SecureState first determines the business functions and locations for the list of facilities and locations and the business functions of those in scope for within the scope of the assessment. Understanding business functions provides the context for the threat landscape, and is therefore an important prerequisite to analysis.
SecureState then determines the criticality and recovery time required for each facility and business process identified by conductingin in-depth interviews with business leaders and facility managers. . SecureState's analysis consists of key questions that relate to the facility, business continuity plans, and disaster recovery abilities.
SecureState categorizes threats into three groups: Natural, Technological, and Human. SecureState first identifies threats by interviewing local facility business managers, who have direct knowledge of local threats and their potential impact. In addition, SecureState references external sources, such as federal threat intelligence and crime recordsCAP Index® reports. Leveraging a this multitude of sources allows SecureState to identify threats in a comprehensive manner.
Identified threats are assessed as to their likelihood and frequency. Mapping these threats back to business processes allows your organization to determine their Once data is collected and threats are known the next step is to put context around those threats. Putting context around the threats identified allows SecureState to determine likelihood as well as frequency of threats. These threats are then analyzed to business function to determine the level of vulnerability each facility potentially hasexhibits.
The effectiveness of current physical security controls are is then analyzed. The goal is to determine whether or not the current systems provide effective countermeasures to the uncovered threats. SecureState reviews what current Pphysical Ssecurity Ssystem technology can be used as effective countermeasures. SecureState takes a “best in breed” approach ensuring only the best and most advanced systems are recommended as countermeasure solutions.