A Structured Approach to Creating a Physical Security Plan Class
Accreditation: ESA/NTS CEU Certified Course, 1 Continuing Education Unit
Description: Creating a security plan can be a daunting task. Using a security system integrator to create your security plan can allow you to use technology to support your plan, but the cornerstone policies and procedures must come first.
Following are some high level steps you can take to begin creating your security plan:
- Identify the threats: List all the bad things that can happen, from a low-level theft to the extreme example of an active shooter.
- Assess the threats: Assign a likelihood of occurrence for each identified threat: very likely, likely, not likely.
- Manage the risks: Identify the best way to handle the risks of each threat, either through assumption, transfer or mitigation.
- Assumption: Accept the loss or consequence, providing only a minimal effort to address the threat.
- Transfer: Get someone else to assume the risk, such as by purchasing insurance.
- Mitigation: Take steps to reduce the risk. For example, by implementing security technology, such as intrusion detection, duress alarm signaling, access control or video surveillance.
Completing these steps of threat assessment and risk analysis will allow you to create your overall security plan.