Security Management: Newsletter - Jan 23
Security Management
Protection, guarding, defence and management of assets from the realm of threats such as natural, human and operations
Of the 470 posts published to the Security Management showcase page during January 2023, which generated 199,754 views, 62,252 clicks and 1,954 likes, here are the top 12, based on volume. Ridley Tony
Enterprise Security Risk Management
"Enterprise security risk management (ESRM) is a strategic approach to security management that aligns an organization’s security practices to its overall strategy using globally established and accepted risk management principles."
ASIS ERM-2019 Enterprise Security Risk Management
"The basis of?#Crime ?Prevention Through Environmental Design (CPTED) is that proper design and effective use of the built environment can reduce the incidence and fear of crime. This in turn leads to improvements in the quality of life."
From the same experienced, reliable and qualified source the produces this newsletter, with tens of thousands of followers and millions of content views over the past year. https://www.patreon.com/riskmanagement
"#Fraud ?is an issue that all organisations may face regardless of size, industry or country. If the organisation has valuable property, for example, cash, goods, information or services, then fraud is likely to be attempted.?"
"Physical Security Risk Assessment (RA) involves the identification of potential threats and assessment of its impact to the organisation with the objective of identifying and implementing appropriate mitigating physical security measures. There are various instances when a RA or Threat and Vulnerability Risk Assessment (TVRA) should be conducted as needed by regulatory or internal requirements. The MAS Technology Risk Management (TRM) Guidelines states that the TVRA aims to identify the physical security threats and operational weaknesses to determine the level and type of protection required. RAs may differ in complexity due to the different types of infrastructure, criticality and scope. The assessment of threats and vulnerabilities will vary depending on factors such as geographical location, multi-tenancy considerations and type of tenants, asset and operational value to the organisation, impact from natural disasters, and the prevailing political and economic climate. The FI should base its RA on various possible scenarios of threats under the MHA Peacetime Threat list which includes theft, explosives, unauthorised entry, external attacks amongst others. RAs should be conducted in key facilities or critical assets such as Data Centres, Headquarter building/office, flagship branches and critical operational areas."
"Entities MUST implement?#physicalsecurity ?measures that minimise or remove the?#risk ?of harm to people, information, and physical assets. In doing so, entities must consider the expected business impact if those resources were compromised, lost or damaged.
When determining the appropriate business impact level for a physical asset, it can be useful for entities to consider its value, classification, importance or attractiveness."
"A well trained and motivated?#security ?team is vital for the efficient operation of any?#CCTV ?installation. Any situation detected by the CCTV security operators should be responded to in a timely and appropriate manner to maximise the deterrence effect of the CCTV system. Any CCTV installation should be underpinned by a clear and well thought out Operational Requirement. This will be the measure as to whether the system does what it was designed for."
"Outcome-Based Contracting (OBC) refers to service buyers specifying contract requirements in terms of expected performance levels, rather than output levels. In contrast, traditional output- based contracts specify fixed amounts of resources (e.g. manpower, equipment) that the service provider needs to supply.?"
"The international system will continue to experience turbulence in the coming years to 2025. A continually stalled UN Security Council will lead to the regional level becoming increasingly important for efforts to manage peace and security issues. Indeed, we expect 2025 to reflect and respond to the dynamics we see currently in 2022 in terms of rising inequalities; the (in)effectiveness of the post-COVID recovery; the war in Ukraine and its global impact on food security, energy security and the global economy.?"
领英推荐
"The <buidling security guide> aims to provide a menu of good?#security ?practices and considerations to help building owners incorporate pragmatic security procedures, physical protection concepts and security technology into their building’s security plans. As the <buidling security guide> is intended to be used for all types of premises, with varying sizes and given that the risks associated with the premise varies considerably, the intention is not to provide recommendations, but provide information that should be considered when planning for the security of a building. Building owners and designers will have to choose the appropriate measures corresponding to the risks and threats that are applicable to their premises. Security should be designed in consideration with other design constraints, including accessibility, costs, and aesthetics etc. The intent is to ensure that the counter-measures are not obtrusive and congruent with the overall design of the building, with integrated solutions that serve both functional and security purposes."
"Each entity MUST: ensure it fully integrates protective?#security ?in the process of planning, selecting, designing and modifying its facilities for the protection of people, information and physical assets in areas where sensitive or security classified information and assets are used, transmitted, stored or discussed, certify its facility’s physical security zones in accordance with the applicable?ASIO Technical notes, and accredit its security zones."
Founded and directed by Ridley Tony , Risk Management is the culmination of decades of research, advanced analytics in risk sciences and extensive international, professional risk management experience for governments, corporates, and commercial service providers.
?Membership will give you monthly access to the world's largest, curated risk management body of knowledge. Providing bulk access to thousands of resources, ongoing articles, educational videos and expert webinars, choose a level of membership and access best suited to your needs, experience and budget. We offer considerable value at all levels.?
"From a scientific perspective, a well-done?#riskassessment ?is the product of a formal step-by-step process. It requires as much hard data as possible, as well as training and education of the assessor. This data comes in the form of actual monetary values of previous losses as well as the actual times that various threats have occurred (one of the best predictors of the future is the past) and other forms of tangible numbers from events that will quantify probability, criticality and vulnerability."
"Experience is also very important and can be considered an element of art. This is augmented by knowledge of the various risk assessment methodologies as well as their strengths and weaknesses. The second element is the artistry that is required to balance the multiple elements that go into both the risk assessment as well as the many elements of a formal security program"
Dr. Glen Kitteringham CPP ?(2021) The Science and Art of Security Risk Assessment, ASIS International, p.iiv
"The four pillars of the Cyber Defence Index (CDI): The index’s 16 individual indicators were developed based on the data, and were filtered through cross-comparative external data and the confidence levels of industry participants. Weightings were assigned to show the indicator’s relative importance to an effective cybersecurity posture. Individual indicators are grouped into four pillars that quantify a category of overall?#cybersecurity .?
1) Critical Infrastructure.
2) Cybersecurity Resources
3) Organisational Capacity.
4) Policy Commitment"
"Despite the serious?#risk ?that fraud presents to business, many organisations still do not have formal systems and procedures in place to prevent, detect and respond to?#fraud . While no system is completely foolproof, there are steps which can be taken to deter fraud and make it much less attractive to commit. It is in assisting organisations in taking such steps that this guide should prove valuable."
Security, Risk, Resilience, Safety & Management Sciences
Next Trend Realty LLC./wwwHar.com/Chester-Swanson/agent_cbswan
1 年Thanks for sharing.