Security Program Development and Effective Risk Management
Review risk management standards and risk assessment tools. Review how vulnerability assessments can be used to identify threats for enhanced risk management. Learn to plot risk for enterprise risk management alignment; determine your risk tolerance; and learn how to use risk mitigation in security planning.
Often misunderstood and left unapplied, a good governance structure is necessary to effective security management. Security governance, risk, and compliance management are linked as an important triad in the security model.
Examine the protection principles used within our security programs. Review in depth defense, deterrence, detection, delay, and response concepts. Critical asset identification, adversary path applications, worst case scenario planning, response exercises, and the relationship between business continuity, disaster recovery, and safety are covered.
Security Program Metrics
Review who uses metrics, how to select the best ones for your program, and why they are important—especially in promoting your department. Discuss the contribution of security incident management to metrics and learn how useful audits can be using metrics as a baseline.
Security Command Centers
All segments of a command center will be addressed, from selecting, staffing, and equipping to business case support and critical functions.
Security Technology Application
A fully integrated security program model is necessary in today’s security management plan and for future-proofing your security program. Evaluate the capabilities of common physical and cyber security technologies; then learn to measure system effectiveness. Learn how information technology management and operational technology management link to the overall technology applied to the security program.
Standards and Guidelines
Examine the difference and learn why we need both. See how they can be used in the assessment process. Sample security standards will be reviewed. A call for involvement will be presented as well.
Program Design: Complex Security Problems, the Utilities View
Bring it all together for dams and powerhouses, nuclear plants, reservoirs, pipelines, and transmission lines. Acts of terrorism, building response programs, and working with outside agencies will also be included.
Use this exciting opportunity to collaborate with other security practitioners from diverse industries. Hear from seasoned security professionals.