Security Insider April/May 2018

from ASIAL

Scroll for more

Page 1

Vol.23 | Issue 1 | April/May 2018


Women in security shifting the gender balance See page 26

14 Q&A with ASIAL Board member, John Hadden

34 How to survive and thrive as a modern security professional

36 Workplace relations in 2018 will be tough for employers

Contents Vol.23 | Issue 1 | April/May 2018


34 14






06 President’s Message

12 Labour Hire Licensing Act 2017 (QLD)

36 Workplace relations in 2018 will be tough for employers

18 ASIAL staff profile

38 ASIAL monitoring centre listing

19 Let the games begin

40 ASIAL new member listing

26 Women in Security – Shifting the gender balance

42 ASIAL event calendar

07 Hot Products 08 Is your organisation ready? 09 Vale Steve Jackson OAM 11 A consistent national approach to alarm categorisation and police response


4 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

Making a building smarter can be simple. Meet leading surveillance and access control suppliers and discover security solutions to protect your occupants at 2018’s most important facilities management event.

18-19 April 2018 Melbourne Convention & Exhibition Centre

Facilities Management 2018. Smarter in every way.

Supporters & partners

The Experts in Hygiene

Register online for free entry



Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited


PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 | Fax: 02 8425 4343 Email: Web: Publisher

Editor Natalie Shymko

By the time you read this, the 2018 Gold Coast Commonwealth Games will be underway and the security infrastructure implemented by GOLDOC will be keeping all involved in the Games safe and secure. ASIAL has worked closely with GOLDOC for over two years in helping to facilitate the provision of the 4,000+ games security officers. Typically the provision of manpower services for events such as this is put out to tender. As a result there is one provider who is generally the lowest bidder who then struggles to provide the required numbers and roster coverage. GOLDOC’s process was to select four prime providers, set the parameters, negotiate the contracts and employment agreement and establish a training regime. As a result the stress of ensuring Games Security Officer delivery is shared and all prime providers have been working together for the past 18 months to deliver. GOLDOC is confident that the four primes will deliver the required quota of highly skilled workers. At the regulatory level, the introduction of national labour hire licensing requirements is an issue that is actively being advocated by some. Several states are already addressing this issue with the introduction of new legislation. The full impact of these changes on our industry is yet to be seen. What is clear is that depending on how the states interpret our industry as labour hire providers we may face additional regulatory requirements and licensing costs on top of the current security licensing requirements. ASIAL is

actively monitoring the situation and has lodged a submission to the Queensland Office of Industrial Relations recent consultation paper seeking an exemption for security providers from the requirements which come into force this month. Now to some exciting news. After more than five years of discussion and persistent follow up, a National Alarm Activation Guideline has been signed off by all Police Commissioners. In the coming month the National Emergency Communications Working Group – Australia and New Zealand (NECWG-A/NZ) in conjunction with ASIAL will release details of the guideline to the industry. In addition, the Association has engaged with Comtech Training to improve ASIAL’s Security Technician Certification (STC) program. The STC program has been designed to upskill security technicians and provide a career pathway. Full details will be available soon on the ASIAL website. Finally, I look forward to meeting ACT members at the upcoming ASIAL Industry Breakfast Briefing in Canberra on 9 May 2018.

Editorial Enquiries Advertising Anna Ho I I Graphic Design + Digital Mitch Morgan Design 0402 749 312 Editorial Contributors Chris Delaney, David J Brooks & Michael Coole, Nick Karas, Caroline Sapriel, Natalie Shymko Print + Distribution Whirlwind Print Pty Ltd Published bi-monthly Estimated readership of 10,000 Views expressed in Security Insider do not necessarily reflect the opinion of ASIAL. Advertising does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions are welcomed, though the publisher reserves the right to decline to publish or to edit for style, grammar, length and legal reasons. Press Releases can be emailed to: Internet references in articles, stories and advertising were correct at the time of printing. ASIAL does not accept responsibility form is leading views. Copyright©2018 (ASIAL) All rights reserved. Reproduction of Security Insider magazine without permission is strictly prohibited. Security Insider is a subscription based publication, rates and further details can be found at [NEXT ISSUE] JUNE/JULY 2018 Printed ISSN 1442-1720 Digital ISSN 2207-8282

Kevin McDonald President 2,900

Avg Net Distribution per Issue

Security Insider is independently audited under the AMAA's CAB Total Distribution Audit. Audit Period: 01/04/2016 - 31/03/2017

6 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8


HOTPRODUCTS DAVANTIS are the experts in video analytics for perimeter protection

• Advanced perimeter protection for intrusion, loitering, tampering, object removal and stopped vehicle detection. • Intrusion videos of any breached perimeter are sent directly to a monitoring station or to a mobile device APP for remote viewing. • CCTV cameras are great, once coupled with the Davantis software and its algorithms they become extremely efficient security tools. • Providing effective perimeter protection solutions around the world, the Davantis solution is internationally recognised for its quality. • With over 6000 km’s of combined perimeter currently under surveillance with Davantis across more than 40 countries, it’s proven a solution you can trust. Video Alarm Technologies Pty Ltd p








RULES CHANGING 1300 46 44 55

Your Partner in Electronic Security Products











2018 Security Exhibition & Conference From July 25-27 thousands of security industry professionals will converge at the Melbourne Convention and Exhibition Centre (MCEC) for Australasia’s premier security industry event, the Security Exhibition & Conference. Organised by ASIAL in partnership with Diversified Communications Australia, the 33rd annual event will feature an impressive exhibition display, worldclass conference and more. The line-up of speakers for the 2018 ASIAL Security Conference and Executive Briefings is now available. The program features a distinguished panel of local and international experts who will address a range of thought provoking topics. To view the conference program: To register for the exhibition:

Is your organisation ready? On 22 February 2018, the Privacy Amendment (Notifiable Data Breaches) Act 2017 came into effect. The Notifiable Data Breaches (NDB) scheme applies to all agencies and organisations with existing personal information security obligations under the Australian Privacy Act 1988 (Privacy Act). The NDB scheme introduces an obligation to notify individuals whose personal information is involved in a data breach that is likely to result in serious harm. This notification must include recommendations about the steps individuals should take in response to the breach. ASIAL’s eLearning course, Privacy Awareness has been updated to include information about the Notifiable Data Breaches Scheme.

To find out more go to:

8 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8




The review of the Certificate II and III in Security Operations has been completed. Artibus Innovation sought further comment on the updates made to the package following the first round of public consultation. Feedback from the first round of consultation broadly supported the proposed qualification and unit contents. Specific feedback from Employers, RTOs and Regulators was sought to address minor gaps in areas such as counter terrorism and the Australian Crowded Places Strategy as well as preserving crime scenes and presenting evidence. The proposed Certificate II aligns with mandatory licensing for a security officer. License endorsements and career development needs are catered by a new Certificate III qualification. The addition of a Close Personal Protection Certificate III recognises this area as a distinct vocational outcome. The open consultation has now ended and the final case was provided to State Training Authorities for review and approval. The Industry Reference Committee met on Friday 16 March to conclude the training package documentation prior to submission to the Australian Industry & Skills Committee in April 2018.

Feedback from the first round of consultation broadly supported the proposed qualification and unit contents.

STEVE JACKSON OAM It is with sadness that we advise of the passing of Steve Jackson. Born in 1960, Steve Jackson was the son of a coal miner from South Yorkshire in the United Kingdom. As Group Head of Security for Qantas, he held group wide accountability for aviation security, business resilience, business continuity, crisis management strategies and cyber strategy. Prior to joining Qantas, Steve enjoyed a 20 year career with the Australian Federal Police (AFP). He was the AFP’s operational commander for the Sydney 2000 Olympic Games and the AFP’s Field Commander during the joint AFP/Indonesian National Police investigation following the Bali bombings in 2002. He was awarded the Medal of the Order of Australia for his work in Indonesia. Steve played an active leadership role in the industry both locally and internationally, and was widely respected. In late 2017, Steve presented a Tedx Talk about his life and thoughts on leadership. To view this go to com/watch?v=ZO3dAmUqVQQ Our thoughts and condolences go out to Steve’s wife and family.



FOCUS ON COUNTER TERRORISM IN SOUTH AUSTRALIA While South Australia’s terrorism risk profile is relatively low, the threat of terrorism, like other emergencies and serious crime, cannot be eliminated entirely. The national terrorism threat level across Australia remains PROBABLE. Credible intelligence, assessed by security agencies, indicates that individuals or groups have developed both the intent and capability to conduct a terrorist attack in this country. Keeping South Australian’s safe: A focus on counter-terrorism describes the range of government arrangements in place to protect and support South Australians before, during, and after an act of terrorism should such an event occur. Recognising that the government can’t do this alone, Keeping South Australian’s safe: A focus on counterterrorism provides guidance on how to stay informed and engaged. Countering terrorism is a shared responsibility between government, the private sector and the community. By working together the threat and impact of terrorism in South Australia can be minimised. A strong, connected community is the greatest asset in the fight against terrorism.

