Saturday, October 21, 2017

Advanced - Physical Security Risk Analysis

Advanced Level: Security Risk Analysis & Cost Budgeting Tools

riskbomb

Eliminating or mitigating risk and improving security necessitates a manageable and scalable assessment methodology to identify weaknesses and prioritize cost-effective improvements.

This advanced-level "follow-on" course dives into the security risk analysis and risk management process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders.

 

  • Step 1: Fine tune your risk analysis skills. Plan the security risk and vulnerability assessment.phy402

    Choosing the assessment methodology and planning the assessment is a major consideration because the cost of some assessment programs can run into the tens of thousands of dollars not to mention man-hours.  An assessment performed by someone who is not well-founded in risk analysis skills will produce an incompetent assessment that will actually insert additional risk because of ill-advised countermeasure recommendations.  In this course students will learn valuable risk analysis skills conforming to U.S. Department of Homeland Security (DHS) best practices.

  • Step 2: Gather and analyze the information.  Look at the Big Picture.

    Lost time, lost productivity-- sorting through the all the data can become confusing to the analyst and can actually reduce his or her effectiveness.   Since it is impossible and not economically feasible to protect everything, the most important critical assets and vulnerabilities must be identified, and protection systems must be allocated in order of highest priority.  Students will use economical tools to break down, screen & prioritize the risks, threats, target assets, adversary means and consequences. 

    They will learn to think critically about how they make judgments and reach conclusions and notjust about the judgments and conclusions themselves.

  • Step 3: Develop countermeasure strategies and submit a report to stakeholders.

    The data generated from the security risk and vulnerability assessments must be organized and put into a concise comprehensive report for executive management.  Because despite all the hard work, if the report is flawed, that will be all the decision makers will notice.  Students will learn how to prepare detailed reports that highlight top risks, vulnerabilities, and project roll-out upgrade costs.  They will be able to provide a quality report with convincing arguments and findings, and with countermeasures selections that are reasonable and cost-effective..

  • .

Course content includes:

  • Risk Analysis Skills
  • Socratic Questioning Analysis
  • Building Data Collection & Analysis Tools
  • Asset Target Matrices
  • Criticality and Consequence Analysis
  • Threat Analysis & Estimating Probability
  • S.A.N.D.I.A. Advanced Path Analysis (PAD, PAS, and PI)
  • Countermeasure Selection & Budgeting Factors
  • Cost-Effectiveness Metrics
  • Risk and Mitigation Decision Matrix

 

Benefits:

  • Identify & mitigate the most critical security weaknesses first.
  • Use economical tools to break down security risks in to detail and see the "Big Picture"
  • Learn how to use critical thinking standards in your data analysis.
  • Justify the investment in security upgrades --efficiently use your security budget.
  • Learn how to develop concise reports for stakeholders and executive management.
  • Continue to make a meaningful contribution to your country's national security!