Transform your approach to security operations.

Join the most advanced security teams around the globe and see what Base Operations can do for you.  

In the past 5 days I haven’t closed Base Operations.

I give It a 10 out of 10.

Dean Geribo
Dean Geribo
Head of Corporate Security
 @ 
Moderna
Name*
Email*
Company*
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

3 Steps to Enhance Your Risk Assessment Process

Three best practices that enhance the value of any assessment, scale support for different use cases, and bring more consistency and credibility to the security program.

3 Steps to Enhance Your Risk Assessment Process

Most security leaders we speak with are trying to bring more governance to their corporate security programs.  Part of that process is defining SOP’s for commonly performed tasks to build more consistency and reliability in their execution.  One of the most commonly performed tasks across industries is the risk assessment.  

In working with companies across industries we’ve collected three best practices that enhance the value of any assessment, scale support for different use cases, and bring more consistency and credibility to the security program.

Take time to define your security requirements

  1. What is the nature of the assessment? City severity rankings, a traveling executive, site assessments, or safe routing all have very different goals
  2. What risks or consequences am I most concerned with? The intent being to protect a physical asset vs keep people safe vs. make them feel safer will impact the deliverable.
  3. What decisions will this threat assessment inform? Go/no-go, investment in fortification or deterrent measures, informational briefing.  Each one of these requires analyzing data through a unique lens.

Tailor the scope of your risk assessment

  1. What are the norms within your company? Are there any relevant policies in place (legal duty of care)? What’s the risk tolerance of leadership for this type of use case?  Are there any reputation risks to consider?
  2. Who are the consumers of the report? Internal to security vs ELT vs. broader employee base should look and feel very different.  This will help establish relevance and gain buy-in for decisions or recommendations
  3. What resources do I have at my disposal? Whether it's google, an in-house platform, or a SaaS product, defining which tools should be used for what type of assessment helps streamline information gathering and maintains accountability.

Make data-driven security recommendations

  1. Use visualizations where possible. Charts, graphs, maps, all help paint a picture and make intel easier to consume
  2. Let the data highlight the decision. Security is often tasked with finding ways to say “yes” in the safest manner possible.  Let your data-backed intel tell the story so stakeholders understand the why.
  3. Add context to create actionable recommendations. Blanket recommendations have a tendency to get overlooked.  Context helps with relevance and credibility and gives stakeholders a tactical next step on behalf of the business, to keep themselves, or keep others safe.

Consider these best practices in the next review of your corporate security governance.

Takeaways

Enhancing your Risk Assessments is as easy as 1, 2, 3.

  1. Requirements first. Every business is different, make sure you are focused on what your business specifically needs.
  2. Tailor your scope. Focus on what is meaningful and what is actionable.
  3. Leverage data. Data not only helps you justify recommendations, it can help you validate the impact of your initiatives.
Newsletter

Are you a security innovator or change-maker interested in the future of corporate security?

Subscribe for Updates.

Join the Most Progressive Security Teams Around the Globe and See What Base Operations Can Do for You

Request Demo

Join the most advanced security teams around the globe and see what Base Operations can do for you.

Request Demo

Related Resources

Based on your article selection above, we believe you would like these additional resources.
Enjoy online or subscribe for our newsletter and get articles delivered straight to your inbox.