Threat/Risk & Vulnerability Assessments
Lennon Security Corporation will determine where vulnerabilities and risks exist and propose solutions to mitigate those risks. The first steps are to conduct a walk through of the facility or project and to interview the responsible representatives in order to analyze potential threats presented to the client. Lennon Security focuses on, but is not limited to, the following areas:
When any of these steps are left out, the result can either be inadequate protection or unnecessary and overly expensive protection. Frequently, the missing element is the incorporation of specific, up-to-date threat/risk and vulnerability assessments in the development of security policies. With no documented threat information, countermeasures are often based on worse case scenarios. Worse case scenarios are often unrealistic and extremely expensive to counter. Risk management suggests a more realistic, intelligent and cost-effective approach when deciding appropriate security countermeasures.
It is Lennon Security's practice to meet with our clients immediately after completing the assessment but before submitting an in-depth written report in order to discuss our findings and recommendations. The report could be presented in an easy-to-comprehend summary table format as mentioned in “Recommendations of Enhancements or Upgrades” above.
|© Copyright 2011 Lennon Security Corporation|