SlideShare a Scribd company logo
Jon Nakapalau, CHSO, CPO  Concentric Security Planning
Concentric rings When trying to protect anything you should have at least three “bands” around it…  BAD: BAND #1:  B reach/Intrusion Detection BAND #2:  A ctionable Plans  BAND #3:  D eterrence/Delaying Capabilities
BAND #1 How are breaches detected?  What is done after they are detected?  Who makes the decision to counter the breach?  What resources do you have and at what time?  ? ? ? ? =
BAND #2 Actionable plans include the following elements:  Standard Operating Procedures Strengths, Weaknesses, Opportunities, and Threats Analysis Scope of  Work Command and Control A). SOP’s B). SWOT C). SOW D). C2
BAND #3 What will you do if you need help?  >>>>>> A). SOP’s B). SWOT C). SOW D). C2 >>>>>>>>>
What will you do? ???????????? ???????????? ????????????

More Related Content

PDF
2016 레몬세미나 발표자료 이찬우 final
PDF
Stupa analytics find your shot!
PDF
Make it Fixable (NDC Copenhagen 2018)
PDF
Compliance in the Era of Cloud
PPTX
Smart but Scattered
PPSX
6 Physical Security
DOCX
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
DOCX
Wiki Page  Chapter 10 AwarenessWikis for Learning and Collaborat.docx
2016 레몬세미나 발표자료 이찬우 final
Stupa analytics find your shot!
Make it Fixable (NDC Copenhagen 2018)
Compliance in the Era of Cloud
Smart but Scattered
6 Physical Security
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
Wiki Page  Chapter 10 AwarenessWikis for Learning and Collaborat.docx

Similar to Common Physical Security Mistakes (20)

PPT
December ISSA Meeting Executive Security Presentation
PPTX
A military perspective on cyber security
PPTX
Developing a Continuous Monitoring Action Plan
PPT
Denial of services : limiting the threat
PDF
Abb e guide3
PPTX
BSides Huntsville Keynote - Active Cyber Defense Cycle
PPTX
Cyber Challenges in a Hierarchical Culture
PPT
Security in e-commerce
PDF
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
DOCX
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
PDF
Understanding security operation.pptx
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PPT
Auditing Check Point Firewalls
PDF
2015 Cyber Security
PDF
TADSummit 2022 - How to bring your own RTC platform down
PDF
How to bring down your own RTC platform. Sandro Gauci
PDF
SecurityOperations
PPT
Risk Assessment And Management
PDF
The New Normal - Rackspace Solve 2015
December ISSA Meeting Executive Security Presentation
A military perspective on cyber security
Developing a Continuous Monitoring Action Plan
Denial of services : limiting the threat
Abb e guide3
BSides Huntsville Keynote - Active Cyber Defense Cycle
Cyber Challenges in a Hierarchical Culture
Security in e-commerce
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Understanding security operation.pptx
Are you ready for the next attack? Reviewing the SP Security Checklist
Auditing Check Point Firewalls
2015 Cyber Security
TADSummit 2022 - How to bring your own RTC platform down
How to bring down your own RTC platform. Sandro Gauci
SecurityOperations
Risk Assessment And Management
The New Normal - Rackspace Solve 2015
Ad

More from Jon Nakapalau, CHSO, CPO (20)

PPTX
PPTX
The shepherds watch
PPTX
how not to plan for an emergency
PPTX
Access cards and physical security
PPTX
The paradox of identity
PPTX
Five things i really miss ii
PPTX
5 things i really miss
PDF
Sustainability and National Stability
PPTX
Kafkaesque security policy
PPTX
Pp biopharmaceutical security operations (bs os)
PPTX
Clausewitz and terrorism
PPTX
Transnational crime
PPTX
Maslow’s hierarchy of needs and terrorism
PPTX
Globalization and national security
PPTX
Lockout tagout
PPTX
Terrorist infiltration through conflict migration
PPTX
Physical security integration
PPTX
Physical security integration
PPT
Security Checklist
PPT
Cpted And The Three Little Pigs
The shepherds watch
how not to plan for an emergency
Access cards and physical security
The paradox of identity
Five things i really miss ii
5 things i really miss
Sustainability and National Stability
Kafkaesque security policy
Pp biopharmaceutical security operations (bs os)
Clausewitz and terrorism
Transnational crime
Maslow’s hierarchy of needs and terrorism
Globalization and national security
Lockout tagout
Terrorist infiltration through conflict migration
Physical security integration
Physical security integration
Security Checklist
Cpted And The Three Little Pigs
Ad

Common Physical Security Mistakes

  • 1. Jon Nakapalau, CHSO, CPO Concentric Security Planning
  • 2. Concentric rings When trying to protect anything you should have at least three “bands” around it… BAD: BAND #1: B reach/Intrusion Detection BAND #2: A ctionable Plans BAND #3: D eterrence/Delaying Capabilities
  • 3. BAND #1 How are breaches detected? What is done after they are detected? Who makes the decision to counter the breach? What resources do you have and at what time? ? ? ? ? =
  • 4. BAND #2 Actionable plans include the following elements: Standard Operating Procedures Strengths, Weaknesses, Opportunities, and Threats Analysis Scope of Work Command and Control A). SOP’s B). SWOT C). SOW D). C2
  • 5. BAND #3 What will you do if you need help? >>>>>> A). SOP’s B). SWOT C). SOW D). C2 >>>>>>>>>
  • 6. What will you do? ???????????? ???????????? ????????????