Download presentation
Presentation is loading. Please wait.
Published byMadison Rose Modified over 8 years ago
1
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and Programs Directorate
2
connectplantrainreport Homeland Security Starts with Hometown Security Security starts here.
3
Soft targets/public gathering places are attractive targets for our adversaries Americans congregate daily to work, play, shop, learn, celebrate, worship, and watch sports and entertainment at a variety of locations: Concert halls and theatres Restaurants and shopping malls Parades and fairs Houses of worship Sports venues Our adversaries may perceive locations like these as attractive targets Protective measures for public gatherings 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
4
Connect To establish relationships Visit dhs.gov/hometownsecurity to learn more about Federal resources like the DHS Protective Security Advisor program. Get to know local law enforcement and EMS. 1 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious Reach Out & Develop Relationships Local law enforcement and emergency management officials Neighbors and community organizations DHS Protective Security Advisor FBI and Infragard: https://www.infragard.org/https://www.infragard.org/ Customers and patrons
5
Plan Keep employees & customers safe 2 Stay aware of potential threats and hazards to your business, including your computer systems. Visit ready.gov/business to develop plans to ensure safety, security, and business continuity. 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
6
Train www.dhs.gov/ActiveShooter Online Training “Active Shooter, What You Can Do” (IS-907) Available through the Federal Emergency Management Agency Emergency Management Institute: http://training.fema.gov/EMIWeb/IS/I S907.asphttp://training.fema.gov/EMIWeb/IS/I S907.asp 45 minutes Staff to deal with potential threats 3 Teach employees to identify and report suspicious activity. 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
7
Report If you see something suspicious 4 Post details of what to watch for and how to report it. Join the “If You See Something, Say Something™” campaign at dhs.gov/see-something-say-something 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
8
PI/CV/PM 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious Glenn Moore Protective Security Advisor Oklahoma District 405-596-4348 glenn.moore@hq.dhs.gov
9
Historical Perspective 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
10
Historical Perspective 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
11
Historical Perspective 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
12
Historical Perspective 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
13
Historical Perspective 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
14
Historical Perspective 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
15
Security Plan Challenges 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious Opening and w elcoming – want people to visit Want to help people Several activities at various t imes of the day Multiple threat environment
16
3 Dimensions of Security 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
17
Security Pyramid 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
18
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious INFORMATION SHARING Know the agencies with which you can exchange information – LOCAL LAW ENFORCEMENT, LOCAL FIRE, LOCAL EMS, LOCAL EMERGENCY MANAGEMENT, STATE EMERGENCY MANAGEMENT, OSBI, FUSION CENTER, OKOHS, US ATTORNEY, FBI, INFRAGUARD, US DHS Seek out and participate in any pertinent security working groups. Consider development of a working group with common concerns, challenges, and vulnerabilities.
19
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SECURITY MANAGEMENT CONSIDERATIONS Who is responsible or in charge of our security program? Are our key personnel aware of our security plan, procedures, and are they trained on it? What security measures have we recently added and what would we like to do? What keeps us up at night?
20
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SECURITY MANAGEMENT CONSIDERATIONS Does our security planning continually assess threats to and vulnerability of facility operations/activities and adjust – special events, etc. Do we continually evaluate our access control procedures. Who might be in the building? How did they get in?
21
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SECURITY MANAGEMENT CONSIDERATIONS Do we have a good comm plan using radios positioned around the facility in vital areas for response? Are our floor plans accurate, up to date with room numbers and notes to assist first responders?? Have we shared these with first responders and have they visited our facility?
22
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SECURITY MANAGEMENT CONSIDERATIONS Who is responsible for assessing our “building envelope?” (walls, windows, doors, HVAC,etc. - dependencies) How do we communicate security information to employees, members, and visitors? Have security efforts been coordinated with local responders? Do we exercise our plan?
23
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SUGGESTED CONTENT Does security plan have procedures for Maintaining an up-to-date point of contact roster – especially key personnel and first responders Identification of critical assets or areas
24
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SUGGESTED CONTENT Does security plan have procedures for (cont) Perimeter security considerations Additional monitoring and surveillance (Facility patrols, parking lot observation) Parking – delivery – standoff High speed avenues of approach Locks and technologies in place
25
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SUGGESTED CONTENT Does security plan have procedures for (cont) Assessment of surveillance camera system Intrusion detection and alarm system Assessment of Illumination Key control program
26
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SUGGESTED CONTENT Does security plan have procedures for (cont) Access control procedures – employees, members, visitors – critical role of ushers and greeters Procedures and training for suspicious mail, packages, IED awareness, suspicious activity to include surveillance detection Background checks
27
Worship Campus 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious
28
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious SECURITY FORCE CONSIDERATIONS Assess what you need Trained Qualified Trained and experienced ushers and greeters provide a vital role in security – “aggressive friendliness.”
29
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious EMERGENCY ACTIONS AND INCIDENT RESPONSE ATTACHMENTS Terrorist events Active shooter Internal disturbances Hostage situations Ability to shelter in place Bomb threat
30
Security Plan 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious EMERGENCY ACTIONS AND INCIDENT RESPONSE ATTACHMENTS Fire Medical emergencies – what can you handle? Incidents at nearby facilities – what impact? Evacuation routes Extended utility Loss Emergency response kits CRISIS PLAN considerations Continuity of operations considerations
31
My Contact Information 1 Connect To establish relationships 2 Keep employees & customers safe Plan 3 Train Staff to deal with potential threats 4 Report If you see something suspicious Glenn Moore Protective Security Advisor Oklahoma District 405-596-4348 glenn.moore@hq.dhs.gov
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.