No matter which industry you’re in, your business operations will have human resources, brick and mortar, physical assets, financial instruments, and sensitive information – just take a review of the company’s profit and loss statement and it will capture the resources and assets that are necessary to deliver the company products and services. Unfortunately, security risks are as widespread as the number of products and services your business operations deliver. If
not protected by sound security management practices, the business operations will be exploited for vulnerabilities and susceptible to lasting harm, loss, and reputation damage.
Invictus Consulting is an industry leader in security management. According to the Department of Homeland Security (DHS), Society for Human Resource Management (SHRM), and ASIS certified security practitioners, “Security Management is the identification of an organization’s assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets”.
There are four areas that present numerous security risks which sound security management practices must evaluate, assess, and prioritize to safeguard your business operations:
and prioritize security risks; our goal is to provide risk mitigation solutions to safeguard your physical, geographical, human, and technological areas. Our approach is to address each of these four area with the appropriate industry standards and ensure regulatory compliance when applicable.
Our services are designed to align to industry specific regulatory compliance and will support the creation, development, and execution of the security management framework of policies, standards, procedures, and guidelines that will enhance effective controls and mitigate the four areas of security risk.
Invictus security consulting and service offerings include but are not limited to:
not protected by sound security management practices, the business operations will be exploited for vulnerabilities and susceptible to lasting harm, loss, and reputation damage.
Invictus Consulting is an industry leader in security management. According to the Department of Homeland Security (DHS), Society for Human Resource Management (SHRM), and ASIS certified security practitioners, “Security Management is the identification of an organization’s assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets”.
There are four areas that present numerous security risks which sound security management practices must evaluate, assess, and prioritize to safeguard your business operations:
- physical (brick and mortar, physical assets, financial instruments, sensitive information),
- geographical (office park; industrial; multi-tenant; campus; proximity to high-risk industries like airports, military bases, chemical storage, government offices),
- human (employees, contractors, customers, clients),
- technological (infrastructure, data, devices, privacy).
and prioritize security risks; our goal is to provide risk mitigation solutions to safeguard your physical, geographical, human, and technological areas. Our approach is to address each of these four area with the appropriate industry standards and ensure regulatory compliance when applicable.
Our services are designed to align to industry specific regulatory compliance and will support the creation, development, and execution of the security management framework of policies, standards, procedures, and guidelines that will enhance effective controls and mitigate the four areas of security risk.
Invictus security consulting and service offerings include but are not limited to:
- Assess and develop security management program
- Conduct physical security assessments
- Develop security threats analysis
- Assess and analyze policy and standards gaps
- Test procedures and internal controls
- Develop mitigation plans (e.g., unwanted visitor, workplace violence, active shooter)
- Design access control and CCTV systems
- Project management & writing
- Employee training and awareness
- Investigations on criminal or policy violations
- Coordinate and network with law enforcement agencies
Risk Analysis
Our risk analysis service is a comprehensive assessment of your existing security measures, systems, and procedures to provide you with a gap analysis report, which gives you a thorough idea of the deficiencies in your exiting security measures and recommendations on how to achieve ideal security measures for your business.
We assess both your electronic security measures and your physical security measures.
There are multiple facets to a risk analysis.
We assess both your electronic security measures and your physical security measures.
There are multiple facets to a risk analysis.
- Risk Assessment - A risk assessment analyzes those threats that are specific to your business, your employees or tenants, and your location. This includes intelligent threats such as an active shooter, a bomb threat, or other pre-meditated attack.
- Electronic Security Assessment - During our risk analysis we fully audit your existing electronic security platforms and measures, both software and hardware. This includes a review of systems platform integration, access control measures, video surveillance measures, alarm systems, etc. We audit your software by logging on to your existing security system and inspecting and assessing both the entire operating system and the various applications being used. Hardware is examined via a walk-through of your site.
- Security Protocol Analysis - We evaluate any existing emergency action plans and security protocols that you currently have.
- Building Structure Analysis - We examine your existing architecture as it concerns physical security, conducting evaluation into site vulnerabilities. This includes an analysis of things such as high risk areas, all moveable entrances into the facility, major glass areas, elevators, loading and unloading dock areas, and parking decks. We also examine the building structure for ballistic deficiencies and evaluate physical distractors and effective cover areas.
- Post-Injury Management Analysis - We evaluate your current policies and procedures that deal with workplace injuries and claims as well as your return-to-work policies and procedures.
- Loss Trend Analysis - During our risk assessment, we look at your loss history and develop loss trends that give insight into your top loss drivers.
- Staff Assessment - Through in-depth interviews, we have a dialogue with your front line security personnel, which can include executive management, security management, security officers, and others. Via interviews we can discover any discrepancies between your presumed security measures and what is actually being executed on the ground.
- Risk Matrix - We create a Risk Matrix based on the data we collect during analysis. This matrix provides a logical and statistical explanation for identifying whether a property is considered a low, medium, or high-risk target for intelligent threats.
- Case study - We study every intelligent threat event possible to stay current with trends and lessons learned from each event. This gives us access to the most up to date pre-event evaluation and consultation available, and we use this continually evolving knowledge when creating security plans for our clients.
Risk Analysis Report
At the completion of our site assessment, Invictus Consulting puts together a comprehensive and detailed CONFIDENTIAL report. Included in this report are:
- Risk Analysis Data - We present you with the data from our risk assessment, which includes our observations of your electronic security platforms, security protocols, and site and facility; interview data; risk matrix results; and an exploration of your specific risk factors.
- Gap Analysis - Our gap analysis details the deficiencies we have found in your existing security measures and protocols. The gap between where you currently are and where you would ideally like to be is considered, and a plan is created to minimize that gap.
- Accountability Development - We can create a written plan to help keep your employees accountable for practicing safe work habits. This can include creating and setting up an accountability program as well as creating tangible rewards for observing safe work habits.
- Recommendations - Recommendations are made to improve your existing security measures and protocols. These recommendations are part of helping you close the gap between your current security and your ideal security. We make a point to build off of your existing security systems and protocols as a cost-saving measure for you.
- Emergency Action Plan - Included with your report is an individualized Emergency Action Plan created for your specific site. The Emergency Action Plan brings your business into compliance with OSHA Regulation 1910.38, which mandates that all employers have an emergency action plan.
- Project Management Option - Invictus Consulting offers its clients the option to have us direct the implementation of our recommendations and get you from where you currently are to your end goal. We take you through the entire process, and you can take as little or as much ownership in that process as you want. For more information on this services, see our Project Management page.