CAPABILITY STATEMENT

Landmark Physical Services, LLC was founded to leverage the vast and varied experiences gained through the more than three decades of experience identifying and responding to emerging trends and threats. Landmark’s founder has developed, implemented and managed very broad protection functions for a wide range of organizations to include but not limited to those listed below:

VOSB_edited.jpg
CPP.png
CPTED_edited_edited.jpg
MDOT_edited_edited.jpg

STRATEGY FOR THE PROTECTION OF ASSETS

Landmark Physical Security Services, LLC uses a 5 (five) step Composite Risk Assessment Process to determine the minimum level of protection needed to safeguard resources adequately and economically.

This process provides a systematic approach to acquiring and analyzing the information necessary to guide decision makers in the protection of assets and operations and the allocation of security resources.

 

This process integrates risk analysis techniques designed to help clients–whether corporate leadership, security managers, analysts, or technicians to perform their planning, implementation, and evaluation of risk-based security strategies for existing or for future business endeavors.

 

Landmark Physical Security Services, LLC frames risk analyses and vulnerability assessments from an all hazards approach–natural, man-made, and technological–and the full range of inclusive incidents.  From these vulnerability assessments, Landmark can develop a Design Basis Threat (DBT) to protect the type, composition, and capabilities of potential adversaries/hazards.

The DBT outlines the set of adversary/hazard characteristics for which the Management team has protection responsibility and accountability. And who also accept the risks for any gaps or deficiencies resulting from failures if the protection program. 

HAZARD/THREAT MITIGATION & CONTROL

 

Elimination

Eliminating the hazardous/threatening condition-physically removing it, is the most effective hazard control.

 

Substitution/People

The second most effective hazard control, involves replacing something that produces a hazardous/threatening condition (similar to elimination) with something that does not produce such a hazard.

 

Engineering controls/Technology

The third most effective means of controlling hazards/threats is engineered controls or technology integration. These controls do not eliminate hazards, but rather isolates assets from hazardous/threatening conditions.

 

Administrative controls/Processes

Administrative controls are changes to the way (policies, practices and procedures) things are done. Administrative controls do not remove hazards/threats, but limits or prevent assets’ exposure to hazardous/threatening conditions.

ASSESSMENT PROCESS

During the assessment, all aspects of your protection program are examined, any weaknesses are identified, and suggestions for security improvements are made. In addition, opportunities where costs can be reduced or where security/emergency operations can be made more efficient are also identified.

 

The Protection Assessment process used by is constantly evolving, allowing us to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices.

 

The Protection Assessment is custom tailored for each project, but typically includes the following tasks:

  • Risk identification and analysis

  • Threat and vulnerability assessment

  • Review of site and facility security management

  • Review preparedness, mitigation, response, and recovery plans

  • Data Analysis

  • Site Survey/Inspection

  • Review Compliance with recognized principals

  • Review of degree of compliance with requirements that are specific to your industry

  • Review of facility operating procedures

  • Review of physical security systems

  • Review of electronic security systems

  • Review of architectural security

  • Review of policies and procedures

  • Develop, design, evaluate response exercises