Threat Vulnerability Assessment Consulting from Subject Matter Experts
Emerging Technology Support, LLC, is able to provide expertly crafted security assessments designed to assist commanders and directors in establishing security systems, procedures, and safeguards to provide security to information, personnel, intellectual property, critical infrastructure, and facilities. The survey/vulnerability assessment is conducted by subject matter experts who have extensive knowledge and experience in identifying and mitigating security risks. The assessment covers various aspects such as personnel security, physical security, information security, critical infrastructure protection, and facilities security. The assessment results are presented in a detailed report that outlines the findings, recommendations, and actions required to mitigate identified risks. The report is reviewed by subject matter experts and senior management for approval before implementation. Overall, our services are essential to ensure the safety and security of critical infrastructure, facilities, and personnel that will remain valid for that specific installation or facility until there are major changes in the physical security, mission of the facility, or potential threats. |
SurveyANALYSIS of threat factors influencing security within the Facility
DETERMINATION of mitigation measures required by the sensitivity or criticality of the installation. ASSESSMENT of measures and deficiencies that currently exist and their effectiveness. RECOMMENDATIONS for improvements to these measures or the initiation of new security measures to achieve required security standards and protection. |
InspectionINSPECTION is designed to provide a realistic test of established security measures and practices.
CONDUCTED in a manner that facility personnel, other than the commander/director and those persons informed, are unaware that such an action is taking place. |
EvaluationEVALUATIONS are similar to surveys but are limited in scope and normally conducted for a component of a larger organization when there has been a change in the security posture, an activation or reactivation of a facility, a physical relocation, or substantive changes to the organizations' facilities.
|