Security by Industry

 

 

https://adminsm.asisonline.org/Pages/November-2018-ASIS-News.aspxNovember 2018 ASIS NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-11-01T04:00:00ZPeggy O'Connor<h4>​Celebrating Security's Best</h4><p>At Global Security Exchange (GSX), formerly the ASIS Annual Seminar and Exhibits, the Society recognized the outstanding accomplishments of the security profession in 2018. ASIS was pleased to honor the following members and supporting organizations for their work to advance the Society and profession. </p><p>The Presidential Award of Merit, recognizing the commitment of exceptional volunteers, was presented to Oksana Farber and Joe McDonald, CPP, PSP. With more than 40 years of ASIS membership between them, these individuals demonstrate the very best in unselfish volunteer commitment and mentoring.</p><p>The Don Walker Award for Enterprise Security Executive Leadership celebrates an individual who demonstrates a commitment to promoting security management education, certification, and standards. The 2018 award recognizes the contributions of Mike Howard to advance the professionalism of the security industry.</p><p>The 2018 Professional Certification Board's Organizational Award of Merit honors Saudi Aramco for its extraordinary efforts to enhance the professional development of its security team through board certification.</p><p>The I.B. Hale Chapter of the Year Award is given to chapters that demonstrate financial stability, membership growth, high-quality meetings, educational programs, publications, and efforts that support the advancement of the security profession. This year's winners are the Victoria, Australia; Florida West Coast; and Mexico City chapters.</p><p>The Roy N. Bordes Council Member Award of Excellence recognizes a distinguished council member who selflessly shares expertise, encourages the next generation of leaders, and offers insight to ASIS educational programs and publications. The 2018 winner is Utilities Security Council co-vice chair Allan Wick, CPP, PCI, PSP. </p><p>The E.J. Criscuoli Jr. Volunteer Leadership Award, presented this year to James R. Finnelly, CPP, recognizes members who have made significant volunteer commitment at the chapter and regional levels.</p><p>The Matthew Simeone Award for Public-Private Partnership Excellence, administered by the ASIS Law Enforcement Liaison Council, distinguishes an program promoting cooperation between the public and private sectors. This year the award, nominated by the ASIS Azalea Coast Chapter recognizes the partnership between the Wilmington North Carolina Police Department and Wilmington Housing Authority. </p><p>The ASIS Foundation is proud to invest in individuals and chapters, offering scholarships and grants to support those pursuing security careers in achieving their professional goals. These scholarships would not be possible without the generosity of ASIS members, and the Foundation recognized the following donors at GSX: Outstanding Individual Donor, Frank Argenbright; Outstanding Corporate Partner, TD Bank; Outstanding Regional Donor Award, Region 11, West & Central Africa; and Outstanding Lifetime Supporter, Bernie Greenawalt, CPP.</p><p>ASIS thanks these award winners for their valued contributions to the security profession.</p><p> </p><h4>ASIS Maps Career Pathways</h4><p> In partnership with the Security Industry Association, ASIS has developed the Security Industry Career Pathways Guide—a new career resource that provides an insightful and detailed look into what a career in the security profession looks like in today's market. </p><p>Designed to empower students and security professionals at all levels with insight into professional growth opportunities, it also provides a clear understanding of the necessary skills for success.</p><p>Find it at <a href="http://www.asisonline.org/careerpathwaysguide">www.asisonline.org/careerpathwaysguide</a>.</p><p> </p><h4>New Membership Dues Rates</h4><p>ASIS represents professionals who advance security management in hundreds of countries around the world—across numerous sectors and at every career stage. </p><p>In support of its globalization initiative, the Society is pleased to announce a new emerging markets dues structure that provides individuals living in countries classified as upper-middle, lower-middle,  or low income by the World Bank with better accessibility to ASIS membership.</p><p>This change breaks down barriers to membership for a significant population of security professionals by accounting for ability to pay in local income economies. </p><p>ASIS recognizes the important role played by all members regardless of the region in which they live and opens a global line of communication through which information can be shared and valuable insight gained.</p><p>For more information about the new dues structure, <a href="http://www.asisonline.org/dues">www.asisonline.org/dues</a>.</p><p> </p><h4>Crime Prevention Council Spotlight</h4><p>Before ASIS Crime Prevention Council Chair Deyanira Murga assumed her leadership role in 2016, the council had just nine participating members. In the few short years that followed, the council has grown to include a diverse global membership of 32, dedicated to advance the council's mission of globalization and knowledge transfer through an innovative series of initiatives.</p><p>"Our discipline is not just a corporate security department," says Murga. "Crime prevention crosses all sectors of security. It's a piece of healthcare security, and it's a piece of cultural properties security, but it also has a lot to do with communities—with citizens, government, law enforcement, and schools. You have to be proactive and project future events that are going to affect your communities with some sort of violence or other phenomenon."</p><p>The council focuses on the pillars of Intelligence, Technology, and Culture in crime prevention, sharing with the full spectrum of security the ways that predictive analyses and new technologies can be used to stop violence and crime from occurring.</p><p>In 2018, the council produced an Insider Threat webinar series and took a different approach to the traditional webinar. To provide a holistic view of issues surrounding insider threat, the council invited all of its members to participate in the development of insider threat case studies. Over the course of this three-</p><p>webinar series, a dozen council members spoke on different concepts, each helping to provide attendees with a more complete understanding.</p><p>Murga applies this outside-the-box thinking to the development of the council's sponsored education session at Global Security Exchange (GSX). "When I go to the annual conference, I want to see something that's never happened before," she says. "These days, I can attend a lecture virtually as a webinar, or at a local chapter meeting. I want our council to produce education that can only happen at major meetings like these."</p><p>This year, the council arranged a panel discussion surrounding issues of sexual harassment, hostile environments, and victimization in the workplace—featuring thought leaders from the U.S. Department of Homeland Security, CNN, MGM Resorts, U.S. Navy, and Hewlett-Packard. This marked the first time that any of these speakers had participated in the ASIS annual meeting.</p><p>The council also seeks to infuse new talent into the security workforce, in 2018 sponsoring a Security-a-thon—fashioned after Hack-a-thon challenges popular at universities across the United States. Small teams are presented with a problem—in this case, school violence prevention—and tasked with devising a solution. The team with the winning solution received a trip to GSX, sponsored by ASIS members.</p><p>"Our winners haven't yet been initiated into the security world," says Murga. "They brought a fresh perspective to the problem, with backgrounds in robotics engineering, public relations, and graphic design. With the opportunity to attend GSX and tour a casino's command center, they will become more aware of the needs of our profession. These young people can do creative, sustainable things that create a lasting impact on our Society."</p><p>The council is updating the "Small Business Guideline," which was first created back in 2007. The council is working with the Small Business Administration and the Chamber of Commerce to provide practical recommendations to small business owners and small franchise companies who normally do not have the budget to have an in-house security department or hire a security consultant. The goal is to work with the U.S. Department of Commerce and entrepreneurs to globally support this important economic sector.</p><p>The council has also been working with ASIS education staff to introduce a "Critical Thinking & Predictive Analysis: Smart Security" workshop coming in 2019. This innovative content will provide valuable insight for its members and new young professionals in how to develop new skills using future scenarios to analyze and process information and data to collect better intelligence for crime prevention.</p><p>Murga encourages members interested in learning more about the council's efforts to reach out via email, at dmurga@cerberus.consulting. To view available council resources, visit www.asisonline.org and search for Crime Prevention council.</p>

