In a dynamic geo-political, economic and social environment, institutions are exposed to significant, varied and ever-evolving risks. Be it in the space of IT security, financial, operational, governance etc. – any lapse in risk management may lead to loss of reputation, money and competitive advantage along with added legal and regulatory burden. Nowadays, more often than not, businesses plan to mitigate digital threats but are not adequately prepared for the physical security threats that they are exposed to. Physical threats range from natural disasters, violence and crime to health and safety. They can be internal such as fires, workplace violence and misplacement of sensitive data by employees, or external such as natural disasters, thefts, or utility outages.

In a recent survey of organisational risk perception, threats to physical security still finds itself in the bottom quartile. Nevertheless, 11.73 lakh man days have been lost due to labour unrests in India in one year, over 75,000 people and INR4 lakh crore have been lost due to natural disasters in the past decade, cases of sexual harassment have increased at 42 per cent CAGR (5 years) and India ranks 137th in state of peace (below most African and South American counties). Estimated economic cost of violence in India has been 8.6 per cent of GDP. Ensuring physical security has become imperative for the purpose of business continuity.

KPMG in India, with its tools, resources, technology focus, global reach and strategic and cross functional approach to risk management, is well placed to enable organisations to mitigate physical security risks. Our service offerings include:

Connect with us

Physical security assessment

  • Assessment of the ‘As-Is’ situation and planned security state of infrastructure
  • Review of existing policies, procedures, processes, work practices and skill requirements
  • Benchmarking the assessed results with established global standards
  • Benchmarking the assessed results with established global standards
  • Development of threat map
  • Evaluation of risks emanating from threat analysis and development of mitigation plans
  • Creation of an implementation road-map
  • Perimeter security, access controls, security of IT infrastructure, video analytics, transportation security, command and control centre, etc.

Integrated security project management

  • Assessment and development of Business Requirement Specification (BRS)
  • Contractual due diligence
  • Bid management assistance
  • Assistance for development of System Requirement Specification (SRS)
  • Development/amendment of security policies and procedures post implementation of security controls
  • Development of training material and implementation of training programme
  • Monitoring and audit
  • Post-implementation support

Crisis management and emergency response

  • Simulation of current emergency response programme
  • Hazard(s) and risk(s) identification and analysis of current mitigation plans
  • Analysis of gaps between ideal state and current state
  • Basis gap analysis, preparation and validation of emergency response and business continuity plans
  • Identification of assistance required from specialised external sources
  • Incorporation of validated plans into organisational management structure
  • Providing specialised assistance during emergencies (if required)

Electronic counter surveillance

  • Identification of area(s) of interest for conduct of electronic counter surveillance
  • Sanitisation of the area(s) of interest for presence of electronic devices to prevent leakage of sensitive information
  • Examining the source of surveillance

Fire and safety audit

  • Simulation of fire safety drill
  • Independent audit to identify gaps
  • Overlay the results from the simulation with the gap analysis
  • Benchmarking the output with compliance requirements, regulations, codes and standards required for providing a safe environment
  • Providing a mitigation plan and implementation roadmap
  • Implementation support

Embedded security leadership

  • Identify the requirements for security management
  • Development of project governance requirements, KPIs, reporting structures and dashboards
  • Deploy security management (leadership) team
  • Assisting in administration and operation of the physical security function
  • Coordination with key stakeholders and authorities for establishing deterrence against unlawful interference
  • Management of all emergency situations
  • Development of policies, processes, procedures and work-practices
  • Institution and monitoring of training and skill-development

Security investigation

  • Documenting the security incident
  • Identification of appropriate investigation methodology
  • Collation and analysis of incident related data
  • Deploy KPMG proprietary tools and investigators for filling white spaces
  • Provision of investigation report

Training and awareness

- Functional training to security personnel

  • Security programme management
  • Crisis management and business continuity
  • Fire safety management
  • Investigation/fraud examination techniques

- Awareness training to employees for observance of security protocols and maintenance of adequate personal security

  • Security awareness training
  • Travel safety and security
  • Women safety and self defence.

We also provide services in areas of loss prevention investigations and awareness, workplace violence mitigation, intelligence collection and physical due diligence, counter terrorism, aviation and maritime security solutions and visitor management systems.

Key Contact