SlideShare a Scribd company logo
1 of 22
Security Roundtable
Business Strategy, Security Integration, Value for Shareholders
WHAT ARE THE
GOALS FOR
TODAY?
(PROTECTION)
The Concept Physical Security
Systems
 A physical security system is built on the foundation that baseline security and protection
posture are established—based on the local threat, site-specific vulnerabilities, number and
type of critical assets, and employment of available resources.
 To successfully counter threats, physical security systems must be scalable and proportional
to increases in the local threat and designed to employ layered defense in depth.
 Physical security measures are a combination of active and passive systems, devices, and
security forces that are used to protect an asset or facility from possible threat.
These systems and measures include—
1. Barrier systems
2. Security lighting
3. Integrated electronic security systems
4. Access control systems
5. Key and locking systems
6. Security and guard forces
Goal of Physical Security Systems
 The goal of physical security systems is to employ security in-depth to
preclude or reduce the potential for sabotage, theft, trespass, terrorism,
espionage, or other criminal activity.
 To achieve this goal, each security system component has a function and
related measures that provide an integrated capability for—
i. Deterrence
ii. Detection
iii. Assessment.
iv. Delay
v. Response
Deterrence.
 A potential aggressor who perceives a risk of being caught may be
deterred from attacking an asset. The effectiveness of deterrence varies
with the aggressor’s sophistication, the asset’s attractiveness, and the
aggressor’s objective. Although deterrence is not considered a direct
design objective, it may be a result of the design.
Detection.
 A detection measure senses an act of aggression, assesses the validity of
the detection, and communicates the appropriate information to a
response force.
 A detection system must provide all three of these capabilities to be effective.
i. Detection measures may detect an aggressor’s movement via IDSs, or they may detect
weapons and tools via X-ray machines or metal or explosive detectors.
ii. Detection measures may also include access control elements that assess the validity of
identification credentials. These control elements may provide a programmed response
(admission or denial), or they may relay information to a response force.
iii. Guards serve as detection elements, detecting intrusions and controlling access.
 Assessment. Assessment—through the use of video subsystems, patrols,
or fixed posts—assists in localizing and determining the size and intent of
an unauthorized intrusion or activity.
Delay.
 Delay measures protect an asset from aggression by delaying or preventing an
aggressor’s movement toward the asset or by shielding the asset from weapons
and explosives.
 They—
I. Delay aggressors from gaining access by forced entry using tools. These
measures include barriers, along with a response force.
II. Prevent an aggressor’s movement toward an asset. These measures provide
barriers to movement and obscure the line of sight to assets.
III. Protect the asset from the effects of tools, weapons, and explosives.
 Delay measures may be active or passive. Active delay measures are
manually or automatically activated in response to acts of aggression.
Passive delay measures do not depend on detection or a response—for
example, blast-resistant building components and fences. Guards may also
be considered delay measures.
Response.
 Most protective measures depend on response personnel to
assess;
 unauthorized acts,
report detailed information, and
defeat an aggressor.
 Although defeat is not a design objective, defensive and
detection systems must be designed to accommodate (or at
least not interfere with) response force activities.
What Is Meant By A “System”?
 Objectives and scope defined and documented
 Responsibilities assigned and documented
 Procedures in place and documented
 Adequate resources assigned
 Progress periodically measured
 Objectives adjusted accordingly
 Results reviewed with management
 Adequate communication to and from those
involved
SECURITY MANAGEMENT SYSTEM
(COUNTERMEASURES)
 The SMS is used by all Corporate physical security personnel and planners
to standardize the procedures used to conduct physical security
inspections, surveys, planning, and programming.
 The system is a planning tool that presents a coherent view of the physical
security posture for defined areas of responsibility. It provides a
standardized set of risk analysis measurements that are based on risk
management techniques .
 The SMS performs cost benefit analysis; allows the detailed scrutiny of
threats, vulnerability, and loss expectancy; and standardizes the execution
of physical security business processes.
Key Features SMS
Key features SMS the following:
1. Identifies assets and their value.
2. Calculates vulnerabilities.
3. Evaluates risk based on applicable threats.
4. Facilitates the analysis of improvements to security posture.
5. Determines compliance with rules and policies.
6. Recommends corrective actions.
7. Calculates anticipated losses.
8. Performs cost-benefit analysis and return on investment
calculations.
Security Expectations
EVERY security program should deliver the following results:
 Management provides adequate resources, visibility and active participation to
the security program.
 Provide timely, credible information regarding threats.
 Integrate proven best practices into a security system for use by all stakeholders.
Best practices should be continually benchmarked.
 Measure security and controls performance company wide.
 Communicate security expectations to all shareholders and continually reinforce
that “Security is Everybody’s Business”
 Promote functional cooperation to anticipate, prepare for and manage issues that
may escalate into full blown security incidents.
SMS Framework
SAMPLE PWO SECURITY PROGRAM ELEMENTS
XYZ’s security systems will organize security activities into program elements.
The security system provides an organizational framework to develop, maintain
and implement security best practices. Security dept will ensure that corporate
specific security best practices are implemented to protect the organisation’s
people, assets, information and operations.
XYZ’s proposed security system will include the following program elements:
• Leadership
• Threat assessment
• Risk Assessment
• Personnel Protection
• Operations Security
• Information Protection
• Emergency Response and
Management
• Investigation
 Internal, Background & Due
Diligence
• External Relations
 Community Relations
 Government Relations
 Information Management
• Management of Change
The Security Management System provides a common framework for
systems and establishes company expectations for 10 key elements:
BUSINESS CASE
FOR SMS
Business Case For SMS
 Sound SECURITY performance will:
 Reduce losses, frequency of incidents and
disruptions to operations
 Reduce security department & operational costs
 Protect/improve reputation
 Reduce potential liability
 Prepare security staff to meet & exceed
management’s expectations
Business Case For SMS
 Strengthen critical business processes
 Improve security performance in normal
conditions and emergency situations
 Sustain benefits of security investment
 Reinforce prevention focus vs. reactive
approach
 Provide a competitive advantage
How Does SMS Differ From Current?
The current focus is on ad
hoc activity, no integration.
With SMS a Company focus is on
Business Processes:
• Clear Accountability & Continuous
Improvement
WHAT WILL
MAKE IT
SUSTAINABLE
?
What Will Make It Sustainable?
 Senior Management
Demonstrate commitment, provide resources
Actively participate, review security performance
 Business Unit
Set annual security objectives
Make SECURITY everybody’s responsibility
Track implementation progress quarterly
 Individual
Comply with policies and procedures
Report incidents and gaps
Share lessons learned
The End
DISCUSSION
QUESTIONS

