Security Risk Assessment & Management

Start Date: 14 Jan 2018
End Date: 18 Jan 2018
Duration: 5
Country: Kuala Lumpur / Malaysia
Category: Health, Safety, Security & Environment

Course Description

This very popular and comprehensive programme-

successfully completed by hundreds of security managers from many of the worlds most famous and most successful companies  is designed for security managers, coordinators and their equivalents, who wish to gain a thorough understanding of how to manage security within a corporate environment. Suited equally for existing security managers and those newly appointed from police or military or business backgrounds, the course will enable delegates to use a range of risk management and security design tools to enhance their organisations ability to protect its assets.

The course takes the form of lectures, workshops, exercises and makes extensive use of case studies. Delegate participation is active encouraged.

Course Objective


Who Should attend?


This program is designed for security managers, coordinators and their equivalents.

Course Outline


Security Risk Management

Risk management as a cross-functional business tool; security risk analysis; identifying assets; asset systems and asset contexts; determining probability based on quantitative and qualitative scales; measuring direct and consequential impact; risk mitigation

Security Operations Management

The main roles of the security manager; operating a cost-effective security department; creating a return on investment; effective management skills for the security manager; creating proactive security programmes; security reporting chains; service level agreements to manage contracted services

Security Policies and Procedures

Alignment of security to business processes; creating board-driven security management; devising, drafting and implementing security policies and procedures

Security Design

The components of a security system; the 18 principles of security design; the security environment; creating  risk-commensurate security; balancing risk and protection; integrating security into the business environment; selling security to management; creating crime prevention through good security design

Physical and Electronic Security

Creating a perimeter to deny, detect, deter, deflect and demark; balancing delay, detection and response to perimeter intrusions; creating layered security, perimeter fencing options, costs, drawbacks and benefits; perimeter intrusion detection systems (PIDS); off-site and on-site monitoring of PIDS; CCTV as a perimeter protection means; perimeter lighting; perimeter patrolling; the key requirements of a high-risk site perimeter; security buildings against internal and external crimes; methods of illicit entry into buildings; the key requirements of working hours protection; the key requirements of quiet hours protection; protecting the building shell using physical and electronic means; protecting the building interior using physical and electronic means; internal patrolling; building intrusion detection systems (BIDS); point alarm systems and electronic article surveillance; internal CCTV

Access Management

The key aims of access control; access management systems design and application; preventing unauthorised access; preventing unauthorised removal of property; badging and identification systems; biometric access management systems; key control systems and best practice; entry and exit searching policies and practice; applying the need-to-go principle; access management compartmentalization

Workplace Crime Prevention

The factors which might motivate an employee to commit and internal crime; the common traits of an employee thief; application of Felsons Routine Activity Theory; the application of situational crime prevention; social crime prevention overview; crime prevention through environmental design; reducing exposure to burglary; developing a corporate crime prevention programme

Introduction to Security Surveying

Security surveys, reviews and audits; sequencing a security survey; security surveying options; peer surveys; pre- and post- survey tasks; survey report writing; presenting survey results to the Board

Manpower Selection and Deployment

Manpower selection, deployment and span of control; lines of responsibility and reporting; personnel specifications and job descriptions; background screening; dealing with disciplinary infractions

Leadership and Motivation

The principles of effective leadership; common behavioural and skill characteristics inherent in successful business leaders; application of recognised successful business leadership and motivational techniques; motivating the security team; leading meetings; delivering management presentations

Introduction to Investigations

Evidence, information and intelligence; collecting, classifying, preserving and using evidence; basic scene of crime processing; investigation strategies, routes and outcomes; investigations management and sequencing of tasks; case management; using outside agencies and services; investigation resourcing and budgeting; investigation reporting; interviewing; questioning strategies; use of agents and informants

Protection against Explosive Devices

Terrorism overview and modus operandi of groups; trends, targets and weapons; the improvised explosive device (IED) overview; IED components and construction; the characteristics of, and countermeasures for, postal IEDs hand- deliverd IEDs, under-vehicle IEDs, remotely-controlled IEDs, large vehicle IEDs, suicide pedestrian and vehicular IEDs, blast and blast mitigation; telephone bomb threats; search; evacuation and assembly; CBRN threat overview and mitigation

Information Security

The value of information; identifying information at risk; identifying information security vulnerabilities; threats posed to information by staff; the activities of information brokers; the extent of business espionage; national-level threats to business information; methods of classification and secure storage; securing information while mobile; dealing with suspected information thieves; social engineering; secure disposal of office waste; office information security best practice

Technical Surveillance Countermeasures

Telephone and fax intercept countermeasures; methods of covert bugging and recording; hard-wired devices; wireless devices; recording devices; hybrid systems; creating a secure environment for a confidential meeting; using "sweeping equipment and services; using frequency scanning equipment and services

IT Security

The contribution of the security manage to IT security; the main threats to confidentiality of information, its availability and integrity; business interruption potential of a major IT security incident; the main threats to corporate IT systems; viruses and other pathogens; hacking; denial of service attacks; phishing; inadvertent disclosure through social engineering; laptop security; managing the threat from peripheral devices; IT systems protection overview; the key points of an IT security policy; special considerations for the security of laptops; data encryption and other methods to restrict unauthorised access to information stored on IT systems


Protection of At-Risk Personnel

The key human assets at risk; the risk and threat spectrum; circumstances which increase risk; countermeasures which decrease risk; identifying risk environments and high-risk countries; delivering country risk briefings; travel security protocols; the risk of kidnap and ransom; the fundamentals of personnel protection; use of close-protection specialists; counter-surveillance

Crisis Management

The security risk management/crisis management relationship; crisis management in relation to business continuity planning; crisis management and emergency management the difference; the contribution of a security manager to crisis management planning and coordination; creating a crisis management response;























Change Management





The external and internal drivers for change; planning for change; use of change management models; effective strategies for communicating change; identifying and responding to resistance to change

























Mailing List
Send To Friend
Training Plan