Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSecurity Leadership and ManagementSecurity Education & TrainingPhysical Security

Education & Training

Tips for crafting a comprehensive risk assessment

A successful risk assessment isn't a one-size-fits all approach.

By Anthony Mangieri
Comprehensive Risk Assessment

gorodenkoff / iStock / Getty Images Plus via Getty Images

August 10, 2023

As organizations move through 2023 and into 2024, emerging risks continue to surface, and security teams must be prepared to respond and mitigate potential threats to people, operations and assets.

Organizations in the United States will continue to face increased risk from natural hazards, such as wildfires in the West, tornadic activity in the Midwest and hurricanes in the Atlantic Basin. Many factors can be attributed to this increase in loss to natural hazards, including increased development in risk-prone areas and climate change. Organizations must be prepared to mitigate and respond to natural risks, including having the appropriate redundancy, limited points of failure or the potential to shift operations.

Additionally, organizations must be prepared for increased human-made and technological risks, such as active threats, corporate espionage, cyberattacks, terrorism and infrastructure failure. Many organizations continue to see increased attacks on critical infrastructure that support corporate enterprise and government operations. Continual efforts must be made to ensure risks are appropriately identified and proper mitigation measures are employed to minimize potential loss. An in-depth defensive posture deploys a layered security approach that incorporates people, processes and technology to protect assets. Companies and government entities should develop a layered security approach to help detect, deter and respond to human-made and technological risks.

Conducting tailored risk assessments

Although many industries face the same natural hazards based on geography, the technological and human-made risks can vary greatly by industry type or facility use. As a result of the potential threat diversity, security practitioners and risk adjustors should modify how they conduct assessments. The one-size-fits-all assessment that fails to account for business operations and industry-specific threats will most likely not deliver the results that a client needs to properly mitigate potential vulnerabilities. Instead, assessments must be tailored to the systems and operations of the assessed organization, taking an all-hazards approach.

Developing a comprehensive list of the threats that have the potential to impact operations is a worthy first step in assessing enterprise risk. Once threats are initially identified, establishing a radius of review for the assessed location will help to refine the potential human-made and technological risks within the operational area.

The next step would include reviewing the assessed site demographics and operational environment against open-source and proprietary data to ensure that all potential threats have been properly identified. A follow-up field review to validate the collected information is always recommended to ensure the source data is correct.

In many instances, the initial list of potential threats identified by an organization fails to incorporate human-made risks operating within the determined operational radius of review. For example, the failure of facility operators to identify critical infrastructure (e.g., pipelines, electrical substations, rail lines) or hazardous material facilities (e.g., chemical manufacturers, petroleum storage) that operate within the same geographical space could result in potential facility impacts, including the need to shelter-in-place or evacuate. Understanding the holistic threat landscape will allow security teams to properly develop mitigation strategies to help minimize operational impacts and increase their ability to return to operations.


Review controls

Once the assessor has properly identified the threats, the next step is to review the controls deployed by the organization to protect the facility and assets. This step includes checking the measures to harden the target, means deployed to detect and delay the potential threat, and operational processes to properly respond to the threat. The standard mitigation for most organizations involves physical barriers, security technology, security policies and procedures to minimize the potential for facility impact and assist occupants with the proper response to an incident. This review takes a balanced approach to ensure the intended operations can be maintained without compromising security. Physical security controls for a public or semi-public venue, like a school or church, take a far different approach than the security controls for a controlled access facility like a data center or power plant. Security professionals conducting a risk assessment must consider how the facilities being assessed are used to ensure that the controls in place — or controls that are being proposed — allow for successful operation. Thus, creating an assessment template that considers the facility use type and intended audience is essential.

Security professionals must take a balanced approach and research properly before conducting a facility risk assessment. Creating a unique assessment for each facility use type will produce the best results for an organization. Considering all potential hazards will identify the potential threats a facility could face. Conducting a complete information and field review of the facilities will yield comprehensive results and provide facility operators with a holistic view of the risk environment, allowing for the development of proper mitigation strategies to minimize loss.

KEYWORDS: risk assessment risk management program risk mitigation security culture security program evaluation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Anthony mangieri

Anthony Mangieri is the Senior Director of Corporate Security at Tomahawk Strategic Solutions. Image courtesy of Mangieri

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Comprehensive Security Threat Assessment

    3 steps to a comprehensive security threat assessment

    See More
  • Best Practices for Conducting a Cyber Risk Assessment

    See More
  • coins in jar

    4 security risk management tips for small to medium-sized organizations

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing