commercial building security management

The Challenge of Security Portfolio Management

Ensuring the safety of organizations is paramount, yet achieving this goal requires both strategic planning and securing adequate funding. This article explores the administrative and technical challenges involved in managing security portfolios for campus and multisite environments across the education, healthcare, and government sectors. It also offers insights into how to proactively manage security systems and procure the necessary funding to keep them running smoothly.

Institutions in these sectors face unique challenges when it comes to security management due to the scale and complexity of their systems. Here are some key issues:

  • Scale of Systems:

    • Large geographic footprints require multiple contracts for deployment and management.
    • Limited construction windows make installation and upgrades more challenging.
    • Sometimes older or historically preserved buildings restrict installation options and increase costs.
  • Cost of Ownership:

    • Significant resources are required to manage applications, monitor alarms, and respond to incidents.
    • Increased annual recurring costs due to shifting cost models towards device licensing and SaaS platforms.
    • Rising cost of ownership with trending software as a service (SaaS) models.

Given these challenges, it’s essential for security organizations to develop a comprehensive lifecycle and strategic plan to mitigate potential issues, ensure a proactive approach to managing security portfolios and plan for funding.

The Importance of a Lifecycle and Strategic Plan in Security PortfoliO Management

A well-structured lifecycle and strategic plan is critical for understanding the current state and future needs of security portfolios. Key components of this plan should include:

  • Operational Elements:

    • Hiring skilled personnel to manage and operate security systems.
    • Conducting organization-wide training on emergency protocols
    • Developing and continuously updating security protocols and procedures.
    • Regular system testing and maintenance to ensure functionality and reliability.
    • Establishing a clear response plan for security breaches and emergencies.
 
  • Technological Elements:

    • Integrating advanced technologies like AI, machine learning, and IoT for improved surveillance and threat detection.
    • Ensuring systems are scalable and adaptable to emerging security threats and technology advancements.
    • Maintaining cybersecurity measures to protect against digital threats and data breaches.
    • Interoperability between various systems and applications for streamlined operations.
 
  • Compliance and Regulatory Elements:

    • Adhering to local, state, and federal regulations and standards for security systems.
    • Periodic audits and assessments to ensure compliance and identify areas for improvement.
    • Implementing privacy policies to safeguard the personal information of students, patients, staff, and visitors.
 
  • Risk Management:

    • Conducting regular risk assessments to identify and mitigate potential security threats.
    • Developing a crisis management plan to address and recover from major incidents.
    • Establishing redundancy and backup plans to ensure security system resilience.
 
  • Community and Stakeholder Engagement:

    • Communicating security plans and measures with students, staff, and other stakeholders.
    • Promoting a culture of security awareness and participation across the institution.
    • Collaborating with local law enforcement and emergency services for coordinated response efforts.
 
  • Financial Elements:

    • Capital and installation costs.
    • Licensing, maintenance, administration, and software support.
    • Anticipating indirect costs like electrical infrastructure, network equipment, and structural/civil elements (e.g., trenching, foundations).

Incorporating these components into the security strategic plan provides organizations with a holistic view of the proposed system, enabling them to avoid unpleasant surprises, costly delays, or incomplete installations. Institutions can create a robust framework that addresses the multifaceted nature of campus security, plans for funding installation and ongoing maintenance and ensures a safe environment for all.

Funding and Financing Strategies

Procuring funding for large-scale security projects requires a multi-faceted approach. Here are some strategies that can help:

  1. Grants and Grant Programs

Grants are an effective way to secure funding for many institutions. For example, the Nonprofit Security Grant Program (NSGP) offers funding support for physical security enhancements to nonprofit organizations at high risk of terrorist attacks. The COPS School Violence Prevention Program is another targeted example that provides funding to improve security in schools through evidence-based school safety programs and technology.

  1. Proactive Budgeting

Security organizations should proactively track indirect costs not typically covered by the security budget. This includes costs related to electrical infrastructure, network equipment, and structural elements. By anticipating these expenses, organizations can plan more effectively for future funding requests.

  1. Public-Private Partnerships

Partnering with private sector entities can provide additional funding opportunities and resources. These partnerships can facilitate the sharing of best practices and innovative solutions, ultimately enhancing the security infrastructure.

  1. Leverage Technology

Implementing advanced technology like AI and machine learning can lead to cost savings and improved security outcomes. These tools enhance threat detection and response times, reducing the overall cost of managing security portfolios.

Securing adequate funding for physical security at healthcare facilities, nonprofits, government institutions, and educational campuses is a complex but critical task. By developing a comprehensive lifecycle and strategic plan for their security portfolio, proactively managing indirect costs, and leveraging various funding sources, security managers, government officials, and education administrators can ensure the safety and security of their institutions.

Don’t wait until it’s too late. By taking proactive steps, you can safeguard your institution while navigating the challenges of securing and managing a robust security portfolio.

If you have any questions or want to discuss your organization’s situation, please contact us at info@abscosolutions.com.

 

Sources
ASIS Security Management, Challenges in Higher Education Security: Portfolio Management, https://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2021/challenges-in-higher-education-security-portfolio-administration/?_t_id=8yEa3b8FuoYiSDOGiKOD8A%3d%3d&_t_uuid=aqf-TlcvSY-tkvhfQqcfjQ&_t_q=higher+education+security+portfolio&_t_tags=language%3aen%2csiteid%3ab1140b07-9e31-4808-809a-878911c7f3f1%2candquerymatch&_t_hit.id=ASIS_Models_Pages_SMArticleDetailPage/_7241c403-30d0-4f17-96f4-261b64f80eb1_en&_t_hit.pos=1

ASIS Security Management, Challenges in Higher Education Security: Technology and Systems,  https://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2021/challenges-in-higher-education-security-technology-and-systems/?_t_id=8yEa3b8FuoYiSDOGiKOD8A%3d%3d&_t_uuid=LJqkW2vuQEmYbreeDBDySA&_t_q=Mohammed+Atif+Shehzad&_t_tags=language%3aen%2csiteid%3ab1140b07-9e31-4808-809a-878911c7f3f1%2candquerymatch&_t_hit.id=ASIS_Models_Pages_SMArticleDetailPage/_729d99e9-4654-40a4-8429-3fb92c8f1dd9_en&_t_hit.pos=3

ASIS Security Management, Challenges in Higher Education Security: Finance and Funding, https://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2021/challenges-in-higher-education-security-finance-and-funding/?_t_id=8yEa3b8FuoYiSDOGiKOD8A%3d%3d&_t_uuid=N9-qtax1Qn6CpmUcdi5G-g&_t_q=higher+education&_t_tags=language%3aen%2csiteid%3ab1140b07-9e31-4808-809a-878911c7f3f1%2candquerymatch&_t_hit.id=ASIS_Models_Pages_SMArticleDetailPage/_38a08a25-fe37-4fbf-b992-736ecaa92e5f_en&_t_hit.pos=4

DispatchWhere to Find Funding for Equipment, Training, Hiring and Programs, https://cops.usdoj.gov/html/dispatch/02-2020/finding_funding.html#:~:text=The%20Office%20of%20Justice%20Programs,and%20law%20enforcement%20safety%20purposes.
HHS 405d, How to Grow Your Security Program Without Busting Your Budget, https://405d.hhs.gov/post/detail/a383ca9e-158c-4392-86b5-a1c60bea776f#:~:text=FEMA%20%2D%20Nonprofit%20Security%20Grant%20Program,memorandum%20of%20understanding%20(MOU).

Recommended Posts