To download the document go to: sa-a-focus-on-counterterrorism

10 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

ASIAL in the news On 28 February ASIAL’s CEO, Bryan de Caires was featured in a home security story which aired on Channel 10’s The Project. To watch the story go to channel-ten/the-project/2018/2/28

Changes to the WA Liquor Control Regulations 1989 From 1 July 2018 crowd controllers employed on licensed premises will need to successfully complete responsible service of alcohol training. For further information liquor-news/changesto-the-liquor-controlregulations-1989


A consistent national approach to alarm categorisation and police response Cabling in the customer’s premises for the nbn™

After more than five years working with police communications from across the country, ASIAL can announce that a national guideline introducing a consistent policy for the way in which Australia policing jurisdictions categorise and respond to alarm activations is nearing finalisation. Details of the guideline which has been approved by Police Commissioners will be made public soon.

To read the guideline go to

The G649:2017 Cabling existing telecommunications services in the customer’s premises for the nbn™ has been rewritten to address the complexities of the more than 40 different scenarios that Australia’s 73,000 registered cablers can encounter when making installations under the NBN multitechnology-model. The guideline was developed by Communications Alliance and its members.



LABOUR HIRE LICENSING ACT 2017 (QLD) A new mandatory labour hire licensing scheme will commence on 16 April 2018 and will apply to all labour hire providers operating in Queensland. The scheme contains significant amendments which will apply broadly, including to people and businesses that may not consider themselves in a labour hire arrangement. The scheme establishes a mandatory business licensing scheme for the labour hire industry in Queensland requiring all labour hire providers to be licensed and requires all labour hire arrangement to be with licensed providers. It applies where work is performed by labour hire workers in Queensland, regardless of whether or not the labour hire worker or company is based in Queensland.

Who does the scheme cover? ­­The scheme applies to labour hire providers in Queensland who in the course of carrying on a business supply workers to another person to do work. ­­The scheme also covers the users of labour hire services in Queensland and requires that users of labour hire only use licensed providers. ­­Interstate or overseas organisations that provide labour hire services in Queensland will need to be licensed if they operate in Queensland. ­­If you supply workers to other persons to do work, you will most likely be covered by the scheme unless the Act or a Regulation provides otherwise. ­­The Act does not cover: 33 workers doing voluntary work 33 students placed in work experience positions ­­Pursuant to section 7(3), the following persons do not provide labour hire services merely because they are: 33 a private employment agent under the Private Employment Agents Act 2005 33 a contractor who enters into a contract to carry out construction work within the meaning of the Building and Construction Industry Payments Act 2004 engaging subcontractors to carry out the work; 33 another person or class of person prescribed by regulation. ­­However, if these persons provide labour hire services they will be within the scope of the Act. The cost of a licence fee will be $1,000 (small labour hire provider), $3,000 (medium provider) and $5,000 (large provider). The penalties for breaching these obligations are significant, including financial penalties and imprisonment. Security providers should review their operations to ensure they comply with the new labour hire licensing requirements.

For more information visit regulation-labour-hire-industry/questions-and-answers/

12 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

The scheme establishes a mandatory business licensing scheme for the labour hire industry in Queensland


ACMA CABLING COMPLIANCE AUDIT REPORT The Australian Communications and Media Authority regulates the customer cabling industry under the Telecommunications Cabling Provider Rules 2014 (CPRs) to ensure that minimum cabling requirements are in place to promote safety and maintain network integrity. The ACMA made customer cabling a Priority Compliance Area (PCA) in 2016–17 following recommendations made by stakeholders including cabling registrars, and in recognition of significant changes that have taken place in the customer cabling operating environment. For example, customer demand for cabling has evolved from basic

telephone access to connection of numerous smart devices and internet access in homes and workplaces. The primary objective of the PCA program was to obtain a compliance ‘snapshot’ of the industry while addressing any compliance issues encountered. The ACMA relied on multiple sources of information including input from cabling registrars, registered cablers (via an on-line survey) and physical site inspections conducted by ACMA inspectors. To read the report go to:

REQUEST FOR TENDER Access Control & Video Intercom One Darling Harbour, a prestigious residential apartment building on the edge of Darling Harbour is currently seeking tenders. We are looking to hear from qualified companies for the replacement/upgrade to both the video intercom system & access control software programme. The tender is for both supply and installation with innovative solutions assessed favourably.

Tenders close 30 May 2018

For further details contact Facilities Management on (02) 9211 4448 or by email


Q& A

Natalie Shymko, ASIAL’s Marketing and Communications Manager talks to our Board Member, John Hadden


John Hadden Natalie: Please tell us a little about yourself.

John: My company and I have been in the industry for some 36 years. I am a Life member of the Victorian Security Institute, sit on the Victorian Security Industry Advisory Council and am currently an ASIAL Board member. I am still very hands on in the day to day running of the business and I think it is that passion for the business that drives me and the team around me.

14 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

Q& A

“In terms of broad challenges, as the new technologies come into play across the industry, the security industry faces the challenges of cyber security threats, as do all industries”

I founded Top Tech in 1982 with contracts to supply vehicle security and communications to national fleets. Top Tech evolved into a specialist provider of security systems for an enviable roster of national and multinational clients. In early 2000 I broadened the focus of Top Tech to the provision of general commercially available CCTV, intrusion and Access Control systems for industrial, commercial and corporate clients. We subsequently also moved into the domestic segment on the market. We also remain in the high security end of the business through the division that undertakes armoured vehicle builds and refurbishments. Natalie: What changes have you seen in the security industry? John: Too many to detail. Clearly the big one is the ever increasing technology that is available and the effect that has on systems available to both commercial clients, but moreover to the domestic market. Things such as affordable IP CCTV systems, the ability to view live and recorded vision remotely and cost effectively, and the raft of features available in entry level products, such as video analytics, which were once the domain of large expensive commercial systems. The other big change is industry regulation, and therefore a level of increasing professionalism.

Natalie: What is the biggest challenge/opportunity facing the security industry over the next five years? John: In terms of broad challenges, as the new technologies come into play across the industry, the security industry faces the challenges of cyber security threats, as do all industries. Be it back of house and the requirements of the Privacy Amendment (Notifiable Data Breaches) Act 2017, hacking attacks on security or CCTV systems through to vulnerabilities of the various devices in daily life that rely on the ‘Internet of Things’, all organisations are going to have invest more focus, time and effort in this area of their business. One specific industry challenge, the eradication of sham contracting, is a challenge that ASIAL actively supports and has shone a light on in the past through work with Government agencies and undertaking industry surveys. It is an insidious practice that, aside from being unlawful, is in my view morally reprehensible. It particularly targets individuals in those areas of the industry on hourly rates, and that leads to exploitation resulting in payments of well below award rates. I think a big opportunity on the technology front will be the growth and increase in uptake of cost effective home automation systems, and how the current or new security systems fit into that. I believe there is an opportunity for installers that wish to invest in training to grow their share of the market and be more than an alarm or CCTV installer but can assist in all manner of home automation.

Natalie: What are your top two focus points as ASIAL Board member and why? John: A national licensing scheme for security industry participants. It makes no sense in this day and age that each state and territory has its own licensing requirements and its own regulator. In an ideal world ASIAL wishes to see implementation of uniform and consistent strategies for security licensing for individuals and business at a national level. We need a national licencing scheme that would allow all industry participants to work across state boundaries without the minefield and costs of the mutual recognition programs. Further to the national licencing scheme, I believe that any scheme must be supported by uniform training and compliance requirements for individuals and businesses. As with licencing, there are inconsistent requirements across various states and territories. Natalie: How is your role at Top Tech Security Systems (AUST) Pty Ltd going? John: Being a Managing Director (as with all Managing Directors), my role is always very demanding. As with any small to medium sized enterprise there is a constant demand to stay in touch and implement various changes to regulations, work practices, technology, taxation, HR etc. I still love the business and always enjoy the challenges that it brings, particularly technology. I am quite happy with my role as MD and plan to continue for as long as they will tolerate me. SECU RIT Y INSIDE R | APR /MAY 2 018 15



THE SECURITY EXHIBITION AND CONFERENCE returns to the Melbourne Convention and Exhibition Centre on 25-27 July, offering three days of business networking and intelligence sharing. This year’s theme is Securing Innovation and powered by ingenuity and invention, will showcase the latest technology and cutting edge thinking - from physical and electronic solutions, to biometrics and artificial intelligence. The Security Exhibition also features a Cyber Security Zone designed to meet increased demand for the adoption of solutions to protect data from threat of breach and cyberattacks. The ASIAL Security 2018 Conference, held alongside the Security Exhibition will host a compelling program of renowned local and international experts and academics with case study evidence on how to protect your business, brand reputation and vital assets along with mitigating risk and vulnerability. It is your annual opportunity to receive fundamental updates from the organisations shaping today’s security landscape in a program carefully curated by the industry’s peak body. Learn proven strategies to tackle your security challenges with crucial intelligence on the ever-changing landscape. The format and content has been updated to reflect critical industry updates on the first day, followed by your

choice of in-depth streamed sessions on the second and third days of the program. Take a first-hand look at what’s next for the security environment including intelligence on managing threats and identifying risks. Visit for full session details. Limited Early Bird passes are available so book now to take advantage of this discount and avoid disappointment as the 2016 and 2017 programs sold out. The annual Gala Dinner hosted in partnership with ASIAL also returns to Melbourne recognising achievements from the year in the security industry. This ultimate networking evening brings together security professionals from across the globe to celebrate, engage and socialise with colleagues, suppliers, and clients. Held at the Etihad Medallion Room, Etihad Stadium on Thursday 26 July, 2018 (6.30pm – 10.30pm), incorporating a threecourse meal and fine wine, the evening recognises the Best New Product Awards and features great entertainment. Tickets are on sale now and are expected to sell out fast. (Available as individual seats or tables of 10).

