SecurityAdvisoryCouncil.com
Security Risk Analysis - Issues - Strategies - Solutions - Resources
Security Risk Advisory Consultants - Advanced Security Planning 
Security MostWanted For America!
WelcomeAbout UsBusinessCommunityHomePersonal ServicesStrategies

Common Challenges Creating And 
Using Threat Assessment Plans













Common challenges in creating and using threat assessment plans may sometimes stem from limited resources, organizational resistance, and difficulties with complex information and ethics. These issues can undermine a plan's effectiveness, leading to a false sense of security or biased outcomes. 

Resource and implementation challenges
Insufficient resources: Many organizations, particularly small and medium-sized businesses, lack the financial and human resources to conduct comprehensive assessments. Threat assessment can be labor-intensive, and understaffed teams may become overwhelmed, especially with high volumes of reports.

Limited expertise: The specialized skills needed for a full threat assessment are often not available in-house, leaving organizations vulnerable to critical oversights.

Internal resistance: Employees and even departments may resist the process, viewing it as an unnecessary burden or fearing that revealing weaknesses will expose them to blame.
Technology gaps: Many organizations still rely on analog, paper-based systems, which makes it difficult to manage complex cases, share information across teams, and identify emerging patterns. 

Information and process challenges
Incomplete or outdated data: Assessments are often based on incomplete, outdated, or unreliable data, which can lead to inaccurate risk evaluations and flawed decisions.

Evolving threats: Threats change rapidly, especially in cybersecurity and online spaces. A threat assessment treated as a one-time event quickly becomes obsolete.

Information-sharing difficulties: In multi-agency or cross-departmental teams, legal and procedural obstacles, such as the Family Educational Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act (HIPAA), can impede information sharing.

Subjective bias: In the context of school or workplace violence, decision-making can be influenced by subjective bias related to race, disability, or personal feelings. This can lead to disproportionately negative consequences for certain individuals.
False threats: The proliferation of false or hoax threats, especially online, can drain resources and cause unnecessary panic.

 Deciphering the line between a casual remark and a serious threat is often difficult and can lead to overreaction or underestimation. 

Communication and ethical challenges
Ineffective communication: The findings of a threat assessment may be communicated poorly to stakeholders, causing delays in mitigation and undermining risk insights.

Difficulty measuring success: It is difficult to evaluate the effectiveness of a threat assessment program, as success is often measured by the absence of a negative event. This can make it hard to secure continued funding and buy-in.

Navigating privacy concerns: Collecting and sharing data for threat intelligence raises privacy issues, requiring a careful balance between safety and individual rights.

Risk of "mission creep": A threat assessment process can sometimes expand beyond its initial scope and be used to address broader social or educational issues, diverting it from its primary purpose of preventing violence.
Threat Assessment Planning















A threat assessment plan is a systematic process of identifying, analyzing, and mitigating potential risks to an organization, its people, and assets. The planning process involves distinct phases, from forming a team to implementing and monitoring security measures, and can be adapted for various contexts, including physical security, cybersecurity, and school or workplace violence. 

Key phases of threat assessment planning

1. Establish A Threat Assessment Team
Having a multidisciplinary team is crucial for a thorough comprehensive assessment. 

Team members: Can include representatives from leadership, human resources, legal, security, IT, and external partners like law enforcement and mental health professionals.

Create a reporting mechanism: Establish clear, simple procedures for reporting threats or concerning behavior to the team. Ensure the process is well-known throughout the organization. 

2. Identify and prioritize assets
Determine what you need to protect and what is most critical to the organization's mission. 

Prioritize: Categorize assets (e.g., physical buildings, data, personnel, reputation) by their importance, focusing on the ones that pose the greatest risk if compromised.

Define scope: Clearly state the boundaries of the assessment, including locations, systems, and personnel that are relevant. 

3. Identify potential threats
Brainstorm and research potential threats relevant to your organization's context. 

Threat analysis: Identify specific internal and external threats, such as natural disasters, cyberattacks, targeted violence, financial fraud, or insider threats.

Behavioral indicators: In the context of targeted violence, train personnel to recognize specific behaviors that may indicate a person is in crisis and poses a risk to others. 

4. Assess vulnerabilities and risks
Evaluate your organization's weaknesses and determine the likelihood and impact of each threat. 

Vulnerability assessment: Analyze how potential threats could exploit weaknesses in your current security measures, policies, and procedures.

Risk assessment: Use a risk matrix to prioritize threats based on their potential impact (e.g., negligible to catastrophic) and likelihood (e.g., improbable to frequent). 

5. Develop and implement mitigation strategies
Create and execute a plan to address the identified risks.
Mitigation options: Develop strategies that can include enhanced security protocols, employee training, physical security upgrades, or improved cyber defenses.

Actionable recommendations: Provide clear, actionable advice that aligns with organizational resources and goals.

Safety planning: For risks involving individuals, develop intervention and management plans that address the underlying issues and reduce the risk of harm. 

6. Document, train, and monitor
A threat assessment plan is an ongoing process that requires consistent attention. 

Documentation: Record all findings, recommendations, and actions taken to create a "paper trail" for legal and procedural purposes.

Awareness and training: Train staff on the plan and how to identify and report threats. This builds a culture of vigilance and security.
Continuous monitoring: Regularly review and update the plan to adapt to new or changing threats. Monitor individuals and situations of concern and revise intervention plans as needed. 

Examples of threat assessment in different contexts
Workplace violence: Focuses on identifying and managing individuals who may pose a risk of targeted violence against coworkers or the organization.

School safety: Identifies students who may pose a risk of violence to themselves or others and develops intervention strategies to address the root causes of concerning behavior.

Cybersecurity: Assesses risks to a company's digital assets, including data, networks, and systems, from threats like malware, phishing, and unauthorized access.

Physical security: Evaluates and mitigates threats to a facility, including access controls, surveillance, and emergency response protocols.
Security Strategies
By Signing Up For Our News Letter,  You Will Receive The Latest Security News 
Once-A-Month!
Sign InView Entries