Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

Protecting physical security site surveys during COVID-19

By Brogan Ingstad
security conducts site survey
February 4, 2022

In the era of entire workforces going remote and a wide variety of tasks being moved online, it seems fair to ask: what else can be transitioned to virtual due to COVID-19? Some activities — think finance, general counsel and human resources — are inherently better adapted than others. But in the corporate security space, where site surveys involve boots on the ground, arguments for online adaptation that work elsewhere tend to fall short. Worse, they expose an organization to unnecessary risk and constitute ineffective security risk management. 

It is easy enough to see why physical security surveys are on the chopping block. Sending in-house or contracted personnel around the world, often to higher threat locations amidst evolving travel restrictions, is itself a logistical challenge. It is also an expense. A Bloomberg survey of 45 large global companies from late 2021 found that 84% are planning on spending less on travel post-pandemic. Even U.S. Customs and Border Protection started implementing virtual validations for its Customs-Trade Partnership Against Terrorism (CTPAT) Program during the pandemic, and the agency has indicated these may continue into the future.

Drawing from experience with large Fortune 500 companies conducting dozens of in-person and virtual assessments, there are several reasons why this shift presents dangerous security risks to an organization.

Visibility gaps

First, virtualization means relying on photographs, cellphone video and camera feeds to understand security operations from afar. In office complexes, manufacturing environments or key supply chain nodes, this often means inherent gaps in visibility for security practitioners. Assessments look at people, processes and technology measures across multiple high-rise floors, acres of factory space or miles of fence line. Not being able to observe these in-person means a survey is categorically incomplete.

Oversights on the ground

Second, virtualizing security surveys means relying on personnel based on the ground. Local security resources often have spent years working at a single site, bringing both benefits and drawbacks. While they may fully understand the security operations picture and know what is supposed to happen, they are often too close to the issues, missing things that a fresh pair of eyes can illuminate. They also tend to rely on personal, relationship-based knowledge over repeatable processes committed to writing.

Reliance on unconfirmed intelligence

Lastly, leveraging local resources in full means relying on these individuals to provide the primary inputs to external audits of their own processes. It’s widely acknowledged in enterprise risk management that no one enjoys being audited, as it can lead to time consuming mitigation measures down the line. But former President Ronald Reagan’s mantra, “Trust, but verify,” reigns supreme here. Otherwise, an organization runs the risk that survey findings are skewed and sometimes outright misleading. You can only accept, mitigate or transfer the risks that you know.

Physical security surveys serve as eyes and ears, proactively ensuring that an organization’s people and assets are sufficiently protected before things go wrong. For this reason, companies should also consider re-categorizing security surveys as essential travel so they fall in line with the lexicon used by many government authorities like the Centers for Disease Control (CDC) and the Department of State.

Of course, there are exceptions to these rules. Travel restrictions and quarantine periods continue to evolve by the day, making some locations inaccessible or unadvisable. The CDC’s list of travel recommendations by destination and the Blavatnik School of Government at the University of Oxford’s Stringency Index are two ways to track the evolving responses of governments around the world. But these cases should be managed as they arise with exceptions granted sparingly, as there are ways to mitigate many of these risks. Given the current state of the pandemic, sending only vaccinated personnel, following CDC guidelines and implementing basic precautions like masking while onsite should fall within the risk tolerance of most organizations in 2022.

Now two years in, many security programs in the field have drifted, absent consistent oversight from security teams and ongoing assessment against security standards. Amidst these outlined challenges and cost-cutting measures, organizations should protect recurring onsite physical security surveys to ensure critical vulnerabilities are identified and countermeasures prioritized based on overall risk to the organization.
KEYWORDS: corporate security COVID-19 enterprise physical security site security surveillance survey Travel Risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brogan Ingstad is a Senior Associate at The Chertoff Group, where he advises clients around effective security risk management and protective intelligence program development.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Data Stream

    The Five Rings: Understanding the importance of physical security of colocation data centers as a fundamental service during COVID-19

    See More
  • healthcare data security

    Protecting healthcare data during the COVID-19 pandemic

    See More
  • cybersecurity

    How to Minimize the Risk of Insider Threats (Physical and Cyber) During COVID-19

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing