SlideShare a Scribd company logo
1 of 7
Take a Risk based
approach &
managing specific
scenario's
BY ROBIN GH PATRAS
Take a risk based approach
 Your organization's unique context and potential threats determine which
physical security measures you need.
 When you take a risk-based approach, you can ensure your physical
security measures are right for your organisation.
• Identify what you need to protect
• Identify the people, information, physical assets, and functions that you need to protect. Then
determine the threats facing your organisation. Include threats within Pakistan and abroad (if you
have overseas interests / projects).
• You need to fully understand the value and sensitivity of your information and assets to accurately
assess your physical security risks.
Take a risk based approach
Assess the impact of breached security
Use the Business Impact Levels (BILs) to assess the potential impact if your people, information, or
assets were harmed, compromised, or unavailable. For example:
 if customers were aggressive to your people
 if your organization's property was stolen
 if someone tampered with your security system and gained unauthorized access to your office out
of hours
 if someone gained unauthorized access to your premises and stole valuable information.
For every threat scenario, consider the risks to:
• the public
• your people, property, operations, reputation, finances, or business processes
• Pakistan as a whole.
Managing Specific Scenario's
 Working away from the office
 Securely transporting sensitive items
 Event Security
• Before Event
• During the event
• After the Event
Working away from the office
Consider the situations that your people might face when they are working away from the office. Will
they be working at home? In remote-locations? In someone else’s building? Overseas? People are
using portable computing and mobile communications devices to work remotely in a variety of ways and
places, such as:
 taking work home
 working in the field
 working from vehicles
 working from hotels or conference venues
 visiting client offices
 working while on public transport.
Mobile and remote working is now the norm,
yet many people are unaware of the threats
that they face.
Your organisation must take all reasonable
steps to ensure the personal security of your
employees when they’re working away from the
office.
Securely Transporting Sensitive Items
 The tasks for securely transporting sensitive items fall into four broad
stages:
 Assessing the risks
 Planning security for the item
 Managing the item’s security during travel
 Confirming the item’s safe arrival and wrapping up the process
Event Security
 Before event
To plan an event well, you need to appoint
qualified people to security roles
 consider the threats
 develop a security plan
 inspect possible venues
 manage event preparation
 During the event
As well as overseeing security
arrangements at the event, the event
security officer (ESO) may have to conduct
or oversee many tasks to ensure event
security is well managed.
Communication, awareness, and advice
 After the event
Your event security officer carries out tasks that ensure the event is
wrapped up securely.

More Related Content

What's hot

Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Riskphanleson
 
physical security abdullah hassan al alyani
physical security abdullah hassan al alyaniphysical security abdullah hassan al alyani
physical security abdullah hassan al alyaniAeliani92
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Asset, Threat, Vulnerability, Risk
Asset, Threat, Vulnerability, RiskAsset, Threat, Vulnerability, Risk
Asset, Threat, Vulnerability, RiskVinay Attry
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability Osama Ellahi
 
TycoIS Business Security Tips
TycoIS Business Security TipsTycoIS Business Security Tips
TycoIS Business Security TipsRoy Kisner
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems PolicyAli Sadhik Shaik
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 

What's hot (15)

Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
Become CISSP Certified
Become CISSP CertifiedBecome CISSP Certified
Become CISSP Certified
 
physical security abdullah hassan al alyani
physical security abdullah hassan al alyaniphysical security abdullah hassan al alyani
physical security abdullah hassan al alyani
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Asset, Threat, Vulnerability, Risk
Asset, Threat, Vulnerability, RiskAsset, Threat, Vulnerability, Risk
Asset, Threat, Vulnerability, Risk
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability
 
TycoIS Business Security Tips
TycoIS Business Security TipsTycoIS Business Security Tips
TycoIS Business Security Tips
 
Lecture1 intro to cs
Lecture1 intro to csLecture1 intro to cs
Lecture1 intro to cs
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 

Similar to Risk-Based Physical Security

Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptxSecurity Guards
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Acol Brochure En Us
Acol Brochure En UsAcol Brochure En Us
Acol Brochure En Uscarelanda
 
WOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & SecurityWOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & SecurityVictoria Armstrong
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptelijahj01012
 
Information Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfInformation Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfAhtasham Rao
 
Information Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfInformation Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfJobs Finder Hub
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualDayo Olujekun
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Tom Coyle
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Need to Know - Real Intelligence Training
Need to Know - Real Intelligence TrainingNeed to Know - Real Intelligence Training
Need to Know - Real Intelligence TrainingPaul MCLEAY
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 

Similar to Risk-Based Physical Security (20)

Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Acol Brochure En Us
Acol Brochure En UsAcol Brochure En Us
Acol Brochure En Us
 
WOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & SecurityWOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & Security
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Hotel security
Hotel securityHotel security
Hotel security
 
Information Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfInformation Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdf
 
Information Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfInformation Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdf
 
Hotel security hand book
Hotel security hand bookHotel security hand book
Hotel security hand book
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Need to Know - Real Intelligence Training
Need to Know - Real Intelligence TrainingNeed to Know - Real Intelligence Training
Need to Know - Real Intelligence Training
 
Security in the workplace
Security in the workplaceSecurity in the workplace
Security in the workplace
 
Spec Ops Service Overview
Spec Ops Service OverviewSpec Ops Service Overview
Spec Ops Service Overview
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Personnel security
Personnel securityPersonnel security
Personnel security
 

More from Robin Patras

OutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdfOutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdfRobin Patras
 
Electrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdfElectrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdfRobin Patras
 
Fire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishersFire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishersRobin Patras
 
Five common reasons for the road accident
Five common reasons for the road accidentFive common reasons for the road accident
Five common reasons for the road accidentRobin Patras
 
Security awareness by robin
Security awareness by robinSecurity awareness by robin
Security awareness by robinRobin Patras
 
Untold story of karachi
Untold story of karachiUntold story of karachi
Untold story of karachiRobin Patras
 
Security presentation
Security presentationSecurity presentation
Security presentationRobin Patras
 
Defensive drivers training
Defensive drivers trainingDefensive drivers training
Defensive drivers trainingRobin Patras
 

More from Robin Patras (9)

OutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdfOutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdf
 
Electrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdfElectrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdf
 
Fire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishersFire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishers
 
Congo virus alert
Congo virus alertCongo virus alert
Congo virus alert
 
Five common reasons for the road accident
Five common reasons for the road accidentFive common reasons for the road accident
Five common reasons for the road accident
 
Security awareness by robin
Security awareness by robinSecurity awareness by robin
Security awareness by robin
 
Untold story of karachi
Untold story of karachiUntold story of karachi
Untold story of karachi
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Defensive drivers training
Defensive drivers trainingDefensive drivers training
Defensive drivers training
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Risk-Based Physical Security

  • 1. Take a Risk based approach & managing specific scenario's BY ROBIN GH PATRAS
  • 2. Take a risk based approach  Your organization's unique context and potential threats determine which physical security measures you need.  When you take a risk-based approach, you can ensure your physical security measures are right for your organisation. • Identify what you need to protect • Identify the people, information, physical assets, and functions that you need to protect. Then determine the threats facing your organisation. Include threats within Pakistan and abroad (if you have overseas interests / projects). • You need to fully understand the value and sensitivity of your information and assets to accurately assess your physical security risks.
  • 3. Take a risk based approach Assess the impact of breached security Use the Business Impact Levels (BILs) to assess the potential impact if your people, information, or assets were harmed, compromised, or unavailable. For example:  if customers were aggressive to your people  if your organization's property was stolen  if someone tampered with your security system and gained unauthorized access to your office out of hours  if someone gained unauthorized access to your premises and stole valuable information. For every threat scenario, consider the risks to: • the public • your people, property, operations, reputation, finances, or business processes • Pakistan as a whole.
  • 4. Managing Specific Scenario's  Working away from the office  Securely transporting sensitive items  Event Security • Before Event • During the event • After the Event
  • 5. Working away from the office Consider the situations that your people might face when they are working away from the office. Will they be working at home? In remote-locations? In someone else’s building? Overseas? People are using portable computing and mobile communications devices to work remotely in a variety of ways and places, such as:  taking work home  working in the field  working from vehicles  working from hotels or conference venues  visiting client offices  working while on public transport. Mobile and remote working is now the norm, yet many people are unaware of the threats that they face. Your organisation must take all reasonable steps to ensure the personal security of your employees when they’re working away from the office.
  • 6. Securely Transporting Sensitive Items  The tasks for securely transporting sensitive items fall into four broad stages:  Assessing the risks  Planning security for the item  Managing the item’s security during travel  Confirming the item’s safe arrival and wrapping up the process
  • 7. Event Security  Before event To plan an event well, you need to appoint qualified people to security roles  consider the threats  develop a security plan  inspect possible venues  manage event preparation  During the event As well as overseeing security arrangements at the event, the event security officer (ESO) may have to conduct or oversee many tasks to ensure event security is well managed. Communication, awareness, and advice  After the event Your event security officer carries out tasks that ensure the event is wrapped up securely.

