top of page

A Brief Introduction to conducting a Risk Assessment


When a person mentions a risk assessment it is often linked to information security. In the day of technology, cyber intrusions are a real threat. However, let's make no mistake; crime, violence, and physical emergencies have not gone away. In fact, they continue to rise. Recently, in Los Angeles, a business executive was targeted while in their vehicle. A shoot out ensued between security and the assailants. Something we think of as an international occurrence can very easily occur here in the United States as history has shown. When conducting a risk assessment either for a principal or an organization all things must be considered. As the picture above indicates; you can jump from one place to another but what's the risk involved?


IDENTIFY RISKS: Risk vary widely between organizations, locations, and situations. Crime rates may differ. Medical necessities will differ. Knowing the variance you should never copy and paste one as a concern to the other. Each situation will have their own risks and merit their each individual effort. The inner city may include crime rate as a risk factor where a mountainous resort may include elevation as a risk factor.


THREAT AND VULNERABILITY ASSESSMENTS: What risks are more likely to occur and where are the vulnerabilities of occurrence? Many times vulnerabilities are not taken seriously until a threat is probable or imminent. Treat all vulnerabilities seriously. Find ways to thwart threats or potential threats.


SURVEYING SITE SECURITY: This is a general description due to the fact there are many types of sites, each with their own surveys; Hotels, restaurants, residences, entertainment venues, to name a few. You may be asked to take a look at an organization's site. Are security procedures maintained? You will be surprised how many cameras don't work or you ask where an AED is, only to find out it's not where it was supposed to be. Are there changes that need to be made in the way of security? Access/Entry control, etc.


OPERATIONAL PROCEDURES: Staffing procedures on many sites can be the weakest link. For instance, temp agencies, where people show up to "work" who aren't on a list. At many sites, security seems to be better during the day than at night. What are the checks and balances? If a custodian is not considerate of security procedures they could leave a door unsecure. Are there contingency plans? Active shooters, Medical, or do you need to get someone off a mountain?


This was just a short glimmer of risk assessments. Performing a thorough and methodical risk assessment is the most important step for protecting an organization and its executives. Once you are aware of the vulnerabilities and risks you can be more prepared for the threats that you may encounter.


For more information on risk assessments you can contact us at Jaguar Executive Services.




34 views0 comments