CPS-Security consultative service will evaluate methods to improve or develop your current or proposed security program (s) on a continuous basis through auditing, security risk assessments and SWOT analysis in the following domains, and sub-parts.
Security Principles and Practices
· Plan, develop, implement, and manage the organization’s security program to protect the organization’s assets.
· Develop, manage, or conduct the security risk assessment process
· Evaluate methods to improve the security program on a continuous basis through the use of auditing, review, and assessment.
· Develop and manage external relations programs with public sector law enforcement or other external organizations to achieve security objectives.
· Develop, implement, and manage employee security awareness programs to achieve organizational goals and objectives.
Business Principles and Practices
· Develop and manage budgets and financial controls to achieve fiscal responsibility
· Develop, implement, and manage policies, procedures, plans, and directives to achieve organizational objectives.
· Develop procedures/techniques to measure and improve organizational productivity
· Develop, implement, and manage security staffing processes and personnel development programs in order to achieve organizational objectives.
· Monitor and ensure a sound, ethical climate in accordance with regulatory requirements and the organization’s directives and standards to support and promote proper business practices.
· Provide advice and assistance to management and others in developing performance requirements and contractual terms for security vendors/suppliers.
Investigations
· Identify, develop, implement, and manage investigative functions.
· Manage or conduct the collection and preservation of evidence to support investigation actions.
· Manage or conduct surveillance processes.
· Manage and conduct investigations requiring specialized tools, techniques, and resources.
· Manage or conduct investigative interviews.
· Provide coordination, assistance, and evidence such as documentation and testimony to support legal counsel in actual or potential criminal and/or civil proceedings.
Personnel Security
· Develop, implement, and manage background investigations for hiring, promotion, or retention of individuals.
· Develop, implement, manage, and evaluate policies, procedures, programs and methods to protect individuals in the workplace against human threats (e.g., harassment, violence).
· Develop, implement, and manage executive protection programs.
Physical Security
· Conduct facility surveys to determine the current status of physical security.
· Select, implement, and manage physical security strategies to mitigate security risks.
· Assess the effectiveness of the security measures by testing and monitoring.
Information Security
· Conduct surveys of information asset facilities, processes, systems, and services to evaluate current status of information security program.
· Develop and implement policies and procedures to ensure information is evaluated and protected against all forms of unauthorized/inadvertent access, use, disclosure, modification, destruction, or denial.
· Develop and manage a program of integrated security controls and safeguards to ensure information asset protection including confidentiality, integrity, and availability.
Crisis Management
· Assess and prioritize threats to mitigate potential consequences of incidents.
· Prepare and plan how the organization will respond to incidents.
· Respond to and manage an incident.
· Recover from incidents by managing the recovery and resumption of operations.
Partial list of individual components listed are priority focus for all public and non-public company structures.
Be proactive, evaluate your security program continuously and ensure industrial standards and updates are compliant, avoiding any unnecessary risk and/or Vulnerability gaps.
Enterprise Security Risk Management:
a strategic approach to security management that ties an organization’s security practice to its overall strategy using globally accepted and established risk management principles.
ESRM is not a tactical program or an element of an existing security program. In fact, ESRM replaces the security tactical-program methodology for managing security.
ESRM connects all key elements of security risk with the organization's assets, enabling decision making by asset owners.
ESRM addresses all security risks to an organization’s assets, identifying and prioritizing them and developing specific mitigation steps. The objective is effective mitigation, not a program to address a specific threat or issue
In ESRM, the security professional transitions from managing a security function (delegated role) to a trusted advisor and partner for asset owners. In this transition, the security professional leaves the role as a task manager who executes specific steps for security services and shifts to a strategic resource for the organization, adopting a more holistic view of risk.
The security professional provides information and guidance to asset owners for prioritizing assets, identifying and prioritizing risk to those assets, and selecting mitigation strategies and plans.
In reality, ESRM manages security risk holistically, regardless of the organizational structure.
The Asset Owner is the person most directly responsible for successful operation of the asset.
ESRM assigns responsibility for the risk to an asset to the asset owner because the asset owner best understands the asset. Asset owners (The risk owner) are trusted to make decisions about risks to their assets.