Editor's Notes

  1. United Kingdom Business Impact Levels (BIL), Guidelines & Destruction Procedures Explained An Introduction to Business Impact Levels The Security Policy Framework (SPF) sets out new responsibilities regarding the Protective Security and Risk Management required within Government Departments and Agencies whilst recognising the wider implication for the Commercial Sector which plays an increasingly intimate role within the UK Government matrix, as well as making up the core sectors within the Critical National Infrastructure (energy, water, agriculture, etc). Similarly, organisations such as the National Health Service, Police forces and local Government all handle Government Assets on a regular basis. https://www.shreddingmachines.co.uk/business-impact-levels.asp
  2. Securely transporting sensitive items To protect sensitive items, follow the four stages of secure transportation. The tasks for securely transporting sensitive items fall into four broad stages: assessing the risks planning security before you move the item managing security during the move confirming the item has arrived safely and wrapping up the transport process. 1. Assessing the risks Sensitive items can be transported in several ways. For example, when people in your organisation: carry items with them (by hand or in a bag) work remotely or abroad (for example, from home or a hotel) transport items in a vehicle. Understand the threats you need to manage Whichever way an item is transported, many potential threats exist. For example, an item could be: accidentally lost or damaged stolen by an opportunist theft abandoned because of an emergency taken from a hijacked or stolen vehicle attacked by someone inside your organisation targeted through espionage. Carry out a risk assessment Use a risk assessment to help you understand: the value of the item you need to transport the business impact on your organisation if the item was lost or damaged the likely threats to the item during transport. Based on your assessment, consider which security measures will achieve the best balance between robust security and operational effectiveness. 2. Planning security for the item To plan effectively, answer the following questions. What is the nature of the item? Describe the item’s size, purpose, value, and any significant features that might affect how it is transported. If the item has a security classification with associated security requirements, ensure you include those requirements in your plan. Who is involved? Identify everyone involved in the transport process and what they are responsible for. Will the process involve getting sign-off from a manager, liaising with a courier, or arranging an escort? Who will receive the item when it’s delivered? How and when will the item be moved? Describe how and when the item will be moved. What mode of transport will be used? Which routes will be involved? Are there any waypoints to consider? What is the destination? When is the move happening? Does the intended date and time pose any risks? Consider things like traffic volumes, predicted weather, and major events. What are the likely risks to the item? Based on your risk assessment, consider risks from the local environment and the planned route. What is security like at the sites the item is moving from and to? What is the terrain like on the planned route? Is traffic a concern? Will border security be involved? Which security measures will best protect the item? Detail the security measures you’ll use. Ensure the measures are proportionate to the risks you identified in your assessment, and enable everyone involved to effectively manage the transport process. What are your contingency plans? If the item is compromised, how will you respond to and manage the situation? Do you have alternative transport plans? Does everyone involved know what to do? Make sure you provide the right training and task-specific briefings to the relevant people. They must know how to protect the item and what to do if anything goes wrong. 3. Managing the item’s security during travel Keep the following practices in mind when you’re managing security while items are being moved. Maintain awareness Scan your surroundings and be alert to potential threats, especially when escorting others. Keep a low profile Be discreet. This practice includes the people involved being discreet and the equipment you use to protect an item being discreet. Communicate as planned Be prepared to provide status updates as planned or to call for assistance when you need to. Check your physical security solutions Ensure security solutions are working as intended. For example, solutions designed to mitigate threats such as opportunist theft, forced entry, or covert attempts to gain unauthorised access. 4. Confirming the item’s safe arrival and wrapping up the process Once an item has been transported, you need to: check the item has arrived intact and hasn’t been compromised confirm its delivery with the recipient or owner (for example, with a receipt) You also need to: assess the entire procedure to find out if it was carried out safely (or at least risk-managed) record details of the transfer for auditing purposes.
  3. As well as overseeing security arrangements at the event, the event security officer (ESO) may have to conduct or oversee many tasks to ensure event security is well managed. Communication, awareness, and advice The CSO may need to: liaise with the event manager on communications, command, and control issues maintain awareness of, and consistency with, health and safety requirements provide event attendees and venue employees with security advice, including security and emergency procedures advise attendees of the protective marking of the subject matter and the security arrangements and facilities available (the security classification of topics to be discussed should be displayed at the start of the event and again before each protectively-marked segment of the event). ID and entry control The CSO may need to: ensure accredited attendees are issued access and identity passes, including ensuring identities are verified if necessary control entry to ensure that no unauthorised persons gain access to the building or event, or can observe or listen to proceedings supervise security aspects of visitor control