SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
LJT & Associates, Inc.




    Physical Security Consulting Services
    LJT & Associates, Inc. provides a comprehensive array of Physical Security Consulting services that help our clients
    identify and resolve threats and vulnerabilities against their facilities. Furthermore, LJT enables our clients to make
    informed and educated decisions and plans of action based on accurate, reliable information.

    Our Physical Security Consulting Services include:

             •Risk Analysis Vulnerability Assessments (RAVA)
             •Force Protection Engineering Studies
             •Entry Control Point Studies
             •Antiterrorism Workshops
             •Blast Analysis Studies
             •Planning, Training and Documentation




    Risk Analysis Vulnerability Assessments (RAVA)
    Performing a RAVA quantitatively measures the vulnerabilities and risks associated with specific assets targeted by
    specific threats. The vulnerability analysis will produce the baseline (existing) and optimized (potential) vulnerability
    ratings. The analysis includes recommendations of innovative security countermeasures to mitigate those vulnerabilities.
    LJT then develops options and alternatives to mitigate and reduce identified vulnerabilities and risks, identified via the
    RAVA. Potential countermeasures include but are not limited to:

             •Procedural modification
             •Policy changes
             •Physical security
             •Electronic security
             •Site layout changes (roads, fences, entry points, etc)

    Force Protection Engineering Studies
    An Engineering Study includes a site visit, analysis of collected data, compilation of comprehensive cost estimates, and
    generation of a single detailed report. In addition, conceptual plans are drawn to scale in AutoCAD format for each
    building identified will be produced and included in the report.

    Entry Control Point Studies
    LJT provides studies to help clients identify conceptual layouts associated with vehicle and pedestrian entry points. On-
    site assessments are performed at entry points where pedestrian and mobile terrorists may pose a threat at a given site. At
    each control point, significant local data are collected including, but not limited to the following: standoff distance,
    security policies and procedures, communication and monitoring methods, lighting for nighttime operations, manned
    patrols, traffic counts, vehicle types, vehicle and pedestrian inspections and access, line-of-sight, existing and natural
    barriers. These data are then analyzed and compiled to derive preliminary entry point design recommendations, based on
    the threat potential for each control point.

     LJT & Associates, Inc.
     512 Herndon Parkway
     Herndon, VA 20171
     Tel: (703) 481-3000 x12
      http://www.ljtinc.com /   Copyright © 1994-2006 LJT & Associates, Inc. All rights reserved.
LJT & Associates, Inc.
LJT & Associates, Inc.




       Physical Security Consulting Services

        Antiterrorism Workshops
        LJT delivers Antiterrorism Workshops worldwide using government developed and controlled curriculum. These
        workshops have been developed specifically for managers, designers, planners, and security staff involved with new
        or retrofit construction projects who are asked to provide protection of facilities against the threat of terrorism. To
        accomplish this task, the individuals must have a fundamental understanding of physical security requirements for
        antiterrorism and force protection and how to apply them to the security design of a facility. These workshops
        provide an overview of security fundamentals, existing hardware, and a review of Federal ATFP (Anti Terrorism
        and Force Protection) construction standards to include the DoD Anti Terrorism and Force Protection Minimum
        Construction Standards.

        Blast Analysis Studies
        LJT has experience performing Blast Analysis Studies, because as important as mitigating the risk of a terrorist
        attack is understanding what effect a successful attack might have on facilities, mechanical equipment, and people.
        LJT’s Blast Analysis Studies help our clients understand the potential effects of an explosion in a particular location,
        and show them how to mitigate those effects through the implementation of structural improvements and best
        practices.

        Planning, Training and Documentation
        LJT assists our clients in the development of ATFP and physical security methodologies and criteria including
        design manuals, user guides, unified facilities criteria, and regulatory documentation. Once developed, we facilitate
        the dissemination of critical methodologies and information through customized training classes and workshops.

        Federal clients can easily access LJT services by using one of several contract vehicles. LJT & Associates, Inc. is a
        SBA Certified 8(a) Small Disadvantaged Business. This certification allows for simplified contracting and enables
        federal organizations to fulfill their Small Business requirements.

        LJT’s relationships with key ATFP firms and other service providers enable us to provide the appropriate resources
        to accomplish any ATFP related project.

        For example, in December of 2003 LJT-ATFP, LLC, a Joint Venture spearheaded by LJT & Associates, Inc., was
        awarded a contract by the Naval Facilities Engineering Command Contracts Office to provide Antiterrorism and
        Force protection Engineering Services for the Naval Facilities Engineering Service Center (NFESC), Port Hueneme,
        CA. The Joint Venture is comprised of LJT & Associates, Inc., ACTA, Inc., Karagozian & Case, Inc. and The
        Systech Group, Inc. The team also includes sub-contractors General Physics and Battelle (Memorial Institute).




        LJT & Associates, Inc.
        512 Herndon Parkway
        Herndon, VA 20171
        Tel: (703) 481-3000 x12
         http://www.ljtinc.com /   Copyright © 1994-2006 LJT & Associates, Inc. All rights reserved.

