A threat assessment identifies and examines criticality, vulnerability and threats across the full threat spectrum. Recommending proportional response, mitigation and recovery.
Operational safety and security are of paramount concern particularly if you operate in high-density crowded spaces, mass gatherings or from critical high profile infrastructure.
Undertaking a formal threat assessment and training, allows your business to respond appropriately to threats and return to normal operations in the shortest possible time.
Resilience and recovery are a key focus throughout the threat assessment process.
Section 646 offers threat assessments on all nature of buildings and infrastructure, mass gatherings, crowded areas, and public spaces.
Our methodology in conducting your assessment is exhaustive and thorough, based on international standards, health and safety legislation, lessons learned and experience gained.
The end result will fold into existing health and safety policies and procedures for greater durability and compliance.
The very nature of assessing and addressing threats requires the process to be dynamic in order to combat an ever-changing fluid environment.
Threat assessments are conducted in five phases, deter, detect, delay, respond and resilience. Subject to perimeters, the assessment takes place day and night, an assessment typically takes one to two days to complete.
It requires the full cooperation of senior management, health and safety staff, and where applicable in-situ security.
Where appropriate penetration testing can be incorporated into an assessment. Penetration testing probes your current systems to determine how far an offender could penetrate without being challenged or stopped.
Threat assessments close out with a report issued and debrief conducted allowing you to fully understand where and how you can make your environment a safer more secure one.
We strongly recommend that all assessments are followed by a course of training to provide staff with confidence and the ability to proactively identify and address vulnerabilities.
Click here for Threat Assessment Information PDF
Further details on threat assessment methodology and process will only be provided in person.