common physical security mistakes
TRANSCRIPT
Jon Nakapalau, CHSO, CPO
Concentric Security Planning
Concentric ringsWhen trying to protect anything you should have at
least three “bands” around it…
BAD:
BAND #1: Breach/Intrusion Detection
BAND #2: Actionable Plans
BAND #3: Deterrence/Delaying Capabilities
BAND #1How are breaches
detected? What is done after they are detected? Who makes the decision to counter the breach? What resources do you have and at what time?
????=
BAND #2Actionable plans
include the following elements:
Standard Operating Procedures
Strengths, Weaknesses, Opportunities, and Threats Analysis
Scope of Work
Command and Control
A). SOP’sB). SWOTC). SOWD). C2
BAND #3What will you do
if you need help?
>>>>>>
A). SOP’sB). SWOTC). SOWD). C2>>>>>>>>>
What will you do?
????????????????????????????????????