ADI & Inovonics Expo Seminar: A Structured Approach to Creating a Physical Security Plan

10may2:00 pm3:00 pmADI & Inovonics Expo Seminar: A Structured Approach to Creating a Physical Security Plan

Event Details

Join Bill Walker, Great Lakes Regional Sales Manager at Inovonics, out at the Detroit ADI Expo, the Garnet room, for seminar: A Structured Approach to Creating a Physical Security Plan. More details below.

A Structured Approach to Creating a Physical Security Plan

Creating a security plan for a commercial or industrial entity can be a daunting task. A security director should certainly utilize a consultant or the consulting services of a security systems integrator when creating and formalizing an overall security plan. The development of policies and procedures are one of the cornerstones of the security plan, which can be supported by technology.

Course outline:
Creating a security plan for a commercial or industrial entity can be a daunting task. A security director should certainly utilize a consultant or the consulting services of a security systems integrator when creating and formalizing an overall security plan. Here are some high level steps one can take to get to a beginning point of organization, from which a complete plan can be created:

  • Threat Identification: This is where you list all the bad things that can happen, from a low level theft to the extreme example of an active shooter, and everything in between.
  • Threat Assessment: Assign a likelihood of occurrence for each identified threat: very likely, likely, not likely
  • Risk assessment: For each threat, identify the potential result of that threat occurring. Losses are typically measured in money, but there are other consequences as well, anything from employee unease to loss of life
  • The development of policies and procedures are one of the cornerstones of the security plan, which can be supported by technology.
  • The completed the steps of Threat Assessment and Risk Analysis will provide a spring board to the creation of the overall security plan.
  • Risk management: For each risk, based on the degree of risk and the likelihood of the associated threat, what do we do with that risk?:
    • Assumption – with a minimal effort to address the threat, accept the loss and consequence
    • Transfer – get someone else to assume that risk for us – such as purchasing insurance
    • Mitigation – take steps to reduce the risk – implementation of security technology, such as an intrusion detection system, duress alarm signaling capability, access control or video surveillance

more

Time

(Tuesday) 2:00 pm - 3:00 pm EDT(GMT+00:00)

Location

Suburban Show Place / Hyatt

46100 Grand River Ave.