Tactical security controls for unpredictable events: Aligning security tactics with business continuity for resilience in the face of the unknown
Unpredictable threats, ranging from civil unrest and cyber-physical disruptions to infrastructure failures, continue to challenge security and business continuity professionals. Traditional risk management approaches often fail in these fast-evolving scenarios, necessitating a shift toward tactical...
Uložené v:
| Vydané v: | Journal of business continuity & emergency planning Ročník 19; číslo 2; s. 102 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
England
01.01.2026
|
| Predmet: | |
| ISSN: | 1749-9216 |
| On-line prístup: | Zistit podrobnosti o prístupe |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Unpredictable threats, ranging from civil unrest and cyber-physical disruptions to infrastructure failures, continue to challenge security and business continuity professionals. Traditional risk management approaches often fail in these fast-evolving scenarios, necessitating a shift toward tactical security controls that are adaptable, scalable and integrated within business continuity frameworks. This paper explores the security effects model, a strategic approach that categorises security controls based on the outcomes they achieve rather than the specific threats they address. By leveraging seven key security effects - deterrence, access control, detection, assessment, delay, response, and recording and communication - organisations can design security postures that remain effective even in highly dynamic environments. Among the abovementioned seven, the paper identifies four mission-critical security effects for unpredictable threats: detection, assessment, delay and response. By aligning security controls with these mission-critical effects, organisations can enhance early warning capabilities, streamline crisis assessment, buy critical response time and ensure cohesive multiteam coordination. Using a structured 'what if?' methodology, the paper demonstrates how organisations can proactively identify vulnerabilities and prepare security measures that are functional across multiple threat vectors. A case example using the Francis Scott Key Bridge collapse illustrates how applying this approach can improve security resilience against both accidental and intentional disruptions. The paper provides practical, actionable guidance for security and business continuity professionals, emphasising the need for an integrated security-continuity framework that aligns with industry best practices, including ISO 22301 and American Society for Industrial Security (ASIS) enterprise security risk management (ESRM). By shifting away from reactive security models to proactive, effects-based tactical controls, organisations can build resilience against the unknown while ensuring operational continuity in the face of emerging threats. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/. |
|---|---|
| AbstractList | Unpredictable threats, ranging from civil unrest and cyber-physical disruptions to infrastructure failures, continue to challenge security and business continuity professionals. Traditional risk management approaches often fail in these fast-evolving scenarios, necessitating a shift toward tactical security controls that are adaptable, scalable and integrated within business continuity frameworks. This paper explores the security effects model, a strategic approach that categorises security controls based on the outcomes they achieve rather than the specific threats they address. By leveraging seven key security effects - deterrence, access control, detection, assessment, delay, response, and recording and communication - organisations can design security postures that remain effective even in highly dynamic environments. Among the abovementioned seven, the paper identifies four mission-critical security effects for unpredictable threats: detection, assessment, delay and response. By aligning security controls with these mission-critical effects, organisations can enhance early warning capabilities, streamline crisis assessment, buy critical response time and ensure cohesive multiteam coordination. Using a structured 'what if?' methodology, the paper demonstrates how organisations can proactively identify vulnerabilities and prepare security measures that are functional across multiple threat vectors. A case example using the Francis Scott Key Bridge collapse illustrates how applying this approach can improve security resilience against both accidental and intentional disruptions. The paper provides practical, actionable guidance for security and business continuity professionals, emphasising the need for an integrated security-continuity framework that aligns with industry best practices, including ISO 22301 and American Society for Industrial Security (ASIS) enterprise security risk management (ESRM). By shifting away from reactive security models to proactive, effects-based tactical controls, organisations can build resilience against the unknown while ensuring operational continuity in the face of emerging threats. