SlideShare a Scribd company logo
1 of 7
Take a Risk based
approach &
managing specific
scenario's
BY ROBIN GH PATRAS
Take a risk based approach
 Your organization's unique context and potential threats determine which
physical security measures you need.
 When you take a risk-based approach, you can ensure your physical
security measures are right for your organisation.
• Identify what you need to protect
• Identify the people, information, physical assets, and functions that you need to protect. Then
determine the threats facing your organisation. Include threats within Pakistan and abroad (if you
have overseas interests / projects).
• You need to fully understand the value and sensitivity of your information and assets to accurately
assess your physical security risks.
Take a risk based approach
Assess the impact of breached security
Use the Business Impact Levels (BILs) to assess the potential impact if your people, information, or
assets were harmed, compromised, or unavailable. For example:
 if customers were aggressive to your people
 if your organization's property was stolen
 if someone tampered with your security system and gained unauthorized access to your office out
of hours
 if someone gained unauthorized access to your premises and stole valuable information.
For every threat scenario, consider the risks to:
• the public
• your people, property, operations, reputation, finances, or business processes
• Pakistan as a whole.
Managing Specific Scenario's
 Working away from the office
 Securely transporting sensitive items
 Event Security
• Before Event
• During the event
• After the Event
Working away from the office
Consider the situations that your people might face when they are working away from the office. Will
they be working at home? In remote-locations? In someone else’s building? Overseas? People are
using portable computing and mobile communications devices to work remotely in a variety of ways and
places, such as:
 taking work home
 working in the field
 working from vehicles
 working from hotels or conference venues
 visiting client offices
 working while on public transport.
Mobile and remote working is now the norm,
yet many people are unaware of the threats
that they face.
Your organisation must take all reasonable
steps to ensure the personal security of your
employees when they’re working away from the
office.
Securely Transporting Sensitive Items
 The tasks for securely transporting sensitive items fall into four broad
stages:
 Assessing the risks
 Planning security for the item
 Managing the item’s security during travel
 Confirming the item’s safe arrival and wrapping up the process
Event Security
 Before event
To plan an event well, you need to appoint
qualified people to security roles
 consider the threats
 develop a security plan
 inspect possible venues
 manage event preparation
 During the event
As well as overseeing security
arrangements at the event, the event
security officer (ESO) may have to conduct
or oversee many tasks to ensure event
security is well managed.
Communication, awareness, and advice
 After the event
Your event security officer carries out tasks that ensure the event is
wrapped up securely.

More Related Content

What's hot

Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
phanleson
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
TycoIS Business Security Tips
TycoIS Business Security TipsTycoIS Business Security Tips
TycoIS Business Security Tips
Roy Kisner
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
Ali Sadhik Shaik
 

What's hot (15)

Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
Become CISSP Certified
Become CISSP CertifiedBecome CISSP Certified
Become CISSP Certified
 
physical security abdullah hassan al alyani
physical security abdullah hassan al alyaniphysical security abdullah hassan al alyani
physical security abdullah hassan al alyani
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Asset, Threat, Vulnerability, Risk
Asset, Threat, Vulnerability, RiskAsset, Threat, Vulnerability, Risk
Asset, Threat, Vulnerability, Risk
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Threat vs risk vs attack vs Asset vs vulnerability
Threat vs risk vs attack vs Asset vs  vulnerability Threat vs risk vs attack vs Asset vs  vulnerability
Threat vs risk vs attack vs Asset vs vulnerability
 
TycoIS Business Security Tips
TycoIS Business Security TipsTycoIS Business Security Tips
TycoIS Business Security Tips
 
Lecture1 intro to cs
Lecture1 intro to csLecture1 intro to cs
Lecture1 intro to cs
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 

Similar to Risk based approach

Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
Dayo Olujekun
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)
Tom Coyle
 
Spec Ops Service Overview
Spec Ops Service OverviewSpec Ops Service Overview
Spec Ops Service Overview
Spec Ops Service
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa
 

Similar to Risk based approach (20)

Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Acol Brochure En Us
Acol Brochure En UsAcol Brochure En Us
Acol Brochure En Us
 
WOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & SecurityWOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & Security
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Hotel security
Hotel securityHotel security
Hotel security
 
