SlideShare ist ein Scribd-Unternehmen logo
1 von 77
Site Surveys It provides a logical and consistent methodology of quantifying and qualifying assets, vulnerabilities, impact and the associated risks Why? Tony Ridley Security Consultant [email_address]
 
Learning Principles What do you retain? ,[object Object],[object Object],[object Object],[object Object]
Risk Management ,[object Object]
[object Object],Risk
Asset ,[object Object]
Impact ,[object Object]
Threat ,[object Object]
Adversary ,[object Object]
Vulnerability ,[object Object]
Countermeasure/s ,[object Object]
Cost-Benefit Analysis ,[object Object]
Stakeholders ,[object Object],[object Object]
Risk Manager /Security Professional ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Manager /Security Professional ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Manager /Security Professional ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Manager /Security Professional ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adversary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Adversary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adversary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adversary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Questions??
Factor Analysis Risk Management Process Flow  Assess Assets Assess Threats Assess Vulnerabilities Determine Countermeasure Options Assess Risks Make Risk Management Decisions Cost Analysis Benefit Analysis 1 5 4 3 2 6
Step 1 Asset Identification Assess Assets Assess Threats Assess Vulnerabilities Determine Countermeasure Options Assess Risks Make Risk Management Decisions 1 5 4 3 2 6 ,[object Object],[object Object],[object Object],[object Object]
Asset Value ,[object Object],[object Object],[object Object],[object Object]
Asset Classification ,[object Object],[object Object],[object Object],[object Object],[object Object]
Centre of Gravity Decisive Points Decisive Points Conditions of  service Wages Pricing Procedures Policy Client  Complaints Vocabulary Equipment Competitor  Actions Image Equipment and  Materials Facilities Information Activities  and  Operations People Centre  of  Gravity
Centre of Gravity Decisive Points Decisive Points Conditions of  service Wages Procedures Policy Client  Complaints Vocabulary Competitor  Actions Adversary Equipment and  Materials Facilities Centre  of  Gravity
Asset/Event Impact Assessment Chart Equipment Facilities Information Activities People Impact Level Consequence of Event Potential Undesirable Events Critical Assets
Impact-Level Decision Matrix Rating ,[object Object],[object Object],[object Object],[object Object]
Impact-Level Decision Matrix Rating ,[object Object],[object Object],Low Indicates little or no impact on human life or the  continuation of operations affecting operational  security or company interests.
Asset/Event Impact Assessment Chart High 2 Theft/ Damage to communications equipment Theft/Damage to transport fleet Equipment Medium 5 Destruction of buildings Damage/Destruction of Power supply Facilities High 3 Theft/Compromise of Classified Information Commercial Espionage Information Medium 4 Disruption to Project/Operations Disruption to Communications Activities Critical 1 Death Assault Accident/Injury/Medical Emergency People Impact Level Consequence of Event Potential Undesirable Events Critical Assets
Impact Level Decision Matrix Low No No No No No Medium No/Yes No/Yes No/Yes No/Yes No/Yes High Yes/No Yes/No Yes/No Yes/No Yes/No Critical Yes Yes Yes Yes Yes Overall Impact Level 5 Destruction of buildings 4 Disruption to Production 3 Theft or compromise of information 2 Damage or theft of  transportation 1 Injury or loss of life
Questions??
Step 2 Threat Identification Assess Assets Assess Threats Assess Vulnerabilities Determine Countermeasure Options Assess Risks Make Risk Management Decisions 1 5 4 3 2 6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threat Categories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adversary Threats-Analysis ,[object Object],[object Object],[object Object]
Adversary Threats-Grouping ,[object Object],[object Object],[object Object],[object Object],[object Object]
Adversary Threats-Motivation ,[object Object],[object Object]
Adversary Threats-Motivation ,[object Object],[object Object]
Adversary Threats-Motivation ,[object Object],[object Object]
Adversary Threats-Motivation ,[object Object],[object Object]
Adversary Threats-Motivation ,[object Object],[object Object]
Adversary Threats-Intent Criminal Employee Terrorist Indicators Wants Needs  INTENT Adversary
Adversary Threats-Capability Community Employee Criminal Terrorist Trashint Dataint Osint Imint Sigint Humint Capabilities Adversary
