Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Special Report – Critical Infrastructure

A resilience framework for the future

Mitigate the consequences of risks and disruptions that materialize by making disaster resilience a priority in security programs.

By Daniel Kaniewski
SEC1021-SR-Building-Feat-slide1_900px.jpg
SEC1021-SR-Building-slide2_900px.jpg

Image courtesy of the National Institute of Building Sciences

SEC1021-SR-Building-Feat-slide1_900px.jpg
SEC1021-SR-Building-slide2_900px.jpg
October 4, 2021

Terrorist attacks, security incidents and natural disasters can all cause significant impacts to individuals, businesses and governments. Preparing for potential crises and having the capacity to withstand and rapidly recover from them is essential to saving lives and minimizing disruptions. This ability to gird for disruptions and bounce back quickly is at the core of resilience.

At the Federal Emergency Management Agency (FEMA), we saw how a focus on resilience could reduce the impacts of disasters. During my tenure at the agency, we prioritized resilience and specifically focused on what I call the “three pillars” of resilience: preparedness, hazard mitigation and insurance.

By making resilience a priority for organizations in any sector, security leaders can reduce disruptions and lessen the consequences from risks that may materialize. This even applies to emerging risks that have recently become very real to many organizations.

Let’s walk through preparedness, hazard mitigation and insurance in turn, and then consider resilience in the context of emerging risks.


Pillar 1: Preparedness

Preparing for potential scenarios that may occur is a cornerstone of both emergency management and business continuity planning. It’s an umbrella term that can include many aspects of readying a government, a community or an organization before disaster strikes.

The first step in a preparedness program is a comprehensive risk assessment. If the risks are not understood by those responsible for addressing them, the value of any of the following actions will be lessened. Investing the effort required to assess and understand an organization’s risks will be time well spent.

Risk-based planning is a second step. Once the risks are understood, plans should be developed to address them. Some will be specific to a particular risk (e.g., tornado, supply chain disruption, or network failure). Others might be more general, such as an evacuation plan for any risk when sheltering in place is not the best option.  

Once plans are developed, personnel will need to be trained to execute those plans. This is another essential element of preparedness. Training must be tailored to an individual’s role and a particular risk. For example, a team member in the purchasing department must understand which suppliers are responsible for providing which goods and services following a disaster.

Personnel may also need specialized equipment for these scenarios. For example, security personnel trained to enter contaminated environments will require personal protective equipment.

And finally, personnel should put the plans into action and test them regularly through exercises. These exercises can be of a tabletop or full-scale variety. A tabletop exercise is easier to execute, but only a full-scale exercise (involving actual response actions by personnel) will simulate the conditions that may be encountered in the most realistic way possible.

One must also consider how essential personnel and systems can continue to operate even under stress. This is known as continuity of operations (or continuity of business). The preceding elements of preparedness must be leveraged to ensure that organizations can operate at a reduced capacity and even in alternate locations. During the pandemic, this has meant that a workforce was not simply relocated to a single alternate facility but instead to dozens, hundreds or thousands of employee homes.


Pillar 2: Hazard Mitigation

Hazard mitigation measures aim to reduce the physical impacts of future disasters. Such measures could include:

  • Hardening the electrical grid.
  • Moving critical facilities outside a flood zone.
  • Strengthening the roof of a building.

There are tangible benefits from these investments. The National Institute of Building Sciences has shown that on average, for every one dollar invested by the federal government in hazard mitigation projects, six dollars are saved when a disaster occurs.

Preparedness is key for any potential risk. If commercial facilities and residential structures are hardened or relocated outside hazard areas, not only will this save money, but it will also save lives. Those occupants will be better protected during a hurricane, flash flood or terrorist attack, and the systems that power homes and businesses, provide water and facilitate commerce will continue to operate even during a disruption.

FEMA recently launched an innovative grant program that aims to fund these worthwhile hazard mitigation projects. The Building Resilient Infrastructure and Communities (BRIC) program provides funding to strengthen infrastructure and communities. FEMA recently announced the $500 million in awards for the first year of the program and plans to fund $1 billion next year. This funding presents an opportunity to reduce future disaster impacts now.


