I would like to say "Security Risk Assessment" according to a standard (any standard Australian or Boyd, etc) is about a process where "decisions" are made based on a "business process". I like the way you introduce the @policies and procedures manual - which may be the business process (Workflow) required to be assessed. The wrong business process could introduce risk. It is a closed loop. What has been promoted is a list of "referencing" methods to more information to support "observations" or risk strategies. But these are all open ended and do not adhere to a good risk management process stipulated by Standards which directly one to have a close loop of continuous assessment and may decision points. Risk assessment this way also resolves risk created when a process is modified such as adding "equipment" or untrained manpower, etc. blog.triaster.co.uk/blog/the-physical-security-industry-ollencio-olly-dsouza You can simulate and animate an entire process to understand risks introduced when there is a change at several decision points. If you would like to share thoughts on this - I can send you some animation and simulations on risk management that may demonstrate the benefits of using these techniques. All else is verbage which is elequently highlighted in your video.
@@michaelsilva9377 interesting. I just visited your website, sir. I’m a Brazilian special forces officer who is considering beginning this career path. Thanks for your website, book and all valuable information.
Hello there, I am currently a Safety and Security officer who would like to take the steps to move towards consultation and security assessments. How should I go about doing so?
Useful tips
I would like to say "Security Risk Assessment" according to a standard (any standard Australian or Boyd, etc) is about a process where "decisions" are made based on a "business process". I like the way you introduce the @policies and procedures manual - which may be the business process (Workflow) required to be assessed. The wrong business process could introduce risk. It is a closed loop. What has been promoted is a list of "referencing" methods to more information to support "observations" or risk strategies. But these are all open ended and do not adhere to a good risk management process stipulated by Standards which directly one to have a close loop of continuous assessment and may decision points. Risk assessment this way also resolves risk created when a process is modified such as adding "equipment" or untrained manpower, etc.
blog.triaster.co.uk/blog/the-physical-security-industry-ollencio-olly-dsouza
You can simulate and animate an entire process to understand risks introduced when there is a change at several decision points.
If you would like to share thoughts on this - I can send you some animation and simulations on risk management that may demonstrate the benefits of using these techniques. All else is verbage which is elequently highlighted in your video.
This is an excellent and well informed response. thank you for sharing your knowledge with us. www.dcsecurityconsulting.co.za
Very interesting!
Greetings from bocconi university.
Interesting. Where are you based in?
Seattle, Washington, USA
@@michaelsilva9377 interesting. I just visited your website, sir. I’m a Brazilian special forces officer who is considering beginning this career path. Thanks for your website, book and all valuable information.
@@o_felipe_reis I wish you success in your new career. Feel free to reach out if I can answer any questions.
We need maximum investment in security systems in Africa.greeting from Africa research university Zambia
Hello there, I am currently a Safety and Security officer who would like to take the steps to move towards consultation and security assessments. How should I go about doing so?
I would be happy to discuss this with you. Please send me an email at the address shown at the end of the video.