Page 1



M AG A Z I N E VOL.22 | ISSUE 4 | OCT/NOV 2017


90 18




The SecureCall Portal is a powerful management tool for inbound 1345 alarm call traffic. It is powered by SCSI Cloud technology and receives signals directly from Optus IN Network Equipment. The Portal gives you peace of mind knowing your data is extremely secure, including transparent call validation with data updated every 5 minutes. - Transparent & Detailed Alarm Call Reporting. - Email Alerts based on predefined settings. - Alarm Call tracing including Private Numbers.


Painful hours spent auditing are a thing of the past! Find the exact signal you are looking for in seconds, including identifying private numbers.


Processing in excess of 10 million alarm calls per month, the SecureCall Portal is a proven service used by leading security companies Australia wide.

1345 VIRTUAL REDUNDANCY SERVICE 1345 Redundancy allows Control Rooms to use our hardware and data centre as a redundancy solution for overflowing traffic.

SECURECALL REDUNDANCY FEATURES  Call overflow - for busy times.  Call failure protection - line cut / failure at the Monitoring Centre.  Call no answering - specific receiver failure.  Total disaster alarm traffic management - ability to send your alarm traffic to another facility.  Dual hosting of the service as SCSI Data Centre and the Optus Expan Data Centre.  Full audit trail is available, and independently verified through the SCSI SecureCall Portal.




























1300 555 570

MANAGEMENT PORTAL  See all Live status information.  Remote Access.  Create additional logins & choose the access level eg. Employee, Customer  Run Reports  Submit Feature Request  Run Reports - DTU Serial Communication, Signal Strength, I/O Events, DTU Command, Panel Activity Timer, Panel Events - If there are any more you would like to see, please submit a feature request and we can do it.




IP SERVICE Y AR M SS I s PR CE les AC ire W e t l c so e r DW SECURE Di Con INTERNET GATEWAY s s e l ire A ctW y re wa Di ate G s les ire B W t y c re wa Di ate G




 Bug Tracker  Access to all SCSI Portals  Over The Air Upload/Download Available using the DTU3G/IP Lite.



 Live DTU status

 Arm/Disarm your panel

 Ability to configure DTU options

 See live status

 Run reports - Signal Strength, Polling, Events

 Run alarm event reports from the app

 Control I/O Ports on DTU

 Pin Code Access

 Pin Code Access  1 Login for multiple accounts Handy for techs who report to more than 1 CMS







1300 555 570


VOL.19 | ISSUE.1 | APRIL 2014







06 | President’s Message 08 | Release of Strategy for 08 | President’s message Protecting Crowded Places 09 | Security 2014 Gala dinner from Terrorism and conference of electronic 12 | Installation 10 | security Privacy legislation systemschanges in WA 14 | ASQA inquiry 14 | QLD safety changes 16 | introduces 2014 Australian Security WHS prosecutor 16 | ASIAL toAwards deliverforLearning Industry Excellence

ASIAL Strategic Partners:



Management System for 2018 Gold Coast 20 | Changes to specialist cabling Commonwealth Games competencies Security Officer training 32 | | Help your of employees catch 24 Survival the Fittest: One their super Meal at a Time 34 | A busy Individual year ahead in 26 | ASIAL Workplace Relations Professional Recognition Program 36 | ASIAL newQ&A member listing /


30 | Millennials driving need for new IT security framework Recognition program 34 | ASIAL monitoring centre 37 | ASIAL Monitoring centre listing listing 36 | certification Hot products 38 || Hot products 38 ASIAL new member listing 42 | ASIAL Calendar of events 42 | ASIAL event calendar


Receive alarm notifications and control your alarm system like never before - anywhere at any time. SkyCommand delivers alarm notifications and the freedom to control security areas, lights, heating/cooling and door access. Features: - Instant notifications for alarm events to your mobile phone - Arm and disarm your security system remotely - Supports multiple sites and security areas - Remotely turn on and off locks and appliances - Notification and event history - App pin entry and lock Utilising T4000 high-level integration to an Integriti, Inception or Concept system, SkyCommand provides powerful control over door access, security and automation.

Available now on:

Third party alarms systems can also be controlled using the output on a T4000 via a key-switch input on any third party alarm panel.

Multiple Sites

Easy Access

Multiple Areas

T: +61 3 9780 4300 E: W:

Simple Control

T: 1300 319 499




Industry to Showcasingneeds the significant work together to effect contribution our industry makes to the Australianchange economy meaningful


fter more than a decade, the s many2014 of you will have Security Exhibition and recently read in to anMelbourne article Conference returns published in early June. Judgingin bythe the Courier strong Mail, Daily Telegraph, NT response from exhibitors, the long awaited Times, Mercury, Cairns Post and return has been well received.This year’s Gold (13 September eventCoast will run Gazette from the 4-6th June at the 2017), training of security officers Melbourne Exhibition & Convention continues to be an issue. Centre. Despite efforts It is nowthe nearly 30 years small groupSkills of ASIAL ofsince the aAustralian industry Authority representatives Quality in organiseddown the firsta industry shutting number exhibition. It is pleasing to see of Registered Training that the event continues Organisations and to go from strength to strength and the cancellation of provide an opportunity for qualifications issued tothe industry to showcase the thousands of students, impressive array of products it appears there are still and services it offers.Through the ongoing partnership those looking to circumvent due between Diversified Communications process. Australia and ASIAL, the Association In the article ASIAL’s CEO continues to play a key role in helping to restated the Association’s long showcase the industry’s capabilities. held position, calling for a uniform This year’s expanded exhibition floor and consistent approach to space and outstanding conference security industry licensing. This is program provides an excellent opportunity atogoal that is much easier said than view the latest security technologies, done, as it requires the support hear from internationally renowned and agreement all states and experts, as well asof network and socialise territories. What is clear is that with industry colleagues from acrossto the effect meaningful change on this country. significant issue weindustry need event to work Another important I together an industry. would likeas to bring your attention to is the ASIAL hasAustralian been engaged by 19th Annual Security Industry the GoldforCoast Commonwealth Awards Excellence to be held in Sydney on the 23rd October 2014. Our Games Organising Committee industry performs an increasingly (GOLDOC) to provide a Learning important role inSystem the Australian economy Management (LMS) to and it is important that this is recognised support over 4,000 contract through awards programs such2018 as this. security personnel for the Nominations now open for the awards, Gold Coast are Commonwealth so I urge The you to consider lodging an Games. LMS will support application. Further details are available on the GOLDOC training team in page 28 and through the ASIAL web site. preparation of security officers for Later this year ASIAL’s board elections their roles in the 2018 Games. will be conducted by the Australian The recent release of the Electoral Commission. Members will be Strategy for Protecting Crowded notified in due course by the AEC about


arrangements for the election.This Places allows from Terrorism byAuthorised the process for every Duly Australian Government, provides Representative of a financial corporate a helpful blueprint for those member the opportunity to submit a responsible for protecting crowded postal vote. places such asPresident’s stadiums, cinemas, In my previous Message, I shopping centres, pedestrian wrote about the importance of good malls and majorpractices. events against governance Failure topossible do the terrorist attacks. right thingThe morestrategy often thancalls not those managing willfor result in negative consequences for your crowds to plug security organisation. into their day to day As an Association thinking under aASIAL actively enforces strategy thatitswill mark Professional Code ofshift Conduct, a fundamental into a position matched by our the way the country’s actions.The ASIAL Board’s public spaces are recent decision to copy expel of the protected. A Hootspah Ptystrategy Limited from canitsbe found membership and to impose a $120,000 on the ASIAL website (www.asial. financial sanction and specific requirements on the Kings for-protecting-crowded-placesSecurity Group highlights this.The from-terrorism). continuation of the Kings Security Group’s Finally, hopefully you have had an ASIAL membership was conditional on opportunity to review ASIAL’s 2017 accepting and complying with payment of Annual & Financial Report. The the sanction and meeting specific Association has enjoyed company another compliance requirements.The successful year in delivering a its advised that it was unable to maintain wide range of member benefits membership as required by the ASIAL and services. Members will have Board, and as a result their ASIAL the opportunity to receive and membership was relinquished. accept Report at Whilst the it is important to the learn48th from the Annual General mistakes of others, itMeeting is equallyof asASIAL to be held in Sydneythat on compliance the 23rd important to understand November 2017.For our industry to is not a dirty word. grow and forwarding flourish, it is vital that we I look to seeing develop a stronger culture of compliance. many of you in Melbourne at the Finally, I look forward to seeing many Awards for Excellence dinner on of you at Security 2014 in Melbourne or the 19th October or at the 48thlater in the yearASIAL at the 2014 Security Annual AGMAustralian on the 23rd Industry Awards for Excellence. November.

