SlideShare a Scribd company logo
1 of 4
Download to read offline
CSMP®-Certified Practitioner Practitioner Capabilities:
Security Risk Analysis
1. The practitioner is proficient in using a standard methodology to determine and
prioritise security risk through the analysis of threat, vulnerabilities and impact.
2. The practitioner is capable of selecting, for each identified risk, an appropriate and
economical risk management approach that will reduce risk to as low as reasonably
practicable.
3. The practitioner has studied how to demonstrate through metrics that the chosen risk
management strategy will deliver a return on investment.
Crime Prevention
1. The practitioner has an advanced understanding of the drivers of crime, and the
associated key crime motivation theories.
2. The practitioner is able to select from a menu of different crime prevention and
management approaches to address both externally- and internally-perpetrated
crimes. The approaches will be grounded in the best-known and most successful
crime prevention theories, based on latest research.
3. The practitioner is able to apply the best principles of environmental design to create a
crime tranquil environment.
Managing the Security Function
1. The practitioner understands the core skills necessary to manage a security function.
2. The practitioner is able to focus the security programme correctly, using the most
appropriate mix of hardware, procedures and personnel.
3. The practitioner is able to match the security programme with the culture of the
organisation, cross-network with managers to establish a collaborative approach to
security risk management, and understands how to present the benefits of the
programme to senior management.
Leadership and Management
1. The practitioner understands the key differentiating factors between management and
leadership and has the ability to put leadership good practice into effect.
2. The practitioner has studied extensively the core theories on motivation and has the
ability to apply these to ensure maximum productivity from the security team.
3. The practitioner understands the dynamics of teamwork and the key underpinning
theories, and is able to organise personnel into teams and leverage the dynamics that
teamwork can deliver to the benefit of the organisation.
Security Design, Evaluation and Surveying
1. The practitioner understands the fundamental set of principles that underpin every
security design and is able to apply these to produce an optimally configured security
programme that is in harmony with the culture of the organisation and its mission
objectives.
2. The practitioner is able to evaluate the effectiveness of security systems and
programmes against a defined set of parameters.
3. The practitioner is able to survey the organisation’s security systems to identify areas
of imbalance between risk and security and to make appropriate recommendations to
optimise security resources in order to achieve greatest risk mitigation at an
economical cost.
Perimeter Protection
1. The practitioner is able to select from a range of perimeter protection options to
design a perimeter which is appropriate to the culture and mission of the organisation
and which reduces risk of intrusion to as low as reasonably practicable.
2. The practitioner understands the range of surveillance, detection and delay technology
available and is capable of selecting the right technologies for given circumstances
and integrating all perimeter design elements to create an optimal protective design.
3. The practitioner understands the inherent vulnerabilities of perimeters and is capable
of advising how to integrate and configure manpower to create an effective perimeter
defence that provides appropriate deterrence and credible response to incursion
attempts.
Protecting Buildings
1. The practitioner understands the range of crimes, security risks and vulnerabilities
associated with buildings and is able to recommend security measures that are in
harmony with the occupants need for health and safety.
2. The practitioner is able to select appropriate security measures for a range of building
types and functions, from single-occupier, multi-tenant, old, new etc., and with a
range of operations from industrial to retail.
3. The practitioner understands well how to apply appropriate security measures to meet
the specific requirements of varied internal building environments. Measures include
environmental design to reduce opportunities for crime, security hardening measures,
locking systems, intrusion detection and assessment, incident response and
surveillance.
Access Management
1. The practitioner can select from a range of different access management approaches
and regimes for a wide range of environments and functions.
2. The practitioner understands the primary equipment, technology and methods
necessary to create effective access management and can specify and apply these
proficiently.
3. The practitioner can select from a range of mechanical, electronic and biometric
locking and access management devices and understands how and where each can
best be utilised, while ensuring conformance with building and fire codes.
Video Surveillance (CCTV)
1. The practitioner can differentiate between the pros and cons of the multitude of
different CCTV surveillance options available.
2. The practitioner can produce an outline specification for a CCTV surveillance concept
for a range of circumstances, taking into account developments in technology and
associated economical payback through diversified and dynamic return on investment.
3. Through the correct and cost-effective application of CCTV surveillance the
practitioner is able to reduce the exposure of the organisation to crime and loss.
Facility Counterterrorism
1. The practitioner understands the range of typical terrorist tactics that are employed to
attack an organisation.
2. The practitioner has the ability to optimise standard security measures to mitigate the
most common kinds of terrorist action.
3. The practitioner is able to identify and specify those specific counterterrorism
protective security measures necessary to address specific terrorist actions that can be
mitigated by the optimisation of existing security means.
Protection of Information
1. The practitioner is able to advise line and senior management on a range of current
and emerging threats to information in hardcopy and electronic form, and advise on
the unique respective implications of targeting trade secrets, proprietary information
and personal data.
2. The practitioner is able to recommend a range of human, technical and procedural
countermeasures designed to reduce the exposure of sensitive information to
compromise.
3. The practitioner understands and can advise on threats to information in specific
circumstances (e.g. travel, telephonic, spoken in meeting rooms and office etc.) and
can advise on specific counter-technical surveillance measures to address each.
Protection of at-Risk Personnel
1. The practitioner can produce policies and programmes designed to manage workplace
violence risk.
2. The practitioner can specify a range of security measures to reduce exposure to
robbery in cash-handling areas.
3. The practitioner can develop proactive programmes and emergency response
measures which will be implemented in the event of an active shooter or disturbed
person(s) with weapons on site.
4. The practitioner can implement a programme of measures designed to manage the
security business travellers while overseas.

