Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Predictive Analysis Applied to Risk & Threat

By Benjamin M. Butchko
September 1, 2015

In the early fall of 1998 when the U.S. Embassies in Nairobi, Kenya and Dar Es Salaam, Tanzania, were still smoking piles of rubble from twin attacks by Al Qaida terrorists, State Department Security experts were scrambled worldwide to assess the security profiles of U.S. missions abroad. One inspector was dispatched to Dublin, Ireland, where he found that the Embassy was a circular, solid glass building with a small waist-high stone wall around it. His report the next day began with these words: “The U.S. Embassy in Dublin was built in a more innocent era. We do not have that luxury, today.”

If history is any indication, the twin attacks by Al Qaida on our embassies in East Africa were only a small taste of what was to come. Now we live in a much more complex and dynamic world, and the demands on physical security and cybersecurity have increased dramatically. As the world is continually changing, the challenges faced by security leaders change as well. Risk is now at the forefront of discussion and risk analysis has become the basis for strategic security planning in many organizations. Insightful leaders are also finding that a myopic view of security at a facility-by-facility level can cloud the holistic understanding of how the system of facilities, technology and processes interconnect. The systemic risk has implications on the risk interpretation at an individual site, and vice versa. Single site or business unit risks are viewed through the prism of their role in the greater enterprise so the focus can be on the tree, but without losing sight of the forest.

At the same time, security leaders are often faced with the conflicting challenges in today’s business environment. The constant drive towards increased productivity paired with sharp budget cuts puts a huge strain on security leaders’ abilities to rapidly and reliably provide guidance when critical decisions are required. Fortunately, with creative application of technology, solid risk analysis principles, and attention to business operations requirements, complex situations become much more manageable.

 

Looking at Risk in Context

Risk analysis is a well-established and widely used tool in strategic planning and budget development. This is codified in global standards such as ISO 31000, ISO 27000 and others. Unfortunately, historical risk analysis methodologies (such as ASIS International’s) are extremely time and labor-intensive. As a result, an enterprise may only assess its facilities every three to five years. Imagine, if you will, a company with a risk assessment team of two people and 200 locations around the globe. It could take close to two years and a large travel budget for the team to cover all of the sites, and by then, the risk data for the first location surveyed would be “stale” and of questionable currency to support planning and decision-making. In-depth understanding of the risks facing the organization from strategic planning through crisis management is the next step to give these leaders an edge in successfully navigating dynamic challenges and situations. That edge is especially important in competitive business environments with constrained security resources and budgets.

When a situation unfolds, security leaders need assurance that the physical and technological countermeasures in place are able to mitigate the risk to their enterprise. Security leaders know better than anyone the potential impact of a situation on the safety and security of lives and critical assets. In the real world, where security threats, natural hazards and the need for life safety and timely response are critical, leaders can face unanticipated challenges when a crisis unfolds. Sound security planning and procedures can unravel due to the unexpected. The need is real-time reflection of risk.

Dynamic analysis of risk, with predictive indicators of threats, yield leading indicators of plausible situations and potential mitigation measures prior to an event or crisis. Lacking reliable analysis, leaders are forced to rely on gut instinct and outdated information when time-sensitive decisions are required. Unfortunately for them, research has demonstrated that when people rely on gut instinct for rapid risk evaluation, the decisions can be skewed due to lack of information, personal or professional bias, personal comfort level, or information overload.

So if you can’t trust your gut, what can you trust? Relatively simplistic software solutions, which claim to provide rapid risk evaluation and reporting, have been on the market for years. But these programs lack in-depth and widely applicable automated analysis. With the value of the analysis dependent upon the rigor and insight of the assessment team, weak input in yields weak analysis out. Forward-thinking security organizations are designing the next generation of risk analysis software. The solutions are data-rich platforms incorporating real-time and predictive analysis of risk. The result: the ability to orchestrate large and disparate data inputs into a harmonious picture of enterprise risk and with insights for long-range and real-time decision-making. Once the initial analysis is performed for a site or enterprise, the system can be used as a “what if” analysis tool for business planning, crisis/emergency response planning and tabletop exercises.

 

Data is Fundamental

Data surrounds us through the internet, corporate business systems, security systems, social media, and a host of others both public and private. Harnessing the power of this “big data” means security leaders are empowered to stay abreast or even ahead of developing situations, act decisively based on solid information, and reduce corporate losses. A predictive risk analysis program utilizes analytics to support rapid initial assessment, nearly instantaneous risk analysis results, and dynamic updates of the risk once a baseline has been established. This approach allows for local facility and enterprise-level risk insights, dynamic updates that convert what was historically a strategic planning tool into a real-time asset for use during crisis operations, and “what if” planning exercises.

It all starts with the data. Capturing current, complete and insightful data from public sources (radio, television, social media, financial markets, industry databases, government sources), blending it with data from corporate systems (electronic security systems, purchasing, logistics management, etc.) and feeding all that information into a powerful analytics engine gives leaders up-to-date risk information. It is no longer necessary to wait weeks for updates when the decisions need to be made immediately.

A data-driven approach has the additional benefit of allowing for rapid and efficient multi-site assessments. Facilities and operations of similar type are identified early in the process. The assessment team can use sample assessment data for each facility type as an initial baseline for similar facilities and environments. The assessment teams then focus on refining baseline data instead of starting from scratch for each facility under review. Thus, hundreds (or thousands) of sites can be assessed in a single year with minimal staff. So a company’s skeleton crew is able to establish and maintain updated risk profiles for numerous sites with confidence that the information they have is accurate and current.

 

Summary

As hard as it may be to believe in this day and age, there are still multi-billion dollar companies that make decisions about security and business risk based upon gut feel and experience. Simultaneously, economic conditions are creating tremendous pressure on companies to find better and more efficient ways to reduce costs. Nowhere is this truer than in the oil and gas industry, where margins are at historically low levels. But in 2015 we have reached a time in technological development where those slimmer margins actually represent an opportunity for CEOs and corporate leaders. Those who are able to harness the power of the “Internet of Things” into cutting-edge programs that assess and re-assess risk in a dynamic way will have a competitive edge. The days where a risk assessment is performed by a team of experts and put on a shelf to gather dust have passed. The next generation of risk assessment tools will be able to electronically “take the pulse” of the security and business risk environment and warn management in advance if something is not right, well before it reaches crisis level. Experienced security consultants who have worked in the area of threat and risk assessment for a decade or more recognize the power of harnessing big data to risk analysis and are bringing solutions that do just that in innovative and ground-breaking ways. Using experience in the industry as well as expertise in software development and process management, they are finding exciting ways to breathe new life into time-tested risk assessment principles. These solutions will provide valuable insights and information when, where and how it is needed, not just at the beginning, but throughout the entire life-cycle of the business process.

KEYWORDS: predictive security security education security predictive anakysis security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Benjamin M. Butchko is president and CEO of Butchko, Inc. He has more than 25 years of security assessment and solution engineering experience for enterprise organizations. Butchko, Inc. designs security solutions that safeguard assets, mitigate risks and deliver sustainable business value.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-attack

    7 Steps to Automating Cyber Threat Detection and Analysis

    See More
  • 5 Key Elements of a Predictive Analysis Model

    See More
  • Predictive Analysis; It’s a New Tool of City Police Agencies

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing