SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
©	Margolis	Healy	
Building and Assessing
Your Physical Security
Program
National Center for Campus Public Safety
September 19, 2017
©	Margolis	Healy	
Introductions
Daniel R. Pascale, CPP
Managing Director
Margolis Healy and Associates
dpascale@margolishealy.com
262-527-1332 direct
2
©	Margolis	Healy	
What is a Physical Security Program?
•  Define your physical security program?
- “We have 200 cameras”
- “We have card swipes”
- “We have blue light phones”
While each of these are relevant to physical security, they are only
parts to a more comprehensive program.
•  Your physical security program should highlight
the interrelationships between many elements
including: People, Policies, Standards, Equipment,
Response, Education, etc.
3
©	Margolis	Healy	
What is a Physical Security Program?
4
Physical	
Security	
Program	
Security	
Cameras	
Access	
Control	
Alarm	
Monitoring	
CPTED	
Ligh<ng	
Way-Finding	
Policy	&	
Standards	
Emergency	
Communica<on	
Safety	
Walks	
Surveys	
Con<nuous	
Improvement	
Force	
Mul<plica<on	
Crime	
Preven<on	
Programs	
	
Systems	
Automa<on	
	
Post	Incident	
Inves<ga<on	
Sustainability	Program	
Management
©	Margolis	Healy	
Understand Your Campus
5
•  Paint the Picture
- Type of Campus (Urban, Rural, Suburban, etc.)
- Daytime/Evening Population (Time of Year)
- Unique Infrastructure
- Reasonable Risks
- High Risk Areas and Behaviors
- Primary Areas of Study
- Climate
- Environmental Factors
- Campus History
©	Margolis	Healy	
Challenges (Vision Killers)
•  Culture
-  Resistance to Change (This is how we’ve always done it)
•  Budget
-  “Who’s going to pay for all this”?
•  Disparate/Legacy Systems
-  Multiple Systems, Integration, “Outdated Technology”
•  Technical Knowledge/Resources
-  Reliance on Others
•  Vendor Management
-  Developing RFP’s, Contracts, Project Management
6
©	Margolis	Healy	
Getting Started
“Begin with the end in Mind” – Stephen Covey
- What is the goal of your physical security program? What
problem are you trying to solve?
§ Crime Prevention
§ Force Multiplication/Reduction
§ Process Automation
§ Record Keeping
- When you know your goals, you can begin to assess the
programs effectiveness and identify gaps.
- There is no one size fits all solution.
- Because a peer institution has 1,000 cameras doesn’t
mean your institution should.
7
©	Margolis	Healy	
Conduct An Assessment
Conducting a Campus-Wide Assessment
- Determine if this will be done internally or external
- Think globally and develop a committee w/partners
§  Facilities/Physical Plant
§  Information Technology
§  Student/Residence Life/Housing
§  Athletics
§  Faculty/Staff Representation
§  Student Groups
8
©	Margolis	Healy	
Outside In/Inside Out
9
•  Security (Protection) In Depth
- Campus/Grounds Boundaries
- Parking Areas
- Campus Connections
- Individual Facilities
- High Risk Areas
©	Margolis	Healy	
Understanding Your Facilities
Earlier I mentioned understanding your
campus & this extends to your buildings;
- How are facilities used?
- By whom?
- During what hours?
- What high risk areas exist and what special
countermeasures are reasonable?
10
©	Margolis	Healy	
Quick Quiz
•  Given this information, are you effectively
addressing the following to reach your
goals?
- Perimeter Security
§  Way-Finding Signage
§  Clear lines of sight?
§  Windows (accessibility, type)
11
©	Margolis	Healy	
Understanding Your Facilities
•  Access Control/Visitor Management
- How are we controlling access?
§  Mechanical
§  Electric
§  Policies (Key Control, Host Meets Guest, Visual
ID)
- Number of Ingress Points?
- Controlled or Secured Access
- Office/Classroom Locks
12
©	Margolis	Healy	
Understanding Your Facilities
•  Security Systems & Technology
•  Cameras
•  Electronic Access
•  Alarms
•  Emergency Communication Systems
- Emergency Phones
- Public Address
- Fire Systems
13
©	Margolis	Healy	
Understanding Your Facilities
•  High Risk Areas (Special Considerations)
- Science/Chemistry Labs
- Cash Handling Areas
- Residential Facilities
- Libraries
- Museums/Special Collections
- Athletic Facilities and Other Mass
Gathering Areas
14
©	Margolis	Healy	
Policies & Standards
Do you have the right policies and standards in
place to guide your program?
- Facility Design Standards
- Equipment Standards
- Records Retention
- Quality Assurance
- Supporting Policy
§  Acceptable Use
§  Roles & Responsibilities
§  Purpose
15
©	Margolis	Healy	
Management
Who is managing your physical security program?
•  Physical security programs are typically managed
by a single “business owner” or champion
- Developing and maintaining a program is a
collaborative effort across department lines
- Can live in many different functional areas
- Requires subject matter expertise
- Collaboration
- Vendor management
- Project management
16
©	Margolis	Healy	
Sustainability
•  How will you pay tomorrow for what you
have today?
- State of the industry
- Equipment failure
- Emerging threats
•  Options
•  Capital funding (operational increases)
•  Department direct funding
•  Chargebacks (pass through)
•  Chargebacks with fees*
17
©	Margolis	Healy	
Putting it all Together
•  Define what your physical security program is?
•  Understand your campus/institution and its
uniqueness, reasonable threats, and resources
•  Determine your program goals
•  Understand and prepare for challenges
•  Conduct a campus-wide assessment
•  Establish/maintain policies & standards
•  Be collaborative in managing program
•  Consider program sustainability as threats and
technology change & equipment begins to fail
18
©	Margolis	Healy	
Putting it all Together
19
©	Margolis	Healy	
Stay Connected With Us
@margolishealy!
www.facebook.com/margolishealy!
www.linkedin.com/company/margolis-healy-&-associates!
www.slideshare.net/margolishealy!
www.nccpsafety.org
20
www.margolishealy.com
www.nccpsafety.org
info@nccpsafety.org
1.866.817.5817
www.bja.gov