Book now at 16 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

Headline Speakers include

Dr Lisa Warren, Clinical/Forensic Psychologist and Founder, Code Black Threat David Crompton-Guard, Business Continuity Manager, Safety, Security & Resilience, Metro Trains Arye Kasten, Chief Executive Officer, M.I.P. Security Commander Geoffrey Smith, Tasmania Police Danny Baade, Head of Security, Gold Coast 2018 Commonwealth Games Corporation Caroline Sapriel, Managing Director, CS & A International Dave Brooks, Post Graduate Course Coordinator, Security Science, Edith Cowan University

25 – 27 JULY 2018

SECURING INNOVATION The 2018 Security Exhibition & Conference: Powered by ingenuity and invention, showcasing the latest technology and cutting edge thinking. From physical and electronic solutions to biometrics and cyber security, Australia’s largest security event offers three days of business networking and intelligence sharing. Limited stand space available. Contact the team to find out more: or 03 9261 4500

Leading industry partner



5 Minutes with Anna Ho Marketing and Communications Officer

What is the most-read book on your shelf? I don’t often re-read books. My fiancé just recently gifted me The Subtle Art of Not Giving a F**k by Mark Manson. It’s currently a New York bestseller and I’ve been trying to read it on my commute to work and back home. What film can you watch over and over again? Coming to America! This movie never gets old for me. I laugh harder each time I watch it or remember scenes from it. Where is your favourite place in the world and what makes it so special to you? My favourite place in the world would have to be London. I lived there for almost three years and it’s like a second home for me. I love that it’s a short train ride way from so many countries. Tell us your favourite quote of all time? ‘I like my money right where I can see it… hanging in my closet.’ — Carrie Bradshaw What is your favourite song or album? Him and I by Halsey. I’m going to her concert in April. How do you like to spend your weekends? I start my Saturdays with having a little sleep in because I usually get up early on the weekdays. I’m currently planning a wedding so I would go run some errands for that and catch up with friends for brunch or dinner. Sundays are spent catching up with family and cleaning. What do you most enjoy about working at ASIAL?


18 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

I enjoy my role the most as it allows me to work on different areas of marketing and communications, from Security Insider Magazine to the annual Australian Security Awards. I’ve also developed some great friendships over the past two years that makes working at ASIAL fun from day to day.


Let the

Games begin On 4 April 2018 the eyes of the Commonwealth focused on the opening of the 2018 Gold Coast Commonwealth Games. More than 6,600 athletes and team officials from 70 nations and territories converged on the Gold Coast for an 11 day sporting and cultural event. As the first regional Australian city to ever host a Commonwealth Games, the Games were an exciting spectacle. With the support of almost 15,000 passionate and friendly volunteers, 18 sports and 7 para-sports the event was broadcasted to a cumulative global audience of 1.5 billion. Over 1 million spectators watched the Games across the 18 sites. The Games was the largest sporting event to be held in Australia for over a decade. Delivering a fun and friendly games in a safe and secure environment was the number one priority for the Gold Coast Commonwealth Games Organising Committee (GOLDOC). The customised approach to deliver the appropriate security workforce was a key strategy to deliver this. The three tier security framework implemented for the Games harnessed resources from the private security industry, police and state/ federal agencies. The security industry provided more than 4,000 licensed security personnel from Queensland and across the country, as well as more than 350 security cameras and video management software, drones, fencing, physical barriers and scanning equipment. The industry’s contribution made up a significant part of the overall security mix for the Games.


18 sports

7 para sports

Cumulative global audience of 1.5b

1 million spectators across 18 sites

To ensure the facilitation of these services by the industry, ASIAL committed significant time and resources to working closely with GOLDOC. The resulting collaborative approach developed between GOLDOC and ASIAL was very productive. The Association’s involvement included negotiation of a Multi-Employer Enterprise Bargaining Agreement covering work by security personnel at the Games. In addition, ASIAL provided GOLDOC with an eLearning platform which enabled Games security personnel to undertake a pre-games induction program. The approach taken by GOLDOC was comprehensive and ground breaking. The appointment of four prime private security contractors for the games highlighted the collaborative approach taken. Senior management and operational personnel from these prime contractors were embedded for the past 18 months within the Games team – including GOLDOC security personnel and police. The refreshing approach taken by GOLDOC for the Games marks an important shift in the relationship between the industry and law enforcement agencies. The Games illustrated that through mutual respect and collaboration, security and law enforcement agencies could work together towards delivering a common goal. When the Games commenced, years of planning and hard work came to fruition - not just for the athletes but also for those working behind the scenes at GOLDOC. So whilst you’re enjoying the games, spare a thought for all those who worked hard behind the scenes and those on the frontline who delivered a fun and friendly Games in a safe and secure event.

Online learning for Security Officers at the 2018 Commonwealth Games SECU RIT Y INSIDE R | APR /MAY 2 018 19



The critical skill you need before, during and after a crisis

By Caroline Sapriel

Globalisation and the increasing interdependence of our societal systems are generating multiple levels of stakeholders that are a challenge to engage with in normal times but that become a nightmare to manage in a crisis.

2 0 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

Besides employees, regulators, politicians, victims, customers and shareholders, organisations now also have to reckon with other stakeholder groups that become involved through social media networks. The multitude and diversity of these intertwined stakeholder groups are compounding the intensity of crises. Overall, we are witnessing more stakeholder outrage at corporate and institutional misbehaviour. Statistics from the Institute of Crisis Management’s 2017 annual report show that 68 per-cent of business

crises worldwide are non-eventrelated, or smouldering, crises. Often the problem or issue exists long before it goes public, yet little is done to address and resolve it or worse it is covered up, before it escalates. A single trigger – a rumour, a leak, or a stakeholder action – can catapult an organisation into crisis in a very short time, with devastating effects. In the BCI Horizon Scan 2018 Report, Howard Kerr, BSI Chief Executive, writes, “The business world has changed significantly


Stakeholder mapping consists of identifying all audience groups with a stake in the crisis

since the report launched, yet there is remarkable consistency to the top business threats. Whilst the pace of technology development moves at lightning speed, the role it plays in society and how it supports business simply becomes more fundamental. So it’s no surprise cyber-attacks, data breaches and unplanned IT outages remain the top threats – if these threats are exposed, the impact can be significant to operations and ultimately reputations.” In 2017, a number of high profile cases have hit a wide range of industries from healthcare to retailers and financial services to name a few. As a top threat, a cyber attack is difficult to detect and prevent, with cyber criminals ever so creative and resourceful in their drive to cause maximum disruption. Author of Future Crimes, Marc Goodman writes: “Just one compromised e-mail account on Facebook, Google, or Apple can give hackers access to years of your e-mail messages, calendar appointments, instant messages, photographs, phone calls, purchase histories on Amazon, bank and brokerage accounts, and documents in Dropbox or on Google Drive.” “According to a Verizon study, once hackers set their sights on your network, 75 percent of the time they can successfully penetrate your defenses within minutes and that only 15 percent of the time it take more than a few hours to breach a system,” adds Goodman. As we have already witnessed in numerous cases, the impact of a cyber attack can be devastating: on the very ability of the organisation involved to continue to operate and on the affected stakeholders (employees,

customers, etc). Potentially the greatest long-term impact is the loss of trust. The ability to retain stakeholder trust is the differentiating factor between a crisis and a reputation train wreck. So once an organisation has been targeted, what can be done to mitigate the damage and prevent a reputation meltdown? Every period of turmoil is frightening. It challenges the status quo and threatens our comfort zone. Crises all call for focus and steadiness. Perhaps the clichéd navigation metaphor can never be too relevant: To ride out the storm, one must hold the course. Internet-based news sources allow individuals worldwide to follow such situations. Social networking sites, blogs and online news sites can play a big role in the unfolding of crises and scandals in the public and private sectors; the popularity of Twitter and Facebook, for example, has led to the light-speed dissemination of information and misinformation alike. There is no clearer sign that stakeholder mapping must be high on the priority list of any well-trained crisis teams today. To anticipate, prevent and mitigate crises, crisis leaders must have a solid grasp of the climate in which they are working as well as the stakeholder scene surrounding any emerging issue. Yet stakeholder mapping is not an improvised task. It requires skills and a process. Stakeholder mapping consists of identifying all audience groups with a stake in the crisis and categorising them in at least three groups: allies, neutral and opposition. “Stakeholder mapping identifies stakeholder expectations and power Continues over page >

Stakeholder Mapping Steps Identify all audience groups, no matter how small or remote to the crisis situation, that have a stake in the crisis.


Categorise audiences in at least three groups: allies, neutral and opposition.


Define each audience group’s specific issues regarding the situation, whether a group is likely to take any action, and whether the organisation has any influence on this group (and if not, focus instead on the ones that can be influenced).


