SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
©	Margolis	Healy	
Building and Assessing
Your Physical Security
Program
National Center for Campus Public Safety
September 19, 2017
©	Margolis	Healy	
Introductions
Daniel R. Pascale, CPP
Managing Director
Margolis Healy and Associates
dpascale@margolishealy.com
262-527-1332 direct
2
©	Margolis	Healy	
What is a Physical Security Program?
•  Define your physical security program?
- “We have 200 cameras”
- “We have card swipes”
- “We have blue light phones”
While each of these are relevant to physical security, they are only
parts to a more comprehensive program.
•  Your physical security program should highlight
the interrelationships between many elements
including: People, Policies, Standards, Equipment,
Response, Education, etc.
3
©	Margolis	Healy	
What is a Physical Security Program?
4
Physical	
Security	
Program	
Security	
Cameras	
Access	
Control	
Alarm	
Monitoring	
CPTED	
Ligh<ng	
Way-Finding	
Policy	&	
Standards	
Emergency	
Communica<on	
Safety	
Walks	
Surveys	
Con<nuous	
Improvement	
Force	
Mul<plica<on	
Crime	
Preven<on	
Programs	
	
Systems	
Automa<on	
	
Post	Incident	
Inves<ga<on	
Sustainability	Program	
Management
©	Margolis	Healy	
Understand Your Campus
5
•  Paint the Picture
- Type of Campus (Urban, Rural, Suburban, etc.)
- Daytime/Evening Population (Time of Year)
- Unique Infrastructure
- Reasonable Risks
- High Risk Areas and Behaviors
- Primary Areas of Study
- Climate
- Environmental Factors
- Campus History
©	Margolis	Healy	
Challenges (Vision Killers)
•  Culture
-  Resistance to Change (This is how we’ve always done it)
•  Budget
-  “Who’s going to pay for all this”?
•  Disparate/Legacy Systems
-  Multiple Systems, Integration, “Outdated Technology”
•  Technical Knowledge/Resources
-  Reliance on Others
•  Vendor Management
-  Developing RFP’s, Contracts, Project Management
6
©	Margolis	Healy	
Getting Started
“Begin with the end in Mind” – Stephen Covey
- What is the goal of your physical security program? What
problem are you trying to solve?
§ Crime Prevention
§ Force Multiplication/Reduction
§ Process Automation
§ Record Keeping
- When you know your goals, you can begin to assess the
programs effectiveness and identify gaps.
- There is no one size fits all solution.
- Because a peer institution has 1,000 cameras doesn’t
mean your institution should.
7
©	Margolis	Healy	
Conduct An Assessment
Conducting a Campus-Wide Assessment
- Determine if this will be done internally or external
- Think globally and develop a committee w/partners
§  Facilities/Physical Plant
§  Information Technology
§  Student/Residence Life/Housing
§  Athletics
§  Faculty/Staff Representation
§  Student Groups
8
©	Margolis	Healy	
Outside In/Inside Out
9
•  Security (Protection) In Depth
- Campus/Grounds Boundaries
- Parking Areas
- Campus Connections
- Individual Facilities
- High Risk Areas
©	Margolis	Healy	
Understanding Your Facilities
Earlier I mentioned understanding your
campus & this extends to your buildings;
- How are facilities used?
- By whom?
- During what hours?
- What high risk areas exist and what special
countermeasures are reasonable?
10
©	Margolis	Healy	
Quick Quiz
•  Given this information, are you effectively
addressing the following to reach your
goals?
- Perimeter Security
§  Way-Finding Signage
§  Clear lines of sight?
§  Windows (accessibility, type)
11
©	Margolis	Healy	
Understanding Your Facilities
•  Access Control/Visitor Management
- How are we controlling access?
§  Mechanical
§  Electric
§  Policies (Key Control, Host Meets Guest, Visual
ID)
- Number of Ingress Points?
- Controlled or Secured Access
- Office/Classroom Locks
12
©	Margolis	Healy	
Understanding Your Facilities
•  Security Systems & Technology
•  Cameras
•  Electronic Access
•  Alarms
•  Emergency Communication Systems
- Emergency Phones
- Public Address
- Fire Systems
13
©	Margolis	Healy	
Understanding Your Facilities
•  High Risk Areas (Special Considerations)
- Science/Chemistry Labs
- Cash Handling Areas
- Residential Facilities
- Libraries
- Museums/Special Collections
- Athletic Facilities and Other Mass
Gathering Areas
14
©	Margolis	Healy	
Policies & Standards
Do you have the right policies and standards in
place to guide your program?
- Facility Design Standards
- Equipment Standards
- Records Retention
- Quality Assurance
- Supporting Policy
§  Acceptable Use
§  Roles & Responsibilities
§  Purpose
15
©	Margolis	Healy	
Management
Who is managing your physical security program?
•  Physical security programs are typically managed
by a single “business owner” or champion
- Developing and maintaining a program is a
collaborative effort across department lines
- Can live in many different functional areas
- Requires subject matter expertise
- Collaboration
- Vendor management
- Project management
16
©	Margolis	Healy	
Sustainability
•  How will you pay tomorrow for what you
have today?
- State of the industry
- Equipment failure
- Emerging threats
•  Options
•  Capital funding (operational increases)
•  Department direct funding
•  Chargebacks (pass through)
•  Chargebacks with fees*
17
©	Margolis	Healy	
Putting it all Together
•  Define what your physical security program is?
•  Understand your campus/institution and its
uniqueness, reasonable threats, and resources
•  Determine your program goals
•  Understand and prepare for challenges
•  Conduct a campus-wide assessment
•  Establish/maintain policies & standards
•  Be collaborative in managing program
•  Consider program sustainability as threats and
technology change & equipment begins to fail
18
©	Margolis	Healy	
Putting it all Together
19
©	Margolis	Healy	
Stay Connected With Us
@margolishealy!
www.facebook.com/margolishealy!
www.linkedin.com/company/margolis-healy-&-associates!
www.slideshare.net/margolishealy!
www.nccpsafety.org
20
www.margolishealy.com
www.nccpsafety.org
info@nccpsafety.org
1.866.817.5817
www.bja.gov