THE MAGAZINE FOR SECURITY PROFESSIONALS Editorial and Advertising Security Insider is published by The Australian Security Industry Association Limited PO Box 1338 Crows Nest, NSW 1585 Tel: 02 8425 4300 • Fax: 02 8425 4343 Email: Web: Publisher

Editor Bryan de Caires | Editorial Enquiries Advertising Tania Laird | Creative Director Martin Costanzo | Graphic Design + Digital Webfx2 Digital | Editorial Editorial Contributors Contributors AON, Chris Delaney and Greg Jennings Ben Beville, Chris Delaney, Nick Karas, Natalie Shymko & Tony Vizza Print + Distribution

Print +Advertising Distribution Nationwide Group Fineline bi-monthly Printing Published Published bi-monthly Estimated Readership of 10,000 Estimated readership 10,000do not Views expressed in SecurityofInsider necessarily reflectinthe opinionInsider of ASIAL. Advertising Views expressed Security do not does not imply ASIAL, unless necessarily reflectendorsement the opinion of by ASIAL.Advertising

does not imply endorsement by ASIAL, unless otherwise stated with permission. All contributions otherwise statedthough with permission. All contributions are welcomed, the publisher reserves the are welcomed, though the publisher reserves the right to decline to publish or to edit for style,

right to decline to publish or to edit for style, grammar, grammar, length length and and legal legal reasons. reasons. Press Press Releases Releases to: be emailed to:

Internet references in articles, stories and Internet references in articles, stories

ASIAL does not accept responsibility formisleading views. Copyright©2017 (ASIAL) All rights reserved.

ASIAL does not accept responsibility for misleading views. Copyright©2014 rights reserved. Reproduction of Security(ASIAL) InsiderAll magazine without Reproduction of Security InsiderSecurity magazine without permission is strictly prohibited. Insider is

a subscription based prohibited. publication,Security rates and furtheris permission is strictly Insider

details can be found a subscription basedatpublication, rates and further details can be found at

[NEXT ISSUE] DEC 2017/JAN 2018 Printed: ISSN 1442-1720 [Next Issue] AUGUST 2014 Digital: ISSN 2207-8282 ISSN 1442-1720

Kevin McDonald

Kevin McDonald President President


advertising were thethe timetime of printing. advertising werecorrect correctat at of printing.


Avg Net Distribution per Issue

Security Insider is independently audited under the AMAA's CAB Total Distribution Audit. Audit Period: 01/04/2016 - 31/03/2017

Intelligent Video Management Solutions


p u n


Licence Plate Search Track a vehicle across one or multiple sites


4 5 8






























r x f


The next generation intelligent video management



1300 319 499 VIC: Mulgrave, Tullamarine NSW: Seven Hills, Waterloo ACT: Fyshwick QLD: Loganholme SA: Marleston WA: Balcatta

0 7


2017 AUSTRALIAN SECURITY AWARDS FOR EXCELLENCE DINNER – 19 OCTOBER 2017, MELBOURNE Companies and individuals will be recognised for their excellence and innovation on a national and international stage through the 22nd annual Australian Security Industry Awards for Excellence (an ASIAL initiative) and the 3rd annual Outstanding Security Performance Awards (a World Excellence Awards initiative). The Awards Dinner will be held on 19 October 2017 at Crown Melbourne. The MC for the evening will be one of Australia's most experienced and welltravelled comedians, Lehmo. The evening acknowledges excellence and provides an opportunity to recognise the industry’s role in protecting Australian society from security threats.

RELEASE OF STRATEGY FOR PROTECTING CROWDED PLACES FROM TERRORISM The Australian Government has released a strategy for protecting crowded places such as stadiums, cinemas, shopping centres, pedestrian malls and major events against possible terrorist attacks. The strategy blueprint provides detailed advice to those managing crowds and calls on them to plug security into their day to day thinking under a strategy that will mark a fundamental shift into the way the country’s public spaces are protected. The strategy calls for venue operators to seek specialist advice from qualified private security professionals who meet a range of specified criteria, including meeting security licence requirements and clearances, holding appropriate qualifications, experience 8 | OCT/NOV 2017 | SECURITY INSIDER

and professional association membership. For more information go to




Advertise with the peak body for security professionals in Australia *Security Jobs Board is FREE for ASIAL members who can post an unlimited number of job vacancies online. Nonmembers can advertise for a small subscription fee.


Find or Post job opportunities today. Australian Security Industry Association Limited




VICTORIA TO LEGALISE USE OF BODY-WORN CAMERAS BY POLICE The Victorian police force will be able to capture potential evidence via body-worn cameras without fear of breaking the law. Source: Tas Bindi | August 8, 2017 | ZDNet New legislation is being introduced into the Victorian parliament to ensure police officers can legally use bodyworn cameras to capture footage in the line of duty, the Victorian government announced recently. The Justice Legislation (Bodyworn Cameras and Other Matters) Bill 2017, passed by the House on June 23, is the first tranche of legislation that will give police "the powers, resources, and tools" they need to keep communities safe, including body-worn cameras when they are rolled out to frontline police in 2018. The Victorian government will also introduce an exception to the Surveillance Devices Act 1999 so

that the use of footage captured by body-worn cameras does not immediately constitute an offence should a private conversation be inadvertently recorded by police. "Body-worn cameras will be a critical tool to respond to family violence issues and other crimes in our community," Minister for Police Lisa Neville said in a statement. "This legislation ensures that police have the powers they need, as we prepare to roll this technology out across Victoria." The cameras will not only capture potential evidence, but will also hold police to account, the state government said. In recent weeks, footage from body-worn cameras have shown Baltimore police officers planting illicit drugs in a car, and in a separate case, a backyard.

VIC GOVERNMENT LAUNCHES CYBER SECURITY STRATEGY The Victorian Government recently launched Victoria’s first ever Cyber Security Strategy to ensure government services and information are kept safe from cyber threats. The strategy shifts from an agency by agency approach, to a whole of government approach. For more information go to


Further legislation will be introduced later this year that will support the use of body-worn cameras for recording statements in family violence matters and allow those statements to be tendered in court by victims as evidence. "The Royal Commission into Family Violence recommended that there be a trial of bodyworn cameras by police ... this legislation is the first step in making that a reality," Attorney General Martin Pakula said. The final design of the cameras and the scope of their use is yet to be decided, but a field trial is expected in the first half of 2018.

Powerful web based controller, powered by smart devices. Now g rtin p u S po ss Wirele es ic v e D



Inception is an integrated access control and security alarm system with a design edge that sets it apart from the pack. Featuring built in web based software, the Inception system is simple to access using a web browser on a Computer, Tablet or Smartphone.

Security Alarm

Access Control







With a step by step commissioning guide and outstanding user interface, Inception is easy to install and very easy to operate. For more information simply scan the QR code or visit

No Software Required

T: +61 3 9780 4300 E: W:

Multiple Devices

Easy Setup with Checklist Prompting

T: 1300 319 499

Send IP Alarms via the Multipath-IP Network



AS 3786-2014 SMOKE ALARMS Important smoke alarms update for members: When new editions or amendments to documents are referenced in the National Construction Code (NCC), sometimes they are referenced alongside an older version for a period of time. This allows industry time to transition from the old version to the new one. Once the transition period ends, compliance with the old version is no longer permitted under the NCC’s Deemed-to-Satisfy (DTS) Provisions. Referencing the new 2014 edition of this Australian Standard in NCC volumes one and two triggered a two year transition period for the AS3786-1993 edition. This period ended on 30 April 2017, so from 1 May 2017, only the AS 3786-2014 edition will be able to be used under the DTS Provisions.

INSTALLATION OF ELECTRONIC SECURITY SYSTEMS IN WA Following concerns raised by members, ASIAL in conjunction with the West Australian Police has prepared two important consumer information sheets covering licensing requirements for installation of electronic security systems. The information sheets have been made available to consumers through a range of channels. The information sheets, which include a couple of practical scenarios are available at installation-of-electronic-securitysystems-wa Members are encouraged to distribute the information to customers.





QLD SAFETY CHANGES INTRODUCES WHS PROSECUTOR The deaths of four patrons at Dreamworld and other industrial deaths in SE Queensland prompted a review, which has recommended 58 changes to WHS Legislation which have been contained in a bill introduced to the Queensland Parliament. The bill, amongst other recommendations, seeks to create the role of WHS Prosecutor, introduce 20 year jail terms for industrial manslaughter

and maximum penalties between 5 and 20 years' jail for individuals, and corporate fines from $3 million to $10 million. Queensland Industrial Relations Minister Grace Grace said that her Government wanted to send out a strong message, "If you cost someone their life, you will pay. The harsher penalties will serve as a deterrent to employers who are tempted to cut corners when it comes to

safety in the workplace." An independent statutory office headed by a WHS Prosecutor appointed for a five-year term will head an independent body with responsibility for WHS Act proceedings. More information is available at

Questions remain as to whether internal provision of labour from one group company to another will be subject to the legislation. It may be clarified in the regulations

(yet to be published), however groups structured in this way may be required to hold a licence and be managed by fit and proper persons.

