SlideShare a Scribd company logo
1 of 4
Denis Kuchio; CSMP® M.ISMI
STATEMENT OF CAPABILITIES
Security Risk Analysis
1. The consultant is proficient in using a standard methodology to determine and prioritise
security risk through the analysis of threat, vulnerabilities and impact.
2. The consultant is capable of selecting, for each identified risk, an appropriate and economical
risk management approach that will reduce risk to as low as reasonably practicable.
3. The consultant has studied how to demonstrate through metrics that the chosen risk
management strategy will deliver a return on investment.
Crime Prevention
1. The consultant has an advanced understanding of the drivers of crime, and the associated key
crime motivation theories.
2. The consultant is able to select from a menu of different crime prevention and management
approaches to address both externally- and internally-perpetrated crimes. The approaches
will be grounded in the best-known and most successful crime prevention theories, based on
latest research.
3. The consultant is able to apply the best principles of environmental design to create a crime
tranquil environment.
Managing the Security Function
1. The consultant understands the core skills necessary to manage a security function.
2. The consultant is able to focus the security programme correctly, using the most appropriate
mix of hardware, procedures and personnel.
3. The consultant is able to match the security programme with the culture of the organisation,
cross-network with managers to establish a collaborative approach to security risk
management, and understands how to present the benefits of the programme to senior
management.
Leadership and Management
1. The consultant understands the key differentiating factors between management and
leadership and has the ability to put leadership good practice into effect.
2. The consultant has studied extensively the core theories on motivation and has the ability to
apply these to ensure maximum productivity from the security team.
3. The consultant understands the dynamics of teamwork and the key underpinning theories,
and is able to organise personnel into teams and leverage the dynamics that teamwork can
deliver to the benefit of the organisation.
Security Design, Evaluation and Surveying
1. The consultant understands the fundamental set of principles that underpin every security
design and is able to apply these to produce an optimally configured security programme
that is in harmony with the culture of the organisation and its mission objectives.
2. The consultant is able to evaluate the effectiveness of security systems and programmes
against a defined set of parameters.
3. The consultant is able to survey the organisation’s security systems to identify areas of
imbalance between risk and security and to make appropriate recommendations to optimise
security resources in order to achieve greatest risk mitigation at an economical cost.
Perimeter Protection
1. The consultant is able to select from a range of perimeter protection options to design a
perimeter which is appropriate to the culture and mission of the organisation and which
reduces risk of intrusion to as low as reasonably practicable.
2. The consultant understands the range of surveillance, detection and delay technology
available and is capable of selecting the right technologies for given circumstances and
integrating all perimeter design elements to create an optimal protective design.
3. The consultant understands the inherent vulnerabilities of perimeters and is capable of
advising how to integrate and configure manpower to create an effective perimeter defence
that provides appropriate deterrence and credible response to incursion attempts.
Protecting Buildings
1. The consultant understands the range of crimes, security risks and vulnerabilities associated
with buildings and is able to recommend security measures that are in harmony with the
occupants need for health and safety.
2. The consultant is able to select appropriate security measures for a range of building types
and functions, from single-occupier, multi-tenant, old, new etc., and with a range of
operations from industrial to retail.
3. The consultant understands well how to apply appropriate security measures to meet the
specific requirements of varied internal building environments. Measures include
environmental design to reduce opportunities for crime, security hardening measures, locking
systems, intrusion detection and assessment, incident response and surveillance.
Access Management
1. The consultant can select from a range of different access management approaches and
regimes for a wide range of environments and functions.
2. The consultant understands the primary equipment, technology and methods necessary to
create effective access management and can specify and apply these proficiently.
3. The consultant can select from a range of mechanical, electronic and biometric locking and
access management devices and understands how and where each can best be utilised, while
ensuring conformance with building and fire codes.
Video Surveillance (CCTV)
1. The consultant can differentiate between the pros and cons of the multitude of different CCTV
surveillance options available.
2. The consultant can produce an outline specification for a CCTV surveillance concept for a
range of circumstances, taking into account developments in technology and associated
economical payback through diversified and dynamic return on investment.
3. Through the correct and cost-effective application of CCTV surveillance the consultant is able
to reduce the exposure of the organisation to crime and loss.
Facility Counterterrorism
1. The consultant understands the range of typical terrorist tactics that are employed to attack
an organisation.
2. The consultant has the ability to optimise standard security measures to mitigate the most
common kinds of terrorist action.
3. The consultant is able to identify and specify those specific counterterrorism protective
security measures necessary to address specific terrorist actions that can be mitigated by the
optimisation of existing security means.
Protection of Information
1. The consultant is able to advise line and senior management on a range of current and
emerging threats to information in hardcopy and electronic form, and advise on the unique
respective implications of targeting trade secrets, proprietary information and personal data.
2. The consultant is able to recommend a range of human, technical and procedural
countermeasures designed to reduce the exposure of sensitive information to compromise.
3. The consultant understands and can advise on threats to information in specific circumstances
(e.g. travel, telephonic, spoken in meeting rooms and office etc.) and can advise on specific
counter-technical surveillance measures to address each.
Protection of at-Risk Personnel
1. The consultant can produce policies and programmes designed to manage workplace
violence risk.
2. The consultant can specify a range of security measures to reduce exposure to robbery in
cash-handling areas.
3. The consultant can develop proactive programmes and emergency response measures which
will be implemented in the event of an active shooter or disturbed person(s) with weapons on
site.
4. The consultant can implement a programme of measures designed to manage the security
business travellers while overseas.
Denis Kuchio_Capability Statement

