Contributed by:

Chris Hammond
Managing Director, Risk Advisory
Stuart Fischbeck
Senior Manager, Risk Advisory
Steve Ringhofer
Director

Organizations striving to safeguard their critical infrastructure and sensitive data face a relentless barrage of threats. To build a resilient defense against these threats, a multi-faceted approach is not just beneficial — it's necessary. Individually, services like site risk assessments, physical penetration testing, and Technical Surveillance Counter Measures (TSCM) each play a unique role in strengthening an organization's security posture. However, when these services are combined, they weave together an intricate security net that can catch vulnerabilities, liabilities, and potential breaches before they escalate into crises. 

The Singular Strength of Site Risk Assessments

A comprehensive site risk assessment is the first thread in a wide security net. It examines threats, vulnerabilities, and potential impacts on the business, considering factors such as business goals, regional threats, past events, and personnel. The assessment provides a holistic view of an organization's security risks, which is invaluable for informed decision-making. 

"A security risk assessment will let you know where there are existing security gaps, evaluate the potential impact of those gaps, and help you determine how to close those gaps, keeping in mind the maturity of your existing security," says Stuart Fischbeck, Pinkerton Senior Manager, Risk Advisory.

The maturity model for security is a framework that helps organizations assess the effectiveness of their security programs. The model outlines the progression of an organization's security measures from initial, ad hoc reactions to sophisticated, integrated strategies — proactive and agile in the face of new threats and technologies. 

Organizational security assessments play a pivotal role at every maturity level, helping businesses to identify their current position on this spectrum and to chart a course towards a more optimized security posture. 

“With risk assessments, we look at individual systems and aspects of security in the context of the site risk. We also look at how they’re working together and then ultimately, as a whole.” he said.

This process not only identifies where an organization is most vulnerable but also helps in prioritizing security investments. By pinpointing critical assets and high-risk areas, organizations can allocate resources more effectively, ensuring that their security measures are both efficient and cost-effective. 

Penetration Testing for Physical Security: The Diagnostic Tool

While risk assessments offer a broad view of potential security issues, physical penetration testing, also known as pen testing and red teaming, hones in on specific vulnerabilities. Pen tests simulate real-world attacks on physical locations to identify weaknesses that could be exploited by an adversary. This proactive approach provides invaluable insights into the current effectiveness of security protocols and personnel. 

A pen test is a two-phased undercover operation designed to evaluate the effectiveness of an organization's physical security controls. The first phase, reconnaissance, involves covertly gathering information about the site and observing security measures in place. This phase is crucial for planning a tailored approach that aligns with the client's specific security context. Once the reconnaissance is complete, the actual penetration attempts begin. This phase of the pen test is executed in a controlled manner.

“Our pen testers do a good job of finding things. They do their homework before getting on site. Whether it's making false badges or other collateral,” said Pinkerton Director Steve Ringhofer.  

By revealing how security measures perform under stress, pen tests offer a clear picture of how an organization's defenses might hold up during an actual breach. This insight is critical for reinforcing weak points and enhancing overall security.

The Convergence of Risk Assessments and Pen Tests

“When risk assessments and pen tests are combined, you almost always want to do the pen test first so that it's a blank slate for the pen tester and the site’s security personnel are not forewarned” said Fischbeck. “The pen tester does not see the procedures or the complete security layout that risk assessor sees. The pen tester gathers information that you could know about the site's security just through observation. Some of the organization’s security will be opaque to him.” 

The pen test reveals the effectiveness of multi-layer, integrated security systems, such as in data centers, by giving real evidence of how deeply an intruder could breach these defenses.  

Fischbeck explained, “We're trying to get into the interior of a facility and we’re challenging security as it exists as a complete, operational system.” 

A pen test is usually conducted several days prior to a site risk assessment to ensure that its findings are thoroughly documented in a report. This report is then handed over to the risk assessor, who delves deeper into the underlying causes of any vulnerabilities uncovered during the test. 

