Threat and Vulnerability Assessments

A threat and vulnerability assessment is a critical first step in designing any security program. Only a comprehensive assessment, conducted by a qualified, experienced and certified assessor, using a logical and proven methodology provide the necessary quantitative and qualitative information to make accurate and cost-effective decisions critical to the protection of your physical assets, organizations, clients and employees.

BDA has more than three-decades experience completing assessments in the highest risk, most complex environments around the world on a diverse set of corporate and industrial assets, data centers, schools including K-12, colleges and universities, private estates and homes, and houses of worship.

We utilize globally accepted Protection-In-Depth methodologies consistent with ASIS International Risk Assessment Standards, American Standards Institute, and ISO risk modeling guidelines combined with the latest guidelines is by the U.S. Department of Homeland Security to ensure our clients clearly understand their security risks ranging from global terrorism to local petty street crime and guide them in selecting the most effective countermeasures, including the latest in security technology, and designing and implementing a security program with fail-safe policies, procedures and controls to mitigate the most complex risks.

Our assessments often form the security baseline for compliance with some of the most demanding compliance, audit and reporting standards required of our clients including SSAE -16, SAS-70, Patriot Act, Sarbanes Oxley and HIPAA and are governed by the following approach:

1. Threat Origin:

  • Global
  • Regional
  • Local

2. Threat Profile:

  • Terrorism (targeted and indiscriminate)
  • Organized Crime
  • Serious Crime
  • Workplace violence
  • Spontaneous violence
  • Local area & petty crime

3. Access Control:

  •  Authentication
  • Credentialing
  • Monitoring

4. Site Security:

  • Perimeters
  • Access Points
  • Vehicle Controls
  • Critical Technology spaces
  • Critical Mechanical Spaces

5. Security Technology

  • Security Operations Center
  • CCTV
  • Access Control
  • Intrusion Detection (Active & Passive)

Articles On Threat & Risk Assessment

  • executive protection

Who Needs Executive Protection?

May 15th, 2019|Comments Off on Who Needs Executive Protection?

While many people may be familiar with the ideas of surveillance and bodyguards, there is a widely held belief that only A-list celebrities and high-profile political figures require security services. Nothing could be further from [...]

Toronto Sun – CRIME HUNTER: The agony of a missing child

May 13th, 2019|Comments Off on Toronto Sun – CRIME HUNTER: The agony of a missing child

Brad Hunter Published: May 11, 2019 Sometimes the balm of time does not heal, especially when it comes to missing children.DOE NETWORK There are literally hundreds of faces — most of them smiling. Black and [...]

  • what to look for in a private investigator

What Should You Look for in a Good Private Investigator?

May 8th, 2019|Comments Off on What Should You Look for in a Good Private Investigator?

There are many situations where you may need to hire a private investigator. There are numerous private investigators in New York City, but you need to know which one is right for you. The [...]

  • myths about private investigators

Myths and Misconceptions About Private Investigators

May 1st, 2019|Comments Off on Myths and Misconceptions About Private Investigators

If you’re thinking about hiring a private investigator to run a background check or launch a general investigation, it’s best that you have a solid and realistic idea of what private investigators can and cannot [...]

  • interview private investigator

Questions You Should Ask a Private Investigator Before Hiring

April 24th, 2019|Comments Off on Questions You Should Ask a Private Investigator Before Hiring

There are many situations where you may need to hire a private investigator. Many people need help finding a missing person while others want to catch a potentially cheating spouse. Regardless of the scenario, you [...]

Common Cyber Security Threats

April 17th, 2019|Comments Off on Common Cyber Security Threats

Even if your business computer has the latest antivirus, malware and other cybersecurity protection, it’s still a good idea to familiarize yourself with the latest online threats. That way, you have a better idea of [...]

Ready to Talk?

LETS TALK ABOUT HOW WE CAN HELP YOU?