conducting a security vulnerability assessment, 2010 valencia cc presentation, margolis healy &...

22
Conducting a Security Vulnerability Assessment

Upload: margolis-healy

Post on 06-May-2015

1.116 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Conducting a Security Vulnerability Assessment

Page 2: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Agenda

•  Introductions

•  Definitions

•  Why an Assessment

•  Methodology

Page 3: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Definitions

•  Vulnerability: the state of being exposed or susceptible to harm or injury

•  Vulnerability Assessment: ongoing, critical evaluation to identify potential risks and areas of weakness that could have adverse consequences for institutions and their systems

S

Page 4: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Definitions

•  Hazards Assessment: focuses on general hazards to determine what hazards you might be prone to.

•  Risk Analysis: focuses on risk levels and consequences

S

Page 5: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Why An Assessment

•  The Campus Landscape

•  Legal Obligations

ü Case Law

•  Post Incident Reports

ü Most notably those from institutions, state and Federal gov’t, & professional associations

S

Page 6: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Campus Safety Landscape

•  High-risk drinking

•  Illegal and prescription drug use and abuse

•  Violence

-  VAW

-  Criminal intrusions, including rampage shooters

•  Natural disasters

•  Fire and life safety

•  Mental illness and suicide

•  Food poisoning, food-borne illness, pandemic

•  Terrorist threats

S

Page 7: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Campus Safety Landscape

Page 8: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Legal Obligations

•  You own/control premises

•  You operate programs, on and off campus

•  You have “special relationships” with students

•  Laws and regulations

G

Page 9: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Mullins v. Pine Manor College

•  1983 case involving an assault on a female student on campus by a non-student assailant

ü Massachusetts Supreme Court found the college liable for negligent security.

"Parents, students and the general community still have a reasonable expectation, fostered in part by the colleges themselves, that reasonable care will

be exercised to protect resident students from foreseeable harm."

G

Page 10: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

After-Action Reports

•  More than 20 state reports following Virginia Tech tragedy

ü VT Report, State of Florida, California

•  Report to the President

•  Several professional association reports

ü Notably National Association of Attorneys General; IACLEA Blueprint

G

Page 11: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

After-Action Reports

•  These reports all recommended institutions conduct a risk or vulnerability, assessment:

“…each college and university (should) conduct a critical infrastructure assessment using trained security specialists.” (Florida Gubernatorial Task Force for University Campus Safety)

G

Page 12: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

FEMA’s 4 Phases of Emergency Management

Organizational Framework

G

Page 13: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Methodology

G

Page 14: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Environment Scan

•  Internal assessment

ü  ID critical infrastructure and other facilities

ü  ID perceived threats and vulnerabilities from key constituents (remember Law of Diminishing Returns)

ü Catalog findings (threats to people, property, natural acts, terrorism)

S

Page 15: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Environment Scan

•  External assessment

ü Crime on/around campus – reported and unreported

² Perception of safety/fear of crime

² Crime in local area

ü AOD issues

ü VAW

S

Page 16: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Physical Security Systems

•  Review campus physical security systems

ü Perimeter – fence or other boundary, cameras

ü Building Perimeter - access control, cameras

ü  Interior – intrusion alarms, panic/duress alarms, cameras

S

Page 17: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Policies, Procedures & Education

•  Human Resources

•  Residential Living

•  Workplace Violence

•  Training and Awareness

•  Violence Against Women Prevention Policies

•  Drugs, Alcohol and Weapons

•  Access Control

•  EAP G

Page 18: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Response Capacity

•  Campus public safety entity

•  All Hazards Emergency Management – Concept of Operations

ü  Evacuation

•  Mass, Emergency Notification & Timely Warning

•  MOU/MOA

G

Page 19: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Risk=VCT

•  Vulnerability

•  Consequence

•  Threat

1 125

G

Page 20: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Justifying the Assessment

•  ROI

•  Avoiding Hyperbole

•  Advocating for All Hazards

Page 21: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

4 C’s

•  Collaborate

•  Communicate

•  Coordinate

•  Capitalize

Page 22: Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Contact

www.Margolis-Healy.com

[email protected]

[email protected]

1-866-817-5817