More Related Content

What's hot

Toler Resume 2016
Toler Resume 2016Toler Resume 2016
Toler Resume 2016Pat Toler
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Samuel Loomis
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...Jacqueline Fick
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
Security Policies
Security PoliciesSecurity Policies
Security Policiesphanleson
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 

What's hot (20)

Toler Resume 2016
Toler Resume 2016Toler Resume 2016
Toler Resume 2016
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
Notes prep guide
Notes prep guideNotes prep guide
Notes prep guide
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Security policy
Security policySecurity policy
Security policy
 

Viewers also liked

Viewers also liked (8)

Dip bus presentation 29 6 2013
Dip bus presentation 29 6 2013Dip bus presentation 29 6 2013
Dip bus presentation 29 6 2013
 
семінар
семінарсемінар
семінар
 
Team sponsors
Team sponsorsTeam sponsors
Team sponsors
 
Nsap
NsapNsap
Nsap
 
Gsm grafton career evolution seminar
Gsm   grafton career evolution seminarGsm   grafton career evolution seminar
Gsm grafton career evolution seminar
 
ggogohere
ggogohereggogohere
ggogohere
 
CMSI計算科学技術特論C (2015) ALPS と量子多体問題①
CMSI計算科学技術特論C (2015) ALPS と量子多体問題①CMSI計算科学技術特論C (2015) ALPS と量子多体問題①
CMSI計算科学技術特論C (2015) ALPS と量子多体問題①
 