Information Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfInformation Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdf
 
Information Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdfInformation Security Manager Jobs Remote.pdf
Information Security Manager Jobs Remote.pdf
 
Hotel security hand book
Hotel security hand bookHotel security hand book
Hotel security hand book
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Need to Know - Real Intelligence Training
Need to Know - Real Intelligence TrainingNeed to Know - Real Intelligence Training
Need to Know - Real Intelligence Training
 
Security in the workplace
Security in the workplaceSecurity in the workplace
Security in the workplace
 
Spec Ops Service Overview
Spec Ops Service OverviewSpec Ops Service Overview
Spec Ops Service Overview
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Personnel security
Personnel securityPersonnel security
Personnel security
 

More from Robin Patras (9)

OutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdfOutdoorElectricalSafety.pdf
OutdoorElectricalSafety.pdf
 
Electrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdfElectrical_Safety_Tips.pdf
Electrical_Safety_Tips.pdf
 
Fire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishersFire prevention & use of fire extinguishers
Fire prevention & use of fire extinguishers
 
Congo virus alert
Congo virus alertCongo virus alert
Congo virus alert
 
Five common reasons for the road accident
Five common reasons for the road accidentFive common reasons for the road accident
Five common reasons for the road accident
 
Security awareness by robin
Security awareness by robinSecurity awareness by robin
Security awareness by robin
 
Untold story of karachi
Untold story of karachiUntold story of karachi
Untold story of karachi
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Defensive drivers training
Defensive drivers trainingDefensive drivers training
Defensive drivers training
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Risk based approach

  • 1. Take a Risk based approach & managing specific scenario's BY ROBIN GH PATRAS
  • 2. Take a risk based approach  Your organization's unique context and potential threats determine which physical security measures you need.  When you take a risk-based approach, you can ensure your physical security measures are right for your organisation. • Identify what you need to protect • Identify the people, information, physical assets, and functions that you need to protect. Then determine the threats facing your organisation. Include threats within Pakistan and abroad (if you have overseas interests / projects). • You need to fully understand the value and sensitivity of your information and assets to accurately assess your physical security risks.
  • 3. Take a risk based approach Assess the impact of breached security Use the Business Impact Levels (BILs) to assess the potential impact if your people, information, or assets were harmed, compromised, or unavailable. For example:  if customers were aggressive to your people  if your organization's property was stolen  if someone tampered with your security system and gained unauthorized access to your office out of hours  if someone gained unauthorized access to your premises and stole valuable information. For every threat scenario, consider the risks to: • the public • your people, property, operations, reputation, finances, or business processes • Pakistan as a whole.
  • 4. Managing Specific Scenario's  Working away from the office  Securely transporting sensitive items  Event Security • Before Event • During the event • After the Event
  • 5. Working away from the office Consider the situations that your people might face when they are working away from the office. Will they be working at home? In remote-locations? In someone else’s building? Overseas? People are using portable computing and mobile communications devices to work remotely in a variety of ways and places, such as:  taking work home  working in the field  working from vehicles  working from hotels or conference venues  visiting client offices  working while on public transport. Mobile and remote working is now the norm, yet many people are unaware of the threats that they face. Your organisation must take all reasonable steps to ensure the personal security of your employees when they’re working away from the office.
  • 6. Securely Transporting Sensitive Items  The tasks for securely transporting sensitive items fall into four broad stages:  Assessing the risks  Planning security for the item  Managing the item’s security during travel  Confirming the item’s safe arrival and wrapping up the process
  • 7. Event Security  Before event To plan an event well, you need to appoint qualified people to security roles  consider the threats  develop a security plan  inspect possible venues  manage event preparation  During the event As well as overseeing security arrangements at the event, the event security officer (ESO) may have to conduct or oversee many tasks to ensure event security is well managed. Communication, awareness, and advice  After the event Your event security officer carries out tasks that ensure the event is wrapped up securely.