 

 

https://adminsm.asisonline.org/Pages/Shooing-off-Copper-Crime-Waves.aspx2018-11-01T04:00:00ZShooing off Copper Crime Waves
https://adminsm.asisonline.org/Pages/Disaster-Recovery.aspx2014-09-01T04:00:00ZDisaster Recovery
https://adminsm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx2014-05-01T04:00:00Z21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.

 

 

https://adminsm.asisonline.org/Pages/Next-Gen-911.aspx2018-06-01T04:00:00ZNext-Gen 911
https://adminsm.asisonline.org/Pages/Safety-and-Low-Frequency-Alarms.aspx2018-06-01T04:00:00ZSafety and Low Frequency Alarms
https://adminsm.asisonline.org/Pages/Flying-Over-Fire.aspx2018-03-01T05:00:00ZFlying Over Fire

 

 

https://adminsm.asisonline.org/Pages/ESTRATEGIAS-DE-CONTENCIÓN.aspx2018-03-14T04:00:00Z​ESTRATEGIAS DE CONTENCIÓN​
https://adminsm.asisonline.org/Pages/Vote-Integrity.aspx2018-02-01T05:00:00ZVote Integrity
https://adminsm.asisonline.org/Pages/Slipping-Through-the-Cracks.aspx2017-11-01T04:00:00ZSlipping Through the Cracks

