|
The Anti-Terror Risk identification Matrix (ATRiM)
is designed for assessing threats posed to critical infrastructure. It can be tailored to specific risk environments. Originally automated, manual audits are proving more powerful. The system is designed to include i insights into acts of terror and other outsider crime threats. The audit is applied by specialists in prevention science, who are certified in its use. We will work directly with your employees, while teaching the workings of our auditing process, until such time that they can be certified to annually update your infrastructure protection. |
About the Audit Process
An ATRiM auditing specialist conducts a preliminary review of your site(s). This includes interviews with personnel. An auditing schedule is designed from a profile of the site functions and operations. It uniquely includes the wider threat environment around the facility. The specialists, in conjunction with your employees, then assemble a small, vetted security team of key personnel in your organization. In turn, they apply the Audit protocols for collecting data at every level of the site. This includes daytime and night-time audits, external and internal reviews, and assessments of personnel and security operations.
The results of the audit are compiled into a summary chart for preparing a detailed report. The report delivery includes a list of priorities, suggestions for improvement, and the development - or enhancement - of current security procedures. This may include engineering and architectural redesigns, new security technology and operations, internal reviews of screening and training, the impact of organizational culture on the threat environment, and a list of next steps.
The results of the audit are compiled into a summary chart for preparing a detailed report. The report delivery includes a list of priorities, suggestions for improvement, and the development - or enhancement - of current security procedures. This may include engineering and architectural redesigns, new security technology and operations, internal reviews of screening and training, the impact of organizational culture on the threat environment, and a list of next steps.