12:00 – 16:00 october 14th 2015 - tinygsponsored by 12:00 – 16:00 . october 14th 2015....

8
Sponsored by 12:00 – 16:00 October 14th 2015 Hosted by Barings, 155 Bishopsgate, London EC2M 3XY Supported by

Upload: others

Post on 30-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by

Sponsored by

12:00 – 16:00 October 14th 2015

Hosted by Barings, 155 Bishopsgate, London EC2M 3XY

Supported by

Page 2:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by

[email protected] globalaware.co.uk

Developed by

London Office17 Ensign HouseAdmirals Way Canary WharfLondon E14 9XQT: +44 (0) 207 863 7523

New York Office280 Madison AvenueSuite 912 9th FloorNew York NY10016T: 001 917 463 0496

TravAwareTM is the innovation in a software application for the traveller, VIP, lone worker and valued family members. It is accessible on Blackberry, iPhone, Android or any web enabled device.

TravAwareTM provides a proactive, fast time reporting tool which in 4 very easy steps deals with any medical or fire emergency, terrorist threat, pandemic issues, hostage and kidnap, hostile reconnaissance, workplace incidents, intrusions, suspicious behavior or any other incident when a threat or injury are involved.

TravAwareTM helps to mitigate and deal with the risks associated with these types of incidents, providing your people with a level of confidence that someone is able to assist and respond if required 24/7. This is especially important to people who are in high risk roles, or who are travelling in unfamiliar or high risk areas. TravAwareTM is simple to use and highly effective.

How does it work?

The TravAwareTM software is accessible, fully loaded and ready to go from the front screen of your chosen device.

To activate a report simply select the TravAwareTM icon. It’s simple, quick and easy to navigate around to request help. If the situation demands immediate assistance, sending a quick alert to a specified group

of responders will enable them to provide support and help to you in the most efficient and appropriate manner.

Page 3:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by

A welcome from Founder & Chairman

David Evans On behalf of the leadership team, I would like to welcome you to TINYg London 2015. Since our last meeting in London, I need not remind you of the crimes that have been committed internationally, including the atrocities in Australia, France & Canada.

Destruction of our heritage

A tactic employed by the so-called Islamic State (ISIS) is the obliteration of some the world’s most ancient and important buildings, going to immense lengths to ensure global publicity, in order to further propagate their campaign of terror. A recent example is the systematic demolition of the Syrian city of Palmyra,- a Unesco World Heritage site,- by the terror group’s militants, including the 2,000-year-old temple of Baalshamin. IS are destroying ancient relics claiming that they promote idolatry, though the extremists are also believed to have sold off looted artefacts. Palmyra is rapidly becoming the symbol of ISIS’s cultural iconoclasm. If ISIS is permitted to wipe the slate clean and rewrite the history of a region that defined global aesthetic and political sensibilities, we will collectively suffer a costly and irreversible defeat. This also appears to have drawn in new spectators internationally who are increasingly disturbed and vociferous and this will introduce additional risk dynamics.

Radicalisation

Whilst radicalisation is not a new phenomenon, the events in Syria and Kurdish controlled Iraq together with the attempts of the so called Islamic State Fighters to drive out or murder “non-believers” including journalists and aid workers graphically demonstrates the dangers that they pose. The use of Online networks to encourage people to join ISIS in defined regions, or alternatively to commit in-country terrorist acts, have global reach and are almost impossible to close down quickly. The virtual community has many thousands of followers with influence not only in the UK & US but also in Latin America, Australia, North Africa, Saudi Arabia and mainland Europe. We know that many online platforms spread propaganda material with a particular emphasis on the act of martyrdom. The highly publicised success of luring young women and families to join IS has proven to be successful and one has to wonder how entire families can be radicalised to this extent. The evolving international issues regarding the mass migration of Syrians from their homeland will no doubt also raise concerns and risk issues, through the passage of time across the European Union.

In the UK allegations made in a letter sent to local authorities last year continue to be investigated. It was alleged that hard-line Muslims were planning to take over the management of some city schools, with the aim of promoting extreme views and principles. In Birmingham alone, 25+ schools are now being investigated including primaries, secondaries and academies. Issues such as these are not restricted to the UK and are of global concern.

The evidence that many ‘Jihadist’ fighters are radicalised Europeans and Americans reinforces the importance of working together to contain the threat that they pose when they return to their home countries.

Cyber Terrorism

Cyber terrorism takes many forms. Terrorists may now use the internet, rather than using the usual methods of assassination, hostage taking and guerrilla warfare. By using the internet much wider and targetted damage and upheaval to a country can be caused than by killing individuals. From disabling a country’s military defences, to shutting off the power in a large area, the terrorist can affect more people at less risk to him or herself, than through traditional means. It is believed that terrorists have succeeded in extortion in cases of large institutions and businesses by hacking into their systems and leaving threatening, encrypted messages for directors. In essence, the message says that if they do not pay a set amount of money, then the terrorists will use anything from logic bombs to electromagnetic pulses and high-emission radio frequency guns to destroy the organisation’s files. The ‘internet of things’ must also be considered as a weapon in the terrorist’s armoury and has to be addressed with immediate effect.

