You can’t know where you are going, if you don’t know where you have been.
Improving Your Security Program

You can’t know where you are going, if you don’t know where you have been.

The security remedies of today differ from the remedies available five or ten years ago. The good news is that as technology has evolved, and costs have gone down. For example, consider the cost of a video surveillance system 15 years ago as compared to today's price tag. There has be a significant shift from the reliance on security personnel to reliance on many divergent and evolving technologies. The security officer of today has become the glue that synergizes the effectiveness of a wide range of technologies. There have also been substantial decisions to be made as to how to best leverage security assets in a manner that ensures that the whole is greater than the sum of the parts. 

Parenthetically, there have also been significant shifts in the ambient threat environment. For example, the proliferation of workplace violence in hospitals, schools and shopping malls. These shifts have had an impact in the defining of a reasonable standard of care. More and more, the reasonable standard of care is being shaped by tort law. Security driven litigation, and the case-law that has evolved, in turn has impacted to totality of security planning, especially those enterprises that afford public access. A significant amount of security design, during the planning phase, is driven by the desire to avoid the liability claims, of inadequate security. As forensic security experts: We can assert, with almost universal certainty, that the cost of most security litigation is far more costly than conducting a comprehensive security assessment, and the resultant relevant security program.

There are both industry specific components to the ambient threat environment, as well as location specific components (variations in the ambient crime environment). Industry specific recognition acknowledges the security variances of verticals, such as hospitals, shopping malls and industrial plants, as well as differences within those verticals. The threat environment is in part vertical-specific, as well in part industry specific. 

The goal of ensuring that each security program meets the reasonable standard of criteria, should not be the only driving force behind the determination of the efficacy of each security program. Additionally. loss prevention is not exclusively about liability. Loss prevention is also applicable to the security of plant and equipment, as well as inventories and supplies, as well as proprietary information, and most importantly, people. Therefore, the application of technology and security personnel must be driven by identified and quantifiable need. Good security, is simply just good business.

A positive emerging trend for many industries, is the application of Crime Prevention Through Environmental Design.Optimally, the best security design process begins pre-construction, especially when CPTED is under consideration. This, by no means, is intended to imply the CPTED can not be applied to the built environment. We believe that CPTED should be a component, worthy of consideration for every security assessment. Among other considerations, CPTED is cost-efficient, effective and will significantly improve almost any security operation.

Periodic security assessments are also essential, especially for those businesses that cater to the general public. The application of security technology must be relevant, and need driven, as opposed to mere window dressing. Security assessments should not only fit the needs of the management team, but should also include the participation of rank and file employees. 

William H. Nesbitt, CPP, Certified CPTED Practitioner

President: SMSI Inc. www.smsiinc.com, [email protected], Call: 805-499-3800 





William (Bill) Nesbitt, CPP

President, SMSI Inc.; Consultant/ Forensics Security Expert Witness, CPTED Practitioner. Security Source Online LinkedIn

7 年

If it is more than three years since you last security assessment, given changes in the threat environment, and the advancements of security countermeasures, a redo is in order. advancement

Matt Walters

Helping Bankers, Wealth Advisors, and Financial Services sales teams drive profitable growth with real-time client data

7 年

Thanks for sharing, William (Bill) Nesbitt, CPP. You raise a good point that Executives should seek input from frontline staff when it comes to making changes after a security assessment.

回复
Pieter Johan Combrinck

Quality manager corporate group services

7 年

Thank you sharing

William (Bill) Nesbitt, CPP

President, SMSI Inc.; Consultant/ Forensics Security Expert Witness, CPTED Practitioner. Security Source Online LinkedIn

7 年

For those in the healthcare arena: please note that the Journal of Healthcare Risk Management (volume 37; number 2; on page 12: Listed 12 Hospital Sentinel Events. Five of the twelve events have security implications.

要查看或添加评论,请登录

William (Bill) Nesbitt, CPP的更多文章

  • Security is a Situational Discipline

    Security is a Situational Discipline

    Security is a situational discipline which is predicated on the level and type of threat, the degree of vulnerability…

    9 条评论
  • SECURITY: A SITUATIONAL DISCIPLINE

    SECURITY: A SITUATIONAL DISCIPLINE

    Security is a situational discipline which is predicated on the level and type of threat, the degree of vulnerability…

  • SECURITY A SITUATIONAL DISCIPLINE

    SECURITY A SITUATIONAL DISCIPLINE

    Security is a situational discipline which is predicated on the level and type of threat, the degree of vulnerability…

    3 条评论
  • Building an effective security program.

    Building an effective security program.

    You can't know where you are going if you don't know where you have been. First, and foremost, Security is a…

    2 条评论
  • Workplace Violence Mitigation

    Workplace Violence Mitigation

    Security is an anticipatory/preventive discipline. Yet the impetus for many security programs seems to be the product…

    4 条评论
  • Security: Cost Of Being Reactive vs. Cost Of Being Proactive

    Security: Cost Of Being Reactive vs. Cost Of Being Proactive

    It is indisputable that the cost of reaction is exponentially greater than the to cost of being proactive. In working…

    7 条评论
  • Who Will Conduct Your Next Security Assessment?

    Who Will Conduct Your Next Security Assessment?

    Will a well qualified security professional conduct your next security assessment in advance of a major security…

    3 条评论
  • The Value of Periodic Security Reviews

    The Value of Periodic Security Reviews

    All to often, we find the call for a security assessment in the wake of a serious security breach or breakdown. We…

    5 条评论
  • HOSPITAL ACCESS MANAGEMENT MUST ALSO BE APPLIED TO INNER SPACE

    HOSPITAL ACCESS MANAGEMENT MUST ALSO BE APPLIED TO INNER SPACE

    Access management may begin at the perimeter, but it should not end there. This is particularly true for hospitals.

    2 条评论
  • WORKPLACE VIOLENCE & ACCESS CONTROL

    WORKPLACE VIOLENCE & ACCESS CONTROL

    Typically, access management control begins at the perimeter, but it doesn’t need to end at the perimeter. In fact, it…

    13 条评论

社区洞察

其他会员也浏览了