independent security consultancy solutions · 2016-09-16 · services which are designed to support...

12
A range of services adding value to your business Independent Security Consultancy Solutions CornerStone

Upload: buidan

Post on 04-Jul-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

A range of services adding value to your business

IndependentSecurity ConsultancySolutions

CornerStone

Independent Security Consultancy. . . . . . . . . . . . . . . . . . . . 3

A Layered Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Beneath the Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Continuous Assessment and Improvement . . . . . . . . . . . . . 7

Training and Learning Development . . . . . . . . . . . . . . . . . . 8

About CornerStone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Contents

2

RISK MITIGATION APPROACH

CornerStone’s International reputation hasbeen built upon an innovative and dedicatedRisk Mitigation philosophy. Having researchedour clients’ vulnerabilities and gained anunderstanding of potential threats and risks,we utilise a range of techniques that reduce oreradicate their exposure.

Our Consultants are skilled at delivering highquality, comprehensive solutions throughout arange of sectors including:

• Banking and Finance• Professional Services• Manufacturing• Transportation• Hotel & Hospitality• IT/Software• Police/Military• Public Space• Petro-chemical• Sporting Arenas

Working independently or collaborating withother team members and stakeholders, theypromote the use of “best practice”methodology and use industry“benchmarking” to enhance all areas of thesecurity service.

We appreciate the need for a Return onInvestment and continually seek businessimprovement initiatives focussed on deliveringresults and intelligence that can be used todevelop enhanced business performancemodels, helping to release value to yourorganisation.

COMPREHENSIVE CAPABILITY

We offer a range of Core and ComplementaryServices which are designed to support yourbusiness activity.

Core Services

• Security System Design• Project Management• Policy & Strategy Development• Cost Analysis and Control• Technical Risk Assessments• Vulnerability Studies• Threat & Risk Analysis• Tender Management• Technical Audits

Our Complimentary Services augment our Corerange and can be delivered as part of a broaderprogramme or as stand-alone work tasks.

Complimentary Services

• Strategic Service Reviews• L1 & L2 Operational Requirements• Performance and Detailed Specification

Preparation• Contract Performance Management• Performance Audits• Building and Management of Asset Registers• Maintenance Contract Negotiation• Security Service Outsourcing• Security Training

Our experience and capability enables us to meetany challenge but most importantly, our clientfocussed approach and attention to detail ensurethe highest quality outcome is always assured.

CornerStone 3

As corporate structures develop and change andcommunication methodology becomes more elaborate,

security provision options continue to evolve to meet anever expanding range of security threats.

Independent Security Consultancy

DEFENCE IN DEPTH

By viewing security provision as a series oflayers, risks can be mitigated and vulnerabilitiescountered. Whether you are considering a newconstruction or managing an existing buildingportfolio, Secured by Design (SBD) or CrimePrevention Through Environmental Design(CPTED) principles can be applied delivering‘Defence in Depth’.

Underneath the ‘5 Layers of Security’ there willpotentially be many sub-layers, eachinterconnected and designed to perform aparticular function. It is the combination andintegration of appropriate measures that willensure security objectives can be met.

METHODOLOGY

CornerStone has developed a comprehensive,process driven approach that establishes thegeneric and specific Threats and Risks faced bya particular enterprise. Only once fullyconsidered, can the appropriatecountermeasures be selected and developed tomitigate or eradicate the perceived hazard.

This can be undertaken promptly and covertlyon a site specific basis or across a globalenterprise.

By fully understanding the corporate securityaspirations compared with what has beenachieved at a given point in time, permits theright decisions to be made in pursuit ofachieving your Security goals.

TAKING SECURITY SERIOUSLY

Is your corporate security under continualreview? Does your strategic business planinclude Security? Do you measure securityperformance and Return On Investment?

In todays global business world, continuing toperform activities and use systems andstrategies that were introduced for a past era,really is, no longer an option.

