We asked a recently introduced artificial intelligence service to tell us about threat assessments and the value of threat assessments. While the narrative left room for improvement, most of the points made were right on the money.

Here is what the AI technology told us:

A threat assessment is a process that helps organizations investigate, identify, assess, and mitigate threats to their assets. It can be used to protect a wide range of assets, including physical property, data, and people.

The value of a threat assessment is that it can help organizations to:

  • Identify and assess potential threats.
  • Investigate threats that have occurred.
  • Develop and implement mitigation strategies.
  • Reduce the risk of a future attack.
  • Improve [an organization’s] overall security posture.

A threat assessment can be conducted by various people, including security professionals, risk managers, and administrators. However, it is best performed by: 

Security professionals: Security professionals are often best trained to conduct threat assessments, investigate attacks that have already occurred, and identify and assess threats to an organization or individual.

Law enforcement: Law enforcement can conduct threat assessments to investigate potential threats to public safety.

Mental health professionals: Mental health professionals can conduct threat assessments to identify individuals at risk of harming themselves or others.

The process typically involves the following steps:

  1. Gathering information. The first step is to gather as much information as possible about an incident or potential threats to an organization’s assets. This information can be gathered from various sources, including security reports, industry publications, and open-source intelligence. (Note: this point needs to be expanded upon.)
  2. Analyzing the information. Once the information has been gathered, it must be analyzed to identify the most likely and severe threats. This analysis should consider the following factors: The likelihood of a threat occurring; The impact of a successful attack.  The cost of implementing and not implementing mitigation measures.
  3. Developing mitigation strategies. Once the most serious threats have been identified, mitigation strategies must be developed. These strategies should be designed to reduce the likelihood and impact of a successful attack.
  4. Monitoring and evaluating. The last step is to monitor and evaluate the effectiveness of the mitigation strategies. This will help ensure that the organization is adequately protected from threats now and into the future.

Here are some additional benefits of threat assessments:

  • It can help to identify and address gaps in security.
  • It can improve collaboration between different departments within an organization.
  • It can build trust with employees and the public.
  • It can reduce the cost of insurance premiums.

Finally, if you are considering conducting a threat assessment, there are a few more things you should keep in mind:

  • The process should be comprehensive.
  • A qualified professional should conduct it.
  • The results of the assessment should be communicated to all relevant stakeholders.

A threat assessment is an integral part of any organization’s security program. By following the steps outlined above, you can help ensure your organization is adequately protected from threats.

As always, we value your feedback, which helps us shape our perspective on recent events, security, and the services we offer.

 Stay safe,

Oscar Villanueva
Chief Operating Officer
TAL Global
O: 1-408-993-1300

threat assesment

© TAL Global, 2019