Adversary Threats-History Employee Community Criminal Terrorist Successful Incidents Attempted Incidents Suspected Incidents History Adversary
Adversary Threat-Tracking Community Employee Criminal Terrorist History (Incidents) Capability (Methods) Intent (Interest/Need) Adversary
Threat Level Decision Matrix Low No Yes or No No Medium Yes or No No Yes High No Yes Yes Critical Yes Yes Yes Threat Level History Capability Intent
Threat Level-Rating Criteria ,[object Object],[object Object],[object Object],[object Object]
Intelligence Cycle Collection Dissemination Direction Processing
Operational Planning ,[object Object],[object Object],[object Object],[object Object],[object Object]
Questions??
Step 3 Vulnerability Identification Assess Assets Assess Threats Assess Vulnerabilities Determine Countermeasure Options Assess Risks Make Risk Management Decisions 1 5 4 3 2 6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Vulnerabilities-General Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Vulnerabilities-Categories ,[object Object],[object Object],[object Object],[object Object],[object Object]
Vulnerabilities-Categories ,[object Object],[object Object],[object Object],[object Object]
Vulnerabilities-Categories ,[object Object],[object Object],[object Object],[object Object]
Vulnerabilities-Existing Countermeasures Low Chain of command Critical Medium Continuous reviews High Vehicle checks Low Medium Security Awareness training Medium Low High Physical Guard force Medium Low Medium Alarms Low Door and locks Critical High Low Direct communication Low High Medium Low Specific training Low Critical High Corrective Policies Low Critical Protective Barriers Community Demonstration Information Theft Physical Attack Terrorist Bomb  Existing Countermeasures
Vulnerability Level Decision Matrix High No Yes No Critical No No No Medium Yes Yes Yes (Multiple) Low Yes Yes Yes (Single) Vulnerability Level Multiple layers of countermeasures Difficult to exploit? Vulnerable through one weakness?
Vulnerability Rating Criteria ,[object Object],[object Object],[object Object],[object Object]
Questions??
Step 4 The Risk Assessment Assess Assets Assess Threats Assess Vulnerabilities Determine Countermeasure Options Assess Risks Make Risk Management Decisions 1 5 4 3 2 6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overall Risk Assessment Destruction of property Fire Theft of goods Loss of equipment Medium Disruption to project / production YES / NO Low Medium Low Medium Low Medium High High Assault Accident / Injury / Medical Emergency Risk Acceptable? Overall Risk Vulnerability Rating Threat Rating Impact Rating Potential Undesirable Events
Questions??
Step 5 Cost-Benefit Analysis Assess Assets Assess Threats Assess Vulnerabilities Determine Countermeasure Options Assess Risks Make Risk Management Decisions 1 5 4 3 2 6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Typical Countermeasures ,[object Object],[object Object],[object Object]
Typical Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Manpower Equipment (Physical / Technical) Procedures
Countermeasures Identification New Risk Level Countermeasures Options Related Vulnerabilities Existing Risk Level Undesirable Events
Cost of Countermeasures Least Expensive Most Expensive COST Manpower Written Procedures Hardware $
Cost of Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures Options Package USD$50,000 High to Medium Overall Risk / Total Cost USD$5,000 High to Medium Community Engagement Sponsorship Community Projects Law Enforcement Liaison Community Unrest USD$15,000 High to Low Policies development Procedure implementation Training Liability  Vehicle / Residence protection Armed assault USD$30,000 Critical to Medium Physical barriers Stand off areas Approach Inhibitors Bombing  Cost Risk Level Reduced From/To Countermeasures Undesirable Events
Risk Management Strategies ,[object Object],[object Object],[object Object],[object Object],[object Object]
Shields’ Site Review Process Client’s Request  for assistance / offer of  services Operations Warning  Order given Review Conducted Site Review Team  dispatched Initial appraisal  conducted Task de-brief and preliminary findings Report Construction Report submitted to Marketing and Management for review Operations feedback  and confirm final draft Present findings Client Review Final Plan implemented
Intelligence Cycle Collection Dissemination Direction Processing
Questions??
Conclusion ,[object Object],[object Object],[object Object],[object Object]
Site Surveys It provides a logical and consistent methodology of quantifying and qualifying assets, vulnerabilities, impact and the associated risks Why? Tony Ridley Security Consultant [email_address]

