Investigations

 

 

https://adminsm.asisonline.org/Pages/Reduce-Risk-with-Regular-System-Audits.aspxReduce Risk with Regular System AuditsGP0|#69b4a912-eafa-43d2-b6a4-8aed47f69245;L0|#069b4a912-eafa-43d2-b6a4-8aed47f69245|Security Technology;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-09-01T04:00:00ZKim Rahfaldt<p>​Organizations should audit their security systems once a year to determine if their technologies and processes are optimal for their business. Companies can discover their strengths, weak- nesses, and gaps, as well as provide direction for the security department on necessary improvements.</p><p>The discoveries made during the audit process help companies improve their overall business, but it's imperative the chief security officer works closely with company executives and department heads to learn the goals of the entire business. The information gleaned from the process helps organizations create strong and effective security programs.</p><h4>Audit Steps</h4><p>Here's how to discover gaps and gather security data to streamline business, improve security, and ultimately save money:</p><p>• Identify and invite key stakeholders to the audit and conduct a thorough review of all security systems and technologies. Determine what procedural or technology changes could augment business operations and save money.</p><p>• Review the interoperability of the technologies and systems in the security operations center. Examine all workflows during different scenarios. For example, opening multiple Excel spreadsheets to document and entering data into SharePoint slows workflow and is inefficient. What is the security officer missing while documenting in two places?</p><p>• Once workflows are mapped, identify gaps and create a corrective action plan. This includes identifying new technologies to close gaps and analyzing existing data to see how to streamline processes to save time and money.</p><h4>Security Audit Use Cases</h4><p>A data center, which was experiencing more alarms than its opera- tors could respond to, had to reference multiple systems (binders, spreadsheets, etc.) for instructions on what to do, who to contact, and so on. The audit showed the value of how an access control system with automated workflow would provide step-by-step guidelines for different alarms, streamlining the process.</p><p>A financial company using a homegrown system produced a 31 percent completion rate of quarterly access audits. An audit revealed how implementing an identity management system would automate the process, resulting in 100 percent completion of quarterly audits and saving hundreds of thousands of dollars.</p><p>During a satellite service provider audit, the head of HR learned that the security department had video footage of incidents providing a documented trail. HR staff had no idea security could assist them with their slip-and-fall and other injury-related incidents. As a result, the company established new processes that saved time and money.</p><p>Enlisting the help of your integrator and manufacturer can make the audit process less overwhelming because they know what questions to ask to help identify gaps. They can review processes objectively to help discover strengths and weaknesses, recommend solutions that fit the organization's overall security plan, and suggest priorities to help determine what to tackle and in what order.</p><p>Analyzing current systems and technologies, understanding the data collected and what to do with that data, and identifying gaps in your organization will help create a solid security plan moving forward. Work with a manufacturer and integrator to determine how to best optimize current systems and determine next steps. This best practice will mitigate risk, help meet compliance, and save money.</p><p><em>Kim Rahfaldt is director media relations at AMAG Technology.</em></p>

Investigations

 

 

https://adminsm.asisonline.org/Pages/Reduce-Risk-with-Regular-System-Audits.aspx2018-09-01T04:00:00ZReduce Risk with Regular System Audits
https://adminsm.asisonline.org/Pages/Book-Review---Financial-Investigations.aspx2018-08-01T04:00:00ZBook Review: Financial Investigations
https://adminsm.asisonline.org/Pages/Catastrophe-on-Delivery.aspx2018-07-01T04:00:00ZCatastrophe on Delivery
https://adminsm.asisonline.org/Pages/Book-Review---Ethical-Forensics.aspx2018-07-01T04:00:00ZBook Review: Ethical Forensics
https://adminsm.asisonline.org/Pages/Multiple-People-Shot-in-Maryland-Newsroom.aspx2018-06-28T04:00:00ZMultiple People Shot in Maryland Newsroom
https://adminsm.asisonline.org/Pages/Lost-in-Transit.aspx2018-06-01T04:00:00ZLost in Transit
https://adminsm.asisonline.org/Pages/Book-Review--Private-Investigation-and-Homeland-Security.aspx2018-04-01T04:00:00ZBook Review: Private Investigation and Homeland Security
https://adminsm.asisonline.org/Pages/Book-Review---Tradecraft-Primer.aspx2018-04-01T04:00:00ZBook Review: Tradecraft Primer
https://adminsm.asisonline.org/Pages/The-Fraudians-Slip-In.aspx2018-03-01T05:00:00ZThe Fraudians Slip In
https://adminsm.asisonline.org/Pages/Fair-and-Neutral.aspx2018-03-01T05:00:00ZFair & Neutral
https://adminsm.asisonline.org/Pages/Book-Review---Online-Records.aspx2018-02-01T05:00:00ZBook Review: Online Records
https://adminsm.asisonline.org/Pages/Spot-the-Shots.aspx2018-02-01T05:00:00ZSpot the Shots
https://adminsm.asisonline.org/Pages/Former-U.S.-National-Security-Advisor-Pleads-Guilty-To-Lying-To-The-FBI.aspx2017-12-01T05:00:00ZFormer U.S. National Security Advisor Pleads Guilty To Lying To The FBI
https://adminsm.asisonline.org/Pages/Highway-to-Hurt.aspx2017-11-01T04:00:00ZHighway to Hurt
https://adminsm.asisonline.org/Pages/Tuesday-Education-Sessions-Address-Security-Challenges.aspx2017-09-27T04:00:00ZTuesday Education Sessions Address Security Challenges
https://adminsm.asisonline.org/Pages/Técnicas-Forenses-Defectuosas.aspx2017-09-07T04:00:00ZTécnicas Forenses Defectuosas
https://adminsm.asisonline.org/Pages/The-Dirty-Secret-of-Drug-Diversion.aspx2017-08-01T04:00:00ZThe Dirty Secret of Drug Diversion
https://adminsm.asisonline.org/Pages/Book-Review---Interviewing.aspx2017-07-01T04:00:00ZBook Review: Interviewing
https://adminsm.asisonline.org/Pages/Flawed-Forensics.aspx2017-07-01T04:00:00ZFlawed Forensics
https://adminsm.asisonline.org/Pages/Senior-Safety.aspx2017-07-01T04:00:00ZSenior Safety