top of page

E.G. Weiss & Associates

THE FUTURE OF EMERGENCY MANAGEMENT AND RISK MITIGATION

So, what is a risk or threat assessment and why do we need this?

 

A risk assessment is the process of identifying potential hazards and analyzing these hazards as to what could possibly happen if you experience this hazard.

Part of risk (or threat) analysis is the impact analysis which determines the potential impact could be due to an interruption of time critical processes.

 

 

There are numerous hazards to consider. For each hazard there are many possible scenarios that could unfold depending on timing, magnitude and location of the hazard.  Many of us think of hazards being events such as tornadoes or hurricanes, but a hazard may also be an employee, an agitator, aggressor, service disruption or information leak.

 

 

Every business, corporation, organization and agency has assets at risk of hazards.  Injuries to people should be the first consideration of any assessment and in light of the recent COVID-19 pandemic, the word “injury” can also be applied to “illness” or infection”.

 

 

Hazard scenarios that could cause significant injury or illness should be highlighted to ensure that appropriate plans and protocols are in place. Aside from the human factor, any other physical assets may be at risk. These include buildings, information technology, utility systems, machinery, raw materials and finished goods.

 

The potential for environmental impact will also be considered. We will consider the impact an incident could have on your relationships with customers or clients, the surrounding community and other stakeholders as well as situations that would cause others to lose confidence in your organization and its products or services.

We prevent failed missions every day.


We understand that each case is different which is why we never approach an assessment with a “cookie-cutter” approach but rather (just like our training programs), customize each assessment to your needs and situation.


An assessment may not be a one-time thing for your agency or organization. We have several clients that have retained us to do constant situational monitoring with regular threat analysis reports.


It is our job to “play the bad guy” and imagine how to take advantage of your vulnerabilities and weaknesses so that you can make appropriate changes to better protect your interests.


Once you have your analysis, we do not just leave you hanging. At your request, we will stay involved assisting you in finding the right tools, products, services or solutions to remedy any issues that surfaced during our analysis.


We believe in mitigation and planning so we will make recommendations for not only solutions but for additional training programs that will better educate you and your employees in the safety and security arena.


We are presently creating a new virtual assessment tool utilizing virtual reality videos so that we can “join” you at your location at any time to see what you see in real-time. Check back as we develop this and add more information to this page!

What is threat analysis?


Threat analysis is difficult to define because it means different things to different people depending on what they expect as an outcome.  Threat analysis has been a specialty of EG Weiss for many years and could be described as predictive in nature; much like forecasting the weather.


To people in the security or protection industry, threat assessment is the first step in a risk and vulnerability analysis. This task involves assessing the various security risks associated with a particular location or mission. Our analysis may cover everything from natural threats to criminal threats, from terrorist or aggressor threats to agitator efforts.  Analysis can be accomplished through several means including historical research, OSINT and investigations.


A large part of the way we perform threat analysis is research; knowing the climate around your location or mission and then using intelligence gathering we can create a forecast that includes possible threat scenarios and suggested changes you might make.

bottom of page