international security expo itpo new delhi finl

43
International Security Expo ITPO New Delhi Corporate Security Firoze Zia Hussain Former Superintendent of Police Pondicherry [email protected] Cell 00919910333249 06/26/22 1

Upload: firoze-hussain

Post on 12-Nov-2014

715 views

Category:

Business


2 download

DESCRIPTION

security

TRANSCRIPT

Page 1: International Security Expo Itpo New Delhi Finl

International Security Expo ITPO New Delhi

Corporate Security

Firoze Zia Hussain

Former Superintendent of Police Pondicherry

[email protected]

Cell 00919910333249

04/08/23 1

Page 2: International Security Expo Itpo New Delhi Finl

India Corporate Security Scenario

Mumbai blasts - Wake up call for the Indian industry Leaders have rethink on corporate security policies .

Incident led the industry to decide to work with government on security and governance issues rather than dealing with it as another man’s subject.

Indian industry hit by global recession and by image of India as a soft target due to terrorist strikes and now with the Satyam episode as country lacking in good corporate governance policies .

What are the new leadership strategies to overcome and move forward.

Foremost concern being safety and security.

04/08/23 2

Page 3: International Security Expo Itpo New Delhi Finl

India's commercial security woes

More to do with the DNA of the security professionals rather than the prevailing threats at presents.

Commercial security is the gap filler between the state, servicing the general public and the corporate requirements to protect, preserve and maximize their vested assets.

04/08/23 3

Page 4: International Security Expo Itpo New Delhi Finl

Opportunity-security providers

India has a greater divide between the capacity of the government and commercial demands, therefore a much greater opportunity and gap to be filled by security providers.

The problem with the current approach is that it is still very ex-military or ex-police driven.

The overall global view of India's security remains below par, and this affects everything from investment to trust and relationships.

One of the very outdated practices in India only continues to perpetuate this issue with everyone in security introducing themselves as Captain, Major, General, etc.

No one cares! Corporations want business enablers with sound competent business managers first and security managers second, not professional inhibitors or someone living in the ancient past from their days in the military/police. If the company wants a war or police department, then then the retention of rank is appropriate but not for professional commercial security solutions.

Despite the oversight and protection mandate of security professionals, very few are actually adequately checked to ensure they meet the corporate needs and technical requirements, merely what did they do in the army/police/government and so on. This approach is a fundamental flaw globally, and emphasized in India.

 

04/08/23 4

Page 5: International Security Expo Itpo New Delhi Finl

In developed countries the escalation of cost for security begins with policy, then technical measures and manpower last.

In developed countries, policy, manpower and then technical solutions are the prescribed route for a number of reasons but largely due to the reality that manpower is cheaper than technical measures and therefore dominates the solution options.

Not necessarily cost effective or mitigation solution based.    

04/08/23 5

Page 6: International Security Expo Itpo New Delhi Finl

04/08/23 6

Page 7: International Security Expo Itpo New Delhi Finl

VALUE ADD and corporate security debate

Any investment needs to be validated by VALUE ADD it brings in

Security is viewed as necessary expense. Companies making a business case from

utilizing security devices and systems to protect life and property (assets), to helping improve productivity, assist with training, and decrease losses

04/08/23 7

Page 8: International Security Expo Itpo New Delhi Finl

Leverage Security to Maximize Revenue

Vital partner to protect company assets and IP Gives management peace of mind to make decisions for business

improvement.

Use security technology to improve business processes and operational efficiencies.

End user and integrator ingenuity are merging to bring innovative services eg Video surveillance and access control services

Internet provides realtime, anywhere access to surveillance cameras, activities of employees and visitors via access control logs.

Access provides valuable information on security measures Customer and employee patterns begin to emerge.

04/08/23 8

Page 9: International Security Expo Itpo New Delhi Finl

ROI With Security Technology

Is the new line of merchandise displayed prominently in the front of the store? Do I need more lunch staff on Thursdays and Fridays? Are my employees being honest about their hours worked?

A security director can view and download footage of an incident online in one city without having to make the roundtrip to pull the incident from the DVR.

Remote access can potentially save a business in fleet expenses, travel expenditures, and time and resource management.

Be in multiple places at one time. A win-win for all parties anytime, anywhere access

Funding is now coming from the customer’s IT, sales and marketing departments. Convergence opens new ROI opportunities for security providers, who are

investing R&D dollars to position themselves at the forefront of the convergence revolution.

04/08/23 9

Page 10: International Security Expo Itpo New Delhi Finl

Corporate financial fraud Investigation-Satyam Saga

Financial investigators search for information on the integrity, financial health and reputation of an organization or company.

This is done by probing public records and international databases covering patents, corporations, partnerships, contracts, SEC filings, news, business references

Uncover critical information regarding corporate documents, material contracts and agreements, financial status , litigations, taxation, insurance and liability, governmental regulation filings, financial history, and acquisition, partnership, or joint venture agreements.

