Security Risk &
Threat Analysis

Priority scenarios, defensible risk positions, and design implications your team can act on, grounded in our proprietary databases and structured analytical methods.

What a decision-ready threat assessment delivers

The difference between a risk register that sits on a shelf and one that drives design decisions comes down to how it's built.

  • Priority scenarios, not generic threat lists

    Credible attack scenarios developed from our proprietary terrorism database and structured analytical techniques. Each scenario is assessed for likelihood and consequence using HB167-aligned methods.

  • Quantified risk positions that prevent disproportionate expenditure

    We use probabilistic methods and quantified risk analysis to test whether proposed security treatments are proportionate to the actual threat. When assumed threats don't withstand structured analysis, we build the evidence to challenge them, protecting clients from expenditure the risk evidence doesn't justify. Every assessment makes assumptions explicit. Where we have evidence, we cite it. Where we're applying professional judgement, we say so.

  • Design implications written for design teams

    Risk outputs translated into spatial, operational, and engineering implications: setbacks, sightlines, access control zones, structural requirements. Every risk finding has a traceable path to a design decision.

  • A threat basis that reflects the current environment

    Assessment grounded in current threat intelligence, structured open-source analysis, and comprehensive demographic and crime data. We integrate crime statistics, ABS demographic profiles, and SEIFA indices alongside national threat advisories, building a threat context specific to your site, not a generic national picture.

How we work

We begin with what you need to protect and why. Our analysts assess the threat environment, characterise vulnerabilities, and produce risk positions that inform design briefs, operational planning, and assurance. Every assessment is structured so assumptions are explicit, evidence is traceable, and professional judgement is clearly labelled. The output is a working instrument — not a static report filed away.

For: Project directors, risk owners, government security executives, and design teams who need a threat-informed basis for security investment and design decisions.

Need a threat-informed risk position for your project?

We scope assessments to match your project stage, timeline, and governance requirements.