skip to Main Content

If you haven’t assessed your physical security risks in the past five years,

  • Are you confident your security program is prioritizing the risks that pose the greatest threat?
  • Can you state with certainty that your organization is using best security practices to control and manage your vulnerabilities?
  • Will you be able to withstand the scrutiny of an OSHA investigation or properly defend against a premise liability allegation?

BPS has the knowledge and experience to guide you through the steps critical to assessing your security risk. Let us help you eliminate crime before it happens with a simple physical security risk assessment project.

Benefits of a Physical Security Risk Assessment

  • Prevent incidents and criminal activity.
  • Compliance with the OSHA General Duty Clause.
  • Learn where you can be victimized by criminals or terrorists.
  • Identify holistic mitigation strategies to reduce security risk to people, assets and information.
  • Stage implementation of recommendations at your own pace rather than hastily responding or overreacting after a security incident.
  • Secure funding for security improvements by making a compelling business case. (Management will sometimes react more rapidly to third party recommendations or those that are well supported with crime and other data analysis).
  • Identify to all stakeholders what needs to be protected, why and from whom.
  • Implement many improvements without a capital investment. Typically, 80% of BPS’ security risk assessment recommendations can be implemented without expending capital.
  • Identify emergency scenarios and calibrate emergency response and business continuity plans accordingly.
  • Defend against frivolous litigation.

What is the best way to determine if your security is adequate? Read our blog on The Three Components of a Security Risk Assessment

Take steps now to put your organization in a better position to mitigate both known and potential attacks. BPS is ready to help.

Overview of Your Security Risk Assessment Experience

You risk assessment will be planned in three phases:

  1. Planning Prior to Field Deployment – BPS’ success is attributed to our meticulous planning and execution of client security risk assessments.
    • Initiate a request for information from the Client to gather relevant documents to support the project.
    • Collect crime data from local law enforcement and other relevant sources
    • Develop a facility threat profile including an inventory of credible security scenarios (e.g., workplace violence, theft, vandalism).
  2. Fieldwork and Site Visit – BPS will execute the following process during all field work to enable the Client to meet project goals and most importantly, prioritize future investments in technical and procedural security to the areas where it is needed most.
    • Validate the facility threat profile
    • Interview managers and other key stakeholders
    • Tour the facility and grounds
    • Observe operations
    • Deliberate to classify and rank risks
    • Make a preliminary exit presentation on early findings and projected recommendations

How security risk is analyzed:

Risk is analyzed and score considering three elements per global risk assessment standards:

  • Probability of occurrence. How likely is it an incident will occur?
  • Consequences if an incident were to occur. How bad will it be if the incident occurs?
  • Preparedness to prevent an incident from occurring. How well is the organization positioned to prevent the incident?
    • In determining the level of preparedness for prevention and response, BPS will assess hundreds of individual elements of your security program during site inspections, interviews and documentation review.

Scoring the Final Risk for each Scenario.  Security scenarios for each facility or department will be scored on a scale of 3-15 and a risk classification assigned as shown in the matrix above. Utilization of this transparent methodology will enable you to make cost/benefit decisions.

BPS-PhysicalSecurityRiskAssessment-Matrix

After the initial risk is assigned and for those highest scoring scenarios BPS works to identify options for reducing risk ideally to a moderate level of risk and out of the high and critical levels where they may exist today.  They key is our extensive knowledge on security risk management best practices that can be surgically applied to the areas with the highest existing risk.  After considering a variety of mitigations and assuming those were implemented, BPS will rescore the risks to demonstrate the impact of recommended mitigation strategies.

BPS-Risk Matrix-Physical Security Risk Assessment
  1. Reporting – BPS will issue a draft and final report at the conclusion of each risk assessment, unless the client wishes to have a verbal briefing.

Typically, within about ten days, you will receive a draft written report that outlines the existing conditions, findings and recommendations.  Like any group of action items, it is always better to have things put in order.  BPS has several methods to prioritize recommendations to assist you in implementation and putting first things first.  After you have had a chance to review the draft report, if there are any edits that need to be made, BPS will make those quickly and return a final report to you with a detailed implementation plan.

BPS typically provides cost estimates for recommendations because leadership’s first question after receiving the recommendations and implementation plan is, “what is this going to cost?” By including the cost estimates with the report, you are ready to get started without delay in better protecting your people, assets and information.

Typical Security Risk Assessment Report Outline

The outline below represents what you can expect in a typical security risk assessment report:

  • Table of Contents
  • Executive Summary
    • Strengths of the Security Program
    • Threat Assessment
    • Critical Assets
    • Top Risks
    • Top Recommendations
  • Detailed Findings and Recommendations
  • Cost for Implementation
  • Report Addendums

Ask The Security Expert

  • Do you have questions about keeping your employees safe in the workplace?
  • Wondering if your security measures are adequate for your facility?
  • Or perhaps you need help with industry regulatory issues and don’t know where to start?

BPS President and Certified Security Consultant Frank Pisciotta is ready to point you in the right direction.  With more than 29 years of experience in security consulting, Frank has helped thousands of corporations, manufacturers, governments and healthcare facility managers keep their people and products safe.

Frank will personally respond to your questions within 24 hours.  Ask The Expert and start Eliminating Crime Before It Happens.

Security Assessment Experts

For decades, BPS has approached security risk assessments by first measuring the relative security challenges of each specific environment. Our experts know where to look for key weaknesses, whether those involve technology, staffing, regulatory issues, or even frivolous “inadequate security” allegations known as premises liability tort law.

The next step is to identify the greatest risks at each site. BPS looks at a broad range of industry-recognized concerns, including OSHA’s General Duty Clause requirement to provide a place of employment that is “free from recognized hazards that are causing or are likely to cause death or serious physical harm.”

Finally, our experts pinpoint vulnerabilities and corrections that would have the most significant impact on reducing your risk. We can help you use your resources wisely and effectively to best manage your specific situation. Contact us today.

Risk Management - Business Protection Specialists

Ethical And Independent Consultants

Because we operate as an independent consultant, our evaluations and recommendations are completely objective. BPS security risk assessments focus on best industry practices and your specific site environment. We do not accept fees or commissions for referrals or product recommendations. See our Code of Ethics for more details.

Let us help you get a fresh look at improving your security efforts. Contact BPS today.

Back To Top