Weitere ähnliche Inhalte

Was ist angesagt?

Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesLearningwithRayYT
 
2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdf2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdfHamisi Mohamedi
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929Andy Willams
 
Safety Management Systems (SMS) Fundamentals: Framework Guidance
Safety Management Systems (SMS) Fundamentals: Framework GuidanceSafety Management Systems (SMS) Fundamentals: Framework Guidance
Safety Management Systems (SMS) Fundamentals: Framework GuidanceFAA Safety Team Central Florida
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Business research rationale on disaster preparedness
Business research rationale on disaster preparednessBusiness research rationale on disaster preparedness
Business research rationale on disaster preparednessSittiJhoe MG
 
Seguridad de edificios control de acccesos
Seguridad de edificios  control de acccesosSeguridad de edificios  control de acccesos
Seguridad de edificios control de acccesososwaldo chomba
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionJOEL JESUS SUPAN
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015AFCEA International
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 

Was ist angesagt? (20)

Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 
Chapter 2 (crisis management)
Chapter 2 (crisis management)Chapter 2 (crisis management)
Chapter 2 (crisis management)
 
2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdf2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdf
 
Ics
IcsIcs
Ics
 
business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929business-continuity-management-awareness-presentation-for-mampu2929
business-continuity-management-awareness-presentation-for-mampu2929
 
Safety Management Systems (SMS) Fundamentals: Framework Guidance
Safety Management Systems (SMS) Fundamentals: Framework GuidanceSafety Management Systems (SMS) Fundamentals: Framework Guidance
Safety Management Systems (SMS) Fundamentals: Framework Guidance
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Business research rationale on disaster preparedness
Business research rationale on disaster preparednessBusiness research rationale on disaster preparedness
Business research rationale on disaster preparedness
 
Seguridad de edificios control de acccesos
Seguridad de edificios  control de acccesosSeguridad de edificios  control de acccesos
Seguridad de edificios control de acccesos
 
BBS Training.pptx
BBS Training.pptxBBS Training.pptx
BBS Training.pptx
 
Access control
Access controlAccess control
Access control
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 Edition
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 

