top of page

RISK CONSULTING

Enterprise Security Risk Management Practices

We approach Enterprise Security Risk Management as a four-step process.

 

1.  The beginning of value stream for Enterprise Security Risk Management begins with identifying and valuing all assets.  The process for accomplishing this is an all-hazards risk, threat, and vulnerability assessment.

2. Identifying security vulnerabilities and risks to each asset is accomplished through an in-depth analysis of all human-made, technological, and natural threats and their impact on people, property, and assets.

3.  This is followed by prioritizing risk and the risk relationship to each asset, which leads to a risk mitigation plan.

4.  Development of risk treatment plans.

 

The finished product should provide a valuable roadmap for the Enterprise, resolving risk, removing uncertainty, and ensuring longevity.

 

To facilitate this process, Setracon, in partnership with Circadian Risk (www.circadianrisk.com), engages in a unique risk assessment process embedded in Standards capable of supporting large Enterprise or single facility assessments that cover all hazards and consider critical interdependence. The resulting reports and recommendations lead to true risk mitigation. 

Security and Risk Consulting

  • Enterprise Security Risk Management: we are certified Master Quality Management Auditors capable of auditing to the following ISO and ANSI Standards

 

  • RABQSA-RES-Resilience Management Systems Auditing Security, Preparedness, Crisis, Continuity, and Recovery Management

  • Security Management ISO 28000

  • Resilience Management ISO 28002

  • Business Continuity Management ISO 22301

  • Risk Management ISO 31000

  • ASIS Security Risk Assessment Standard SRA-2024

 

  • Organizational resilience management assessments and accreditation

  • Workplace violence consulting and best practices

  • Best Practices, risk assessment, and training for event and venue security

  • Qualitative and quantitative all hazard risk, threat, and vulnerability assessments lead to exceptional business continuity planning and emergency preparedness

  • MS SharePoint consoles and development

  • Design, review, and assess physical protection systems, i.e., cameras, lighting, cards, key access systems, bio-metrics, alarm systems, fences, & barriers, access control, and visitor management systems.

  • Security Management Support, including efficiency studies, time and motion studies, cost-benefit analysis, and zero-based studies

  • Comprehensive threat analysis and open-source intelligence collection

  • Blast hazard calculations, mitigation, protective design, procedures, and physical security systems

  • Security design review

  • Passive red teaming and penetration testing of physical security systems utilizing adversary pathing and estimated sequence of adversary interruption modeling

  • Investigations in the areas of harassment, discrimination, crime, and violence.

  • Expert witness testimony for security and training-related matters

  • Security program policy and procedures, development, and review

  • Emergency response planning and exercise development utilizing the Homeland Security Exercise and Evaluation Program (HSEEP)

Setracon Risk Consulting
bottom of page