More Related Content

Viewers also liked

3.desarrollo de habilidades del pensamiento
3.desarrollo de habilidades del pensamiento3.desarrollo de habilidades del pensamiento
3.desarrollo de habilidades del pensamientogiovanni lara rosaliano
 
Pealo platform introduction at futurebank
Pealo platform introduction at futurebankPealo platform introduction at futurebank
Pealo platform introduction at futurebankprakash somosundram
 
Los Robot en la educación
Los Robot en la educaciónLos Robot en la educación
Los Robot en la educaciónMaribel Cordero
 
Labioleporinoypaladarhendido 090517220647-phpapp02
Labioleporinoypaladarhendido 090517220647-phpapp02Labioleporinoypaladarhendido 090517220647-phpapp02
Labioleporinoypaladarhendido 090517220647-phpapp02Ingrid Rozo
 
SACAC Session E.12 Sealing the Deal
SACAC Session E.12 Sealing the DealSACAC Session E.12 Sealing the Deal
SACAC Session E.12 Sealing the DealRaise.me
 
Diseño de Situación de Aprendizaje Especifica
Diseño de Situación de Aprendizaje EspecificaDiseño de Situación de Aprendizaje Especifica
Diseño de Situación de Aprendizaje EspecificaMaximiliano Torres
 
Psicologia 2do material practica tablas y graficos
Psicologia 2do material  practica tablas y graficosPsicologia 2do material  practica tablas y graficos
Psicologia 2do material practica tablas y graficosUniv Peruana Los Andes
 
S4 tarea4 lesim
S4 tarea4 lesimS4 tarea4 lesim
S4 tarea4 lesimAIDE LEON
 

Viewers also liked (11)

3.desarrollo de habilidades del pensamiento
3.desarrollo de habilidades del pensamiento3.desarrollo de habilidades del pensamiento
3.desarrollo de habilidades del pensamiento
 
Pealo platform introduction at futurebank
Pealo platform introduction at futurebankPealo platform introduction at futurebank
Pealo platform introduction at futurebank
 
Los Robot en la educación
Los Robot en la educaciónLos Robot en la educación
Los Robot en la educación
 
Presentacion parcial 2
Presentacion parcial 2Presentacion parcial 2
Presentacion parcial 2
 
Labioleporinoypaladarhendido 090517220647-phpapp02
Labioleporinoypaladarhendido 090517220647-phpapp02Labioleporinoypaladarhendido 090517220647-phpapp02
Labioleporinoypaladarhendido 090517220647-phpapp02
 
SACAC Session E.12 Sealing the Deal
SACAC Session E.12 Sealing the DealSACAC Session E.12 Sealing the Deal
SACAC Session E.12 Sealing the Deal
 