A layered approach

4

1. Intellectual

2. Environmental

3. Perimeter

4. Shell

5. Core

• History

• Crime and Anti-Social Behaviour

• Neighbours

• Transportation

• Policy and Procedures

• Critical Incident Planning

• Vulnerability Studies

• Threat & Risk Assessments

• Gap Analysis

• Staff Vetting

• Training

• Local & International Intelligence

CornerStone 5

Beneath the LayersLAYER 1 – INTELLECTUAL

The Intellectual Layer can be very broad and cover a large range of topics. It will often include theinformation that strategic and operational decisions are based upon. We view the Intellectual Layer as the‘first line of defence’. Areas covered may include:

LAYER 2 – ENVIRONMENTAL

The Environment is the area around the site – the Street, District, City or even Country. It considers manyfactors that may include:

• Perimeter Intruder Detection (PIDS)

• Hostile Vehicle Mitigation (HVM)

• Defensive Landscaping

• Signage

LAYER 3 – PERIMETER

The perimeter is the area between the site boundary and the Buildings within it. It includes walls andfences of the boundary as well as drop-off areas, gardens, public spaces and could include car parks andloading bays. Boundaries don’t always have fences, gates or walls. There can be trenches, securedplanters or water features and can even be unmarked. The following techniques may be considered:

• Entrance Lobby

• Staff and Visitor Entrances

• Power sub-stations

• Boiler rooms

• Blast & Ballistic Protection

• Target Hardening

• Cooling plant

LAYER 4 – SHELL

The shell is the main fabric of the building, including the walls, windows, doors, skylights and roof. It willalso include external storage areas, garages etc. and special attention should be given to the following:

6

Security Management – This refers to both thehigh level strategy, policy and procedures inaddition to the Management Team and Personnelwith particular security duties.

Procedures should be in place to deal with as manycategories of Security incident as possible anddrills should be undertaken to both test andreinforce actions.

Careful consideration should also be given to boththe location of the Incident Management Teamduring a security incident as well as the securestorage of all security data, including all SecurityPersonnel rosters, alarms, fault logs, CCTV imagesand Access Control records.

Essential Services – These can be defined asthose being required to manage a security incidentand may therefore include:

• Power• Lighting• Communication Networks• CCTV• Remote Lock-down• Secure Radio

Specific procedures and Assignment Instructionsshould be developed to ensure all essential servicesare constantly available.

Each site requires careful analysis to establish itsEssential Services and live scenario testing shouldbe carried out to ensure its effectiveness andincrease staff awareness.

LAYER 5 – CORE

We define Core Security as both essential services that would be needed in the event of a critical incidentas well as the Security Management infrastructure itself.

The two distinct areas of Core Security are:

Beneath the Layers

Security is a dynamic, complex subject and at CornerStone

we don’t believe in compromise.

CornerStone 7

Security is a dynamic, complex subject and atCornerStone we don’t believe in compromise.

Risks and Threats change and without the ability to continually address the issues of theday, any security initiative will soon become out-dated and irrelevant.

To guard against this potential, we endorse theimplementation of a process known asContinual Assessment and Improvement.

Having defined the overall objective (usually aspart of an Operational Requirement) we analyseongoing performance in that area.

Training programmes are then developed toensure a consistent implementation is achieved.These can be basic awareness or fully detailedlearning programmes that are aimed atparticular Security functions or personnel.

Key Performance Measures (KPM’s) are definedand Key Performance Indicators (KPI’S) arecontinually monitored, to ensure that thedesired Operational Requirement is beingacheived.

KPI’s are continually refined and staff are givenfeedback to ensure performance levels areenhanced wherever possible.

We know that change through an evolutionaryprocess is far more effective than continualrevolution; delivering improved Return onInvestment levels along with genuine clientsatisfaction.

Continuous Assessment & Improvement

SECURESITE

Define Objective

Analyse Performance

Redesign the Service

Provide Training

Monitor &Measure

At CornerStone we believe that Training,Learning and Personal Development areessential for an organisation to prosper. It helpsimprove quality, client satisfaction, productivity,morale, management succession, businessdevelopment and profitability.

