Justifying Physical Security

78
Justifying Physical Security Justifying Physical Security James McDonald James McDonald

Transcript of Justifying Physical Security

Page 1: Justifying Physical Security

Justifying Physical SecurityJustifying Physical Security

James McDonaldJames McDonald

Page 2: Justifying Physical Security

Topics

• Today’s Economic Realities

• Areas of Loss, The New Numbers

• Opportunity, Temptation and the Fraud Triangle

• Physical Security Budget Policies

• Physical Security = ?

• Today’s Physical Security Solutions

• Best Way to Achieve Your Return on Investment

• The Best Process for Success

• Maximizing Proactive Physical Security Technology

• Questions & Answers

Page 3: Justifying Physical Security

,

Today’s Economic RealitiesToday’s Economic RealitiesToday’s Economic RealitiesToday’s Economic Realities

Page 4: Justifying Physical Security

Economic Realities JobsEconomic Realities JobsEconomic Realities JobsEconomic Realities Jobs

• During the 31 months from December 2007 through June 2010, the total number of mass layoff events was 61,852, and the associated number of initial claims was 6,213,880.

• Today unemployment is at 9.5% and an additional 7% of Americans are either holding part-time positions or no longer looking for work so they are no longer even counted as unemployed.

Page 5: Justifying Physical Security

Economic Realities Economic Realities Economic Realities Economic Realities Commercial Real EstateCommercial Real EstateCommercial Real EstateCommercial Real Estate

• Vacancies in the US retail industry rose to their highest level in at least a decade.

• Office vacancy rates are now at their highest level in 16 years.

• Source: Reis Inc. 4-7-2010

Page 6: Justifying Physical Security

Economic Realities Economic Realities Economic Realities Economic Realities Residential Real EstateResidential Real EstateResidential Real EstateResidential Real Estate

• Existing Home Sales Dive 27.2% to 15-Year Low*

• Sales of new homes unexpectedly sank 12.4% in July to the lowest point since government records starting being kept in

1963.**

Source: *Published August 24, 2010 Reuters. **Published August 27, 2010, Los Angeles Times

Page 7: Justifying Physical Security

Economic Realities GovernmentEconomic Realities GovernmentEconomic Realities GovernmentEconomic Realities Government

• August 2010 - The Congressional Budget Office (CBO) estimates that the federal budget deficit for 2010 will exceed $1.3 trillion—$71 billion below last year's total and $27 billion lower than the amount that CBO projected in March 2010, when it issued its previous estimate.

• Relative to the size of the economy, this year's deficit is expected to be the second largest shortfall in the past 65 years: At 9.1 percent of gross domestic product (GDP), it is exceeded only by last year's deficit of 9.9 percent of GDP.

Page 8: Justifying Physical Security

Economic Growth Rate DowngradedEconomic Growth Rate DowngradedEconomic Growth Rate DowngradedEconomic Growth Rate Downgraded

• Economic Growth Rate Economic Growth Rate Economic Growth Rate Economic Growth Rate Downgraded to Anemic 1.6 Percent Downgraded to Anemic 1.6 Percent Downgraded to Anemic 1.6 Percent Downgraded to Anemic 1.6 Percent in Second Quarter in Second Quarter in Second Quarter in Second Quarter ---- August 27, 2010August 27, 2010August 27, 2010August 27, 2010

• WASHINGTON – The Commerce Department is revising downward the economic growth from April to June to 1.6 percent annualized -- a decline from the original 2.4 percent forecast and much slower than the 3.7 percent of the first quarter 2010.

• Source: FOX NEWS

Page 9: Justifying Physical Security

How Can These Economic Realities Affect Your Security?

• The Goal of Most Business Owners, Management, Loss Prevention Staff, Asset Management and Security Teams is to

– PredictPredictPredictPredict Loss,

– PreventPreventPreventPrevent Loss and

– ProtectProtectProtectProtect Company Assets!

Page 10: Justifying Physical Security

Watch Out America!Watch Out America!Watch Out America!Watch Out America!

