Best Practices for Campus Security. January 26, 2017

Similar documents
Number: USF System Emergency Management Responsible Office: Administrative Services

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Laguna Honda Hospital and Rehabilitation Center. Security Management Plan

Information Security Incident Response Plan

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

UNC Campus Security Initiatives Update. Business Affairs Committee May 9, 2017

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Physical security advisory services Securing your organisation s future

Information Security Incident Response Plan

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

Security Management Seminar

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

Railroad Infrastructure Security

UF CEMP Support Group Annex: Public Safety

Introduction to the National Response Plan and National Incident Management System

DETAILED POLICY STATEMENT

Cybersecurity Overview

How AlienVault ICS SIEM Supports Compliance with CFATS

Emergency Notification System Guide

STRATEGIC PLAN. USF Emergency Management

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

July 31, University of Maryland Emergency Management Faculty Staff Essentials

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

Business continuity management and cyber resiliency

Cyber Risks in the Boardroom Conference

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

RMU-IT-SEC-01 Acceptable Use Policy

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

The Office of Infrastructure Protection

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

National Preparedness System. Update for EMForum June 11, 2014

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials

SM04: Transforming Your Security Command Post into a Strategic Information Nerve Center

Forensics and Active Protection

Community-Based Water Resiliency

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.

Department of Management Services REQUEST FOR INFORMATION

Chapter 1. Chapter 2. Chapter 3

POSITION DESCRIPTION

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

Managing Risk; A Model For Deterring Trespassers

Security Director - VisionFund International

Emergency Support Function (ESF) #17a: COMMUNICATIONS: PUBLIC. ESF Activation Contact: Cornell University Police (607)

Bradford J. Willke. 19 September 2007

Credit Card Data Compromise: Incident Response Plan

Standard for Security of Information Technology Resources

PROVIDING INVESTIGATIVE SOLUTIONS

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

The Office of Infrastructure Protection

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System

Member of the County or municipal emergency management organization

Cybersecurity in Higher Ed

A Framework for Managing Crime and Fraud

MNsure Privacy Program Strategic Plan FY

PIPELINE SECURITY An Overview of TSA Programs

Overview of the Federal Interagency Operational Plans

COPE-ing with Cyber Risk Exposures

THE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

Emergency Operations Center Management Exercise Evaluation Guide

Information Security Incident Response and Reporting

Information Security Policy

Local Government Disaster Planning and what can be learned from it.

City of Stamford OFFICE OF PUBLIC SAFETY. Public Safety Administration. FY Budget Presentation

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION

CYBER RESILIENCE & INCIDENT RESPONSE

System-wide Security Assessment for MetroLink

Professional Training Course - Cybercrime Investigation Body of Knowledge -

SMART POLICING FOR SMALL AGENCIES. Increase Community Safety with Intelligent Maps and Analytics

College Safety and Security

POSITION DESCRIPTION

Data Compromise Notice Procedure Summary and Guide

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Max Security Solutions

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Global Security Advisor

Continuity of Business

Implementation Strategy for Cybersecurity Workshop ITU 2016

Heavy Vehicle Cyber Security Bulletin

Cyber Security Law --- Are you ready?

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

Green Treatment Center

Internet of Things Toolkit for Small and Medium Businesses

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

Disaster Recovery and Business Continuity Planning (Mile2)

The CERT Top 10 List for Winning the Battle Against Insider Threats

National Policy and Guiding Principles

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security

MassMutual Business Continuity Disclosure Statement

Transcription:

Best Practices for Campus Security January 26, 2017

Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner and CEO, The Lake Forest Group

Best Practices in Campus Security Agenda Introduction and Background Subject Matter Expertise Program Scope Program Framework Needs Assessment Program Design

Best Practices in Campus Security Agenda Risk Mitigation Program Implementation Training Initiatives Emergency Preparedness Mass Notification Questions and Answers

Introduction and Background Education Undergraduate BS, Criminal Justice, Western Illinois University Graduate MS, Criminology, Indiana State University Experience (35 years in law enforcement and security) Police Officer Skokie, Illinois Federal Agent U.S. Secret Service Director of Security National Basketball Association SVP and Managing Director Hillard Heintze Owner and CEO The Lake Forest Group Background National corporate, medical, pharma, gaming, sports, entertainment, HNWI and higher education International training, investigations, events, policies and procedures Methodology Prevention-oriented identify, assess, and control

Subject Matter Expertise A team of subject matter experts that complements, supplements, and enhances existing security and safety programs, by tailoring the program to each unique situation and campus setting. Security Law Enforcement / Public Safety Technology Emergency Management Human Resources Health Services Legal

Program Scope Conduct an on-site needs assessment to determine resources Enhance appropriate violence prevention and threat management capabilities Review current safety and security documents to ensure industry best practices Evaluate use and effectiveness of security systems and technologies