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/. Unpredictable threats, ranging from civil unrest and cyber-physical disruptions to infrastructure failures, continue to challenge security and business continuity professionals. Traditional risk management approaches often fail in these fast-evolving scenarios, necessitating a shift toward tactical security controls that are adaptable, scalable and integrated within business continuity frameworks. This paper explores the security effects model, a strategic approach that categorises security controls based on the outcomes they achieve rather than the specific threats they address. By leveraging seven key security effects - deterrence, access control, detection, assessment, delay, response, and recording and communication - organisations can design security postures that remain effective even in highly dynamic environments. Among the abovementioned seven, the paper identifies four mission-critical security effects for unpredictable threats: detection, assessment, delay and response. By aligning security controls with these mission-critical effects, organisations can enhance early warning capabilities, streamline crisis assessment, buy critical response time and ensure cohesive multiteam coordination. Using a structured 'what if?' methodology, the paper demonstrates how organisations can proactively identify vulnerabilities and prepare security measures that are functional across multiple threat vectors. A case example using the Francis Scott Key Bridge collapse illustrates how applying this approach can improve security resilience against both accidental and intentional disruptions. The paper provides practical, actionable guidance for security and business continuity professionals, emphasising the need for an integrated security-continuity framework that aligns with industry best practices, including ISO 22301 and American Society for Industrial Security (ASIS) enterprise security risk management (ESRM). By shifting away from reactive security models to proactive, effects-based tactical controls, organisations can build resilience against the unknown while ensuring operational continuity in the face of emerging threats. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.Unpredictable threats, ranging from civil unrest and cyber-physical disruptions to infrastructure failures, continue to challenge security and business continuity professionals. Traditional risk management approaches often fail in these fast-evolving scenarios, necessitating a shift toward tactical security controls that are adaptable, scalable and integrated within business continuity frameworks. This paper explores the security effects model, a strategic approach that categorises security controls based on the outcomes they achieve rather than the specific threats they address. By leveraging seven key security effects - deterrence, access control, detection, assessment, delay, response, and recording and communication - organisations can design security postures that remain effective even in highly dynamic environments. Among the abovementioned seven, the paper identifies four mission-critical security effects for unpredictable threats: detection, assessment, delay and response. By aligning security controls with these mission-critical effects, organisations can enhance early warning capabilities, streamline crisis assessment, buy critical response time and ensure cohesive multiteam coordination. Using a structured 'what if?' methodology, the paper demonstrates how organisations can proactively identify vulnerabilities and prepare security measures that are functional across multiple threat vectors. A case example using the Francis Scott Key Bridge collapse illustrates how applying this approach can improve security resilience against both accidental and intentional disruptions. The paper provides practical, actionable guidance for security and business continuity professionals, emphasising the need for an integrated security-continuity framework that aligns with industry best practices, including ISO 22301 and American Society for Industrial Security (ASIS) enterprise security risk management (ESRM). By shifting away from reactive security models to proactive, effects-based tactical controls, organisations can build resilience against the unknown while ensuring operational continuity in the face of emerging threats. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/. |