Define the desired outcome, the strategy for reaching it and the key messages to use. Stakeholder mapping is a continuous process, being reviewed, adjusted and fine-tuned as the situation develops and more stakeholders come onto the scene.




5 STEPS TO MITIGATING THE IMPACT OF A CRISIS 1 Steer the course. In addition to projecting strength, management must take a number of steps to successfully steer the organisation through the crisis and toward recovery. Thorough training to undertake each of these tasks can help any executive prepare for even the worst crisis situations.

during the Tylenol crisis in the early 1980s. Burke had worked hard to meet the company’s credo and was able to address the public’s worst fears while projecting a positive image on behalf of Johnson & Johnson.

4 Map the stakeholders. Executives must understand

carefully sort out a crisis before they can truly address it. They must understand what happened and why. Failure to understand the anatomy of a crisis will seriously impair recovery efforts.

who is affected by a crisis and how they should be addressed. Carefully plotting stakeholders’ positions is one of the most useful tasks. Armed with this strategic insight, crisis teams can develop resilient action plans to proactively protect the organisation’s reputation.

3 Craft a mission statement. For an organisation to

5 Plan for the worst. While management is naturally

2 Make sense of the crisis. Crisis leaders must

emerge from a crisis with minimal adverse effects, its leaders must craft a strong mission statement at the onset of the crisis. Perhaps one of the strongest examples of such a statement in modern times comes from Johnson & Johnson CEO Jim Burke

and helps in understanding political priorities,” write Gerry Johnson, Kevan Scholes and Richard Whittington, Ph.D., in their book Exploring Corporate Strategy. “There are different ways in which stakeholder mapping can be used to understand stakeholder influence. It underlines the importance of two issues: (1) how interested each stakeholder group is in impressing its expectations on the organisation’s purposes and choice of strategies, and (2) whether stakeholders have the power to do so. No crisis manifests itself the same way as another, and no one can predict exactly how long a crisis will last, how it will twist and turn, and how it will end up. What is always almost certain, though, is that the situation will get worse before it gets better. Yet in any crisis, however long it lasts, there are periods of intense activity with information overload within very short time spans, and other periods of virtually no change or development and

senseless waiting. Considering time pressures, building different worst-case scenarios in a crisis is invaluable. Instead of remaining reactive, the team can be pro-active and keep its spirits up during the inevitable downtime periods. Under the high-pressure conditions of a crisis, scenario planning helps the team pursue a dominant strategy related to the likely worstcase development. This is not a matter of gazing into a crystal ball to predict the future, but rather a fast and powerful methodology to be ready for the worst. “The great virtue of the scenario approach to planning,” write Charles Hill and Gareth Jones in their book Strategic Management Theory: An Integrated Approach, “is that it can push managers to think outside the box, to anticipate what they might have to do in different situations, and to learn that the world is a complex and unpredictable

2 2 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

reluctant to think of worst-case scenarios, it is necessary to do so. Anticipating the next level of deterioration or escalation allows crisis teams to generate strategies that will hold up during the toughest times.

place that places a premium on flexibility, rather than on inflexible plans based on assumptions about the future that may turn out to be incorrect.” All of today’s crises have one thing in common: acute stakeholder pressure before, during and after. Actively mapping and engaging with stakeholders is a make or break opportunity every business leader should pursue to mitigate the impact of crises. When an organisation faces a crisis, be it a cyber attack, an industrial accident, an environmental contamination, a scandal or an ethics breach, taking stock of the situation is a good place to start. It will help determine stakeholders’ position, the areas of influence, and define a strategy based on worstcase scenarios. Only then, can the affected organisation have a better chance to not only survive the crisis but also potentially emerge stronger from it.

About the Author: Caroline Sapriel is Managing Partner of CS&A International, a global consultancy specialising in helping multinational clients enhance crisis resilience via integrated risk, crisis and business continuity planning. Caroline Sapriel will be presenting, Crisis Management – Best Practice Strategies at the Security 2018 Conference on 25-27 July 2018. For more info go to www. au/asial-securityconference/



Security Industry The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals.




Organised by

Entertainment Sponsor:

Date: Thursday 18 October 2018 Venue: Sydney’s Doltone House Hyde Park

2018 SECU RIT Y INSIDE R | APR /MAY 2 018 2 3


Why owners and operators

need to consider systemisation in 2018 Some popular pain points that owners and operators without a system in place are known to experience are: ­­ Limited staff productivity due to excessive time spent on administrative tasks.

Amidst the waves of new technology breaking on our shores, many security business owners and operators can find themselves overrun with 101 different applications and programs that all claim to make a certain grouping of administrative tasks easier. Job scheduling, quoting, invoicing and inventory control are just a small fraction of the various business operations that different companies now claim they can simplify with their software. The number of programs available alone can be overwhelming, but what many seem to be missing is a message that has come with the crest of the 21st century: businesses should be looking to systemise in order to achieve success. A security business’ success rests ultimately on customer satisfaction. If your customer isn’t happy with the service you provide, then neither are you with your profit margins. Systemisation is believed to 24 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

­­ Lack of information on employee whereabouts and business transparency due to the difficulties in monitoring staff travel and consumption via phone or email. ­­ Minimal profits on some jobs due to delayed technicians, misquoting or invoicing errors, ­­ Loss of overall business efficiencies due to an inefficient workflow.

be the path that can lead to not only a happy customer, but also an efficient business model and reputable staff. Systemising your security business is an optimal and simple solution to these common pain points because it streamlines and automates many components of the day-to-day workflow. By implementing various systems to manage the basic components of your business, you can take the time to focus more on the areas where you or your staff are lacking in efficiency and make moves to improve the customer’s satisfaction with your security service.simPRO Software is a systemised solution that takes multiple aspects of your day-to-day workflow and rolls them into a central location from which you and your office staff can work. By keeping your field technicians in direct contact with office staff through the mobile app, ‘Connect’, and tracking your fleet through the ‘simTRAC’ app, simPRO Software gives business owners the opportunity to better understand employee whereabouts, travel and consumption data, and promote better transparency and accountability across their workforce. With simPRO, security businesses can focus on forecasting profits or loss and track actual project costs while eliminating labour-intensive processes. It’s also worth noting that if you or someone you know is a current ASIAL member who is not already using simPRO Enterprise then you can receive 20% off the upfront cost of implementation and training of simPRO’s Enterprise solution.

For more information head to




Shifting the gender balance

Janine Hill

General Manager Business Development, MSS Security & ASIAL VIC Convenor Years in the industry


Women in the security industry are shifting the gender balance and the perception of a predominantly male-orientated industry by taking on more diverse roles. Positive cultural change is turning stereotypes around and providing real career pathways for females.

General views

Statistics provided by state regulators show that in New South Wales, the Australian Capital Territory and South Australia around 10% of the security industry is made up of women whilst in Tasmania and Queensland the figures are slightly higher at around 14%. The types of licenses they typically hold include general guarding, crowd control and unarmed security officers. However, this is changing as the industry grows and evolves, with new opportunities being created for women. ASIAL’s Marketing and Communication Manager, Natalie Shymko asks female influencers in the security industry to provide insight on their own experience, how they got started, what it means to be part of the industry, and what are the challenges and opportunities developing for women.


We need more of them. In the field, women are sometimes able to diffuse a situation of heightened emotions more effectively. In the office, women are able to bring a different, sometimes more customer/employee focused perspective. Challenges Women are often stereotyped as the Admin/HR or marketing person and sometimes it takes time to establish operational credibility. As a working mum it can be difficult to find flexible working conditions and therefore obtain the experience necessary to move on to more senior roles.

Endless in the right company – public and private sector. Potential career paths My view on a career path would be the same as for males. Women can do anything they want to and the path depends on what that is. For example, if you want to be a Security Manager of an airport you might start as an aviation screener or a client account manager. Changes over the past 5-10 years There has been an increased willingness for organisations to be flexible although this is not backed by a true understanding of what that means. Generally a woman needs to prove herself as a trusted employee before a business would consider flexible conditions. Other changes include an increased focus on growing female participation in the private security and more women employed in senior positions within the corporate sector.

ASIAL supported international women’s day on 8 March. #PressforProgress motivating colleagues and communities to think, act and be gender inclusive. ASIAL’s Annual Security Industry Awards for Excellence includes an award that recognises gender diversity in management and leadership roles.

Women in 2 6 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8


Chevelle Millhouse

ACT Manager, Wilson Security & ASIAL ACT Convenor Years in the industry


“The challenge for employers is how to attract more females and retain them within their organisations.” Chevelle Millhouse

General views


My advice to women entering the security industry is to seek mentorship early on in your career. When you first start out it can be challenging to find your voice working in a male dominated industry. Throughout my career I have continuously cultivated and maintained strong relationships with colleagues within my organisations that have provided ongoing professional advice and support. Look externally for mentorship and use your industry networks, such as the Australian Women in Security Network (AWSN). For women who are further advanced in their careers I believe we each have a responsibility to advocate for women in our industry; as our presence grows so does our ability to contribute positively to increasing diversity within our organisations.

