{"id":1070,"date":"2023-08-27T00:33:37","date_gmt":"2023-08-27T00:33:37","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=1070"},"modified":"2024-06-10T23:06:40","modified_gmt":"2024-06-10T23:06:40","slug":"physical-security-for-commercial-facilities","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/","title":{"rendered":"Physical Security for Commercial Facilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1070\" class=\"elementor elementor-1070\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf98b94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf98b94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ed52452\" data-id=\"ed52452\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-b0b6aa8 e-flex e-con-boxed e-con e-parent\" data-id=\"b0b6aa8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d6e8f3 elementor-widget elementor-widget-text-editor\" data-id=\"2d6e8f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><span style=\"color: #808080;\"><em>Last month I wrote about <a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/05\/25\/cybersecurity-best-practices-for-commercial-facilities\/\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> for the Commercial Facilities critical infrastructure sector. Physical security is an essential aspect of protecting critical infrastructure, particularly because most of these types of facilities provide access to the general public. <\/em><\/span><\/h5><h5><span style=\"color: #808080;\"><em>Below, I have outlined some of the key physical security issues for each of the facility types included in this <a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/commercial-facilities-sector\" target=\"_blank\" rel=\"noopener\">critical infrastructure<\/a> area:<\/em><\/span><\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fae9a60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fae9a60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b60619a\" data-id=\"b60619a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6680aa elementor-widget elementor-widget-heading\" data-id=\"c6680aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Entertainment Centers<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0b914d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0b914d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-071c518\" data-id=\"071c518\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4322c4 elementor-widget elementor-widget-text-editor\" data-id=\"f4322c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As pictured as the banner for this article, concerts present a variety of physical security threats.\u00a0 Several of these are listed below:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d29c14 elementor-widget elementor-widget-text-editor\" data-id=\"8d29c14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Unauthorized Access<\/strong>: There&#8217;s a need for strict entry and exit protocols to deter unauthorized individuals from gaining entry to sensitive areas.<\/li><li><strong style=\"color: var( --e-global-color-primary ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">Crowd Control<\/strong><span style=\"color: var( --e-global-color-primary ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\">: Effective management of large crowds is crucial to mitigate risks related to stampedes or riots.<\/span><\/li><li><strong>Emergency Exits<\/strong>: Lack of clearly marked and unobstructed emergency exits can hinder evacuation efforts<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8965612 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8965612\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8329cda\" data-id=\"8329cda\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-63ed95c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63ed95c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1ba4f10\" data-id=\"1ba4f10\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-191d902 elementor-widget elementor-widget-image\" data-id=\"191d902\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"315\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/ConferencePhoto.jpg\" class=\"attachment-large size-large wp-image-128 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/ConferencePhoto.jpg 650w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/ConferencePhoto-300x148.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"ConferencePhoto - CTIN\" \/><noscript><img decoding=\"async\" width=\"640\" height=\"315\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/ConferencePhoto.jpg\" class=\"attachment-large size-large wp-image-128 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/ConferencePhoto.jpg 650w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/ConferencePhoto-300x148.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"ConferencePhoto - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-70b6cbe\" data-id=\"70b6cbe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e930a00 elementor-widget elementor-widget-spacer\" data-id=\"e930a00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82a111e elementor-widget elementor-widget-heading\" data-id=\"82a111e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\n\nConference Facilities<br><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-edef3ad elementor-widget elementor-widget-text-editor\" data-id=\"edef3ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A technique I have used when photographing crowds of people is to slightly blur the image.\u00a0 I do this to protect the privacy of the people in the crowd.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6497836 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6497836\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9da3706\" data-id=\"9da3706\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a211ae elementor-widget elementor-widget-text-editor\" data-id=\"3a211ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>1. <strong>Access Control<\/strong><\/p><p style=\"padding-left: 40px;\">&#8211; <span style=\"text-decoration: underline;\">Issue<\/span>: Given the diverse nature of events and attendees, controlling who has access to various parts of a conference facility is challenging.<\/p><p style=\"padding-left: 40px;\">&#8211; <span style=\"text-decoration: underline;\">Implication<\/span>: Unauthorized individuals could potentially gain access to sensitive areas, posing a risk to participants and confidential information.<\/p><p>2. <strong>Surveillance<\/strong><\/p><p style=\"padding-left: 40px;\">&#8211; <span style=\"text-decoration: underline;\">Issue<\/span>: Inadequate surveillance measures can lead to blind spots within the facility, where illicit activities could go unnoticed.<\/p><p style=\"padding-left: 40px;\">&#8211; <span style=\"text-decoration: underline;\">Implication<\/span>: Without comprehensive camera coverage and monitoring, the risk of theft, vandalism, or other forms of misconduct increases.