Rising Threat Assessment
Assessing the Threat Environment
The goal of a threat assessment is to identify the probability of an damaging event.
We use a set of 6 standard parameters that are ranked and weighted.
Clients add three custom parameters, relevant to their industry or geolocation.
We do the analysis and present the potential threats.

Economic Trends
Economic stability is built around specific regions or industries. Median income, unemployment, investment in business development, supply chain stability and population migration.
Operational Capacity
Sustainability is dependent on responding quickly in an emergency. An evaluation of the capacity to restore critical systems to maintain operations.
Extremism
Identify extremist groups and evaluate their activities in the area. Anti-government groups, armed militias, and groups guided by hatred for a certain religion, race, or sexual orientation
Public Health Capacity
The ability to respond to a public health crisis, a natural or man-made disaster has a huge financial impact on local government, businesses and communities.
Extreme Weather
Extreme weather events have cost the U.S. more than $1 trillion in damages between 2015 and 2022. Storms are stronger, temperatures drop lower, droughts are more intense, and wildfires more frequent.
Terrorism
Identify potential targets within a specific radius for domestic or state-sponsored terrorist attacks. Consider physical attacks on critical infrastructure and remote cyber attacks.
Client adds an additional three parameters. We determine a ranking and incorporate them into the final deliverable.
Risk Mitigation
On completion of the threat assessment, the logical next step is to mitigate the risk of the most probable or problematic threats. We work with clients to brainstorm solutions. Once the path is set, we do a cost analysis, check for liabilities and set a timeline. If needed we can manage the project from beginning to end.
Situational Awareness
A series of facilitated workshops based on role. Security officers do a facilitated walk thru to evaluate the property from the perspective of a criminal. Employees are trained to recognize suspicious behavior and where to report it. Policies and procedures are examined.
We handle the workshop walk-thru and facilitate the discussion. Training is done on-site or online. We create or update all necessary documentation and manage the maintenance cycle.
Emergency Preparedness
Complacency is the biggest obstacle to preparedness. Emergency plans are years out of date. Escape routes are untested. Training isn’t taken seriously. There is little or no preparation for a cyber attack or a power outage that takes down the internet.
We assess the company’s vulnerabilities and help to fortify them, containing the damage to operations and revenue. We conduct simulations – cyber and on site protocols. Training and documentation reduces potential liabilities.
AI Security Advantage
Onsite Security
- Real-time intelligence from start to finish
- Alerts on a shooter outside a building as soon as a gun is drawn
- Cameras are proactive and preventative instead of passive
- Reduces response time from minutes to seconds
- Works with existing modern camera systems
- Helps bridge the hiring gap for SROs and security professionals.
Protecting people and property in k-12 schools, hospitals, colleges, malls, utilities and places of worship.
CERTIFIED PARTNER

Training Catalog
- Critical Thinking
- Situational Awareness
- Predictive Analytics
- Active Shooter
- Preventing Cyber Crime

Threat Assessment Teams
- Identify specific threat parameters
- Incorporate external factors
- Build probability matrix
- Prioritize potential incidents
- Create response plan

Documentation
- Documentation Management
- Emergency Plans
- Policies and Procedures
- Risk Mitigation Plan
- Paper Protocols
Let’s Talk

About | Contact | NAIC Codes | Services | Blog | 919-741-0961
© 2022 Foxhole Consulting LLC All Rights Reserved 921 E Broad Street, #1027 Fuquay Varina, NC 27526