All opportunities and career paths that are available to men are also available to women in the security industry. The challenge for employers is how to attract more females and retain them within their organisations. Outside of the industry we can be perceived as a traditionally male sector and this can create barriers for potential candidates considering entry. Whilst there has been progress within the sector in acknowledging the need for greater gender diversity more work needs to be done externally as an industry to make it more attractive for female entrants.

Challenges Overall the industry provides a wide range of rostering arrangements for security officers however there can be obstacles for women due to the operational inability to provide flexible working arrangements in certain roles. On a broader scale there can also be challenges faced with lack of gender diversity. Often females will be outnumbered by males and there can be an underlying assumption that you need to be ‘one of the boys’ to fit in. When working in the industry it is important to choose an organisation that actively seeks and promotes diversity in the workforce.

Changes over the past 5-10 years Over the last decade the heightened security environment has underpinned significant change within the industry. Growth in the sector has provided greater diversity in the opportunities available for employees both entering the industry and throughout their career progression. As the landscape has shifted there has been a notable change in value placed on the various skill sets held by security personnel. While previously there was a focus on hiring staff with security experience or military backgrounds soft skills are now at the forefront of recruitment activities. Competencies in high demand are customer service related and organisations are actively seeking new entrants with experience in industries that have a much higher female workforce such as the retail sector. The increased appetite for soft skills has contributed to attracting a higher number of women into security roles. Continues over page >

security SECU RIT Y INSIDE R | APR /MAY 2 018 2 7


Rachell DeLuca

Senior Security Consultant, Arup & 2017 OSPA award winner for Outstanding Security Consultant Years in the industry


“Any person entering the security industry now has more options than ever before.” Rachell DeLuca

General views

Potential career paths

Women are a great asset to the security industry and are capable of excelling in all job functions. Exposure to female inspirational leaders early on in my career showed me that a career in security was possible, as well being able to achieve the success and fulfilment that I desired.

There are now more opportunities available within the industry. The great thing is the ability to move through different job functions and develop your knowledge and understanding of the industry as a whole. Personally, I started my career working in control room operations, then moved into customer service and technical support. I worked in security and fire safety training and then progressed into my first consulting role whilst still working toward my Bachelor’s Degree. Having hands-on experience in those earlier roles is beneficial in my day to day work, and I’ve forged a number of professional relationships from across the industry. My advice to anyone starting a career in security is to ask questions and forge good working relationships will colleagues and superiors. My other advice is to get involved with the industry. I am involved with ASIS and ASIAL and have an opportunity to shape the direction of things to come.

Challenges The main challenge to women, I believe, lays in the stereotypical view of the security industry – that it is mainly male and filled with former law enforcement officers. This is not the case. However, the stereotype does persist. Dedicated and professional women are needed in the security industry to drive the changes that we want for security in the future. The industry and attitudes towards women working within it have changed dramatically in the past 20 years. Opportunities The uncertain and changing times we all live in have increased the focus on security and risk services, creating a whole new world of opportunities and career paths within the industry that were not available previously. There are increased education options available now in security, criminal justice and terrorism studies than ever before, leading to job titles and career progression that didn’t exist 10 years ago. Increasing reliance on technology and networking means that women can enter the industry from IT, cyber security or other technology backgrounds, which increases the pool of knowledgeable professionals available. Any person entering the security industry now has more options than ever before, which is an exciting time for the industry.

2 8 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

Changes over the past 5-10 years There are two main trends I’ve witnessed during my career. The first is the change in attitude toward security services, both from the general public and from clients in general. The challenging times we live in have seen client security budgets go from being a ‘nice to have’ item to a necessity, which in turn has raised the profile of security services overall, and of the profession in general. The other trend I’ve witnessed is rapid changes in technology and the way that electronic systems today can integrate into so many other systems. Advancements in technology are creating new ways of thinking for technical designers, and we have to rethink the old rules about the ‘silo’ approach and stand-alone security networks, to consider VLANs, shared infrastructure and cloud based storage.


Louise Christie

Owner/Director, ART Security Pty Ltd & member of the ASIAL’s VIC State Reference Group

CEO, National Protective Services & ASIAL Board Member

Rachaell Saunders

Years in the industry


Years in the industry


General views

General views

There are now a number of women entering the industry both at a management and operational level. It is very different to when I first entered the industry as a ‘lone ranger’. Unfortunately it appears these newcomers are mainly located in the manpower sector. Women are very suited to operational and management level roles in the technical sector.

Women are needed in the security industry. It is a fantastic industry to be involved in and there is a job for everyone.

Challenges Perception of the industry and the lack of knowledge of the opportunities. For both men and women the lack of appropriate formal training in the technical sector is a great challenge with the system being difficult to navigate. Opportunities Vast. In the technical sector the components are small, light and easily managed. The work is relatively clean and mentally quite challenging. Potential career paths Vast. We are an industry that has a shortage of experienced and educated managers. We resort to people who have worked their way up and have no formal management experience or training. This is particularly evident in the manpower sector and in the areas of OH&S and judicial requirements. Sadly with these operators the dollar rules rather than the quality of performance by themselves and their staff. Lack of training opportunities and the related salary levels are unable to attract a quality person to the industry. This particularly applies to the manpower sector due to an ongoing fight to the bottom to win contracts by security management and the lack of regard for security services by consumers. Changes over the past 5-10 years Immense in the technical sector - often changing and difficult to keep abreast of.

Challenges The main obstacle for women outside the industry is not understanding the broad nature of what security is and therefore, the diverse jobs open to them. Women may not know that security companies are always looking to employ females and their contribution is valued. Opportunities There are tremendous opportunities for women in our industry at all stages of their lives. They can do full time, part time or casual work. Part time and casual positions for team leaders, supervisors and operations managers allow women to reduce their hours while they raise a family and progress their career. Flexible hours with four to 12 hour shifts also allows people to work while studying right through to semi-retirement. There are many security roles where women are valued. Potential career paths The industry is open to women entering at all levels. They could start as a security officer or at a management level. There are no barriers to women entering or progressing within the industry. Changes over the past 5-10 years In the past there was a perception that a good security officer needed to be tall and strong which usually meant being male. Now it is well accepted that the role of security is broad and the skill set required varies depending on the role being performed. There is no one profile of a perfect security officer. When I started over 30 years ago security was not seen as a career; it was something people did as a second job or after they left their chosen career. Now the security industry is much broader and a fantastic career path for anyone. It is a changing industry that is expanding and will always be needed. SECU RIT Y INSIDE R | APR /MAY 2 018 2 9


Intelligent Building Security Guidance in protecting your organisation against building automation vulnerabilities, threats & risks INTRODUCTION

Intelligent Buildings, or more correctly Building Automation and Control Systems (BACS), have become embedded into today’s contemporary buildings. Furthermore, BACS continues to grow up to 34 percent a year, due to the demand for reduced operating costs, improved information flow and greater sustainability. Such growth highlights the impact that BACS will have in most buildings.

By David J Brooks & Michael Coole

30 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

However, BACS comes with security vulnerabilities not previously considered by many building and security professionals. Security vulnerabilities stem from its integration across all facets of the built environment, integrating HVAC, lighting and today, security systems. Consequently, if BACS security is not considered these vulnerabilities will expose organisations to harm A BACS research project was recently undertaken, investigating vulnerabilities along with security and facility professional’s understanding of security practices. Findings indicated a limited understanding of BACS risks and importantly, suitability in resulting mitigation strategies. The project therefore developed a BACS Security Guidance document to inform professionals.

WHAT ARE BACS? BACS is an automated building system that integrates many different building plant and equipment to aid information flow and provide centralised decision-making and control. BACS are modular, formed from a number of devices and equipment on a common network with open communication protocols. The connectivity, automation and control of the building is achieved through a standardised BACS technical architecture. The architecture (Figure 1) is based on three levels of Management, Automation and Field device. The Management level is the human


BACS Architecture Figure 1

Computer Network

Management level


Automation level

Controller #1

Controller #2

Field Device level Actuator


interface, generally an application on the enterprise network to facilitate day-to-day management. The Automation level is the BACS core, providing the primary automation and control devices with Controllers connected via a dedicated data network. The Field device level are the physical input sensors and output activators.

BACS THREATS, RISKS & VULNERABILITIES BACS risks are contextual, aligned with the building’s threat exposure and functional criticality. Nevertheless, the consequences can be divided into categories of loss, denial and manipulation (Figure 2). Such consequences pose a risk to the confidentiality, integrity and availability of the organisation to maintain occupancy, operations and protect data.



access to an Automation level Controller may allow an attacker to manipulate field devices, or undertake a cyber-attack on the Automation network. Such an attack could ‘map’ how the building is used, alter the automation and control programs to open doors and isolate alarms for covert access. Table 1 provides an overview of where the more significant BACS risks lie. Generally, the most significant critical and high risks (red and orange) lie within the Automation level, followed by moderate risks (yellow) at the Management level and finally, low (green) risks at the Field device level.

