G4S introduces Risk Management Model aimed at minimizing security threats

G4S, a leading integrated security company, has introduced a risk-based, data-driven model to oversee enterprise security management. The G4S Security Risk Management Model helps businesses learn how to mitigate risk through a suite of software tools developed in partnership with industry experts and Georgia State University’s Center for Process Innovation, according to an announcement.

To build this tool, G4S went outside the security industry and worked with an academic partner, the Georgia State University Center for Process Innovation, to help them look at the issue from a completely new perspective. Using an effects-based design planning method, G4S developed a comprehensive, consistent, and easy-to-use model that takes security risk management to a whole new level, the company states. Through analyzing a customer’s risks and evaluating their resources, G4S and its related business units work together to deliver a resolution with proven methodology, backed by expertise, experience and research.

“Our Security Risk Management Model uses research-backed tools, combined with our highly trained Risk Management team, to deliver a customized security program that helps our clients prevent, contain and recover from risk,” says John Kenning, regional CEO, G4S Americas. “We help our clients determine what their risks are and where to focus more resources to improve security.”

Security risk management is the backbone of a security program. It provides a holistic approach to optimizing an entire security program, helping to identify obstacles to security risk issues, while providing insights into the potential return on investment. The G4S risk-based approach through the Security Risk Management Model is said to minimize threats by addressing risks in proportion to their size and complexity. G4S states it works with clients to determine every resource they want to protect, the potential risks to these resources, and possible resolutions to mitigate the risks. After completing the assessment, clients can choose the level of service that fits their organization’s security risk management needs.