200 likes | 348 Views
A Secure Frontline. September 25, 2003 R. E. Cunningham, SVP, National Marketing Manager HDR Security Operations, Inc. Security:. Freedom from risk or danger. Measures adopted to prevent the commission of crime. Security Words of Wisdom.
E N D
A Secure Frontline September 25, 2003 R. E. Cunningham, SVP, National Marketing Manager HDR Security Operations, Inc.
Security: Freedom from risk or danger. Measures adopted to prevent the commission of crime.
Security Words of Wisdom To paraphrase the ancient Chinese military historian Sun Tzu (350 BC)… “He who tries to defend everything ends up defending nothing.”
Threat Is Not Only International in Nature • Domestic Terrorists/Workplace Violence can also be a threat • 23 Hate groups operate in Missouri and Kansas alone • Oklahoma bombing was Domestic Terrorism • Anthrax may have been Domestic
Concentric Circles of Security Defense in Depth Security Concepts • Concentric Circles of Security • Deter • Detect • Delay • Or You Just Document
DetectionTime Lapse Response Time Assessment Contactbegins Dispatchdecision Detection begins Deter – Detect - Delay Event Time Measured in Minutes Physical / Mechanical / Electronic Delays
DetectionTime Lapse Response Time Assessment Detection begins Dispatch decision Contactbegins Deter – Detect - Delay Event Time Measured in Minutes Physical / Mechanical / Electronic Delays
Assessments Criticality Vulnerability Threat Risk Responsiveness Readiness The Challenge of “Multiple Port/Waterway Players” • DNRs • USACE • Railroads • Trucking Companies • Utilities • Other Port Tenants • Warehousing • Port Authority • Terminal Operators • Stevedors • Shipping/Barge Companies • Logistics Companies • Unions • Coast Guard • MARAD • Customs • State DOTS • MPOs • First Responders
Operational Policies and Procedures Enforcement and Security Awareness Physical and Electronic Security Holistic Security Planning • Total Team Effort • Management - Authority • Coaches - Executives • Players – Staff/Tenants
Policies and Procedures • The Game Plan • Planning • Operations • Monitoring • Reporting Policy and Procedures Standard Operating Procedures (SOP’s) Emergency Operating Procedures (EOP’s) Emergency Response Plans (ERP’s) Mutual Aid Media Management
Training Programs Command Operation Awareness Enforcement and Security Awareness • The Team – Personnel Who Are…… • Informed - Threat awareness • Trained - Emergency response • Empowered – Operations • Equipped – The Tools
Physical Security Blast Protection Glazing Analysis Material Material Analysis Structural Analysis Progressive Collapse Facility Hardening Barriers Passive Active Ballistically Resistive Materials Vault/Safehaven Design Crime Prevention through Environmental Design (CPTED) Illumination Engineering Hardware Key Control/Management Locking Systems The Tools Multiple User Access Control?
The Tools Electronic Security Situation Annunciation Closed Circuit Video Equipment (CCVE) Intrusion Detection Perimeter Security Intrusion Protection Access Control Biometric Cypher Card Personal Identification Number (PIN) Communications Data Communications Intercommunications Telecommunications Radio Frequency Access Denial Systems Chemical Biological Nuclear Radiological Explosive Weapons Heartbeat Screening Electronic Article Surveillance
The Tools Data Security Employee Data Access Controls Data Networks Telecommunications CATV/MATV Infrastructure Copper Fiber Optic Wireless Firewalls Document Storage Backups Data Power
The Tools • Exercises are Key • Performance • Penetration (Black Hat) • Real Time Response • Routine System Testing
Q&A For further questions or discussion on this topic please contact R. E. Cunninghamrcunning@hdrinc.com