<\/p><p>3. <strong>Emergency Response<\/strong><\/p><p style=\"padding-left: 40px;\">&#8211; <span style=\"text-decoration: underline;\">Issue<\/span>: The lack of clearly marked and easily accessible emergency exits and muster points can create confusion in case of an emergency situation such as fire or a violent attack.<\/p><p style=\"padding-left: 40px;\">&#8211; <span style=\"text-decoration: underline;\">Implication<\/span>: Inefficient evacuation procedures could result in injuries or loss of life during emergency scenarios.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc3869d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc3869d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3495781\" data-id=\"3495781\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6923474 elementor-widget elementor-widget-heading\" data-id=\"6923474\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sports Stadiums<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5856d0d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5856d0d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a8e46ca\" data-id=\"a8e46ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f72db66 elementor-widget elementor-widget-text-editor\" data-id=\"f72db66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sports stadiums are often located within the downtown area of major cities adding to the congestion and vehicular access challenges for city managers.&nbsp; Three of the important considerations for this type include:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dfef509 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dfef509\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-09a1b92\" data-id=\"09a1b92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7f049cc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f049cc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2ea3978\" data-id=\"2ea3978\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3beb2c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c3beb2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Vehicular Access<\/strong>: Insufficient barriers can make stadiums vulnerable to vehicular attacks.<\/li><li><strong>Surveillance Gaps<\/strong>: Inadequate camera coverage can result in blind spots where illicit activities can go undetected.<\/li><li><strong>VIP Areas<\/strong>: These often require additional security measures due to the higher likelihood of targeted attacks.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3fd906 elementor-widget elementor-widget-image\" data-id=\"a3fd906\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"360\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-768x432.jpg\" class=\"attachment-medium_large size-medium_large wp-image-1136 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-768x432.jpg 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-300x169.jpg 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-1024x576.jpg 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-1536x864.jpg 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-2048x1152.jpg 2048w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-scaled.jpg 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"Atlanta Arena and Skyscrapers - CTIN\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-768x432.jpg\" class=\"attachment-medium_large size-medium_large wp-image-1136 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-768x432.jpg 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-300x169.jpg 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-1024x576.jpg 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-1536x864.jpg 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-2048x1152.jpg 2048w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/AtlantaStadium-TC-Size-scaled.jpg 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"Atlanta Arena and Skyscrapers - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39823f elementor-widget elementor-widget-spacer\" data-id=\"e39823f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73d5a32 elementor-widget elementor-widget-heading\" data-id=\"73d5a32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Casinos<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf15172 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf15172\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d364e8\" data-id=\"9d364e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aab130f elementor-widget elementor-widget-text-editor\" data-id=\"aab130f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For several years the annual BlackHat conference has been held at the massive Mandalay Bay Convention Center.\u00a0 I took this photo at the Race and Sports Book facility within that complex.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6ee4b5 elementor-widget elementor-widget-image\" data-id=\"e6ee4b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-768x432.jpg\" class=\"attachment-medium_large size-medium_large wp-image-1183 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-768x432.jpg 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-300x169.jpg 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-1024x576.jpg 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book.jpg 1312w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"Race-Sports Book - CTIN\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-768x432.jpg\" class=\"attachment-medium_large size-medium_large wp-image-1183 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-768x432.jpg 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-300x169.jpg 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book-1024x576.jpg 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Race-Sports-Book.jpg 1312w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"Race-Sports Book - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eaa92c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eaa92c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-87bdedd\" data-id=\"87bdedd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-132873e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"132873e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dfccdf5\" data-id=\"dfccdf5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60a1a15 elementor-widget elementor-widget-text-editor\" data-id=\"60a1a15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Three of the special considerations for this type inclue:<\/p><ol><li><strong>Cash Handling<\/strong>: Large amounts of cash necessitate robust security measures, including secure storage and transit systems.<\/li><li><strong>Fraud Prevention<\/strong>: Casinos are hotspots for various types of fraud, requiring special attention to card reading and surveillance systems.<\/li><li><strong>High-Profile Guests<\/strong>: The presence of high-value individuals demands specialized security<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65704c7\" data-id=\"65704c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ee5245 elementor-widget elementor-widget-image\" data-id=\"9ee5245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"217\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage-300x217.png\" class=\"attachment-medium size-medium wp-image-1147 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage-300x217.