Security Consulting + Threat Assessments

Contact Us

We provide the following consulting solutions:

  • Behavioral threat assessments
  • Violence risk assessments
  • Threat, risk, and vulnerability assessments
  • Feasibility studies, program audits and assessments
  • Comprehensive low voltage technology assessments
  • Master plan program and budget review and development
  • Business case and best practices
  • Security and fire alarm surveys and program development
  • Liaison to code authorities and UL
  • Operational effectiveness and cost control
  • Software evaluation and implementation
  • Staff and organizational assessments
  • Development of protocols, policies, and procedures
  • Managed services
  • Onsite security support services

Managing and Mitigating Threats

Threat, Vulnerability, + Risk Assessments

Our solutions protect lives, assets, and reputations, and our team provides advice, selection, implementation, and oversight of physical security and life safety systems. Our security program reviews focus on security measures (both physical and behavioral), security technology, and operational policies and procedures, supported by a risk assessment process. Our team includes ASIS International certified security professionals (CPP®, PSP®, PCI®), security technology experts and project managers, risk managers, critical infrastructure experts, and emergency management experts. We have assisted on preparation for potential high-risk security events, active threat situations, and post-event investigations and mitigation for critical infrastructure projects.

Our Threat Vulnerability and Risk Assessments provide a comprehensive evaluation of your organization’s security landscape, including threat identification and analysis, vulnerability assessment, risk management, gap analysis studies, and physical site assessments. Our team gathers information from stakeholders about the current security policies, systems, and any perceived gaps to understand the existing environment and identify areas for improvement. This process will inform the development of a “Basis of Design” for future updates, including security standards and integration needs.

Following the on-site assessment, our team will compile a detailed report that includes observations and recommendations for both the current and future states of the security system. This report typically includes all aspects of physical, electronic, and operational security, providing a clear action plan for enhancing your organization’s security posture.

Behavioral Threat Assessments

Guidepost offers specialized Behavioral Threat Assessment and Management (BTAM) services, backed by recent experience and a history of successful performance. Our team members have undergone extensive training and possess unique expertise in BTAM, drawing from diverse professional backgrounds, including U.S. military, federal and local law enforcement, corporate security, counterterrorism, emergency and crisis management, human resources, and more.

Much like a multidisciplinary Threat Assessment Team (TAT), our professionals bring varied perspectives to cases involving violence risk assessment and threat management. Guidepost’s team members are active in leading security associations such as ASIS International, Security Industry Association (SIA), and the Association of Threat Assessment Professionals (ATAP), where they have held leadership positions and contributed to the development of professional standards. Additionally, our team is supported by partners with advanced degrees in fields such as forensic psychiatry, forensic psychology, and clinical psychology, many of whom have served in leadership roles within the FBI Behavioral Analysis Unit and other specialized organizations.

Our BTAM process includes a comprehensive violence risk assessment to identify potential threats, followed by tailored onsite protection support to ensure immediate safety. We also offer specialized threat assessment training to equip your team with the skills needed to recognize and manage risks effectively, creating a proactive and secure environment.

Stay ahead of security challenges with tailored threat assessments that empower your organization to prevent and respond effectively. Discover how our integrated solutions can safeguard your people, assets, and reputation—schedule your consultation today!

Related Resources

March 19, 2025

Top Security Challenges Facing Data Centers in 2025 and Beyond

Continue Reading
March 12, 2025

Understanding Drone Security: Navigating U.S. Airspace Regulations and Defense Strategies

Continue Reading
December 11, 2024

Safeguarding Corporate Leadership: 5 Proactive Measures for Executive Security

Continue Reading
unfocused picture of people walking through a professional event
April 1, 2025

ISC West

ISC West

Continue Reading
a blurry picture of a convention with a blue floor
September 10, 2024

2024 Data Center Security Summit

2024 Data Center Security Summit

Continue Reading
a coffee cup sits on a saucer in front of a group of people
June 19, 2024

Executive Security Operations Conference

Executive Security Operations Conference

Continue Reading
an open magazine
January 10, 2025

ABC 7 News Washington

Capitol security heightened after two men arrested in separate threatening incidents

Continue Reading
a stack of folded newspapers
December 16, 2024

ASIS International

Security Professionals Grapple with Criticism, Board Mandates, and Public Anger in the Wake of Targeted CEO Attack

Continue Reading
a cartoon newspaper
December 12, 2024

USA Today

Insurers beef up security after UnitedHealthcare CEO Brian Thompson’s killing

Continue Reading
a close up of a microphone in front of a laptop
September 12, 2024

Simmons & Simmons

Data Centre Security with Terry King

Listen to Podcast
a close up of a microphone with a sound wave behind it
December 13, 2022

Guidepost in Motion: Privacy Matters Part 2: “TMI”-The Privacy Dilemma of Social Media

Listen to Podcast
a close up of a microphone with a sound wave behind it
November 29, 2022

Guidepost in Motion: Privacy Matters Part 1: Privacy vs. Convenience

Listen to Podcast
a woman stands at a podium with a microphone in front of her
July 15, 2024

Guidepost Solutions Promotes Terry King to Vice President, Security and Technology Consulting, Operations

Continue Reading
SBC hotline
Oakland County AAR
MAGELLAN Monitorship