EXERCISE #1 – RISK MANAGEMENT PRINCIPLES AND PRACTICES
The ASIS “General Security Risk Assessment Guideline” is a 2003 ASIS International publication and a key resource for security operatives responsible of examining, evaluating, and managing risk to organizational assets and planning security operations.
After thoroughly reading and studying the publication’s contents, particularly the seven (7) Recommended Practice Advisories and the corresponding commentaries, explain why a corporate security officials must understand the various risk management principles and be able to apply those principles when assessing the vulnerability of an organization’s assets. Incorporate into your response the significance of determining not just the various crime-related AND non-criminal threats to assets, but also the impact or “criticality” (losses, harm, and costs) of those threat or “risk” events AND the probability or likelihood of those events occurring. Use examples to demonstrate the points you make in your response.
Finally, identify the various information sources available to corporate security officials to determine the probability of the various threats that may be directed at the organization. Again use examples of sources used by a real-world company (Exxon, Walmart, Apple, Proctor and Gamble, Amazon, Kroger, etc.) to demonstrate the points you make in your response.
NOTE: Students will be required to employ these strategies in their final project.
EXERCISE #2 – SECURITY THREATS AND MANAGEMENT CHALLENGES
“Top Security Threats and Management Issues Facing Corporate America” is a periodic Securitas Security Services USA, Inc., publication that assists security directors in completing their security planning.
After reading the results of the their most recent Survey of Fortune 1000 Companies and the “Emerging Trends” section of the publication, discuss possible reasons for corporate security director responses to the first five (5) security threats.
Also explain why security operatives in different industries place different emphasis on certain threats and provide specific examples. Finally, examine the different management issues and their anticipated impact on security operations and, based on your understanding of the ratings and any other independent research you have completed this week, discuss the possible reasons for the responses and what you might do as a security operative to address the first six (6) issues.
EXERCISE #1 – PHYSICAL AND PROCEDURAL CONTROLS FOR PROTECTING ASSETS – GENERAL DISCUSSION
“Security Management Standard: Physical Asset Protection” is a 2012 ASIS International publication that assists security directors in completing their security planning.
“ASIS International Facilities Physical Security Measures Guideline,” also assists organizations in determining risk levels and the appropriate controls to secure assets in the most effective, efficient, and cost-saving manner.
After thoroughly reviewing these documents, summarize their contents and explain how the standard and the guideline will assist you in completing the vulnerability assessment required not only for this in this course, but also in your current of future security management career.
Also, identify, in your considered opinion, the five most significant physical controls used to protect corporate assets discussed in the document and explain your rationale, citing not only the advantages of the controls you selected, but also the drawbacks.
EXERCISE #2- PHYSICAL AND PROCEDURAL CONTROLS FOR PROTECTING ASSETS – SECURITY SCENARIO APPLICATION
In “Security Management Standard: Physical Asset Protection,” the authors discuss the use physical barriers as a physical control designed to protect assets by deterring individuals or delaying entry of those unauthorized to access the building or property. However, fences do not entirely “prevent” entry as we have periodically read about with the “fence jumpers” at the White House in Washington, D.C. The authors identify fences and walls as the most common perimeter barriers and proceed to describe the various types: brick and stone walls, chain-link, welded-wire, barbed wire, razor or concertina wire, wooden, electronic, planters, steel barricades, and others.
As a result of the increased frequency of “fence jumpers” at the White House, the United States Secret Service (USSS) in 2017 received approval from the National Capital Planning Commission to raise the wrought iron fence surrounding the 18 acres from about 8 feet high to 11.7 feet. Other fence “anti-climb” features were also a part of the plan. There was significant public interest expressed in this matter. As reported in the media, the USSS gave thoughtful consideration regarding the selection of a new and enhanced fence design as a part of the agency’s risk assessment process and the employment of Practice Advisories we discussed in class last week. ASIS Practice Advisories #6 and #7 relating to the “feasibility” of implementing recommended security options to mitigate risk and considering the “cost versus benefit” of a particular security strategy are particularly interesting regarding the decision about the fence and other possible security measures in and around the White House.
Identify and discuss the “practical” considerations the USSS had to consider about the height, type, and design of the new enhanced fence surrounding the White House. Note: Although the President questioned the $50 million dollar cost of the new fence, for this scenario, our discussion should focus primarily on the “feasibility” of implementing any proposed security options in light of the mission and authority of the National Capital Planning Commission (NCPC) and other historical oversight associations. Incorporate into your response whether or not you believe an 11 foot tall fence made from concrete, chain link, razor, or concertina wire would be a better choice from a security perspective and whether or not such fences would survive public and National Capital Planning Commission scrutiny.
In preparing a response, students should review the following resources that provide specific background information regarding the scenario presented:
White House Fence (White House fence final design approved.)
NPS (White House Fence Design Receives Final Approval.)
History (History of the White House Fence).
Cost(Trump: New White House security fence to cost a ‘crazy’ $50 million.)
NCPC (About NCPC.)
EXERCISE #1 – CONTINGENCY PLANNING TO PROTECT ASSETS
In any discussion of security threats, it is natural to focus on the various criminal activities directed at organizations. However, as you learned so far in this class, particularly during our Week 2 discussion of risk assessment, there are numerous non-criminal risk events with which security operatives must be concerned. This fact is still very apparent when considering the devastating impact Hurricane Katrina had when it arrived off the Gulf Coast of the United States in 2005 and Hurricanes Harvey and Irma in 2017. All these natural risk events led to catastrophic results impacting the U.S. Government, private companies, and United States citizens in terms of lost lives, psychological effect, and business operations.
“Business Continuity Guideline” is a 2005 ASIS International publication that provides a practical approach for emergency preparedness, crisis management, and disaster recovery. After thoroughly reviewing this document, summarize its contents and explain how the Guideline will assist you as a security operative for a Fortune 1000 company in protecting an organization’s assets. Incorporate into your response the actions you would take to prepare for a crisis like Katrina, Harvey, or Irma, or a fire, floods, earthquakes, utility failure, and a host of other possible emergencies so the organization can manage and survive the disaster or other emergencies and ensure the organization’s continued visibility and capability.
EXERCISE #2 – OSHA – MANAGING HEALTH AND SAFETY IN THE WORKPLACE
In 1970, the U.S. Congress enacted the Occupational Safety and Health Act (OSHA) to address ever-increasing instances of death and injury in the workplace. The reason (and authority) for the Congress to become involved in this issue is because the injuries imposed a substantial burden upon and hindrance to interstate commerce. The goal of the Act, which established the Occupational Safety and Health Administration within the Department of Labor, was to promote a safe and healthy working environment for all employees.
The “Small Business Handbook” is 2005 publication by the Occupational Safety and Health Administration provides security leaders and their organizations a cost-effective approach for managing health and safety at the work site by reducing occupational fatalities and injuries.
After carefully examining this Handbook and conducting any additional independent research as necessary, explain the main requirements of OSHA that you, as a security director, must understand and implement to ensure your company is indeed providing a safe environment for its employees and is compliant with applicable laws and regulations. Incorporate into your response how your routine and periodic responsibilities as a security director are impacted by the Act.