Do you have policies and procedures that cover risks like workplace violence, bomb threats, active shooters or natural disasters? How about executive protection or travel to high-risk areas? How do you know if current procedures will be sufficient or effective?
Given the complexity of most organizations, developing effective security programs can be an overwhelming job. As a world leader in physical, cyber, and operational security, we can help you create security policies and procedures that work together to close gaps that might otherwise expose your organization to greater risks.
An effective security program must cover many scenarios and clearly define the duties and expectations for everyone in your organization — from the security department to management and employees as well as third parties like local emergency responders and business continuity partners. Taking a multidisciplinary approach, we can review your current security policies to ensure they cover your current risks and vulnerabilities.
Security policy development best practices, customized applications
If you find your current policies are insufficient or ineffective, we can develop security policies and services tailored to the exact risks you face — all within the framework of laws and regulations of each country in which you operate. Depending on your needs, we can assist with either comprehensive security programs or individual components, such as access control, pre-employment background checks, workplace violence prevention, or executive protection.
Case Study: Policy review for a Florida seaport
Kroll was retained by a seaport in Florida to conduct a security policy procedure review and security threat assessment. Kroll reviewed existing security documentation for the Port, to include post orders, incident reports, procedures manuals and crisis plans. It was important that all elements of the security program worked in concert with each other to achieve an effective and efficient approach to physical security. In addition, we conducted the assessment to identify potential threats and vulnerabilities to the Port’s physical and procedural security that could result in a significant loss of life, operational capacity, or have other major impacts.
The findings and recommendations were documented in a security threat assessment report, which encompassed the evaluation of the existing security practices and measures at the Port based on current security climate and the threat profile developed in the study.
Case Study: Developing security operation policies and procedures for a regulated financial organization in Asia
Kroll was invited by the client to assist with development and preparation of physical security policies and procedures for its new data center in Asia. We suggested the security policies and procedures to include the following items:
- Employee, contractor and vendor responsibilities
- Access credentials
- Pedestrian processing and control
- Vehicular processing and control
- Security control room operations
- Receiving and screening operations
- Emergency response measures
- Data security policies and procedures