ATRIM-GROUP PROTECTING CRITICAL INFRASTRUCTURE
  • HOME
  • About
    • Our Team
    • History
    • Security Questions for a New Age
  • Services
    • Anti-Terror & Other Crime Threat Risk Assessment
    • Education & Training
    • Insider Threats
    • Healthcare Abuse & Fraud
    • Security Learning Cultures
  • CONTACT US
  • Blog
  • New Page
​The Anti-Terror Risk identification Matrix (ATRiM)
is designed for assess threats posed to critical infrastructure, It can be tailored to specific risk environments.  Originally automated,  manual audits are proving more powerful. The system is designed to include i insights into acts of terror and other outsider crime threats. 

​The audit is applied by specialists in  prevention science, who are certified in its use. We will work directly with your employees, while teaching the workings of our auditing process, until such time that they can be certified to annually update your infrastructure protection.​

About the Audit Process

An ATRiM auditing specialist conducts a preliminary review of your site(s).  This includes interviews with personnel. An auditing schedule is designed from a profile of the site functions and operations. It uniquely includes the wider threat environment around the facility.  The specialists, in conjunction with your employees, then assemble a small, vetted security team of key personnel in your organization. In turn, they apply the Audit protocols for collecting data at every level of the site. This includes daytime and night-time audits, external and internal reviews, and assessments of personnel and security operations. ​

​​​The results of the audit are compiled into a summary chart for preparing a detailed report. The report delivery includes a list of priorities, suggestions for improvement, and the development - or enhancement - of current security procedures. This may include engineering and architectural redesigns, new security technology and operations, internal reviews of screening and training, the impact of organizational culture on the threat environment, and a list of next steps. 
​

Comprehensive Risk Assessment
​

  • ​Risk Audits
  • Asset Appraisal
  • Threat Assessment
  • Vulnerability Analysis

Based in Science
​

  • 1st and 2nd Generation Crime Prevention Through Environmental Design (CPTED)
  • Situational Crime Prevention
  • Critical Infrastructure Specific
Picture
ATRiM: A Guide for Law Enforcement
Proudly powered by Weebly
  • HOME
  • About
    • Our Team
    • History
    • Security Questions for a New Age
  • Services
    • Anti-Terror & Other Crime Threat Risk Assessment
    • Education & Training
    • Insider Threats
    • Healthcare Abuse & Fraud
    • Security Learning Cultures
  • CONTACT US
  • Blog
  • New Page