• Cutbacks force police to Cutbacks force police to Cutbacks force police to Cutbacks force police to curtail calls for some curtail calls for some curtail calls for some curtail calls for some crimescrimescrimescrimes.– “Budget cuts are forcing police

around the country to stop responding to fraud, burglary and theft calls as officers focus limited resources on violent crime.”

Source: USA Today, August 24 2010

Page 11: Justifying Physical Security

AREAS OF LOSS, THE NEW AREAS OF LOSS, THE NEW AREAS OF LOSS, THE NEW AREAS OF LOSS, THE NEW NUMBERSNUMBERSNUMBERSNUMBERS

Employee Fraud & Abuse, Organized Retail Crime, Insurance Fraud, Workplace Violence, Thoughts on Crisis Management

Page 12: Justifying Physical Security

2010 Report to the Nations2010 Report to the Nations2010 Report to the Nations2010 Report to the Nations

• Estimated that the typical organization loses 5% 5% 5% 5% of its annual revenue to fraud.

• Applied to the estimated 2009 Gross World Product, this figure translates to a potential total fraud loss of more than $2.9 $2.9 $2.9 $2.9 trillion.

Page 13: Justifying Physical Security

2010 Report to the Nations 2010 Report to the Nations 2010 Report to the Nations 2010 Report to the Nations

• Asset misappropriation schemes were the most common form of fraud in our study by a wide margin, representing 90% of cases.

• The median loss caused by the occupational fraud cases in their study was $160,000. Nearly one-quarter of the frauds involved losses of at least $1 million.

• The frauds lasted a median of 18 months before being detected.

• Victim organizations that had Anti-Fraud controls in place had significantly lower losses and time-to-detection than organizations without the controls.

• Read More at www.ACFE.com

Page 14: Justifying Physical Security

2010 ORC Survey2010 ORC Survey2010 ORC Survey2010 ORC Survey

• According to Congressional testimony and industry experts, ORC losses in the USA total an estimated $15$15$15$15----30 billion annually.30 billion annually.30 billion annually.30 billion annually.

• This year’s survey features responses from 124 executives representing department/large box stores, discount, drug, grocery, restaurant and specialty retailers.

Page 15: Justifying Physical Security

What is ORC?What is ORC?What is ORC?What is ORC?

• Organized Retail Crime (ORC) refers to groups, gangs and sometimes individualsindividualsindividualsindividuals who are engaged in illegally obtaining merchandise through both theft and fraud in substantial quantities as part of a criminal enterprise.

• These crime rings generally consist of “boosters” -who methodically steal merchandise from retail stores – and fence operators who convert the product to cash or drugs as part of the criminal enterprise or individuals working on their ownindividuals working on their ownindividuals working on their ownindividuals working on their own....

Page 16: Justifying Physical Security

Where Do The Products Go?Where Do The Products Go?Where Do The Products Go?Where Do The Products Go?

• Online marketplaces, such as websites and online auction sitesonline auction sitesonline auction sitesonline auction sites, are providing a national or even international platform to liquidate goods.

• The most popular items targeted by these groups are goods in high demand commanding up to a near-retail resale price, such as designer clothing, gift cards, over-the-counter medicines, electronics, batteries or whatever your company inventories.

Page 17: Justifying Physical Security

How ORC WorksHow ORC WorksHow ORC WorksHow ORC Works

Page 18: Justifying Physical Security

What’s New for 2010What’s New for 2010What’s New for 2010What’s New for 2010

• When asked, “Within the past year, what trends in organized retail crime have you noticed,” answers included:– Less fear of getting caught

– Smash and grab activity significantly increased

– Criminals are getting more violent, more bold

– Steady increase in activity

Page 19: Justifying Physical Security

2010 Insurance Fraud2010 Insurance Fraud2010 Insurance Fraud2010 Insurance Fraud

• Aug. 2, 2010 — The National Insurance Crime Bureau (NICB) Reports 14 Percent Rise in First Half 2010 Questionable Claims.

• The report examines six referral reason categories of claims—property, casualty, commercial, workers’ compensation, vehicle and miscellaneous.

