<br />
<br />TARGET, FOCUS AND JUSTIFY THE ENTIRE SECURITY BUDGET
<br />WITH RISKWATCH@'S RETURN ON INVESTMENT (ROI) ANALYSIS
<br />
<br />RiskWatch" foJlows thc GAO methodology in aJl
<br />elements of its security risk assessment products.
<br />"We huve previollsly reported 011 the )'a/lIe (~lll
<br />flew approach l~rllsillg sound threat and ri.""h'
<br />Wisessmcflts ... forfrn'lIsing programs ulld
<br />investments to combat terrori.\'IIl. ..
<br />
<br />According to a recent U.S. General Accounting
<br />Office Report, " The approach to good securi(v is
<br />fimdamentally similar regardless afthe assets
<br />being protected ", As GA 0 has previously reported
<br />for homeland security and information s.vstems
<br />security. "applying risk management principles
<br />can provide a sound foundation for effective
<br />security whether the as!;ets are information,
<br />operations, people. or facilities". These
<br />principles, which have been followed by members
<br />qfthe intelligence and defense community/or
<br />many years. can be reduced tofive basic steps:
<br />
<br />J. Jdent(fy Assets
<br />2. Ident(f}' and characterize Threats
<br />3. Ident(fy and characterize Vulnerabilities
<br />4. Risk must be analyzed and assessed
<br />5. Ident(f}' countermeasures to reduce risks
<br />
<br />Risk W atchc< follows the GAO methodology and
<br />ASIS best practices in all elements of its security
<br />risk assessment products.
<br />
<br />lurr'n~ "no Rc,'"",",~ .,~ cr'",
<br />
<br />
<br />",,,",,,,"(",
<br />
<br />]',,,,"'!' I.., (;"",,",,,
<br />
<br />\,wlL,';"I."""
<br />
<br />s.~,","\' """H' 140"
<br />
<br />I"L,"""I1I1<<,',,,,,,,,,,,,,
<br />
<br />1'10:",,,,,,11,<,,,,",,1011"
<br />]';,,'k.,~, (,,,",,,,II~ '" ,
<br />
<br />K""",""",
<br />
<br />Mm
<br />Ca,h
<br />
<br />Llln
<br />
<br />InliZ e a Ions IpS
<br />
<br />Threat
<br />
<br />Vulnerability
<br />
<br />Direct Loss Accident , IConstruction 1
<br />/'" I Fines !~, Earthquake / / Barriers
<br />1- - I Dl5r\Jpbon 81 Oil Spills 1(" ;"'IRestricted Areas
<br />-... 1 Indirect Los:s 'f\\ Power Loss Y' Personnel ID
<br />Intang,bl.. \\ Theft I \ Key Control,
<br />Lo5S of Ufe ~ AoodlnQ ~. \. No Security Plan
<br />Terrorist Attac~ Pumas Damaaed
<br />Incident Class -.J Homicide \ \~Dockside
<br />Incident I ~Construction
<br />'---Degree of Seriousness
<br />Conditioned Incident
<br />
<br />Carrier
<br />I Chemicals
<br />Ca",o
<br />c~w
<br />
<br />Security
<br />Personnel
<br />
<br />1 D_p .db\;j~R
<br />
<br />The R;skWatch engine automatically links and analyzes the relationships
<br />between each element of the assessment including threats and controls
<br />
<br />EASY TO USE
<br />RiskWaIch for Physical &
<br />Homeland SecurityBl is shipped
<br />overnight to your location and you
<br />can start your assessment the very
<br />next day!
<br />
<br />FREE TRAINING
<br />A two-day class for one person at
<br />Risk Watchj{; headquarters in
<br />Annapolis, Maryland is included
<br />at no cost with your software,
<br />You can also purchase onMline or
<br />on-site training.
<br />
<br />WRITES THE REPORT FOR
<br />YOU IN MOST WORD
<br />PROCESSING PROGRAMS
<br />RiskWatch for Physical &
<br />Homeland Security ™ writes a
<br />complete I OOMpage report that can
<br />be fully customized by the analyst.
<br />It includes a 3-page Executive
<br />
<br />Summary, a 17-page Technical
<br />Report, full definitions, a security
<br />requirements library, and a
<br />Project Plan/Data Collection kit.
<br />
<br />INCLUDES AUDIT TRAILS
<br />The report includes complete
<br />audit trails to validate your results
<br />and find out who answered every
<br />question and what their answers
<br />were.
<br />
<br />ADD PICTURES OR
<br />ORGANlZA TlONAL CHARTS
<br />QUICKL Y & EASIL Y
<br />
<br />
<br />; RISK
<br />hWATCH
<br />
<br />RiskWatch@develops the world's leading security risk assessment software. RiskWatch@ software
<br />meels all federal and audit standards for risk assessment. RiskWatch@c1ients include the US Department
<br />of Defense, the US Department of Justice, the National Research Council of Canada. the US Coast
<br />Guard, the National Security Agency, the Pentagon Force Protection Agency, state governments in all fifty
<br />states, as well as major private companies like AT&T, Pinkertons. PDVSA. Verizon and Vodafone.
<br />
<br />2004 Product Sheet RiskWatch@ Is a registered trademark of RlskWatch,lnc.
<br />
|