Ähnlich wie Building and Assessing Your Physical Security Program

VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote Margolis Healy
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMargolis Healy
 
SSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy PresentationSSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy PresentationSocial Sentinel
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance programRaoul Miller
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointbradleyl2
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012Margolis Healy
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Margolis Healy
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceMargolis Healy
 
2021FSAConfSession22.pptx
2021FSAConfSession22.pptx2021FSAConfSession22.pptx
2021FSAConfSession22.pptxssuser4102fa
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Sec 270 02 sect 01v1
Sec 270 02 sect 01v1Sec 270 02 sect 01v1
Sec 270 02 sect 01v1wchend
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022Nimonik
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptxVITNetflix
 

Ähnlich wie Building and Assessing Your Physical Security Program (20)

VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy Presentation
 
SSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy PresentationSSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy Presentation
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance program
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues Conference
 
2021FSAConfSession22.pptx
2021FSAConfSession22.pptx2021FSAConfSession22.pptx
2021FSAConfSession22.pptx
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Sec 270 02 sect 01v1
Sec 270 02 sect 01v1Sec 270 02 sect 01v1
Sec 270 02 sect 01v1
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
The Armed Robbery Epidemic: How to Stay Safe
The Armed Robbery Epidemic: How to Stay SafeThe Armed Robbery Epidemic: How to Stay Safe
The Armed Robbery Epidemic: How to Stay Safe
 

Mehr von National Center for Campus Public Safety

Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...National Center for Campus Public Safety
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationNational Center for Campus Public Safety
 

Mehr von National Center for Campus Public Safety (20)

Remaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX RegulationsRemaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
 
Get to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International StudentsGet to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International Students
 
Campus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&ACampus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&A
 
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
 
Reunification Planning: The Next Step
Reunification Planning: The Next StepReunification Planning: The Next Step
Reunification Planning: The Next Step
 
Unmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on CampusUnmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on Campus
 
The Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School AttacksThe Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School Attacks
 
Next Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment TeamsNext Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment Teams
 
Hazing Prevention: A Call to Action
Hazing Prevention: A Call to ActionHazing Prevention: A Call to Action
Hazing Prevention: A Call to Action
 
Human Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to KnowHuman Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to Know
 
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher Education
 
Handling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on CampusHandling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on Campus
 
Legalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College CampusesLegalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College Campuses
 
Bystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of InterventionBystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of Intervention
 
Violence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged SituationsViolence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged Situations
 
Top 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IXTop 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IX
 
Ten Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental HealthTen Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental Health
 
Designing Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED PrimerDesigning Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED Primer
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Building and Assessing Your Physical Security Program