TSCM: Sensitive Information Protection 

TSCM services are the silent guardians of an organization's most sensitive information. They are specifically designed to detect and neutralize technical eavesdropping devices and vulnerabilities. This is especially important in areas where critical decisions are made, and sensitive information is exchanged, such as board rooms, executive offices, legal and trading floors, and onsite and offsite conference rooms.  

"With TSCM, often clients are not calling because they believe there's some type of unknown device present; they're calling because it's part of their sensitive data protection protocols," said Ringhofer, also the Director of Pinkerton’s TSCM Team for the U.S. and Canada.  

Other times, the need for TSCM arises from an impending sensitive event. Ideally, security enhancements like additional cameras, card readers, and locks should be considered and implemented well ahead of time, based on insights from risk assessments and penetration testing in alignment with the organization’s security maturity model. 

These proactive measures cannot always be swiftly enacted, such as right before an important meeting scheduled for the following week. Therefore, it's crucial that organizations plan their physical security improvements in advance, allowing TSCM to effectively complement the existing security infrastructure informed by prior assessments. 

“TSCM sweeps can find the hidden issues or potential vulnerabilities hidden in walls or within furniture,” said Ringhofer. “Anytime is a good time for a TSCM sweep.”  

By regularly incorporating TSCM into security protocols, organizations can shield their communications, keeping them private and secure and protecting them from espionage and information leaks. 

A Case for Executive Protection Security Assessments for High-level Personnel 

In light of recent events, organizations are reevaluating their approach to the protection of executives and key personnel, recognizing the need for a more integrated security strategy. 

Incorporating site risk assessments, penetration testing, and TSCM into executive protection (EP) is a natural progression that refines the overall approach to risk management, providing a more comprehensive safeguard for key personnel. Executive Security Assessments are extensive, covering everything from office security to personal residence protection, and are increasingly including TSCM to ensure the confidentiality of sensitive discussions related to intellectual property or strategic company moves. 

"It covers all aspects of what a company is doing for an executive," said Fischbeck. This integration exemplifies how Pinkerton's services adapt to the unique needs of each client, particularly when safeguarding key personnel and their critical conversations. 

Consistency and Connectivity in Global Risk Management 

When these services are integrated, they create a security net that is far more robust than the sum of its parts. A risk assessment may reveal a potential vulnerability, but without a penetration test, it's difficult to understand the practical implications of that weakness. Similarly, pen tests might identify security gaps, but without TSCM, an organization might still be exposed to information breaches. 

When it comes to proactive risk management strategies for critical infrastructure security, consistency and connectivity are key. Pinkerton has the experience, expertise, and global network to deliver uniform services, ensuring that clients receive the same high-quality assessments, whether they're in New York or San Francisco. 

"We have it set up so that we have a peer review process on the back end," Fischbeck explained, highlighting the meticulous approach to maintaining standards. The organization's coordinated efforts span across various locations and service lines, making the complex task of global risk management seem effortless.  

He adds, "We have the ability to do coordinated work for a client across the globe and have things come out relatively apples to apples."  

Ringhofer echoes this sentiment, emphasizing the project management level and the quality control that Pinkerton upholds across areas, “A Pinkerton team member, no matter where they are located, follows the same policies, processes, and procedures as all other Pinkerton team members to ensure the highest quality service whether the assignment is in New York, San Francisco, or anywhere else in the world.” 

The reports generated are designed for ease of use, with key findings and a prioritized recommendations table that clients can quickly refer to for high-impact issues. "Here's the high priority things that we think are most impactful and on down to the low priority items," Pinkerton Managing Director Chris Hammond notes, underscoring the client-focused approach. 

By understanding the vulnerabilities, the liabilities, and the actual breaches, organizations can create a proactive security net that not only detects and responds to threats but also anticipates and prevents them. 

Published April 07, 2025