Threat  Assessments & Security Consulting

Security Assessments

Conducting a Security Assessment is by far one of the best ways you can evaluate your existing security. It is also the first step to take prior to enhancing your existing location or when faced with a new security challenge. Security Assessments are additionally vital to the creation of a new security program if your organization does not have an existing security plan.

A comprehensive Security Assessment reviews all aspects of your security program. This examination is designed to identify any vulnerabilities, as well as provide specific recommendations for improvements. Oftentimes, opportunities are revealed to reduce costs and improve efficiency.

We provide Security Assessments to a wide range of different organizations, such as corporate locations, religious organizations, educational facilities, and government sites. Each Security Assessment is conducted using the structured analysis approach that allows us to obtain a thorough understanding of your business, operating conditions, culture, and distinctive security risks that are specific to your organization. Our systemized approach is designed to keep each Assessment on track, while ensuring all critical elements are analyzed. This can only be accomplished through client involvement during the process.

Each Security Assessment is customized for each project. Standard tasks usually included:

  • Risk Identification and analysis
  • Threat and vulnerability assessment
  • Physical Review of the site and existing security elements
  • A thorough review of area crime data to include calls for service, crime statistics, and loss history
  • Review of CPTED (Crime Prevention Through Environmental Design) compliance for the site and facility
  • Review of compliance for industry-specific security requirements such as HIPPA (Health Insurance Portability and Accountability Act), C-TPAT (Customs-Trade Partnership Against Terrorism), and any other security requirement imposed by a regulatory agency specific to your organization.
  • Review of facility operating procedures
  • Review of physical security systems
  • Review of electronic security systems
  • Review of architectural security
  • Review of security policies and procedures
  • Review of security management
  • Review of security personnel
  • Evaluation of present security program and identification of any weaknesses and vulnerabilities
  • Development of recommendations for security improvements
  • Identification of short-term and long-term costs
  • Prioritization of recommendations and development of implementation plan
  • Preparation of written Security Assessment Report

The Security Assessment Process

Here’s what you can expect during the Security Assessment.

  1. The first step involves reviewing existing documents that will be requested in advance. These documents include site and building plans, existing security procedures and policies, company directory, and employee handbook. This review is completed prior to coming to your site and is designed to give us a first glance into your organization.
  2. The next step involves identifying individuals within your organization that we would like to interview. The objective is to obtain a good cross-representation of all of the major operating and support departments within your organization. Standard personnel are typically senior management, department heads, and individuals directly impacted by security procedures, such as receptionists, security officers, and shipping/receiving personnel. Most interviews are completed within 30 minutes.
  3. The third step is where the rubber meets the road and we arrive on site. We start by conducting a comprehensive interview with the individual in charge of the existing security program. This interview typically spans 1-2 hours as it covers multiple aspects of the organization. Upon completion of the interview, we ask for a guided tour of the facility.
  4. After the tour, we begin conducting interview sessions with each individual identified earlier on in the process. This process can span several days depending on the size of the organization and the scope of the Security Assessment.
  5. Once the interviews are completed, we then begin our detailed inspection of certain areas of the facility/site. This oftentimes includes the observation of certain areas such as shipping/receiving, customer and employee entrances, and storage locations.
  6. The final phase of the on-site review is an examination of the existing lighting plan. This is completed at night and involves taking lighting measurements around the site. This also provides some insight as to the nighttime operations as well as an understanding of the neighborhood activity during when it’s dark.
  7. Upon completing our on-site visit, we will meet with you and provide an update on our progress and outline the next steps in our assessment. While we may be able to provide some preliminary findings at this time, we will need time in order to thoroughly process and analyze the information gathered. This is done so that we may be able to provide meaningful recommendations.
  8. We then return to our offices and begin our formal Security Assessment process. During this process, we identify your critical assets, analyze potential threats, review loss history, study crime forecasts for your site, evaluate existing security measures, and identify potential weaknesses and areas for improvements. At the conclusion of this process, we begin to write the Security Assessment Report. It normally takes between two and three weeks from the time we complete our site visit to the time when we complete our draft report.
  9. While we are preparing the report, we often uncover things that require further investigation and study. In some cases, this may require that we return to the site to conduct additional interviews or to examine certain things more closely. We may also request certain additional documents or other information that is available from within your organization.
  10. When the draft Security Assessment Report is completed, we will send it to you for review. After you have had an opportunity to digest the document, we will meet with you in person or via teleconference to review the report in detail and respond to any of your questions or comments.
  11. After we have obtained your input, we will prepare a final Security Assessment Report that incorporates your comments. If desired, we can make a formal presentation of the Security Assessment Report to your senior management team or others.
  12. After we have obtained your input, we will prepare a final Security Assessment Report that incorporates your comments. If desired, we can make a formal presentation of the Security Assessment Report to your senior management team or others.
  13. At the conclusion of the assessment process, we remain available to assist you with the implementation of the recommendations contained within our report. This can include identifying vendors and sources of products and services, reviewing bid proposals, developing security policies and procedures, providing training, and assisting in other ways.

Contact us today for a free consultation.


Workplace Violence and Active Shooter Prevention Seminars

Incidents of active shooter events are on the rise.  Our programs cover:

  • Basic concepts of Run/Hide/Fight
  • Identification of potential active shooters
  • Prevention methods
  • Stop the Bleed
  • Special topics that are location and employee-specific to fit your needs