The Human Element in Security
Security is a human-orientated service. This is in spite of the significant levels of investment that are channelled into security technology, physical security products and systems. As we develop a better understanding of how the 'human factor' impacts security services, there is also a need to recognise the threats that humans pose. There is broad consensus that irrespective of investment in cyber, technical, physical and operational security measures, the human element can inadvertently often be the weakest link in the security 'chain'. There is also the adversarial threat posed by those working to overcome or undermine the security function.
Today there is a growing appreciation of techniques such as Crime Prevention Through Environmental Design and a growing body of behavioural analysis research. Both have given us a better understanding of how both to counter the threats and harness the power that people in the security sector can present.
CornerStone’s holistic approach to security recognises the part that people play both positively and negatively. Our consultants have the expertise and the understanding necessary to help guide you through the complex and multifaceted aspects of security including the 'human element'. We are here to support you.
Our viewpoint
Awareness of an insider threat
Comprehensive view of your risk
- Identifying and quantifying the risks associated with an 'Insider Threat' is part of the Holistic view necessary to inform potential counter measures
Security Vetting
- Undertaking comprehensive security pre-employment vetting of staff, as well as throughout their employment, can be a helpful way of identifying threats
Supply Chain
- Staff and contractors employed through a service provider should be assessed in a similar way to directly employed staff to avoid creating 'soft' routes through the security layers
Policy and Procedures
- Ensuring that Policies and Procedures address the issues relating to the Human Element should be considered a key aspect of the security framework
Training
- Creating awareness of the areas that are prone to exploitation can significantly help guard against the Insider Threat
Design
- Understanding human behaviour and the factors that can influence it, offers a more extensive reference point when designing facilities and systems
Our Approach
CornerStone are able to address the Human Element through a comprehensive range of services that are often delivered in conjunction with other, mainstream services. From Strategy development, a comprehensive range of Assessment Services though to the Design process, our modern, holistic approach ensures that the Human Element is a factor included within our designs and advice.
We are certified in Crime Prevention Through Environmental Design (CPTED) techniques and use our understanding to influence the built environment to create safer neighbourhoods and communities
Requirement Scoping
We have a well developed process to help capture the various layers of requirements at a strategic, operational and tactical level
Threat Monitoring and Analysis
Before risk can be quantified, any prevailing threats need to be identified and analysed.
Penetration Testing
Physical Penetration Testing is an effective way of identifying gaps in security layers or weaknesses in service delivery
Compliance Monitoring
To confirm that policy and procedures are being adhered to our Compliance Monitoring service provides insight and intelligence that can be harnessed for improvement
Cyber
Our Cyber proposition is focussed on the identification and quantification of Cyber Risk. We will advise on Cyber risk mitigation and define how it impacts all areas of security
Security Improvement Program
A security improvement program is a broad ranging activity that can impact any area of security and enable better alignment with corporate requirements or apply a more joined-up or holistic approach
Holistic Approach
Removing The Gaps
CornerStone has pioneered the development of contemporary security risk management practices over many years. Our Unified Security Risk Management® model provides a truly joined-up and inclusive way of addressing some of the trickiest security challenges. Through the development of a deep understanding of security risk we have established how its identification, quantification and mitigation can be utilised to improve an organisation’s security posture, reducing risk levels whist improving business resilience and preparedness. Read about our approach related to theses specialist areas.