RESULTS FOR: Physical Security
August 11, 2022 | Physical Security Risk + Compliance
Why are you operating your physical security program? What threats are you trying to protect against? What specific risks to your organization and enterprise are you trying to mitigate?
If you cannot quickly and succinctly answer these questions, you may have skipped the critical step to developing a foundation for your physical security program – conducting a Threat and Vulnerability Risk Assessment (TVRA). Basing your physical security program on the results of a formal TVRA process defines the reasoning and … Read More
June 29, 2020 | Physical Security Security Consulting
While principles of physical security are largely universal, data centers require a nuanced approach and are a great case study for security practitioners. In this blog, I will discuss basic security design for data centers and the new technologies now available to address the COVID era.
Looking ahead at commercial and industrial demands for data consumption, it is clear the data center industry will continue to thrive. Estimates on market growth average 15% year over year from 2020-2023. Whether you … Read More
November 12, 2019 | Physical Security Security Consulting
April 24, 2019 | Physical Security Security Consulting
In developing, deploying and managing physical and cyber security platforms around the globe, I often am asked about the latest lessons learned and best practices we recommend surrounding Integrated Identity Access and Identity Management (IAM). Current, traditional models for IAM do not address the vulnerabilities that have evolved throughout the security protection landscape, and corporations would be advised to take a fresh approach to their integrated IAM posture.
IAM is implemented in the corporate environment via three distinct … Read More
January 10, 2018 | Physical Security Security Consulting
In today’s business environment, managing risk requires a good understanding of the threats which exist outside our organizations but also those that exist within. So often our focus is on keeping the bad guys out, that we sometimes forget about the risks within our own organizations. Understanding your organization’s Insider Threat risk and having some common-sense tools to mitigate it, are the first steps to developing a successful strategy.
According to the 2015 Forrester Global Security Survey, 56% of … Read More