Risk Assessment Services

Threat And Risk Assessment Services An essential component to developing and maintaining an effective physical security program is a comprehensive Threat and Risk Assessment (TRA).  Condor Security’s consultants can prepare assessments in line with applicable standards and industry best practices.  The objective of a TRA is to protect against liability through identifying and understanding the risks facing the client community/property.

Condor Security has conducted Threat and Risk Assessments for a variety of clients across the Greater Toronto Area, from commercial to residential markets.

As a boutique security company, Condor’s team can prepare a TRA which is narrow and specialized to areas of particular concern, or one which is broader in scope and covering a multitude of possibilities (ie. to assist in the development of a Business Continuity Plan or Emergency Response Plan).

The standard process of a comprehensive Physical Security Threat and Risk Assessment includes:

Asset Identification
The client/community/property assets are itemized and prioritized.  Cost vs Benefit analysis is a key factor of approaching improvement of security counter-measures.

Threat Analysis
For each asset, the potential threats are determined based on historical research and future projections.  Root causes of each threat are considered, and then categorized by their likelihoods of occurrence and possible damage/harm.

Risk Assessment
Information on assets and threats are compared, and risk patterns emerge.   Considered in evaluation are the likelihood, severity, impact, cost, and time required to return operations to normal.

Risk Management
Condor’s security professionals will provide recommendations and suggestions for improvement based on industry best practices and local laws, acts, and standards.  Cost effective, realistic, and appropriate solutions and security measures are described and presented.

Condor Security can also provide a full security audit, which provides additional insight into existing and proposed security infrastructure, including personnel training and performance, applicable procedures and policies, and physical security design.