Security Technology Executive

MAY-JUN 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/994589

Contents of this Issue

Navigation

Page 23 of 79

24 SECURIT Y TECHNOLOGY E XECUTIVE • May/June 2018 • www. SecurityInfoWatch.com CRITICAL INFRASTRUCTURE marketplace. The quest for security efficiencies will allow those players who are committed to keep their employees safe, solidify their relationships with their customers and avoid debilitating insur- ance or litigation costs. They will be able to rise on the tide of enhanced measures to achieve additional positives to their marketplace strategy. In today's complex operating environment with the velocity of actions needed to fulfill customer needs and expectations, the methods used throughout all materials and product handling must be analyzed, examined, risk assessed, modified as necessary and "hardened". Nowadays, any single point of pipeline weakness can trigger a cascade of failures throughout supply chain operations and dependencies. driver behind this concept is the need to put as much distance between a possible threat and its target. The approach is useful to protect people and goods as well as buildings or any other entity from a possible threat. A Special Forces' stated mission is to "put off the day when something bad happens", and the req- uisites of protection are used to accomplish this goal. These barriers, among others, describe the basis for protecting anything or anyone from harm. In practice, they constitute an integrated blend of physi- cal, technical or procedural - and in some cases psy- chological - measures that range from a factory fence or wall to the ability to monitor and protect cargo worldwide with extraordinary precision. A a parallel example of this concept, the measures to protect U.K. dignitaries, U.S.-based executives and others as they traveled the world are as rel- evant today as they were in the past. Their use and the need to not relinquish them - or unnecessarily give them away - is an essential component of this approach. If an attacker has gained access to a pro- tected person or other target, the measures taken beyond close protection are assumed be breached, thus leaving an emergency response as the last resort - no doubt resulting in "if only" regrets later. Whatever or whoever is being protected, the pri- mary "requisite of protection", together with others, is the need to accept that a threat against a particu- lar target, operation or process is a possibility, one which can be made less likely or damaging with intelligent and appropriate countermeasures. Total Security Strategy (TSS) A useful proactive and overall strategy is for the pipeline owner and supporting partners to develop a "Total Security Strategy" for all supply chain activi- ties. A number of supply chain partners (3PLs, etc.), have adopted this unified approach as it defines overall leadership and accountability and the ben- efit of value-added security solutions to their end users. Implementation of TSS is straightforward but made more difficult by both volume and velocity of modern supply chain activities. The strategy of the TSS can be encapsulated in a simply-worded goal or mandate (as has been used in the pharmaceutical industry) can be to: "Ensure that raw materials and finished goods remain in their intended channel of manufacturing and distribution." And additionally, to: "Ensure the secure hand-over of product from one area of responsibility to the next (by means of accountability and responsibility at the points of transfer)." The objective of TSS strategy is to proactively reduce customer losses by emphasizing supply chain » Cargo thieves often emulate the steps taken by criminals during a kidnapping who conduct meticulous due diligence and surveillance of the intended victim. « The design and deployment of technological coun- termeasures and the necessity for human oversight to strengthen preparedness have done much to enhance the goal of "on time, every time" deliveries. Vehicle tracking , human oversight and training , tamper-evident detection and notification systems have made significant strides, but over-reliance on protective technology can itself create vulnerabilities since it is unwise to underestimate the ingenuity and persistence of those engaged in high-reward crime. Technology has provided the greatest benefit as an essential part of comprehensive and wide-ranging security programs that acknowledge risk and suc- cessfully integrate all the protective measures avail- able to them. But for the less vigilant or prepared, losses will continue. "Barriers" and "Layers" – Concentric Layers of Protection A concept or philosophy for the mechanics of secu- rity, equally relevant over the years, is called "protec- tive barriers" and its accompanying notions of aware- ness and preparedness. In its most basic form, the

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018