FAA77800017: (77800017) (ASIS) Security Program Design - A Critical Infrastructure Projection Model
FAA77800017 | Active | ||
(77800017) (ASIS) Security Program Design - A Critical Infrastructure Projection Model | |||
COURSE | 2012-05-03 | ||
Vendor: ASIS International, Worldwide Headquarters, 1625 Prince Street, Alexandria, VA, 22314-2818; Member Services: asis@asisonline.org; Phone # 703-519-6200, Fax # 703-519-6299; www.asisonline.org Security Program Design - A Critical Infrastructure Protection Model course provides protection planning information using practical, real life examples from the diverse utilities, critical infrastructure protection domain. It delivers a broad array of security solutions with sound design philosophy applied culminating in a fully integrated, end-to-end security program that any industry can apply in part or in whole. Come away with valuable resources to assist you in your own security program planning. Protection Principles Examine the protection principles used within our security programs. Review CPTED, defense in depth, deterrence, detection, delay, and response concepts. Critical asset identification, adversary path applications, worst case scenario planning, response exercises, and the relationship between business continuity, disaster recovery, and safety will be reviewed. Security Program Metrics Review who uses metrics, how to select the best metric for your program, and why they are especially in promoting your department. Discuss the contribution of security incident management to metrics and learn how useful audits can be using metrics as a baseline. Security Command Centers All segments of a command center will be addressed, from selecting, staffing, and equipping to business case support and critical functions. Security Technology Application Evaluate the capabilities of common physical and cyber security technologies; then learn to measure system effectiveness. Standards and Guidelines Examine the difference and learn why we need both. See how they can be used in the assessment process. Sample security standards will be reviewed. A call for involvement will be presented as well. Security Program Development and Effective Risk Management Revi | |||
NA | NA | ||
OAT | 16.0 | ||
Prerequisites |