In your Part B submission, you will use the Risk Assessment template that you created in Part A to evaluate the threats and associated vulnerabilities/weaknesses and potential consequences you uncovered while conducting your assessment of the existing security measures. Make any adjustments to the language and other areas that are needed to ensure you maintain a security focus. You will use this and any other appropriate information available to conduct your calculations for the existing overall Risk associated with the key assets in your location (the employees, the facility/building, product, trade secrets, etc.)
Your Risk Assessment Scores will then be used to identify the four major threats (those individual threats with the highest Risk Scores). In determining potential threats to evaluate you may find it beneficial to examine historical events that have negatively impacted assets at your facility or similar locations. You should also consider information or intelligence you may have received regarding potential threat to the location/facility you are evaluating. After identifying your greatest threats, you will then discuss recommended security measures or improvements that will minimize and/or mitigate the associated risk to your assets that are associated with each of these threats