Pillar 3: Insurance

The third pillar of resilience is insurance. Insurance protects individuals, businesses and governments from the financial impacts of disasters. This includes homeowners and renters insurance, insurance for small and large businesses, and insurance products tailored to local, state and national governments’ unique needs.

In addition to these traditional property and casualty insurance lines, two other types of insurance merit further discussion.

Floods are the most common and most costly type of disaster, yet most Americans lack flood insurance. Many believe that they are immune from flooding if they live or work outside a designated flood zone. Not so — the reality is that any home or business can flood. And the effects can be devastating: One inch of water can cause $25,000 in damage.

Pandemics are another risk that have catastrophic financial consequences. As we have seen over the course of the COVID-19 pandemic, businesses have been severely impacted by the economic toll of the virus. Pandemics are generally not covered in a business insurance policy, and thus most businesses did not have the benefit of the financial protection they would otherwise rely upon for other types of disasters.

For the future, a public-private partnership that leverages the expertise of the insurance industry and the backing of the federal government is a possible solution to blunt the financial impacts of future pandemics.

  

Putting it all Together: Cyber Risks

Cybersecurity risks, like pandemics, have transitioned from an emerging risk contemplated as a theoretical possibility to a very real one that has been illustrated by many organizations hit by recent ransomware attacks. But the even graver risk is that of a cyberattack that causes not just financial risks to an organization but far-reaching impacts to an entire city, state or nation. Such an attack could trigger not only widespread economic impacts but physical impacts as well. For that reason, cyber resilience must be imperative to the same degree that natural disaster resilience has recently become a priority (through such programs as the FEMA BRIC grants).

Many states and large cities now have chief information security officers (CISOs) focused on protecting government assets from hackers and other nefarious actors. But just like with other hazards, CISOs need to consider the possibility that an attack will be successful, and that there could be significant physical consequences.

These could be direct physical consequences such as the remote opening of a dam that triggers massive flooding to a community, or indirect consequences such as a power outage leading to traffic deaths (traffic lights) or lack of heat during the winter (similar to the impacts of the Texas power outage earlier this year). And this nexus between cybersecurity and disaster-like physical effects requires cooperation between technologists and emergency managers who may not have previously collaborated.

Thus this new threat requires a focus on resilience, including cyber preparedness, cyber mitigation and cyber insurance.

As the “traditional” disruptions, such as disasters and security incidents, continue to pose risks to public and private organizations, the once-emerging risks of pandemics and cyberattacks are quickly becoming the new normal. Together, we must adapt to this reality and take action now to ensure a more resilient tomorrow.



Recognizing 2021’s National Critical Infrastructure Security and Resilience Month, Security magazine had the honor of working with security leaders within the public and private sectors to bring you October’s Special Report — comprised of five different features to be used as best practices and resources to assist critical infrastructure organizations in bolstering their security postures to prevent and reduce the risks of disruptions.

  • Protecting the energy grid is a team sport
KEYWORDS: business continuity critical infrastructure cyber security enterprise security public safety risk management security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Daniel kaniewski

Daniel Kaniewski, Ph.D., was FEMA’s first Deputy Administrator for Resilience and the agency’s second ranking official from 2017-2020. He is now Managing Director, Public Sector at Marsh McLennan and Chair of the Committee on Finance, Insurance and Real Estate at the National Institute of Building Sciences. Image courtesy of Kaniewski

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber Incident Recovery

    The importance of a cybersecurity framework

    See More
  • 5 minutes with Webster-Jacobsen

    5 minutes with Bryce Webster-Jacobsen - What the new CMMC Framework means for defense contractors

    See More
  • SEC1219-cybergap-Feat-slide1_900px

    Cyber Resilience: A New Way of Looking at Cybersecurity

    See More
×
Image courtesy of the National Institute of Building Sciences

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!