| Author | Loyear, Rachelle Walker, M G William J |
| Author_xml | – sequence: 1 givenname: Rachelle surname: Loyear fullname: Loyear, Rachelle organization: Vice President of Integrated Security Solutions, Allied Universal – sequence: 2 givenname: M G William J surname: Walker fullname: Walker, M G William J organization: Chief Security Officer, Allied Universal |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/41174831$$D View this record in MEDLINE/PubMed |
| BookMark | eNpFkMtOwzAQRb0oog9Y8APISzYBO07smF0pT6kSApV1lDiT1uDaJbap-hn8MW0pYjVXmjNHmjtEPessIHRGySWXeZ5dvd7evHBGeA8NqMhkIlPK-2jo_TshnIq0OEb9jG5XBaMD9D2rVNCqMtiDip0OG6ycDZ0zHreuw9GuOmi0ClVtAMMX2OCv8djoudV2_n8U9hqP1zoscB29tuD9XqVt3AE7WQdeGw1WAdYWhwXgttpm1-5ztB_Wre0JOmor4-H0MEfo7f5uNnlMps8PT5PxNFEpz0LSyLwVQm4fpUVb8KoRoKRknEGdCSlqRQtGIGcpgSznsm4gK1RBhKqbVhFg6Qhd_HpXnfuM4EO51F6BMZUFF33JUi64kJTu0PMDGuslNOWq08uq25R_NaY_h_923Q |
| ContentType | Journal Article |
| DBID | CGR CUY CVF ECM EIF NPM 7X8 |
| DOI | 10.69554/RDBQ6306 |
| DatabaseName | Medline MEDLINE MEDLINE (Ovid) MEDLINE MEDLINE PubMed MEDLINE - Academic |
| DatabaseTitle | MEDLINE Medline Complete MEDLINE with Full Text PubMed MEDLINE (Ovid) MEDLINE - Academic |
| DatabaseTitleList | MEDLINE MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | no_fulltext_linktorsrc |
| Discipline | Business |
| ExternalDocumentID | 41174831 |
| Genre | Journal Article |
| GroupedDBID | --- 6KP 8VB AHQJS AKVCP ALMA_UNASSIGNED_HOLDINGS CGR CUY CVF EBD EBS ECM EHE EIF EIS F5P HEHKK IPNFZ IUOCT K1G MBH MET NPM QWB RIG TH9 ZL0 ~8M 7X8 |
| ID | FETCH-LOGICAL-c264t-d95f77930618f86ad7ec99363eb4797bc1830e5320e4569bde48c807cbdfc0e32 |
| IEDL.DBID | 7X8 |
| ISSN | 1749-9216 |
| IngestDate | Sat Nov 01 19:44:22 EDT 2025 Sun Nov 09 02:46:01 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c264t-d95f77930618f86ad7ec99363eb4797bc1830e5320e4569bde48c807cbdfc0e32 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PMID | 41174831 |
| PQID | 3267679113 |
| PQPubID | 23479 |
| ParticipantIDs | proquest_miscellaneous_3267679113 pubmed_primary_41174831 |
| PublicationCentury | 2000 |
| PublicationDate | 2026-01-01 |
| PublicationDateYYYYMMDD | 2026-01-01 |
| PublicationDate_xml | – month: 01 year: 2026 text: 2026-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | England |
| PublicationPlace_xml | – name: England |
| PublicationTitle | Journal of business continuity & emergency planning |
| PublicationTitleAlternate | J Bus Contin Emer Plan |
| PublicationYear | 2026 |
| SSID | ssj0061728 |
| Score | 2.3320093 |
| Snippet | Unpredictable threats, ranging from civil unrest and cyber-physical disruptions to infrastructure failures, continue to challenge security and business... |
| SourceID | proquest pubmed |
| SourceType | Aggregation Database Index Database |
| StartPage | 102 |
| SubjectTerms | Commerce - organization & administration Disaster Planning - organization & administration Humans Risk Management - organization & administration Security Measures - organization & administration |
| Title | Tactical security controls for unpredictable events: Aligning security tactics with business continuity for resilience in the face of the unknown |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/41174831 https://www.proquest.com/docview/3267679113 |
| Volume | 19 |
| hasFullText | |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA5qRbz4ftQXEbwG99U8vEh9FC-WKhV6WzbZRBZKWrtd_4f_2El2a0-C4GXJIRmWZGbyZWaSD6ErEUnJYxkRxbOcJJkOieiwkGQ6M1LqDtWGe7IJ1u_z0UgMmoBb2ZRVLnyid9T5RLkY-TXADEYZmGZ8O_0gjjXKZVcbCo1V1IoByjitZqOfLILbnHl9IVIQEYW0flmICthCr18f7l5oHNDfkaXfYXrb__23HbTVYEvcrZVhF61ou4c2FqXt--hr6G9EQZeyYa3DTaV6iQG74spOZy5vM3fXqbB_2qm8wd1x8e6CJ8tBcy-mxC6GixsWy9KLKmzlOjhhcIwvxt5v4MJigJnYZNCeGN-urAvm2QP01nsc3j-RhpKBKEBOc5KLjmFg0jC33HCa5UwrQDg01jJhgkkFHiLQjmxCAzITMtcJVzxgSuZGBTqODtGanVh9jHAQ5eClEy5NKJJACx5kMqFUslgnAjxNG10uJjsFlXd5jMzqSVWmy-luo6N6xdJp_TZHmoSw2jwOT_4w-hRtRnAErQMqZ6hlwOD1OVpXn_OinF14XYJvf_D8DTNx2D8 |
| linkProvider | ProQuest |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Tactical+security+controls+for+unpredictable+events%3A+Aligning+security+tactics+with+business+continuity+for+resilience+in+the+face+of+the+unknown&rft.jtitle=Journal+of+business+continuity+%26+emergency+planning&rft.au=Loyear%2C+Rachelle&rft.au=Walker%2C+M+G+William+J&rft.date=2026-01-01&rft.issn=1749-9216&rft.volume=19&rft.issue=2&rft_id=info:doi/10.69554%2FRDBQ6306&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1749-9216&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1749-9216&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1749-9216&client=summon |