Critical infrastructure is at risk to a new generation of human-centered, security threats. These threats include acts of terror, cyber crimes and predatory attacks with bogus identification and other types of documents. Add to this, never before has business been more dependent on employees and other insider agents to mitigate these threats.
Our website is designed for you to drill down into more nuanced information related to these questions. Take a few minutes to think about these questions:
Our website is designed for you to drill down into more nuanced information related to these questions. Take a few minutes to think about these questions:
- Does your terror and other crime threat risk assessment process and mitigation practice incorporate security related insights from crime prevention and human behavioral science?
- How early on does your organization identify emerging security threats that could affect your operations and bottom line; and how adaptive are you in responding to these threats?
- Do you picture your organization as a complex system; with many internal ecosystems, where a change to any one part might negatively impact another?
- In this age of fast paced change, have you done everything you can to establish a security learning culture?
- Workplace environment plays a significant role in shaping insider behaviors, triggering undesired behaviours and providing rationalizations/excuses with insiders are tempted. Is your management culture and practice current with environmental and behavioral science?
- What is the potential of long term damage to customer/client trust from perceived failure to protect their personal information?
- How dependent are you on government issued identification and other types of documents to make security and business decisions on physical access to your premises; and to privileges, benefits or services that you provide?
- Are you aware of the residual threats posed from security trade-offs made by government issuers of means of identification?
- Do you have effective frontline training in place to detect ruses at the point-of-contact with forged and fraudulently obtained documents that you rely on to make judgments and decisions?
- Are you aware of the litigation consequences for damages when frontline judgment goes terribly wrong and people are denied access to their accounts and to privileges, benefits or services that you provide?