Winning Initiatives and Best Practices for Physical Security



Similar documents
Guide for Non-Profit Housing Societies Security Guide Table of Contents

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.

UK SBS Physical Security Policy

Palm Beach State College Security Plan

Surveillance Equipment

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM

Best Practices for Safer School Facilities

Physical Security Checklist and Inventory

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.

MODESTO CITY SCHOOLS Administrative Regulation

EMERGENCY MANAGEMENT IN SCHOOLS

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

Security Management Plan

Physical Security for Drinking Water Facilities

How to Solve the Most Persistent Problem in Perimeter Security Systems

School Security: What are you missing?

Banking and Financial Institutions (Physical Security Measures) THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008

How To Ensure Security At A Site Security Site

RISKSTOP CONTROLLING RISKS IN UNOCCUPIED COMMERCIAL PROPERTIES

RISK MANAGEMENT POLICY

Chapter 8 Security Systems

The Banking and Financial Institutions (Physical Security Measures) Regulations, 2014

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Neighborhood Watch Block Captain s Guide

AllHealth Security Services, Inc. proposes to conduct a security risk assessment of Hospital.

CCTV Surveillance: Business Security & Video Best Practices

Business security audit

Supply Chain Security Audit Tool - Warehousing/Distribution


Best Home Security Tips Home-security tips to protect your cabin so you can relax and enjoy it by Whitney Richardson

U.S. DoD Physical Security Market

Home Security Inspection

Physical Security Assessment Form

PHLOSOPHY OF SCHOOL SAFETY AND SECURITY SYSTEMS INTERDICIPLINARY DECISION MATRIX

Security Systems Surveillance Policy

Small Business Crime Prevention

PROCESS FOR RISK ASSESSMENT

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

identify hazards, analyze or evaluate the risk associated with that hazard, and determine appropriate ways to eliminate or control the hazard.

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

solutions Deter Criminal Activity

Cyber Security Response to Physical Security Breaches

Security Measures at Toronto Public Library

Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems

Policy Document. IT Infrastructure Security Policy

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV

The Complete Security Survey

University of Pennsylvania Handbook for Faculty and Academic Administrators 2015 Version

Delivering hands-on expertise in vacant property protection and management

Developing a Risk Management Plan. New Partners Initiative Technical Assistance Project (NuPITA)

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

Enterprise Risk Management taking on new dimensions

Healthcare Security Solutions. Building Technologies

8 secrets. Your Burglar Won't Tell You

Hazard/Risk Identification and Control Procedure

PCI Compliance for Healthcare

Stanford University Video Surveillance System Guidelines

Business Security Check List

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

DOT HAZMAT SECURITY AWARENESS TRAINING

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

Home Invasion Safety. Protecting Your Family

Protection of unoccupied or void properties

Healthcare risk assessment made easy

Site Security Standards and Strategy

HIPAA Security Alert

Risk Assessment / Risk Management Protocol

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

The remote CCTV monitoring specialists CCTV Monitoring

SCHOOL SECURITY SURVEY

Protecting Electronic Data and Trade Secrets

TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales

Analyzing Risks in Healthcare. February 12, 2014

CCTV Cameras Policy. Policy Guidelines

UC Hastings College of the Law A Study of a Public Safety Partnership. Chief Mike Denson University of California, San Francisco Police Department

Transcription:

Winning Initiatives and Best Practices for Physical Security

Today s Presentation 1. Using a risk-based strategy for security 2. The balanced security approach 3. Concentric circles of protection concept 4. Good security vs. bad security 5. Common security mistakes 6. Questions and answers

Risk-Based Strategy for Security Planning

Traditional Approach to Planning Security Do what has always been done Do what everyone else is doing Reactive rather than proactive Always solving yesterday s problems

Most facilities are spending lots of money on security, but can t really tell you why

If you don t know your security risks, how can you apply the right security solutions?

Would you start taking medicines before your disease has been diagnosed?

