CBRN Security Plans


Instructor
Course Information
- Language: Arabic, English
- Tags: CBRN Security Plans
Course Overview
CBRN Security Plans – CBRN Academy has designed this 5-day course to support government agencies, public sector organisations and critical infrastructure businesses to protect their vital CBRN assets. Our course focuses on the importance of excellent governance, risk management, and decision-making to physical protective security at the operational level.
It sets out the best CBRN practices and stimulates the actions required to identify, assess, and minimise the threats to the most critical parts of your CBRN business. The course will enable you to look critically at existing and proposed security measures, ensuring your protective security measures are cost-effective, fit for purpose, and proportionate to the CBRN threats and vulnerabilities you face.
Using tailored and bespoke CBRN exercises, the course will practice the proven design activities necessary for delivering physical protective security.
The course is intended to show participants how to design security using CBRN scenarios that are intentionally outside their specific professional realms of responsibility. It is not intended to design security plans for actual organisational assets, sites, and risks. CBRN Academy can instead offer coaching to support the client’s security planning projects.
Course Objectives and outcomes.
At the end of the course, students will be able to practice:
Leadership and Governance in CBRN
- Demonstrate the value of security policies and procedures;
- Good leadership and governance;
- Deterring insider threats;
- Open and transparent culture towards security;
- Providing cost-effective resources and support in security matters.
- Providing essential management information for security planning and people management.
People and Security in CBRN
- Understand effective security and behaviour;
- Importance of good security;
- Understanding the threat;
- Employees role in the detection, deterrence and prevention of security threats;
- Development of an appropriate security culture;
- Strengthening resilience to security threats and reducing vulnerability to attack by all personnel.
Security Risk Assessment in CBRN
- Operational Requirement (OR) and risk assessment;
- Applying security measures;
- Prioritise security risks using threat;
- Using counter-terrorism security advice;
- Partnership working.
CBRN Operational Requirements
- Effective and proportionate security solutions.
- The involvement of key stakeholders in the OR process.
CBRN Protective Security Measures
- Personnel and People Security;
- Physical Security;
- Physical Defences;
- Other measures;
- Detection;
- Catalogue of Security Equipment;
- Cyber Security.
Course Outlines
Module 01: Leadership and Governance in CBRN
- Developing a Security Strategy
- Passport to Security
- Management Systems
- New and Revisited Projects
- Operational tools
- Introduction to Risk Assessment
- Introduction to Operational Requirements (OR)
- Introduction to Protective Measures
- Security Audit
- Crisis Communication
- Supply Chain
Module 02: People and Security in CBRN
- Optimising People in CBRN Security
- CBRN Security Culture
- CBRN Security Behaviours
- Embedding the Change in Culture and Behaviour
- Personnel Security
- Professionalising Security
- Pre-employment Security
- On-going Personnel Security
- Monitoring and Assessment
- Security Awareness Campaigns
Module 03: CBRN Risk Assessment
- The risk management process for identifying and assessing CBRN security threats
- Ownership of the CBRN risk management process
- Responsibility for ensuring reviews and tests
- Current CBRN security threats
- Organisational CBRN threats that are specific to your organisation’s core business activities
- Sources of CBRN intelligence that organisations can use or access when building a comprehensive picture of the threat
- CBRN information-sharing groups or information exchanges and keeping up-to-date with emerging threats
- Increase your knowledge and understanding of CBRN threats, and threat mitigation measures that others are using
- What a serious CBRN security incident or breach would look like
- What impact would it have on your organisation (e.g. financial loss, loss of reputation or customer information)
- CBRN in crowded places
Module 04: Operational Requirement for CBRN
Operational Requirements Process
- Splitting up a site (defining the geographical areas for consideration)
- Defining the CBRN risks and mapping to the areas under consideration
- Identifying and developing a suite of CBRN protective security recommendations to address the risks
- Assessment of CBRN protective security recommendations (in terms of likelihood of success)
- Mapping back to CBRN risks (have the measures mitigated by the measures? Is the residual risk acceptable?)
- Implementation of CBRN security measures (and next steps)
The below options and actions, supported by a security plan, will help to frustrate and disrupt an adversary’s attack timeline (from planning through to execution of an attack):
- Stop or displace the attack
- Verify an attack
- Prevent the attack from reaching the asset
- Minimise the consequences of an attack
- Actions to prevent an attack from being successful
- The insider threat and advises on mitigation measures
Module 05: CBRN Security Measures
CBRN Personnel & People Security
- Reducing Insider Risk
- Optimising People in Security
- Disrupting Hostile Reconnaissance
- Recognising Terrorist Threat Guidance
CBRN Physical Security
- Physical Security Events
- Threat Specific Mitigation
- Search & Screening
- Canine detection
- Counter-Unmanned Aerial Systems
CBRN Physical Defences
- Access Control and Locks
- Active Access Delay
- Building Structures
- Windows & Glazed Facades
- Doors
Other measures
- Building Services & Spaces
- Control Rooms
- Sensitive Information & Assets
- Body Armour for Civilian Security Staff
Detection
- Intruder Detection & Monitoring
- Gunshot Detection Systems
- Marauding Terrorist Attacks
Catalogue of Security Equipment
Cyber Security
- Internet & Control Systems
- Insider Threat
Network and Information Services (NIS)
Intended recipients and min max numbers
This course has been prepared for CBRN Leaders, Managers, and Supervisors who need to:
- Understand the key principles of CBRN protective security
- Develop a holistic approach to protecting their vital CBRN assets
- Identify which CBRN assets are most critical and the likely threats to those assets
- Accurately review the CBRN threats in terms of likelihood and impact
- Consider present and future threats to CBRN physical, personnel, and cyber capabilities
- Integrate the physical, personnel, and cyber elements in a CBRN security plan
- Assess and mitigate CBRN vulnerabilities in a prioritised and proportionate way
Course Certification
Your CBRN Academy instructor will issue a signed certificate of training completion to all successful participants at the end of the course. To qualify for the official Certificate, the student must attend and complete all assessments and score 80% or more.
Course Methodology
Classroom lectures, scenarios, case studies, videos, presentations, self-learning, and participant engagement.
Course numbers and quotations
Call us for a quotation.
On-Site Course Info:
Course Instructor

Matt is an innovative course developer, facilitator and coach in the security and leadership professions. He has 30 years experience as a Senior Officer, with a track record in leading a Strategic Police force and its response to Neighbourhood Policing and critical incident management. Matt has a proven ability in developing policy and procedure for a Police service going through radical modernisation. Matt says he takes people “on the journey”, developing and motivating students by creating and communicating a compelling vision of public service and the role of leadership. He focuses on maximising of students potential by understanding their needs; creating relevant and pertinent curriculums; planning and developing courses, modules, and lessons; and assessing progress. Matt has delivered bespoke managerial English as a foreign language in Tokyo, Japan.