Homepage

The Human Element in Security

Security is a human-orientated service. This is in spite of the significant levels of investment that are channelled into security technology, physical security products and systems.  As we develop a better understanding of how the 'human factor' impacts security services, there is also a need to recognise the threats that humans pose. There is broad consensus that irrespective of investment in cyber, technical, physical and operational security measures, the human element can inadvertently often be the weakest link in the security 'chain'. There is also the adversarial threat posed by those working to overcome or undermine the security function. 

Today there is a growing appreciation of techniques such as Crime Prevention Through Environmental Design and a growing body of behavioural analysis research. Both have given us a better understanding of how both to counter the threats and harness the power that people in the security sector can present. 

CornerStone’s holistic approach to security recognises the part that people play both positively and negatively. Our consultants have the expertise and the understanding necessary to help guide you through the complex and multifaceted aspects of security including the 'human element'. We are here to support you.

Our viewpoint

Awareness of an insider threat

The insider threat is a difficult challenge to overcome. One or a number of people actively working against the organisation can be difficult to detect and even harder to mitigate. It's a threat area that has grown in recent years, from activists who oppose an organisations objectives or aspirations to many examples of espionage where a corporate or state actor seeks to destabilise or disrupt another organisation or gather proprietary information for commercial gain or other purpose. CornerStone's Holistic Approach includes a range of services that can help organisations and businesses improve their ability to identify a threat and deal with the consequences.

Comprehensive view of your risk

Identifying and quantifying the risks associated with an 'Insider Threat' is part of the Holistic view necessary to inform potential counter measures

Security Vetting

Undertaking comprehensive security pre-employment vetting of staff, as well as throughout their employment, can be a helpful way of identifying threats

Supply Chain

Staff and contractors employed through a service provider should be assessed in a similar way to directly employed staff to avoid creating 'soft' routes through the security layers

Policy and Procedures

Ensuring that Policies and Procedures address the issues relating to the Human Element should be considered a key aspect of the security framework

Training

Creating awareness of the areas that are prone to exploitation can significantly help guard against the Insider Threat

Design

Understanding human behaviour and the factors that can influence it, offers a more extensive reference point when designing facilities and systems

Our Approach

CornerStone are able to address the Human Element through a comprehensive range of services that are often delivered in conjunction with other, mainstream services. From Strategy development, a comprehensive range of Assessment Services though to the Design process, our modern, holistic approach ensures that the Human Element is a factor included within our designs and advice.

We are certified in Crime Prevention Through Environmental Design (CPTED) techniques and use our understanding to influence the built environment to create safer neighbourhoods and communities

Requirement Scoping

We have a well developed process to help capture the various layers of requirements at a strategic, operational and tactical level

Threat Monitoring and Analysis

Before risk can be quantified, any prevailing threats need to be identified and analysed.

Penetration Testing

Physical Penetration Testing is an effective way of identifying gaps in security layers or weaknesses in service delivery

Compliance Monitoring

To confirm that policy and procedures are being adhered to our Compliance Monitoring service provides insight and intelligence that can be harnessed for improvement

Cyber

Our Cyber proposition is focussed on the identification and quantification of Cyber Risk. We will advise on Cyber risk mitigation and define how it impacts all areas of security

Security Improvement Program

A security improvement program is a broad ranging activity that can impact any area of security and enable better alignment with corporate requirements or apply a more joined-up or holistic approach

Holistic Approach

Removing The Gaps

CornerStone has pioneered the development of contemporary security risk management practices over many years. Our Unified Security Risk Management® model provides a truly joined-up and inclusive way of addressing some of the trickiest security challenges. Through the development of a deep understanding of security risk we have established how its identification, quantification and mitigation can be utilised to improve an organisation’s security posture, reducing risk levels whist improving business resilience and preparedness. Read about our approach related to theses specialist areas.

Get in touch today