Object-Relational Database Systems(ORDBMSs)
Object-Relational Database Systems(ORDBMSs)Object-Relational Database Systems(ORDBMSs)
Object-Relational Database Systems(ORDBMSs)
 

Similar to 2. Improving an Existing Sec Sys

BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USACompanySeceon
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Managed Security Services — Cyberroot Risk Advisory
Managed Security Services — Cyberroot Risk AdvisoryManaged Security Services — Cyberroot Risk Advisory
Managed Security Services — Cyberroot Risk AdvisoryCR Group
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptxatwine1
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Cybersecurity Services Provider with hex64.docx
Cybersecurity Services Provider with hex64.docxCybersecurity Services Provider with hex64.docx
Cybersecurity Services Provider with hex64.docxHEX64
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCiente
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 

Similar to 2. Improving an Existing Sec Sys (20)

BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Managed Security Services — Cyberroot Risk Advisory
Managed Security Services — Cyberroot Risk AdvisoryManaged Security Services — Cyberroot Risk Advisory
Managed Security Services — Cyberroot Risk Advisory
 
Lecture on Safety Management.pptx
Lecture on Safety Management.pptxLecture on Safety Management.pptx
Lecture on Safety Management.pptx
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Cybersecurity Services Provider with hex64.docx
Cybersecurity Services Provider with hex64.docxCybersecurity Services Provider with hex64.docx
Cybersecurity Services Provider with hex64.docx
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 