Page 20: Justifying Physical Security

Workplace ViolenceWorkplace ViolenceWorkplace ViolenceWorkplace Violence

• There have been enough incidents of workplace violence over the past two decades — 500 to 1,000 workplace homicides a year, according to the U.S. Bureau of Labor Statistics, plus countless assaults, threats and coercive acts — that a body of research has developed on the subject, and it includes data on the harm done to those who witness the violence.

Page 21: Justifying Physical Security

CRISIS MANAGEMENTCRISIS MANAGEMENTCRISIS MANAGEMENTCRISIS MANAGEMENT

• In the past two decades, crisis management has become one of the fastest emerging of the business sciences.

• The reason for this interest is that a single crisis—any unexpected, negative event that could impair an organization—could lead to a loss of life as well as injure the reputation and profitability of a business. Develop a Plan, it could save your organization.

Page 22: Justifying Physical Security

A Crisis Can Cost Billions of DollarsA Crisis Can Cost Billions of DollarsA Crisis Can Cost Billions of DollarsA Crisis Can Cost Billions of Dollars

Page 23: Justifying Physical Security

Workplace Violence PlanWorkplace Violence PlanWorkplace Violence PlanWorkplace Violence Plan

• Part of your Crisis Management Plan should include dealing with a Workplace Violence.

• Allow employees control to help reduce stress.

• Train managers and employees to resolve conflict in a peaceful manner.

• Implement security programs that protect employees from internal and external risk.

• Provide counseling for laid-off employees.

Page 24: Justifying Physical Security

Workplace Violence PlanWorkplace Violence PlanWorkplace Violence PlanWorkplace Violence Plan

• Create a supportive work environment in which violence is not tolerated.

• Develop managers that respect workers.

• Train supervisors to recognize signs of a troubled employee.

• Provide personal counseling for workers.

• Establish procedures for handling grievances.

Page 25: Justifying Physical Security

OPPORTUNITY, TEMPTATION OPPORTUNITY, TEMPTATION OPPORTUNITY, TEMPTATION OPPORTUNITY, TEMPTATION AND THE FRAUD TRIANGLE AND THE FRAUD TRIANGLE AND THE FRAUD TRIANGLE AND THE FRAUD TRIANGLE

Why do many of these negative behaviors happen?

Page 26: Justifying Physical Security

OPPORTUNITY & OPPORTUNITY & OPPORTUNITY & OPPORTUNITY & TEMPTATIONTEMPTATIONTEMPTATIONTEMPTATION

Page 27: Justifying Physical Security

Fraud TriangleFraud TriangleFraud TriangleFraud Triangle

• Dr. Donald R. Cressey

• He was especially interested in the circumstances that lead otherwise honest people to become overcome by opportunity & temptation.

Page 28: Justifying Physical Security

Fraud TriangleFraud TriangleFraud TriangleFraud Triangle

• The key is that all three of these elements must exist for the trust violation to occur.

• My motivation has always been to eliminate the opportunity leg to create the perception that if you try you will be detected.

Page 29: Justifying Physical Security

Public View Monitor (PVM)Public View Monitor (PVM)Public View Monitor (PVM)Public View Monitor (PVM)

• In the 1990’s when Public View Monitors (PVM) first showed up a major C-Store chain had a 63% reduction in violent crime.

Page 30: Justifying Physical Security

PHYSICAL SECURITY PHYSICAL SECURITY PHYSICAL SECURITY PHYSICAL SECURITY BUDGET POLICIESBUDGET POLICIESBUDGET POLICIESBUDGET POLICIES

Page 31: Justifying Physical Security

How Do You Budget SecurityHow Do You Budget SecurityHow Do You Budget SecurityHow Do You Budget Security

• Is your Physical Security Budget a percentage of overall budget?

• Is it a Fixed Cost?

• In many organizations, the cost of physical security is a shared expense —or at least it should be.

• Security investments can have two kinds of payoffs: an improved security picture and an improved financial picture

Page 32: Justifying Physical Security

Security Budget & ROISecurity Budget & ROISecurity Budget & ROISecurity Budget & ROI

• What is the value of an Integrated Physical Security System to the whole organization?

• How do you justify the expense and what is the ROI on a new physical security countermeasure?

• How can a Physical Security System be use as a Tool for the entire organization?

