lodge service - counter terrorism

Download Lodge Service - Counter Terrorism

Post on 17-Jul-2015

77 views

Category:

Business

1 download

Embed Size (px)

TRANSCRIPT

Slide 1

Contingency PlanningRemote Surveillance & Facilities Management

By Steve Goodwin MBE MSyICompliance and Risk Director

Contingency Planning Remote Surveillance and Facilities Management AdvancesBy Steve Goodwin MBE MSyICompliance and Risk Director Lodge ServiceThis Session We will explore:

Contingency Planning & Business Continuity Management (BCM)

The role of the National Intelligence Centre: Remote location via IP network

Monitoring, Control, Management of multiple sites and supply chain, 24-7

Protecting potential targets in the City of London and other locations

The systems and technologies available: Security & Facilities Management

Access control post-evacuation: audio-visual, emergency servicesThis Session Target - we will explore:-Contingency Planning & Business Continuity Management (BCM)The role of the National Intelligence Centre: remote location via IP networkMonitoring, Control, Management of multiple sites and supply chain, 24-7Access control post-evacuation: audio-visual, emergency servicesThe systems and technologies available: Security & Facilities ManagementProtecting potential targets in the City of London and other locationsContingency PlanningBusiness Continuity ManagementISO 22301 / BS25999 - British Standard for BCMA holistic management process that identifies potential threats to an organisation and the impacts to business operations that those threats, if realised, might cause and which provides a framework for building organisational resilience with the capability for an effective response that safeguards the interests of its key stakeholders reputation, brand and value creating activities.

Contingency Planning - Business Continuity Management A holistic management process that identifies potential threats to an organisation and the impacts to business operations that those threats, if realised, might cause and which provides a framework for building organisational resilience with the capability for an effective response that safeguards the interests of its key stakeholders reputation, brand and value creating activities. (ISO 22301 / BS25999 British Standard for BCM (24 month transition 30th May 2014)

Contingency Planningand ResilienceContingency Planningand ResilienceContinuity ofOperationsBusinessContinuityCrisisCommunicationsDisasterRecoveryCyber IncidentResponseInformationSystems ContingencyOccupantEmergencyCritical InfrastructureProtectionStakeholdersFrame ComponentsIntended OutcomeBoardPolicy ProceduresUnderstanding of AppetiteExecutive & Senior ManagementSupporting DocumentsProactive AssessmentOperational ManagementPlans & TrainingUnderstanding of ImpactOther ConsiderationsImpact on CapitalImpact on ChangeInsuranceSynergies between the two

National Intelligence Centre

Connecting Sites & the Supply ChainRemote:1. Management2. Monitoring3. Access Control1. Contingency Planning 2. Crisis & Vital Service Response 3. Disaster Recovery 4. Business Continuity Data & Risk AnalysisIdentify risks, scenarios on site & in the chainThe Intelligence Centre is the hub for Plans:Emergency services & local teamsCrisis Management Centre

National Intelligence Centre: Connecting Sites & the Supply ChainRemote 1) Management 2) Monitoring 3) Access Control. Data & Risk analysis identify risks, scenarios on site & in the chainThe Intelligence Centre is the hub for Plans:Contingency PlanningCrisis & Vital Service ResponseDisaster RecoveryBusiness ContinuityCrisis Management Centre emergency services & local teams

Why Remote?

Central resource & control of multiple sites, teams, disciplines & systemsIntegration: alarms, CCTV, Facial Recognition, audio, access control, man-down, EPOS, Detectives, vehicle trackingAway from danger, contamination, crime scene, influence & tamperingCommunication: deployment by multiple comms links RF, data over IP, SMS, emailRestore services to new, disabled or temporary siteCost savings: outsource to share resources; back-up; redundancy; extra expertiseWhy Remote?Central resource & control of multiple sites, teams, disciplines and systemsIntegration: alarms, CCTV, Facial Recognition, audio, access control, man-down, EPOS, Detectives, vehicle trackingAway from danger, contamination, crime scene, influence & tamperingCommunication: deployment by multiple comms links RF, data over IP, SMS, emailRestore services to new, disabled or temporary siteCost savings. Outsource to share resources; back-up; redundancy; extra expertiseTimelinePre-emptand Prevent

