Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsPhysicalSectorsCybersecurity Education & TrainingPhysical SecurityEducation:University

Education & Training

Assessments and comprehensive security planning in higher education

Security leaders in higher education should create adaptable security plans to manage potential risks.

By Jesse Cashman
college campus

Monkeybusinessimages / iStock / Getty Images Plus via Getty Images

June 9, 2023

Comprehensive security programming within an organization requires a continuous cycle of assessment, planning and improvement to address emerging risk and sustain a proactive security posture. This statement may seem obvious to most security professionals, however, the practice of annually assessing security programs within many higher education environments remains sporadic, and assessments are often only triggered after an alarming event has occurred.

To establish and operate a successful security program, security leaders should use a comprehensive approach in reviewing the previous academic year’s high-profile incidents and crime statistics; update departmental policies, procedures and training; maintain existing or deploy new physical security assets; and realign individual and organizational responsibilities to various personnel and departments.

Yes, organizational audits and assessments are tedious, time-consuming and require energy often exhausted from the previous academic or fiscal year’s activities. However, they are free (if conducted internally) and there is no better time than the end of the term or fiscal year to reflect on the challenges and related opportunities that have bubbled their way to the surface.

In order to help streamline the process, security professionals can follow three simple steps and areas of focus to better plan and inform improvements to security programming over the summer, ensuring a more proactive security posture when the fall term begins.

Step 1: Simple assessment methodology

The assessment process should include a wide range of organizational stakeholders and sources of information. Form a small security assessment task force or utilize the existing safety committee to divide and conquer the following tasks:

  • Conduct a physical survey of key areas across all campus buildings and property. Use a crime prevention through environmental design (CPTED) lens.
  • Interview or survey administrators, faculty, staff and students. Solicit feedback any and every way possible to better understand the community’s experience and perceptions of the existing security program.
  • Dust off emergency operation plans, procedure guides and training exercises from the past year. Where are the gaps? What challenges did the exercise debrief identify?
  • Dig into incident reports and conduct cases. Did the security program learn anything new? What trends did the team identify last term? Don’t wait for September to start the stat review. There is no better time than now!

Step 2: Create an organized list of findings

The findings section is the result of the tasks referenced in the methodology section. Compile all the assessment information and review it with the team.

Security programming within an academic setting is a delicate balance of preparation and response to environment-specific risks. Security planning efforts are more successful when they are focused and consistent with the organizational culture and mission.

Once the annual assessment is complete, work to determine the organization’s current level of preparedness based on the premise that effective programming requires organizations to understand and identify their risks. When identifying risks related to security programming, one approach is to organize program assessment findings under the consideration of the following critical elements:

  • Professional management and staffing of the security functions that serve the organization should be supported and trained appropriately.
  • Organizational policies, procedures and practices that address specific needs should be well-written, adhered to and routinely audited.
  • Physical security technology and equipment should be designed and deployed based on an assessment of need and be properly utilized, monitored, updated and maintained.
  • Community training and participation in security programming efforts should be interactive and conducted on a regular basis.
  • Accurate reporting and compliance requirements should be met, published if required, and reviewed methodically.
  • Emergency operations planning and procedures should be routinely tested, updated and disseminated to organizational stakeholders.

Step 3: Mitigate the findings with prioritized recommendations

Naturally, the final step is to mitigate the findings with a set of prioritized recommendations. There is no need to create a finely calibrated heat map or design a fancy algorithm. Recommendations just need to be reasonable and achievable action items aimed to mitigate the risks identified in the assessment process. The objective of the recommendations section is to begin the process of prioritizing resources needed and to identify an estimated timeframe in which the implementation of these resources should be considered. The application and integration of these elements varies at every organization based on risks identified, the risk tolerance of the administration and members of the community to various threats (real or perceived) and finally available resources and capabilities.

The recommendations section allows security professionals to have a focused conversation with their department and community stakeholders regarding the status of the organization’s security program and the action items needed to improve. Recommendations simply assist the organization in determining the security needs of the community.

 Evolve the campus security program

To summarize, safety, security, emergency management and crime prevention programming within organizations requires dynamic methods. As organizational functions and activities change and facility conditions are modified or expanded, so must an organization’s security posture. Therefore, security process management, physical security technology, equipment, policies, procedures and training should be routinely reviewed and updated to reflect changes in the environment and the expectations of community members. Establishing an annual assessment and planning process over the summer is an effective exercise in maintaining a proactive comprehensive security program.

KEYWORDS: comprehensive security plan proactive security Security Assessment security program security strategies

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jesse cashman

 Jesse Cashman is the Director of Auxiliary Services at Carleton College. Cashman has worked in higher education security for two decades, beginning as a public safety officer in 2003. Cashman is also the owner of Campus Safety Consulting, LLC.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Campus security

    Recognizing and relying on assets: Security in higher education

    See More
  • Ohio colleges get security grants

    Ohio governor announces $5 million in higher education security grants

    See More
  • SEC1220-Access-Feat-slide1_900px

    Managing access in higher education during COVID-19

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!