BACS Generic Architectural Level Risks Table 1 BACS Architecture levels

Consequences of BACS Realised Threats Figure 2 Denial


of Monitor of Control


Vulnerabilities within BACS vary significantly, ranging from physical access to a Field level device to a highly technical remote cyber-attack. While physical access to a Field level activator may cause limited and localised impact, in contrast unauthorised












Software (Application)

Very Low



SURVEYED BACS SECURITY ISSUES The project sent 13,803 surveys to security and facility professional’s, with a response of 331 to gain an understanding of current knowledge and security practices. Findings raised issues in ownership, understanding of vulnerabilities and expertise in BACS security. Continues over page >



BACS Ownership


Facility professionals manage and operate BACS. In contrast, security professionals predominately manage and operate the functional elements of integrated security systems, and IT departments manage communication networks. Nevertheless, each profession generally focused only on their areas of practice, resulting in silos of responsibilities.

Across the security and facility professions, there are a number of key recommendations in BACS security:

1  As a security professional, gain an awareness of BACS

Understanding BACS vulnerabilities There is a significant disconnect between security and facility professional’s believed and actual understanding of BACS threats, risks and technical knowledge of vulnerabilities. The majority of security and facility professionals have an awareness of BACS architecture and half of those surveyed featured BACS in their risk management documentation. Nevertheless, the majority displayed a poor understanding of BACS technology and resulting vulnerabilities. For example, both security and facility professionals rated the criticalities of BACS vulnerabilities as relatively equal and with limited distinction, demonstrating a lack technical understanding.

Are there BACS experts? Integrators (BACS Venders, Installers and Maintainers) and cybersecurity professionals displayed a divergent and more accurate understanding of BACS vulnerabilities and their resulting criticalities. This group rated criticality of attacks against the Automation level equipment as high, aligning with technical literature. However, the majority of Integrators provide a service and maintenance function, rather than guidance in BACS security. When Integrators do provide security advice, it is seen as upselling products or services instead of being recognised as a strategic partner in BACS security. To effectively manage the security of BACS requires Integrators and cybersecurity professionals to be part of the facilities or security team.

and its generic vulnerabilities. Awareness does not have to be a technical cybersecurity understanding; rather, a general understanding of what BACS does, its function and physical locations. Many of the vulnerabilities are physical or procedural, in which general security strategies will provide the required level of protection.

2  Form a BACS security working group. Such a group will help to breakdown the siloed approach of BACS security and improve cross-department liaison with membership from facilities, information technology, cybersecurity, security and other relevant stakeholders.

3  Ensure BACS is included in the security risk management documentation. For example, is the BACS listed in the criticality register, how does it aid an incident response, what happens to your security systems when BACS fails, etc?

4  Audit BACS. Know where the physical BACS devices such as Controllers and communication networks are located and their level of protection, for example as a BACS Asset Register.

5  Build a working partnership with BACS experts, such as cybersecurity professionals or BACS Integrators (third party maintainer).

6  Finally, obtain a copy of the ASIS Foundation BACS Guidance document Building Automation & Control Systems: A Security and Facility Professionals Guide to Protecting their Organisations. This guidance provides a tool to rate your building and a list of security questions to address your BACS security needs. Guidance strategies range from designating the impact that BACS may have if an event is realised to a list of security questions that considers management, security risk, personnel, physical and cybersecurity measures, incident and continuity planning and maintenance practices. ­­ The guidance document is expected to be available in mid-May.

About the authors: Associate Professor Dave Brooks, is the Post Graduate Security Science Coordinator at Edith Cowan University. David has worked in military air defence, private security and security consultancy, prior to his current academic teaching and research role.

32 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

Dave Brooks will be presenting, Intelligent Building Automation: guidance in protecting your organisation against vulnerabilities, threats & risks at the Security 2018 Conference on 25-27 July 2018. For more info go to www.securityexpo.

Dr Michael Coole has over 25 years professional experience in the security and justice domains and is a published authority in physical security, crime prevention and security risk. In his current role Michael is a lecturer, researcher and the Undergraduate Security Science Course Coordinator with Edith Cowan University, in Perth Western Australia.


Women, super and finances

International Women’s Day was celebrated on 8 March. It spotlighted the achievements of women and highlighted future challenges to improve women’s lives. There is no better time to focus on super and finances, which for many women can take a back seat to everything else going on in life like work, home and family. Average lower earnings, time out from the workforce and longer life expectancy are some of the reasons women can find themselves worse off than their male counterparts in their retirement. Improve your retirement savings AustralianSuper is committed to working alongside women, highlighting things women can do to improve their super balances and get more financial control.

Take AustralianSuper’s super health check Find out what your retirement savings may look like and get an idea about how much you’ll need and what you can do to help get you there. Grow your super balance Whether its adding to your super by salary sacrifice or adding to your partner’s super there are plenty of things you can do to grow your balance^. Consolidate & save Bringing your super into one fund can save you in fees and make managing your super easier.† Attend an information seminar We have seminars and briefings for members happening in each state throughout the year. Topics include retirement planning, options for using your super once you retire, updates on AustralianSuper’s performance and key activities. Read our Women & Super guide

What AustralianSuper is doing We’re advocating across three key issues to improve financial outcomes for women in retirement: Abolishment of the minimum earnings to receive the Super Guarantee • Currently you have to earn over $450 per month to be eligible to receive the Super Guarantee from employers. We’re advocating to abolish this because everyone has the right to financial security. Increase mandatory super contributions • We’re campaigning to increase mandatory super contributions from 9.5% to 12%. We’re campaigning for this because the extra 2.5% would make a big difference for many women in their retirement. Keep the Low Income Superannuation Tax Offset • We’ve successfully campaigned to retain this offset, knowing two thirds of eligible low income earners are, in fact, women.

AustralianSuper partners with employers to help women get on top of their super with resources and support. And there’s plenty you can do to get super confident, no matter your age or the size of your super balance. For more information check out ^ You should consider your debt levels before adding to your super. † You should ask your super provider for information about any fees or charges that may apply, or any other information about the effect this transfer may have on your benefits, such as insurance cover, before making a decision. This information may be general financial advice which doesn’t take into account your personal objectives, situation or needs. Before making a decision about AustralianSuper, you should think about your financial requirements and refer to the relevant Product Disclosure Statement. AustralianSuper Pty Ltd ABN 94 006 457 987, AFSL 233788, Trustee of AustralianSuper ABN 65 714 394 898. SECU RIT Y INSIDE R | APR /MAY 2 018 33


“I want you to be nice until it’s time to not be nice.” Patrick Swayze, Road House, 1989.

About the author: Nick Karas has run his company (Dominance Guardian Services) for over 20 years, providing a wide range of security services.

It’s an iconic line in an iconic movie. Road House spawned taglines that were used across the security industry throughout the 1990’s. It fed the image of the venue security guard as a rough-and-tumble, punch-happy ‘bouncer’ whose primary role was being paid to solve problems with violence. Fast-forward thirty years. Where is the security industry today? Have we thrown off our violent image of the past? What core skills does a modern security professional need? It was bad, really bad As a youngster I have vivid memories of venue security guards dragging patrons out of pubs and clubs, sometimes by the hair, sometimes bleeding, mostly with punches being thrown wildly. While these were scary experiences, sadly these were also common experiences. It’s fair to say that the relationship between patron and bouncer was part of the culture back then. Bouncers were hired on their ability to physically enforce the rules; so it comes as no surprise that this is what they did. Things started to change after a spate of negative media attention surrounding serious injuries and deaths, a public backlash and an increasing focus on litigation. We

saw the rise of terms such as ‘duty of care’ and the implementation of the Responsible Service of Alcohol (RSA) Act. These elements all contributed to a dramatic shift in focus for security professionals – away from ‘enforcement’ and towards a focus on customer care and customer service. It’s just as well - the arrival of social media means that customer service is paramount. Social media changes everything We live in a hyper-connected society driven by social media, social sharing and social ratings. The businesses we serve live and die by customer feedback and ratings. That’s why any remnants of the old ‘bouncer’ mentality will destroy your client’s business in a heartbeat. The smallest indiscretion by a venue employee can go viral on social media in an instant, with devastating commercial impacts on the venue owner. There are rarely second-chances when it comes to the reputation of a commercial venue. I have firsthand experience where a client whose venue was located in a ‘party precinct’ was frequented by patrons coming from other venues in the area. It was the security company’s job to implement the venue’s strict entry policies. This meant that they were often dealing with unhappy

I feel the security business will undergo radical transformation over the coming 10 years

How to survive and thrive as a



achieved. The team also includes venue management, the bar staff, police and emergency services, and even the patrons. Everyone has a role to play in making the venue or event a positive experience. A good supervisor knows how to utilise sub-teams to set the night up for success.

