Security Technology Executive

JUL-AUG 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/557126

Contents of this Issue

Navigation

Page 19 of 39

20 SECURITY TECHNOLOGY EXECUTIVE • July/August 2015 www.SecurityInfoWatch.com PROJECT MANAGEMENT B y Way n e Smi t h W ireless technology is here to stay, and its applications for physical security will continue to expand. The questions that we need to be asking ourselves are "how reliable are these wireless com- ponents?"; "what can I do better today by deploying a wireless solution?" and "how do I ensure my infrastructure is prepared for wireless and how does it need to be managed and maintained over time?" It goes without saying that every organization is unique. The process of protecting assets is ever-changing as threats and risk factors evolve continuously. The general benefit to wireless technology is the potential to achieve a set of objec- tives with a "cost-effective" solution through the reduction or elimination of cabling creating a significant cost savings upfront in the procurement/installation phase. Additional benefits vary by product and application. So whether an organization is looking to update or retrofit a system with some additional technology or is breaking ground on a new facility, wireless technology should be considered. The key to designing any effective security system is to start with the basics: conducting a proper risk assessment and developing a security program. Risk assessments are more than a typical security survey. The process of identify- ing assets, threats, vulnerabilities and an incident's potential impact needs to be done thoroughly by an experienced pro- fessional who may work either inside or outside of the orga- nization. Once that has been done and the report has been reviewed an effective security program can be developed. This involves standardizing security and operational pro- cesses and procedures, and determining staffing require- ments to align with the objectives of the organization. After a thorough risk assessment has been conducted the next step is to identify opportunities to leverage technology as a workforce multiplier, to expedite breach detection and incident response, or to create new methods for maintaining compliance and operational efficiencies. It is all too common for an organization to establish a security program and then use it for several years without reviewing its efficacy and the evolving risks. With more and more technology being con- nected to the network it is crucial that not only the systems are kept up-to-date and properly maintained, but that the security program be reviewed on a regular basis. Failing to continuously identify and mitigate new threats and vulner- abilities can have disastrous effects on an organization. It is equally important that the Information Technology and/or Information Security Team be involved in this phase. Vulnerabilities in a wireless network need to be identified both from a threat and performance perspective. Wireless technology requires environmental readiness and engaging the IT stakeholders early on can help avoid issues with cyber Due Diligence for Deploying Wireless Technologies Wireless offers cost effective options for deployment and serviceability

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2015