 

 

https://adminsm.asisonline.org/Pages/Happy-Holidays-from-Security-Management.aspx2017-12-22T05:00:00ZHappy Holidays from Security Management
https://adminsm.asisonline.org/Pages/Accolades-Entries-Spotlight-Innovation.aspx2016-09-11T04:00:00ZAccolades Entries Spotlight Innovation
https://adminsm.asisonline.org/Pages/SM-Online-February-2016.aspx2016-02-01T05:00:00ZSM Online February 2016

 

 

https://adminsm.asisonline.org/Pages/January-2018-Industry-News.aspx2018-01-01T05:00:00ZJanuary 2018 Industry News
https://adminsm.asisonline.org/Pages/December-2017-Industry-News.aspx2017-12-01T05:00:00ZDecember 2017 Industry News
https://adminsm.asisonline.org/Pages/Driving-a-Security-Transition.aspx2017-10-01T04:00:00ZDriving a Security Transition

 

 

https://adminsm.asisonline.org/Pages/Resilience-Trends.aspx2016-09-01T04:00:00ZResilience Trends
https://adminsm.asisonline.org/Pages/Required-License-to-Operate.aspx2015-02-01T05:00:00ZRequired: License to Operate
https://adminsm.asisonline.org/Pages/chemical-facilities-tackle-explosive-problem-0013191.aspx2014-03-01T05:00:00ZChemical Facilities Tackle an Explosive Problem

 

 

https://adminsm.asisonline.org/Pages/Building-a-Hostility-Free-Work-Place.aspx2018-11-01T04:00:00ZBuilding a Hostility-Free Workplace
https://adminsm.asisonline.org/Pages/Book-Review-First-Responders-Handbook.aspx2018-10-01T04:00:00ZBook Review: First Responders Handbook
https://adminsm.asisonline.org/Pages/September-2018-Industry-News.aspx2018-09-01T04:00:00ZSeptember 2018 Industry News

 

 

https://adminsm.asisonline.org/Pages/Something-in-the-Water.aspx2018-11-01T04:00:00ZSomething in the Water
https://adminsm.asisonline.org/Pages/Paving-the-Way.aspx2018-03-01T05:00:00ZPaving the Way
https://adminsm.asisonline.org/Pages/GridEx-IV-Tests-The-North-American-Power-Grid.aspx2017-11-17T05:00:00ZGridEx IV Tests The North American Power Grid

 

 

https://adminsm.asisonline.org/Pages/A-Transformative-Tuesday-for-Education.aspx2018-09-26T04:00:00ZA Transformative Tuesday for Education
https://adminsm.asisonline.org/Pages/Security-Cares-Focuses-on-School-Safety.aspx2018-09-24T04:00:00ZSecurity Cares Focuses on School Safety
https://adminsm.asisonline.org/Pages/Harassment-in-the-Academies.aspx2018-09-01T04:00:00ZHarassment in the Academies

 

 

https://adminsm.asisonline.org/Pages/Book-Review---Financial-Investigations.aspx2018-08-01T04:00:00ZBook Review: Financial Investigations
https://adminsm.asisonline.org/Pages/Giving-Security-Credit.aspx2018-05-01T04:00:00ZGiving Security Credit
https://adminsm.asisonline.org/Pages/The-Fraudians-Slip-In.aspx2018-03-01T05:00:00ZThe Fraudians Slip In

 

 

https://adminsm.asisonline.org/Pages/Four-Ways-to-Improve-Healthcare-Security.aspx2018-06-01T04:00:00ZFour Ways to Improve Healthcare Security
https://adminsm.asisonline.org/Pages/Top-Five-Challenges-in-Healthcare.aspx2018-06-01T04:00:00ZTop Five Challenges in Healthcare
https://adminsm.asisonline.org/Pages/Access-Control-for-Healthcare-and-Nursing-Facilities.aspx2018-04-19T04:00:00ZAccess Control for Healthcare and Nursing Facilities

 

