure of $180,000+ addressed and qualification established on a forward basis
12-SOP library and agent selection criteria rebuilt from scratch, replacing a program with zero documented standards at inception
Vendor contract renegotiated with defined performance standards, HCI-drafted approval rights over agent assignments, and independent annual audit provisions
02
Family Office · Private Client

Building an In-House EP Program From the Ground Up

Engagement Type
In-House Program Development
Client
Multi-Principal Family Office
Duration
5 Months
Deliverable
Operational Program + Documentation

A multi-principal family office with significant public exposure made the decision to move from a vendor-managed EP model to a fully in-house program, after years of inconsistent coverage quality and confidentiality concerns.

Building in-house EP without institutional knowledge produces structural gaps and legal exposure. The family office had no existing documentation, no hiring framework, and no IRS compliance structure.

HCI built the program from zero: individual threat assessments, org design, full SOP library, training standards, and concurrent ISS production for all three principals. Operational handover in five months.

Fully operational in-house EP program: 4 agents hired, trained, and deployed, within 5 months of engagement start
3 concurrent ISS reports produced, reviewed by outside tax counsel, IRS 132 compliance established for all principals simultaneously
22-document SOP library covering residential, travel, public appearance, and family member protocols, built from zero existing documentation
Estimated annual vendor cost reduction of $340K against prior external program expenditure, with materially improved coverage quality
03
Corporate · Entertainment & Media

Interim Program Leadership During a Critical Transition

Engagement Type
Interim Program Leadership
Client
Global Entertainment Company
Duration
4 Months
Deliverable
Operational Continuity + Transition

A global entertainment company's corporate security director departed unexpectedly, mid-vendor contract, active threat environment, with a permanent replacement search expected to take three to four months.

All operational knowledge (vendor relationships, advance protocols, threat file history) walked out the door. Without immediate replacement, the vendor would run the program without oversight. The risk committee flagged an unacceptable governance gap.

HCI activated an interim program director within 72 hours. Full scope assumed immediately: daily oversight, agent accountability, advance coordination, threat monitoring, and principal communication.

Zero operational gaps across 4 months of full interim program leadership, with principal coverage maintained without a single missed assignment
Complete program documentation rebuilt: 8 operational protocols, threat file updated, vendor performance records organized for incoming director
2 vendor performance deficiencies (one agent qualification gap, one advance protocol failure) identified, documented, and corrected during interim period
Permanent director onboarded in under 11 days with full operational context. No program continuity exposure at any point in the transition

All case studies represent composite scenarios. Client identities, industries, and specific details have been altered or omitted to protect confidentiality. Outcomes described reflect the types of results achieved across HCI advisory engagements.

IRS Section 132 · Individual Security Study

The Document
That Justifies
Every Dollar

Under IRS Section 132(d), executive protection expenditures qualify as tax-exempt working condition fringe benefits, meaning the company pays for the program without it becoming taxable income to the executive.

The requirement: a formal Individual Security Study (ISS): a documented threat assessment by a qualified security professional establishing a bona fide, business-oriented security concern specific to the individual. The IRS does not accept generic assessments or templated forms.

Most organizations either skip this entirely, leaving significant tax exposure, or produce documentation that would not survive audit scrutiny. HCI produces ISS reports built to withstand IRS examination.

Request an ISS Report
What the ISS Documents
Principal Threat Profile
Documented assessment of specific, credible threats based on role, public exposure, industry, and prior incidents.
Business-Nexus Justification
Establishes that the security concern arises from the principal's business role, the IRS threshold required to qualify protection as a working condition benefit.
Program Expenditure Basis
Ties each program cost, including agents, advance work, and secure transport, back to the substantiated threat for audit defensibility.
Annual Review Framework
The IRS expects the ISS updated as conditions change. HCI structures reports to support annual review and ongoing audit readiness.
Who Needs an ISS Report
Fortune 500 CEOs
Board Members
C-Suite Executives
Family Office Principals
High-Net-Worth Individuals
PE & Venture Principals
Field Intelligence

Intelligence
Worth Acting On

Mexico City · Advance protocol required Nairobi · Elevated principal exposure Cairo · Monitor protest activity Bogotá · KFR threat active London · Reputational targeting risk Lagos · Restricted movement zones Singapore · Stable — standard protocol Karachi · Critical threat environment São Paulo · Armored transport advised Baghdad · QRF on standby required Tokyo · Minimal residual risk Kabul · Denied area — no-go Mexico City · Advance protocol required Nairobi · Elevated principal exposure Cairo · Monitor protest activity Bogotá · KFR threat active London · Reputational targeting risk Lagos · Restricted movement zones Singapore · Stable — standard protocol Karachi · Critical threat environment São Paulo · Armored transport advised Baghdad · QRF on standby required Tokyo · Minimal residual risk Kabul · Denied area — no-go
Live Intelligence

Global Threat
Assessment

Real-time AI-generated threat assessments for every country and major city, covering political stability, security conditions, principal travel risk, and EP program recommendations. Built for security directors, CSOs, and executive protection program managers.

Critical Risk High Risk Low Risk 110+ Countries
Open Global Intelligence Map
Common Questions

Frequently
Asked
Questions

Answers to the questions we receive most often from CSOs, General Counsel, HR leadership, and family office principals before engaging HCI.

What is the difference between HCI and a staffing firm or EP vendor?+
EP vendors earn revenue on headcount, giving them a structural incentive to recommend more coverage. HCI deploys no agents and holds no staffing contracts. Our only interest is your security outcome.
Can HCI work alongside our existing EP vendor?+
Yes, this is one of the most common structures. HCI operates as an independent advisory layer while your vendor handles deployment. Most organizations find it improves program quality without changing vendor relationships.
How long does an ISS report take to produce?+
2–4 weeks from briefing to final deliverable: principal interview, threat intelligence compilation, business-nexus analysis, and formal report. Expedited timelines available for urgent audit exposure.
What does an HCI engagement cost?+
Scoped and priced to the specific work, with no standard retainer. An ISS report is a fixed-fee deliverable. Full program engagements are scoped after an initial briefing. No cost or commitment to the first conversation.
Our CFO wants justification for the EP budget. How does IRS 132 help?+
IRS 132(d) converts EP expenditures from taxable executive compensation into tax-exempt working condition fringe benefits. The ISS HCI produces is the document that substantiates this treatment, giving your CFO and GC an audit-ready position.
How do HCI engagements begin?+
A direct, confidential conversation, no sales process, no account manager. Submit an inquiry through the contact form or email .
Direct Engagement

Request
a Briefing

A direct conversation with senior advisory leadership. No sales process, no account manager. Response within 24 hours.

Location
San Jose, CA
Bay Area & Northern California
Model
Referral-based
Direct corporate engagements
Email
Response
Within 24 hours
Senior leadership direct
Registration
California LLC
Security Consulting Firm