SlideShare a Scribd company logo
1 of 39
Physical Security Assessment
Basic Concepts of a Physical Security Assessment Daniel R. Finger MPA, CPP, CHPA Physical Security Specialist
Why Do Assessment? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Do Assessments? (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Three Requirements for a Security Issue Opportunity Motive Means
Definition: Risk Assessment ,[object Object],[object Object]
Evaluation ,[object Object],[object Object],[object Object]
Protection ,[object Object],[object Object],[object Object]
Risk Management Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Oversights of Security Directors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Major Categories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Pitfalls ,[object Object],[object Object],[object Object],[object Object]
Security Master Plan ,[object Object],[object Object]
Joint Commission Security Standards ,[object Object],[object Object]
Identification of Practices ,[object Object],[object Object],[object Object],[object Object]
Performance Elements ,[object Object],[object Object],[object Object],[object Object]
Performance Elements (Cont.) ,[object Object],[object Object],[object Object]
Performance Elements (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Security Management Program ,[object Object]
Physical Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Security Examples (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CPTED ,[object Object],[object Object],[object Object],[object Object],[object Object]
CPTED Actors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key CPTED Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
CPTED Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Traffic Calming ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fencing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lighting ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lighting (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object]
[object Object],[object Object]
KRAA Security Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
KRAA Security Information Services Security End to End + Multi-Layer = Complete  Firewall Public Internet Access Remote Sites Main Site Workstations Application Servers Web Servers Database Servers Email Servers ,[object Object],[object Object],Vulnerability Defense ,[object Object],[object Object],[object Object],[object Object],Intrusion Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],Network Defense ,[object Object],[object Object],[object Object],[object Object],User Defense ,[object Object],[object Object],[object Object],Email Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Defense ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

More Related Content

What's hot

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
Physical access control
Physical access controlPhysical access control
Physical access controlAhsin Yousaf
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-PracticesMarco Raposo
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting ServicesePlus
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilitiesLavanya Priya
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modelingsedukull
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 

What's hot (20)

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
Physical access control
Physical access controlPhysical access control
Physical access control
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
Physical security
Physical securityPhysical security
Physical security
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilities
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 
Physical security
Physical securityPhysical security
Physical security
 

Similar to Physical Security Assessment Concepts

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Incident Response
Incident Response Incident Response
Incident Response InnoTech
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integrationMichael Nickle
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docxblondellchancy
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...Ed Sattar
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2Chris Baldwin
 

Similar to Physical Security Assessment Concepts (20)

Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Testing
TestingTesting
Testing
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Incident Response
Incident Response Incident Response
Incident Response
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx9142019 Originality Reporthttpsucumberlands.blackboar.docx
9142019 Originality Reporthttpsucumberlands.blackboar.docx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
 

Physical Security Assessment Concepts