LABOUR HIRE LICENSING ACT 2017 (QLD) PASSED On 8 September the Queensland Parliament passed the Labour Hire Licensing Act 2017 (Qld) (Act). This legislation could become the model for other States contemplating legislation covering labour hire. The Act is now awaiting proclamation. The Act requires labour hire providers to be licenced and that management are 'fit and proper' persons. There are also significant penalties for operating as a labour hire provider without a licence or engaging a labour hire provider which does not have a licence. Current labour hire providers will have 60 days to apply for their licence after the proposed commencement of the scheme. The legislation has also been amended to include reference to the Payroll Tax Act 1971 (Qld).

2017 ASIAL AGM The 48th Annual General Meeting of ASIAL members will be held on 23 November 2017 at the Holiday Inn, Parramatta. An invitation and details of the meeting has been sent to members.



OFT'S MARKETPLACE PRIORITIES IN 2017-18 Each year, the Office of Fair Trading (OFT) Queensland undertakes a program of proactive marketplace compliance activities. OFT performs unannounced spotchecks on businesses to ensure they are complying with fair trading laws. Compliance programs are targeted based on risk and where there is most potential for consumer detriment. Information from consumer complaints, intelligence from other regulators and trend analysis are just some of the things that are considered when deciding what to focus on each year. In 2017-18, OFT have scheduled operations targeting the following industries and conduct: • motor dealers • real estate agents and resident letting agents

• security providers • price scanning at supermarkets • safety checks on kids toys • retailers and suppliers of Indigenous souvenirs and art • retailers providing lay-bys. The OFT is aware most businesses comply, or want to comply, with the law and so take an educative approach wherever possible. However, where businesses fail to comply, do not act in good faith, or where consumers are at risk, OFT have a suite of enforcement powers available. These enforcement powers are used on an escalating scale, depending on the seriousness of the breach of the law. They range from official warnings and fines, right up to public naming

and prosecution through the courts. A full list of OFT's 201718 priorities and projects are available from the OFT website at au/law/laws-regulatedindustries-and-accountability/ queensland-laws-andregulations/regulated-industriesand-licensing/fair-tradingenforcement/compliance-program

Close more sales Up to $150,000 instantly approved

You can now offer clients:

$0 upfront – system & installation costs financed Instant approval with no financials Payments treated as operating expense* Fully tax deductible* * All applications to Security Lease are subject to normal approval criteria, and terms and conditions apply. No part of this document is to be construed as an offer capable of acceptance or as a solicitation to obtain a financial product. The information is not an expression of opinion or recommendation and does not constitute financial, accounting, taxation, general or personal advice and should not be relied upon as such. The recipient should make their own assessment of any product or service referred to in this document and seek appropriate advice.

For a free demonstration call us  1300 795 695 SECURITY INSIDER | OCT/NOV 2017 | 15


ASIAL TO DELIVER LEARNING MANAGEMENT SYSTEM FOR 2018 GOLD COAST COMMONWEALTH GAMES SECURITY OFFICER TRAINING ASIAL has been engaged by the Gold Coast Commonwealth Games Organising Committee (GOLDOC) to provide a Learning Management System (LMS) to support over 4,000 contract security personnel for the 2018 Gold Coast Commonwealth Games. The LMS will support the GOLDOC training team in preparation of security officers for their roles in the 2018 Gold Coast Games.

2017 ASIAL ANNUAL & FINANCIAL REPORT The 2017 ASIAL Annual & Financial Report is now available at annual-reports. Among some of the highlights over the past year included:  The Multi-Employer Enterprise Bargaining (Greenfields) Agreement (MEEBA) to cover 4,200 security officers working at the 2018 Gold Coast Commonwealth Games;  The Individual Professional Recognition program;  Two new life members were honoured;  The strategy planning session that was held to determine the key priorities for the Association.


Workplace Relations Workplace Relations matters affect all of ASIAL’s members to some degree. ASIAL provides all corporate members with access to Workplace Relations advice on individual issues such as assisting with Enterprise Bargaining Agreements, disciplinary and dismissal matters, award and rates of pay enquiries, subcontracting, employment contracts or dealing with the Fair Work Ombudsman (FWO). At a broader industry level ASIAL’s Workplace Relations Advisor prepares submissions on Modern Award changes, legislative changes and decisions of courts and tribunals that affect the security industry at a state and federal level. Throughout 2016/17 we have continued to provide webinars and bulletins and other learning opportunities to educate and inform members on their rights and responsibilities as employers.

Major Activities for 2016/17 ASIAL’s application to vary its rules In 2016 ASIAL made an application to the Fair Work Commission (FWC) for a variation to our eligibility rules removing unnecessary restrictions on some security businesses seeking to become corporate members. After some objections by the Australian Industry Group our application with minor alteration was approved by Senior Deputy President, Hamberger on 21 June 2017 allowing, “Companies, and enterprises, which are substantially e   ngaged in the provision of security products or services to the community for reward and as such are involved in the Private Security Industry  or are otherwise required to be a member of an ‘approved security industry association’ or ‘approved security industry organisation’ for the purposes of obtaining a security license under a law of any Australian jurisdiction” access to corporate membership.

Four year Modern Award reviews The Modern Award reviews have continued throughout 2016/2017 with most of the FWC’s time being spent on common issues such as plain language re drafting, public holidays, annual leave, penalty rates, family and domestic violence provisions and casual and part-time employment. The FWC have late in June 2017 asked interested parties to make submissions on the Exposure Draft of the Security Services Industry Award 2015. ASIAL has made submissions seeking redrafting of clauses relating to payment of outstanding leave on termination, base rates, penalty rates and suggestions concerning various additional definitions to create clarity and reduce ambiguity.

Fair Work Ombudsman/ASIAL Memorandum of Understanding (MoU) ASIAL and the FWO have now met formally on several occasions to consolidate our working relationship, which has been valuable in promoting and protecting the interests of both individual members and the industry as a whole. Topics of discussion and action have included FWO’s enforcement activities in the Security Industry, Supply Chain issues, progress of the Local Government Procurement Initiative and FWO involvement in Security 2017 and a presence at the Commonwealth Games. ASIAL and FWO are scheduled to enter into a new MoU in July 2017.

Peter Beattie, GOLDOC Chair acknowledges ASIAL’s efforts at Games security launch

Portable Long Service Leave Proposal (PLSL) – Victoria

ASIAL re-signed its MoU with the Fair Work Ombudsman

ASIAL presented both written and oral submissions to the Victorian State Parliament’s Committee and most recently the consultants seeking comment on the development of a scheme for the implementation of PLSL in Victoria. ASIAL has made submissions strongly opposing the introduction of PLSL for the security industry.

ASIAL as the peak security organisation in Australia has worked closely with GOLDOC for over two years providing advice and practical assistance to ensure the provision of private security to the Games operate As many will know ASIAL has been working as smoothly and efficiently as possible. closely with the Commonwealth Games Organising Committee (GOLDOC) on the Annual Wage Review ASIAL has procurement options for contract security continued In June 2017 the FWC handed down its decision for the Commonwealth Games. ASIAL to engage in addres in the Annual Wage Review. The increase took witbeen sing a wid h gov has also instrumental in drafting and ern e range of ment, continue many by surprise, being around 1% higher than issues and ustry and to suppor with United Voiceind memb providing Queensland t membersnegotiating most influential erspredictions. From the first full pay period advice Branch, a Multi-Employer Bargaining throug . Likew h our involvEnterprise after 1 July 2017, employees paid minimum mittee ASIALcom worked with s. (Greenfields) Agreement (MEEBA). The MEEBA ise, we ement on a number award rates covered by Modern Awards were GOLDOC to ensure was filed in and approved by the FWC and of Standards entitled to a wage increase of 3.3% and a will form the basis for pay and conditions the provision of ASIAL has respective increase in most allowances. participated in supporting developme private for the 4,200 security officers engaged to security nt for the stand ards security indus currently comm provide private security at the Games. try and are ittee memb


Annual & Financial Report

Electronic s

Local Government Procurement Initiative (LGPI)

The LGPI is nearing completion of the compliance phase with FWO conducting audits of local government contracts with private security providers. The schedule is behind projected time lines and Fair Work advises that a detailed report will now be made public in the second half of 2017. It is anticipated that several councils will be put on notice about their procurement practices.

Commonwealth Games 2018

to the GC2018 Games


Standards ers of Austr and Commission the International Electr alian (IEC). Durin otechnical Standards g June 2017 hoste Australian at their office d the inaugural IEC committee s in Sydne y. Delegates around the world to partic came from IEC Techn ipate in the ical Comm ittee 79 meeti annual experts contr ng. Industry ibuted to workgroups Access Contr cover ol ing IP Video Surve Systems, CCTV (now renamed illance Syste Intercom Systems. These ms (VSS) and Buildi ng important workgroups role in devel play an oping future standards.

