Site update: We are actively building and expanding this site. Some pages may be incomplete. For training, tools, or calendar questions, email bruce@c-stad.com.

What the assessment covers

  • Perimeter conditions, access control, and entry points
  • Visitor management and front-of-house practices
  • Staff routines, workarounds, and informal behaviors
  • Policy-to-practice gaps and compliance friction
  • Human factors and authorized compliance testing
  • Escalation and breach logic aligned with PTIV

Why this matters

Most physical security failures are not equipment failures. They are routine and behavior failures: propped doors, inconsistent visitor controls, tailgating, unclear expectations, and policy-to-practice gaps.

  • Find exploitable patterns before an adversary does
  • Reduce liability with documented due diligence
  • Improve staff clarity and confidence

What you receive

  • Executive summary and prioritized findings
  • Risk-ranked recommendations (quick wins to longer-term projects)
  • Photo-based observations (where permitted)
  • Policy-to-practice gap notes and training opportunities
  • Implementation roadmap with owners and timelines

How engagement works

  • Pre-visit intake call (scope, priorities, constraints)
  • On-site walkthrough and observation
  • Stakeholder debrief (same day when possible)
  • Written report delivered on an agreed timeline

Request an assessment

Or email bruce@c-stad.com.