Post on 10-Apr-2017
Managing Risk,Delivering Value
10.00 Welcome/introduction
10.15 Managing Risk – Ed SmithWhat is Risk? Why is it important? What is the legislation?
10.45 A practical guide to risk and security assessment – John HillsHow do I make my organisation more resilient?
11.15 Tea/coffee/networking
11.30 Using technology to increase efficiency and reduce costs - Paul MainAdding value and reducing cost through integration and convergence.
12.00 Protect through balancing human and technical resource – Peter Sutton & Anthony MillerCan manned guarding still be of value?
12.30 Lunch
Managing Risk,Delivering Value
Managing Risk,Delivering Value
Your hosts:ClearView Communications Paul Main – Managing Director
Oakpark Security Peter Sutton – Operations Director
Supported by:DVS Suppliers of CCTV equipment and componentsAdvanceIT Group (LoneAlert) Suppliers and manufacturers of Lone worker solutionsCastel/Urmet Manufacturers of intercom systemsJupiter2000 Security & Fire Safety Consultants
What is Risk? Why is it important? What is the legislation?What are the threats? Use of local crime trends. What are the
standards? H&S regulations – corporate manslaughter, risk assessment
‘Managing Risk’
“Security risk is a measurement of the likelihood that an organisation’s assets
are susceptible.”
“Risk is a threat or exposure of which one is aware, but the effect of which
cannot be forecast with regard to timing or extent.”
“Without any understanding of Risk Management within an organisation and its infrastructure, security will fail at the first sign of trouble. No
security plan or programme can be effective unless it is based on a
clear understanding of the actual risks it is designed to control.”
Dr Peter Speight
TRADITIONAL APPROACHES TO MEASURING RISK
How likely is _____________ to happen?
What is the impact if ___________ should happen?
How prepared are we if ______________ happens?
RISK = PROBABILITY x CRITICALITY PREPAREDNESS
TRADITIONAL APPROACHES TO MEASURING RISK
Health & Safety at Work Act (1974)
Data Protection Act (1998)
Management of Health & Safety at Work (1999)
Corporate Manslaughter Act (2007)
STANDARD RISK-FOCUSED LEGISLATION(Helps Controls Risk within Your Organisation)
ADVANCED BUSINESS STANDARDS(Helps Controls Risk external to your Business)
ISO 22301 Business Continuity Management
ISO 31000: 2009 Risk Management
BS 10012 Personal Information Management System
BS 65000 Guidance for Organisational Resilience
By definition, a “black swan” event is a complete surprise because no one has predicted it.
So it may seem difficult to protect a company against one.
However, given that the unpredictable is often predictable, companies can and should plan for a black
swan, so that if one does occur the chances of corporate survival are increased.
The ‘Black Swan’ Event…
“Resilience refers to the organizational capability to anticipate key events from
emerging trends, constantly adapt to change, and rapidly bounce back from disaster.”
“The ability of an organization to anticipate, prepare for, and respond and adapt to
incremental change and sudden disruptions in order to survive and prosper.”
RISK v RESILIENCE?
Operational
Exclusive
Narrow
Quantitative
Reactive
Strategic
Inclusive
Broad
Qualitative
Proactive
Challenge for security managers is perhaps best framed not in
terms of measuring and managing risk, but is asking how
to make their business more resilient?
Philip Wood
‘Resilient Thinking: Protecting Organisations in the 21st
Century’
CONCLUSION
RISK remains an essential concept in protecting your property, people, assets and brand.
BUTA more strategic focus on RESILIENCE will ensure that your business is better placed to absorb unplanned disruption.
What do I need to consider to make my organisation more resilient ?
What are the Threats?
What are my options and considerations?
Balancing risk and cost.
A practical guide to risk and security assessment.
What do I need to consider to make my organisation more resilient ?
The threat and/or riskWhom or what is at risk
Cost effective?
A practical guide to risk and security assessment.
Police Perspective & Designing Out Crime
LPS 1175 1-6, Pas 24, Pas 68, BSEN 50131, BSEN 50132.7-2012BS 8418, BS 1722 1-2, BSEN 61011 220v/110v, BSEN 60335-2
DETER, DETECT & DELAY
A practical guide to risk and security assessment.
Using technology to increase efficiency and reduce costs
Adding value and reducing costs through integration and convergence.
Convergence
CCTV Access Control Public Address Intruder Fire
All systems on same industry standard platform
Easier to manager
Cheaper to manager
Systems “talk” to each other
Better Value
OutdoorAccess Point
SurveillanceCamera
Access Point
CCTV recorder
Transmission Options
Local Area Network (LAN)
Wired
Wireless
Broadband
3G/4G
CCTV Access Control Public Address Intruder Fire
Monitoring/managementOn-site Off site Remote monitoring centreControl roomPC/laptop/iPadMobile phone
PC/laptop/iPadMobile phone
CCTV Public Address
Existing “legacy” systems can be Converted to IP
with
New Megapixel systems
IP processorIP address: 192.0.0.63
IP address: 192.0.0.62
Video coax
Or Cat5 cable
Access control
IP processor
IP address: 192.0.0.65 IP address: 192.0.0.62
Intruder & fire alarm
IP processor
IP address: 192.0.0.64 IP address: 192.0.0.65
Monitoring/management
On-site
Control roomPC/laptop/iPadMobile phone
PC/laptop/iPadMobile phone
Monitoring/managementOff-site
Remote monitoring
centre
Monitoring/management
Remote monitoring centre
Alarm receiving
Know which detectors have activated
CCTV monitoring
Two-way audio
Remote opening/unlocking
Monitoring/management
Remote Maintenance
Reactive Maintenance
Reduced Maintenance costs
Online Site Diagnostics – communicate with the site security systems to diagnose problems and perform routine service functions such as checking signal signalling paths and relays, reset a DVR and allocate a static IP address.
Remotely re-set devices
Find potential problems before they develop into faults
Monitoring/management Remote Maintenance
Preventative maintenance
Save unnecessary site visits with remote security system programming. Add or change users or isolate zones, perform simple diagnostics such as checking battery voltage and zone resistance.
Continuos device monitoring - “Ping” each IP device at regular intervals to confirm that it is online
Continuously monitor the current draw of every maglock at every door.An increase in energy consumption is a likely indicator of imminent failure.
Continuously monitor temperature operation of key components (e.g. DVR hard drives). A temperature increase is a likely indicator of imminent failure.
Check recording - is hard disc usage below expected levels?
More frequent preventative maintenance checks
Maintenance
Remote tools – automatically notifying service centre
Daily Status ReportsFault notification by emailWeb Based Status View (from browser or iPhone)
Remote Analytics from Security Devices
Example IP system – ANPR
More sophisticated cameras, with IR lamp control, give better performance in low light and improved intelligence for difficult lighting conditions.
Megapixel cameras give higher resolution with ability to provide detail at longer range
Analytics gives cameras greater intelligence to understand what they are viewing.
Example IP system - ANPR
IP processorIP address: 192.0.0.63
3G transmission