Physical Security Assessments by Silva Consultants #risk #assessment

Uncategorized

&

#

Security Assessments are an superb means to appraise your security program and a first step to consider prior to making safety improvements in your centre or when seeking to fix a safety problem that is particular.

During a Security Assessment, all elements of your safety program are analyzed, any weaknesses are identified, and tips for safety improvements are made. Opportunities where safety operations can be made more efficient or where costs can be reduced are recognized.

The Security Assessment process was utilized to successfully run over 1,000 evaluations at number of unique types of corporate, institutional, and centers over the previous thirty years. This assessment process is continually evolving, allowing us to keep up with the most recent safety best practices, and to benefit from lessons learned from previous evaluations.

The Security Assessment utilizes a formal evaluation process that allows us to develop a profound comprehension of your business, working conditions, corporate culture, and security risks and dangers.

While customer involvement is crucial to success, our advisers facilitate the assessment making certain that all important components are analyzed, and every step of the way, keeping the project on course.

The Security Assessment is custom but contains the following tasks:

  • Risk identification and analysis
  • Threat and vulnerability assessment
  • Inspection of website and facility safety
  • Analysis of crime statistics such as loss background, police calls for service, crime figures, and crime prediction reports.
  • Review of level of compliance with known CPTED (Crime Prevention Through Environmental Design) Lawyers
  • Review of level of compliance with all safety requirements that are particular to your business. These may include C-TPAT (Customs-Trade Partnership Against Terrorism), FISMA (Federal Information Security Management Act), HIPAA (Health Insurance Portability and Accountability Act), PCI (Payment Card Industry), Joint Commission, and security conditions imposed by regulatory agencies.
  • Review of facility operating procedures
  • Review of physical safety systems
  • Review of electronic security systems
  • Review of architectural safety
  • Review of safety policies and procedures
  • Review of safety management
  • Review of safety employees
  • Evaluation of present security program and identification of any weaknesses and vulnerabilities
  • Development of recommendations for safety developments
  • Identification of short-term and long-term costs
  • Prioritization of recommendations and development of implementation strategy
  • Preparation of written Security Assessment Report

The Security Assessment Procedure

Thus, what do you expect when we run a Security Assessment in your centre?

The following is a brief outline of the assessment process that is Normal:

  1. Prior to coming to your website, we will ask several documents for our use during the examination. These include strategies of the website and buildings, copies of some current safety policies and procedures, examples of various types of types, business telephone directory, employee manuals, and other related products. We need that which you already have; when there is it is not a problem.
  2. We’ll work together with you to spot the people in your organization that we’d love to interview. The aim is to obtain a of all of the operating and service departments. Normally, this might include members of senior management (CEO, CFO, CIO, etc.). Department heads, and those who inhabit roles which are directly associated with safety, such as building receptionist’s, safety officers, along with personnel. The interview session lasts between 30 and 45 minutes.
  3. After we first arrive onsite, we will start with conducting an in-depth interview with the person who presently serves as “safety director” for the centre. This might be other individual or the facilities supervisor who oversees the safety function for the organization, or could possibly be an real security supervisor. This interview session takes 2 to 3 hours, and covers a great deal of info. After this interview, we ask that this individual to provide a brief tour of the facility to us.
  4. We subsequently begin conducting different interview sessions with each one of the personnel identified in Step #2 above. Based on the organization’s size, this process could take two one, or more times.
  5. In the close of the interviews, we will conduct in depth inspections of certain areas of the centre and website. We might also spend amounts of time observing certain areas of the facility, such as the construction lobby or shipping/receiving loading docks.
  6. We’ll return during the night with all our light meter to take lighting dimensions in your parking lots and other areas of the website. We’ll also make the most of this chance to see how your facility operates during the night, and to get an overall feel for the neighborhood throughout the hours of darkness.
  7. In the conclusion of our trip to your website, we will meet with you to supply you with an update on our progress and to discuss the next steps in the process. At this point it might be possible to provide some preliminary findings and recommendations, but we will require time to process and analyze the information gathered before we could provide some advice that is meaningful to you.
  8. We then come back to our workplaces and begin our formal Security Assessment process. During this process, we define your critical assets, examine dangers, evaluate security measures, study crime forecasts review loss background, and identify weaknesses and areas for progress. In the conclusion of the process, we begin to compose the Security Assessment Report. It takes between three and two months from the time we finish our website visit to the time when we finish our draft accounts.
  9. While we are preparing the accounts, we often discover things that require further research and research. Sometimes, this may require that we return to the website to analyze things more carefully or to conduct interviews. We might also request information that’s available from within your own organization or specific files.
  10. When the draft Security Assessment Report is finished, we will send it to you for inspection. Once you’ve had an chance to digest the document, respond to some of your queries or remarks and we will meet together with you in person or via teleconference to review the report in detail.
  11. Once we have got your input, we will prepare a last Security Assessment Report that incorporates your remarks. We could make a formal presentation of the Security Assessment Report for your management group or others, if wanted.
  12. In the close of the assessment process, we remain available to assist you with implementation of the recommendations contained within our report. This may include identifying sources and vendors of products and services, reviewing bidding proposals, developing safety policies and procedures, providing training, and assisting in different ways.

Watch the video clip below and review our FAQs to find out more about Security Assessments.

Contact us for a free, no-obligation quote on what it might cost for us to run a Security Assessment on your centre.

&