Use your security dollars wisely!
A cost-effective, fully-functional facility security system design is the foundation of your organization’s protection and loss control program.
Integrating multiple security systems in a layered effect—including CPTED and architectural security, critical infrastructure protection, building designs, interior/exterior layout, intrusion detection systems, structural barriers, access controls, communications, and CCTV assessment—contributes to the protection of assets as well as the control and reduction of losses.
"This was a solid class on security design. It was perfect for beginners and did a good job reinforcing my knowledge base."
Chris S Hatfield
ZBeta Consulting @ Amazon Corp Campus
This intensive, three-day program offers a detailed, systematic, professional approach to the design of a fully-integrated physical security program. It provides solid recommendations for improving protection against terrorism, workplace violence, street crime, and other threats. Participate in a 3-day case study to immediately apply new information and understanding. Participants conduct a security site visit of a local facility.
Learn from leading security design architects, engineers, and operations experts as they share proven methods for completing cost-effective facility security designs and ideas about how to present a sound business case for these solutions to senior management.
This program includes a site visit to MillerCoors. The host organization may require the use of non-disclosure agreements. Subject to the requirements of the host organization, the agreements offered to nationals and non-nationals of the host country may differ.
- Transition from theory to practice to determine your security needs.
- Analyze methods to reduce and control security project costs.
- Examine multiple approaches to assess risks, threats, and vulnerabilities.
Gain a deeper understanding of the structured approach used by engineers and architects to design fully integrated security systems.
- Master your ability to define security design requirements and select appropriate countermeasures and security technologies that reduce or mitigate risks and protect client assets.
- Learn how to prepare and defend a security business case before management—one that outlines the security design, shows the advantages, and addresses key financial analyses.
- Identify effective project management techniques used to bid, enhance construction management, and implement security systems.
Who Should Attend
- Architects, designers, integrators
- Security directors
- Practitioners responsible for their organization’s physical security controls
- Personnel directly involved in the design, specification, implementation, operation, or maintenance of security systems
Assess and analyze security systems and operations using knowledge gained in the classroom during an exclusive, customized behind the scenes tour of MillerCoors.
Learn how to integrate design and security systems. Create your own architectural and engineering design solutions based on a multi-story facility design practicum.
LEED and GREEN: Sustainability's Impact on Security
Learn how LEED 2009 and sustainability strategies will impact your existing or proposed building.
Designing to Resist Terrorist Attacks
Develop a basic understanding of how to cost-effectively approach the protection of your people and critical infrastructure. Learn how to evaluate the level of risk from terrorist attacks and the consequences.
Overview of Security Countermeasures and Their Selection
Examine how security countermeasures are derived from functional security design requirements. Learn how to build a layered security solution. Better understand security technology systems and their role in facility design and operation.
The Security Design Process
Learn to interface successfully with the design process by applying sound engineering analysis, project management skills, CPTED, and proven architectural security techniques. Develop a responsive design project on time and within budget.
Design Team Interfaces
Explore the roles and responsibilities of key members. Discuss techniques that ensure effective communication and coordination between team members and the various design disciplines and how to introduce requirements at the appropriate times.
Functional Requirements and Conceptual Design
Learn how the designer establishes security requirements and the desired level of protection. Discover how these evolve into a complete functional security design and are traced through the life of the project.
Security Program Integration
Gain exposure to the approach and techniques of systems integration that are applied during the design stage, and that culminate in a complete security program and master plan.
Security System Documentation
Review the major aspects of design documentation and learn how to manage the preparation of design deliverables.
Estimating the Cost of the Project
Learn to produce an estimate based on information gained from various sources that are in line with the functional design requirements and the basis of design.
Engineering Design Considerations
Understand how a security system design is developed and converted into a facility design solution.
Explore how to control costs by avoiding rework, achieving optimum equipment utilization, manpower reduction, and proper use of consultants.
Preparing and Presenting a Security Business Case
Discuss security’s contribution to a company's bottom line and examine how to successfully present and defend your security business case to management. Learn how to get approval and how to get a sufficient capital budget for implementation.
Managing Project Changes
Learn how to deal with the impact of the inevitable changes in requirements, scope, budgets, and/or changes in direction.
Completing the Process
Address procurement—the bid and selection process, evaluation criteria, successful bid negotiation, and project award techniques—before moving on to construction administration.
It is assumed that participants have a basic familiarity with CPTED, security equipment, and physical security.