To enable you to fully understand yourorganisations Training and Learningrequirements, CornerStone can help byconducting a detailed analysis of currentcompetencies and capabilities.Among the ways we’ll achieve this is to carryout a DIF Analysis. DIF stands for Difficulty,

Importance and Frequency. A DIF Analysis is asophisticated method of assessingperformance, prioritising training needs andplanning training, based on the threeperspectives:

• Difficulty• Importance• Frequency.

The system looks at tasks and activities as wellas skills, competencies and capabilities ratherthan looking at development from a personal,individual perspective.

Our Training and Learning Development programmessupport our Security Consultancy activities and allows us to

provide long term support to our clients.

Training and Learning Development

8

Our range of courses is continually beingdeveloped and updated. They cover thefollowing areas:

• Strategic Security Management • Access Control Administration and

Management • CCTV Management• Control Room Operation• Fire Alarm System Operation

and Management• IP and Network Security • International Travel Safety & Awareness• Close Protection• Enhanced Close Protection • Hostile Environment Awareness• Business Resilience• Compliance• Duty of Care• Critical Incident Management

Once core competency and specific job skillknowledge levels have been addressed webelieve one of the most effective ways todevelop people is to enable learning andpersonal development. This extends the rangeof improvement outside traditional securityskills and knowledge and creates an exciting,liberating and motivational opportunity - forstaff and employers.

Organisations face growing pressure to changethese days - to facilitate and encourage whole-person development not only delivers betterlong term results but improves staff satisfactionand retention rates.

DEVELOPMENT PROGRAMME

CornerStone’s personal developmentprogramme utilises the latest communicationand educational techniques to offer a servicethat employees value and organisations benefitfrom. We excel at:

• 'Enabling learning' • 'Facilitating meaningful personal

development'• 'Helping people to identify and achieve their

own personal potential'

CornerStone 9

The Training Process

So if you share our vision of raising standardsthroughout the global Security Industry pleasetalk to one of our advisers today and take the

first step to a better future.

10

On-the-job training

Informal training

Classroom training

Internal training courses

External training courses

On-the-job coaching

Mentoring

Training the trainer

Skills training

Product training

Technical training

Behavioural developmenttraining

Role-playing and role-play games and exercises

Attitudinal training anddevelopment

Accredited training andlearning

Distance learning

A 5 point process is then followed to ensure delivery of the most beneficial Trainingand learning programme.

Our Training Menu can consist of a combination of delivery techniques selected according toorganisational and individual training needs. These may include:

1 2 3 4 5Assess & agreetraining need

Create trainingor development

specification

Considerlearning styles & personality

Plan training & evaluation

Design materials,methods &

deliver training

The Training Process

CornerStone 11

In today’s uncertain world, making the rightsecurity decisions has never been moreimportant. CornerStone’s range of services areall aimed at assisting organisations andindividuals deliver their corporate securityobjectives.

We provide a fully independent SecurityConsultancy Service, advising clients on Security& Risk Management and deliver a range ofTraining Courses that can be integrated withtechnical and operational activities.

We can represent any organisation on aconfidential basis and scale our resource tomeet any challenge.

We offer a global capability and a willingness toengage with our clients to ensure a trulycomprehensive Security Consultancy capability.

In 2008 and 2009 CornerStone were Finalists inthe prestigious Security Excellence Awards –Security Consultant of the Year category, alongwith being recognised for our InternationalAchievements. We are leaders in our field andcommitted to quality in everything that we do.

Please contact CornerStone for an informaldiscussion about how we can help you

Call +44 (0) 207 868 5070

www.CornerStonegrg.co.uk

About CornerStone

Security Consultant of the Year 2009International Acheivement Award 2009Security Consultant of the Year 2008

CornerStone GRG Ltd

Providian House

16 - 18 Monument Street

London

EC3R 8PD

T +44 (0) 207 868 5070

F +44 (0) 207 868 5001

www.CornerStonegrg.co.uk

© CornerStone GRG Ltd

CornerStone