Weitere ähnliche Inhalte

Was ist angesagt?

Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Trainingworksteadc
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security GuardAmelia White
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019JOEL JESUS SUPAN
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionJOEL JESUS SUPAN
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017brijesh singh
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-PracticesMarco Raposo
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security HotelFaheem Ul Hasan
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 

Was ist angesagt? (20)

Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security Guard
 
Security training module
Security training moduleSecurity training module
Security training module
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019Security Guard Services Best Practices by JMSupan 2019
Security Guard Services Best Practices by JMSupan 2019
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 Edition
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
Physical security
Physical securityPhysical security
Physical security
 
Bomb threat
Bomb threatBomb threat
Bomb threat
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security Hotel
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Physical security
Physical securityPhysical security
Physical security
 

Andere mochten auch

DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasuresthaidn
 
Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalStrong Security Brasil
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesBrian Huff
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignYosuke Sakai
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação CyberpunkOrlando Simões
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogenswarwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldJason Edelstein
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresAmerican Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingpolichen
 

Andere mochten auch (20)

6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
 
Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético Profissional
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best Practices
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction Design
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
 
Apresenta cyber (2)
Apresenta cyber (2)Apresenta cyber (2)
Apresenta cyber (2)
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 

Ähnlich wie Site Surveys Provide Methodology for Asset Risk Assessment

Qualitative AnalysisLearning ObjectivesDiscu.docx
Qualitative AnalysisLearning ObjectivesDiscu.docxQualitative AnalysisLearning ObjectivesDiscu.docx
Qualitative AnalysisLearning ObjectivesDiscu.docxamrit47
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptolusholaJoseph
 
practical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfpractical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfHany Farouk
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptAnkitSharma13479
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptKameswara Rao Poranki
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptnew617824
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptQuỳnh Nhi
 
strategic-risk-management
strategic-risk-management strategic-risk-management
strategic-risk-management dollumehta1
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptaminrahman34
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Managementvikasraina
 
Accident Investigation
Accident InvestigationAccident Investigation
Accident InvestigationMahmoud
 
Accident Investigation
Accident  InvestigationAccident  Investigation
Accident Investigationguest3c045c
 
Risk Identification.ppt
Risk Identification.pptRisk Identification.ppt
Risk Identification.pptAvicenna6
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain managementNishikant Rajeshirke
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxchristinemaritza
 
CAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTCAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTVolunteer Alberta
 

Ähnlich wie Site Surveys Provide Methodology for Asset Risk Assessment (20)

Qualitative AnalysisLearning ObjectivesDiscu.docx
Qualitative AnalysisLearning ObjectivesDiscu.docxQualitative AnalysisLearning ObjectivesDiscu.docx
Qualitative AnalysisLearning ObjectivesDiscu.docx
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdfpractical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management-220318051837.pdf
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
strategic-risk-management
strategic-risk-management strategic-risk-management
strategic-risk-management
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
 
Accident Investigation
Accident InvestigationAccident Investigation
Accident Investigation
 
Accident Investigation
Accident  InvestigationAccident  Investigation
Accident Investigation
 
Risk Identification.ppt
Risk Identification.pptRisk Identification.ppt
Risk Identification.ppt
 
Risk Management in Supply chain management
Risk Management in Supply chain managementRisk Management in Supply chain management
Risk Management in Supply chain management
 
Risk management of supply chain
Risk management of supply chainRisk management of supply chain
Risk management of supply chain
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
CAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTCAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPT
 

Mehr von Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

Mehr von Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Kürzlich hochgeladen

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 

Kürzlich hochgeladen (20)

Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 

Site Surveys Provide Methodology for Asset Risk Assessment

  • 1. Site Surveys It provides a logical and consistent methodology of quantifying and qualifying assets, vulnerabilities, impact and the associated risks Why? Tony Ridley Security Consultant [email_address]
  • 2.  
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23. Factor Analysis Risk Management Process Flow Assess Assets Assess Threats Assess Vulnerabilities Determine Countermeasure Options Assess Risks Make Risk Management Decisions Cost Analysis Benefit Analysis 1 5 4 3 2 6
  • 24.
  • 25.
  • 26.
  • 27. Centre of Gravity Decisive Points Decisive Points Conditions of service Wages Pricing Procedures Policy Client Complaints Vocabulary Equipment Competitor Actions Image Equipment and Materials Facilities Information Activities and Operations People Centre of Gravity
  • 28. Centre of Gravity Decisive Points Decisive Points Conditions of service Wages Procedures Policy Client Complaints Vocabulary Competitor Actions Adversary Equipment and Materials Facilities Centre of Gravity
  • 29. Asset/Event Impact Assessment Chart Equipment Facilities Information Activities People Impact Level Consequence of Event Potential Undesirable Events Critical Assets
  • 30.
  • 31.
  • 32. Asset/Event Impact Assessment Chart High 2 Theft/ Damage to communications equipment Theft/Damage to transport fleet Equipment Medium 5 Destruction of buildings Damage/Destruction of Power supply Facilities High 3 Theft/Compromise of Classified Information Commercial Espionage Information Medium 4 Disruption to Project/Operations Disruption to Communications Activities Critical 1 Death Assault Accident/Injury/Medical Emergency People Impact Level Consequence of Event Potential Undesirable Events Critical Assets
  • 33. Impact Level Decision Matrix Low No No No No No Medium No/Yes No/Yes No/Yes No/Yes No/Yes High Yes/No Yes/No Yes/No Yes/No Yes/No Critical Yes Yes Yes Yes Yes Overall Impact Level 5 Destruction of buildings 4 Disruption to Production 3 Theft or compromise of information 2 Damage or theft of transportation 1 Injury or loss of life
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Adversary Threats-Intent Criminal Employee Terrorist Indicators Wants Needs INTENT Adversary
  • 45. Adversary Threats-Capability Community Employee Criminal Terrorist Trashint Dataint Osint Imint Sigint Humint Capabilities Adversary
  • 46. Adversary Threats-History Employee Community Criminal Terrorist Successful Incidents Attempted Incidents Suspected Incidents History Adversary
  • 47. Adversary Threat-Tracking Community Employee Criminal Terrorist History (Incidents) Capability (Methods) Intent (Interest/Need) Adversary
  • 48. Threat Level Decision Matrix Low No Yes or No No Medium Yes or No No Yes High No Yes Yes Critical Yes Yes Yes Threat Level History Capability Intent
  • 49.
  • 50. Intelligence Cycle Collection Dissemination Direction Processing
  • 51.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. Vulnerabilities-Existing Countermeasures Low Chain of command Critical Medium Continuous reviews High Vehicle checks Low Medium Security Awareness training Medium Low High Physical Guard force Medium Low Medium Alarms Low Door and locks Critical High Low Direct communication Low High Medium Low Specific training Low Critical High Corrective Policies Low Critical Protective Barriers Community Demonstration Information Theft Physical Attack Terrorist Bomb Existing Countermeasures
  • 59. Vulnerability Level Decision Matrix High No Yes No Critical No No No Medium Yes Yes Yes (Multiple) Low Yes Yes Yes (Single) Vulnerability Level Multiple layers of countermeasures Difficult to exploit? Vulnerable through one weakness?
  • 60.
  • 62.
  • 63. Overall Risk Assessment Destruction of property Fire Theft of goods Loss of equipment Medium Disruption to project / production YES / NO Low Medium Low Medium Low Medium High High Assault Accident / Injury / Medical Emergency Risk Acceptable? Overall Risk Vulnerability Rating Threat Rating Impact Rating Potential Undesirable Events
  • 65.
  • 66.
  • 67.
  • 68. Countermeasures Identification New Risk Level Countermeasures Options Related Vulnerabilities Existing Risk Level Undesirable Events
  • 69. Cost of Countermeasures Least Expensive Most Expensive COST Manpower Written Procedures Hardware $
  • 70.
  • 71. Countermeasures Options Package USD$50,000 High to Medium Overall Risk / Total Cost USD$5,000 High to Medium Community Engagement Sponsorship Community Projects Law Enforcement Liaison Community Unrest USD$15,000 High to Low Policies development Procedure implementation Training Liability Vehicle / Residence protection Armed assault USD$30,000 Critical to Medium Physical barriers Stand off areas Approach Inhibitors Bombing Cost Risk Level Reduced From/To Countermeasures Undesirable Events
  • 72.
  • 73. Shields’ Site Review Process Client’s Request for assistance / offer of services Operations Warning Order given Review Conducted Site Review Team dispatched Initial appraisal conducted Task de-brief and preliminary findings Report Construction Report submitted to Marketing and Management for review Operations feedback and confirm final draft Present findings Client Review Final Plan implemented
  • 74. Intelligence Cycle Collection Dissemination Direction Processing
  • 76.
  • 77. Site Surveys It provides a logical and consistent methodology of quantifying and qualifying assets, vulnerabilities, impact and the associated risks Why? Tony Ridley Security Consultant [email_address]