More Related Content

What's hot

Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Engineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & techniciansEngineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & techniciansBhim Upadhyaya
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItTerra Verde
 
Countering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design IssueCountering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design Issuezadok001
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
Code of practice for physical security systems in banks
Code of practice for physical security systems in banksCode of practice for physical security systems in banks
Code of practice for physical security systems in banksSamer Al Basha
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Sgw Emirates Presentation 2011
Sgw Emirates Presentation 2011Sgw Emirates Presentation 2011
Sgw Emirates Presentation 2011simonwhitehouse
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 

What's hot (20)

Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Irm 8-blackmail
Irm 8-blackmailIrm 8-blackmail
Irm 8-blackmail
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Engineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & techniciansEngineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & technicians
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs It
 
Countering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design IssueCountering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design Issue
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Code of practice for physical security systems in banks
Code of practice for physical security systems in banksCode of practice for physical security systems in banks
Code of practice for physical security systems in banks
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Security in the workplace
Security in the workplaceSecurity in the workplace
Security in the workplace
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Sgw Emirates Presentation 2011
Sgw Emirates Presentation 2011Sgw Emirates Presentation 2011
Sgw Emirates Presentation 2011
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 

Similar to Denis Kuchio_Capability Statement

BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USACompanySeceon
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratorySalam Shah
 
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Milind Agarwal
 
Advance Your Career with Cyber Security Training in Kerala
Advance Your Career with Cyber Security Training in KeralaAdvance Your Career with Cyber Security Training in Kerala
Advance Your Career with Cyber Security Training in KeralaoffensoSEOwork
 
Top-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfTop-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfprivate security
 
Sensible defence
Sensible defenceSensible defence
Sensible defenceKoen Maris
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCiente
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docxoswald1horne84988
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinDavid X Martin
 
Security Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptxSecurity Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptxSWC Security
 
Red Hat vs. Blue Hat Which Is Better_.pptx
Red Hat vs. Blue Hat Which Is Better_.pptxRed Hat vs. Blue Hat Which Is Better_.pptx
Red Hat vs. Blue Hat Which Is Better_.pptxCCNMumbai
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 

Similar to Denis Kuchio_Capability Statement (20)

BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
 
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
 
Advance Your Career with Cyber Security Training in Kerala
Advance Your Career with Cyber Security Training in KeralaAdvance Your Career with Cyber Security Training in Kerala
Advance Your Career with Cyber Security Training in Kerala
 
Top-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfTop-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdf
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
 
Security Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptxSecurity Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptx
 
Red Hat vs. Blue Hat Which Is Better_.pptx
Red Hat vs. Blue Hat Which Is Better_.pptxRed Hat vs. Blue Hat Which Is Better_.pptx
Red Hat vs. Blue Hat Which Is Better_.pptx
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 

