Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Education & Training

COVID-19 brought all hands on deck: Why we need to keep it that way

By Bruce McIndoe
SEC0721-Edu-Feat-slide1_900px

mixetto / E+ via Getty Images

July 14, 2021

Duty of Care spells out responsibilities an organization has for its people. This includes making the workplace safe, preventing risks to health, and ensuring safe working practices are set up and followed. There is a lot to deal with between these areas and the onus is on a variety of managers to ensure nothing falls between those cracks.

But who — or how — can a diverse team accomplish this effectively and efficiently?

Prior to COVID-19, most organizations tasked a patchwork of groups with largely stove-piped activities to meet Duty of Care responsibilities. They have functional names such as risk; security (physical and cyber); human resources; environmental, health and safety (EHS); emergency management; business continuity; and facilities and travel, to name the most common. But the pandemic has put a sharp focus on the entire organization taking care of all of its people every hour of every day. To manage the impact the crisis is having on an organization’s people and operations, most organizations have created a cross-functional COVID-19 Task Team. Over the last year, this team has met regularly to share information, formulate actions, make decisions, synchronize efforts, and evaluate results. This integrated approach has captured efficiencies for organizations while ensuring proactive protection of its people and assets, operations, and reputation.

The natural extension is to put this cross-functional team’s success towards institutionalizing a broader strategy that delivers operational resiliency going forward. Just as many organizations have adopted an Enterprise Risk Management (ERM) and/or People Risk Management (PRM) is already familiar, Operational Resiliency is a logical, holistic continuation of the COVID-19 Task Team’s newly mastered collaboration and processes. In addition to being more prepared for the next global health crisis, the essential principles can be applied to other types of disruptions from natural disasters to protests.

ERM is defined as “a plan-based business strategy that aims to identify, assess and prepare for any dangers, hazards and other potentials for disaster—both physical and figurative—that may interfere with an organization's operations and objectives.” Now substitute “organization” with “people” and you get a good idea of what PRM encompasses.

While people risk is often used to refer to human risks such as negligence, fraud, and theft, consider people risk as applying risk management principles to protecting people as a key asset. As such, PRM is the process of taking the necessary steps to identify, assess, and mitigate risks to and by personnel and responding effectively when an incident occurs.

A large body of work has been developed over the past two decades around Travel Risk Management (TRM) to protect people when they are on business travel—first with the Travel Risk Management Maturity Model (TRM3) and now with the anticipated release of the ISO 31030 Travel Risk Management – Guidance for Organizations publication.

 

Using a similar framework, essential elements of a PRM program would consist of 10 key process areas (KPAs):

1. Policy and Procedures: The infrastructure supporting policy and procedure development, implementation, and continuous improvement. Individual procedures such as SOPs are addressed in each KPA.

2. Training: Ensuring personnel have the necessary skills to comply and conform to program policy and procedure. Individual training items are assessed in their relevant KPAs.

3. Risk Assessment: A consistent, documented methodology for evaluating risk provided as input for the overall risk-based decision process.

4. Risk Disclosure: Information derived from the risk assessment analysis to ensure all those potentially affected understand the risk.

5. Risk Mitigation: Strategies and solutions that will result in a level of risk that is acceptable to all stakeholders.

6. Risk Monitoring: Continuous monitoring of potential threats or incidents affecting personnel and providing them with an easy-to-use process for reporting problems and accessing assistance.

7. Response & Recovery: Respond proactively to avoid or mitigate loss and return to business as usual (BAU) within the desired timeframe. This will typically involve location awareness of personnel, proactive threat monitoring, wellness checks, engaging protective measures and life safety procedures.

8. Notification: Ensures the appropriate people are informed of any relevant personnel risk information and addresses internal/external communications such as stakeholder notifications, escalations, and information requests.

9. Data Management: Establishes and maintains the data required to monitor and manage a robust PRM program adhering to privacy and security requirements. This data will include personnel profiles, contact information, location awareness, and other related information on facilities, operating locations, travel, resources, and processes. Program data to support oversight, incident reporting, and threat information is also included both internally and with third-party applications.

10. Program Communication: Strategic communication throughout the organization ensures understanding of both the organizational and individual responsibilities.

SEC0721-Edu-slide2_900px

All 10 process areas must be engaged to have a comprehensive and effective PRM program. The overarching KPAs of policy and procedures and training are essential to the establishment of the program and the on-going realization of its value. The five management KPAs constitute the core risk management process, which is operating continuously both to proactively mitigate threats and rapidly respond to incidents when they occur. Infrastructure KPAs reflect the three most important capabilities needed to support the success of the program. This includes the ability to rapidly notify and communicate with potentially impacted personnel, access to and management of the internal and external data needed to support the program, and ongoing communications of individual and organizational responsibilities as well as how to report issues and get help


Let’s put this PRM framework into action. The objective of a PRM program is to effectively protect the organization’s people through cross-functional oversight, coordination, training, exercising, and continuous improvement. This effort is envisioned as a governance role, with each of the functional disciplines participating rather than passively reporting.

For example, consider the installation of new equipment at a manufacturing plant. The organization would conduct a cross-functional workplace risk assessment and based on this assessment implement a PRM plan. This equipment and the materials to be utilized may require actions related to safety, facilities, physical security, emergency management, business continuity, information technology, and other groups. All these functional groups would be involved not only in getting the manufacturing line up, but also ensuring the safety and security of its operation. The PRM risk monitoring KPA ensures training is completed, safety and security measures are properly maintained, safety drills are conducted, and incident reports are addressed with corrective actions by the appropriate functional groups.

Travel is another important use case. Many organizations have some variation of a Travel Risk Management (TRM) program to keep personnel safe when they are on the road. TRM fits nicely into the PRM framework because it sets specific procedures to address prior to travel, during travel, upon return, and in case an issue or incident arises during the trip. However, most organizations delegate the TRM program to the travel function with support from security. Within the PRM framework, TRM would have involvement from all the functional disciplines to address areas such as data privacy, mental wellness, insurance, and inclusion.

The large numbers of personnel working from home post-pandemic will likely continue at higher levels than before. A PRM program would continue the work done to manage the risks related to WFH and institutionalize the ongoing monitoring, assessment, mitigation, communication, and response processes.

A risk management program focusing on people would expand to address areas such as strategic personnel development, retention, liability reduction, anti-bribery, and social responsibility—all of which effect a company’s bottom line as much as its most valuable assets. Through a PRM program, organizations have a 360-degree view of risks related to all their people. Furthermore, it gives them the assurance that these risks are being continually managed by a fully integrated, cross-functional team that can assume a predictive, proactive posture that leads to efficiencies and maintains desirable productivity.

KEYWORDS: asset protection corporate security COVID-19 risk assessment risk management travel safety

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bruce mcindoe

Bruce McIndoe is a leader in the risk management, travel, and intelligence industries. A WorldAware founder, McIndoe has been the key contributor to the company’s strategic growth, securing its position as a leader in business resiliency with the development of the Worldcue® Global Control Center. Prior to joining WorldAware, McIndoe was founder and CEO of CSSI, an Inc. 500 and four-time Washington Technology FAST 50 company that developed software for the intelligence community. He has also served as a lead architect on intelligence programs for the US government. He is a trustee of Allegheny College, where he received a BS in Physics, and holds a MS in Computer Science from Johns Hopkins University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • business travel

    What Should be in a Travel Risk Policy?

    See More
  • authentication-password-freepik1170x658.jpg

    Why passwords are on the way out, and why we need them anyways

    See More
  • healthcare 3 responsive default

    Health agencies are gathering data to combat COVID-19: Here’s why that might be a problem and what to do about it

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!