Eliminating the Gaps between Physical and Cyber Security

The self-imposed segregation between physical and cyber security professionals creates gaps in protection. Even when the two groups interact, the cultural, educational and experiential divide makes effective communication a challenge. Attackers look for and exploit the gaps in protection this creates, often with devastating impact.  Bridging these differences is one … Read more

Risk: The First Principle of Value in Security

When security budgets are lean, the first question that security leaders should ask themselves is this:  does the actual risk at a facility merit the expense?  Certainly “standard of care” and appropriate local codes and standards must be built into facilities.  However, asking, “should I do more?” is critical when … Read more

Put Security in its Place

Does the leadership of your company give much thought to its security posture? They should.  Security operations overarch and underpin successful enterprises. How well it is integrated into the company will determine its effectiveness and efficiency. If your company is stove piped and the CEO/COO is the only integrator, you have a … Read more

ESC Winter Meeting Recap

The theme at last week’s Energy Security Council‘s (ESC) Winter 2016 Conference was dealing with crises.  From the recent resurgence of terrorism in the west, how to plan for and survive active shooter events, lessons-learned from a “Black Swan” event, to how to intelligently anticipate future risk events in the sea of … Read more

Compliance vs. Risk

How are they related, what are the differences, and how can they be used together to manage cost and effectiveness? We often see compliance management substituted for risk management in both safety and security, which is out of sync with the business at large. When executive business decisions are based … Read more

Personal Security for Travelers

These days being a tourist or business traveler can be hazardous to your health. Terrorist attacks by Radical Islamist terror groups are on the rise in places where westerners congregate, socialize and stay. On 20 November 2015 the upscale Radisson Blu hotel in Bamako, Mali was attacked by heavily-armed gunmen who … Read more

Case Study: Enterprise Risk Assessment

Click here to download the PDF version of this case study Challenge Butchko, Inc. was engaged by a privately-held, multi-billion dollar retail company to provide a first-ever enterprise physical security risk assessment of its corporate, warehouse, cross-dock, and retail locations. Solution Butchko designed a program to efficiently and effectively evaluate … Read more

Case Study: Security Solution Design Efficiency

Click here to download the PDF version of this case study Background Butchko, Inc. was engaged by a Fortune 500 utility provider to design a security system for two existing 345KV electrical substations. These substations were characterized as R-1 asset facilities, in accordance with NERC CIP-014-1 Physical Security requirements and … Read more

Case Study: Intelligence Analysis Enhances Business Efficiency

Click here to download the PDF version of this case study Challenge An International engineering and industrial services firm received security alerts from a subscription intelligence provider (Safety and Security) indicating imminent threat to the company’s operations and personnel in a North African country. Based on the single-sourced threat information, … Read more

Case Study: Technology Roadmap and Master Plan

Click here to download the PDF version of this case study Challenge Butchko, Inc. was engaged by a premier, multi-national oilfield services company to design global technology standards for its worldwide operations. The standards represented a risk-based security strategy and were to become the organization’s technology roadmap. Solution Using a … Read more