Mais conteúdo relacionado

Mais procurados

Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk ManagementAsad Hameed
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right postureParag Deodhar
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Anshu Gupta
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architectureMubashirAslam5
 
SWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxSWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxMdMofijulHaque
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 

Mais procurados (20)

Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Risk Culture
Risk CultureRisk Culture
Risk Culture
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
SWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxSWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptx
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 

Semelhante a Building and Assessing Your Physical Security Program

VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote Margolis Healy
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMargolis Healy
 
SSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy PresentationSSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy PresentationSocial Sentinel
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance programRaoul Miller
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointbradleyl2
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012Margolis Healy
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Margolis Healy
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceMargolis Healy
 
2021FSAConfSession22.pptx
2021FSAConfSession22.pptx2021FSAConfSession22.pptx
2021FSAConfSession22.pptxssuser4102fa
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Sec 270 02 sect 01v1
Sec 270 02 sect 01v1Sec 270 02 sect 01v1
Sec 270 02 sect 01v1wchend
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022Nimonik
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptxVITNetflix
 

Semelhante a Building and Assessing Your Physical Security Program (20)

VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy Presentation
 
SSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy PresentationSSI USAA 2014 Summer Academy Presentation
SSI USAA 2014 Summer Academy Presentation
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance program
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues Conference
 
2021FSAConfSession22.pptx
2021FSAConfSession22.pptx2021FSAConfSession22.pptx
2021FSAConfSession22.pptx
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Sec 270 02 sect 01v1
Sec 270 02 sect 01v1Sec 270 02 sect 01v1
Sec 270 02 sect 01v1
 
Build a business case for compliance March 2022
Build a business case for compliance March 2022Build a business case for compliance March 2022
Build a business case for compliance March 2022
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
The Armed Robbery Epidemic: How to Stay Safe
The Armed Robbery Epidemic: How to Stay SafeThe Armed Robbery Epidemic: How to Stay Safe
The Armed Robbery Epidemic: How to Stay Safe
 

Mais de National Center for Campus Public Safety

Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...National Center for Campus Public Safety
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationNational Center for Campus Public Safety
 

Mais de National Center for Campus Public Safety (20)

Remaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX RegulationsRemaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
 
Get to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International StudentsGet to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International Students
 
Campus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&ACampus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&A
 
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
 
Reunification Planning: The Next Step
Reunification Planning: The Next StepReunification Planning: The Next Step
Reunification Planning: The Next Step
 
Unmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on CampusUnmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on Campus
 
The Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School AttacksThe Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School Attacks
 
Next Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment TeamsNext Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment Teams
 
Hazing Prevention: A Call to Action
Hazing Prevention: A Call to ActionHazing Prevention: A Call to Action
Hazing Prevention: A Call to Action
 
Human Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to KnowHuman Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to Know
 
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher Education
 
Handling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on CampusHandling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on Campus
 
Legalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College CampusesLegalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College Campuses
 
Bystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of InterventionBystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of Intervention
 
Violence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged SituationsViolence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged Situations
 
Top 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IXTop 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IX
 
Ten Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental HealthTen Years After Virginia Tech: Impacts on Campus Mental Health
Ten Years After Virginia Tech: Impacts on Campus Mental Health
 
Designing Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED PrimerDesigning Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED Primer
 

Último

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Building and Assessing Your Physical Security Program

