Needs and Requirements
What systems do we need and require to develop a Security Master Plan? This interactive workshop will allow attendees to learn the processes of developing a Security Master Plan, such as proper technologies and managing the design through deployment phases. Participants will examine all of the stages required to successfully create, design, deploy, manage, and complete a Security Master Plan.
Intrusion Detection System
Do we need an intrusion detection system? If so, how will it be administered and monitored? Learn to take into account all the factors in determining the "right" system for the right application. Where does the Intrusion Detection System fit into your plan?
What about access control? Is it a need or requirement? How will it be administered? Will access control be a part of an enterprise system or stand alone? Examine all the parameters to be considered in designing and deploying the right access control system for any need.
Video Surveillance Systems
Develop a high level approach to the technologies available to include recording and storage media options. A practical exercise during the workshop will allow you to select options for a video surveillance system based on particular scenarios. This is a key function in security master planning.
Take a long look at Control Rooms and how they are properly laid out. You will examine what should go into a control room and why. You will be given the choice of control room or equipment closet and be asked to define the spaces and equipment required for each.
Scheduling and Planning
Review scheduling and planning prior to and throughout the deployment of a security system. You will examine some of the common pitfalls experienced throughout the process and look at preventative solutions.
Handling the Unexpected
So, you have your master plan in place and the systems are deployed. What happens in a system failure or system shutdown? Examine proactive and preventative measures that can be implemented from the onset of design through the process and deployment. Examine risk management techniques and monitoring practices to help plan for the unexpected.
Who are the stakeholders in a security system? Identify critical as well as secondary stakeholders in a security system, showing how each plays a vital role in the master planning and deployment.