Threat & Vulnerability Assessments
Paragon Service Group provides tailored Threat & Vulnerability Assessments (TVAs) designed to identify realistic risks and practical mitigation strategies for facilities responsible for people, property, and operations. Each assessment is carefully scoped to the specific environment, conducted with discretion and senior-level oversight, and focused on delivering clear, defensible findings that decision-makers can act on. Services may be performed independently or in support of broader security operations, ensuring a professional, adaptable approach without unnecessary disruption.
Overview
Paragon Service Group provides Threat & Vulnerability Assessments (TVAs) for organizations seeking to identify and reduce facility-based security risks while maintaining a safe, functional, and welcoming environment.
Assessments focus on environmental, procedural, and access-related vulnerabilities and are designed to support leadership, boards, and decision-makers with clear, defensible documentation and practical recommendations.
Assessments are conducted with senior-level oversight and informed by operational threat analysis and real-world experience.
Assessment Philosophy
Threat & Vulnerability Assessments are conducted using a disciplined, facility-focused methodology informed by operational law enforcement and threat analysis experience.
The focus is on identifying realistic vulnerabilities, evaluating risk in context, and recommending practical, proportionate mitigation measures that strengthen existing systems without unnecessary disruption.
Scope of Assessment
Each Threat & Vulnerability Assessment is tailored to the specific facility and operational environment and may include:
- Interior and exterior facility walkthrough
- Perimeter, access control, and circulation review
- Identification of environmental and procedural vulnerabilities
- Photo documentation supporting observed findings
- Aerial imagery (drone photography) where appropriate and lawful
- Written assessment report
- Prioritized mitigation and improvement recommendations
- Post-assessment briefing with organizational leadership
Final scope is defined prior to engagement and documented in writing.
Professional Background
Threat & Vulnerability Assessments are informed by the following experience:
- Certified Threat Liaison Officer (TLO) through the Arizona Counter Terrorism Information Center (ACTIC)
- 11 years of law enforcement experience including patrol, narcotics, and SWAT
- Former Sergeant of the first Threat Liaison Officer squad in Northern Arizona
- Responsible for selection and coordination of threat-related training
- SWAT Team Leader experience including threat analysis, mitigation planning, and mission coordination
Appropriate Uses
Threat & Vulnerability Assessments may be appropriate for:
- Organizations seeking documentation of due diligence
- Churches and faith-based organizations
- Schools and educational facilities
- Non-profits and community organizations
- Commercial and professional facilities
- Leadership teams evaluating security improvements or risk exposure
Scope Boundaries
To ensure clarity and appropriate engagement boundaries, Threat & Vulnerability Assessments do not include:
- Investigations of specific individuals
- Background checks
- Intelligence collection on named persons
- Surveillance or monitoring services
- Guarantees of prevention or outcomes
- Implementation of security measures unless separately contracted
Assessments are facility- and process-focused, not investigative in nature.
Engagement Process
Threat & Vulnerability Assessments are scoped individually and conducted on a project-specific basis.
Organizations interested in an assessment may begin by completing a brief intake questionnaire to determine suitability and scope. Following review, a fixed-fee proposal is provided outlining deliverables and engagement boundaries.
For additional information or to request an assessment, please contact Paragon Service Group directly.
Frequently Asked Questions
How is this different from a standard security walkthrough?
The result is a defensible assessment with prioritized recommendations, rather than a general list of observations.
Do you provide guarantees or certifications?
No.
Threat & Vulnerability Assessments are professional risk evaluations based on observed conditions and available information at the time of assessment. No assessment can guarantee prevention or certify a facility as “secure.”
Organizations typically engage in a TVA to support informed decision-making, demonstrate due diligence, and guide reasonable mitigation planning.
Is this assessment investigative in nature?
No.
Threat & Vulnerability Assessments are facility- and process-focused and do not involve investigations of individuals, background checks, or intelligence collection on named persons.
This boundary is intentional and ensures assessments remain advisory, objective, and appropriately scoped.
How long does a Threat & Vulnerability Assessment take?
Most assessments involve a single on-site visit followed by off-site analysis and report preparation.
Timelines vary based on facility size, complexity, and defined scope, and are established prior to engagement.
What is the assessment process?
The Threat & Vulnerability Assessment process is structured and engagement-based.
The process typically includes an initial online intake questionnaire, followed by a preliminary discussion or interview when appropriate. An on-site facility assessment is then conducted, after which findings are analyzed and documented in a written report.
Do assessments include photos or aerial imagery?
Photo documentation is commonly used to support observed findings and recommendations within the written report.
Aerial imagery, including drone photography, may be utilized where appropriate and lawful to evaluate exterior conditions, access points, or perimeter-related considerations. The use of imagery is determined by scope and site conditions and is not the focus of the assessment.
Threat & Vulnerability Assessments are conducted on a limited, engagement-based basis.
Disclaimer:
Threat & Vulnerability Assessments identify potential risks and vulnerabilities based on observed conditions, interviews, and available information at the time of assessment. No assessment can guarantee the prevention of criminal, hostile, or unlawful acts. Findings and recommendations are advisory in nature and intended to support informed decision-making.
