Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical Security

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

By Jordan Arnold, Jim Wynne
The Louvre
Diogo Fagundes via Unsplash
November 10, 2025

When thieves stole more than $80 million in jewels from the Louvre in Paris, they didn’t exploit a total absence of security but rather gaps in the museum’s broader security program, encompassing both aging systems and situational awareness, according to early reports. The museum’s director later confirmed that the balcony used in the break-in wasn’t covered by a functioning external camera; the only camera nearby faced the wrong direction. Meanwhile, French senators have questioned how a truck with an extendable lift could park the wrong way on a major road beside the museum, up against the wall, for two hours without anyone challenging it.

Even without cameras aimed at that façade, the scene alone should have prompted a quick response. A basic perimeter patrol, one of the most fundamental layers in any protection plan, might have noticed the lift, verified whether any construction work was scheduled, and reported or challenged the activity. If perimeter security had been fully briefed on maintenance schedules and empowered to question irregularities, the setup might have been recognized as suspicious much sooner.

This was not simply a matter of technology but of coordination and awareness. It is a reminder that the effectiveness of security depends as much on people and processes as on equipment. While details of the Louvre incident are still emerging, it already illustrates that upgrading cameras without strengthening the human and procedural layers around them provides only partial protection. Even the most advanced systems can falter when hardware, communication, and on-the-ground awareness aren’t aligned.

Whether Louvre or Local: The Same Lesson Applies

Whether it’s priceless jewels at the Louvre or a student sculpture outside a school, the principle is the same: meaningful protection starts with understanding risk, not just adding hardware. After the theft of a $7,000 student sculpture, the Toledo School for the Arts (TSA) is expanding its outdoor surveillance. The decision makes sense, but as the Louvre demonstrates, ensuring that cameras are functioning is only part of the process. Just as important is identifying where the initial installation may have missed blind spots, or where later changes to the physical environment have created new ones.

Public art thefts often succeed not because there are no cameras, but because the wrong areas are monitored, the footage is poor, or staff don’t recognize what’s unfolding in real time.

Start with a Risk Assessment

An informed, holistic risk assessment is the most valuable first step in any security upgrade. It helps determine where cameras truly add value, where other controls are more effective, and how human factors can bridge the gaps that technology alone cannot. It also encourages institutions to define what “normal” looks like and to prepare personnel to recognize when something deviates from it.

At the Louvre, based on the information currently available, it remains possible that a risk assessment had been conducted and that some vulnerabilities, such as misdirected cameras, limited external coverage, or coordination challenges with law enforcement, were already known. What is clear, however, is that no measures appear to have been taken to address these issues before the theft occurred. Reporting has also raised the possibility of insider involvement, suggesting that someone with access to such information could have acted before improvements were made. And if no assessment had been performed, this incident makes clear that one was long overdue.

At Toledo, a proactive assessment can help ensure that any planned upgrades are accompanied by immediate, practical measures, such as improved lighting, clear sightlines, and staff awareness, so that technology and human judgment reinforce each other from the start.

Building a Layered Security Program

True security depends on a program that integrates technology, people, and process, reinforced by continuous testing and awareness. Even the most advanced systems and well-designed procedures are only part of the equation; the other part is the readiness of those who use them. Just as phishing simulations and training have increasingly turned employees into active participants in cybersecurity, testing has long been a core element of effective physical security programs, even if we do not read about it as often. Simulations and scenario-based exercises help staff stay alert to potential risks and understand how to respond effectively. When systems are maintained, teams are trained, and procedures are practiced, protection becomes proactive and resilient, and culture becomes one of vigilance and shared responsibility.

The Real Lesson

Whether protecting national treasures or student art, security should be seen as a living ecosystem, part technology, part vigilance, and part culture. The Louvre case underscores that even in world-class institutions, risk management is a continual process, not a static achievement.

KEYWORDS: layered security museum security risk assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordan arnold headshot

Jordan Arnold is Partner at The ArtRisk Group. Image courtesy of Arnold

Jim Wynne is Partner at The ArtRisk Group. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • 5 mins with Lines

    5 minutes with Michael Lines - Why the IT/infosec community should be concerned after SolarWinds

    See More
  • business-risk-management.jpg

    Why cyber risk assessments should be a part of your business strategy

    See More
  • global-enews

    Why Your Next Intelligence Analyst Should Be a Workplace Violence Analyst

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing