Risk Management
HSS assessment identifies threats and vulnerabilities which result in critical information needed to make cost-effective risk management decisions and protect assets. Rather than use cookie-cutter approaches, we develop industry-specific and client-specific risk assessment methodologies using industry standards and best practices as well as each client’s unique needs. Methodologies have been developed for Schools, Hospitals, Universities, Office Buildings, and others. These include: Security Risk Management, Critical Asset Identification, Threat and Vulnerability Assessments, Risk Mitigation Strategies Phased, Scalable Solutions.
Crime Analysis
Identifies the threat level of your facility and your assets using actual crime records from the local law enforcement agencies where your facilities are located. Security metrics are then generated and used to benchmark your threats, select appropriate countermeasures to reduce risk. Crime Analysis allows you to demonstrate and document your due diligence efforts and realize a sizable Return on Investment (ROI). It also identifies threats to your assets, analyze threat patterns, allocate security resource based on actual threats, reduce vulnerabilities and risk, forecast future threats, Determine high and low crime thresholds.
Risk Mitigation
Given a specific risk, there are five strategies available to security decision makers to mitigate risk: avoidance, reduction, spreading, transfer and acceptance. The goal of most security programs is to reduce risk. Risk mitigation is accomplished by decreasing the threat level by eliminating or intercepting the adversary before they attack, blocking opportunities through enhanced security, or reducing the consequences if an attack should occur. Without question, the best strategy for mitigating risk is a combination of all three elements, decreasing threats, blocking opportunities and reducing consequences. Policies, Procedures and Training; Physical/Electronic Security Systems; and Security Personnel. A sound mitigation strategy maximizes existing security resources (optimization) and prioritizes Policies first, Systems second, and Personnel third.
Vulnerability Assessments
A vulnerability assessment, sometimes referred to as a security vulnerability assessment, is an analysis of security weaknesses and opportunities for adversarial exploitation in one or more of the above categories. The fundamental method for assessing vulnerabilities is the security survey, which is a tool for collecting information about the facility. The goal of a vulnerability assessment is to identify and block opportunities for attacks against assets. By effectively blocking opportunities, security decision makers can mitigate threats and reduce risk. No two facilities are exactly the same. We develop customized security surveys to identify the unique security posture for each facility.