Orange County NC Website
<br /> <br />P a g e 16 <br /> <br /> <br />Orange County <br />Facilities Security Assessment <br />RFP#: 367-OC 5403 <br />CTCH Security Business Consulting – www.ctchconsulting.com <br /> <br />the decentralized sites. The kickoff meetings would occur through the use of tele/video <br />conferencing with OC stakeholders. <br /> <br />Incident Report Evaluations: In preparation for the on-site assessments, the team <br />will gather tactical threat data, inherent threat data and security incident reports in order <br />to create a preliminary threat assessment for each site. The threat assessment will <br />identify tactical and inherent threats that are associated with each site based on services, <br />locality and past incidents; which will be used to support the cost-benefit evaluations for <br />recommended security measures. Tactical threats that will be evaluated are those <br />threats that exist within a one-mile radius of each site. Inherent threats are those <br />threats that are based on the nature of business associated with each site. <br /> <br /> Threat/Crime/Incident Report data will be obtained by working with OC <br />stakeholders to obtain data that spans over the last three-years. The team would <br />request copies of all incident reports (and supporting documents) that are related to <br />each site under review in an effort to identify site specific security issues. The team will <br />be able to use this data to identify any vulnerabilities that may exist within current <br />policies and procedures, to identify existing vulnerabilities within the stakeholder’s <br />security postures during the on-site assessments and to evaluate the <br />infrequent/seasonal affects that site services have on each site. Most importantly, this <br />data will immediately identify sites that are plagued with higher security risks/threats. <br /> <br />Security Policy, Procedure, Training and Operations Review: In an effort to gain an <br />initial understanding of the current CPTED posture, the team will request electronic <br />copies of OC current Security Management Plans, Comprehensive Emergency <br />Management (CEM) Plans and Security Standard Operating Procedures/Quick Reaction <br />Checklists. By evaluating these documents, the team will be able to identify the policies <br />and procedures that are in place and how these policies and procedures support/hinder <br />the security operations at each site. CEM plans are an integral part of organizational <br />training goals. If CEM plans are non-existent or out of date OC could be exposed to <br />high level of security risks due to its operating environments/nature of business. By <br />evaluating the CEM plans, the team will be able to identify how security incidents are <br />addressed and how frequently these CEM plans should be tested/updated; based on <br />each sites risk exposure. <br /> <br />To identify OC’s current Security Training Goals, the team would request copies <br />of the current Security Training Plans. By evaluating the current Security Training Plans, <br />the team will be able to measure the personnel competency levels required under the <br /> <br />DocuSign Envelope ID: CCAAE303-70FA-49DE-B23A-944301EA0EEB