  • 1.
  • 2. © Margolis Healy Building and Assessing Your Physical Security Program National Center for Campus Public Safety September 19, 2017
  • 3. © Margolis Healy Introductions Daniel R. Pascale, CPP Managing Director Margolis Healy and Associates dpascale@margolishealy.com 262-527-1332 direct 2
  • 4. © Margolis Healy What is a Physical Security Program? •  Define your physical security program? - “We have 200 cameras” - “We have card swipes” - “We have blue light phones” While each of these are relevant to physical security, they are only parts to a more comprehensive program. •  Your physical security program should highlight the interrelationships between many elements including: People, Policies, Standards, Equipment, Response, Education, etc. 3
  • 5. © Margolis Healy What is a Physical Security Program? 4 Physical Security Program Security Cameras Access Control Alarm Monitoring CPTED Ligh<ng Way-Finding Policy & Standards Emergency Communica<on Safety Walks Surveys Con<nuous Improvement Force Mul<plica<on Crime Preven<on Programs Systems Automa<on Post Incident Inves<ga<on Sustainability Program Management
  • 6. © Margolis Healy Understand Your Campus 5 •  Paint the Picture - Type of Campus (Urban, Rural, Suburban, etc.) - Daytime/Evening Population (Time of Year) - Unique Infrastructure - Reasonable Risks - High Risk Areas and Behaviors - Primary Areas of Study - Climate - Environmental Factors - Campus History
  • 7. © Margolis Healy Challenges (Vision Killers) •  Culture -  Resistance to Change (This is how we’ve always done it) •  Budget -  “Who’s going to pay for all this”? •  Disparate/Legacy Systems -  Multiple Systems, Integration, “Outdated Technology” •  Technical Knowledge/Resources -  Reliance on Others •  Vendor Management -  Developing RFP’s, Contracts, Project Management 6
  • 8. © Margolis Healy Getting Started “Begin with the end in Mind” – Stephen Covey - What is the goal of your physical security program? What problem are you trying to solve? § Crime Prevention § Force Multiplication/Reduction § Process Automation § Record Keeping - When you know your goals, you can begin to assess the programs effectiveness and identify gaps. - There is no one size fits all solution. - Because a peer institution has 1,000 cameras doesn’t mean your institution should. 7
  • 9. © Margolis Healy Conduct An Assessment Conducting a Campus-Wide Assessment - Determine if this will be done internally or external - Think globally and develop a committee w/partners §  Facilities/Physical Plant §  Information Technology §  Student/Residence Life/Housing §  Athletics §  Faculty/Staff Representation §  Student Groups 8
  • 10. © Margolis Healy Outside In/Inside Out 9 •  Security (Protection) In Depth - Campus/Grounds Boundaries - Parking Areas - Campus Connections - Individual Facilities - High Risk Areas
  • 11. © Margolis Healy Understanding Your Facilities Earlier I mentioned understanding your campus & this extends to your buildings; - How are facilities used? - By whom? - During what hours? - What high risk areas exist and what special countermeasures are reasonable? 10
  • 12. © Margolis Healy Quick Quiz •  Given this information, are you effectively addressing the following to reach your goals? - Perimeter Security §  Way-Finding Signage §  Clear lines of sight? §  Windows (accessibility, type) 11
  • 13. © Margolis Healy Understanding Your Facilities •  Access Control/Visitor Management - How are we controlling access? §  Mechanical §  Electric §  Policies (Key Control, Host Meets Guest, Visual ID) - Number of Ingress Points? - Controlled or Secured Access - Office/Classroom Locks 12
  • 14. © Margolis Healy Understanding Your Facilities •  Security Systems & Technology •  Cameras •  Electronic Access •  Alarms •  Emergency Communication Systems - Emergency Phones - Public Address - Fire Systems 13
  • 15. © Margolis Healy Understanding Your Facilities •  High Risk Areas (Special Considerations) - Science/Chemistry Labs - Cash Handling Areas - Residential Facilities - Libraries - Museums/Special Collections - Athletic Facilities and Other Mass Gathering Areas 14
  • 16. © Margolis Healy Policies & Standards Do you have the right policies and standards in place to guide your program? - Facility Design Standards - Equipment Standards - Records Retention - Quality Assurance - Supporting Policy §  Acceptable Use §  Roles & Responsibilities §  Purpose 15
  • 17. © Margolis Healy Management Who is managing your physical security program? •  Physical security programs are typically managed by a single “business owner” or champion - Developing and maintaining a program is a collaborative effort across department lines - Can live in many different functional areas - Requires subject matter expertise - Collaboration - Vendor management - Project management 16
  • 18. © Margolis Healy Sustainability •  How will you pay tomorrow for what you have today? - State of the industry - Equipment failure - Emerging threats •  Options •  Capital funding (operational increases) •  Department direct funding •  Chargebacks (pass through) •  Chargebacks with fees* 17
  • 19. © Margolis Healy Putting it all Together •  Define what your physical security program is? •  Understand your campus/institution and its uniqueness, reasonable threats, and resources •  Determine your program goals •  Understand and prepare for challenges •  Conduct a campus-wide assessment •  Establish/maintain policies & standards •  Be collaborative in managing program •  Consider program sustainability as threats and technology change & equipment begins to fail 18
  • 21. © Margolis Healy Stay Connected With Us @margolishealy! www.facebook.com/margolishealy! www.linkedin.com/company/margolis-healy-&-associates! www.slideshare.net/margolishealy! www.nccpsafety.org 20