Ask an Expert
Tel: +1-281-673-2800
Fax: +1-281-673-2931
Find an Office
Email Us

Security Risk Management

ABS Group provides a complete range of intelligent and comprehensive security risk management solutions to enterprise companies, government agencies and critical infrastructure owners and operators. We combine extensive risk management capabilities with technical and industry operational experience to help clients mitigate their exposure to security risks using proven and practical risk-based decision-making processes.

We work with our global clients to understand and reduce their risk profiles, optimize insurance expenditures, train personnel and confirm compliance with existing and impending regulatory requirements.


Threat and Vulnerability Assessments

We provide customized assessments for your operations, facilities and corporate security posture using the most relevant vulnerability and risk assessment methods and an effective, team-based approach. Our security experts understand how adversaries could potentially compromise your organization, its personnel, assets and valuable information. Our work is to identify the areas and issues that may lead to loss of assets, loss of life, business interruption, unacceptable consequences and hidden liabilities, and to recommend practical and efficient solutions.

Security Manpower Performance Evaluations

Unarmed, and in some cases armed, proprietary security officers are found in many organizational environments. With trends leaning toward outsourcing this security function, the use of contract officers is growing. ABS Group can help organizations evaluate the level of effectiveness, capabilities and training for this security solution as well as understand the dynamic security challenges facing the organizations. Our performance evaluations and benchmarking studies of security/law enforcement manpower and their associated operational and command and control services provides measurable and well-defined results to help clients improve business performance, expenditures and training; decrease liability; and improve the outcome of contract negotiations.

Security Plan Development

A well-written security plan is a living document that provides the basis for effective implementation and management of any security program. Increasingly, these plans are becoming a regulatory necessity and a trend that will likely increase as security is increasingly scrutinized and regulated worldwide. Let us work with you to develop practical and useful security plans that meet the demands of today's security environment and ensure that your organization is in compliance with applicable regulatory requirements.

Security Risk Management Academy

Our training staff has amassed a wide variety of international experience in security risk management. We have assisted a number of high-level governmental organizations with the development of comprehensive, high-quality, risk management training programs for security and law enforcement professionals. Through these experiences, we have become a global resource for instruction in a wide variety of risk management topics, including terrorism risk, physical and cyber security, crime prevention, loss prevention and control, technical countermeasures operations, and security and blast engineering. We have comfortable, affordable, classroom and breakout room areas to facilitate learning through interesting, hands-on and practical instructional experiences.

Compliance Audits and Inspections

Complying with regulatory requirements is not an option but a requirement. Regulations related to security are on the rise around the world, and the legal, financial and public relations consequences of non-compliance can be tremendous. Our team of experts provides internal and independent audits and inspections of your security programs. Whether you are concerned about physical security, personnel security, information security or cyber security, we can help you prepare for and surpass the expectations of regulatory oversight agencies.

Security System/Technology Performance Evaluations

Our extensive background in security systems design and operations benefits our clients through testing and evaluation of security technologies, helping to ensure security system and program reliability. Security management policies, procedures, technologies, manpower and training should all be evaluated through a multi-faceted approach for testing to be effective. We can provide this service, as well as a full program of ongoing security systems evaluations to meet changing threats, regulations and needs.

Security Technology Vendor Evaluation and Selection

Since ABS Group does not represent a specific security technology vendor or service provider, we can provide third-party independent evaluation of bids already received from vendors. Our security risk management team can provide the specifications and Request for Proposal development for the vendor bidding process and assist with contract negotiations, and project implementation and oversight. We can provide peer reviews of security system designs prepared by clients, other consultants and systems integrators. Our objective review process can help ensure the final system meets client needs and is designed and installed to industry standards and current best practices.

Cyber Security

Our team can help your organization identify potential cybersecurity hazards and associated mitigating controls. We conduct tests to validate that technical and administrative controls are in place and operating effectively. Additionally, we can design and assist in the implementation of solutions where controls are not in place or operating effectively.

  • Review cybersecurity organizational structure and control design and implementation to identify potential gaps or weaknesses
  • Guide the design and implementation of solutions to mitigate noted deficiencies
  • Review cyber policies, plans, procedures and controls to identify gaps in compliance with regulatory requirements from organizations such as NERC, NRC, FFIEC, DHS and TSA
  • Conduct detailed examinations and evaluations of information technology infrastructure, policies, processes, operations or supporting technology (includes cybersecurity policy review and compliance, vulnerability scanning and reviews, penetration testing, cyber security controls audits, firewall audits, user/account audits, segregation of duties audits and software development life cycle audit) 
  • Conduct reviews or audits of a vendor's cyber security based on organizational standards or regulatory requirements
  • Assist in the creation, documentation and maintenance of business continuity and disaster recovery (BCP/DR) plans, and conduct audits and assessments of BCP/DR plans
Back to top