ABN 91 000 813 365 I ASIAL 2017 Annual & Financial Report

National Broa dba

nd Networ ASIAL contin k ued to engag ASIAL Genera Broadband l Manager, Network (nbn) e with the National Committee John Flemin for memb member, Les g with to provide ers on Simmonds information at the IEC national broad the deployment of meeting the band netwo the nbn was rk. In June on target ASIAL contin to reach five 2017 homes and ues to provid million businesses to members e information that will now connect to and advoc the be able to ate that secur installation The nbn worki national broadband work must ity netwo ng with appro be a licenced rk. providers security techn carried out by ved servic will replac e an Australian ician that e the existin phone and holds Comm g landline internet servic unications Authority and Media es in Austr (ACM alia. with the appro A) cablers registration nbn will be using a Multi card priate cablin (MTM). This g competenc Technology major chang Mix ies. eliminate e in direct National Alar nbn equip ion will ment from premises, m Response the customer’s where nbn ASIAL has Protocol will only be VOIP soluti contin offering a on and there National Emerg ued to engage with backup or will be no the ency battery Comm UNI-V ports. Group (whic unications It is vitally that stakeh h includes Working important olders in the communica representa migration base secur tions tives from of back to ity and medic Police, Fire services acros and Ambu about the al alarms be s Australian lance nbn’s devel to progress and New opments and informed with their Zealand) developme custo communica nt of a nation response te protocol. maintain the mers to offer soluti al alarm A standardise ons that security system response d national will provid matter which e an oppor emergency type of techn ’s integrity. No tunity for deliver the service opera ology is used network it’s industry to tors and the to crucial that and office work toget security wiring has home her for the stakeholders been well benefit of . This nation planned. all to standardise al protocol is designed and the respo police classification of alarms nse to alarm police triple activations. zero servic es have now All final comm ent and the provided proto to be finalis ed in the fourth col is envisaged quarter of 2017. ABN 91 000

813 365 I ASIAL 2017

Annual &

ASIAL part icipates in supportin g standards developm ent for the industry

5,843 Total cabl ers registered with ASIA L

Financial Report

9 9


This is the first MEEBA to be created in the security industry and is specifically designed to cater for the unique conditions that arise from an event of this magnitude, drawing on several major Australian security providers and security personnel from most state and territories in Australia.



SAVE THE DATE 25-27 JULY 2018 Join us back in Melbourne for the Security Exhibition & Conference 2018 at the newly renovated Melbourne Convention & Exhibition Centre.







ASIAL BOARD MEMBER, RACHAELL SAUNDERS Natalie Shymko, ASIAL’s Marketing and Communications Manager talks to our Board Member, Rachaell Saunders. Natalie: Rachaell please begin by telling us a little about yourself. Rachaell: I started doing security work as a way to pay the bills when I was 18, initially in guard and patrol work. Security wasn't something I wanted to do, it was simply a job that was going to be shortterm. I have stayed in the industry because I really enjoy it. It certainly has its challenges but I would not change a thing about my career.  I am a lifelong learner and apart from various qualifications, I have degrees in Marketing and International Business. On a study tour to the US around 2000, I met Jeff Bezos (mazon). One of the things that struck me about him was his vision for amazon and his ability to remain focused even when his business was very difficult with challenges coming at him from many directions. Amazon is now coming to Australia and I think back to Jeff in his office with secondhand furniture and phone books propping up his computer monitor. He was not concerned about the financial media in their lavish offices on large salaries who time and time again had written about the demise of his company. I have understood during my journey running National Protective Services that there are times when it can be difficult, when it can be challenging - that is business, that is life, what’s important is to remember the WHY.  



I live in Melbourne and on my downtime I cherish spending quiet time with my family, cooking, exercising and of course, going to a NRL Melbourne Storm game. Natalie: What changes have you seen in the security industry? Rachaell: When I started in the industry virtually every building was patrolled with a patrol officer guarding doors and gates, even corner milkbars. With improvements in technology and increases in labour costs, patrol services are more often used to respond to alarm activations than patrol.  Patrols certainly still have their place and are useful for sites that need to be locked/unlocked where a security presence is needed and where the site needs to be physically checked. We patrol many sites where an alarm or CCTV does not substitute for a patrol officer attending the building and physically providing a security service. Now however, patrols are considered just one aspect of the many physical security measures that can be deployed and not the only option. The security systems that we are installing for our clients are no longer simply the basic alarm systems. The technology is rapidly advancing and it is exciting to see the developments changing the security landscape. We just completed several national programs where the CCTV systems, although useful for security, were also used to track customer buying behaviour.  These systems are now commonplace and demonstrate how security is being integrated into the business practices of our clients. Technology has improved the way we conduct our business as well. In the manpower side

of the business we have brought into Australia security reporting equipment that tracks our staff and provides live reporting functionality for our clients. This allows clients to see where security officers are at any time and can receive video footage of any incidents. For clients, it brings transparency to the service that we provide and it empowers them around their security. Every year I usually head overseas to some of the larger security conferences and the rate of change in technology is astounding. Due to current threats around the world, there is a lot of money being invested in the security industry and the new products coming out reflects that. I often wonder in five years’ time how different our industry will be. Natalie: What is the biggest challenge/opportunity facing the security industry over the next five years? Rachaell: Both a challenge and an opportunity is in meeting the changing needs of our clients. We need to be able to shift and adjust our services to provide security in an increasingly broad area. Security is not just about physical security programs, it also encompasses cyber, information, IT. The industry needs to understand the breadth of the security industry now and the risks that our clients face.  There is a great opportunity to attract talent into the industry that may previously have entered law enforcement or the military. Security is a career that is valued throughout the world and the skills are transferable. I have colleagues around the globe dealing with the same issues facing us in Australia and there is a pool of incredibly talented individuals that would benefit our industry. Natalie: What are your top two focus points as an ASIAL Board Member and why? Rachaell: ASIAL plays an important role for the security industry and the Board is made up of representatives of the industry.  Running the business

that I do I am focused on small to medium sized security businesses and making sure that they are well represented. Small business is the largest employer in Australia yet often the focus can be more about large corporations and making sure they are supported. I know I bring a voice for the SME security companies to the Board and this helps keep a balance at Board level. I am also focused on the improvement that ASIAL as an organisation can help facilitate for our industry. Our industry is larger than all the Police and Military in Australia and is rapidly changing. The structures and standards that we have today may be very different next year and ASIAL needs to help the industry adjust while leading the push for any improvement. There are many stakeholders related to our industry that want to dictate how our industry operates. They don't necessarily have the expertise, experience or sincerity to adequately define the security industry in Australia. As an industry we need to lead the way on any change and that is also what my focus as a Board member is about. Natalie: How is your role at National Protective Services Pty Ltd going? Rachaell: I love what I do and am passionate about my company and the service we provide to our clients. This makes it great to come to work each day. Every day is different and I really enjoy that about my role as well. The team I work with are equally passionate and I am blessed to be working with the talented diverse team that I do. Our company is almost 30 years old and so many on our team have been with us for a long time; we are like family and that is a reward in itself. Our clients also have generally been with us for a long time. Getting to know them and supporting them through various security issues over the years gives me the greatest satisfaction. Our vision simply is 'we keep our clients safe and secure'. Every day I read that - it is my WHY. si







By Tony Vizza, Cyber Security Practice Director, Sententia

Implementing good information security controls on physical security deployments can seem like a daunting task, particularly for those who have traditionally shied away from deploying network-connected IP-based security solutions. There are, however, a number of important considerations to be mindful of when determining how much effort and how effective a security deployment can be, one that includes both the physical security properties as well as the information security properties. In a world where practically everything electrical can be connected to the Internet, any security deployment that relies on electronic or IP-driven technologies can be rendered useless should a remote adversary compromise access to these deployments. This will happen either because the level of InfoSec (information security) defences deployed to protect these assets is inadequate or because the information contained within a deployment is deemed to be so valuable to an adversary that they will stop at nothing to compromise these systems. Just like physical security, where it is impossible to 100% guarantee security, the objective of information security is to make it so difficult for a would-be intruder to break into a system that it’s simply not worth their effort. In this regard, the strategic goals of both physical 20 | OCT/NOV 2017 | SECURITY INSIDER

security and information security are perfectly aligned. It should be noted that any compromise of an InfoSec system will cause a similar litany of issues that would occur should physical security defences be circumvented by a criminal. This includes investigation by law enforcement, contractual disputes with your client and reputational damage to your brand, none of which are desirable. To further compound the matter, mandatory breach disclosure legislation is due to come into force in early 2018. This means that intrusions that occur due to poor information security deployments will incur the wrath of the Federal Government’s Privacy Commissioner, who will deem lax information security controls to be a poor excuse when determining punitive damages against culpable organisations. Using the example of a manufacturing organisation that is risk averse. Such an organisation will very likely invest in alarm systems, back to base monitoring, surveillance cameras, access controls, bollards to prevent ram raids as well as lighting, fences with barbed wire, traffic control systems, hardened doors and walls around critical infrastructure, and may employ either private security guards, contract a security organisation to perform regular patrols and may even use guard dogs. Information security

