Skip to the main content.
About our VOSB Designation


Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

1 min read

Download Our FREE In-House Security Risk Assessment Considerations Guide

Security professionals are constantly looking for innovative ways to secure their facility and provide a safe environment within their budget. And, they are also constantly looking for resources to help them achieve that mission while expert advice is hard to come by. 

Fortunately, we have released a considerations guide that will help security professionals perform their own in-house security risk assessment. So now you can download it for free below.

This guide is intended to assist you with recognizing the critical aspects of and performing an in-house security risk assessment. In many cases, assistance from a third-party expert, like Theseus Professional Services, is required. Identification of missing or inadequate physical security measures that safeguard assets (people, property, and information) and critical business functions is of paramount concern. The findings of a security risk assessment are used to measure and communicate the level of risk to the organization.


Before jumping into your in-house security risk assessment exercise, it’s important to have a good background related to site surveys, risk assessments, and other consultation options available to your organization. When it comes to a risk assessment of your facility, sometimes an in-house assessment can be the perfect starting point before asking for third-party, expert consultation.

Considerations for access control, perimeter detection, intrusion detection, video surveillance, visitor management, and other technologies need to be considered based on the organization’s desired security posture, policies, and daily operational procedures.