Maybe our company name was shared over a business lunch. Or not. It was more likely an email from a trusted source, with a few good words and a link to our website. “You come recommended,” the organization’s security leader said. “I’d like to talk about having you help us tackle some technical security issues.” That’s the way our relationship started. Through someone who knew our work. With an initial request that was narrowly scoped. Exploratory. Focused on discovery, insights, best practices. And planning. “Have your team give us an initial assessment of our security posture – and help us define our short- and long-term security goals for how we can implement security technology across our sites.”
The Hillard Heintze Solution: Technical Security Risk Assessment
That was 2014. It was a good way to start any long-term relationship. We began by conducting a conditions assessment of headquarters’ access control and CCTV surveillance systems, including an analysis of security systems, distribution and upgradeability. We then recommended standards for the company’s offices worldwide. We proposed a robust five-year strategy, including objectives, key tasks, dependencies and assumptions, estimated costs and scheduling milestones.
The client asked us to assist with implementation. We delivered a security system design and developed a Request for Proposal for the replacement of the existing access control system at the headquarters. The new system is expandable to accommodate future sites as the company grows. Then we were asked to address other priorities, including security design for a new lobby and upgrading surveillance systems.
Impact on the Client’s Business
This client continues to call on us. Over the years, we have developed master specifications for future corporate locations across its global footprint and we are on call to review contractor proposals and installations to ensure they are procured in accordance with the master specifications. The outcome for this client is assurance – that it is addressing risk across an expanding range of security-related priorities.