系統程式 - 附錄
系統程式 - 附錄系統程式 - 附錄
系統程式 - 附錄
 
Diseño de Situación de Aprendizaje Especifica
Diseño de Situación de Aprendizaje EspecificaDiseño de Situación de Aprendizaje Especifica
Diseño de Situación de Aprendizaje Especifica
 
Psicologia 2do material practica tablas y graficos
Psicologia 2do material  practica tablas y graficosPsicologia 2do material  practica tablas y graficos
Psicologia 2do material practica tablas y graficos
 
S4 tarea4 lesim
S4 tarea4 lesimS4 tarea4 lesim
S4 tarea4 lesim
 
Vias uri
Vias uriVias uri
Vias uri
 

Similar to CSMP Certified Practitioner Statement of Capabilities

BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Milind Agarwal
 
security manager CV
security manager CVsecurity manager CV
security manager CVasim hashmi
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratorySalam Shah
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USACompanySeceon
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...kris harden
 
Security Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptxSecurity Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptxSWC Security
 
Course The course examines and countermeasures to.docx
Course The course examines and countermeasures to.docxCourse The course examines and countermeasures to.docx
Course The course examines and countermeasures to.docxwrite5
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec SysMicheal Isreal
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
HAZARD COMMUNICATION environmental standard
HAZARD COMMUNICATION  environmental standardHAZARD COMMUNICATION  environmental standard
HAZARD COMMUNICATION environmental standardROCENODodongVILLACER
 
Sentinels of Safety: The Role of Security Guard Services
Sentinels of Safety: The Role of Security Guard ServicesSentinels of Safety: The Role of Security Guard Services
Sentinels of Safety: The Role of Security Guard ServicesJames Mathews
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...Symantec
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 

Similar to CSMP Certified Practitioner Statement of Capabilities (20)

BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
 
security manager CV
security manager CVsecurity manager CV
security manager CV
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
 
Security Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptxSecurity Risk Mitigation strategies.pptx
Security Risk Mitigation strategies.pptx
 
Course The course examines and countermeasures to.docx
Course The course examines and countermeasures to.docxCourse The course examines and countermeasures to.docx
Course The course examines and countermeasures to.docx
 
Proqual l7 ohs (1)
Proqual l7 ohs (1)Proqual l7 ohs (1)
Proqual l7 ohs (1)
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
Safety
SafetySafety
Safety
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Dive into anything.pdf
Dive into anything.pdfDive into anything.pdf
Dive into anything.pdf
 
HAZARD COMMUNICATION environmental standard
HAZARD COMMUNICATION  environmental standardHAZARD COMMUNICATION  environmental standard
HAZARD COMMUNICATION environmental standard
 
Sentinels of Safety: The Role of Security Guard Services
Sentinels of Safety: The Role of Security Guard ServicesSentinels of Safety: The Role of Security Guard Services
Sentinels of Safety: The Role of Security Guard Services
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 