• “Crede Sed Proba” - “Trust But Verify”

Page 33: Justifying Physical Security

Why Do Major Why Do Major Why Do Major Why Do Major OrganizationsOrganizationsOrganizationsOrganizations

• Install Integrated Video Surveillance Systems that go from 32 Cameras to 240 Cameras? There are many reasons here are my Top 10!

Page 34: Justifying Physical Security

Top 10 Reasons for Physical SecurityTop 10 Reasons for Physical SecurityTop 10 Reasons for Physical SecurityTop 10 Reasons for Physical Security

• Remote Viewing - Multiple Locations

• Workplace Violence

• Security for the Facility

• Improve Employee Productivity

• Policy & Procedure Verification (Security, Asset Protection, HR, IT, Operations)

Page 35: Justifying Physical Security

Top 10 Reasons for Physical SecurityTop 10 Reasons for Physical SecurityTop 10 Reasons for Physical SecurityTop 10 Reasons for Physical Security

• Frivolous Law Suits & General Liability

• Customer/Vendor Theft

• Workers Compensation Fraud

• Employee Theft & Financial Fraud

• Enhancing Risk ManagementEnhancing Risk ManagementEnhancing Risk ManagementEnhancing Risk Management

Page 36: Justifying Physical Security

PHYSICAL SECURITY = RISK PHYSICAL SECURITY = RISK PHYSICAL SECURITY = RISK PHYSICAL SECURITY = RISK MANAGEMENTMANAGEMENTMANAGEMENTMANAGEMENT

Risk Management is the Number One Reason

Page 37: Justifying Physical Security

What is Risk Management?What is Risk Management?What is Risk Management?What is Risk Management?

• Risk management is the identification, assessment, and prioritization of risks, followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events.

Page 38: Justifying Physical Security

Risk Potential LossRisk Potential LossRisk Potential LossRisk Potential Loss

RISKRISKRISKRISK = [= [= [= [Threats X VulnerabilitiesThreats X VulnerabilitiesThreats X VulnerabilitiesThreats X Vulnerabilities

] X Assets] X Assets] X Assets] X AssetsCountermeasures TCOCountermeasures TCOCountermeasures TCOCountermeasures TCO

Assets = Anything tangible or intangible that is capable of being owned or controlled to produce value and that is

held to have positive economic value to the organization.

Page 39: Justifying Physical Security

Risk TreatmentsRisk TreatmentsRisk TreatmentsRisk Treatments

• AvoidanceAvoidanceAvoidanceAvoidance (eliminate, withdraw from or not become involved)

• ReductionReductionReductionReduction (optimize - mitigate)

• SharingSharingSharingSharing (transfer - outsource or insure)

• RetentionRetentionRetentionRetention (accept and budget)

Page 40: Justifying Physical Security

10 10 10 10 –––– 80 80 80 80 –––– 10 Rule10 Rule10 Rule10 Rule

• The 10The 10The 10The 10----80808080----10 Rule States10 Rule States10 Rule States10 Rule States

– 10% of your employees will never steal from your organization.

– 10% of your employees will always steal from your organization.

– 80% of your employees can be influenced, depending on company culture and the opportunity and temptation that existed within the workplace.

Page 41: Justifying Physical Security

Optimizing RiskOptimizing RiskOptimizing RiskOptimizing Risk

• The Goal of the Security Program is to choose and implement cost effective Countermeasures that will mitigate the Vulnerabilities that will most likely lead to loss.

• You can never remove all Risk and you never be completely secure. My goal is to Optimize, not Minimize Risk.

• Thru the Optimization of Risk you decide which potential risks are critical and which are not reasonable. You never ignore any threat or vulnerability but make a conscious decision that the likelihood of loss with the value of cannot be cost effectively mitigated.

• Assuming you implement Physical Security Countermeasures that address your Key Vulnerabilities, just like the 80/20 Rule, when you apply the 10/80/10 rule, I suggest that you can improve 95% of your Risk or Potential Loss with 5% of the effort.

Page 42: Justifying Physical Security

TODAY’S PHYSICAL SECURITY TODAY’S PHYSICAL SECURITY TODAY’S PHYSICAL SECURITY TODAY’S PHYSICAL SECURITY SOLUTIONSSOLUTIONSSOLUTIONSSOLUTIONS

Solutions to mitigate the organizations risk and reduce opportunity and temptation. Video, Access Control, Network Communications, Cabling Infrastructure, Visitor & Employee Management, Monitoring & Control Rooms, Design, Installation, Integration, Training and Maintenance.

Page 43: Justifying Physical Security

Physical Security SolutionsPhysical Security SolutionsPhysical Security SolutionsPhysical Security Solutions

• Physical security is not a modern phenomenon since before the time of the Roman Empire physical security exists in order to deter threats and vulnerabilities from entering or damaging a physical facility or asset. Historical examples of physical security include city walls, moats, etc.

Page 44: Justifying Physical Security

Physical Security SolutionsPhysical Security SolutionsPhysical Security SolutionsPhysical Security Solutions

• Physical security today describes both counter-measures that protect all assets, personnel and prevent or deter attackers from accessing a facility, resource, or information stored on physical media and guidance on how to design structures to resist various hostile acts.

• To create an environment that gives the potential perpetrator the “Perception of Detection” “Perception of Detection” “Perception of Detection” “Perception of Detection”

• It can be as simple as a locked door or as elaborate as multiple layers of armed Security Guards.

Page 45: Justifying Physical Security

Video Surveillance MarketVideo Surveillance MarketVideo Surveillance MarketVideo Surveillance Market

• The US surveillance market contains a complex system that includes cameras, storage, software, miscellaneous hardware, and professional services. Traditional analog solutions increasingly face challenges from newer IP products. New technologies such as high-definition cameras are spurring growth. United States Market is Estimated at $17 Billion for 2010.

Page 46: Justifying Physical Security

Get the Full Picture

Intrusion Detector

Access Control

Asset Protection

Digital Video

Operators Station with Off-Site Monitoring

Elevator Access Control

Parking Access Control

Visitor Management

Station

Sprinkler/WaterflowMonitor

Fire Alarm Control

Panel

Smoke Detector Manual Pull

Station

Compliance Horn/Strobe

Page 47: Justifying Physical Security

Video SolutionsVideo SolutionsVideo SolutionsVideo Solutions

• CamerasCamerasCamerasCameras

– Analog Cameras

– IP Cameras

– Mega Pixel Cameras

– HD Cameras

• VCRs, DVRs and NVRsVCRs, DVRs and NVRsVCRs, DVRs and NVRsVCRs, DVRs and NVRs

• MonitorsMonitorsMonitorsMonitors

• EncodersEncodersEncodersEncoders

• Mass StorageMass StorageMass StorageMass Storage

• Transceivers Transceivers Transceivers Transceivers

Page 48: Justifying Physical Security

Video AnalyticsVideo AnalyticsVideo AnalyticsVideo Analytics

• Most video is recorded only for use when an incident arises. In this case, video would then be analyzed at the date and time of the incident and used for prosecution purposes.

• This process has its drawbacks as there is a lot of recorded video and security personnel will need to sort through the irrelevant recorded data to find the appropriate recorded video for the incident.

Page 49: Justifying Physical Security

Video AnalyticsVideo AnalyticsVideo AnalyticsVideo Analytics

• With Video Analytics and Intelligent Video Surveillance (IVS) software, security personnel can record only relevant data and be able to access it quicker when needed.

• Live viewing can also be more productive and proactive as live security alerts can be configured to notify security personnel when threats are detected on camera

Page 50: Justifying Physical Security

Access ControlAccess ControlAccess ControlAccess Control

• Control PanelsControl PanelsControl PanelsControl Panels

• Door Systems and LocksDoor Systems and LocksDoor Systems and LocksDoor Systems and Locks

• Biometrics Biometrics Biometrics Biometrics

• ReadersReadersReadersReaders

• Barriers and GatesBarriers and GatesBarriers and GatesBarriers and Gates

• TurnstilesTurnstilesTurnstilesTurnstiles

• Other SensorsOther SensorsOther SensorsOther Sensors

Page 51: Justifying Physical Security

Intrusion SystemsIntrusion SystemsIntrusion SystemsIntrusion Systems

• Property crime makes up slightly more than three-quarters of all crime in the United States

• Among burglaries of nonresidential structures when time of occurrence was known, 58.0 percent occurred at night.

