Survey & Assessments

A security survey is a process of assessing the security risks and vulnerabilities of a physical space or facility. The purpose of a security survey is to identify potential threats and recommend measures to mitigate those threats.

Types of Assessments We Provide

Security Survey & Assessment

What's Included:

  • Site visit: The security specialist will conduct a site visit to the facility to assess the physical security measures currently in place. This includes an examination of access points, doors, windows, lighting, surveillance cameras, alarms, and other security systems.
  • Interviews: Interviews employees, security personnel, and other stakeholders to gather information about security policies and procedures, incident response plans, and previous security incidents.
  • Risk assessment: Conducts a risk assessment to identify potential security threats and vulnerabilities. This includes an evaluation of the likelihood and impact of various types of security incidents, such as theft, vandalism, or unauthorized access.
  • Vulnerability Assessment:Conducts a vulnerability assessment to identify weaknesses that could be exploited by attackers and recommend measures to mitigate or eliminate those vulnerabilities.
  • Report: The surveyor prepares a report that summarizes the findings of the survey and provides recommendations for improving security. The report typically includes a list of security vulnerabilities and proposed security measures, such as installing new security cameras, improving lighting, or enhancing access control measures.

Risk Assessment

A risk assessment is a process of identifying, evaluating, and prioritizing potential physical security risks to an organization's facilities and assets. The goal of a risk assessment is to identify areas where physical security measures are needed and to recommend actions to mitigate identified risks.

A risk assessment typically involves the following steps (at a minimum):

  1. Scoping: The scope of the assessment is defined, including the facilities and assets to be evaluated, and the objectives and goals of the assessment are established.
  2. Site evaluation: The physical layout and characteristics of the location are evaluated, including the building, perimeter, access points, lighting, and landscaping. This evaluation is used to identify potential vulnerabilities and threats.
  3. Threat analysis: The potential threats to the location are analyzed, including natural disasters, theft, vandalism, terrorism, and other criminal activity. The likelihood and impact of these threats are evaluated.
  4. Risk assessment: The vulnerabilities identified in the site evaluation and the potential threats identified in the threat analysis are combined to assess the level of risk to the location. This assessment is used to prioritize physical security measures and recommendations.
  5. Security controls evaluation: The existing physical security controls in place are evaluated, including alarms, access control systems, CCTV cameras, security personnel, and security policies and procedures. The effectiveness of these controls is assessed, and any weaknesses or gaps in security are identified.
  6. Risk mitigation: Based on the risk assessment, recommendations are made for mitigating identified risks. This may involve installing new physical security controls, improving policies and procedures, or providing training to security personnel.
  7. Reporting: A report is prepared that summarizes the findings of the physical security risk assessment. The report typically includes a list of identified risks, recommended physical security measures, and an assessment of the overall physical security posture of the location.

Vulnerability Assessments

A security vulnerability assessment is a process of identifying potential vulnerabilities in an organization's physical security measures, facilities, and assets. The goal of a security vulnerability assessment is to identify weaknesses that could be exploited by attackers and recommend measures to mitigate or eliminate those vulnerabilities.

A security vulnerability assessment typically involves the following steps (at a minimum):

  1. Scoping: The scope of the assessment is defined, including the facilities and assets to be evaluated, and the objectives and goals of the assessment are established.
  2. Site evaluation: The physical layout and characteristics of the location are evaluated, including the building, perimeter, access points, lighting, and landscaping. This evaluation is used to identify potential vulnerabilities and threats.
  3. Security controls evaluation: The existing physical security controls in place are evaluated, including alarms, access control systems, CCTV cameras, security personnel, and security policies and procedures. The effectiveness of these controls is assessed, and any weaknesses or gaps in security are identified.
  4. Threat analysis: The potential threats to the location are analyzed, including natural disasters, theft, vandalism, terrorism, and other criminal activity. The likelihood and impact of these threats are evaluated.
  5. Risk assessment: The vulnerabilities identified in the site evaluation and the potential threats identified in the threat analysis are combined to assess the level of risk to the location. This assessment is used to prioritize physical security measures and recommendations.
  6. Reporting: A report is prepared that summarizes the findings of the physical security vulnerability assessment. The report typically includes a list of vulnerabilities, recommended physical security measures, and an assessment of the overall physical security posture of the location.
  7. Implementation: Based on the recommendations of the security vulnerability assessment, physical security measures are implemented to improve security and reduce risk. This may involve installing new physical security controls, improving policies and procedures, or providing training to security personnel.

Threat Assessment

A threat assessment is a process of evaluating potential threats to an individual, organization, or community. The goal of a threat assessment is to identify threats before they become incidents, and to develop plans to mitigate the risks associated with those threats.

A threat assessment typically involves the following steps (at a minimum):

  1. Scoping: The scope of the assessment is defined, including the individual, organization, or community to be evaluated, and the objectives and goals of the assessment are established.
  2. Information gathering: Information is gathered about the individual, organization, or community, including their history, activities, and relationships. This information is used to identify potential threats and assess the level of risk.
  3. Threat analysis: The potential threats to the individual, organization, or community are analyzed, including natural disasters, violence, terrorism, and other criminal activity. The likelihood and impact of these threats are evaluated.
  4. Risk assessment: The vulnerabilities identified in the information gathering and threat analysis are combined to assess the level of risk to the individual, organization, or community. This assessment is used to prioritize threat mitigation measures and recommendations.
  5. Reporting: A report is prepared that summarizes the findings of the threat assessment. The report typically includes a list of identified threats, recommended threat mitigation measures, and an assessment of the overall threat posture of the individual, organization, or community.
  6. Mitigation: Based on the findings of the threat assessment, threat mitigation measures are implemented to reduce risk. This may involve implementing new security controls, improving policies and procedures, or providing training to employees or community members.
1 of 3