RBCS - Ray Bernard Consulting Services
  • Advancing the Mission of Security: Reduce security risks to acceptable levels,
    at an acceptable cost.
  • Home
  • Technology
    • Future-Ready Network Design for Physical Security Systems
    • Security Technology Investment Strategic Planning
    • Validating Insurance for IT Solutions
    • Technology Services Overview
    • Physical Security Hardening Guides in 2023
    • PROJECT EVALUATION TOOLS ▶
      • Troubled Project Checklist
      • Security Tech Project Survival Test
    • Project Recalibration Service
    • Project Deadline Recovery
    • Project Planning and Oversight
    • Acceptance Testing
    • Duress Alarm Design
  • Security Program
    • Security Program Improvement
    • Rate and Validate Your Program ▶
      • Rate Your Security Program
      • Validate Your Security Program ▶
        • Top 5 Reasons to Validate Your Program
        • How to Validate Your Program: Part One
        • How to Validate Your Program: Part Two
      • Hospital Incident Command System (HICS)
    • Fix Your Job Description
    • Security Concept of Operations
    • Security Assessments ▶
      • Business Security Assessments
      • NERC CIP Compliance Support
      • NERC CIP: Maximum Compliance Assurance
      • Targeted Assessments
      • Micro-Assessments
      • Insider Threat Mitigation Micro-Assessment Template
      • Time-to-Target Physical Access Control Assessment
      • Insider Threat Mitigation Micro-Assessment Template
      • Two Must-Do Readiness Assessments
      • School Security Assessments
      • Dealing with Extreme Security Threats
      • Materials and Guidelines ▶
        • Checklists
        • Camera Assessment Guideline
    • The Right Stakeholders
    • Master Planning
    • Security Metrics
    • IT Security ▶
      • Micro-Assessments
      • Penetration Testing
    • Video Lessons ▶
      • Lessons Learned from the Front Lines of Security Convergence
      • The Five Secret Weapons
  • Articles
    • Real Words or Buzzwords? Series (1-58)
    • “Skills-First” – A Boon to Security Functions
    • Click Here to Kill Everybody
    • Situational Awareness
    • The Most Important Security Program Element
    • Convergence Q&A Column
    • Magazine Articles
  • News
  • About
    • About Ray Bernard (“Official”)
    • About Ray Bernard (by Ray)
    • About RBCS
    • Privacy Policy
    • RBCS 2022 Services List
  • Contact Us
    • Contact
    • File Upload Page
    • Subscribe to Email Notifications
rbcs-home-page-slide-for-ebook
Right Decision Stakeholders
slider03_2020
Risk-adjusted security program
Cyber liability insurance coverage
Don't be a target
Insider Threat Micro-Assessment Template
  • Self-Sustaining Security Programs

    When you add a new element to your security program, does that add an additional burden on you?

     

    Overly burdensome security programs often have these attributes:

    • High personnel stress level
    • Long work hours for managing personnel
    • Good business practices tend to fade over time
    • Security program documentation goes out of date
    • It becomes increasingly harder to keep up with business changes and risk changes

    The Missing Management Process

    In most such cases what's missing from security process and procedures is an appropriate process for managing security.   [Read More]

    Services List

    If you are looking for guidance or help with something specific, jump right to our Most Popular Services List.

  • Free Consultation

    If you have an area of your security program that you'd like to improve, an upcoming technology project, or some troublesome technology that you'd like to handle—just give me a call and I'll be happy to discuss some feasible options, and explore how RBCS might be able to help you.

     

    Call me, Ray Bernard, at (949) 831-6788. I look forward to hearing from you.

  • Download Ray's New eBook:
    Future-Ready Network Design for Physical Security Systems


     2024 Services List:  Click Here! 
  • How to Fund Security Initiatives

    Funding Security Initiatives:
    The Five Secret Weapons!

    Click here for the free video

  • Rate Your Security Technology Project

    Apply the Troubled Project Checklist
    to a never-ending project—and get recommendations for project recovery.


    Take the Security Tech Project Survival Test to see how likely your current or next project is to come in on time and within budget, and to meet its results criteria.

  • What Clients & Colleagues Say

    I used your Micro-assessment Template and find it very useful to help me organize the multiple tasks I need to perform. The process results in a prioritized list of things to do – and that is very helpful.

    — Senior Security Consultant, Federal and Private Sector

    I use RBCS for consulting in the projects I’ve been running and I find Ray’s advice invaluable.

    — IT Project Manager, National Electrical Utility Company

Powered by Headway, the drag and drop WordPress theme

Go To TopAdministration Login

Copyright © 2025 RBCS - Ray Bernard Consulting Services

We use cookies to ensure we give you the best experience on our website.
If you continue to use this site we will assume you are happy with it.
Access our Privacy Policy via the About menu. Click "I understand" below or scroll the page to dismiss this notice.
I understand