people but were able to do so in a non-violent manner. Today, that’s not enough. The client ceased their contract because they received negative reviews on their website about being turned away from the venue. This is the reality of today’s business environment. Today, crowd control is a customer service role, and even though they were delivering bad news when barring entry in this situation, they needed to do a better job delivering that news in a way that promotes future opportunities at the venue. When we represent our client’s businesses, we are the front line of customer service, and play a critical role in public perception. That’s the job of a modern security professional. While ‘real’ crime is down, ‘perceived’ threats are up While Australia has seen a decline in ‘real’ criminal activity over the past five years, people you meet in the street would not share the same opinion. Today’s media environment fuels a constant focus on crime and heighted concerns of terrorist attacks regardless of the facts*. We are entering a new phase for security professionals – one where public perception is shifting the role of security from ‘crowd management’ to ‘crowd protector’. Combined with the influence of technology, members of the public today feel more fearful without the presence of security professionals. Today, security professionals have the power to scan millions of faces using biometrics and facial recognition software, work in elite teams across vast venues and proactively manage potential threats

before they occur. Modern security is focused on prevention of issues rather than reacting to incidents that have occurred. With the rise of artificial intelligence, the internet of things and drones, the future of the security industry is worlds apart from the fist-throwing ‘bouncer’ of the past. Skills of the modern security professional The role of the modern security professional will have an everincreasing interdependency on technology. That said, the following core skills will remain important: ­­Communication and customer service: A modern security professional must have strong communication and customer service skills. Part of the position description is to help your client’s venue generate revenue, and customer service is critical to generating positive reviews and future patrons. You can achieve this by using well-honed communication skills to ensure every interaction we have is as smooth as possible. ­­Risk analysis and rational action: Being able to look at a situation, analyse the risk, and plan a rational course of action to achieve the best possible outcome is an essential skill for security staff. ­­Team player and management skills: Security is a team sport. You need to leave your ego at the door, understand the team objectives and play your part to ensure those objectives are

­­Alertness: This is a core skill of crowd control and venue management. Security professionals always need to be ‘on’ and never distracted. The difference between good and great is seeing what’s about to happen before it does and preventing it. ­­Honesty: Trust is a huge component of success. I need to be able to trust my security team, and my client needs to be able to trust us with their business. They’re putting their reputation and money on the line. The future Enter the ever-evolving and demanding role of the security guard – which continues to adapt in today’s society. We already have guards serving coffee and validating tickets in gaming venues, taking over hotel reception in late night venues and running service desks in corporate buildings. Where will we move to next? I feel the security business will undergo radical transformation over the coming 10 years as new technology disrupts the industry, and new perceived threats change the purpose of crowd management and security professionals. It will be an exciting ride; one that attracts people with different skillsets to that of the past. Whilst I still enjoy watching Road House nearly thirty years on, I’m thrilled that the security industry has come so far in that time. Now we must look forward and prepare for future challenges. *Source: IBISWorld Pty Ltd, Security Industry Report, September 2017 SECU RIT Y INSIDE R | APR /MAY 2 018 35


Workplace relations in 2018 will be tough for employers By Chris Delaney, ASIAL Workplace Relations Advisor

This article, will discuss (briefly) some of the issues that will affect the security industry in 2018. No doubt there will be others. NATIONALLY As many will have noticed the ACTU has commenced the biggest advertising campaign since 2007 as part of a pre-election campaign to overhaul Australia’s workplace laws. The last campaign brought in the Rudd Labour Government and scrapped the Liberal’s WorkChoices legislation in favour of the current Fair Work Act 2009. This eight week advertising campaign seeks to ‘Change the Rules’. ACTU secretary, Sally McManus claims that big business has too much power, insecure work is rife and workers are struggling to get pay rises. Unions are looking for the Annual Wage Review to award a $50 per week increase from 1 July. Casual conversion It will soon be a requirement that casuals working regularly and systematically for 12 months will have to be offered permanent employment. Domestic violence leave In February, the Greens introduced a private members’ bill into the House of Representatives that would provide 10 days a year of paid domestic and

family leave as part of the National Employment Standards. Labor has also said it will add 10 days paid domestic violence leave. QUEENSLAND Labour Hire Licensing Legislation The Labour Hire Licensing Act 2017 (QLD) has been passed by the Government and the regulations are being developed as we go to press. ASIAL has written to the Queensland Government opposing any application of Labour Hire Licensing regulations to private security providers who are already required to meet similar requirements in order to hold a security business license. Crowd controllers – security in shopping centres The Office of Fair Trading (OFT) state that a current crowd controller licence is required for security officers to work at a shopping centre. OFT Inspectors have determined that all security personnel working in retail are required to hold a crowd controller licence and have and maintain a crowd controller register, including those working as Loss Prevention Officers (LPO) in a store within a shopping centre. ASIAL has had several discussions with OFT re this interpretation. ASIAL does not agree that a security officer (LPO) working in an individual shop either within a shopping centre or elsewhere is a crowd controller. Nor

do we accept that a security officer watching, guarding or protecting a shopping centre that is closed is a crowd controller. ASIAL will continue to press OFT and the Queensland Government to reconsider their interpretation of a crowd controller. In the interim members and clients should be aware of OFT inspector interpretation of the regulations. NEW SOUTH WALES Payroll Tax Act (NSW) It has been reported that Revenue NSW has determined that security providers fall within Division 8 of the Act thereby being deemed Employment Agents and therefore responsible for including subcontractor employees in payroll tax payments. ASIAL is seeking discussions with the Minister with a view to having this interpretation reviewed and rescinded. Wage theft law NSW Labor leader, Luke Foley promises to introduce a new ‘wage theft law’ to criminalise deliberate failure to pay wages and entitlements. No details have emerged at this time however it is expected that legislation will be similar to that proposed by Labor in South Australia. VICTORIA Portable long service leave Victoria is poised to establish portable long-service schemes

Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations specialist. 36 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8


Australia’s ‘Change the Rules’ workplace laws

QLD • Labour Hire Licensing Legislation • Crowd controllers – security in shopping centres

NATIONALLY • Casual conversion • Domestic violence leave

NSW SA • Wage theft

• Payroll Tax Act (NSW) • Wage Theft Law

• Labour hire licensing • Industrial manslaughter

VIC • Portable long service leave • Labour hire licensing

(PLSL) for the security industry in spite of the State Parliament’s Economic, Education, Jobs and Skills Committee recommending further research is needed before the introduction of PLSL schemes; even though they are warranted on equity grounds. ASIAL expects that the PLSL scheme to cost security employers around 2% of employees’ ordinary time earnings, driving labour costs up and eating into already unacceptably low margins. Employers would be obliged to register themselves, their employees and contract workers (independent contractors, ABN holders etc). Labour hire licensing The Victorian Labor Government will also establish a licensing system to regulate the provision of labour hire services and create a voluntary code of practice for the labour hire industry. An individual supplied by another to work in and as part of the host’s business, at the host’s premises, subject to the host’s direction, supervised by the host or another labour hire worker supervised by the host, who is of a low-skilled or low-paid nature and does not provide a specialised service will be considered to be under a labour hire contract. SOUTH AUSTRALIA Wage theft If re-elected the SA Labor Party says it will criminalise wage theft. Under the Criminal Law Consolidation Act employers who deliberately, knowingly, recklessly or repeatedly

About the Author: Chris Delaney is ASIAL’s Workplace Relations Advisor. He can be contacted at

underpay their workers, including by failing to pay or underpaying their superannuation payments may be subject to jail terms of up to 15 years. Labour hire licensing According to the Act labour hire services means a person (a provider) provides labour hire services if, in the course of conducting a business, the person supplies, to another person, a worker to do work in and as part of a business or commercial undertaking of the other person. Given the examples provided in the legislation, ASIAL does not believe this legislation will affect most private security providers, however those who supply labour (security guards) to other security operators may be considered to be labour hire providers. Industrial manslaughter Another promise is to amend the Work Health and Safety Act 2012 to create a new criminal offence of industrial manslaughter. The manslaughter offence will carry a maximum penalty of 20 years’ imprisonment for an individual or $10 million for a corporation. ASIAL will follow these and any other issues affecting members, and where appropriate make submissions that advance the industry’s position. We will keep members informed and encourage members to visit our website on a regular basis. We also encourage members to become involved in our Special Interest Groups that inform and assist ASIAL in our representation of the industry. SECU RIT Y INSIDE R | APR /MAY 2 018 37






ADT Security




ADT Security (Data Centre)




02 Apr 2019

Allcare Monitoring Services




29 Feb 2020

ARM Security




27 Mar 2019

ART Security




30 Sept 2018

BENS Wholesale Monitoring




14 Nov 2018

Best Alarm and Monitoring Services




11 July 2019

Calamity Monitoring




21 Mar 2020

Central Monitoring Services




06 Apr 2019

Chubb Monitoring Centre




09 Mar 2020

02 Apr 2019

Energize Australia




19 Aug 2018

Executive Security Solutions (Monitoring)




15 Aug 2018

Glad Security




15 Dec 2018

Golden Electronics




16 Oct 2018

GRID Security




17 Oct 2018

Instant Security




13 Nov 2019

Linfox Armaguard




14 Aug 2018

Mekina Technologies




01 Nov 2019





15 Sept 2018

Paul-Tec (Australia)




28 Feb 2019

Proforce Security




23 May 2018

Protection Pacific Security




01 Aug 2018

RAA Security Services




14 Feb 2019

Secom Australia




14 Dec 2019

Sectrol Security




25 Aug 2019





23 Nov 2019

Security 1




14 Feb 2019




18 Jun 2018

Security Alarm Monitoring Service Security Control Room




18 Aug 2019

SMC Australia




10 Feb 2020





04 May 2019

State Government Protective Security Service




05 July 2018





01 Dec 2018

Telstra SNP Monitoring (Hamilton)




31 May 2018

Telstra SNP Monitoring (West Ryde)




31 May 2018

Ultimate Security Australia




22 Sept 2019

*The ASIAL Graded monitoring centres above have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for companies which may change the nature of their operations subsequent to Grading.







