Assessments

What Security Threats Do You Face?

Recognizing your vulnerabilities is the first step in building a strong security program.

We pay attention to the details. Our holistic approach examines even the smallest vulnerabilities in your current security program that could jeopardize your ability to safeguard what matters most to your organization.

Our Security Assessment Process

We assess your security program and protocols, both individually and comprehensively, and then work with you to deliver a thorough risk and vulnerability evaluation of your unique security requirements. Steps of this process include:

Assessing your assets and associated threats, risks, and vulnerabilities
Evaluating new and modified risks based on crime trends and intelligence
Probing your facility functions and threat paradigms
Delving into safety and security programs, policies, procedures, and processes
Understanding what physical security technologies are in place
Reviewing current staff security related training practices

Then, we take it a step further to fully understand and align with your culture, mission, and vision.

We do this by engaging key stakeholders, leadership, and front line staff in conversations to understand their security related concerns, pain points, and successes.

Your Security Assessment Team Leads

See All Security Consultants
Headshot of Rick Amweg.
Rick Amweg

Consultant

“I am proud to be part of a team that values the customer’s needs and takes the time to understand and respond to their unique requirements.”
View Bio
Headshot image of Garry P. MacArthur.
Garry P. Macarthur

Vice President, Operations

“I have always had an interest in security due to its proactive, rather than reactive nature.  The opportunity to prevent or mitigate an incident before it occurs has been a driving force in my career.  My goal has always been to help with protecting every company’s most important asset; their people.”
View Bio
Headshot of James C. Townzen.
James C. Townzen

Vice President, Technology

“While most industries have established best practices and regulations for security, each client faces unique circumstances that influence how these practices are implemented. I enjoy collaborating with clients to create customized security standards that ensure an appropriate level of protection for their specific environments.”
View Bio
Headshot of Daniel Yaross.
Daniel B. Yaross

Consultant

“Similar to my SRMC colleagues I, too, have had the privilege of working with consultants in my 21 years of pediatric healthcare security management experience, to include SRMC. As a client, I truly appreciated the remarkable collaboration and wealth of knowledge exhibited by the organization and feel quite honored to be joining such a talented, professional group.”
View Bio
Headshot of Marilyn Hollier.
Marilyn W. Hollier

Consultant

“As a former client and satisfied customer of SRMC, I know how important integrity and providing outstanding customer service is to the SRMC team. I am excited to provide this same high quality service as a member of its staff. I am ready to share my healthcare security philosophy, knowledge and best practices with clients to assist them in providing a safe and secure hospital community. Hospital security should be recognized as an essential, integral member of the healthcare team, contributing directly to the safety, continuity of care, and overall patient experience.”
View Bio

Are you at risk? Find out today.