addresses the same risks using the same concepts and controls for the information technology world. Planning an Information Security Strategy In considering where to begin devising your InfoSec approach, start with planning your strategy. Some of the areas of note that should be focused on when in the planning phase include: 1) Establishing your clients’ levels of expectation. This task should always be performed with the client’s senior management team and will focus on the organisation’s InfoSec risk appetite. From here, an organisation can start to allocate the appropriate resources. It is important to note that almost all InfoSec strategies fail when senior management buy-in is not sought or gained in the planning phase. 2) Educating your client on why the appropriate information security posture is in their interest from a risk and compliance perspective, the same way you would educate them on their physical security posture. 3) Determining responsibility for both establishing controls as well as maintaining and monitoring those controls. This is especially pertinent when a physical security provider who is contracted to provide incident monitoring and response


might, in the client’s view, also be expected to provide information security incident response, a very different service altogether. 4) Designing the appropriate InfoSec controls that will protect the client’s environment, including technical controls (devices such as firewalls and end point security solutions for example), administrative controls (such as user awareness training, password policies and patch management policies) and of course the physical controls that offer protection of assets from any physical threats. 5) Ensuring that the Business Continuity Plan (BCP) and any disaster recovery plans are updated to accommodate InfoSec related disruption events. 6) Scheduling compliance checking and auditing of InfoSec systems to ensure that the systems are operating at the desired levels. 7) Accepting the notion that it’s not if a breach will happen but when a breach will happen, and ensuring that contingencies for such an event are planned for and the responses are tested to ensure minimal organisational disruption. 8) Accepting that information security is not a-one-size-fits-all, nor is it set and forget. InfoSec requires constant monitoring, management and tweaking to ensure that your organisation is protected from new and emerging threats. 9) Documenting the plan and making it easily accessible to the relevant personnel. Implementing the Strategy Once an Information Security Strategy has been devised, it needs to be implemented. This will require the organisation to work together on ensuring that the strategy is executed successfully. Broadly speaking, a number of key areas will need to be addressed in order to meet the goals of a welldefined strategy:

• Deploying technical controls to secure your network, devices and electronic infrastructure. This involves the implementation, configuration and maintenance of firewalls, endpoint security software, domain management services, email security solutions such as spam and malware filters, secure configuration of wired and wireless networks and the security hardening of IoT devices and networks. Complementing this, ensuring that privileged access (such as admin access) is restricted only to authorised personnel. • Ensuring that software, firmware and applications are kept up to date. Ensure that patch management for all devices is addressed (including cameras, network switches, routers and IP based devices) and application / operating system updates are deployed as soon as practically possible. • Securing any cloud-based services that the organisation may be using. There are many misconceptions that exist about cloud and security. Cloud services can be secured, however it is critical for an organisation to accept full responsibility for the security posture of cloud services, even when those services are delivered by a third party. • Having a complete and verified backup of your data. In addition, ensuring that disaster recovery testing takes place regularly to ensure that backed up data is complete, accessible and that any restoration of services from backup systems meets an organisation’s down time limits (known as a Recovery Time Objective or RTO) and meets the organisation’s expectations in terms of service and resource availability (known as a Recovery Point Objective or RPO). • Ensuring that your strategy addresses user education and

awareness. More than 30% of all breaches occur because a trusted user either accidentally makes a mistake or deliberately compromises a system. Accidental data loss can come from a user choosing a weak or easily guessed passwords; a user inadvertently sending an email to the wrong recipient; or a user leaving a laptop on public transport or dropping a USB key with sensitive data on it. Addressing user awareness both with your staff as well as with stakeholders, including suppliers and customers, is a beneficial way to minimise potential breaches. • Committing to regular InfoSec assessments, audits and reviews, provided either by a dedicated team of information security professionals, or a specialised external provider. • Given the ever-changing threat landscape, leveraging the services of a suitably qualified managed information security provider who can assist or augment your organisation’s skillset with the experience needed to provide the best possible InfoSec protection. • Involving legal counsel in your strategy, whether it may be internal counsel or an external firm who specialises in information security law. This will be invaluable to ensure that your organisation meets its regulatory commitments as well as exercising legal privilege should a breach occur. • Transferring any residual risk to an appropriate cyber breach insurance policy that will insure against the costs associated with an incident response should a breach occur. Deploying good information security controls take effort to achieve and require constant vigilance, however when properly planned, executed and maintained, these controls are both indispensable and vital to the long-term success of any organisation in the connected world we all live in today. si

About the author: Tony Vizza is the cyber security practice director for Sententia, a boutique provider of advanced information security and information management services for enterprise and government. Tony completed his B. Science in Computing Science from the University of Technology, Sydney, and recently completed his Global Executive MBA from the University of Sydney which included study at Stanford University, the London School of Economics and the Indian Institute of Management. Tony’s information security credentials include CISSP (Certified Information Systems Security Professional), CRISC (Certified in Risk and Information Systems Controls) and is a certified ISO27001 Lead Auditor. Tony is a member of the Australian Information Security Association (AISA) and is also associated with the Australian Cyber Security Centre (ACSC). Tony has been involved in the information technology and information security fields for over 25 years.





By Nick Karas, Managing Director, Dominance Guardian Services


s security professionals, we are well aware of the importance of a holistic security strategy. Unfortunately, all too often safety and security is often neglected until an obvious gap occurs.This was encountered in 2016 whilst training security and hospitality staff from a casino and resort in Honiara, Solomon Islands. The Solomon Islands is a beautiful but impoverished island nation in the Pacific. The capital, Honiara has a population just shy of 85,000 and faces many challenges including low wages, high unemployment and work conditions of a low standard with respective issues in health and safety, government licensing etc. The Coral Sea Resort and Casino is a unique resort that is fast becoming the Solomon Islands’ first and only five-star hotel and casino. The design of the resort has focused around fulfilling a guest’s love for relaxation and entertainment, with an appreciation of the Pacific seaside. The venue embodies the spirit of the Solomon Islands.This provides an ideal opportunity to draw tourists within the Australasian region. The main challenge


facing management was a lack of training for both the hospitality and security staff. The resort has a full security roster of locals and three senior officers to help run security operations. All the senior officers have backgrounds in either the military or police force, however these skills did not help them easily transfer into such a high-profile customer service role. As a result, there were several performance issues – ranging from inferior staff management to operations auditing, performance review and professionalism. For a venue seeking five-star status, these issues presented the owner with a major obstacle in the ability to attract new patrons and returning customers who are accustomed to the service levels provided at top end casinos, such as in Macau. Unfortunately for the resort, its five-star status lay firmly in the hands of several insufficiently trained security officers and hospitality staff. We were requested to develop a training program specifically for the resort’s senior guards. Management sent the senior guards to Melbourne for a week to upskill with our trainers and guards and bring back new skills and a better understanding of their

role requirements and transfer their experience to the rest of the security team. This request was easy in theory, however when you consider that the subjects are starting at such an untrained level and the culture of the region is not geared towards five-star customer service – suddenly the task seemed like a mammoth challenge. The cultural differences and challenges we faced during the training program reminded us how important it is to get to know your subjects and their reasoning for undergoing training. Without this understanding, there is a good chance you will end up offering solutions and skills outside the spectrum of application. As a result, the acquired skills may not be implemented as intended – a point worth remembering for us all as security professionals. To design a training program specific to the needs of the client, we spoke at length with the resort management about what their expectations were and what they believed the staff and their business would most benefit from. We researched the Solomon Islands and Honiara as well as the people, the city and their culture. We discovered there


were very few similarities between the workforce in Honiara and the workforce in Melbourne. Now rather than posing a problem, this allowed us to create a training program that ‘spoke their language’. It became obvious that the skills Australian security guards learn from day one of Certificate II are not skills that were held by Honiara security staff. What we refer to as ‘common practice’ is not often thought about in the Solomon Islands.These major differences made it almost impossible for Honiara security guards to do their job professionally. The lack of understanding with regard to the Responsible Services of Alcohol (RSA) impeded the resort’s hospitality staff to safely and responsibly serve alcohol and maintain a pleasant and enticing atmosphere. This was not entirely the fault of the staff, but rather a lack of understanding and training. It was challenging for us to tailor a week-long course that taught the senior guards the skills they would need to effectively carry out security duties at a five-star resort without completely overwhelming them. The guards had very limited security and management skills, which meant the education process was starting from scratch. The training course we developed specifically for the resort covered everything we considered essential knowledge for a security guard in a leadership position. A springboard from our well established ‘Green Machine’ program the course combined theory, practical and tactical training to address the specific challenges the senior guards face in their role. A security manual was created and given to all security personnel. The manual included expectations and behaviour, effective communication and techniques, self-analysis and development, crowd and patron management, risk factors and assessments, briefing/debriefing and resource management. The guards were trained in RSA, first aid, defensive tactics, communication, customer service and certain components of the Certificate II in

