Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Leadership & ManagementSecurity Leadership and Management

How to Manage Physical Asset Risk

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.

By Lynn Mattice
October 1, 2013
sec col body
 

 

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus. In this month’s column, we will explore why most enterprises can no longer simply depend on “Gates, Guns & Guards” to adequately safeguard their physical assets.  

Mitigating risks associated with physical assets covers virtually every type of object known to man. This category of assets ranges from jewels and precious metals to buildings and major infrastructure elements, and everything in between.  Physical security mythologies have for years focused on concentric rings of defense. Starting at the outside and working inward with layers of protection measures based on the value of what was being safeguarded, as well as the perceived risk of theft, malicious alteration, or sabotage from human caused actions or damage, inoperability or complete loss due to natural caused events. 

Municipal planners have adopted physical security risk mitigation strategies with the advent of Crime Prevention Through Environmental Design (CPTED). The original concepts focused on utilizing a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions which precede criminal acts. 

Today, CPTED concepts are also being utilized to thwart terrorist attacks. For example, designing a building with windows that are constructed of high-strength polycarbonates or coated with blast resistant film not only prevents smash and grab type crimes, but assists in protecting  buildings and their occupants from a broad range of explosive devices. Berms, bollards, planters and moats are frequently being utilized as a measure to reduce the likelihood of car or truck bombs from making it within an effective blast range of a building or critical infrastructure element.

Landscaping and lighting also come into play with CPTED. The use of low growing plants and shrubs eliminates potential hiding places. Carefully designing where trees will be located helps to avoid security video blind spots and from them being utilized to gain easy access over fences. CPTED concepts also call for the lower branches of a tree to be trimmed so there is at least an eight-foot clear zone before reaching the first branches.

Effective deployment of access control, coupled with security video and intrusion alarms has become more critical than ever.

Many corporations and building owners have deployed turnstiles of one type or another in lobbies. These turnstiles typically are low in height so they remain more aesthetically pleasing to the eye. Unless you have an armed security officer on the other side, they won’t stop some deranged person from jumping them to commit an act of workplace violence. Similarly, many schools have deployed a double door controlled entry system as an access control measure. In more than one school shooting incident, the shooter simply shot out the large pane glass panel next to the entry way to gain access.

Designing truly effective containment areas for visitors and limiting ingress and egress points are critical elements in physical security risk mitigation, but it can’t stop there. Not unexpectedly, people are the weakest link in maintaining effective physical security controls. Training all employees and/or building occupants, coupled with frequent reminders, relative to their individual responsibilities in maintaining access control is vital.

Never lose sight of the fact that a stable full of lawyers and regulatory compliance agency personnel is anxiously waiting for the opportunity to point out your negligent security liability and regulatory violations. Couple these risks with today’s social media deluge that explodes after every incident, and which is frequently filled with misperceptions and incomplete or inaccurate accounts. At the end of the day, every risk mitigation measure a company takes will be subjected to the harsh light of public opinion, just another element of reputational risk for the enterprise. 

 

About the Authors:

 Jerry J. Brennan is the founder and Chief Operating Officer of Security Management Resources (SMR Group), the world’s leading executive search firm exclusively focused in corporate security. Prior to founding SMR in 1997, Brennan enjoyed a 26-year career in domestic and international enterprise risk and security roles. Lynn Mattice is Managing Director of Mattice and Associates, a management consultancy focused at the development and alignment of Enterprise Risk Management and Business Intelligence Programs, as well as Intellectual Property Protection and Cybersecurity. He has more than 35 years of experience heading these programs at the executive level of three major multinational corporations and one mid-cap company in diverse industries. 

KEYWORDS: Chief Security Officer (CSO) enterprise security management security methodology security program

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mattice 2016 200px

Lynn Mattice is Managing Director of Mattice & Associates, a top-tier management consulting firm focused primarily at assisting enterprises with ERM, cyber, intelligence, security and information asset protection programs. He can be reached at: matticeandassociates@gmail.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Add Resiliency to Your Risk Management Strategy

    See More
  • How to Keep Up With Governance Risk

    See More
  • Understanding and Mitigating Financial Asset Risk

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing