Shopping Basket

Items: 0
Subtotal: $0.00
Note: All prices in US Dollars
Sort By:

Search by Keyword

The Risk Assessment - Identify Vulnerabilities and Threats

Summary of the Risk Assessment Process

Getting Started

Churches, Synagogues, Temples and Other Houses of Worship

Improving security starts with a good risk assessment program where you identify threats and vulnerabilities. Our program guides you through this assessment process where you'll gain a better understanding of the way your HoW operates. While answering the assessment questions, you'll start identifying possible vulnerabilities and threats. Then you'll consider the different countermeasures to diminish the threats and ultimately reduce or even eliminate vulnerability. To do this your security plan may be designed with the "Security in Depth" concept.

Security In Depth

These rings or layers of security protect the assets. Penetrating the rings to acquire the asset demands more effort on behalf of the perpetrator – leading to delayed entry and detection.

Looking at the image above, you can better understand the concept of “Security in Depth”. A security plan could be designed under these principles - in layers or rings of protection surrounding the things needing protection. Each ring represents a certain feature within your security plan. For example, an outer ring could be the perimeter fence or the building wall of the house of worship. The next ring could then be the doors and windows and hardware and locking devices. A third ring could be an intrusion detection or CCTV system. The fourth ring could be an access control / ID system for controlled or restricted areas where you may have computers and storage devices with sensitive data or a safe. Finally, one of the most critical, if not the most critical element of the security program is qualified people - to pull it all together. People can provide protection as well as monitor and enforce the rules which guide these different rings of security to function in a compatible manner. Each element is to work in harmony with the others.

While conducting the security survey /  vulnerability assessment:   
  • Determine where your valuable / critical assets are
  • Brainstorm to identify
    • Different events that could create loss. (historical information should be gathered and reviewed) 
    •  The rate of occurrence / recurrence of those events.
    • The impact or consequence on the HoW, if the events occurred.
    • Consider options available to diminish the probability of the events from occurring and pick the best option(s) to implement.
    • Start making estimates on the cost (if any) to budget for improvements.
    • Review the different policies and procedures currently practiced and update accordingly. 

    If you haven't developed a formal security program, now is the time to start. For your free House of Worship Vulnerability Assessment program, download by clicking --> Here.

    Clear Understanding Before Implementing Countermeasures

    Let’s face it, news about Houses of Worship is usually focused on major events like shootings, and theft but there are other areas of concern that are not covered in the news. With a majority of volunteer staff members overseeing child care, ushering, choir, and the lack of enforced policies and procedures can lead to a tendency of extending a huge amount of trust to volunteers that may not be apt for the position they are filling. If proper screening is not conducted for the right positions, things could go wrong. Using this Vulnerability Assessment will help identify your vulnerability posture.

    Download the free Vulnerability Assessment for Houses of Worship now.
    Copyright ©