Professional Documents
Culture Documents
Beverly Roach
Associate Faculty
Security Risk Assessment Process
Context Analysis
What do we do?
Mitigation Measures
Today’s discussions
• Protection in Depth - the layered approach to security
• Deter
Goals of
Physical Security
• Detect
Goals of
Physical Security
• Delay
Goals of
Physical Security
• Respond
Protection Plans
• Prevent threats from occurring • Technology helps with:
• Mitigate the impact
ü access control
• Based on Security Risk Assessment ü surveillance
• People, Equipment, Procedures ü surveillance detection
ü intrusion detection
• Plans – develop, test, revise cycle ü fortification
• Considers organizational culture ü staff accountability, and
ü response.
• Why Plan?
• Types of Plans?
Response ü
ü
Disaster Preparedness
Incident Response
Plans ü
ü
Communications
Mass Notification
ü Evacuation/Shelter in Place
ü Fire
ü Mass Casualty
Drills
• Prepares and tests Stakeholders:
• Ensures efficient response ü Security
• Adrenaline inoculation ü IT
ü Facilities
• Identify gaps ü Medical
• Make improvements ü Others?
• Tailored to your threat environment
Case Study
What recommendations you would make in the
Drill After Action Report?
• Your facility is near a major fault line. You conduct earthquake response drills.
• The drills test staff response and the response teams including security, facilities,
medical and IT.
• Until now drills had been based on the need evacuation.
• Some systems are outdated, with the Public Address system installed in an
inconvenient location.
• The protocols are that during an earthquake, staff should drop, cover and hold until
given advice to do otherwise.
• During a recent earthquake it became apparent that not all of the 5000 staff and
consultants understood the response. Many staff tried to evacuate.
• Guards reported that staff were disgruntled because they were not told what to do at
their assembly points.
• Some guards did not know what to do.
Drill After Action Report
• Drill evacuations during fire drills. Drill shelter in place
during earthquakes.
• Staff need information. This needs announcements and a
functioning PA system
• Responders need training but that means development of
clear and cohesive SOPs
• Who is in charge?
• Who gives the all clear?
Perimeter Protection
Design
• Surveillance
• access control
• territorial reinforcement
• maintenance
Natural Surveillance
• Doors and windows that look out onto streets and parking
areas.
• Sidewalks and streets that are open and inviting to
pedestrians.
• Unobstructed sight lines. Open design concepts (e.g., that
do not create hidden spaces).
• Front porches/activity areas in front of buildings to
encourage a visual connection with the street.
• Adequate nighttime lighting.
Natural Access Control
• Access should be limited
• Streets should be designed to discourage speeding and nonlocal
traffic.
• Paving treatments, plantings, and architectural design features,
such as a columnar gateway, guide visitors away from private
areas.
• Walkways should be easy to identify, located in such a way as to
direct pedestrian traffic, and visible from the street, homes, or
parking areas.
Territorial Reinforcement
• Promote ownership of the area
• Community spaces
• Well-kept, inspire pride
• Measures to clearly segregate the area
• Signage, low fences, landscaping
Maintenance
• The areas that are “owned” by the residents
• Gardens and gathering areas should be well-maintained
• No trash or graffiti
• Equipment is operational
• Play ground safe
• Help to reduce opportunities for vandalism and other crimes
Planning and Design
Strategies
• Enable clear lines of sight
• Adequate lighting
• Minimize concealed/isolated routes
• Avoid entrapment
• Reduce isolation
• Mix land use
• Activity generators
• Sense of ownership
• Signage
Conclusion
Protection in Depth - the layered approach to security