CSMP Certified Practitioner Statement of Capabilities

  • 1. CSMP®-Certified Practitioner Practitioner Capabilities: Security Risk Analysis 1. The practitioner is proficient in using a standard methodology to determine and prioritise security risk through the analysis of threat, vulnerabilities and impact. 2. The practitioner is capable of selecting, for each identified risk, an appropriate and economical risk management approach that will reduce risk to as low as reasonably practicable. 3. The practitioner has studied how to demonstrate through metrics that the chosen risk management strategy will deliver a return on investment. Crime Prevention 1. The practitioner has an advanced understanding of the drivers of crime, and the associated key crime motivation theories. 2. The practitioner is able to select from a menu of different crime prevention and management approaches to address both externally- and internally-perpetrated crimes. The approaches will be grounded in the best-known and most successful crime prevention theories, based on latest research. 3. The practitioner is able to apply the best principles of environmental design to create a crime tranquil environment. Managing the Security Function 1. The practitioner understands the core skills necessary to manage a security function. 2. The practitioner is able to focus the security programme correctly, using the most appropriate mix of hardware, procedures and personnel. 3. The practitioner is able to match the security programme with the culture of the organisation, cross-network with managers to establish a collaborative approach to security risk management, and understands how to present the benefits of the programme to senior management. Leadership and Management 1. The practitioner understands the key differentiating factors between management and leadership and has the ability to put leadership good practice into effect. 2. The practitioner has studied extensively the core theories on motivation and has the ability to apply these to ensure maximum productivity from the security team. 3. The practitioner understands the dynamics of teamwork and the key underpinning theories, and is able to organise personnel into teams and leverage the dynamics that teamwork can deliver to the benefit of the organisation.
  • 2. Security Design, Evaluation and Surveying 1. The practitioner understands the fundamental set of principles that underpin every security design and is able to apply these to produce an optimally configured security programme that is in harmony with the culture of the organisation and its mission objectives. 2. The practitioner is able to evaluate the effectiveness of security systems and programmes against a defined set of parameters. 3. The practitioner is able to survey the organisation’s security systems to identify areas of imbalance between risk and security and to make appropriate recommendations to optimise security resources in order to achieve greatest risk mitigation at an economical cost. Perimeter Protection 1. The practitioner is able to select from a range of perimeter protection options to design a perimeter which is appropriate to the culture and mission of the organisation and which reduces risk of intrusion to as low as reasonably practicable. 2. The practitioner understands the range of surveillance, detection and delay technology available and is capable of selecting the right technologies for given circumstances and integrating all perimeter design elements to create an optimal protective design. 3. The practitioner understands the inherent vulnerabilities of perimeters and is capable of advising how to integrate and configure manpower to create an effective perimeter defence that provides appropriate deterrence and credible response to incursion attempts. Protecting Buildings 1. The practitioner understands the range of crimes, security risks and vulnerabilities associated with buildings and is able to recommend security measures that are in harmony with the occupants need for health and safety. 2. The practitioner is able to select appropriate security measures for a range of building types and functions, from single-occupier, multi-tenant, old, new etc., and with a range of operations from industrial to retail. 3. The practitioner understands well how to apply appropriate security measures to meet the specific requirements of varied internal building environments. Measures include environmental design to reduce opportunities for crime, security hardening measures, locking systems, intrusion detection and assessment, incident response and surveillance.
  • 3. Access Management 1. The practitioner can select from a range of different access management approaches and regimes for a wide range of environments and functions. 2. The practitioner understands the primary equipment, technology and methods necessary to create effective access management and can specify and apply these proficiently. 3. The practitioner can select from a range of mechanical, electronic and biometric locking and access management devices and understands how and where each can best be utilised, while ensuring conformance with building and fire codes. Video Surveillance (CCTV) 1. The practitioner can differentiate between the pros and cons of the multitude of different CCTV surveillance options available. 2. The practitioner can produce an outline specification for a CCTV surveillance concept for a range of circumstances, taking into account developments in technology and associated economical payback through diversified and dynamic return on investment. 3. Through the correct and cost-effective application of CCTV surveillance the practitioner is able to reduce the exposure of the organisation to crime and loss. Facility Counterterrorism 1. The practitioner understands the range of typical terrorist tactics that are employed to attack an organisation. 2. The practitioner has the ability to optimise standard security measures to mitigate the most common kinds of terrorist action. 3. The practitioner is able to identify and specify those specific counterterrorism protective security measures necessary to address specific terrorist actions that can be mitigated by the optimisation of existing security means. Protection of Information 1. The practitioner is able to advise line and senior management on a range of current and emerging threats to information in hardcopy and electronic form, and advise on the unique respective implications of targeting trade secrets, proprietary information and personal data. 2. The practitioner is able to recommend a range of human, technical and procedural countermeasures designed to reduce the exposure of sensitive information to compromise. 3. The practitioner understands and can advise on threats to information in specific circumstances (e.g. travel, telephonic, spoken in meeting rooms and office etc.) and can advise on specific counter-technical surveillance measures to address each.
  • 4. Protection of at-Risk Personnel 1. The practitioner can produce policies and programmes designed to manage workplace violence risk. 2. The practitioner can specify a range of security measures to reduce exposure to robbery in cash-handling areas. 3. The practitioner can develop proactive programmes and emergency response measures which will be implemented in the event of an active shooter or disturbed person(s) with weapons on site. 4. The practitioner can implement a programme of measures designed to manage the security business travellers while overseas.