Disaster StrikesReduceWithin Minutesor HoursRespondWithin Hoursor DaysRecoverResumeWithin Weeksto MonthsRestore ReturnDisaster Strikes

Remote Monitoring& Access Control

Lights On

CCTV

Unlock Doors

Audio Link

Man DownTested with out of hours delivery for major retailersVehicle in transit GPS monitoring and 2-way commsControl evacuation & emergency services entry & egressServices control: power supply, lighting, Lifts, HVAC, fire controlDeploy local emergency & service teams (e.g. lift repairs)Access Control:

Remote Monitoring & Access ControlTested with out of hours delivery for major retailersVehicle in transit GPS monitoring and 2-way commsAccess control: lights on > CCTV > unlock doors > audio link > man-downControl evacuation & emergency services entry & egressServices control: power supply, lighting, Lifts, HVAC, fire controlDeploy local emergency & service teams (e.g. lift repairs)Target Protection

ScenariosDataRisksPlanDeployTestConsider traffic & spaces: staff, deliveries, suppliers, public access & out of hoursAnalysts: assess statistics, incidents, response time, costed alternativesEvidence: coordination of technology, detectives, investigationTesting: rehearsals, detectives, secret shopper - trainingstaff interviews & checksstore detectives, secret shopperExternal v Internal threats:Target ProtectionLoop: Data Scenarios Risks Plan Deploy - Test Consider traffic & spaces: staff, deliveries, suppliers, public access + out of hoursExternal v Internal threats: staff interviews & checksstore detectives, secret shopperAnalysts: assess statistics, incidents, response time, costed alternatives Evidence: coordination of technology, detectives, investigationTesting: rehearsals, detectives, secret shopper - training

Technology & Systems

IPReview range of technology platforms and compatible devicesSystemsRF radio, internet telephony, alarms, CCTV, audio, access control, man-down, EPOS, Building Services1. Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard Receivers 2. CCTV connections are supported via Immix, Sureview International, othersLodge Service Accrington centreOutsource to share resources; back-up; redundancy; extra expertiseTechnology & systemsIP review range of technology platforms and compatible devicesSystems - RF radio, internet telephony, alarms, CCTV, audio, access control, man-down, EPOS, Building ServicesLodge Service Accrington centre Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard ReceiversCCTV connections are supported via Immix, Sureview International, othersOutsource to share resources; back-up; redundancy; extra expertiseOperational Risk Components

Purpose /VisionStrategyExternal EventsEg Weather/TerrorismCore ProcessesCritical SystemsColleaguesFacilitiesSuppliers & Outsource PartnersChange Agenda1-3 YearStrategic PlanControl Self AssessmentOperational RiskBusiness ContinuityInsurance ProgrammeOperational Risk Strategy & PlanKey ControlsEnd-to-end Process ViewTop-down Operational Risk ProfileBottom-up Operational Risk ProfileIncident & Near Miss ReportingResilienceWork-Area RecoveryDisaster RecoveryPoliciesClaimsIncident & Crisis ManagementOperationalRisk AppetiteOperationalRisk CapitalReportingScenarios

FinallyEmbedding the CultureDefine overall risk appetite at Board level. Holistic buy-in paramountAligned to business processes, including suppliersPractical considerations need policies & proceduresIntegration: Risk Department, Business Continuity, Incident Management, Security, Facilities Management. Keep things simple common languageReviews: data analysis, risk assessment, scenarios, TESTINGPotential to drive efficiencies and cost-savings: set KPIs and ROIFinally: Embedding the CultureDefine overall risk appetite at Board level. Holistic buy-in paramountAligned to business processes, including suppliersPractical considerations need policies & proceduresIntegration: Risk Department, Business Continuity, Incident Management, Security, Facilities Management. Keep things simple common languageReviews: data analysis, risk assessment, scenarios, TESTINGPotential to drive efficiencies and cost-savings: set KPIs and ROIYOUTHANK

Recommended

View more >