Last week the DHS Infrastructure Security Compliance Division posted a link to a new version of the Chemical Security Assessment Tool (CSAT) 2.0 Portal User Manual.
Read more here.
Security planning must take into consideration that the Adversary sets the agenda and is better informed when plotting than the security strategist.
The threat adversary sets the agenda. This is an important and too little discussed reality.
Building occupants, even building security, do not know that an adversary is considering an adverse attack or criminal intrusion. The building and suite occupants “blindly” implement security measures that are customary and often “cosmetic”. However, the adversary has an agenda:
Security countermeasures must mitigate these risk as far as is reasonable and possible. They should be deterred by at least two access-controlled perimeters to complicate their plan and increase their risk of detection.
Watch for our series of blogs on the security assessment process.
A recent FBI report reveals that a majority of active shooters spend at least a week planning their attack and often attack people and places with which they were already familiar. In the majority of active shooter cases, the active shooter knew and actively targeted at least one of the victims.
In this growing threat environment, employees are expressing concerns about acts of workplace violence and active shooter. The most important security measures for workplace protection are employee awareness training and a fundamental building security program.
A thorough and detailed building security vulnerability assessment (SVA) and report are the first steps in developing an effective building security program to protect people and critical assets. The SVA provides for the foundation of a risk management program.
The objective of conducting a security assessment is to assess security risks as a means to assist management in identifying and understanding the risks that face the organization. This assists management in making informed decisions on the adequacy of security and the need for additional security countermeasures to address threats, vulnerabilities and potential consequences.
Contact Don Greenwood & Associates, Inc. to have us conduct a security assessment on your building or office spaces.
On August 2nd, President Trump signed into law the Transportation Worker Identification Credential Accountability Act of 2018 (HR.5729). This formally prohibits the Coast Guard from implementing the Rule until DHS submits a satisfactory assessment of the TWIC program to Congress.
Furthermore, a U. S. District Court (Eastern, Virginia) issued a court order delaying the Rule at certain CDC facilities “until a further order of the court.” This is in response to lawsuits from several industry groups.
We will track this activity closely and keep you all informed.
Many companies aren’t prepared when they receive a letter from the DHS Infrastructure Security Compliance Division (ISCD) notifying them of an upcoming facility Compliance Inspection (CI). You might have documents that are out of date, or you may be missing the necessary forms. If left unchecked, you could be forced to waste time and money in enforcing corrective actions. When it comes to advising our clients to be prepared, these are the top three tips we give them for a successful CFATS Compliance Inspection.
Review Your Documents
When you receive a notice from DHS about an upcoming inspection, this is always a good time to review your security plan and required documents to make sure that you have everything in order. Also, this is a good time to verify that you have conducted the required drills and/or exercises, and an annual audit of the security plan.
Training is very important for facility personnel and this is a good opportunity to make sure all your training is up to date and to have a general discussion regarding security of the facility. The training can focus on topics that will most likely be covered during the inspection; including access control, monitoring, screening, security personnel (who is the FSO, Alt. FSO?), NTAS security measures, etc.
One thing that we recommend and develop for majority of our clients is to have a single security plan binder with all relevant documents and forms. This is a perfect, centralized place to store and secure all the forms and documents that the inspectors will want to review during the inspection. We have had great success with these binders for all of our regulated clients; CFATS, MTSA, TSA, DOT, etc. As we tell our clients, it is best to get the inspectors the requested material in a timely fashion and get the inspection over with as quickly as possible.
Recently one of our clients had a Compliance Inspection that they passed without any issues, “We went through our security plan book while the inspector was here and we were complimented on how all the files were in one book and not in different locations. We didn’t spend much time with it, because everything was in the binder that they had questions about.”
Let us know if we can help you prepare for your CFATS Compliance Inspection and develop a security binder for you and help you succeed with your inspections.
To read about what to expect from a CFATS CI, click here.
The Transportation Security Administration (TSA) began issuing the new TWIC NexGen cards on July 10, 2018. The new cards incorporate enhanced security features (click here to read more).
Details about the new TWIC NexGen card:
Click here to read more about the TWIC NexGen cards.
Effective immediately, USCG facility inspectors are going to start using a new form for facility inspections. The new form, CG-835F, replaces CG-Form 835, “Vessel/Facility Inspection Requirements”. CG-835F is specifically formatted for facility inspections. There are no major changes to the new form or the information collected during the inspection.
Facility owners and operators may start seeing Coast Guard facility inspectors using the new form immediately, but some inspectors may still use the older CG-835 form during the transition.
Click here for a link to the new CG-385F form.
The Coast Guard has proposed to delay the effective date for implementation of TWIC Readers for certain facilities. The proposed delay is for two categories of facilities:
The Coast Guard proposes delaying the effective date for these two categories of facilities by 3 years, until August 23, 2021.
Other vessels and facilities, including facilities that receive large passenger vessels and facilities regulated under 33 CFR 105.295 that handle certain dangerous cargoes in bulk and transfer it to or from a vessel, would be required to comply with the final rule by August 23, 2018.
Click here for the Notice of Proposed Rulemaking.
Review this list with your contract Branch Manager or Supervisor and make these activities part of their everyday routine.
Don Greenwood & Associates has comprehensive templates for guard contracts, post orders, and security officer training programs. Give us a call if we can help develop procedures and tune up your guard force.
“I knew this was going to happen.” That is the statement given in more than 50% of workplace and school rage killings.
We have learned that employees are unlikely to report emerging situations to management unless they feel confident that management has a plan and an organized response to address the issue.
Don Greenwood & Associates has supported clients with workplace violence prevention and response programs since 1995 – companies in oil & gas, field services, manufacturing, business, chemicals and computing.
Our program is comprehensive, ready for rapid deployment throughout the workforce, and includes:
The program is complete, cost effective, and ready to tailor to your company’s needs and culture.
Send me an email or give me a call for more information – Don Greenwood, email@example.com, 281-435-2339.
Check out our website – www.greenwoodsecurity.com
Don Greenwood & Associates, Inc. – Full Service Security Management Consultants since 2003