ATAC Global

  • About
    • ATAC Leadership
    • Vetting Process
  • Concierge Security
    • ATAC Concierge Security Membership
    • Corporate Security
    • Executive Risk Protection
    • Kidnap and Ransom
    • Private Yacht
    • Security Tips
      • Natural Disaster Tips-Preparation
    • Vulnerability Assessments
  • Security Sectors
    • Maritime Anti-Piracy
    • Land Security
    • Ports and Airports
    • Government Security Services
    • Energy Security
    • Oil and Gas
    • Cruise Ship Security
    • Private Yacht Security
    • Celebrity Security
  • Training
    • Staffing Solutions
      • Contractor Staffing Economics
      • ATAC Loadout Kits
      • ATAC Staffing FAQ
    • ATAC University
    • Capacity Building
    • UAV E-Learning
  • Robotics
    • ATAC Anti-Piracy Drone-UAV Advantage
    • ATAC UAV Quad Copter
    • Anti-Piracy Cargo UAV Video
    • Real Estate UAV Advantage
  • News
    • Most Recent News
    • Drone-UAV
    • Americas
    • Asia Pacific
    • East Africa and Indian Ocean
    • Europe and Mediterranean
    • Middle East
    • South East Asia
    • West Africa
  • ATAC Range Day®
    • ATAC Range Day® Status
    • About ATAC Range Day®
    • ATAC Range Day® Advertising and Sponsorship
    • ATAC Range Day® Media Credentialing
    • ATAC Range Day® Frequently Asked Questions
    • ATAC Range Day® Policies
  • Causes
    • White Heart Ride to the Flags
    • EOD Warrior Foundation-Andrew Bottrell
    • UAV to Red Rock Search-Rescue
  • Contact
You are here: Home / Threat Assesment

Threat Assesment

Threat Assessment Process Flow.

By Tom Clarke,

Framework:  The framework in our risk assessment for all security facets (Corporate, Guest, Community Security, Awareness Development and VIP services) is as follows:

  • Establishing Security Provisions
  • Data Collection through surveying physical premises
  • Human geographical methodology focusing on concentric rings of near to far factors to include
  • Social and political dynamics
  • Threat Analysis
  • Vulnerability Analysis
  • Analysis of Policies and Procedures
  • Correlation and Assessment of Risk Acceptability
  • Data Collection through surveying physical premises

Establishing and Identifying Security Provisions: A key element is to construct the framework. The security provisions supply the analyst with intelligence required, identifying what needs to be protected and the sensitivity of what is being protected outlining the protocol for scalability of sustainability to deploy a reactionary force if warranted.

ATAC’s analysis team starts to compile an evidence-based assessment. The ATAC Analysis team will be identifying vantage points from neighboring buildings, highways, interior/exterior perimeters, traffic patterns, location of senior staff’s physical location, human and non-human threats, exits/escapes, entrance and exit choke points, media access and more.

The week of surveying physical premises, some team members will be in plain clothes and others visible. They will need unrestricted access to but not limited to:

  • Security CSO
  • Interviews with key personnel
  • Cafeteria
  • Visitor check in/out location
  • CCTV station
  • Intrusion detection testing
  • Interior and exterior structure, e.g., HVAC, water, plumbing, electrical.
  • Auditing Airbnb current security Policies and SOPs. Identifying any missing, undocumented or suggested incorporation of additional policies and SOPs.
  • Physical construction of corporate HQ and Key Personnel residences
  • Home
  • About ATAC
  • ATAC Maritime Security
  • ATAC Corporate Security
  • ATAC Anti Poaching
  • ATAC University
  • Areas of Risk
  • ATAC Training Courses
  • Events
  • Contact
  • Policies-Procedures and SOPs
  • ISO-PAS 28007
  • Terms of Use
  • Privacy Policy

Copyright 1995 - 2019 - ATAC Global