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage-768x555.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage.png 877w\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"CasinoImage - CTIN\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"217\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage-300x217.png\" class=\"attachment-medium size-medium wp-image-1147 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage-300x217.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage-768x555.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/CasinoImage.png 877w\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"CasinoImage - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33323d8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33323d8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b348c98\" data-id=\"b348c98\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0d2faf elementor-widget elementor-widget-spacer\" data-id=\"f0d2faf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b03964 elementor-widget elementor-widget-heading\" data-id=\"6b03964\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Houses of Worship<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4238848 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4238848\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8cc833e\" data-id=\"8cc833e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f47782 elementor-widget elementor-widget-text-editor\" data-id=\"0f47782\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I&#8217;ve traveled to over 50 countries in my life.\u00a0 One of my greatest pleasures has been to photo document the houses of worship in many of the places I have traveled.\u00a0 Below is a sampling of some of the images I&#8217;ve collected from Christian, Jewish, Muslim, Buddhist and Hindu houses of worship.\u00a0 Unfortunately, although these are supposed to be safe spaces for individuals, they have become magnets for lone wolf threat actors in recent years.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7fd74c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7fd74c4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a578\" data-id=\"409a578\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc72775 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"bc72775\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;3&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/JerusalemChurchAndMosque-150x150.jpg\" alt=\"JerusalemChurchAndMosque\" \/><noscript><img decoding=\"async\" class=\"swiper-slide-image lazyload\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/JerusalemChurchAndMosque-150x150.jpg\" alt=\"JerusalemChurchAndMosque\" \/><\/noscript><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/CordobaArches-150x150.jpg\" alt=\"CordobaArches\" \/><noscript><img decoding=\"async\" class=\"swiper-slide-image lazyload\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/CordobaArches-150x150.jpg\" alt=\"CordobaArches\" \/><\/noscript><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/TeachingMudhra-150x150.jpg\" alt=\"TeachingMudhra\" \/><noscript><img decoding=\"async\" class=\"swiper-slide-image lazyload\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/TeachingMudhra-150x150.jpg\" alt=\"TeachingMudhra\" \/><\/noscript><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39d240b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39d240b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b241305\" data-id=\"b241305\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a13c7f1 elementor-widget elementor-widget-text-editor\" data-id=\"a13c7f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Limited Security Personnel<\/strong>: These places often have fewer resources for security, making them more vulnerable.<\/li><li><strong>Open-Access Nature<\/strong>: The welcoming atmosphere can be exploited by individuals with malicious intent.<\/li><li><strong>Cultural and Religious Sensitivities<\/strong>: There may be reluctance to implement stringent security measures due to concerns about inclusivity.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-77e3821 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77e3821\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ceaef97\" data-id=\"ceaef97\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96cb23a elementor-widget elementor-widget-heading\" data-id=\"96cb23a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Shopping Malls<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-69e6f59 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69e6f59\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70094a5\" data-id=\"70094a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b47ec5 elementor-widget elementor-widget-text-editor\" data-id=\"2b47ec5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Shopping malls, movie threatre complexes and big box stores have also been subjected to the threat actions of lone wolf threat actors.\u00a0 Some of the physical security concerns here include the following:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1f637b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f637b6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-0f9a119\" data-id=\"0f9a119\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0c484c elementor-widget elementor-widget-text-editor\" data-id=\"a0c484c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Multiple Entry and Exit Points<\/strong>: The large number of entrances and exits makes it difficult to monitor and control access effectively.<\/li><li><strong>Parking Areas<\/strong>: Poorly lit and minimally supervised parking areas can be a security risk.<\/li><li><strong>Varied Tenant Needs<\/strong>: Different types of stores have different security requirements, making a one-size-fits-all approach ineffective.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-909673f\" data-id=\"909673f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e7116b9 elementor-widget elementor-widget-image\" data-id=\"e7116b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful-300x225.jpg\" class=\"attachment-medium size-medium wp-image-1168 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful-300x225.jpg 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful-768x576.jpg 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful.jpg 936w\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"Colorful - CTIN\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful-300x225.jpg\" class=\"attachment-medium size-medium wp-image-1168 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful-300x225.jpg 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful-768x576.jpg 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/Colorful.jpg 936w\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"Colorful - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Commercial facilities require special considerations for designing physical security operations.