Program Scope of Services Assess security personnel, including qualifications, capabilities, staffing, and coordination with first responders Create new training curricula, security awareness and education materials Ensure all hazards approach for emergency preparedness, natural, accidental, intentional Provide crisis management support, including access to global network of professionals in law enforcement, judicial, and public relations

Program Scope of Services Work closely with school to provide guidance and training for students in the area of dating violence and sexual assault prevention Liaison with law enforcement and other public sector agencies, especially during criminal investigations and other police-related matters Assess record keeping, report writing, intelligence collection, and information sharing processes Direct access to a team of experts for ongoing advice and counsel

Program Framework Processes: policies, procedures, plans, and programs Personnel: emergency management, public safety, and security Technology: cameras, access control, alarms, notifications, and call/assistance station boxes Emergency preparedness: accidental, intentional, and weather

Education, awareness, and training: classes, exercises, distance, and webbased Event planning and management: sports, speeches, alumni events Background screening and drug testing: scope and pre- and post-employment Human resources: workplace violence and employee assistance Program Framework

Legal: litigation assistance and legal counsel Physical security: fences, gates, barriers, lighting, and locks Regulatory compliance: Title IX, Violence Against Women Act, and Clery Act Threat assessment: identification, assessment, and management of threats Campus life: maintaining culture of safety and security awareness Program Framework

Needs Assessment Personnel: evaluation of current programs to understand organizational structure, titles, positions, staffing, assets, and resources. Physical: inspection of fences, gates, barriers, windows, doors, walls, lighting, and locks, including CPTED (crime prevention though environmental design). Procedural: changes in policies and plans in areas such as public safety, emergency management, HR, and athletic departments as well as student affairs and campus life. Technical: benchmark technologies including communications, CCTV, access control, alarms, detection, tracking, and monitoring. Four Main Pillars Personnel, Physical, Procedural, and Technical

Program Design First task is to develop a detailed understanding of the culture and tradition and how they operate in order to appreciate their complexities and nuances. Factors such as standards of conduct, student population, demographics, geographic locations, historical information, and level of risk tolerance. Identify the types of incidents that could occur based on an intelligence gathering process. What types of incidents occur on campus and how often? Incidents including 1) criminal events, such as physical and sexual assault or battery and theft; 2) non-criminal events such as accidents; and 3) consequential incidents such as inappropriate Internet or social media activity.

Risk Mitigation Identify threats, vulnerabilities, and consequences to determine if the security measures and strategies are at an industry best practice level. Risk acceptance is a willingness to accept the maximum possible loss. Risk reduction reduces the exposure of an asset to the threat element. Risk transfer means transferring risk by purchasing insurance to cover a loss. Risk avoidance places an asset outside the effective reach of the threat element.

Police / Public Safety Operations Security Services Security Systems Cyber Security Communications Capabilities Policies, Plans, and Procedures Physical Security Education and Awareness Program Implementation

Training Initiatives Multimedia approach that best meets institutional needs: Setting: Classroom Web-based Field Exercise Table Top Audience Administration Faculty Students Visitors

Emergency Preparedness Four phases of emergency management and their critical emergency-related imperatives: 1. Preventing emergencies and mitigating their occurrence 2. Preparing to handle an incident 3. Responding to an incident 4. Recovering from an incident The plan specifies the precise roles and responsibilities should an event occur and be NIMS and ICS compliant.

Why is a Mass Notification System Essential? Ability to send critical and emergency messages to employees, customers and other stakeholders during crisis events Speed, Reliability, Redundancy and Coverage Reaching the right people at the right time Improved response time

Assessing Your Mass Notification Needs 1. 1 Inventory notification use cases to assess your organization s critical and emergency messaging requirements then select EMNS Solution based on a strategic assessment of those use cases. 2. 2 If possible, consolidate as many critical and emergency messaging solutions as possible to make your investment more cost effective. *From Gartner s Report Innovative Tech Insight: Emergency/ Mass Notification Services, published 12/2/16

Key Requirements When Choosing a MN System o Multi-modal Communication Channels o Two-way Communication o Integrations (via API) o Ease of Use (See Platform) o Group Management o Client Service

Multi-Modal Communication Channels

Integrating Your Mass Notification System with 3 rd Party Systems ERP, SIS, Digital Signage, Sirens, PA Systems, Desktop and Beacon Alerts, and more

DEMO PLATFORM

Want to discuss your institution s specific needs/challenges one-on-one regarding your campus safety program or mass notification? Contact: The Lake Forest Group G. Michael Verden Owner and CEO 1-312-515-8747 gmv@lakeforestgroup.com www.lakeforestgroup.com Contact: Regroup Mass Notification Chris Burns Partnerships, Regroup 1-917-382-5458 inquiries@regroup.com www.regroup.com One-on-One Session

Questions?