 

https://adminsm.asisonline.org/Pages/SHOOTING-AT-BORDERLINE-BAR-IN-THOUSAND-OAKS,-CALIFORNIA.aspx2018-11-08T05:00:00ZBreaking News: Shooting at Borderline Bar in Thousand Oaks, California
https://adminsm.asisonline.org/Pages/Pittsburgh-Shooting-Updates-and-ASIS-Houses-of-Worship-Resources.aspx2018-10-29T04:00:00ZPittsburgh Shooting: Updates and ASIS Houses of Worship Resources
https://adminsm.asisonline.org/Pages/Eye-on-the-High-Life.aspx2018-07-01T04:00:00ZEye on the High Life

 

 

https://adminsm.asisonline.org/Pages/November-2018-Industry-News.aspx2018-11-01T04:00:00ZNovember 2018 Industry News
https://adminsm.asisonline.org/Pages/October-2018-Industry-News.aspx2018-10-01T04:00:00ZOctober 2018 Industry News
https://adminsm.asisonline.org/Pages/Open-Doors,-Secure-Spaces.aspx2018-09-01T04:00:00ZOpen Doors, Secure Spaces

 

 

https://adminsm.asisonline.org/Pages/The-Fight-Against-Fake-Pharmaceuticals.aspx2015-02-01T05:00:00ZThe Fight Against Fake Pharmaceuticals
https://adminsm.asisonline.org/Pages/uncovering-smart-solutions-0013513.aspx2014-07-01T04:00:00ZUncovering Smart Solutions
https://adminsm.asisonline.org/Pages/online-pharmacies-0013326.aspx2014-05-01T04:00:00ZRogue Online Pharmacies

 

 

https://adminsm.asisonline.org/Pages/Book-Review-Are-We-Safe-Enough.aspx2018-11-01T04:00:00ZBook Review: Are We Safe Enough?
https://adminsm.asisonline.org/Pages/Safer-Shipping.aspx2018-11-01T04:00:00ZSafer Shipping
https://adminsm.asisonline.org/Pages/Preventing-Port-Problems.aspx2018-10-01T04:00:00ZPreventing Port Problems

 

 

https://adminsm.asisonline.org/Pages/Safer-Shipping.aspx2018-11-01T04:00:00ZSafer Shipping
https://adminsm.asisonline.org/Pages/Preventing-Port-Problems-.aspx2018-10-01T04:00:00ZPreventing Port Problems
https://adminsm.asisonline.org/Pages/Preventing-Port-Problems.aspx2018-10-01T04:00:00ZPreventing Port Problems

 You May Also Like...

 

 