<\/p>\n","protected":false},"author":2,"featured_media":1071,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[1266],"tags":[1178,1267],"class_list":["post-1070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-physical-security","tag-commercial-facilities","tag-physical-security"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Commercial facilities require special considerations for designing physical security operations.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Physical Security for Commercial Facilities - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Commercial facilities require special considerations for designing physical security operations.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-08-27T00:33:37+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-10T23:06:40+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Physical Security for Commercial Facilities - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Commercial facilities require special considerations for designing physical security operations.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#blogposting\",\"name\":\"Physical Security for Commercial Facilities - CTIN\",\"headline\":\"Physical Security for Commercial Facilities\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/EntertainmentHall-TC-Size.jpg\",\"width\":1236,\"height\":693},\"datePublished\":\"2023-08-27T00:33:37+00:00\",\"dateModified\":\"2024-06-10T23:06:40+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#webpage\"},\"articleSection\":\"Physical Security, commercial facilities, physical security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/physical-security\\\/#listItem\",\"name\":\"Physical Security\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/physical-security\\\/#listItem\",\"position\":3,\"name\":\"Physical Security\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/physical-security\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#listItem\",\"name\":\"Physical Security for Commercial Facilities\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#listItem\",\"position\":4,\"name\":\"Physical Security for Commercial Facilities\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/physical-security\\\/#listItem\",\"name\":\"Physical Security\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/\",\"name\":\"Physical Security for Commercial Facilities - CTIN\",\"description\":\"Commercial facilities require special considerations for designing physical security operations.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/EntertainmentHall-TC-Size.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#mainImage\",\"width\":1236,\"height\":693},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/08\\\/27\\\/physical-security-for-commercial-facilities\\\/#mainImage\"},\"datePublished\":\"2023-08-27T00:33:37+00:00\",\"dateModified\":\"2024-06-10T23:06:40+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Physical Security for Commercial Facilities - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Physical Security for Commercial Facilities - CTIN","description":"Commercial facilities require special considerations for designing physical security operations.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#blogposting","name":"Physical Security for Commercial Facilities - CTIN","headline":"Physical Security for Commercial Facilities","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/EntertainmentHall-TC-Size.jpg","width":1236,"height":693},"datePublished":"2023-08-27T00:33:37+00:00","dateModified":"2024-06-10T23:06:40+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#webpage"},"articleSection":"Physical Security, commercial facilities, physical security"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/physical-security\/#listItem","name":"Physical Security"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/physical-security\/#listItem","position":3,"name":"Physical Security","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/physical-security\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#listItem","name":"Physical Security for Commercial Facilities"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#listItem","position":4,"name":"Physical Security for Commercial Facilities","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/physical-security\/#listItem","name":"Physical Security"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/","name":"Physical Security for Commercial Facilities - CTIN","description":"Commercial facilities require special considerations for designing physical security operations.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/08\/EntertainmentHall-TC-Size.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#mainImage","width":1236,"height":693},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/#mainImage"},"datePublished":"2023-08-27T00:33:37+00:00","dateModified":"2024-06-10T23:06:40+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Physical Security for Commercial Facilities - CTIN","og:description":"Commercial facilities require special considerations for designing physical security operations.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2023-08-27T00:33:37+00:00","article:modified_time":"2024-06-10T23:06:40+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Physical Security for Commercial Facilities - CTIN","twitter:description":"Commercial facilities require special considerations for designing physical security operations.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"1070","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 21:53:43","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-04-18 16:56:44","updated":"2025-08-25 21:53:43"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/physical-security\/\" title=\"Physical Security\">Physical Security<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tPhysical Security for Commercial Facilities\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"Physical Security","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/physical-security\/"},{"label":"Physical Security for Commercial Facilities","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/08\/27\/physical-security-for-commercial-facilities\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=1070"}],"version-history":[{"count":222,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1070\/revisions"}],"predecessor-version":[{"id":3373,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1070\/revisions\/3373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/1071"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=1070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=1070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=1070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}