Risk-Based Approach to Security

Risk-Based Approach to Planning Security Premise: Every security measure should be in response to one or more specific security risks

Risk-Based Approach Process Identify and prioritize your security risks Determine the best types of security measures to mitigate those risks Focus on high-priority risks first Deal with lower-priority risks as resources allow

Step #1 Identify your assets People Property Infrastructure Information Reputation

Step #2 Create a Risk Matrix

Step #3 Identify Possible Loss Events Arson Assault Burglary Disturbances/Disorderly Conduct External Theft Internal Theft Robbery Sabotage Theft of Employee Personal Property Theft of Information Disclosure of Trade Secrets Trespassers Vandalism Graffiti Workplace Violence Product Tampering

Step #4 Determine Likelihood of Event Very Likely = Greater than 90% chance of occurrence Likely = Between 50% and 90% chance of occurrence Moderately Likely = Between 10% and 50% chance of occurrence Unlikely = Between 3% and 10% chance of occurrence Very Unlikely = Less than 3% chance of occurrence

Step #5 Determine Consequences of Events Not Serious = No injuries, no downtime, $0 to $5,000 financial loss. Not Too Serious = Minor injuries, less than 1 day of downtime. $5,000 to $50,000 financial loss. Serious = Serious injuries, 1 to 7 days of downtime. $50,000 to $500,000 financial loss. Very Serious = Loss of life or severe injuries, 7 to 30 days downtime. $500,000 to $1,000,000 financial loss. Catastrophic = Loss of multiple lives or multiple severe injuries, significant or total destruction of facility, greater than $1,000,000 financial loss.

Step #6 Enter Data in Risk Matrix

Step #7 Rank Your Security Risks Likelihood x Consequences = Level of Security Risk

Step #8 List Rankings on Risk Matrix

Step #9 Focus on High-Priority Risks First

Step #10 Determine Security Measures Determine appropriate measures to mitigate each security risk

Security Risk Theft of Information Security Measures Background checks Employee training Restricted access areas High-security file cabinets Document shredders

Security Risk Burglary Security Measures High-security locks Door frame strengthening Security window film Intrusion alarm system Security patrols

Balanced Approach to Security

Good security is a process, not a product

Good security requires a balanced approach

Operational Measures Security policies and procedures Security management Employee awareness training Security officer staffing Incident investigation

Electronic Systems Access control systems Video surveillance systems Alarm systems Visitor management systems Security communications systems

Site and Building Design Site and facility layout Lighting Fencing and landscaping Doors and lock hardware Security signage

All elements must work together for effective security

Buying the equipment is the easy part.

Concentric Circles of Protection Concept

Concentric Circles of Protection Perimeter Fence Building Exterior Department Door Office Door

Layers of Security Layer 2 Exterior Wall Layer 1 Perimeter Fence Layer 4 Department Wall Layer 6 Safe Layer 5 Office Wall Layer3 Lobby Wall

Concentric Circles of Protection Principles Having multiple layers decreases probability that intruder will be able to gain access

Concentric Circles of Protection Principles You can decrease intruder s chance of success by adding layers increasing the effectiveness of each layer or by doing both

Concentric Circles of Protection Principles Relying on a single layer to provide security is almost never effective because it requires a level of perfection that is unattainable

Concentric Circles of Protection Principles Simple procedures, such as the locking of file cabinets and offices, can provide additional security layers at little or no cost

Concentric Circles of Protection Principles Employee awareness can create an invisible, yet very effective, security layer

Good Security vs. Bad Security

Traits of a Good Security Program Operates based on a written plan that addresses identified security risks Employees know what is expected and why Losses and security incidents are minimized Employees and guests feel safe Facility is compliant with regulatory requirements

Traits of a Bad Security Program No cohesive security plan Program has been pieced together over the years in response to past problems Specific security risks have never been identified or prioritized Employees are unsure of what to do or why No real handle on what is happening at facility

Traits of a Bad Security Program Employees and guests don t always feel safe People, property, and information may be at risk Facility may be non-compliant with regulatory requirements Potential for negligent security lawsuits

Common Security Mistakes

Not having or not following a written security plan

Not providing adequate security training to employees

Not keeping track of crimes occurring at your facilities

Not being aware of crimes being committed in the neighborhood

Not being responsive to employee complaints about security

Not alerting employees to known security risks

Cutting security measures just to save money

Thinking that security cameras are a magic bullet

Poor management and disposal of sensitive documents

Poor control of contractors and service providers

Poor background check procedures

Inadequate supervision of contract security services

Poor lighting

Poorly maintained security features

Not keeping up with changing conditions

Questions and Answers

Silva Consultants Michael A. Silva, CPP PO Box 8799 Covington, WA 98042 USA Phone: 888-645-2299 Email: mikes@silvaconsultants.com Website: www.silvaconsultants.com (Lots of free security tips on website)