Security Risk and Vulnerability Assessments
The World Protection Group performs security risk and vulnerability assessments as a crucial and necessary first step when beginning a new security engagement for individuals or organizations. In addition, as a leading full-service security firm and recognized authority in the field, we are often called upon to perform security risk and vulnerability assessments as a standalone service.
What is a Security Site Assessment?
A Security Site Assessment or Security Audit determines if the current protective measures in place around a facility or residence are appropriate for the risk environment and are consistent with best practices. We also identify, via gap analysis, any weak points in security and provide sound, robust recommendations for the enhancement of security procedures.
Part 1 – Interviews: An assessment is framed by an initial series of interviews. For residential properties, these are with owners, relevant staff, and appropriate law enforcement officials. For commercial properties, they are with security employees, key management, and appropriate law enforcement officials. The objective of these interviews is to identify key issues, internal and external threats, and crime problems or other issues that may affect the location.
Part 2 – Physical Assessment: We perform at least one customized on-site inspection, taking as a starting point, as appropriate, the following areas:
- Current security procedures
- Analysis of the routes leading to and from the premises
- Access control measures and procedures
- Physical security of perimeters
- Physical security of offices and parking
- Illumination (external and internal)
- Electronic security measures (alarms, panic buttons, CCTV, etc.)
- Personnel security issues and protective measures
- Exposure of critical assets
- Measures are taken to protect intellectual property and other sensitive information
Part 3 – Categorization: The assessment then categorizes the threats and identifies their source, capability, motivators and likely triggers.
Part 4 – Analysis: Each risk is mapped onto an Impact/Likelihood matrix. The five levels of impact (insignificant, minor, moderate, major, extreme) are matrixed with the five levels of likelihood (rare, unlikely, credible, likely, almost certain).
Part 5 – Evaluation: The Risks are prioritized for treatment based on the client’s risk tolerance.
Part 6 – Risk Treatment: The World Protection Group then designs a treatment strategy designed to support the client’s objectives, processes, and activities, allowing for continuous monitoring of its effectiveness.
This process is directed by the World Protection Group’s proprietary “All Threat / Hazard Vulnerability Assessment” tool, produced for security professionals after ten years of research and development. The final report also relies on intelligence resources subject matter experts, best-known practices and methodologies derived from the Federal Emergency Management Agency (FEMA) and the American Society for Industrial Security (ASIS).
Need Security Risk and Vulnerability Assessments?
Please contact us to schedule a free and confidential consultation about security risk and vulnerability assessments.