Task 1 Part B: Preparation and presentation of report to my Manager based on the risk assessment.
It’s in our (I and my team) best interest to highlight building security vulnerabilities and problem areas as
openly and transparently as possible.
As a professional security systems integrator, the building owners and site managers must have a close
relationships with us and to often rely on us for expertise, advice and recommendations.
As it pertains to a building’s safety and security, it’s in our best interests to highlight vulnerabilities and
problem areas as openly and transparently as possible, to ensure that all occupants and passersby are
free from danger. It’s one thing to consider domestic security and disruption, but commercial premises
safety requires a different approach.
As you likely well know, conducting a comprehensive security assessment is imperative to ensure that all
of a building’s possible weak spots and entry points are addressed as explained below:
Conducting a Building Security Risk Assessment
Following the submission of a risk assessment report, site managers and building owners can develop
the right strategies to mitigate risks.
Ultimately, it may not be our responsibility to implement large-scale security recommendations other
than that of my deployed equipment and team. However, if we are able to educate building and site
owners on how they can conduct a complete and conclusive security risk assessment, highlighting the
processes and starting points, we will be going above and beyond to ensure optimum protection across
the estate.
Why Conduct a Security Risk Assessment?
Enhanced Security Preparedness
By conducting a security risk assessment, building owners can gain a deeper understanding of the
potential physical security threats their property faces. This knowledge enables them to develop a
proactive security strategy, enhancing preparedness and response capabilities, which is particularly
valuable when the building is empty and physical safeguarding measures like secure fencing or
barriers have not been considered.
Identification of Vulnerabilities
A risk assessment helps identify weaknesses in a building’s security infrastructure, such as outdated
technology, inadequate access control, blind spots, fire hazards, cramped spaces, lack of airflow or poor
lighting especially at the parking basement. Identifying vulnerabilities allows for targeted improvements
and reduces the risk of security breaches.
While many of the hazards located inside and outside the premises may be obvious, such as working
with machinery or chemicals, other risks may be less visible, which may prompt building owners to
conduct an occupant or resident survey to ensure the assessment is thorough.
Legal and Regulatory Compliance
Building owners have a responsibility to comply with applicable security regulations and standards.
Some compliance standards enforce physical security risks assessments, so if my team operates under
certain recorgnised standards, we will need to consult the services of a risk assessor that can conduct an
assessment to confirm our legal, and regulatory and industry best practices.
Ensuring that we understand the guidelines for information management, secure handling of sensitive
data.
Safeguarding People and Assets
A thorough risk assessment helps protect not only the physical property but also the people inside it. A
site owner should not want to wait for a major threat to take place that endangers the building’s
inhabitants, and ignoring such safety procedures would be a looming financial and reputational disaster,
not to mention a decrease in client trust.
By addressing vulnerabilities and implementing appropriate security measures, building owners can
create a safe environment for occupants and safeguard valuable assets. The recommendations can be
made on a micro and macro level, providing site owners with affirmative data and information to make
better strategic decisions on how to run their facilit
The Security Risk Assessment Process
The Management should establish objectives: Clearly define the objectives of the security risk
assessment. What aspects of security do you want to evaluate? Are there specific areas of concern?
Defining clear objectives will help steer the assessment process in the right direction.
Gather information: Collection of relevant data about the building, its occupants, and incumbent
security measures. This may include floor plans, incident reports, security system specifications, and
access control records. A thorough understanding of the building’s layout and existing security
infrastructure is essential to help identify how in-depth the assessment should be conducted.
Identify threats: Identify potential threats and hazards that may impact the building’s physical security,
such as criminal trespassing, technological vulnerabilities etc.
Assess vulnerabilities: Evaluate the vulnerabilities and information you have collated and assess their
severity by importance. Look for areas where improvements can be made to improve the individual
components as well as enhance the overall security of the structure.
Determine risks: Management should set up systems to analyze the likelihood and potential impact of
identified threats on the building’s security. This step helps prioritize risks and allocate resources
effectively. Consider the probability of occurrence and the severity of potential consequences.
Develop mitigation strategies: Based on the identified risks, develop a comprehensive plan to mitigate
security threats. This may include implementing enhanced building surveillance systems, patching
technology, bolstering training programs, or revising emergency response protocols.
Implement and monitor: Put the mitigation strategies into action and continuously monitor their
effectiveness. Regularly review and update security measures to adapt to changing threats and
technological advancements.
Remember, a security risk assessment is an ongoing process. Building owners should periodically
reassess their security measures to adapt to evolving threats and maintain a robust security posture.
Task 1 Part C: Identifying and participating in a professional development activity.
Development plan Key Learning outcome completed
) Hazard Identification - From the consists in collecting data from
rooftop during smoking . different sources to determine
whether a substance is toxic. It
involves gathering and
examining data from
toxicological and epidemiological
studies. Does exposure to the
substance produce any adverse
effects?
Fire breakage Installing fire fighting equipment at
respective positions.
Theft Installing High CCTV system with
well trained personels .