  • 1.
  • 2. © Margolis Healy Building and Assessing Your Physical Security Program National Center for Campus Public Safety September 19, 2017
  • 3. © Margolis Healy Introductions Daniel R. Pascale, CPP Managing Director Margolis Healy and Associates dpascale@margolishealy.com 262-527-1332 direct 2
  • 4. © Margolis Healy What is a Physical Security Program? •  Define your physical security program? - “We have 200 cameras” - “We have card swipes” - “We have blue light phones” While each of these are relevant to physical security, they are only parts to a more comprehensive program. •  Your physical security program should highlight the interrelationships between many elements including: People, Policies, Standards, Equipment, Response, Education, etc. 3
  • 5. © Margolis Healy What is a Physical Security Program? 4 Physical Security Program Security Cameras Access Control Alarm Monitoring CPTED Ligh<ng Way-Finding Policy & Standards Emergency Communica<on Safety Walks Surveys Con<nuous Improvement Force Mul<plica<on Crime Preven<on Programs Systems Automa<on Post Incident Inves<ga<on Sustainability Program Management
  • 6. © Margolis Healy Understand Your Campus 5 •  Paint the Picture - Type of Campus (Urban, Rural, Suburban, etc.) - Daytime/Evening Population (Time of Year) - Unique Infrastructure - Reasonable Risks - High Risk Areas and Behaviors - Primary Areas of Study - Climate - Environmental Factors - Campus History
  • 7. © Margolis Healy Challenges (Vision Killers) •  Culture -  Resistance to Change (This is how we’ve always done it) •  Budget -  “Who’s going to pay for all this”? •  Disparate/Legacy Systems -  Multiple Systems, Integration, “Outdated Technology” •  Technical Knowledge/Resources -  Reliance on Others •  Vendor Management -  Developing RFP’s, Contracts, Project Management 6
  • 8. © Margolis Healy Getting Started “Begin with the end in Mind” – Stephen Covey - What is the goal of your physical security program? What problem are you trying to solve? § Crime Prevention § Force Multiplication/Reduction § Process Automation § Record Keeping - When you know your goals, you can begin to assess the programs effectiveness and identify gaps. - There is no one size fits all solution. - Because a peer institution has 1,000 cameras doesn’t mean your institution should. 7
  • 9. © Margolis Healy Conduct An Assessment Conducting a Campus-Wide Assessment - Determine if this will be done internally or external - Think globally and develop a committee w/partners §  Facilities/Physical Plant §  Information Technology §  Student/Residence Life/Housing §  Athletics §  Faculty/Staff Representation §  Student Groups 8
  • 10. © Margolis Healy Outside In/Inside Out 9 •  Security (Protection) In Depth - Campus/Grounds Boundaries - Parking Areas - Campus Connections - Individual Facilities - High Risk Areas
  • 11. © Margolis Healy Understanding Your Facilities Earlier I mentioned understanding your campus & this extends to your buildings; - How are facilities used? - By whom? - During what hours? - What high risk areas exist and what special countermeasures are reasonable? 10
  • 12. © Margolis Healy Quick Quiz •  Given this information, are you effectively addressing the following to reach your goals? - Perimeter Security §  Way-Finding Signage §  Clear lines of sight? §  Windows (accessibility, type) 11
  • 13. © Margolis Healy Understanding Your Facilities •  Access Control/Visitor Management - How are we controlling access? §  Mechanical §  Electric §  Policies (Key Control, Host Meets Guest, Visual ID) - Number of Ingress Points? - Controlled or Secured Access - Office/Classroom Locks 12
  • 14. © Margolis Healy Understanding Your Facilities •  Security Systems & Technology •  Cameras •  Electronic Access •  Alarms •  Emergency Communication Systems - Emergency Phones - Public Address - Fire Systems 13
  • 15. © Margolis Healy Understanding Your Facilities •  High Risk Areas (Special Considerations) - Science/Chemistry Labs - Cash Handling Areas - Residential Facilities - Libraries - Museums/Special Collections - Athletic Facilities and Other Mass Gathering Areas 14
  • 16. © Margolis Healy Policies & Standards Do you have the right policies and standards in place to guide your program? - Facility Design Standards - Equipment Standards - Records Retention - Quality Assurance - Supporting Policy §  Acceptable Use §  Roles & Responsibilities §  Purpose 15
  • 17. © Margolis Healy Management Who is managing your physical security program? •  Physical security programs are typically managed by a single “business owner” or champion - Developing and maintaining a program is a collaborative effort across department lines - Can live in many different functional areas - Requires subject matter expertise - Collaboration - Vendor management - Project management 16
  • 18. © Margolis Healy Sustainability •  How will you pay tomorrow for what you have today? - State of the industry - Equipment failure - Emerging threats •  Options •  Capital funding (operational increases) •  Department direct funding •  Chargebacks (pass through) •  Chargebacks with fees* 17
  • 19. © Margolis Healy Putting it all Together •  Define what your physical security program is? •  Understand your campus/institution and its uniqueness, reasonable threats, and resources •  Determine your program goals •  Understand and prepare for challenges •  Conduct a campus-wide assessment •  Establish/maintain policies & standards •  Be collaborative in managing program •  Consider program sustainability as threats and technology change & equipment begins to fail 18
  • 21. © Margolis Healy Stay Connected With Us @margolishealy! www.facebook.com/margolishealy! www.linkedin.com/company/margolis-healy-&-associates! www.slideshare.net/margolishealy! www.nccpsafety.org 20