In conclusion

All of these issues serve to remind us of the importance of regular communication and networking between those of us working with the common purpose of improving security and reducing risks. In whatever capacity you are employed, the ability to share information and best practice benefits us all and I am hugely grateful to the organisations internationally that continue to support TINYg and enable us to do what we do.

Sponsorship

TINYg can only continue to hold its international conferences and operate its e-mail driven information sharing service to over 130 countries at no cost to its end users because of the generous sponsorship we receive from all of the organisations featured today. If sponsoring TINYg is of any interest to your company, please speak to a member of the leadership team.

On behalf of TINYg and those attending today’s meeting, I would like to formally thank Mark Williams and Dave Matthews and their colleagues here at Barings, for their generous support and hospitality, and our speakers for giving their time freely to help us all to gain a better understanding of the issues that we face.

Feedback

Following this event we will contact you to ask for feedback on the event. Please use this opportunity to let us know what you think, for example if there’s a particular speaker that you’ve heard elsewhere, that you believe we should invite to speak for us, let us know. I hope you enjoy today’s conference and find it beneficial.

Thank you.

David Evans

Chief Executive Officer, Global Aware International

David Evans

Page 4:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by
Page 5:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by

Speakers BiographiesCommander Chris GreanyNational Police Coordination Centre (NPoCC)Commander Greany has over 28 years experience in policing. He began his career in the Metropolitan Police and has served across a number of areas with a focus on counter terrorism investigations, security & intelligence. He has worked in the UK and overseas including at NATO in Brussels. He oversaw the security strategy for the British athletes’ during the 2004 Athens Olympic Games and has led the international protection and security for two British Foreign Secretaries. After spending three years as head of counter terrorism in the City of London Police he returned to the Metropolitan Police in 2011 where he was responsible for the investigation into the 5500 crimes committed during the 2011 disorders in London. In January 2012 he was appointed as National Coordinator for Domestic Extremism, responsible for the UK National Domestic Extremism Unit, part of the Metropolitan Police Counter Terrorism Command. During the 2012 London Olympics he also had the role of Deputy National Protection Coordinator, part of a command team responsible for the security of dignitaries visiting the London 2012 Olympic and Paralympic Games. After successfully completing the UK Police Strategic Command Course in 2014 he was later appointed as Commander, Strategic Lead for the National Police Coordination Centre (NPoCC).

Richard BingleyPGLTHE Senior Lecturer, Bucks New UniversityRichard has more than a decade and a half of experience in a variety of leading security and communications roles including as a Close Protection Operative at the London 2012 and deployed to Russia for the 2014 Winter Olympic Game. Now a Senior Lecturer at Buckinghamshire

New University.

Jason TowseManaging Director, Mitie TSM Jason has significant expertise of security with a 25 year career in the industry across commercial, business development and operations. Jason began his security industry career with his own business offering retail detective services to major high street retailers. Jason joined Chubb in 2001, enjoying several roles including, operations director, commercial director and head of retail, and managing director for their aviation business when transferring to Securitas during the acquisition of Chubb in 2011. Jason joined Mitie in 2012 as Regional Managing Director for London and Managing Director, retail services in our Total Security Management (TSM) business. Due to the growth and development of the TSM business, Jason has more recently been appointed managing director of the overall TSM business.

Ross FrenettDirector AVE NetworkRoss Frenett is the Director of the Against Violent Extremism (AVE) network, a global network of former extremists and survivors of violent extremism which the Institute runs in partnership with Google Idea and the GenNext Foundation. Throughout his career Ross has interviewed dozens of current and former members of extremist groups with his research taking him from maximum security prisons in Ireland to Hezbollah controlled southern Beirut. He is a regular media commentator around issues of extremism. Prior to joining the Institute Ross worked as Consultant in Deloitte’s Technology Integration practice, where his work focused primarily on terrorism sanctions compliance investigations into major financial institutions. He holds a Masters in Terrorism Security and Society from Kings Collage London and spent seven years in the Irish Military.

Danyetta Fleming MaganaCISSP President/CEO CovenantDanyetta Fleming Magana founded Covenant Security Solutions in 2003. Her goal is to push the envelope regarding how we think about our information and find new and innovative ways to secure our digital way of life. Mrs. Magana is a Certified Information Systems Security Professional (CISSP) a globally recognized certification in the information security arena. She has been published in the Defense Information Systems Agency IA Newsletter and interviewed as an expert on Federal News Radio’s “Mark Amtower Show.” In 2001, Ms. Magana received the Black Engineer of the Year Award for the “Most Promising Engineer in Government.”

Page 6:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by

Purposeful buildings,productive people,delighted customersAmey enhances people’s lives and businesses by creating great places to live, work and travel.

