Security Technology Executive

NOV-DEC 2017

Issue link: https://securitytechnologyexecutive.epubxp.com/i/917121

Contents of this Issue

Navigation

Page 33 of 71

INFRASTRUCTURE FOCUS backlight, darkness and camouflaged objects. By coupling these with analytics, organizations have another layer of security and surveillance. LIGHTING In addition, advanced lighting should be considered for an intrusion protection solution. In addition to ensuring the area is clearly lit, new technology can strobe to disorient intruders or raise the attention of someone approaching the perimeter. Depending Together we can Educate Heal Nourish The Metcalf incident was a massive wake-up call for the industry, exposing serious vulnerabilities to power grid and critical infrastructure in North America. on how populated the area is, automation can be added, and the lights can be triggered once some- one enters the designated area. ACCESS CONTROL Controlling who has access to the area is another essential component of your security plan. Multi- factor authentication – such as requiring an access card and pin for entry – is an easy way to ensure only designated individuals can access the power grid, and they also provide a clear log of who was there and when. By coupling this with awareness cameras, organizations can verify who was on site should an incident occur. ANALY TICS Utility organizations should look to create Secu- rity Operations Command Centers (SOCC) for these pieces of critical infrastructure. Typically, SOCCs are centrally located and enable the staff to supervise the site using data processing technology. Officials can monitor activity from all solutions at once, closely manage access credential administra- tion for employees and contractors and manually let individuals in and out of the perimeter when the need arises.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2017