Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Tools of the Master Planning Trade

By Kurt W. Collins
December 1, 2007
Constructing a security master plan calls for a lot of homework including the essential need to know the existing and future needs of the enterprise.


Meeting with security staff and management colleagues is an important way to gather information as part of putting together a master security plan.

Things have changed and so has the planning needs of chief security officers and their enterprises, especially when it comes to the integration of security systems. Since 9/11, security has taken on a broader awareness among America’s business, healthcare and educational institutions, and to the public in general.

There is a certain level of expectation toward security. But increased levels of security can be expensive. Today, almost no one can afford to be without a security program or plan. That is not to say that the Mom and Pop grocer on the corner needs the same level of security as a global manufacturing giant; nor the single story suburban office park the same as the signature high-rise in a major metropolitan downtown area.

Security plans must be based on and balanced against the risks an organization faces.

Very few organizations have the resources to take their security program from “zero to 60” immediately. By creating a master security plan, an organization has the ability to customize implementation to meet resources. Through periodic audit of the plan they have the opportunity to customize their security program to meet evolving threat environments. The master plan, therefore, is a living document able to respond to today’s dynamic world.

Here’s a decision model chief security officers can use when forming a master plan. Take a tough look at issues comparing probability to impact.

WHAT’S A MASTER SECURITY PLAN?

Master planning is a well-known concept in many circles. Architects will create a master plan for a new building site. IT professionals create a master plan for a new network installation or for the network disaster recovery process. The master plan is a road map to implementing any complex operational program in today’s businesses and institutions.

Security has become one of those complex programs.

The security program of an enterprise must be able to swiftly address sudden and unforeseen events impacting the organization and/or its personnel while not significantly impeding the organization in its normal daily activities.

The security staff at Acme Widget Manufacturing Company mans the various entrance doors and generally observes the comings and goings of everyone in Acme’s flagship factory. Security makes everyone slow down a bit and show their company identification. Visitors must stop and register at the security desk before getting an ID badge to go inside.

Acme is notified that the United States Department of Homeland Security has raised the general threat level from Yellow to Orange. Security now implements its “Orange Plan” which requires all visitors must have everything they carry searched and wait until an Acme employee comes to the lobby and escorts them into the building.

Every security program should be able to adjust to meet changing threats to the organization -- adapt when the Department of Homeland Security changes the national threat level from Yellow to Orange to Red and back again.

Every security program needs to address the differing threat levels that exist at the same time within an organization. For example, the marketing department’s five-year marketing plan may require a different level of protection than the facilities department’s five-year capital plan.

For these reasons, the master plan is a process rather than a project.

A master plan consists of the assessment of the organizational needs, the plan to address those needs, the implementation of that plan and the continual testing or review of the implementation to ensure it continues to address the dynamic needs of the organization.

Another issue that calls for the security master plan is cost. Many organizations cannot afford to take a security program from “zero to 60” in one shot. A master plan helps to identify the critical issues and allows management to phase in the program’s implementation based on a published set of priorities.

RESOURCES

The development and production of a master security plan is not the time to discount available resources. Remember that co-worker or associate who said, “If there is ever anything I can do for you…”? That time has arrived.

During the early part of the 17th Century, the English poet John Donne wrote; “No man is an island.” He could very well have been describing the master planning process for security. Use the resources that are available to you and then find more. To do justice to a plan that will guide your organization’s security for the next five to ten years will require significant investment of your time. If you have a security staff, whether contract, proprietary or a blend, use them as a prime resource. Another option is to hire a consultant who can dedicate the time and resources to produce a master plan with inputs from you and your organization.

“Master plans are road maps to implementing any complex operational program in today’s businesses and institutions. Security has become one of those complex programs,” said Kurt Collins.

DEVELOPING THE PLAN

Before you can determine what type of security plan you need to support your organization, you will need to assess where you are today and where you need to be over the initial life of the plan.

Where you are now is simply a snapshot in time of the organization and its security program. This is sometimes a painful process. You need to identify your current strengths as well as your current weaknesses. It requires a critical, unbiased view of the current operation.

Where you are going will require conversations with other executives within the organization. What is the strategic vision for the next five to ten years? Where is the organization going as a whole? What changes must be made to accomplish the vision? Will new offices be opened, or will offices be consolidated? Are there plans to take the organization global? Plans to expand into new markets? How can the security function support that vision?

What is the intended life of the plan? This drives the schedule of implementation for the master plan. The life is often driven by the organization’s funding profile. How much can the organization afford to fund the first year? The second? Can the complete implementation be funded in three years, five years?

What security risks does your organization face? Are your products subject to tampering? Theft? Does a competitor want your intellectual property? Do your employees travel to risky areas of the world? And how much of that risk can be tolerated as a cost of doing business? Knowing this will help define the amount of protection or mitigation that will be assigned to each risk.

For example, Acme Widget Manufacturing Company uses a two-step process to make its widgets. Each step is automated. The machine that performs step one is a very expensive piece of equipment but is very popular in the widget industry and is therefore plentiful in the marketplace. The machine that performs step two, however, is an inexpensive machine that Acme custom builds in-house. This is what give Acme its competitive edge; but there is only one in existence and each takes about six months to assemble.

Is Acme willing to absorb the additional cost incurred by the loss of the first machine or the delay in production of the loss of the second? This answer will help allocate security money.

The accompanying chart shows a simplified decision model to assist in allocating resources to address security risk.

Incident “A” is a common problem (high probability) but has very low impact on the organization. This type of incident is not worth a high commitment of resources to mitigate.

Incident “B” carries catastrophic impact to the organization but is extremely rare or impossible. Unfortunately, the impossible has a bad habit of becoming possible. The incidents that fall in this part of the chart must be given the hardest of scrutiny, and decisions as to the level of resources to be committed must be made.

Incident “C” has a low impact on the organization as well as a low probability of occurrence. Since this event is not likely to happen, nor is anyone likely to notice if it does, it is a bad choice for the allocation of resources.

Incident “D” is a highly likely event that carries catastrophic impact such as a major earthquake or firestorm in California. While things are done to try to mitigate this type of event, these are not typically ongoing programs. A lot of resources are invested in recovering from this type of incident.

Incident “E” is where the majority of the security resources are allocated. This is the “Critical Impact Area” for the organization’s security risk. The risks that fall into this area of the chart are at the right balance between criticality and likelihood that investment in their prevention and mitigation are likely to show a positive return on the investment.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kurt W. Collins, CPP, is principal of Fog Advisors of Oak Brook, Ill., which provides security management and public safety consultancy services. He can be contacted at kurt@fogadvisors.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Charting a Final Course to Master Planning

    See More
  • The Latest Tools of the Trade For Front Line Security

    See More
  • PPE estimating tools and calculators to help your enterprise

    Tools for planning and preserving PPE resources at your enterprise

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing