Security Management: Newsletter  - Jan 23
Security Management - Jan 23. Tony Ridley, MSc CSyP CAS MSyI

Security Management: Newsletter - Jan 23

Of the 470 posts published to the Security Management showcase page during January 2023, which generated 199,754 views, 62,252 clicks and 1,954 likes, here are the top 12, based on volume. Ridley Tony


Enterprise Security Risk Management

"Enterprise security risk management (ESRM) is a strategic approach to security management that aligns an organization’s security practices to its overall strategy using globally established and accepted risk management principles."

ASIS ERM-2019 Enterprise Security Risk Management


Crime Prevention Through Environmental Design - CPTED

"The basis of?#Crime ?Prevention Through Environmental Design (CPTED) is that proper design and effective use of the built environment can reduce the incidence and fear of crime. This in turn leads to improvements in the quality of life."

Read More...

Crime Prevention Through Environmental Design - CPTED
Crime prevention remains a complex, contextual and variable concept in theory and practice


No alt text provided for this image
All hazards, including security must be documented and evaluated in concert, not in isolation

Risk Management: Members Only - Now Live

From the same experienced, reliable and qualified source the produces this newsletter, with tens of thousands of followers and millions of content views over the past year. https://www.patreon.com/riskmanagement

Read More...

Risk Management: Members Only
https://www.patreon.com/riskmanagement

Corporate Fraud

"#Fraud ?is an issue that all organisations may face regardless of size, industry or country. If the organisation has valuable property, for example, cash, goods, information or services, then fraud is likely to be attempted.?"

Read More...

Corporate Fraud
Fraud remains concealed within poor practices, inadequate systems, economic/social factors and complex human behaviours or choices, sometimes manifesting as fraud, corruption, collusion or other security risks


No alt text provided for this image
Threat and vulnerability evaluation remain essential, critical requirements of all security assessments, plans and response.

Physical Security Guidelines: Financial Institutions

"Physical Security Risk Assessment (RA) involves the identification of potential threats and assessment of its impact to the organisation with the objective of identifying and implementing appropriate mitigating physical security measures. There are various instances when a RA or Threat and Vulnerability Risk Assessment (TVRA) should be conducted as needed by regulatory or internal requirements. The MAS Technology Risk Management (TRM) Guidelines states that the TVRA aims to identify the physical security threats and operational weaknesses to determine the level and type of protection required. RAs may differ in complexity due to the different types of infrastructure, criticality and scope. The assessment of threats and vulnerabilities will vary depending on factors such as geographical location, multi-tenancy considerations and type of tenants, asset and operational value to the organisation, impact from natural disasters, and the prevailing political and economic climate. The FI should base its RA on various possible scenarios of threats under the MHA Peacetime Threat list which includes theft, explosives, unauthorised entry, external attacks amongst others. RAs should be conducted in key facilities or critical assets such as Data Centres, Headquarter building/office, flagship branches and critical operational areas."

Read More...

Physical Security Guidelines: Financial Institutions
Big money, big security investments


No alt text provided for this image
Systems theory, complexity, network and distributed risk applies equally to security as it does to any other critical infrastructure area of concern or control

Physical Security: Protective Security Framework

"Entities MUST implement?#physicalsecurity ?measures that minimise or remove the?#risk ?of harm to people, information, and physical assets. In doing so, entities must consider the expected business impact if those resources were compromised, lost or damaged.
When determining the appropriate business impact level for a physical asset, it can be useful for entities to consider its value, classification, importance or attractiveness."

Read More..

Physical Security: Protective Security Framework
Guns, guards, gates, cameras and other accoutrements


No alt text provided for this image
Security remains far more than guns, guards, gates and camerasorganisations managed by former police, military, government or intelligence personnel, despite this legacy 'trap' perpetuated across industry and organisatoins

CCTV for Critical Infrastructure Perimeter: Security Guidance

"A well trained and motivated?#security ?team is vital for the efficient operation of any?#CCTV ?installation. Any situation detected by the CCTV security operators should be responded to in a timely and appropriate manner to maximise the deterrence effect of the CCTV system. Any CCTV installation should be underpinned by a clear and well thought out Operational Requirement. This will be the measure as to whether the system does what it was designed for."

Read More...

CCTV for Critical Infrastructure Perimeter: Security Guidance
Video and Audio Surveillance Systems (VASS) may be more familiar to modern practitioners


No alt text provided for this image
The only reason for security siloes or segmentation, according to physical, cyber, information, etc is because humans insisted upon and supported such pratices

Security Contracts: Outcome-Based

"Outcome-Based Contracting (OBC) refers to service buyers specifying contract requirements in terms of expected performance levels, rather than output levels. In contrast, traditional output- based contracts specify fixed amounts of resources (e.g. manpower, equipment) that the service provider needs to supply.?"

Read More...

Security Contracts: Outcome-Based
In the event that all outcomes are measurable, police aligned or clear economic-only phenomena


No alt text provided for this image
Security, risk and particularly security risk management are a system of systems that must be mapped, evaluated and analysed in full before 'slapping' security measures, controls or solutions on those aspects most visible or 'feared'

Peace and Security: Vision 2025

"The international system will continue to experience turbulence in the coming years to 2025. A continually stalled UN Security Council will lead to the regional level becoming increasingly important for efforts to manage peace and security issues. Indeed, we expect 2025 to reflect and respond to the dynamics we see currently in 2022 in terms of rising inequalities; the (in)effectiveness of the post-COVID recovery; the war in Ukraine and its global impact on food security, energy security and the global economy.?"

Read More...

Peace and Security: Vision 2025
By all accounts, 'choppy waters', storms and rough seas are forecast for the next 5-10 years


No alt text provided for this image
Safety and security have, and always will be, intertwined, overlapping and complementary

Building Security: Enhancement Guide

"The <buidling security guide> aims to provide a menu of good?#security ?practices and considerations to help building owners incorporate pragmatic security procedures, physical protection concepts and security technology into their building’s security plans. As the <buidling security guide> is intended to be used for all types of premises, with varying sizes and given that the risks associated with the premise varies considerably, the intention is not to provide recommendations, but provide information that should be considered when planning for the security of a building. Building owners and designers will have to choose the appropriate measures corresponding to the risks and threats that are applicable to their premises. Security should be designed in consideration with other design constraints, including accessibility, costs, and aesthetics etc. The intent is to ensure that the counter-measures are not obtrusive and congruent with the overall design of the building, with integrated solutions that serve both functional and security purposes."

Read More...

Building Security: Enhancement Guide
Smart cities invite smart business security, but a security system without context is an outlier, not a resilient ecosystem
No alt text provided for this image
Notwithstanding, 'risk' may also be a future state which one seeks to avoid or prevent

Facilities Security: Protective Security Framework

"Each entity MUST: ensure it fully integrates protective?#security ?in the process of planning, selecting, designing and modifying its facilities for the protection of people, information and physical assets in areas where sensitive or security classified information and assets are used, transmitted, stored or discussed, certify its facility’s physical security zones in accordance with the applicable?ASIO Technical notes, and accredit its security zones."

Read More...

No alt text provided for this image
Security layers, requirements, procedures and integrated processes


No alt text provided for this image
The fusion of security and risk is both a personal requirement in modern life but also that of professional/corporate practice(s).

Risk Management: Members Only Site

Founded and directed by Ridley Tony , Risk Management is the culmination of decades of research, advanced analytics in risk sciences and extensive international, professional risk management experience for governments, corporates, and commercial service providers.

?Membership will give you monthly access to the world's largest, curated risk management body of knowledge. Providing bulk access to thousands of resources, ongoing articles, educational videos and expert webinars, choose a level of membership and access best suited to your needs, experience and budget. We offer considerable value at all levels.?

https://www.patreon.com/riskmanagement

Read More...

Risk Management: Members Only Site
https://www.patreon.com/riskmanagement


The Science and Art of the Security Risk Assessment

"From a scientific perspective, a well-done?#riskassessment ?is the product of a formal step-by-step process. It requires as much hard data as possible, as well as training and education of the assessor. This data comes in the form of actual monetary values of previous losses as well as the actual times that various threats have occurred (one of the best predictors of the future is the past) and other forms of tangible numbers from events that will quantify probability, criticality and vulnerability."
"Experience is also very important and can be considered an element of art. This is augmented by knowledge of the various risk assessment methodologies as well as their strengths and weaknesses. The second element is the artistry that is required to balance the multiple elements that go into both the risk assessment as well as the many elements of a formal security program"

Dr. Glen Kitteringham CPP ?(2021) The Science and Art of Security Risk Assessment, ASIS International, p.iiv

Read More...

The Science and Art of the Security Risk Assessment
What are the traits, states, behaviours and cultures associated with each? Can you tell the difference?


No alt text provided for this image
The job is never 'done' when it comes to security risk management, particularly where adroit, malevolent human adversaries and threat actors are prevalent, evolving or protean

Digital Security Preparedness: Cyber Defence

"The four pillars of the Cyber Defence Index (CDI): The index’s 16 individual indicators were developed based on the data, and were filtered through cross-comparative external data and the confidence levels of industry participants. Weightings were assigned to show the indicator’s relative importance to an effective cybersecurity posture. Individual indicators are grouped into four pillars that quantify a category of overall?#cybersecurity .?
1) Critical Infrastructure.
2) Cybersecurity Resources
3) Organisational Capacity.
4) Policy Commitment"

Read More...

Digital Security Preparedness: Cyber Defence
Digital security comes before cybersecurity, despite common misconceptions and poor practice(s)


No alt text provided for this image
The same applies to security and risk management.

Fraud Risk Management: A Good Practice Guide

"Despite the serious?#risk ?that fraud presents to business, many organisations still do not have formal systems and procedures in place to prevent, detect and respond to?#fraud . While no system is completely foolproof, there are steps which can be taken to deter fraud and make it much less attractive to commit. It is in assisting organisations in taking such steps that this guide should prove valuable."

Read More...

Fraud Risk Management: A Good Practice Guide
Crime and criminology remain complex, scientific and technical vocations, not consistent nor represented by accounting or auditing.


No alt text provided for this image
Supply chain, food and access (insecurity) remain and will be a persistent security risk and threat for years to come

Ridley Tony

Security, Risk, Resilience, Safety & Management Sciences

Security Management Risk Management Crisis Management

Risk, Security, Safety, Resilience & Management Sciences

No alt text provided for this image
Security Management - Jan 23. Tony Ridley, MSc CSyP CAS MSyI
CHESTER SWANSON SR.

Next Trend Realty LLC./wwwHar.com/Chester-Swanson/agent_cbswan

1 年

Thanks for sharing.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了