Comprehensive Risk, Threat and Vulnerability Assessment

Detailed and rigorous review of a wide range of natural, accidental and human threats.  Analysis of risks, threats and vulnerabilities, and the implications and consequences these present to current capabilities and operations related to strategic security, crisis management, continuity of operations, communications, physical and technical security, emergency preparedness and workforce protection.  Recommendations on most attractive opportunities to better mitigate security risk.

Security Operations Assessment

Objective and independent security assessment of existing security program capabilities, resources and priorities. Careful evaluation of all safety and security program drivers, including strategy, structure and funding; organization, staffing and training; policies and core processes; physical and technical security; and the integration and effectiveness of technologies related to security risk.

Best Practices and Benchmarking

Strategic recommendations on multiple areas such as baselines for emergency preparedness, incident management, crisis response, continuity of operations, security awareness, workplace violence prevention, visitor management, credentialing and background screening.

Security Program Cost Analysis and Budget Recommendations

Analysis and assessment of program or departmental costs and budgets in order to align expenditures with security risks, eliminate inefficiencies, improve return on investment and increase value delivery to the business.

Quantitative Risk Analysis

Application of a proprietary methodology aligned with the Department of Homeland Security's approach to risk as a function of threats, vulnerabilities and consequences.  Results in a prioritized ranking of security risks that highlight comparisons across categories.  Helps capture information and craft consensus across internal and external stakeholders.  Provides a transparent, score-based platform that can be used to rationalize, plan and align ongoing investments in security risk management capabilities in a manner that reflects the risk environment and the organization's unique objectives, capabilities and constraints.