Más contenido relacionado

La actualidad más candente

Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011Atlantic Security Conference
 
Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Peter Smith
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPace IT at Edmonds Community College
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...360 BSI
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkChaitanya Bhatt
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPace IT at Edmonds Community College
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...Dell EMC World
 

La actualidad más candente (11)

Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report
 
Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
 
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response ConceptsPACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
Information Security
Information SecurityInformation Security
Information Security
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
 
Using trust-aware strategic agents for a self-organising computing grid
Using trust-aware strategic agents for a self-organising computing gridUsing trust-aware strategic agents for a self-organising computing grid
Using trust-aware strategic agents for a self-organising computing grid
 

Destacado

Shared services canada says it’s modernizing government, saving millions of d...
Shared services canada says it’s modernizing government, saving millions of d...Shared services canada says it’s modernizing government, saving millions of d...
Shared services canada says it’s modernizing government, saving millions of d...KBIZEAU
 
Анонс семинара 27 марта
Анонс семинара 27 мартаАнонс семинара 27 марта
Анонс семинара 27 мартаAlexey Zotov
 
Sociview press-release
Sociview press-releaseSociview press-release
Sociview press-releaseVolume Ltd
 
Building Information Modeling
Building Information ModelingBuilding Information Modeling
Building Information Modelingkongphooey
 
Digital Orthophotography Production
Digital Orthophotography ProductionDigital Orthophotography Production
Digital Orthophotography Productionkongphooey
 
Supplier Mentoring Program Checklist
Supplier Mentoring Program ChecklistSupplier Mentoring Program Checklist
Supplier Mentoring Program ChecklistLockheed-Martin
 
ABC_Supplier_CoC
ABC_Supplier_CoCABC_Supplier_CoC
ABC_Supplier_CoCAaron Mock
 

Destacado (7)

Shared services canada says it’s modernizing government, saving millions of d...
Shared services canada says it’s modernizing government, saving millions of d...Shared services canada says it’s modernizing government, saving millions of d...
Shared services canada says it’s modernizing government, saving millions of d...
 
Анонс семинара 27 марта
Анонс семинара 27 мартаАнонс семинара 27 марта
Анонс семинара 27 марта
 
Sociview press-release
Sociview press-releaseSociview press-release
Sociview press-release
 
Building Information Modeling
Building Information ModelingBuilding Information Modeling
Building Information Modeling
 
Digital Orthophotography Production
Digital Orthophotography ProductionDigital Orthophotography Production
Digital Orthophotography Production
 
Supplier Mentoring Program Checklist
Supplier Mentoring Program ChecklistSupplier Mentoring Program Checklist
Supplier Mentoring Program Checklist
 
ABC_Supplier_CoC
ABC_Supplier_CoCABC_Supplier_CoC
ABC_Supplier_CoC
 

Similar a Physical Security Consulting Services

A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudJeff Nelson
 
Mejores practicas en proyectos
Mejores practicas en proyectosMejores practicas en proyectos
Mejores practicas en proyectosLisbethRoosRoos
 
SHAQUITA MONTGOMERY 3Resume.docx
SHAQUITA MONTGOMERY 3Resume.docxSHAQUITA MONTGOMERY 3Resume.docx
SHAQUITA MONTGOMERY 3Resume.docxsmontgomery84
 
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber HuntHighly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber HuntDavid Sweigert
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureDavid Sweigert
 
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion CenterInformation Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion CenterNCI Information Systems, Reston, VA.
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiLindsey Landolfi
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
lee nov -2o16 resume copy.docx 2
lee nov -2o16 resume copy.docx 2lee nov -2o16 resume copy.docx 2
lee nov -2o16 resume copy.docx 2Lee-el Harding
 
Cybersecurity Discipline
Cybersecurity DisciplineCybersecurity Discipline
Cybersecurity DisciplineMark Stockman
 

Similar a Physical Security Consulting Services (20)

SSBRadley Resume_June2015
SSBRadley Resume_June2015SSBRadley Resume_June2015
SSBRadley Resume_June2015
 
Dossier 2008 V3
Dossier 2008 V3Dossier 2008 V3
Dossier 2008 V3
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
Mejores practicas en proyectos
Mejores practicas en proyectosMejores practicas en proyectos
Mejores practicas en proyectos
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Resume jan2016
Resume jan2016Resume jan2016
Resume jan2016
 
SHAQUITA MONTGOMERY 3Resume.docx
SHAQUITA MONTGOMERY 3Resume.docxSHAQUITA MONTGOMERY 3Resume.docx
SHAQUITA MONTGOMERY 3Resume.docx
 
Tgs capabilities brief
Tgs capabilities briefTgs capabilities brief
Tgs capabilities brief
 
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber HuntHighly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
 
Resume MAR2016
Resume MAR2016Resume MAR2016
Resume MAR2016
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion CenterInformation Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
 
Web Application Security.pdf
Web Application Security.pdfWeb Application Security.pdf
Web Application Security.pdf
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security Initiativesi
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
lee nov -2o16 resume copy.docx 2
lee nov -2o16 resume copy.docx 2lee nov -2o16 resume copy.docx 2
lee nov -2o16 resume copy.docx 2
 