• Intrusion Alarm Systems Intrusion Alarm Systems Intrusion Alarm Systems Intrusion Alarm Systems offer flexible protection against internal and external theft. When your security staff can’t be everywhere at once—your security system can. Include digital, audio and video within your system.

Page 52: Justifying Physical Security

Alarm & MonitoringAlarm & MonitoringAlarm & MonitoringAlarm & Monitoring

• Fire & Life Safety

• Alarm Monitoring Solutions

• Control Rooms

• Crisis Operations Center

• Physical Security Information Management (PSIM)

• Real-Time Situational Awareness

• End-User System, Integration, Monitoring and Alerts

Page 53: Justifying Physical Security

Network CommunicationsNetwork CommunicationsNetwork CommunicationsNetwork Communications

• Local Area Networks (LANs)

• Wide Area Networks (WANs)

• Line Costs

• Cabling and Power Supplies

• Infrastructure and Maintenance

Page 54: Justifying Physical Security

Fire ProtectionFire ProtectionFire ProtectionFire Protection

• Every year fires cost businesses more than $10 billion in damage and injure more than 17,000 people.

• I recommend a full-service company that offers full-fire protection system, providing multiple services, simplifying compliance tracking and emergency service.

Page 55: Justifying Physical Security

Design & IntegrationDesign & IntegrationDesign & IntegrationDesign & Integration

• Engineering & Design

• Infrastructure Upgrades

• Hardware & Software Solutions

• Deployment Planning

• Integration Engineering

• Administration

• Maintenance Solutions

• Initial & Continuous User Training and Awareness

Page 56: Justifying Physical Security

Integration & MonitoringIntegration & MonitoringIntegration & MonitoringIntegration & Monitoring

• Today’s enterprise system approach integrates intrusion, automatic fire alarm, video surveillance, access control and monitoring into a single, user-friendly platform. Accessible in Real-Time.

• You can also include other critical systems such as HVAC, IT Data Centers, Restaurant Freezers or anything that can send a signal from a detector, which can send an alert that can be confirmed by the system, by you or by a third party vendor.

Page 57: Justifying Physical Security

Who Should You Choose?Who Should You Choose?Who Should You Choose?Who Should You Choose?

• National RelationshipsNational RelationshipsNational RelationshipsNational Relationships– Covering All Major US

Cities Offering Installation, Service and Maintenance

• Full Service CapabilitiesFull Service CapabilitiesFull Service CapabilitiesFull Service Capabilities– Site Survey, Design &

Engineering

– Installation, Maintenance, Monitoring and High Security

• Full SpectrumFull SpectrumFull SpectrumFull Spectrum– Access Control

– Intrusion Detection

– Remote Video Surveillance

– Central Station

– Fire

Page 58: Justifying Physical Security

American Alarm

Page 59: Justifying Physical Security

BEST WAY TO ACHIEVE YOUR BEST WAY TO ACHIEVE YOUR BEST WAY TO ACHIEVE YOUR BEST WAY TO ACHIEVE YOUR RETURN ON INVESTMENTRETURN ON INVESTMENTRETURN ON INVESTMENTRETURN ON INVESTMENT

Include Everyone (All Departments) in the Assessment phase, Use the security tools eliminate Opportunity & Temptation, Capture Direct & In-Direct Benefits, Capture Costs, Analyze Cost & Benefits, Calculate and Express the ROI

ACHIEVE YOUR ROIACHIEVE YOUR ROIACHIEVE YOUR ROIACHIEVE YOUR ROI

Page 60: Justifying Physical Security

Include All DepartmentsInclude All DepartmentsInclude All DepartmentsInclude All Departments

• Security Department

• Legal/Risk Management

• Loss Prevention / Asset Protection

• Facilities

• Operations

• IT

• Marketing

• Human Resources

Page 61: Justifying Physical Security

Capture All Potential BenefitsCapture All Potential BenefitsCapture All Potential BenefitsCapture All Potential Benefits