Infiniti Class 5

EXPIRY 15 Mar 2018

The capability recommendation is based on an overview of AS/NZS 2201.1-2007 and its referenced standards. Full compliance is neither guaranteed nor implied. Whilst the product may be capable of meeting Class 5 standard, meeting this Class relies extensively on both the installer and the client. As part of the capability certification, the supplier has produced both a Compliance Statement and associated documents. These documents are dedicated to Class 5 compliance and form part of the Certification process. The supplier has agreed that: The required documentation will be maintained up-to-date for the period of the Certification, with ASIAL’s inspector being advised in writing of any such changes, and they will maintain compliance throughout the certification. Any changes that may have an impact upon this will notified to ASIAL within 14 days. ASIAL may withdraw and cancel a certificate should it become aware of any non-compliance during the certification period.

38 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8


Are you adequately insured When you need for loss of keys? security insurance, contact an expert Here is a real life claims example relating to loss of keys. Fortunately the security company was insured through the insurance facility offered exclusively to ASIAL members via ASIAL’s strategic partner Aon, which provides up to $500,000 cover for loss of keys.

As the endorsed insurance broker to ASIAL since 2003, Aon understands your Our insured had entered into a contract with a client (University) ecurity business. which required them to have adequate loss of keys cover under their

Liabilityteam Policy. The insured responsible for alternative: the safety of Contact our Public dedicated today for anwas obligation free keys for the client’s premises.

Angelo Gannis A set of master keys went missing, which gave access to international 02 9253 8350 student dormitories. After investigations were undertaken to locate the keys it remained unclear as to how they were lost. Out of safety for the students, the insured’s client replaced all the locks for approx. $248,000, which they deducted from the insured’s contract payment that they owed. The insured then approached Aon.

© 2016 Aon Risk Services Limited WeAustralia looked for cover under their policy regarding the ‘short change’ BN 17 000 434 720 AFSL No. 241141 they received. After reviewing the facts, the claim was settled to the General Advice Warning he information contained in this advert is general in nature and should not be relied on as advice (personal or otherwise) because your personal needs, satisfaction of the insured. bjectives and financial situation have not been considered. So before deciding whether a particular product is right for you, please consider the relevant Product Disclosure Statement or contact us to speak to an adviser. COM0350 1217

If you would like to discuss further please contact Angelo Gannis on +61 2 9253 8350 or

When you need security insurance, contact an expert As the endorsed insurance broker to ASIAL since 2003, Aon understands your security business. Contact our dedicated team today for an obligation free alternative: Angelo Gannis 02 9253 8350 © 2016 Aon Risk Services Australia Limited ABN 17 000 434 720 AFSL No. 241141 General Advice Warning The information contained in this advert is general in nature and should not be relied on as advice (personal or otherwise) because your personal needs, objectives and financial situation have not been considered. So before deciding whether a particular product is right for you, please consider the relevant Product Disclosure Statement or contact us to speak to an adviser. COM0350 1217



WELCOME TO OUR NEW MEMBERS ASIAL welcomes the following members who have recently joined the Association. CORPORATE

Skybridge Group Pty Limited


Excel Protection Security Pty Ltd NSW G S K Group of Companies Pty Ltd t/a Aegis Defence VIC

Cobra Security Services Pty Ltd


S-Security Group Pty Ltd


Electronic Eye Security Pty Ltd


Excell Protective Group Pty Ltd


Yvonne Mattei t/a Shadow Security Group


JAMA Group Pty Ltd


MJE Australia Pty Ltd t/a MJE Systems


Programmed Facility Management Pty Ltd


Sapikawa Pty Ltd


Security Specialist Solutions Pty Ltd


Stilianos Petrellis t/a Melbourne Security VIC PROVISIONAL CORPORATE 24/7 Security Group Pty Ltd


Bintech Solutions Pty Ltd


Black Lion Security Operation Pty Ltd


C&H Security Services Pty Ltd


Constant Security Services Pty Ltd


David Rowe Consulting Pty Ltd


Evway Enterprises Pty Ltd t/a Community Watch


Floth Pty Limited


GVL Construction Pty Ltd


Healthcare Security Group Pty Ltd


JWT Group Services Pty Ltd t/a Securer Group Solutions


Kundan Enterprises Pty Ltd t/a GM Security Australia


Point Break QLD Pty Ltd atf The Giro Trust t/a ESP Security Group QLD Response One Security & Surveillance Pty Ltd Seals HQ Pty Ltd Securemate Pty Ltd


Securitas Transport Aviation Security Australia Pty Ltd VIC 4 0 S EC U R I T Y I N S I D ER | A PR/ M AY 201 8

UPGRADED TO CORPORATE Golden Star Security Pty Ltd


High Secure Security Pty Ltd


Scott Paul Ritchie t/a Armed Up Alarm Services


Guardian Surveillance Pty Ltd


Hope Island Resort Principal Body Corporate


Integrated Technology Partners (Services) Pty Ltd t/a Built In Technology (QLD)


Irisintegration Pty Ltd



Linfox Operational Training (Logistics) Pty Ltd

The ASIAL member recognition program acknowledges members. Categories include:

Majestic Projects Pty Ltd t/a AISM Australian Investigation and Security Management NSW


McBride Holdings Aust Pty Ltd t/a McBrides Loss Prevention Services WA

GOLD – 16 – 24 YEARS SILVER – 11 – 15 YEARS



Michael Gucic t/a Maxcorp Security Group



MSGA Holdings Pty Ltd t/a SGA Security Services


Nexus Intelligence Pty Ltd


Professional Security Engineering Pty LImited


SILVER Verifact Pty Ltd


BRONZE Alvin Paul Garner t/a Cairns One Security


B.H. Corporation Pty Ltd


Canberra Secure Pty Ltd


Connected Living Pty Ltd Corrective Services Pty Ltd

Nigel Gordon Gardener


Northern Star Professional Security Services Pty Ltd NSW P.R.E. Security Pty Ltd


Peptronics Australia Pty Ltd


Pirzada Hafeezurrahman t/a Gold Strike Protective Services VIC Statewide Connections Pty Ltd t/a SWC Security



TCE Queensland Pty Ltd



Tekace Communications (VIC) Pty Ltd


D.N Dycer & J.E Dycer t/a Fleurieu Security Systems


Daric Group Pty Ltd t/a Davki


Victorian Monitoring Services


DHG Security Sales and Services Pty Ltd


Wooju Communications Pty Ltd t/a ADS


Duncan James Harrison t/a Guardall Security Systems


Eagle Security Services (Tas) Pty Ltd


Tri-Tech Control Pty Ltd


TAKE YOUR BRAND TO NEW HEIGHTS Advertise in Security Insider

As the leading security industry publication, our print distribution engages more than 3,000 decision makers and has an online reach of more than 10,000. ASIAL member rates are available. Talk to our team about how we can tailor-make packages to support your next campaign and take your brand to new heights.

1300 127 425 |

Upcoming ASIAL Events SA INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Sebel Playford Hotel Venue address: 120 North Terrace, Adelaide, SA WA INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Hotel Northbridge Venue address: 210 Lake Street, Northbridge, WA TAS INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Hobart Function Centre Venue address: 4 Franklin Wharf, Hobart TAS ACT INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Belconnen Premier Hotel Venue address: 110 Benjamin Way, Belconnen, ACT NSW INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Pullman Sydney Olympic Park NEW VENUE Venue address: 9 Olympic Blvd, Sydney Olympic Park, NSW WA INDUSTRY BRIEFING A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Hotel Northbridge Venue address: 210 Lake Street, Northbridge, WA

12 Apr 2018

13 Apr 2018

19 Apr 2018

9 May 2018

24 May 2018

15 June 2018

SAVE THE DATE! The Security Exhibition & Conference is the industry’s annual opportunity to reunite for three days of quality networking and unrivalled education alongside a showcase of the most innovative solutions to the Australian market. For over three decades it has been the largest and most established commercial event for the security industry in Australia, bringing together the entire supply chain of manufacturers, distributors, security professionals and end users to connect and create unparalleled business opportunities.

To book: visit

Welcome to ASIAL ASIAL We are here here to to help help your yourbusiness businesssucceed. succeed.As Asan anASIAL ASIALmember, member, advice advice and and support supportisisalways alwayswithin withineasy easyreach. reach.

Leadership Leadership Providing Providingaastrong strongindustry industryvoice voice&&advocacy advocacy

Networking Networking

Commitment Commitment

& Professional Professional Development Development

To ToQuality Quality

Promoting Promoting Your Your

AATrusted Trusted

Partner Partner

Business Business

Professional Professional Advice Advice & &

Access AccessTo ToIndustry Industry

Support Support

News News&&Resources Resources

ASIAL ASIALisisthe thepeak peakbody bodyfor forsecurity securityprofessionals. professionals. We We are arededicated dedicatedto tosupporting supportingmembers, members,promoting promotingstandards standards and andsafeguarding safeguardingpublic publicinterests. interests. || 1300 1300127 127425 425

1300 655 009 | Master Licence 4019 88 582

Lorem ipsum

1300 655 009 | Master Licence 4019 88 582

Lorem ipsum