A Secure Frontline September 25, 2003 R. E. Cunningham, SVP, National Marketing Manager HDR Security Operations, Inc.
Dec 26, 2015
A Secure Frontline
September 25, 2003R. E. Cunningham, SVP, National Marketing
ManagerHDR Security Operations, Inc.
Security Words of Wisdom
To paraphrase the ancient Chinese military historian
Sun Tzu (350 BC)…
“He who tries to defend everything ends up defending nothing.”
Type of Anti-US Attacks, 2001
Bombing-207Kidnapping-6Vandalism-3Armed Attack-1Firebombing-1Hijacking-1
Threat Is Not Only International in Nature
Domestic Terrorists/Workplace Violence can also be a threat
23 Hate groups operate in Missouri and Kansas alone
Oklahoma bombing was Domestic Terrorism
Anthrax may have been Domestic
Security Concepts
Concentric Circles of Security Deter Detect Delay Or You Just
Document
Defense in Depth
Concentric Circles of Security
Deter – Detect - Delay
DetectionTime Lapse
Assessm
entA
ssessment
Response TimeResponse Time
Detection begins
Dispatchdecision
Contactbegins
Physical / Mechanical / Electronic Delays
Event Time Measured in Minutes
Deter – Detect - Delay
Physical / Mechanical / Electronic Delays
DetectionTime Lapse
Assessm
entA
ssessment
Response TimeResponse Time
Detection begins
Dispatchdecision
Contactbegins
Event Time Measured in Minutes
The Challenge of “Multiple Port/Waterway Players”
Assessments
Criticality
Vulnerability
Threat
Risk
ResponsivenessReadiness
DNRs USACE Railroads Trucking Companies Utilities Other Port Tenants Warehousing
Port Authority Terminal Operators Stevedors Shipping/Barge
Companies Logistics Companies Unions Coast Guard MARAD Customs State DOTS MPOs First Responders
Operational
Policies
and
Procedures
Physical
and
Electronic
Security
Enforcement and
Security Awareness
Holistic Security Planning
•Total Team Effort•Management - Authority•Coaches - Executives•Players – Staff/Tenants
•Total Team Effort•Management - Authority•Coaches - Executives•Players – Staff/Tenants
Policies and Procedures
The Game Plan Planning Operations Monitoring Reporting
Policy andProcedures
Standard Operating Procedures (SOP’s)
Emergency Operating Procedures (EOP’s)
Emergency Response Plans (ERP’s)
Mutual Aid
Media Management
Enforcement and Security Awareness
The Team – Personnel Who Are…… Informed - Threat awareness Trained - Emergency response Empowered – Operations Equipped – The Tools
TrainingPrograms
Command
Operation
Awareness
The Tools
Blast Protection Glazing Analysis MaterialMaterial AnalysisStructural AnalysisProgressive CollapseFacility Hardening
Barriers PassiveActive
Ballistically Resistive Materials
Vault/Safehaven Design
Crime Prevention through Environmental
Design (CPTED)
Illumination EngineeringHardware Key Control/Management
Locking Systems
PhysicalSecurity
Multiple User Access Control?
ElectronicSecurity
Intrusion Detection Perimeter SecurityIntrusion Protection
Access Control BiometricCypherCardPersonal Identification Number (PIN)
Situation AnnunciationClosed Circuit Video Equipment (CCVE)
Communications Data CommunicationsIntercommunicationsTelecommunicationsRadio Frequency
Access Denial Systems
ScreeningChemicalBiologicalNuclearRadiologicalExplosiveWeaponsHeartbeat
Electronic Article Surveillance
The Tools
DataSecurity
Employee Data
Access Controls
Data Networks
Telecommunications
CATV/MATV
Infrastructure CopperFiber OpticWireless
Firewalls
Document StorageBackups Data
Power
The Tools
Exercises are Key Performance Penetration (Black Hat) Real Time Response Routine System Testing
The Tools
Q&AFor further questions or discussion on this topic
please contact
R. E. CunninghamR. E. [email protected]@hdrinc.com