• Direct BenefitsDirect BenefitsDirect BenefitsDirect Benefits

– More Efficient Security Department

– Better LP/AP Audits (Theft & Fraud Reduction)

– Better Facility Awareness

– Better Operational Awareness

– More Secure IT Department

– Marketing Confirmation

– HR Policy Confirmation

• InInInIn----Direct BenefitsDirect BenefitsDirect BenefitsDirect Benefits

– Employee Awareness

– Risk Reduction (Frivolous and Unfounded Lawsuits)

– Better Customer Service

– Proactive Tool to Attack Fraud and Theft

Page 62: Justifying Physical Security

Express the ROIExpress the ROIExpress the ROIExpress the ROI

• How is ROI Measured?How is ROI Measured?How is ROI Measured?How is ROI Measured?

– Capture the Purpose

– Total Cost of Ownership

• Cost to Buy +

• Cost to Install +

• Cost to Operate +

• Cost to Maintain = TCO

– Capture the Benefits (Direct & In-Direct)

– Analyze the Costs and Benefits

– Express the ROI

Page 63: Justifying Physical Security

Our ROI ExperienceOur ROI ExperienceOur ROI ExperienceOur ROI Experience

• In our experience the more departments that are involved in the process the more of a top priority the total solution becomes to the profitability of the organization.

• The needs and potential for loss are clear, most of my installations over the years, with proper and consistent use have paid for themselves in a matter of months not years.

Page 64: Justifying Physical Security

Our ROI ExperienceOur ROI ExperienceOur ROI ExperienceOur ROI Experience

• The Key to ROI success is proper proactive use and consistent training.

• Just because someone can go to a Big-Box lumber store and buy a hammer and saw, that does not make him a carpenter.

• Proactive use of a Physical Security Countermeasure vs. a Reactive use of the same technology is how together we create ROI.

Page 65: Justifying Physical Security

THE BEST PROCESS FOR THE BEST PROCESS FOR THE BEST PROCESS FOR THE BEST PROCESS FOR SUCCESSSUCCESSSUCCESSSUCCESS

Pre-Installation, Installation and Post-Installation Activities

Page 66: Justifying Physical Security

The ProcessThe ProcessThe ProcessThe Process

• PrePrePrePre----Installation ActivitiesInstallation ActivitiesInstallation ActivitiesInstallation Activities

– Define Assets and Goals

– Assessments (Physical Security, Loss Prevention, Etc.)

– Design Concept (Hardware, Software, Personnel, Operational & Support)

– Finalize Plan, Installation Requirements & Quote

– Acquire Hardware, Software, Prepare Facilities, Establish Support Requirements

• Installation ActivitiesInstallation ActivitiesInstallation ActivitiesInstallation Activities

– Contractor Walk-Thru & Administration

– Project Management

– System Commissioning

• PostPostPostPost----Installation ActivitiesInstallation ActivitiesInstallation ActivitiesInstallation Activities

– Training

– Service

– Billing

– Monitoring

Page 67: Justifying Physical Security

AssessmentsAssessmentsAssessmentsAssessments

• Physical Security Assessments, Loss Physical Security Assessments, Loss Physical Security Assessments, Loss Physical Security Assessments, Loss Prevention Awareness Assessment, Risk Prevention Awareness Assessment, Risk Prevention Awareness Assessment, Risk Prevention Awareness Assessment, Risk Management AssessmentManagement AssessmentManagement AssessmentManagement Assessment– Identification of critical assets

– Threat environment evaluation

– Policies and procedures

– Physical security

– Operations security

– Consequence analysis

– Risk Characterization

Page 68: Justifying Physical Security

Document BenefitsDocument BenefitsDocument BenefitsDocument Benefits

• During the Assessment Phase discuss potential uses of Physical Security Solution to enforce polices, procedures, compliance concerns and potential exposure from all departments.

• The Surveillance part of the solution has 100’s of uses to verify proper behaviors, actions and activities.

