InBuilding - Volume 1, Issue 1 - 11
Cutting-edge capabilities let personnel
quickly identify incidents.
with their insurance providers
and demonstrating due diligence.
This includes implementing best
practices of security preventative
measures and systems, and conducting regular exercises of their
emergency response plans.
Failure to adequately plan for
active attack contingencies may
make the facility owners liable for
expensive workers' compensation
claims, costly litigation and settlement of federal, state and/or civil
lawsuits, as well as reputational
damage and reduced competitive
IB: Organizations located in
smart buildings often contain internet servers and other data-rich
infrastructures. How can these assets best be protected in the event
of active threats?
KK: Internet servers and other
data-rich IT infrastructures can
only be physically protected
against active threat-type attackers
by preventing threat actors from
being able to reach them. In a
smart building, locked doors that
are activated during an active
threat will prevent physical access
to locations with data-rich and
data-sensitive infrastructures. Limiting access to authorized employees with badge access to secure the
environment provides further protection. In addition, continuously
running motion detectors and
surveillance cameras can monitor
the presence of potential attackers.
The ability to rapidly lock down
a data center is also essential,
should an active threat actor attempt to penetrate an area leading
to a data center. Security patrols
are also essential in ensuring their
continued safety. Finally, in case
of a tactical assault or bombing
by armed assailants, a solution
is to use redundancy through
geographically distributed components of a data center across
multiple data centers.
IB: In what ways is a building
whose infrastructure incorporates
smart technologies easier to defend
in case of an active threat than an
older, low-tech building?
KK: A building with smart security technologies has numerous advantages over a low-tech building.
In general, internet-of-things security solutions provide the capability
to automate and simplify security
operations throughout a multilevel
building, remote site monitoring
and connected storage capabilities.
Cutting-edge capabilities, combined with an eﬀective personnel
security system, enable security
personnel to quickly identify alerts
and incidents, and decrease the
reaction time for potential attacks.
Finally, it serves as a powerful
deterrent to would-be active threat
actors that their targeted building
is hardened against them.
IB: What resources should
building owners, developers and
property managers consult to learn
more about how to develop a viable plan to defend a smart building
against an active threat?
KK: Professional security
associations, such as ASIS International, provide excellent resources
on developing viable protective
plans and systems against an
active threat. ASIS International's
website oﬀers valuable reference
materials, including the (2017)
publication "Security and Resilience in Organizations and Their
Supply Chains - Requirements
KGH has developed a "Preparedness Without Paranoia"
toolkit to assist building owners,
property developers and managers in their operational planning.
The added beneﬁt is the opportunity to enhance the situational
awareness and the conﬁdence of
their employees - the ultimate
smart technology. It can be found
Volume 1, Issue 1 inbuilding-magazine.com 11