Physical Threat Assessment

Understanding the threats facing your organization, as well as their potential likelihood and impact, is essential to formulating following a risk-based approach to security.

A Physical Security Threat Assessment provides an organization with insight regarding into a variety of threats. Depending on their nature, these threats can impact personnel, critical business systems, facilities, or other areas of a business . Threats may include natural events such as earthquakes or tornadoes, technological events like power failures or cyberattacks, and criminal events like workplace violence.


A Physical Security Threat Assessment is an essential step to properly identify the “most likely” threats to an your organization. Only once threats have been identified can effective countermeasures be prioritized, developed, prioritized, and implemented. SecureState thoroughly defines and rates threats based on detailed analysis and baselining of the organization's locations and their associated business processes. Threats that affect the business processes and “bottom line” of the organization typically present the greatest risk. SecureState ensures any threats that may impact business processes arethat this type of threat is prioritized, and provides guidance on effective countermeasures.


SecureState’s physical security team is comprised of highly qualified individuals with a range of backgrounds. Our team members have held positions in military intelligence, financial services security, security auditing, community emergency response, and beyond. Our professional experience and expertise includes threat intelligence, policy development, tactical operations planning, and national security policy.

This diverse team is brought together by its shared passion for security and desire to find solutions to our clients’ most pressing security challenges. Together, the team has leveraged its talents to build, implement, and test complex physical security programs for organizations across a range of industries and a multitude of environments. Some of the largest organizations within their respective industries have trusted the advice and recommendations of SecureState professionals in the design, implementation, management, and testing of their security architectures.

Our capabilities, along with our comprehensive knowledge of our clients’ missions, enable SecureState to build productive long-term relationships with our clients while crafting solutions appropriate to their needs.

Approach and Methodology

SecureState first determines the business functions and locations for the list of facilities and locations and the business functions of those in scope for within the scope of the assessment. Understanding business functions provides the context for the threat landscape, and is therefore an important prerequisite to analysis.

SecureState then determines the criticality and recovery time required for each facility and business process identified by conductingin in-depth interviews with business leaders and facility managers. . SecureState's analysis consists of key questions that relate to the facility, business continuity plans, and disaster recovery abilities.

SecureState categorizes threats into three groups: Natural, Technological, and Human. SecureState first identifies threats by interviewing local facility business managers, who have direct knowledge of local threats and their potential impact. In addition, SecureState references external sources, such as federal threat intelligence and crime recordsCAP Index® reports. Leveraging a this multitude of sources allows SecureState to identify threats in a comprehensive manner.

Identified threats are assessed as to their likelihood and frequency. Mapping these threats back to business processes allows your organization to determine their Once data is collected and threats are known the next step is to put context around those threats. Putting context around the threats identified allows SecureState to determine likelihood as well as frequency of threats. These threats are then analyzed to business function to determine the level of vulnerability each facility potentially hasexhibits.

The effectiveness of current physical security controls are is then analyzed. The goal is to determine whether or not the current systems provide effective countermeasures to the uncovered threats. SecureState reviews what current Pphysical Ssecurity Ssystem technology can be used as effective countermeasures. SecureState takes a “best in breed” approach ensuring only the best and most advanced systems are recommended as countermeasure solutions.

Get Started!