Page 69: Justifying Physical Security

Management ReviewManagement ReviewManagement ReviewManagement Review

• Review with management what they perceive as security concerns and possibly meet with selected employees to determine if the perceptions correlate. We will deliver a report with pictures detailing both the current situation and any recommendations necessary to correct deficiencies. The deficiencies will be noted with practical steps and recommendations to correct the situation.

• The action plan would be the Project Management Plan and Quote that can be used to implement the solution to fix the problem. We interface with vendors and work with the installer for installation and training.

Page 70: Justifying Physical Security

MAXIMIZING PROACTIVE PHYSICAL MAXIMIZING PROACTIVE PHYSICAL MAXIMIZING PROACTIVE PHYSICAL MAXIMIZING PROACTIVE PHYSICAL SECURITY TECHNOLOGYSECURITY TECHNOLOGYSECURITY TECHNOLOGYSECURITY TECHNOLOGY

Positive Feedback to Employees Creates Positive Results

Page 71: Justifying Physical Security

The Expectancy TheoryThe Expectancy TheoryThe Expectancy TheoryThe Expectancy Theory

• Dr. Victor Vroom’s model is based on three concepts:

• ValenceValenceValenceValence - Strength of an individual’s preference for a particular outcome. For the valence to be positive, the person must prefer attaining the outcome to not attaining it.

• Instrumentality Instrumentality Instrumentality Instrumentality – Means of the first level outcome in obtaining the desired second level outcome; the degree to which a first level outcome will lead to the second level outcome. (Effort)

• Expectancy Expectancy Expectancy Expectancy - Probability or strength of belief that a particular action will lead to a particular first level outcome.

Page 72: Justifying Physical Security

The Expectancy TheoryThe Expectancy TheoryThe Expectancy TheoryThe Expectancy Theory

• As we constantly are predicting likely futures, we create expectations about future events. If things seem reasonably likely and attractive, we know how to get there and we believe we can 'make the difference' then this will motivate us to act to make this future come true.

Page 73: Justifying Physical Security

I Learned It This WayI Learned It This WayI Learned It This WayI Learned It This Way

• The “Expectancy Theory of Motivation” “Expectancy Theory of Motivation” “Expectancy Theory of Motivation” “Expectancy Theory of Motivation” can be understood by examining the relationship between the attitudes of the employees, their perception regarding the feasibility of achieving the targets and the rewards they hope to receive as a consequence of elevated performance.

Page 74: Justifying Physical Security

The Expectancy TheoryThe Expectancy TheoryThe Expectancy TheoryThe Expectancy Theory

• EffortEffortEffortEffort +

• Better PerformanceBetter PerformanceBetter PerformanceBetter Performance =

• Better OutcomeBetter OutcomeBetter OutcomeBetter Outcome.

• Example: A Server or Bartender will get better tipstipstipstips the harder they work. As a Manager, I would say “are you going to have a $300.00 night tonight?”

Page 75: Justifying Physical Security

The Expectancy TheoryThe Expectancy TheoryThe Expectancy TheoryThe Expectancy Theory

• When applied to the Surveillance System, when you are viewing remotely, and you call the location. Always find something positive that you see and thank your employee’s for their hard work.

• They will be reminded they are not alone and someone could always be watching, but they will just go off and do their job. If you are negative, they will feel abused and threatened and you will not get the positive results that you want.

Page 76: Justifying Physical Security

The Expectancy TheoryThe Expectancy TheoryThe Expectancy TheoryThe Expectancy Theory

• Additional research findings suggest interesting work and good pay are key to higher employee motivation.

• And, a carefully designed reward systems that include job enlargement, job enrichment, promotions, internal and external stipends, monetary, and non-monetary compensation should be considered. (Gift Cards are Great)

Page 77: Justifying Physical Security

Thank You

Questions?

Page 78: Justifying Physical Security

Contact InformationContact InformationContact InformationContact Information

James McDonaldJames McDonaldJames McDonaldJames McDonald

Executive Physical Security Consultant

C-774-239-1128

Email: [email protected]

My Blog: www.SecurityTalkingPoints.com

My Twitter: www.twitter.com/physectech

“A proactive approach to physical security is key to pro-

tecting critical assets and reducing business liability risks.”