Download - 1303 independent risk assessments
DESIGNING & IMPLEMENTING AN EFFECTIVE SECURITY
MANAGEMENT SYSTEM
Jenny ReidMarch 2013
Independent Security
Assessment
Intelligence
Manpower
TechnologySystems
&Procedures
Vulnerability
Independent Security
Audit
To improve the protection of the company, its staff and assets
To examine and evaluate the overall effectiveness of the existing security
• Analysis of the crime in the area
• Analysis of all security incidents.
• Does the existing system provide adequate response to risks?
• Could intelligence improve the implementation and control of security?
Intelligence
Manpower•Check the structure and manning of contract security personnel.
•Determine the amount and level of security personnel required.
•Evaluate the job description of each security position.
•Security training and induction programme.
•Evaluate company and contractor employee screening programme
Equipment•Check all security related equipment and assess effectiveness
•Determine the level of staff required to ensure effectiveness
•Can any technical solutions could be implemented? •Analyse maintenance and operational processes and costs.
Systems & Procedures
•All procedures would be reviewed to assess the level of risk.
Vulnerability Testing
•Examine existing testing procedures.
•Review current emergency plans. •Assess staff knowledge in an emergency situation.
Interviews
Site visits
Financial reports
Systems&
Procedures
Analysis
Independent Security
Audit
Security Report
OperationsManual
Security Report
TenderRequirements
& Documents
Security Report
SecurityManagement