04/08/23 10

Page 11: International Security Expo Itpo New Delhi Finl

Computer Forensics and Electronic Discovery

Specialized team of leading experts in information security, focusing on computer forensics, electronic discovery, physical & IT security, and cyber investigations.

IT practice supports technology-driven litigation and engagements in the following ways:

Computer Forensics/Expert Witness Testimony

Physical & IT Security

04/08/23 11

Page 12: International Security Expo Itpo New Delhi Finl

Intellectual Property (Brand) Protection

Illegal use of legitimate companies’ brands, trademarks, and product has increased exponentially and become very sophisticated in the process.

04/08/23 12

Page 13: International Security Expo Itpo New Delhi Finl

ISSUES

Can enhancement of awareness in corporates prevent terrorist attacks

Can 10 security guards standing outside a mall deter a terrorist

04/08/23 13

Page 14: International Security Expo Itpo New Delhi Finl

We need to study how Corporates in Srilanka and Israel have been coping with continuous terrorist attacks and yet are able to develop their economy fairly well.

04/08/23 14

Page 15: International Security Expo Itpo New Delhi Finl

Protecting Assets and Increasing Effectiveness

Virtual security Physical security Financial security IP intellectual

property Detection Prevention Monitoring 3 rings of security

Perimeter Entry point Usage areas

04/08/23 15

Page 16: International Security Expo Itpo New Delhi Finl

Business SEGMENTS

Travel and Tourism Industry-Hotels Transportation - aviation security , mass transit rail

systems ,shipping ,bus,taxi,auto,cycle

Critical Infrastructure - The industries and institutions, buildings and distribution networks that are essential to everyday life ,refineries,banks

Ports & Borders -Systems for Customs officers and border protection, including monitoring cross-border cargo and reducing international shipments of contraband, screening for explosives, arms and weapons of mass destruction.

Emergency Responders - Enabling emergency response teams to face potential threats with confidence when dealing with a potentially toxic incident, equipped with the most advanced technology.

Military - Meeting the requirements of our armed forces and the application of smart science on the battlefield, principally the threat from potentially lethal chemical and biological warfare agents.

Diagnostics – eg hospital screening programmes for infectious diseases.

04/08/23 16

Page 17: International Security Expo Itpo New Delhi Finl

Security Products

Modern arms ammunition Lethal arms Non lethal arms

Intelligence collection and analysis and sharing

Innovative products

04/08/23 17

Page 18: International Security Expo Itpo New Delhi Finl

TASER

Ideal non lethal weapon for private security guards

Can be used extensively by Aviation personnel –for example to temporarily disable a drunken deranged person in an aircraft

04/08/23 18

Page 19: International Security Expo Itpo New Delhi Finl

Definitions

Electronic Control Devices (ECD) use propelled wires or direct contact to conduct energy to affect the sensory and motor functions of the nervous system.

The TASER X26 and ADVANCED TASER M26 are Electronic Control Devices manufactured by TASER International, lnc.

04/08/23 19

Page 20: International Security Expo Itpo New Delhi Finl

TechnologyIllustrative Example

• The human nervous system communicates with simple electrical impulses

• TASER technology uses similar electrical impulses to cause stimulation of the nerves that control movement

Nerve impulse TASER impulse

04/08/23 20

Page 21: International Security Expo Itpo New Delhi Finl

Pain to Incapacitation

• All previous less-lethal weapons have worked on pain compliance that can be overcome by drugs, alcohol, emotionally disturbed persons (EDPs), or by focused, combative individuals.

• The X26 and M26 ECDs do not solely rely on pain to achieve compliance. They affect the sensory and motor functions of the nervous system and can cause incapacitation.

04/08/23 21

Page 22: International Security Expo Itpo New Delhi Finl

TASER X26 Constructed of impact resistant sonic welded polymer. Mass = 7 ounces. Available in

Black, Yellow & Clear

Probes

Blast Doors

AFIDs Laser Sight

LIL: Low Intensity Lights (LEDs)

Trigger

Enhanced GripZones

DPM: Digital Power Magazine

DPMRelease Button

Stainless SteelShock Plates

SafetyIlluminationSelector

Stainless SteelSerial No. Plate

High Visibility Sights

TASER Cartridge

TASER Wire

04/08/23 22

Page 23: International Security Expo Itpo New Delhi Finl

TASER

Legal issues in usage of same by private personnel

04/08/23 23

Page 24: International Security Expo Itpo New Delhi Finl

TASER video clip

04/08/23 24

Page 25: International Security Expo Itpo New Delhi Finl

CARGO SECURITY

Whether the container is a seagoing CAN, carried on flatbed by rail or road, or a long-haul trailer or aircraft ULD, system secures it.

