Oops! Sorry!!

This site doesn't support Internet Explorer. Please use a modern browser like Chrome, Firefox or Edge.

Critical Threat Logo


Our Approach

We approach your customized security survey in 4 parts following Enterprise Security Risk Management Principals.

1.)   Sitting down with you we will identify and value all of your assets. The process for accomplishing this is an all-hazards risk, threat, and vulnerability assessment that with cooperation and communication provides you with a clear roadmap. ​

2.   After identifying assets we can identify your vulnerabilities and risk to each one. This is accomplished through an in-depth analysis of threats and their impact. 

3.   From this we are able to create your customized roadmap that shows a clear prioritization of risk and risk relationships for each asset.

4.   The finished product provides a roadmap for you in resolving the risk, removing uncertainty, and ensuring the appropriate level of security to ensure longevity.

Our Services Can Be Used For:

•      Workplace violence consulting and best practices ​for business of all sizes

•      Best Practices, Risk Assessment, and Training for Houses of Worship ​

•      Design, review, and assessment of your physical protection systems

•      Security Management Support including efficiency studies, cost-benefit analysis, and zero-based studies ​

•      Security design review ​ ​

•      Expert witness testimony for security and training related matters ​

•      Security program policy and procedures, development, and review ​

•      Emergency response planning and exercise development

•      Building and running table-top exercises and emergency response drills

© Critical Threat LLC 2021

Critical Threat Logo