CT Protect

CT Mitigation Assessment

Builds upon the Vulnerability Assessment with recommendations for measures and procedures to reduce risks to a manageable level. This strengthens security and prepares for potential terrorist threats.

Strategic Needs and Risk Appetite

What is your strategy and risk appetite in Counter Terrorism Risk Management?

This report develops a strategy aligned with corporate goals and risk tolerance.

Proportionate Recommendations

What mitigation measures are effective?

How can individuals determine which mitigation measures are effective? Misunderstandings often lead to costly, ineffective solutions and a flase sense of security.

Is the mitigation proportionate?

Simply adding barriers and security may be excusive, inefficient and costly. Understanding your risk appetite and tolerance is key, as risk perception varies by individual.

Do you record your decisions and rationale?

Both actions and inaction matter, as they reflect a clear rationale for decisions and support a strong auditable record. If its not written down – you didn’t think about it! The use of a CTRM enhances efficiency and cost-effectiveness.

This assessment ensures mitigation measures are proportionate to risk. The auditable report provides justifications for recommended or excluded actions, preventing unnecessary costs.

Residual Risk Analysis

Do you understand the residual risk you are accepting?

This assessment highlights the residual risk to ensure clients understand the level of retained risk.

Contingency Measures and Procedures

What is your plan for elevated risks?

This report outlines procedures for escalating security if threats increase.