Analyze every equipped container for chemical indicators, biologicals, volatiles and radiation and ensure that dangerous materials and illegal goods are not given free passage.

By verifying that the Bill of Lading is accurate actually speed up the handling process and throughput for the handling yard.

04/08/23 25

Page 26: International Security Expo Itpo New Delhi Finl

04/08/23 26

Page 27: International Security Expo Itpo New Delhi Finl

Virtual security

Cyber warfare

Networked video surveillance systems

04/08/23 27

Page 28: International Security Expo Itpo New Delhi Finl

Leverage Customer IT Investments New video services are changing the way companies conduct business. Security providers offer online services that allow a customer to access

their local video surveillance systems via the Internet for realtime and historical viewing of their cameras, plus control pan/tilt/zoom (p/t/z) units.

Customers view, store and retrieve video images from their local DVR unit, while leveraging their existing infrastructure.

A common misconception by customers is that they need Internet protocol (IP) video solutions to perform the aforementioned tasks.

When a customer requests IP video, to access live and stored video footage using a secure Internet network.

build robust IT capabilities to provide services without taxing the customer’s IT infrastructure.

these systems allow companies to leverage their existing security and IT investments.

04/08/23 28

Page 29: International Security Expo Itpo New Delhi Finl

Innovative video search

Image Content Navigation (ICN)

ICN is a tool designed especially to make operator navigation faster and easier when tracking targets.

An invisible mesh of hyperlinks connects cameras together in the video.

To track a target with ICN operators simply need to click areas in the video to switch cameras and track targets.

This makes real-time tracking targets easier and faster removing the need to switch cameras by manually inputting camera id numbers.

D mapping Cware 2.5D advanced mapping technology enables a virtual duplicate to be made of the monitored location in near 3D, improving the site perspective while enabling intuitive navigation that delivers faster operator response times to incidents.

In 3D users can plan new camera sites to improve performance of the system.

04/08/23 29

Page 30: International Security Expo Itpo New Delhi Finl

Monitoring Via Video Auditing

eVideo Audit is a video monitoring service that provides realtime audits,

notification and exception reporting of a customer’s business processes.

Connect to the customer’s CCTV system to ensure documented business practices are followed with immediate notification to customers as needed.

Regional manager with multiple locations may need to ensure his employees are

wearing the correct attire, the correct promotional items are displayed, the correct number of employees is behind the service counter, and the sales demo units are on display.

However, time and cost to travel to each location to ensure these basic processes are being followed diverts their time from focusing on customers and more pressing business activities.

Work is done remotely & customer notified only if process is not followed.

This service represents a true business partnership, helping customers ensure that their business processes are being followed on a daily basis by their employees at all locations.

04/08/23 30

Page 31: International Security Expo Itpo New Delhi Finl

VIDEO ANALYTICS-MATE

Mate's Video Analytics offering covers "simple" Video Motion Detection to identification of Static Objects (like abandoned Luggage)

provides directional counting and Video tailgating solutions for Physical Access Control

High End Analytics - including the ability to add logic statements that create a dependency between two or more alarms ("AND" "IF" "Repeat") 

System Topology - products are available as DSP based appliances (edge device) and as a Server based system at your monitoring station.

End-user experience – a simple user friendly interface Total cost of ownership – systems are easy to install, configure, train

and provide ongoing support specific additional advantages in specific configurations that include

DVTel, GE (VisioWave), American Dynamics/Tyco (Intellex & VideoEdge), Milestone, Cisco, Advansis and others ( can add additional platforms to this integration)

04/08/23 31

Page 32: International Security Expo Itpo New Delhi Finl

On Guard With 24/7 Virtual Security

Audio and video clips are filtered, reviewed, transmitted and verified. Integrates with intrusion and access control systems,

Monitoring centers a virtual security guard for an organization, protecting it during or after-hours.

Systems can be programmed when an activation signal is tripped. When someone enters an invalid alarm code after-hours, when an

outside motion detector is crossed or whenever anyone enters a server room.

“Innovative alarm companies investing to integrate field systems with monitoring software .

Investment in open architecture technology and a common IT platform allows a to offer their customer online, realtime alarm data and video that helps a customer improve their security and improve their business operations.”

04/08/23 32

Page 33: International Security Expo Itpo New Delhi Finl

Managed Access Control Services

Central station managed access control is ideal. Provides 100 percent of the management and administration

of the customer’s local access control system. Provide new employee access cards, photo ID badges,

changing of door lock schedules, deleting or modifying access levels, generating activity reports and more for the customer.

Eliminates the customer having to purchase, administer or manage access control software on their computer.

Customers can pick up the phone or request all changes via an online, realtime Web portal.

Has access to realtime reports and other system and activity information without an IT infrastructure investment.

