Expectations, when Porter Global Security, LLC conducts a Security Assessment at your facility or place of worship, is to look at an excellent way to evaluate an existing security program. In many cases, how can we reduce costs or see how well organizations current security program compares with that of its peers.

A brief outline of the typical assessment process:

Physical Security DESKTOP

  • Before someone is assigned to come out to your location, you will be asked to provide a few documents for my use during the assessment. These typically include plans of the facilities, copies of any existing security policies and procedures and samples of various types of forms.
  • We will work with you to identify individuals within your organization that we would like to sit down with to get a good cross-representation of all of the major operating and support departments within your organization. This usually includes personnel of senior management, department heads, and people who occupy roles that are directly related to security, i.e. building receptionist’s, security officers, and shipping/receiving personnel.

Physical Security MOBILE

  • Before someone is assigned to come out to your location, you will be asked to provide a few documents for my use during the assessment. These typically include plans of the facilities, copies of any existing security policies and procedures and samples of various types of forms.
  • We will work with you to identify individuals within your organization that we would like to sit down with to get a good cross-representation of all of the major operating and support departments within your organization. This usually includes personnel of senior management, department heads, and people who occupy roles that are directly related to security, i.e. building receptionist’s, security officers, and shipping/receiving personnel.
  • Once we arrive, the assessment will start with conducting a thorough interview with the person who has been designated to work with us. This person usually serves as the security manager for the facility or another person who manages the security function for the organization. After this interview process, we would like for this person to give a brief guided tour of the facility
  • Individual interview sessions will be conducted with each of the employees identified in the above bullet statement. Depending on the size of the organization, this process could take a few days
  • At the conclusion of the interviews, an in-depth inspection of certain areas of the facility and site will be performed. Depending on the area, more time may be spent observing certain areas of your facility, such as the perimeter fence, if applicable/access gates or building lobby. Photos are usually taken during this step of the assessment
  • We may return to your location at night-time to observe your facility and to also take advantage of how your facility functions at night. This will also give us a broader idea for the neighborhood during the time when it is dark
  • At the conclusion of the visit to your facility, we would like to schedule a meeting with you to give you an update on the assessment progress and to discuss the next steps in the process. At this time, it may be possible to offer some preliminary findings and recommendations. However, time will be needed to process and analyze all information gathered before the assessment team can give you any proper recommendations. If possible, we would like to provide a presentation of the vulnerability assessment to your senior management team or others

2
Phase

3
Phase

  • After returning back to our location, a formal vulnerability assessment process will begin. At the conclusion of this process, the writing of the vulnerability assessment report (VAR) will begin. It could take approximately three weeks from the time the assessment was completed at the site visit
  • While preparing the report, oftentimes things get uncovered and will require further investigation and study. This may require follow-up phone calls with my point of contact. Additional documentation or other information that is available from within your organization may also be required
  • After your input has been obtained, a final vulnerability assessment report (VAR) that incorporates your comments will be prepared
  • At the conclusion of the assessment process, Someone will remain available to assist you with the implementation of the recommendations contained within the report
  • This could include developing security policies and procedures, identifying various vendors and sources of products and services, providing training and assisting in other ways that we can