Security Assessments

Security Assessments are an excellent way to evaluate all aspects of your security program, identify any weaknesses, and suggest security improvements. In addition, opportunities where costs can be reduced or where security operations can be made more efficient are identified. These assessments use a structured, formal analysis process that develops a deep understanding of your organization, operating conditions, culture, and unique security risks and threats. Our firm facilitates stakeholder involvement in order to ensure that all important elements are examined. The Security Assessment is custom tailored for each project, but typically includes the following tasks:

  • Risk identification & analysis.
  • Threat & vulnerability assessment.
  • Analysis of crime data including loss history, first responder calls, crime statistics, & forecast reports.
  • Review of facility operating procedures.
  • Review of physical security systems, electronic security systems, and architectural security.
  • Review of security policies and procedures, security management, and security personnel.
  • Evaluation of present security program and identification of any weaknesses and vulnerabilities.
  • Development & prioritization of recommendations for Security Improvement Implementation Plan.
  • Identification of short-term & long-term costs.
  • Preparation of written Security Assessment Report.
  • Critical Incident Response
  • Approach & Step-by-Step Process of Review

Broaddus Defense extensively uses and applies a proven set of Project Management Best Practices to analyze project performance. We have the capability to use these Best Practices to compile, analyze, and report on existing performance. In addition, our team’s extensive experience enables us to provide our clients with honest feedback and recommendations.

1. Organizing the Data

The Broaddus Defense begins by determining what data is collected and readily available, and what data is needed.

2. Planning for Performance Management

After analyzing the initial data, the Broaddus Defense will make recommendations on the types of data that should be analyzed and measured. The team will review the recommendations and determine which measures are to be evaluated and reported.

3. Accumulating Performance Data

Once all performance measures are defined and the collection and delivery of the necessary data is determined, the data will be obtained and analyzed. In the meantime, a web-based “dashboard” will be provided to the school board, which will display performance and project status tracking for project objectives.

4. Assessing Performance

Our team will take the data received and/or collected, analyze it, and populate the “dashboard” with the data. This “dashboard” will provide access to the performance data results for tracking and monitoring.

5. Monitoring Performance

Results will then be used to monitor and asses existing performance, as well as make necessary improvements throughout the life of the project. The performance measures developed by the Broaddus Defense will not only provide an analysis of the project to date, but will also serve as a guide to determine modifications to improve efficiency and create consistency

Broaddus Defense extensively uses and applies a proven set of Project Management Best Practices to analyze project performance. Broaddus Defense has the capability to use these Best Practices to compile, analyze, and report on existing performance. In addition, our team’s extensive experience enables us to provide our clients with honest feedback and recommendations.

Get More Information About Security Assessments