Security Management for Critical National Infrastructure (New) – 3 days
Covering essential areas in security management at critical national infrastructure environment, and
based on the latest standards and regulations in the industry, this course will equip security
professionals to effectively manage security in critical national infrastructure environment.
Who Should Attend
• Security director/manager in critical national infrastructure organizations
• Security specialist
Course Outline:
• Security Function Management
o Security in Indonesia’s context
o Proactive security
o Security management program
o Security Operation Procedures
o Security Awareness
o Baseline security standard
o Security plan
o Security alert and operating levels
• Security Risk Analysis
o Basics of security risk analysis
o Asset identification
o Threat assessment
o Likelihood assessment
o Impact assessment
o Determining the IRV
o Finding your Vulnerability
o Risk mitigation
o Risk register
o Calculating ROI
• Security Design and Survey
o Overview of Security Design
o Security design objectives
o Physical Protection Systems
o Situational Crime Prevention
o CPTED
o Adversary Path Modelling
• Physical Security
o About Perimeter
o Use of multiple fences
o Perimeter Intrusion Detection System
o Perimeter CCTV
o Perimeter Lighting
o Differences in Old and New Buildings
o Fundamentals of Building Protection
o Building Intrusion Detection System
o CCTV for Buildings
• Electronic Security System and Its Implementation
o Access management and automation
o Access Control Hardware
o Vehicle Control and Entry
o Visitor Management System
o Function of CCTV
o Active and Passive Surveillance
o CCTV Overview: cameras, lenses, transmissions, video management system, display,
storage
o Video analytics
• Counterterrorism and Militancy
o Terrorist Threat assessment
o Overview of Bomb attacks
o Marauding Terrorist Firearm Attacks
o Chemical, Biological and Radiological Terrorism
o CNI as one of terrorist target
o Protection principles: resilience, target hardening, detecting hostile reconnaissance
o Improvised Explosive Device (IED) and its Varieties
o Bomb Threats
o Searching for IED
o Actions on Discovery of IED
o Evacuation and Assembly
• Protection of Information
o Is Information an Asset?
o Information Classification
o Information Location
o The Bad Guys
o Threats
o Insider Threat
o Policy
o Awareness Training
o Protection Principles
o Data protection on Information Systems
o Overview of Technical Surveillance Counter Measure (TSCM)
o Incident Response and Investigation
• VIP Protection
o Duty of care
o At-risk personnel
o Risk identification
o Workplace violence
o Armed robbery
o Active Shooter
o Business Travel Security
o Expatriate Security
Investment: Contact Us
Reviews
There are no reviews yet.