https://adminsm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://adminsm.asisonline.org/Pages/Five-Insights-on-ESRM.aspxFive Insights on ESRM<p>​There are five overall concepts that provide guidance about the nature of enterprise security risk management (ESRM). These concepts describe what ESRM is, what it can do for security managers, how security can gain C-suite approval for it, and how to implement a vibrant ESRM program for the enterprise. </p><h4>ESRM Is a Philosophy</h4><p>ESRM is not a standard, nor is it a rigid set of rules to follow. ESRM is a philosophy of managing security. It is based on standard risk management practices, the same ones that guide most of the other business decisions made by the enterprise. It requires partnership with the business leaders in the organization.</p><p>This philosophy gives the security leader the ability to manage security risks. This ability is not based on the latest incident or scare in the news, nor is it based simply on the manager’s own ideas of what is most important to protect. Instead, it is based on a shared understanding of what the business deems critical for risk mitigation, and what level of risk the business is willing to accept in different areas. This ability also requires that the business fully understand why the security risk mitigation tactics have been put in place, and what the impact of not having those mitigations might be. </p><p>The emphasis here is on business. ESRM philosophy recognizes that security risk does not belong to security. It is a business risk, like any other financial, operational, or regulatory risk, and final decisions on managing that risk must belong to the business leaders. That shift in understanding sets a security program up for a greater level of success because security leaders are delivering only what the business needs, and, more important, what the C-suite understands that it needs.​</p><h4>ESRM Is a Process </h4><p>ESRM is not merely an academic philosophy. A general approach for setting up and running a security program can be derived from it. Under that approach, ESRM in action is a cyclical program, and the cycle of risk management is ongoing:</p><p>1. Identify and prioritize the assets of an organization that need to be protected.</p><p>2. Identify and prioritize the security threats that the enterprise and its assets face—both existing and emerging—and the risks associated with those threats.</p><p>3. Take the necessary, appropriate, and realistic steps to protect and mitigate the most serious security threats and risks.</p><p>4. Conduct incident monitoring, incident response, and post–incident review, and apply the lessons learned to advance the program. ​</p><h4>ESRM Aligns with the Business</h4><p>Aligning the security program with business requirements is the most critical component of the ESRM philosophy. This means that the security program must receive governance and guidance from the business. We recommend the formation of a security council to ensure this alignment. </p><p>There are several ways to implement a council. It could be a loose, informal group that provides input as needed, or it could be a board-level initiative that has formal roles, meetings, charters, and documented responsibilities for ensuring security compliance. The council can be a venue for discussing security topics and risk management strategies, and it can host resolution attempts for conflicts in the process. </p><h4>ESRM Covers All Security </h4><p>There is no aspect of security that cannot be managed in alignment with the ESRM philosophy.  Many security professionals already practice much of the ESRM philosophy without thinking of it that way. For example, performing a physical security risk assessment on a facility is equivalent to the ESRM steps of identifying and prioritizing assets and risk. And setting up a crisis management plan can be considered an aspect of ESRM risk mitigation, as well as incident response.</p><p>The critical difference between programs that do these activities as part of a traditional security program versus an ESRM program is the consistency of approach in ESRM. In ESRM, these activities are not performed on an ad hoc basis but consistently across all areas of security risk. They are not applied to one area of the organization and not to another. And, vitally, they are not performed in a vacuum by security and for security, but in full partnership with the business leaders driving the decision making process for all risk mitigation.​</p><h4>ESRM Is Possible</h4><p>Implementing ESRM cannot be done overnight.  It’s an iterative process that allows your security program to evolve over time into a pure risk management approach. For the security manager, the first step to fully understanding the ESRM philosophy is to communicate it to the executives and business leaders in the enterprise.  </p><p>When implemented thoughtfully and practiced consistently, ESRM can completely change the view of the security function in any organization. The old view of security as “the department of no” will shift when business leaders understand that security is a partner in ensuring that the assets and functions of the enterprise most critical to the business are protected in accordance with exactly how much risk the business is willing to tolerate.  </p><p><strong><em>Rachelle Loyear i</em></strong><em>s ESRM Program Manager for G4S and chair of the ASIS Crime Management and Business Continuity Council. </em><strong><em>Brian J. Allen, Esq., CPP,</em></strong><em> is a member of the ASIS ESRM Commission. Allen and Loyear are coauthors of </em>The Manager's Guide to Enterprise Security Risk Management <em>and the forthcoming book </em>Enterprise Security Risk Management: Concepts and Applications.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://adminsm.asisonline.org/Pages/Book-Review---Hospital-and-Healthcare-Security.aspxBook Review: Hospital and Healthcare Security, Sixth Edition<p>Earlier editions of <i>Hospital and Healthcare Security</i> have long been a staple in the library of hospital security professionals, and this sixth edition will be no exception. Practitioners who are looking for proven solutions to old or new security problems should start with this reference.  </p><p>The authors continue to focus on the issues that are at the core of the healthcare market, and they have stayed abreast of the changes in the industry and the required changes in facility security programs. New developments such as the use of body cameras for security officers and trends in arming security personnel are addressed in this updated edition.  </p><p>Best practices from throughout North America and the United Kingdom are highlighted in this book. The authors have done a wonderful job with the presentation of security program management and program delivery, identifying best practices and areas of concern and providing real-world examples, procedures, and policies. They have addressed staffing, operations, tools, and equipment.</p><p>The authors have even touched on the needs of healthcare facilities beyond the traditional hospital setting and in off-campus facilities. They have addressed security design philosophies and practices as well as systems and equipment and how they are best employed at a healthcare facility.  </p><p>The material is well organized and written and will be an invaluable resource to hospital and healthcare security professionals, to consultants, and even to facility administrators.  </p><p><em><strong>Reviewer: Michael Preece</strong>, PE (Professional Engineer), PSP, CxA (Certified Commissioning Authority), is a principal with Smith Seckman Reid and runs the company’s Washington, D.C. office. Preece has been providing planning, design, start-up, consultation, and commissioning services for security systems over the last 15 years, much of it concentrated on hospitals and healthcare facilities. He is a member of the ASIS International Healthcare Security Council. </em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465