The Security Professional acts as a security risk subject matter expert and a trusted advisor to asset owners, top management, and other stakeholders. The security professional guides the asset owner through the security risk decision making process and may lead agreed upon mitigation actions.
Executive Management is the highest level of executive leadership in an organization (for example, the c-suite or an executive committee). In some organizations, asset owners may be in the Executive Management level.
For the security professional, security group, and the organization, ESRM provides numerous benefits and overcomes long-standing roadblocks.
Strategic Partner & Trusted Advisor
Knowledge of the Enterprise
Focus on Risk, Not Tasks
Proactive Approach
Risk Visibility
Enhanced Resilience
MISSION & VISION
CORE VALUES
OPERATING ENVIRONMENT
STAKEHOLDERS
Products & Services
Leadership & Key Staff
Legal Requirements and Regulations
Strategic Plans
An organization’s core values frequently go beyond making a profit and increasing shareholder value. They often define the organization's culture and may include things like:
When evaluating values/culture, consider the following:
Strategically linking ESRM to the organization’s core values and specifically mentioning them in security strategy and messaging should ensure alignment with the priorities of top management.
To assess risk and build relationships, security professionals need to understand the operating environment in which the organization functions.
This environment includes physical, nonphysical, and logical.
Physical
The physical environment includes much of what influences traditional security factors such as:
Nonphysical
Nonphysical factors include
Logical
Logical factors include the organization’s various information types. It also includes digital assets and the network or digital space that connects them to each other and to stakeholders.
Examples of this are
Anyone who directly interfaces with the organization may be considered a potential stakeholder. They may impact and/or be impacted by the organization, its assets, or its personnel. Security professionals should know stakeholders of the organization and understand what is important to those stakeholders. Knowing what is important to stakeholders enables the security professional to better advise and consult with stakeholders and assist them in formulating mitigation strategies for security and related risk.
Stakeholders could include:
The Leadership Team
Asset Owners
Individuals working for or on behalf of the organization
Individuals who contribute knowledge to the organization
Clients and Customers
Local Community
Stakeholder support is critical to the successful adoption of ESRM. It is important to identify them, engage them, understand what is important to them, and align with their priorities. Once security professionals understand the priorities of the organization’s stakeholders, they can better support them in achieving their objectives. Creating supportive relationships is critical in an ESRM environment.
Note that understanding stakeholders does not necessarily mean harmonizing their interests, but rather understanding their needs and their risk insights to better facilitate the ESRM process.
Security professionals with a thorough understanding of the organizations they are protecting are well-positioned to successfully adopt and implement ESRM within their organizations. To ensure sustained longevity and success, there are four other critical concepts to incorporate.
Called the Foundation of ESRM, its four components are
Two types of transparency are particularly relevant from the perspective of ESRM.
Risk Transparency
Process Transparency
Other aspects of security risk management that security professionals are encouraged to share with asset owners and stakeholders include:
Governance refers to the rules and processes by which a function or organization is governed. Governance helps to effectively manage expectations and improves clarity and consistency. Governance also ensures that efforts across the organization ultimately satisfy the needs of the organization.
Two types of governance are particularly relevant from the perspective of ESRM.
Organizational Governance
ESRM Governance
The ESRM Cycle is the part of the ESRM approach that describes how security risks are to be mitigated. This cycle is like other processes available in the security industry. Perhaps its most defining characteristic is its emphasis on understanding organizational assets and involving asset owners in the risk management process.
The ESRM Cycle includes four processes:
Please give us a call for additional information, or to schedule an onsite consultative visit.
Forward-thinking leaders:
Will think two or three moves ahead. They think not only about what they have achieved, but about how they can achieve more. They diversify their knowledge, challenging themselves to maximize their responsibilities.
Supportive Leaders:
Leads by example, focusing on team development and positive communications.
Fostering pride & ownership, motivating one to self-challenge, creating a positive work environment while providing best work practices and success.
Copyright © 2018 Crawford Professional Services - All Rights Reserved.
Powered by GoDaddy Website Builder