Security Vulnerability Assessment and Planning

Risk Assessment, Threat Management and Emergency Response Planning are an excellent way to evaluate your existing security program and a great first step to take prior to making security improvements.

Risk, Threat and Emergency Planning

Risk Mitigation Technologies, LLC’s Security Vulnerability Assessment and Planning are based on industry standards and guidelines as recommended by ASIS International, the world’s largest association for security management; and conducted in a method recommended by the International Association of Professional Security Consultants, the most widely respected and recognized security consultant association in the industry.

We offer Personalized Security Solutions: Safeguarding Your Peace of Mind ™ . We customize our Security Vulnerability Assessment and Planning for each client, as we understand that each client has individual needs that are unique to their operations. Our purpose is to collaborate with clients to build trust and provide quality services that promote professionalism, ensures fiscal responsibility, reduces the risk of crime, reduces the fear of crime, and promotes safety.

During our assessment, all aspects of your security program are examined, weaknesses are identified, and suggestions for security improvements are made. In addition, opportunities where costs can be reduced or where security operations can be made more efficient are identified.

As mentioned, our practice is to follow industry best practices and established industry standards and guidelines, as we feel that these are proven methods and can offer the most protection for the client. This assessment process is constantly evolving, allowing us to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices. 

Our Security Vulnerability Assessment and Planning uses a structured, formal analysis process that allows us to develop a deep understanding of your business, properties, operating conditions, corporate culture, and unique security risks and threats. While client involvement is crucial to success, we facilitate the assessment every step of the way, keeping the project on track, and making sure that all essential elements are examined.

So, what can you expect when we conduct Security Assessment and Planning at your facility?

The budget number that we provide you will be firm. So, unless there is a change order, an addendum, or amendments to the project’s scope approved in writing by you the client in advance, you will not pay a penny more than our quoted budget for the project. We don’t sell security equipment or software; therefore, these items are NOT included in our pricing. We greatly value our independence and go out of our way to avoid business arrangements that pose a potential for a conflict of interest.

Prior to coming to your site, we will request several documents for our use during the assessment. These typically include plans of the site and buildings, copies of any existing security policies and procedures, samples of several types of forms, company telephone directory, employee handbook, and other related items. We only want what you already have; if there is something on our request list that is not available, it is not a problem.

We will collaborate with you to identify the people within your organization that we would like to interview. The goal is to get a good cross-representation of all the major operating and support departments within your organization. We include members of senior leadership, department heads, and people who occupy roles which are related to security, such as building receptionist’s, security officers, and shipping/receiving personnel. The typical interview session lasts between 45 and 60 minutes.

When we first arrive on site, we will start by conducting an in-depth interview with the person who presently serves as “security manager” for the facility. This may be an actual security manager or may be the facilities manager or other person who manages the security function for the organization. This interview session covers a lot of details, and typically takes 2 to 3 hours. After this interview, we ask this person to give us a brief guided tour of the facility. At the conclusion of the interviews, we will conduct detailed inspections of certain areas of the facility and site. We may also spend extended periods of time observing certain areas of your facility, such as the building lobby or shipping/receiving loading docks.

During evening hours, we will be onsite to observe the night operations of the campus, and we will conduct a lighting assessment of the building’s exterior and parking areas.

At the conclusion of our visit to your site, we will meet with you to give you an update on our progress and to discuss the next steps in the process. At this point it may be possible to offer some preliminary findings and recommendations, but in most cases, we will need time to process and analyze the data gathered before we can give you any meaningful guidance.

We then return to our office and begin our formal Security Assessment and Planning process. During this process, we identify your critical assets, analyze potential threats, review loss history, study crime forecasts for your site, evaluate existing security measures, and identify potential weaknesses and areas for improvements. At the conclusion of this process, we begin to write the Security Assessment Report. It normally takes between two and three weeks from the time we complete our site visit to the time when we complete our draft report.

While we are preparing the report, we often uncover things that require further investigation and study. In some cases, this may require that we return to the site to conduct additional interviews or to examine certain things more closely. We may also request certain additional documents or other information that is available from within your organization.

We will send you a draft copy of the Security Assessment and Planning Report for your review once it is completed. After you have had an opportunity to digest the document, we will meet with you in person or via teleconference to review the report in detail and respond to any of your questions or comments.

After we have obtained your input, we will prepare a final Security Assessment and Planning Report that incorporates your comments. If desired, we can make a formal presentation of the Security Assessment And Planning Report to your senior management team or others.

At the conclusion of the assessment process, we remain available to assist you with implementation of the recommendations contained within our report. This can include identifying vendors and sources of products and services, reviewing bid proposals, developing security policies and procedures, providing training, and assisting in other ways.

Contact us today for a free, no-obligation quotation on what it would cost for us to conduct a Security Assessment and Planning for your facility.