Denis Kuchio_Capability Statement

  • 1. Denis Kuchio; CSMP® M.ISMI STATEMENT OF CAPABILITIES Security Risk Analysis 1. The consultant is proficient in using a standard methodology to determine and prioritise security risk through the analysis of threat, vulnerabilities and impact. 2. The consultant is capable of selecting, for each identified risk, an appropriate and economical risk management approach that will reduce risk to as low as reasonably practicable. 3. The consultant has studied how to demonstrate through metrics that the chosen risk management strategy will deliver a return on investment. Crime Prevention 1. The consultant has an advanced understanding of the drivers of crime, and the associated key crime motivation theories. 2. The consultant is able to select from a menu of different crime prevention and management approaches to address both externally- and internally-perpetrated crimes. The approaches will be grounded in the best-known and most successful crime prevention theories, based on latest research. 3. The consultant is able to apply the best principles of environmental design to create a crime tranquil environment. Managing the Security Function 1. The consultant understands the core skills necessary to manage a security function. 2. The consultant is able to focus the security programme correctly, using the most appropriate mix of hardware, procedures and personnel. 3. The consultant is able to match the security programme with the culture of the organisation, cross-network with managers to establish a collaborative approach to security risk management, and understands how to present the benefits of the programme to senior management. Leadership and Management 1. The consultant understands the key differentiating factors between management and leadership and has the ability to put leadership good practice into effect. 2. The consultant has studied extensively the core theories on motivation and has the ability to apply these to ensure maximum productivity from the security team. 3. The consultant understands the dynamics of teamwork and the key underpinning theories, and is able to organise personnel into teams and leverage the dynamics that teamwork can deliver to the benefit of the organisation.
  • 2. Security Design, Evaluation and Surveying 1. The consultant understands the fundamental set of principles that underpin every security design and is able to apply these to produce an optimally configured security programme that is in harmony with the culture of the organisation and its mission objectives. 2. The consultant is able to evaluate the effectiveness of security systems and programmes against a defined set of parameters. 3. The consultant is able to survey the organisation’s security systems to identify areas of imbalance between risk and security and to make appropriate recommendations to optimise security resources in order to achieve greatest risk mitigation at an economical cost. Perimeter Protection 1. The consultant is able to select from a range of perimeter protection options to design a perimeter which is appropriate to the culture and mission of the organisation and which reduces risk of intrusion to as low as reasonably practicable. 2. The consultant understands the range of surveillance, detection and delay technology available and is capable of selecting the right technologies for given circumstances and integrating all perimeter design elements to create an optimal protective design. 3. The consultant understands the inherent vulnerabilities of perimeters and is capable of advising how to integrate and configure manpower to create an effective perimeter defence that provides appropriate deterrence and credible response to incursion attempts. Protecting Buildings 1. The consultant understands the range of crimes, security risks and vulnerabilities associated with buildings and is able to recommend security measures that are in harmony with the occupants need for health and safety. 2. The consultant is able to select appropriate security measures for a range of building types and functions, from single-occupier, multi-tenant, old, new etc., and with a range of operations from industrial to retail. 3. The consultant understands well how to apply appropriate security measures to meet the specific requirements of varied internal building environments. Measures include environmental design to reduce opportunities for crime, security hardening measures, locking systems, intrusion detection and assessment, incident response and surveillance. Access Management 1. The consultant can select from a range of different access management approaches and regimes for a wide range of environments and functions. 2. The consultant understands the primary equipment, technology and methods necessary to create effective access management and can specify and apply these proficiently. 3. The consultant can select from a range of mechanical, electronic and biometric locking and access management devices and understands how and where each can best be utilised, while ensuring conformance with building and fire codes.
  • 3. Video Surveillance (CCTV) 1. The consultant can differentiate between the pros and cons of the multitude of different CCTV surveillance options available. 2. The consultant can produce an outline specification for a CCTV surveillance concept for a range of circumstances, taking into account developments in technology and associated economical payback through diversified and dynamic return on investment. 3. Through the correct and cost-effective application of CCTV surveillance the consultant is able to reduce the exposure of the organisation to crime and loss. Facility Counterterrorism 1. The consultant understands the range of typical terrorist tactics that are employed to attack an organisation. 2. The consultant has the ability to optimise standard security measures to mitigate the most common kinds of terrorist action. 3. The consultant is able to identify and specify those specific counterterrorism protective security measures necessary to address specific terrorist actions that can be mitigated by the optimisation of existing security means. Protection of Information 1. The consultant is able to advise line and senior management on a range of current and emerging threats to information in hardcopy and electronic form, and advise on the unique respective implications of targeting trade secrets, proprietary information and personal data. 2. The consultant is able to recommend a range of human, technical and procedural countermeasures designed to reduce the exposure of sensitive information to compromise. 3. The consultant understands and can advise on threats to information in specific circumstances (e.g. travel, telephonic, spoken in meeting rooms and office etc.) and can advise on specific counter-technical surveillance measures to address each. Protection of at-Risk Personnel 1. The consultant can produce policies and programmes designed to manage workplace violence risk. 2. The consultant can specify a range of security measures to reduce exposure to robbery in cash-handling areas. 3. The consultant can develop proactive programmes and emergency response measures which will be implemented in the event of an active shooter or disturbed person(s) with weapons on site. 4. The consultant can implement a programme of measures designed to manage the security business travellers while overseas.