A Threat, Risk & Vulnerability Analysis (TRVA) differs from a survey in that it is a process to assess whether an existing security system and procedures are operating to set of standards or criteria they were designed to. It evaluates the administration of the system, security awareness of employees, the management controls and compliance with standards. This is a valuable tool to give an accurate overview to the senior management.
For a successful TRVA to take place DPH Security Consultancy needs to identify what the assets are and how your organisation interacts with them. It is important to understand both people and the culture that surrounds assets. For example, there is no point spending more on security than the assets are worth, there is also little financial value in investing in security measures that are protecting against a very low or non-existence risk. DPH Security Consultancy will through unbiased and independent assessments steer you towards what your organisation needs to protect itself from the risks it is exposed to.
DPH Security Consultancy can provide a comprehensive threat and risk assessment that looks at your assets and which vulnerabilities can be exploited by both inadvertent and intentional threats tailored to you and your people, your processes, and your product; to work out probability of risks materialising and their impact.
By providing threat and risk assessments whether on an existing site or by working with building design professionals on a new project at concept stage, DPH Security Consultancy can recommended features and solutions that would minimise or transfer risk and mitigate against threats identified.
To do this we will work with you to outline all the vulnerabilities and weaknesses with your existing arrangements by conducting a comprehensive threat and risk assessment, and then developing conceptual security design ideas either through site visits or analysis of architectural drawings or a combination of both.
Once this is complete DPH Security Consultancy will be able to produce a high quality visual report, highlighting all of the important information in an easy to understand format with diagrams and images detailing the issues bespoke to your site.
These are the things we want to protect, such as people, property, brand reputation, and information, an organisation cannot function if its assets are comprised.
These are what we protect against, they aim to exploit our vulnerability to reach our Assets.
These are the weakness in our protection of assets and are what threats aim to exploit. Vulnerabilities and weakness can be strengthened to mitigate against potential threats.