Needs and Requirements
What systems are needed and required for our needs and requirements? This interactive workshop will allow attendees to live the processes of developing a Security Master Plan. From deciding on proper technologies to managing the design through deployment phases, we will examine all of the stages required to successfully create, design, deploy, manage, and complete a Security Master Plan.
Intrusion Detection System
Do we need an intrusion detection system? If so, how will it be administered and monitored- The workshop will take into account all the factors in determining the “right” system for the right application. Where does the Intrusion Detection System fit into our plan?
What about access control? Is it a need or requirement? How will it be administered? Will access control be a part of an enterprise system or stand alone? The workshop will examine all the parameters to be considered in designing and deploying the right access control system for any need.
Video Surveillance Systems
The workshop will take a high level approach to the technologies available to include recording and storage media options. A practical exercise during the workshop has attendees select options for a video surveillance system based on particular scenarios. A key function in Security Master Planning
The workshop will take a long look at Control Rooms and how they are properly laid out. We will examine what should go into a control room and why. Class attendees will be given the choice of control room or equipment closet and be asked to define the spaces and equipment required for each.
Scheduling and Planning
The workshop will take a look at the scheduling and planning prior to and throughout the deployment of a security system. We will examine some of the common pitfalls experienced throughout the process and look at preventative solutions.
Handling the Unexpected
So, you have your master plan in place and the systems are deployed. What happens in a system failure or system shutdown? The workshop will examine proactive and preventative measures that can be implemented from the onset of design throughout the process and deployment. The workshop will examine risk management techniques and monitoring practices to help plan for the unplanned.
Who are the stakeholders in a security system? The workshop will identify critical as well as secondary stake holders in a security system, showing how each plays a vital role in the master planning and deployment.