04/08/23

33

Page 34: International Security Expo Itpo New Delhi Finl

Corporate Security Advisors

Develop formulate appropriate (fit-for-purpose) cost effective strategies,processes, practices, oversee and support the implementation of chosen solutions.

Identify, assess, and control protective security related risks and effectiveness of controls and processes and programs around protective security management

Strategies, policies & practices for protective and technology security Relevant processes in support of protective and technical security

strategies Programme/project performance is up to required standards Internal and external customer relationships are developed and

maintained Protective security incidents and/or crisis do not compromise operations Security function as a centre of excellence MI and reporting is reflective of risk (appetite, profile, and status) Understand the operational, regulatory, compliance, and governance

environments

04/08/23 34

Page 35: International Security Expo Itpo New Delhi Finl

Key outputs:CSO

•Develop maintain quality, timely, risk focused MI and reporting

• Protective security policies in accordance with regulatory requirements

•Provide recommendations ensuring sound leadership and direction

•Co-ordination of resources to ensure cost-effective control

•Identify implications of relevant policies, legislation, and regulation

•Ensure appropriate and consistent compliance with relevant policies

•Ensure business driven requirements and solutions are identified and agreed

•Identify scope (e.g. costs, time scales, benefits) and sponsor key initiatives

•Support, as appropriate, enterprise wide protective security management

•Establish key metrics and measures key performance indicators

•Validate existing protective security management processes

•Ensure awareness training and education programmes are implemented

•satisfy objectives , are delivered on time and within budget

04/08/23 35

Page 36: International Security Expo Itpo New Delhi Finl

SMART ORGANISATIONS

Make onsite security personnel more efficient. Having a security guard stare at a bank of monitors

for an extended period of time is an ineffective way to detect crime or suspicious activity. The result is “surveillance information overload.”

Cannot humanly process that much information fast enough to prevent or even be effective at minimizing theft or vandalism.

Smart organizations are making their security personnel more efficient by integrating video with security control so that video is pushed directly to security guard’s monitor, PDA or cell phone.

04/08/23 36

Page 37: International Security Expo Itpo New Delhi Finl

Bomb proof trash cans equipped with lcd screens to relay the days news

Colombian Designer miguel cabelloro blazors and T shirts -

04/08/23 37

Page 38: International Security Expo Itpo New Delhi Finl

Unprecedented security at the 2008 Olympics

Technological wonders that officials employed to protect the gamesMATE Intelligent Video’s system was part of a large, highly secretive

integrated video surveillance system installed at the Beijing National Stadium.

Bird’s Nest, cost $423 million to build and years of planning to protect. seating capacity of 80,000 and, in August of 2008, was a central

location of much of the Games Officials in Beijing chose MATE’s Trigger, an embedded processor for

video detection and transmission, to upgrade the Bird’s Nest’s CCTV system to an intelligent video detection system.

Trigger monitored strategic areas and critical points in and around the stadium around the clock.

automated surveillance allowed stadium management to lower supervising costs and increase response time to security alerts.

04/08/23 38

Page 39: International Security Expo Itpo New Delhi Finl

RISK Assesment

Assess and manage security across your international operations.Mitigate the risks and threats facing each of your operating facilities, security consultants will develop a detailed risk assessment and provide a report with specific, actionable recommendations to reduce and mitigate your risks.

Specialized intelligence designed to meet organization’s strategic requirements. including forecasts for specific countries, risk comparisons of specific locations, and in-depth reports on threats such as terrorism, kidnapping and crime.

Security plans Identifies the security risks and steps required to protect organization and assets. Plans cover physical security, personnel security and emergency response protocols.

04/08/23 39

Page 40: International Security Expo Itpo New Delhi Finl

Site security management in high-risk remote locations, experienced security managers help manage everyday security risks on site. They also provide a seamless link to our regional security and medical teams so that immediate support can be accessed in an emergency.

Security training Provide realistic scenarios on personal security protocols and traveler security awareness and preparedness

Logistics management in high-risk environments Provide expertise to assist your operations with the movement and management of resources.

04/08/23 40

Page 41: International Security Expo Itpo New Delhi Finl

A Balanced Approach to Security New exciting technologies and service offerings

aside, security providers should never lose sight of primary objective of asset safety.

Technology gains have created new opportunities

Successful companies will complement their security message with tangible business benefits — a true partnership

04/08/23 41

Page 42: International Security Expo Itpo New Delhi Finl

Security needs to continue to grow to become a viable and competent technical skill such as medicine, law, engineering and the like. India is well short of this objective and the companies that sell product or people to suit their revenue projections are and endangered species but until more professional security personnel, companies, business skills and vendors come into the market, they will continue to exploit the uneducated client market and leave a dirty stain in the industry until it happens.

Risk management is not discretionary spending and business resilience is rapidly becoming a competitive edge.

04/08/23 42

Page 43: International Security Expo Itpo New Delhi Finl

Thank You

04/08/23 43