We do this by improving the assets we manage. Be it prestigious headquarters, people’s homes, government buildings, rail, highways orcity streets, our 21,000 people make life better for people across the UK.

Our facilities management team takes care of some of the UK’s most prestigious and sensitive buildings. With our scale and skills, we make sure we understand what matters to our customers and the users of their buildings; we have the right people in the right places to understand how buildings should work and how people interact in them. We manage thebig systems and processes that help buildings achieve optimum performance and the small but vitally important everyday tasks thatmake them function seamlessly.

Regardless of their size or complexity, we get the best possible performance from the buildings we manage. That’s why ourclients trust Amey to get the most from their built assets.

Our property and facilitiesservices include:

> Building engineering and fabric maintenance

> Energy and utilities management

> Reception, security and other front ofhouse services

> Cleaning and waste management

> Catering and hospitality

> Helpdesk services

> Portering

> Courier, mailroom andmessenger service

> Design and print

> Grounds maintenance

Amey makes buildings have purpose, buildings that makea difference to our customers’ businesses and people’s lives.

Amey CG&U FM-ad-A4.indd 1 21/09/2015 16:33

London’s leading security company

High-end Security • Front of House

Corporate Reception • Mail Room

ultimatesecurity.co.uk

Page 7:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by

Purposeful buildings,productive people,delighted customersAmey enhances people’s lives and businesses by creating great places to live, work and travel.

We do this by improving the assets we manage. Be it prestigious headquarters, people’s homes, government buildings, rail, highways orcity streets, our 21,000 people make life better for people across the UK.

Our facilities management team takes care of some of the UK’s most prestigious and sensitive buildings. With our scale and skills, we make sure we understand what matters to our customers and the users of their buildings; we have the right people in the right places to understand how buildings should work and how people interact in them. We manage thebig systems and processes that help buildings achieve optimum performance and the small but vitally important everyday tasks thatmake them function seamlessly.

Regardless of their size or complexity, we get the best possible performance from the buildings we manage. That’s why ourclients trust Amey to get the most from their built assets.

Our property and facilitiesservices include:

> Building engineering and fabric maintenance

> Energy and utilities management

> Reception, security and other front ofhouse services

> Cleaning and waste management

> Catering and hospitality

> Helpdesk services

> Portering

> Courier, mailroom andmessenger service

> Design and print

> Grounds maintenance

Amey makes buildings have purpose, buildings that makea difference to our customers’ businesses and people’s lives.

Amey CG&U FM-ad-A4.indd 1 21/09/2015 16:33

London’s leading security company

High-end Security • Front of House

Corporate Reception • Mail Room

ultimatesecurity.co.uk

Page 8:    12:00 – 16:00 October 14th 2015 - TINYgSponsored by 12:00 – 16:00 . October 14th 2015. Hosted by . Barings, 155 Bishopsgate, London EC2M 3XY . Supported by

A central, online, secure environment, which helps businesses optimise their service teams’ performance through proactive task assignment and management.

• Proven worldwide

• Cost effective

• Increasing efficiency

• Mitigating risk

[email protected] globalaware.co.uk

Developed by

London Office17 Ensign HouseAdmirals Way Canary WharfLondon E14 9XQT: +44 (0) 207 863 7523

New York Office280 Madison AvenueSuite 912 9th FloorNew York NY10016T: 001 917 463 0496

Merlin Protect 24/7 is an innovative tailored control room software system which provides complete corporate resilience. Safeguarding your organisation’s people, assets and reputation by ensuring that the right information reaches the right people at the right time.

Merlin Protect 24/7will guide and record your security and front of house staff through all types of incidents, from risk management to ‘day to day’ in house procedures.

Merlin Protect 24/7 can encompass:

· Physical and Cyber Convergence

· Social Media Intelligence

· Critical Incident Management

· Business Continuity

· Merlin Business Intelligence

· Critical Alarms

· Mass Communications

· Corporate Travel Management

· Patrol and Task Management

· Risk Assessment Tools

· Fire and Evacuation Management

· FCC Integration

Merlin Protect 24/7 has been developed with a wide range of services attached and is limitless in its operational areas:

· Facilities Management

· Security

· Corporate Real Estate

· High Rise, Iconic and GHQ’s

· Travel and Risk Management

· Operational Control Rooms

· C - Suite

The main advantages are:

· Business resilience

· Business intelligence

· Real time information

· Smart Intelligence gathering

· Brand protection

· Corporate responsibility

· Consistent approach

· Integration of services

· Central platform for all feeds

· Paperless environment.

· Commercial savings

The Merlin Mobile App provides portable functionality of Merlin Protect 24/7.

The App integrates the user to their Merlin Protect 24/7 portal and all data entered is synced within the audit system. The application is designed to work on both

Android and IOS platforms.

You won’t be alone, Merlin Protect 24/7 is the chosen security system of many of the world’s leading organisations who use Merlin to safeguard many of the iconic buildings across the globe.