Threat & Risk Assessments2018-03-20T22:50:23+00:00

Threat and Vulnerability Assessments

A threat and vulnerability assessment is a critical first step in designing any security program. Only a comprehensive assessment, conducted by a qualified, experienced and certified assessor, using a logical and proven methodology provide the necessary quantitative and qualitative information to make accurate and cost-effective decisions critical to the protection of your physical assets, organizations, clients and employees.

BDA has more than three-decades experience completing assessments in the highest risk, most complex environments around the world on a diverse set of corporate and industrial assets, data centers, schools including K-12, colleges and universities, private estates and homes, and houses of worship.

We utilize globally accepted Protection-In-Depth methodologies consistent with ASIS International Risk Assessment Standards, American Standards Institute, and ISO risk modeling guidelines combined with the latest guidelines is by the U.S. Department of Homeland Security to ensure our clients clearly understand their security risks ranging from global terrorism to local petty street crime and guide them in selecting the most effective countermeasures, including the latest in security technology, and designing and implementing a security program with fail-safe policies, procedures and controls to mitigate the most complex risks.

Our assessments often form the security baseline for compliance with some of the most demanding compliance, audit and reporting standards required of our clients including SSAE -16, SAS-70, Patriot Act, Sarbanes Oxley and HIPAA and are governed by the following approach:

1. Threat Origin:

  • Global
  • Regional
  • Local

2. Threat Profile:

  • Terrorism (targeted and indiscriminate)
  • Organized Crime
  • Serious Crime
  • Workplace violence
  • Spontaneous violence
  • Local area & petty crime

3. Access Control:

  •  Authentication
  • Credentialing
  • Monitoring

4. Site Security:

  • Perimeters
  • Access Points
  • Vehicle Controls
  • Critical Technology spaces
  • Critical Mechanical Spaces

5. Security Technology

  • Security Operations Center
  • CCTV
  • Access Control
  • Intrusion Detection (Active & Passive)

Articles On Threat & Risk Assessment

Active Shooter Assessment and Response Plan

February 15th, 2018|Comments Off on Active Shooter Assessment and Response Plan

Our thoughts prayers go out to the families, victims, individuals, and children affected by the events of yesterday. While this tragic event is fresh in our minds it has never been a more important time [...]

What Is Revealed In Background Checks?

November 15th, 2017|Comments Off on What Is Revealed In Background Checks?

Sooner or later a background check may be run on you, due to reasons such as your current employer wants to do one or a prospective employer wants to run one. You are probably wondering [...]

What Is Tampering With Evidence?

September 27th, 2017|Comments Off on What Is Tampering With Evidence?

The term 'tampering with evidence' is generally thrown about in courtrooms as well as in popular crime busting movies and TV shows. The term itself refers to a criminal offense where a person is involved [...]

Is Tracking Criminals On Social Media Tough?

September 6th, 2017|Comments Off on Is Tracking Criminals On Social Media Tough?

There are a lot of private investigators and people that track criminals on social media. If you're wanting to know how to find people that do crimes more easily, you're in the right place. Here [...]

Understanding Litigation Support And Forensic Accounting

August 1st, 2017|Comments Off on Understanding Litigation Support And Forensic Accounting

Court cases tend to drag along for a while, and the reason often has to do with evidence. A verdict isn't going to go in one's favor unless the evidence is damning. This is why [...]

Ready to Talk?