2. Improving an Existing Sec Sys

  • 1. Security Roundtable Business Strategy, Security Integration, Value for Shareholders
  • 2. WHAT ARE THE GOALS FOR TODAY? (PROTECTION)
  • 3. The Concept Physical Security Systems  A physical security system is built on the foundation that baseline security and protection posture are established—based on the local threat, site-specific vulnerabilities, number and type of critical assets, and employment of available resources.  To successfully counter threats, physical security systems must be scalable and proportional to increases in the local threat and designed to employ layered defense in depth.  Physical security measures are a combination of active and passive systems, devices, and security forces that are used to protect an asset or facility from possible threat. These systems and measures include— 1. Barrier systems 2. Security lighting 3. Integrated electronic security systems 4. Access control systems 5. Key and locking systems 6. Security and guard forces
  • 4. Goal of Physical Security Systems  The goal of physical security systems is to employ security in-depth to preclude or reduce the potential for sabotage, theft, trespass, terrorism, espionage, or other criminal activity.  To achieve this goal, each security system component has a function and related measures that provide an integrated capability for— i. Deterrence ii. Detection iii. Assessment. iv. Delay v. Response
  • 5. Deterrence.  A potential aggressor who perceives a risk of being caught may be deterred from attacking an asset. The effectiveness of deterrence varies with the aggressor’s sophistication, the asset’s attractiveness, and the aggressor’s objective. Although deterrence is not considered a direct design objective, it may be a result of the design.
  • 6. Detection.  A detection measure senses an act of aggression, assesses the validity of the detection, and communicates the appropriate information to a response force.  A detection system must provide all three of these capabilities to be effective. i. Detection measures may detect an aggressor’s movement via IDSs, or they may detect weapons and tools via X-ray machines or metal or explosive detectors. ii. Detection measures may also include access control elements that assess the validity of identification credentials. These control elements may provide a programmed response (admission or denial), or they may relay information to a response force. iii. Guards serve as detection elements, detecting intrusions and controlling access.  Assessment. Assessment—through the use of video subsystems, patrols, or fixed posts—assists in localizing and determining the size and intent of an unauthorized intrusion or activity.
  • 7. Delay.  Delay measures protect an asset from aggression by delaying or preventing an aggressor’s movement toward the asset or by shielding the asset from weapons and explosives.  They— I. Delay aggressors from gaining access by forced entry using tools. These measures include barriers, along with a response force. II. Prevent an aggressor’s movement toward an asset. These measures provide barriers to movement and obscure the line of sight to assets. III. Protect the asset from the effects of tools, weapons, and explosives.  Delay measures may be active or passive. Active delay measures are manually or automatically activated in response to acts of aggression. Passive delay measures do not depend on detection or a response—for example, blast-resistant building components and fences. Guards may also be considered delay measures.
  • 8. Response.  Most protective measures depend on response personnel to assess;  unauthorized acts, report detailed information, and defeat an aggressor.  Although defeat is not a design objective, defensive and detection systems must be designed to accommodate (or at least not interfere with) response force activities.
  • 9.
  • 10.
  • 11. What Is Meant By A “System”?  Objectives and scope defined and documented  Responsibilities assigned and documented  Procedures in place and documented  Adequate resources assigned  Progress periodically measured  Objectives adjusted accordingly  Results reviewed with management  Adequate communication to and from those involved
  • 12. SECURITY MANAGEMENT SYSTEM (COUNTERMEASURES)  The SMS is used by all Corporate physical security personnel and planners to standardize the procedures used to conduct physical security inspections, surveys, planning, and programming.  The system is a planning tool that presents a coherent view of the physical security posture for defined areas of responsibility. It provides a standardized set of risk analysis measurements that are based on risk management techniques .  The SMS performs cost benefit analysis; allows the detailed scrutiny of threats, vulnerability, and loss expectancy; and standardizes the execution of physical security business processes.
  • 13. Key Features SMS Key features SMS the following: 1. Identifies assets and their value. 2. Calculates vulnerabilities. 3. Evaluates risk based on applicable threats. 4. Facilitates the analysis of improvements to security posture. 5. Determines compliance with rules and policies. 6. Recommends corrective actions. 7. Calculates anticipated losses. 8. Performs cost-benefit analysis and return on investment calculations.
  • 14. Security Expectations EVERY security program should deliver the following results:  Management provides adequate resources, visibility and active participation to the security program.  Provide timely, credible information regarding threats.  Integrate proven best practices into a security system for use by all stakeholders. Best practices should be continually benchmarked.  Measure security and controls performance company wide.  Communicate security expectations to all shareholders and continually reinforce that “Security is Everybody’s Business”  Promote functional cooperation to anticipate, prepare for and manage issues that may escalate into full blown security incidents.
  • 15. SMS Framework SAMPLE PWO SECURITY PROGRAM ELEMENTS XYZ’s security systems will organize security activities into program elements. The security system provides an organizational framework to develop, maintain and implement security best practices. Security dept will ensure that corporate specific security best practices are implemented to protect the organisation’s people, assets, information and operations. XYZ’s proposed security system will include the following program elements: • Leadership • Threat assessment • Risk Assessment • Personnel Protection • Operations Security • Information Protection • Emergency Response and Management • Investigation  Internal, Background & Due Diligence • External Relations  Community Relations  Government Relations  Information Management • Management of Change The Security Management System provides a common framework for systems and establishes company expectations for 10 key elements:
  • 17. Business Case For SMS  Sound SECURITY performance will:  Reduce losses, frequency of incidents and disruptions to operations  Reduce security department & operational costs  Protect/improve reputation  Reduce potential liability  Prepare security staff to meet & exceed management’s expectations
  • 18. Business Case For SMS  Strengthen critical business processes  Improve security performance in normal conditions and emergency situations  Sustain benefits of security investment  Reinforce prevention focus vs. reactive approach  Provide a competitive advantage
  • 19. How Does SMS Differ From Current? The current focus is on ad hoc activity, no integration. With SMS a Company focus is on Business Processes: • Clear Accountability & Continuous Improvement
  • 21. What Will Make It Sustainable?  Senior Management Demonstrate commitment, provide resources Actively participate, review security performance  Business Unit Set annual security objectives Make SECURITY everybody’s responsibility Track implementation progress quarterly  Individual Comply with policies and procedures Report incidents and gaps Share lessons learned