Security Operations. We trained them in a range of skills including greeting customers, assisting customer enquiries, spotting and dealing with intoxicated patrons, hands-on self-defence methods and patron removal. There was a focus on body language, positioning and tactics skills for deescalating situations; to help them change their behaviour and avoid resorting to physical confrontations where possible.The guards were taken to a shooting range and our instructor taught them how to shoot and how to safely manage a firearm.The Solomon Islands have been subjected to riots, revolts and coups, therefore there is a possibility that the security staff would need to be armed, and trained in the use of firearms in times of civil unrest. Scenario-based training was used to illustrate that there are usually many different methods that can be deployed to achieve a desired outcome. At Crown Melbourne Casino, the guards were introduced to key security staff and management at the casino and observed how Crown created their culture of professionalism to apply that idea to the resort. It was important for them to be able to build this culture from the ground up in Honiara, to be able to take ownership of the process and continue to improve, along with their staff. The final part of their training was observing our guards at work in high quality venues in the city of Melbourne. They were taken to a variety of venues and sites, and shown exactly how they should operate. It was an incredible eye-opener for them, and they arguably learned as much in these observation sessions as they had in the earlier theory-based training sessions. The three senior guards displayed excellent enthusiasm during their time in Melbourne.They gained valuable security and communication skills that helped them to become better security

guards and leaders.This improvement was evident to the resort management who was so impressed, we were asked to design a training package for all security and hospitality staff. The follow up training focused on RSA, first-aid and customer service skills for more than 200 resort staff members. An induction process of all security staff was undertaken, made possible by the implementation of site orders and a risk assessment contributed to by the senior guards, highlighting the expectations of resort management. The experience with the Honiara team was undoubtedly a positive one – not only for the resort management, who saw a drastic change in output from his staff – but for all of us to take away the message that it is important to understand your client and their culture. Due to the nature of the work ethic and general staff demographic in Honiara, there are still ongoing challenges to be faced. By keeping these challenges in mind and investing in the provision of ongoing training and development, Coral Sea Resort and Casino will ensure the continual improvement of all staff members and is well on the way to achieving its five-star status. The experience showed us that no two clients and no two employees have exactly the same needs or abilities when it comes to training and upskilling. This realisation allows one to tailor a training program for the client’s specific needs, using upskilling and training techniques targeted towards the culture from which they are drawing their staff. In this way, you can ensure that the workforce is well equipped with the skills required to successfully contribute to an undertaking of this magnitude. si

About the Author: Nick Karas has been the Managing Director and driving force behind his own company (Dominance Guardian Services) for over 18 years, providing a wide range of security services, with a focus on varied and detailed in-house training programs. These programs cover all the services Dominance offer, come in many different forms and are tailored to meet the needs and expectations of different clients and employees of all levels of experience and capability.






By Ben Beville, Risk Advisor, Southern Cross Protection


was 18 when I in-processed at the United States Air Force Academy Preparatory School, barely older than a child. They confiscated my belongings, shaved my head, stripped me of my identity, and skilfully began the systematic process of breaking me down and shaping me into someone they felt worthy of their uniform. The probability of failure was high. I needed to endure two weeks of Basic Cadet Training; one year of military training and pre-college academics; obtain a nomination from a Congressman or Senator; secure admission into the Air Force Academy among 12,000 other applicants; endure a further six weeks of Basic Cadet Training, ten times harder than the first; survive Freshman Year, by all accounts HELL; then three years of gruelling academic, military and athletic training at one of the toughest universities in the United States. At the time, it was the biggest challenge of my life. About a week into that initial Basic Training, I remember riding a Blue Bird bus in between beatdowns. There was a young Air Force Captain chaperoning us; she was tough and scary, but one of the good ones. She dropped the act briefly just to check we were all hanging in there - I was surprised to learn she had a human side. One squad mate had the courage to ask


her,“Ma’am, how do we get through this?” Her words have carried through with me until this day. She replied: “One meal at a time.” In my previous article, I shared my belief that your life serves a greater purpose, and that if you belong to our security industry, no matter what your job, your role is crucial to the evolution of the Australian way of life. In this series, I will challenge all classical notions of success and propose a different model. I’ll share with you a little formula I’ve been refining for years. It is by no means a silver bullet to solve all your problems, but it has helped me make sense out of life. I believe it’ll help some - in fact many - to gain some vital perspective about taking life back to basics. My proposed success formula begins with the term S, for Survival. This term is as primeval as it gets. In a self-defence context, we talk about violence, so the threat is from a predator who wants to cause you serious physical harm. Violence unfortunately does happen in Australia, and perhaps the threat of terrorism now adds a new dimension you previously may not have considered, but the statistical

probability of an individual becoming victim of violence in this country is extremely low, relative to other countries. The most common threat to our survival is much more subtle: a conflict at work; a big change; a bad Profit & Loss Statement; a lawsuit; a job loss; a bad debt; an addiction; an unfaithful partner; a painful break-up or divorce; an illness; prolonged high stress. Fill in the blank with an example from your own life or business, we all experience these events from time to time. There’s no secret here. No technique. No magic. No ancient wisdom. No short-cut. No easy way out. Survival is a choice. You’ll either choose to get through the event, or you’ll choose not to. When you do make that choice to survive, then it becomes a test of your will. In a self-defence context again, your will to survive must be greater than your attacker’s will to harm you. In the non-physical, often equally distressing life contexts, the


same principal applies. Hope and faith have little to do with it; I’ve seen plenty of Believers, even I at times, who despite hope or faith have failed to survive due to lacking one fundamental trait: Grit. I mentioned I would propose a new perspective, a formula, to more accurately measure an individual’s success in life. Without survival, the whole formula becomes irrelevant, even worthless. Without survival, there is no success, no legacy. The young Captain in my story understood that for those of us on that bus, not yet the resilient cadets they were shaping, the thought of enduring an entire day seemed insurmountable, let alone five years. Her advice broke down the unachievable into manageable chunks. Any training before breakfast had to be short-lived. After breakfast, our only focus should be to survive until lunch. After lunch, our only focus should be to survive until dinner. Training after dinner was also short-lived, so our only focus should be to get our rooms and uniforms prepared so we could survive until breakfast. Don’t worry about the next block of time until you get there. For the roughly 1,000 cadets who graduate from the US Air Force Academy every year, that’s the method. It isn’t the most intelligent people who graduate, nor the most

athletic. Those who graduate do so one meal at a time for four agonising years, five in the case of Prep School students - Preppies. Sometimes, even the next meal seems like a lifetime away, so you learn to break down your misery into even smaller blocks: the next training session, class, exam, job, meeting, sale, phone call, hour, ten minutes, thirty seconds, as little as it takes... I’m not telling you anything you don’t already know. We all know this stuff... It’s common sense... But then the storm comes... We find ourselves under siege, and how quickly we forget the most basic skill in all of Nature: Survival... This concept is extremely relevant to your business. Even the

most successful businesses will sometimes be forced to endure tough market conditions, and during those times we must forget all about the future. Focus on surviving the event, just the event, right now, and the future will come later. If your employees are struggling to survive each day, either due to problems at home, or worse, a high stress environment at work, you’ll only get a fraction of their potential quality and productivity. A leader’s failure to identify and manage stressors within his or her team can cause cynicism and negativity, which in turn become dangerous backdrops for low morale, fatigue and burn out. A focus on employee resilience and wellbeing is key. I previously wrote about the social responsibility of our security industry, and this understanding is crucial. Security is no longer just a service, it is an evolutionary imperative. Within our ecosystem, our vital role is to help protect others, to help guarantee their survival so that they may focus all their efforts towards advancing our future generations. To be successful, you or your business must first, S, Survive at all costs, then A, Adapt. That’s the second term in the formula I promised you, and that’s my topic for next issue. si

About the Author: Ben Beville is a Risk Adviser with Southern Cross Protection. He was formerly a Lieutenant Commander in the US Navy, where he served for 11 years. During his time of service, he completed multiple deployments to Africa and the Middle East.




Q&A The ASIAL Individual Professional Recognition Program sets the benchmark for security professionals looking to progress their careers and be recognised by employers, peers and end users.

Natalie Shymko, ASIAL’s Marketing and Communications Manager, asks Paul Campkin, ASIAL’s Associate Fellow (AFASIAL) and General Manager with Securacore Electronic Security about his thoughts on the industry. NATALIE: How did you get started in the security industry? Paul: I am in the electronic side of the industry and came from contracting work in MATV, PA systems and Radio Telephone Base Stations. It was a slide sideways with the cabling aspect of the job leading into programming, servicing and being offered the chance to manage staff. In both cases, contracting and as an employee, these were only a stop gap as jobs - I had run out of money at 26 | OCT/NOV 2017 | SECURITY INSIDER

university! 25+ years later still going, not really needing to go back due to being able to advance and train both on the job and in my own time. From being on the tools, firstly as a contractor then as an employee for two companies in Auckland, NZ I ended up ‘jumping the counter’ into wholesale. This was at Hills in NZ, where I took up training and a technical support role while Robert Meachem was GM. I was imported to Australia by Hills joining DAS and Craig Cobbin. I am grateful

to Hills back then, not just for the chance to transfer but for the great examples of management (look at where they/we are all now). This was the start of a passion for training and the development of training material that is still present even now working as a manager at Securacore, an Integrator in the electronic security space. NATALIE: What is the best piece of advice you've been given? Paul: I will give two - people buy


