Examples of Mediocrity in Asset Protection
5 min readOct 3, 2018
- “No, we haven’t defined and prioritized our assets.”
- Paper visitor log
- Unarmed security officers making less than US$30 net (or local equivalent) per hour
- DVR
- Wiegand and magstripe
- Security software UIs
- Lack of end-to-end encryption in security systems
- Military / police titles on corporate security teams
- Security function reporting anywhere but the risk function
- Annual training
- Unhelpful terminology and its attribution: “physical” vs. “cyber”
- Security control rooms
- Oversaturation of tech
- “Lowest bidder”
- Lack of operational and technological orchestration
- “We haven’t had any incidents.”
- 100-page Crisis Management Plan, in a 3-ring binder, on a shelf
- “Security” and “safety” used interchangeably
- Calling security officers “guards”
- Conducting tabletop exercises without testing performance under physical and mental stress. “Would you like pastries with your coffee this morning?”
- Equating information with data
- Having less than 100% visibility of your network environment
- Electronic security product software with default passwords
- Going to industry events just to get away from the office
- Selecting incident management leaders solely based on seniority
- Using the word “should” in policies, procedures, and standards
- Ignoring the fundamental importance of delay or “time-to-target” when planning and designing controls
- Taking full credit for work of competent consultants out of fear for negative perception of your own knowledge
- Blind trust in asset protection controls of third-party service providers
- Considering past law enforcement or military service as a substitute for years of asset protection experience without validation of required skills
- “We don’t need a service and maintenance contract; we’ll call you if stuff breaks.”
- Manufacturer-suggested minimum training
- Over-reliance on contractual obligations
- Engineering firms taking on security scope without having competent professionals to execute
- “Buyers” willing to pay minimum rates for outsourced security staff
- Delivering event security, close protection, and physical penetration testing services without at least two weeks of advance planning
- Asking for security advice in late stages of facility design
- Offering and accepting “free security assessments”
- Sharing individual provider’s proposal with competitors to get a better price
- Changing the name of an industry event but not its dated content or format
- Publishing standards but not promoting and defending their usefulness and wide application
- The way in which security technologies are offered to the market: volume incentives, FUD, minimal investment into fit-for-purpose analysis and prospective client education, lack of user-centric design
- Manufacturers capitalizing on post-incident hysteria
- “Old boys’ club”
- Making vendors and consultants pay for opportunities to speak at industry events
- “We take security very seriously.”
- “Independent” security consultants pushing products
- Industry research methodologies and reporting
- Using the number of years in the industry as justification for expertise and quality of work
- Poorly thought out, written, and formatted client reports
- Industry marketing (hooded criminals, smiling “bodybuilder guards”, locks, cameras, stick-figures with risk puzzles, handshakes, globes, …)
- Insufficient efforts for attracting women to the industry
- Women’s tokenization (“We need at least one female panelist.”)
- Low quality engagement with and commoditization of young talent — making them feel easily replaceable
- Lack of integrity in bid management and provider selection — “grapevines”
- New “techy” buzzwords and acronyms (blockchain, AI, cloud, AR, ML, etc…) attached to new security products without clear demonstration of justifiable value and user-centric design
- Lack of meaningful partnership with thought leaders in design, psychology, and human capital
- Recruiters who don’t offer meaningful, detailed feedback to every candidate
- Lack of focus on prevention
- Not practicing what we preach
- “What do you mean you have to see my ID? Don’t you know who I am?”
- Asset protection function with headcount of 1
- Borrowing publicly available information, slapping a company’s logo on it, and regurgitating it as bespoke analysis
- Self-congratulatory events and conferences
- Job descriptions and futile efforts of matching talent to them
- Recruiters who treat talent as a commodity and deal with candidates from position of superiority
- Industry groups which treat consultants and vendors as inferior and specifically disallow their membership
- Technology installation and workmanship
- Fragmentation and complexity of products
- Delivering and accepting “band-aid” services and tech without solving underlying causes
- Including and charging for useless features in security tech
- Equipment racks inside security control rooms
- Unscrupulous installation of “mag-locks” and “strikes” simply because door hardware coordination in advance is more difficult
- Installation of incident / threat alert technologies without clear understanding of their fit-for-purpose, user competence, and response orchestration
- Over-reliance on questionnaires in assessments.
- Allowing professionals in other disciplines (auditors, lawyers, architects, etc.) feel and act like “security experts”
- Inconsistent inclusion of asset protection screening in third-party due diligence
- Huge gap in program maturity between a handful and the rest of organizations
- Meritless awards
- Confusing security with safety and vice versa
- Poor knowledge and use of choice architecture (https://lnkd.in/dA4zGJr)
- Baseless dispensation and acceptance of CEUs (“Our next meeting will feature buzzwords and dated content!”)
- Allowing data security folk usurp our domain
- Parade of false expertise after every school shooting — most resulting in procurement of useless training and blinky lights
- The term “active shooter”
- “Band-aid” consulting
- “Norman Doors” (https://lnkd.in/dKTg2fV)
- Bias of focused curiosity (explained here; start at 1:40, https://lnkd.in/dwtbfHv)
- Unfounded trust in data security pros’ abilities to protect information in three domains: mental, physical, and digital
- Trusting people, services, solutions, and tech without sufficient scrutiny
- “We’ve always done it this way and our neighbors are doing the same thing”
- No clear direction / pathway for young and aspiring professionals to enter and grow in our field
- Fragmented and unvalidated education for young and aspiring professionals
- Lots and lots of preventable incidents, including school shootings, workplace violence, data breaches, etc.
- Assessing controls and offering advice without understanding basic tenets of behavioral and organizational psychology
- Migrating security technology infrastructure to the cloud without granular evaluation of relevant protection measures, people responsible for administration, system configuration, and underlying management controls
- Assuming that threat analysis today is largely associated with data security niche
- Talking about importance of “human factor”, but doing very little to mitigate its negative consequences
- Architects and engineers who continue to be oblivious to, or simply unaware of, asset protection fundamentals
- Inconsistent processes of software and firmware patching
- “Getting back to basics…” overshadowed by “We have the most advanced…”
- Ever increasing signal noise
- Confusing information with intelligence
- Archaic talent search, selection, hiring, and development practices
- Speaking in front of peers and daring to be predictable, boring, underprepared, and uninformed. This last one is a nudge in advance of any upcoming industry event.
BONUS — EXAMPLES OF MEDIOCRITY IN SCHOOL SECURITY
- School psychologists
- Site and building design
- Arrival and dismissal processes
- Tick-box security and safety training
- Vulture consultants and vendors
- Repeated and escalating attempts to solve human problems with “Blinky Lights” (adopted from Chris Roberts)
- Finger-pointing and “rugs” that can’t conceal any more dirt
- School districts that hire former cops as their security “experts”
- School district security “experts” who hire their buddies for consulting and integration gigs
- Implementing a plethora of edge tech (video, sensors, etc.) and forgetting to design consistently proactive, predictive, and professional monitoring and early warning environments
- School PTAs focused on “fun and games” instead of better parenting, encouragement, social adaptation strategies, recognition of and action on social-emotional issues of individual students and groups of students
- Education, preparation, and enablement of teachers and principals in social-emotional awareness and strategies
- Addictive tech that makes our kids more withdrawn and susceptible to depression (schools only exacerbate this problem)
- Our short attention span fuelled by media noise
- Lack of unified and thoughtful gov-t action