Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Training a security program

By Bill Edwards
program-develop-freepik1170.jpg
May 6, 2022

Security program development (SPD) and design is a process that doesn’t happen overnight. Security professionals face a complex environment that requires a dedicated and sustained approach in a constantly evolving landscape. Physical vulnerabilities coupled with those in the “digital domain” have created greater complexity as to how security programs are designed and developed into an operational working model.

In simple terms, a security program has five phases that form the foundation:

  1. Assessments
  2. Technology design
  3. Policies and procedures
  4. Standard operating procedures (SOPs)
  5. Operations

In a typical security program, the director will methodically establish a process and system to provide the organization with a means to train the program, beginning first with exercising policies, procedures and standard operating procedures.

These documents should nest with the purpose of the business and the reason for its existence. Every security director should think about the end state of the security program when they set out to develop or refine it. This is called vision.

How to develop a successful security program

A security program’s vision should trigger an increase in the maturity of the program and allow for all stakeholders to understand exactly how it should function on a day-to-day basis and during special events, which require a different level of exercising the systems in place.  

Security programs are linear in planning and cyclical in execution. The goal is to plan, coordinate resources, implement risk mitigation measures, implement technology to support, train staff, rehearse, and, finally, establish a tabletop exercise program. The exercise program is the “icing on the cake” and should have a dedicated rhythm throughout the year that test current policies, procedures and SOPs to assess their value.  

As a reminder, all these documents are living documents that may require adjustments as the threat environment evolves and the business model changes. There should be a dedicated proprietary staff teammate that owns the updating process so that continuity can become a norm. Keep this in mind as an additional duty.  

Keeping documentation relevant and up to date should be a task that has leadership emphasis for many reasons, not the least of which is meeting the business’s duty of care responsibility to its staff and patrons.  

Additionally, exercise or operational testing programs built to support the overall security program must have a dedicated budget and time on the calendar to be freely conducted with complete stakeholder involvement. This includes external stakeholders that will require coordination with external agencies. The importance of solidifying the budget is simply a good business practice and allows for leadership to see the importance.  

Lessons learned while planning tabletop exercises

During my Army career, I had the distinct honor to lead all exercise planning, coordination and execution for specific tactical ground units in the United States European theater as they prepared to deploy into various conflict zones around the globe. This was a monumental task that required coordinating across all Department of Defense (DoD) services, contract support elements, coalition partners and the deploying unit.  

One of the techniques I used was to establish a series of planning events that led up to the initial tabletop exercise. This exercise set the conditions for a full operational exercise that put all the systems into play against realistic scenarios.

So how can security leaders set conditions for tabletop exercises that support the exercise program and become the bridge to full operational testing of the security program?

First, establish a linear milestone checklist that shows progression to the first tabletop exercise. This is the preliminary step. Some items to include in milestone development are:

  1. Determine objectives for the exercise. What does the team want to achieve?
  2. Create a list of realistic and proportional security problems that are unique to the business.
  3. Determine internal and external stakeholders who should participate in the exercise.
  4. Establish a model of “hip pocket” training for on-duty staff to accomplish as part of the day-to-day operations. This is a great way to bridge individual security tasks associated with a tabletop exercise.
  5. Secure time and funding to execute the exercise.
  6. Review existing documentation to include policies, plans, procedures, emergency operations and crisis response.
  7. Begin to establish a framework to plan all exercise components, including consideration of a third-party moderator.
  8. Create an open environment for learning and growth. Underwrite mistakes so that both internal and external stakeholders feel comfortable sharing concerns about areas that may need special emphasis.

Once these initial milestones are envisioned and achieved, they should be assigned to a proprietary security team member that has the additional duty of “Exercise Planner.” This allows the security director to maintain focus on the bigger vision of the security program and oversee the daily operations while keeping leadership informed on progress and requirements for additional support to keep the program viable.

The next step is to design the tabletop exercise to train or test the program. This is done by focusing on a realistic security problem that forms the requirement to exercise the business plans against the scenario.

A good example is the fast evolution of commercial drone technology or the concern of insider threat activity that deals specifically with the protection of intellectual property.  A simple framework to get started might look like this:

  1. Start the exercise plan based on the milestone glide path.
  2. Determine logistics and administrative needs, such as location, equipment, preparatory material and scenario development.
  3. Set the exact day and time — a good rule of thumb is to limit tabletop exercises to a maximum of three hours.
  4. Invite and confirm stakeholder involvement.
  5. Build the scenario by establishing an initial problem. Create follow-on injects to support further training.
  6. Come together and set the ground rules for the event.
  7. Execute the exercise.
  8. Determine a dedicated note-taker for the event.
  9. Conduct an after-action review (AAR).
  10. Produce a report that outlines definitive outcomes and the way ahead.
  11. Update policies, procedures and emergency/crisis response plans.
  12. Plan for the next exercise.   

Tabletop exercises are a good way to test, evaluate and reevaluate all aspects of a security program. Keep in mind that security program development takes energy and sustained focus.  

Threats, vulnerabilities and critical assets are constantly in flux and therefore require a dedicated “exercise program” embedded in the plan to help the security team and overall enterprise deal with long-term viability and business continuity.

Planned tabletop exercises give security leaders the ability to see the program through a different lens and provide adequate time to make changes where needed. Remember, security is linear in planning and cyclical in execution, and execution requires exercise. Let’s keep the conversation going.    

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: emergency response risk management security operations tabletop exercises

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bill edwards calibre bio

Bill Edwards is President of Federal and Public Safety at Building Intelligence, Inc. Edwards retired from the military in 2017 and led Thornton Tomasetti’s security consulting group as a Principal from 2017 – 2021 and Calibre Engineering from 2021 – 2022. 

He offers over 34 years of expertise in operational/technical security, counterterrorism, counter-intelligence, surveillance and counter-surveillance. He served as the Director of Intelligence for Theater Special Operations Command-North, a position that required extensive collaboration and partnering across the U.S. whole of government security enterprise. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • school-safety-freepik1170x658v6.jpg

    11 steps to build the foundation of a school security and safety program

    See More
  • Photo courtesy of Shutterstock

    Legacy CCTV vs IP cameras: The differences for security program design and development

    See More
  • concerts-freepik1170x658v5.jpg

    To protect and serve: A case for drones and public gatherings

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!