The Global Food Defense Institute Security Vulnerability & Risk Assessment

A combination of the Focused & Broad Mitigation Strategies proposed by the FDA, for FSMA compliance. GFDI has taken the FDA’s open-source vulnerability assessment and have created a more user-friendly version, prepared with graphs and images which clearly shows security concerns, areas of potential risk and vulnerabilities which should be addressed. 

Facility Readiness Levels: Facilities can go a long way to better protect their employee’s and products.  To that end, The Global Food Defense Institute has, using the REDi Assessment Software Platform and other assessment methodologies, developed a set of measurable components which will allow a company to clearly show it has complied with and is aware of the guidelines and recommendations for asset, facility and product security according to the FDA and FSMA.

Vulnerability Assessments are an important first tool for any facility or operation, as it provides a critical analysis of what possibilities may lurk within or outside of the operation in which someone with ill intent could do harm to people, products and assets.  Thus, when developing your facility or operational security contingency plans, the first step is always to conduct a site-specific threat/vulnerability assessment.

There are several benefits to conducting a GFDI vulnerability assessment at your facility:

  1. Increase and broaden awareness of management and front line workers, to enable them to better and more quickly identify hazards and other acts of suspicious behavior.
  2. Establish a baseline by which to enhance and enforce security procedures and protocol at your facility. Without developing this baseline, one could assume that security is not important or on the minds of others, and therefore, may present an opportunity for a criminal act. If a baseline has been established, this could be an opportunity for a facility to evaluate and assess the facility’s bearing with regards to security.
  3. Identify events or threats that could potentially pose a threat to the business continuity, brand image, reputation, products and people. Further, by identifying these potential threats, a facility could develop response measures, incident recovery and business restoration.
  4. Identification of internal exposures and self-induced threats, which could be potentially hazardous to the operations of the business. Examples of internal exposures would be those protections in place to guard or mitigate events such as workplace violence, theft, or internet/intranet system compromise and breach.
  5. Enhances the overall culture of security at a facility by allowing employees and management to develop the essential skills and build expertise in the area in which they work that focuses on security events that may affect the operations or personnel of the business. Further, a vulnerability assessment serves as a communication tool, to enable others to become engaged in the overall security effort, planning and procedures.