from people and staff are your #1 investment. This advice was part of the training opportunities at Hills. Sales training was great with the relationship being the focus. Customers need to have a relationship with the person that they are going to buy from and wherever possible we need to make it a proactive relationship. All staff contribute to this relationship past the initial sales transaction and need to understand this and be valued as part of the sales process. From customer service, technical support, installation and servicing going forward. With staff development, we purposefully put in place a structured approach and found that staff with structured and planned progression / development paths and roles are happier and put in more consistent effort. This is largely due to being able to see a progression path. Training programs do cost money however, staff can see the investment in not just the dollars but the time to be able to attend training courses. In-house training helps impart company culture and processes along with product knowledge. Individual suppliers are often focused on just the product training assuming it’s the industry training, which is sadly not there in a lot of cases. NATALIE: What have been the biggest changes in the industry? Paul: The biggest changes I have seen are in the improvements of both the performance and reliability of wireless alarm equipment and secondly, with IP integration to almost every device. Wireless has traditionally been a last resort, however now with longer battery life and performance improvements, wireless is more of an option in the heritage and other hard (read costly) to cable scenarios. On the IP front, we have found that just

about every aspect of electronic security can be networked and managed across a network and by apps on smart phones. Not just the obvious IP cameras, but access and alarms and now even including the humble intercom. There is also the combination of both of these with IP wireless links being used in retro fitting campus and precinct style environments where high availability is a requirement but cabling is not an option – not just for CCTV but for management of other IP security devices also. NATALIE: What has been a career highlight for you? Paul: I am going to cheat on this question and say firmly, I do not think I have hit my highest highlight yet – I always think the ‘best is yet to come.’ This is a mindset that is required to keep one focused on progressing and trying to be better. Not just in product but also in the implementation of integrated solutions. Seeing how far we have come in the product and solutions we have available to us is a

highlight but this is always getting topped by the next advances in product and implementation within the industry. NATALIE: What has been a career highlight for you? Paul: I feel the biggest challenge is finding and retaining staff in the security industry who are IP savvy and able to function in the networking environment that we are in now. Over the next five years this will be even harder. Going forward, I expect to see even more integration and implementation especially with the IOT integration. Further, I can see the IP connectivity and interaction with IT systems and needing to be working closely with IP network engineers becoming more common place, as virtually every device has IP connectivity. Training of Security Technicians in the IP and networking space is complex as the training can become too complex and often grows to include too much information that will not be used by the technician. si SECURITY INSIDER | OCT/NOV 2017 | 27





By Chris Delaney, Workplace Relations Advisor, ASIAL

Employers in the security industry very often depend on contracts with their clients. So what happens when the contract ends and the client enters into a contract with a new security provider? What are the responsibilities of the employer? The Loss of contract Most often contracts are for a specific period and employers are aware of the date on which the contract will cease. Clients will advise if the contract is to be put out to tender and/or if the security provider is not going to be asked to continue. It is good practice to formally advise employees that the contract will end and what arrangements are being made to either reapply for the contract or make alternative employment arrangements. Such arrangements may include redeployment to other parts of the employer’s business,“obtaining” employment with the new security provider or redundancy. Regardless of which option is being considered the employer must, as soon as the employer is aware 28 | OCT/NOV 2017 | SECURITY INSIDER

that changes will have a significant effect on employees, consult with the employees affected.

Consulting with employees about major workplace changes All awards and registered agreements have a consultation process that must take place when there are major changes to the workplace, such as redundancies. The consultation process sets out what the employer needs to do when they decide to make changes to the business that are likely to result in redundancies. Consultation requirements include: • notifying the employees (and in some cases their unions) who may be affected by the proposed changes,

• providing the employees with information about these changes and their expected effects, • discussing steps taken to avoid and minimise negative effects on the employees (such as redeployments), • considering employees’ suggestions about the proposed changes.

Redeployment Redeployment can be broadly defined as the transfer of an employee to another job within the same organisation or an ‘associated entity’. It is not sufficient to find any other job (eg a lower-level or lowerpaid one) in the organisation for an employee in danger of retrenchment, unless the employee willingly agrees to accept it. Otherwise, a demotion

INDUSTRIAL RELATIONS or employment conditions that are substantially less favourable to the employee will amount to a breach of the employment contract, and therefore either an unfair dismissal or a genuine redundancy (the latter meaning that redundancy entitlements will be payable). If an employee initially refuses an offer of redeployment, it is wise to discuss the refusal before making any final decision. If the reason for refusal is understood, it may be possible to modify the job or conditions to make them more attractive.

“Obtaining” a Job with the new Security Provider Industrial tribunals have made it clear that an employer, in a particular redundancy case, may make an application to the Commission to have the general severance pay prescription varied if he/she obtains acceptable alternative employment for an employee. It is for that Commission to decide whether the employer had obtained acceptable alternative employment. To obtain employment for an employee means to procure another employer to make an offer of employment, which the employee may or may not accept as a matter of his or her choice. If the employment is not accepted, the question whether that employment was “acceptable” will then be dealt with by the Commission.

Ordinary and Customary Turnover of Business The Full Bench of the Fair Work Commission (FWCFB) and s116 of the Fair Work Act 2009 (Act), recognise that loss of contract can be a consequence of an ordinary and customary feature of business. As the test has been slowly

eroded over time, it's become more and more difficult for employers to rely upon the ordinary and customary turnover of labour exemption. The FWCFB acknowledged that where no expectation of ongoing employment beyond the life of a contract is created, it would not be fair or appropriate to require the employer to make redundancy payments particularly where the loss of contract has always been considered an ordinary and customary feature of the business. Employers who operate in a contracting environment need to ensure that their employment arrangements reflect the nature of their business. In particular, if the ordinary and customary turnover of labour exception to redundancy is to be used or relied upon, employers need to ensure that the contract of employment properly reflects this and supports the employer to maintain that position if challenged.

Takeaway Points for Employers 1. Give reasonable notice to employees and/or their Unions; 2. Adequately consult with employees and/or their Unions on the impact of the proposed

changes; 3. Explore genuine alternative options for redundancy, such as redeployment or relocation; 4. Ensure such options are fairly offered to the affected employees; 5. Provide reasonable standards of redundancy benefits (as a minimum the NES); 6. Provide appropriate ancillary services, such as time off to seek alternative work (this is generally an award provision), retraining opportunities, outplacement services or financial planning; 7. Ensure employees nominated for redundancy are fairly selected on an objective and unbiased basis. One of the most important aspects of redundancy is how it is done. If the provisions of the Award/ Legislation are ignored and/or if the retrenchment occurs without any discussion with employees or if it is not a “genuine redundancy” it may be determined to have been an unfair dismissal. The Act prescribes the notice periods and a schedule of Severance Payments due to employees made redundant. Employers of less than 15 employees may be exempt from severance payments. si

*Chris Delaney is ASIAL’s Workplace Relations Advisor. He can be contacted at Note: The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide this information on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific. Accordingly, we provide this information for general reference only, but we advise you take no action without prior reference to a Workplace Relations specialist.





Source: CITRIX Media Release

A recent study by the Ponemon Institute and Citrix has found that nearly three quarters (71 per cent) of Australian security, IT and business professionals consider the growing number of Millennials in the workplace to be an increasing risk to the IT infrastructure. The need to put in place a robust IT security infrastructure is coupled with security executives experiencing a lack of support and confidence in their ability to protect their organisation’s security. Millennials bring a growing number of mobile apps, devices and new methods of information sharing and collaboration that pose heightened security risks for businesses. As a result, over half (55 per cent) of ANZ respondents consider Millennials to pose the greatest risk to sensitive and confidential data in the workplace (compared with 26 per cent for Gen X and 19 per cent for Baby Boomers).

Unapproved apps pose the biggest vulnerability The modern workforce is composed of three different generations and each has different views on information sharing, collaboration, technology, and the role security plays in each. The study shows that, alongside Millennials posing the greatest risk of using unapproved apps or devices in the workplace (40 per cent), each generation is also susceptible to different kinds of 30 | OCT/NOV 2017 | SECURITY INSIDER

security vulnerabilities: • 30 per cent said Gen Xers, born 1965-1980, were most likely to be negligent or careless when following organisational security policies. • 32 per cent said Baby Boomers, born 1946-1964, are most susceptible to phishing and social engineering scams. This is compounded by the fact that the average cost of a cyberattack to Australian businesses is about $622,000 AUD and about three quarters of all Australian businesses have been attacked in the past year, with as many as one third in one month alone[1]. “Australia has been on the receiving end of numerous cyberattacks, including a recent, highprofile stinging attack on the country’s Bureau of Meteorology. Cyber-crime alone poses a real threat in Australia, with the Australian Crime Commission

estimating the annual cost of cyber-crime to Australia is over AUD$1 billion in direct costs[2]. With that in mind, it’s particularly concerning to see that ANZ security professionals don’t feel confident they can protect their organisations’ security, especially with the new working behaviours we’re seeing from Millennial employees,” said Les Williamson, Vice President, APAC Region, Citrix. “The modern workforce is more flexible and traditional security approaches need to evolve to keep up especially with the stakes so high. A more flexible IT security architecture must consider the needs of the workforce, including generational differences. It should extend beyond traditional fixed end-point security approaches so it delivers threat detection and protection of apps and data at all stages. Ultimately, we at Citrix want to provide a secure foundation for