Cybersecurity Discipline
Cybersecurity DisciplineCybersecurity Discipline
Cybersecurity Discipline
 
Ssdf nist
Ssdf nistSsdf nist
Ssdf nist
 

Physical Security Consulting Services

  • 1. LJT & Associates, Inc. Physical Security Consulting Services LJT & Associates, Inc. provides a comprehensive array of Physical Security Consulting services that help our clients identify and resolve threats and vulnerabilities against their facilities. Furthermore, LJT enables our clients to make informed and educated decisions and plans of action based on accurate, reliable information. Our Physical Security Consulting Services include: •Risk Analysis Vulnerability Assessments (RAVA) •Force Protection Engineering Studies •Entry Control Point Studies •Antiterrorism Workshops •Blast Analysis Studies •Planning, Training and Documentation Risk Analysis Vulnerability Assessments (RAVA) Performing a RAVA quantitatively measures the vulnerabilities and risks associated with specific assets targeted by specific threats. The vulnerability analysis will produce the baseline (existing) and optimized (potential) vulnerability ratings. The analysis includes recommendations of innovative security countermeasures to mitigate those vulnerabilities. LJT then develops options and alternatives to mitigate and reduce identified vulnerabilities and risks, identified via the RAVA. Potential countermeasures include but are not limited to: •Procedural modification •Policy changes •Physical security •Electronic security •Site layout changes (roads, fences, entry points, etc) Force Protection Engineering Studies An Engineering Study includes a site visit, analysis of collected data, compilation of comprehensive cost estimates, and generation of a single detailed report. In addition, conceptual plans are drawn to scale in AutoCAD format for each building identified will be produced and included in the report. Entry Control Point Studies LJT provides studies to help clients identify conceptual layouts associated with vehicle and pedestrian entry points. On- site assessments are performed at entry points where pedestrian and mobile terrorists may pose a threat at a given site. At each control point, significant local data are collected including, but not limited to the following: standoff distance, security policies and procedures, communication and monitoring methods, lighting for nighttime operations, manned patrols, traffic counts, vehicle types, vehicle and pedestrian inspections and access, line-of-sight, existing and natural barriers. These data are then analyzed and compiled to derive preliminary entry point design recommendations, based on the threat potential for each control point. LJT & Associates, Inc. 512 Herndon Parkway Herndon, VA 20171 Tel: (703) 481-3000 x12 http://www.ljtinc.com / Copyright © 1994-2006 LJT & Associates, Inc. All rights reserved.
  • 2. LJT & Associates, Inc. LJT & Associates, Inc. Physical Security Consulting Services Antiterrorism Workshops LJT delivers Antiterrorism Workshops worldwide using government developed and controlled curriculum. These workshops have been developed specifically for managers, designers, planners, and security staff involved with new or retrofit construction projects who are asked to provide protection of facilities against the threat of terrorism. To accomplish this task, the individuals must have a fundamental understanding of physical security requirements for antiterrorism and force protection and how to apply them to the security design of a facility. These workshops provide an overview of security fundamentals, existing hardware, and a review of Federal ATFP (Anti Terrorism and Force Protection) construction standards to include the DoD Anti Terrorism and Force Protection Minimum Construction Standards. Blast Analysis Studies LJT has experience performing Blast Analysis Studies, because as important as mitigating the risk of a terrorist attack is understanding what effect a successful attack might have on facilities, mechanical equipment, and people. LJT’s Blast Analysis Studies help our clients understand the potential effects of an explosion in a particular location, and show them how to mitigate those effects through the implementation of structural improvements and best practices. Planning, Training and Documentation LJT assists our clients in the development of ATFP and physical security methodologies and criteria including design manuals, user guides, unified facilities criteria, and regulatory documentation. Once developed, we facilitate the dissemination of critical methodologies and information through customized training classes and workshops. Federal clients can easily access LJT services by using one of several contract vehicles. LJT & Associates, Inc. is a SBA Certified 8(a) Small Disadvantaged Business. This certification allows for simplified contracting and enables federal organizations to fulfill their Small Business requirements. LJT’s relationships with key ATFP firms and other service providers enable us to provide the appropriate resources to accomplish any ATFP related project. For example, in December of 2003 LJT-ATFP, LLC, a Joint Venture spearheaded by LJT & Associates, Inc., was awarded a contract by the Naval Facilities Engineering Command Contracts Office to provide Antiterrorism and Force protection Engineering Services for the Naval Facilities Engineering Service Center (NFESC), Port Hueneme, CA. The Joint Venture is comprised of LJT & Associates, Inc., ACTA, Inc., Karagozian & Case, Inc. and The Systech Group, Inc. The team also includes sub-contractors General Physics and Battelle (Memorial Institute). LJT & Associates, Inc. 512 Herndon Parkway Herndon, VA 20171 Tel: (703) 481-3000 x12 http://www.ljtinc.com / Copyright © 1994-2006 LJT & Associates, Inc. All rights reserved.