CAPABILITY STATEMENT

Landmark is uniquely qualified to provide a complete portfolio of integrated physical protection solutions to ensure the protection of assets; identify and reduce risk; as well as evaluate, respond, and recover organizational assets from incidents across the full range of natural, technological, and man-made/man-caused undesirable events.  And we  understand that limited resources, personnel, and budgets force organizational managers to identify and prioritize corporate assets deemed most critical to their organization’s mission when addressing their ability to Deter, Detect, Deny, Delay and Defend against an undesirable event. 

STRATEGY FOR THE PROTECTION OF ASSETS

Landmark uses a 5 (five) step Composite Risk Assessment Process to determine the minimum level of protection needed to safeguard resources adequately and economically.

This process provides a systematic approach to acquiring and analyzing the information necessary to guide decision makers in the protection of assets and operations and the allocation of security resources.

 

This process integrates risk analysis techniques designed to allow clients–whether corporate leadership, security managers, analysts, or technicians to perform their planning, implementation, and evaluation of risk-based security strategies for existing or for future business endeavors.

 

Landmark frames risk analyses and vulnerability assessments from an all hazards approach–natural, man-made, and technological–and the full range of inclusive incidents.  From these vulnerability assessments, Landmark can develop a Design Basis Threat (DBT) to protect the type, composition, and capabilities of potential adversaries/hazards.

 

The DBT outlines the set of adversary/hazard characteristics for which the operators and organizations together have protection responsibility and accountability.

HIERARCHY OF HAZARD/THREAT MITIGATION & CONTROL

 

Elimination: Eliminating the hazardous/threatening condition-physically removing it, is the most effective hazard control.

 

Substitution: The second most effective hazard control, involves replacing something that produces a hazardous/threatening condition (similar to elimination) with something that does not produce such a hazard.

 

Engineered controls: The third most effective means of controlling hazards/threats is engineered controls. These controls do not eliminate hazards, but rather isolates assets from hazardous/threatening conditions.

 

Administrative controls: Administrative controls are changes to the way (policies, practices and procedures) things are done. Administrative controls do not remove hazards/threats, but limits or prevent assets’ exposure to hazardous/threatening conditions.

ASSESSMENT PROCESS

During the assessment, all aspects of your protection program are examined, any weaknesses are identified, and suggestions for security improvements are made. In addition, opportunities where costs can be reduced or where security/emergency operations can be made more efficient are also identified.

 

The Protection Assessment process used by is constantly evolving, allowing us to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices.

 

The Protection Assessment is custom tailored for each project, but typically includes the following tasks:

  • Risk identification and analysis

  • Threat and vulnerability assessment

  • Review of site and facility security management

  • Review preparedness, mitigation, response, and       recovery plans

  • Data Analysis

  • Site Survey/Inspection

  • Review Compliance with recognized principals

  • Review of degree of compliance with requirements that are specific to your industry

  • Review of facility operating procedures

  • Review of physical security systems

  • Review of electronic security systems

  • Review of architectural security

  • Review of policies and procedures

  • Develop, design, evaluate response exercises