Don't gamble with your company's investigation process.

Learn about i-Sight software today

How to Implement an Effective Corporate Security Plan

Incorporate vulnerability assessment, risk analysis and a team approach

Posted by Timothy Dimoff on June 26th, 2014

A corporate security plan is a document that outlines your organization’s investigation and security philosophies, strategies, goals, programs, and processes. It also provides a detailed outline and assessment of the risks and the mitigation plans for them including risks of violence, theft, fraud, and other security threats and how to gauge their potential impact on your business. It should review and include any current crisis prevention, management, and recovery programs you may already have in place.

A corporate security plan will help you to:

  • Conduct an effective, efficient assessment of your business site and security personnel.
  • Make decisions about security philosophies, strategies, contract relationships, technology and equipment.
  • Use all this information to construct and finalize your corporate security plan and then implement it into the management of your business.

Vulnerability Assessment

FREE Investigation Report Template

Prepare thorough, consistent investigation reports with our free report template.

Download Template

The traditional approach to security has been making sure alarms are installed, signs posted, and security guards hired, but a proper security plan should contain much more. You need to begin with a thorough vulnerability assessment whose sole function is to identify your organization’s vulnerability to specific loss events that include:

  • life and limb
  • irreplaceable as well as routine business documents, both hard and electronic
  • all assets
  • to ensure business continuity in case of a breach, theft, violence, or other issue

Risk Analysis

Once the vulnerability assessment has determined what to protect, the next step is to conduct a risk analysis to determine the risk of the specific loss events. Consider the following questions:

  • How likely is it that this loss event will occur?
  • How likely is it that this event will be successful against your current countermeasures?
  • What is the negative impact to your organization if this loss event occurs?

Finalize Your Corporate Security Plan

Once you have completed your vulnerability assessment and risk analysis you have an outline to finalize your corporate security plan. Assemble a team with representatives from the following departments:

  • human resources
  • legal counsel
  • facilities
  • operations
  • corporate security

Many organizations choose to hire an independent security consulting firm to help identify issues that are overlooked or find problems that insiders may not bring up. Then develop your plan and implement it.

Timothy Dimoff
Timothy Dimoff

President, SACS Consulting & Investigative Services

Timothy A. Dimoff, CPP, president of SACS Consulting & Investigative Services, Inc., is a speaker, trainer and author and a leading authority in high-risk workplace and human resource security and crime issues.
He is a Certified Protection Professional; a certified legal expert in corporate security procedures and training; a member of the Ohio and International Narcotic Associations; the Ohio and National Societies for Human Resource Managers; and the American Society for Industrial Security. He holds a B.S. in Sociology, with an emphasis in criminology, from Dennison University.

Visit Website

Book A Demo

To our customers: We’ll never sell, distribute or reveal your email address to anyone. Privacy Policy

Want to conduct better investigations?

Sign up for i-Sight’s newsletter and get new articles, templates, CE eligible webinars and more delivered to your inbox every week.