Editor's Notes

  1. United Kingdom Business Impact Levels (BIL), Guidelines & Destruction Procedures Explained An Introduction to Business Impact Levels The Security Policy Framework (SPF) sets out new responsibilities regarding the Protective Security and Risk Management required within Government Departments and Agencies whilst recognising the wider implication for the Commercial Sector which plays an increasingly intimate role within the UK Government matrix, as well as making up the core sectors within the Critical National Infrastructure (energy, water, agriculture, etc). Similarly, organisations such as the National Health Service, Police forces and local Government all handle Government Assets on a regular basis. https://www.shreddingmachines.co.uk/business-impact-levels.asp
  2. Securely transporting sensitive items To protect sensitive items, follow the four stages of secure transportation. The tasks for securely transporting sensitive items fall into four broad stages: assessing the risks planning security before you move the item managing security during the move confirming the item has arrived safely and wrapping up the transport process. 1. Assessing the risks Sensitive items can be transported in several ways. For example, when people in your organisation: carry items with them (by hand or in a bag) work remotely or abroad (for example, from home or a hotel) transport items in a vehicle. Understand the threats you need to manage Whichever way an item is transported, many potential threats exist. For example, an item could be: accidentally lost or damaged stolen by an opportunist theft abandoned because of an emergency taken from a hijacked or stolen vehicle attacked by someone inside your organisation targeted through espionage. Carry out a risk assessment Use a risk assessment to help you understand: the value of the item you need to transport the business impact on your organisation if the item was lost or damaged the likely threats to the item during transport. Based on your assessment, consider which security measures will achieve the best balance between robust security and operational effectiveness. 2. Planning security for the item To plan effectively, answer the following questions. What is the nature of the item? Describe the item’s size, purpose, value, and any significant features that might affect how it is transported. If the item has a security classification with associated security requirements, ensure you include those requirements in your plan. Who is involved? Identify everyone involved in the transport process and what they are responsible for. Will the process involve getting sign-off from a manager, liaising with a courier, or arranging an escort? Who will receive the item when it’s delivered? How and when will the item be moved? Describe how and when the item will be moved. What mode of transport will be used? Which routes will be involved? Are there any waypoints to consider? What is the destination? When is the move happening? Does the intended date and time pose any risks? Consider things like traffic volumes, predicted weather, and major events. What are the likely risks to the item? Based on your risk assessment, consider risks from the local environment and the planned route. What is security like at the sites the item is moving from and to? What is the terrain like on the planned route? Is traffic a concern? Will border security be involved? Which security measures will best protect the item? Detail the security measures you’ll use. Ensure the measures are proportionate to the risks you identified in your assessment, and enable everyone involved to effectively manage the transport process. What are your contingency plans? If the item is compromised, how will you respond to and manage the situation? Do you have alternative transport plans? Does everyone involved know what to do? Make sure you provide the right training and task-specific briefings to the relevant people. They must know how to protect the item and what to do if anything goes wrong. 3. Managing the item’s security during travel Keep the following practices in mind when you’re managing security while items are being moved. Maintain awareness Scan your surroundings and be alert to potential threats, especially when escorting others. Keep a low profile Be discreet. This practice includes the people involved being discreet and the equipment you use to protect an item being discreet. Communicate as planned Be prepared to provide status updates as planned or to call for assistance when you need to. Check your physical security solutions Ensure security solutions are working as intended. For example, solutions designed to mitigate threats such as opportunist theft, forced entry, or covert attempts to gain unauthorised access. 4. Confirming the item’s safe arrival and wrapping up the process Once an item has been transported, you need to: check the item has arrived intact and hasn’t been compromised confirm its delivery with the recipient or owner (for example, with a receipt) You also need to: assess the entire procedure to find out if it was carried out safely (or at least risk-managed) record details of the transfer for auditing purposes.
  3. As well as overseeing security arrangements at the event, the event security officer (ESO) may have to conduct or oversee many tasks to ensure event security is well managed. Communication, awareness, and advice The CSO may need to: liaise with the event manager on communications, command, and control issues maintain awareness of, and consistency with, health and safety requirements provide event attendees and venue employees with security advice, including security and emergency procedures advise attendees of the protective marking of the subject matter and the security arrangements and facilities available (the security classification of topics to be discussed should be displayed at the start of the event and again before each protectively-marked segment of the event). ID and entry control The CSO may need to: ensure accredited attendees are issued access and identity passes, including ensuring identities are verified if necessary control entry to ensure that no unauthorised persons gain access to the building or event, or can observe or listen to proceedings supervise security aspects of visitor control