Ethos, Code Of Practice, How We Operate.

  • Home
  • Ethos, Code Of Practice, How We Operate.

Our Corporate Ethos, Code of Practice, & How We Operate.


Although Survivability Recruitment™ is a business, we operate in the same ethos of our parent company the MLi Group. Money and profitability are NOT our only motivations.

Our primary goal is to help stakeholders who are our clients become better able to secure their effective and competitive cyber and non cyber survivability in the Era of Unprecedented threats.

Code of Practice

  • We will NEVER recommend a talent for you to hire or retain you do not need.
  • We will NEVER recommend a service for you to adopt or consider which you do not need.
  • We are NOT a sales company.
  • We do NOT have sales people, associates, or executives.
  • Our executives who deal with clients or prospective clients are ‘Survivability Client Fulfilment Officers’.

How we Operate

  • How we Operate
  • Initial High Level Assessment Virtual Call or in-person Meeting
  • Detailed in-depth follow up virtual Call or in-person Meeting.
  • In-Depth Engagement.
  • Comprehensive Process.


Get Your Questions Answered – Ask us why, where, when & how.
Click to submit your briefing request. 

[vc_btn title=”Request a Confidential “NO Obligation“ 1st Briefing” style=”3d” shape=”round” color=”juicy-pink” i_align=”right” i_icon_fontawesome=”fas fa-chevron-circle-right” add_icon=”true” css=”.vc_custom_1629111411929{margin-top: -30px !important;margin-left: 350px !important;}” link=”|title:Contact%20Us”]

What Are
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more