Continuing this trend, ANZ security execs also feel unsupported and

lack confidence in their ability to defend their organisation’s security, even though the majority (88%) of Australian organisations invest more than $1 million in their information security budget. As part of the study, respondents were asked to rate their effectiveness in six key areas of security protection. In each category, ANZ professionals had less confidence in their ability than the global average, which is further supported by more than two thirds (69%) of ANZ respondents saying their senior leadership does not view cybersecurity as a strategic priority. The six key areas of security protection are: • Protecting sensitive apps and data at rest, in use and in motion: 33% of ANZ professionals felt ineffective, as opposed to 24% globally. • Access control and multi-factor

Footnotes [1] Source: Australian Financial Review, November 22, 2016 [2] Source: Australian Crime Commission, April 21, 2016 Survey Methodology The report conducted by the Ponemon Institute and sponsored by Citrix, The Need for a New IT Security Architecture: Global Study, looked at global trends in IT security risks and reasons why security practices and policies need to evolve in order to handle threats from disruptive

technologies, cybercrime and compliance mandates. The research features insights from more than 4,200 IT and IT security practitioners in Australia/New Zealand, Brazil, Canada, China, Germany, France, India, Japan, Korea, Mexico, Netherlands, United Arab Emirates, United Kingdom and the United States. About Citrix Citrix (NASDAQ:CTXS) aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the

apps and data across any location, network and device so businesses can eliminate security threats and focus on their company and customers.” To tackle these new security risks within the workplace, 72 per cent of ANZ respondents said a new IT security framework is needed to improve their security posture and reduce risk. However, when it comes to this new key area of risk – the influx of new, unapproved apps and devices – ANZ professionals do not feel confident in their ability to defend their organisation. When asked about their effectiveness in reducing the risk from these, 36 per cent felt ineffective, compared with 30 per cent globally.

Lack of support and confidence among security professionals

authentication solutions in protecting information on devices, servers or in the cloud: 39% of ANZ professionals rated on the lower end of the scale, compared with 28% globally. Reducing the risk from an influx of new, unapproved apps and devices: 36% in ANZ felt inefficient compared with 30% globally. Ensuring continuity and ongoing business operations when disruptions occur: 30% in ANZ compared with 23% globally. Ensuring the availability and performance of traffic over any network: 14% of ANZ professionals felt ineffective, as opposed to 13% globally. Reducing the risk of attacks such as DDoS, browser and ransomware: 24% in ANZ vs. 20% globally. si

worlds apps and data secure and easy to access, empowering people to work anywhere and at any time. Citrix provides a complete and integrated portfolio of Workspace-as-a-Service, application delivery, virtualization, mobility, network delivery and file sharing solutions that enables IT to ensure critical systems are securely available to users via the cloud or on-premises and across any device or platform. With annual revenue in 2016 of $3.42 billion, Citrix solutions are in use by more than 400,000 organizations and 100 million users globally. Learn more at


Secure Fleet Leasing.

The peak body for security professionals

Visit or call us on 1300 845 327 Volkswagen Financial Services Australia Pty Limited ABN 20 097 071 460, Australian Credit Licence 389344.

Trust that your super is in expert hands With over 2.1 million members, AustralianSuper is Australia’s biggest super fund. It’s also the most trusted, having been voted Australia’s Most Trusted Superannuation Brand for the fifth year running. This means you can be confident your super is in the expert hands of an award-winning fund.

Are you with a super fund that you can trust? To find out more, visit

Readers Digest Most Trusted Brands - Superannuation category winner for five years running 2013 – 2017. This information may be general financial advice which doesn’t take into account your personal objectives, situation or needs. Before making a decision about AustralianSuper, you should think about your financial requirements and refer to the relevant Product Disclosure Statement. AustralianSuper Pty Ltd ABN 94 006 457 987, AFSL 233788, Trustee of AustralianSuper ABN 65 714 394 898.

ASIAL Graded Security Monitoring Centres* Current as at: 25th September 2017 COMPANY (SHORT FORM NAME) ADT Security ADT Security (Data Centre) Allcare Monitoring Services ARM Security ART Security BENS Wholesale Monitoring Best Alarm and Monitoring Services Calamity Monitoring Central Monitoring Services Chubb Monitoring Centre Energize Australia Executive Security Solutions (Monitoring) Glad Security Golden Electronics Grid Security Linfox Armaguard Mekina Technologies Onwatch Paul-Tec (Australia) Proforce Security Protection Pacific Security RAA Security Services Secom Australia Sectrol Security Securemonitoring Security 1 Security Alarm Monitoring Service Security Control Room SMC Australia Spectus State Government Protective Security Service Staysafe Telstra SNP Monitoring (Hamilton) Telstra SNP Monitoring (West Ryde) Ultimate Security Australia




482 483 463 484 468 477 488 465 485 464 473 472 479 475 476 467 461 486 489 466 474 480 458 492 459 481 469 491 462 487 470 478 490 471 493

A1 A1 A2 A1 A1 A1 A1 A1 A1 A1 C2 A1 A2 A1 A1 A1 A1 A1 A1 A1 C2 A1 A1 B2 A1 A1 A1 A1 A1 A1 C1 A1 A1 A1 A1

EXPIRES 2 Apr 2019 2 Apr 2019 4 Mar 2018 27 Mar 2019 30 Sep 2018 14 Nov 2018 11 July 2019 20 Mar 2018 6 Apr 2019 9 Mar 2018 19 Aug 2018 15 Aug 2018 15 Dec 2018 16 Oct 2018 17 Oct 2018 14 Aug 2018 15 Jan 2018 15 Sept 2018 28 Feb 2019 23 May 2018 1 Aug 2018 14 Feb 2019 14 Dec 2017 25 Aug 2019 23 Nov 2017 14 Feb 2019 18 Jun 2018 18 Aug 2019 10 Feb 2018 4 May 2019 5 July 2018 1 Dec 2018 31 May 2018 31 May 2018 17 Mar 2019

*The above-listed ASIAL Graded monitoring centres comprise those establishments that have been inspected and graded for compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility for listed companies which may change the nature of their operations subsequent to grading.

ASIAL Certification Class 5 Capability COMPANY Inner Range Pty Ltd







Infiniti Class 5 15 Mar 2018

The capability recommendation is based on an overview of AS/NZS 2201.1-2007 and its referenced standards. Full compliance is neither guaranteed nor implied. Whilst the product may be capable of meeting Class 5 standard, meeting this Class relies extensively on both the installer and the client. As part of the capability certification, the supplier has produced both a Compliance Statement and associated documents. These documents are dedicated to Class 5 compliance and form part of the Certification process. The supplier has agreed that: The required documentation will be maintained up-to-date for the period of the Certification, with ASIAL’s inspector being advised in writing of any such changes, and they will maintain compliance throughout the certification. Any changes that may have an impact upon this will notified to ASIAL within 14 days. ASIAL may withdraw and cancel a certificate should it become aware of any non-compliance during the certification period.



A SPECIAL THANKS TO ALL OUR PARTNERS‌ We at Southern Cross Protection would like to extend our most sincere appreciation to all our friends and partners who joined us at the 2017 Security Exhibition & Conference Cocktail Reception.

We found great value in all the networking opportunities with prospects, clients and fellow industry participants. Kudos to all the presenters and exhibitors for all your hard work and a job

very well done. We look forward to seeing you all again in 2018!

NATIONAL SAFE WORK MONTH October is National Safe Work Month – a time to commit to building safe and healthy workplaces for all Australians. Work-related injury and disease cost the Australian community $61.8 billion in a year.

No industry should be unsafe to work in and no death or injury is acceptable. And, because the whole community bears the financial cost of poor WHS, a safe and healthy work benefits everyone. During October, ASIAL asks all

members to commit to building safe and healthy workplaces.



EYELOCK NANO NXT IRIS DTU3G/IP ■ RECOGNITION SCSI > 1300 555 570 SYSTEM ■g Email > Central Security Distribution > 1300 319 499 ■g Web > Website > CSD DTU3G/IP introduces wireless the eyeLock Nano NXT Iris recognition system, which SCSI’s alarm communicator is Australian made and is an outstanding reader that uses video paths based using technology designed. Dual-SIM Biometric technology provides 6 secure Telstra to look at more 240GPRS, uniqueOptus characteristics in each iris. This With NextG, Optus 3G,than Telstra GPRS, Ethernet & PSTN. exciting eyeLock technology eliminates use of traditional thousands already sold and installed, the the DTU3G/IP has beenaccess released to cards the Australian Security Industry with NXT outstanding success. with the scan of an eye. The Nano authenticates up to The combination communication paths with ending the days of 20 people of permultiple, minute,proven in-motion and at-a-distance unparalleled nuisance “pollproviding fails” anda unwarranted guard attendances. accuracy, safe and secure way of validation and access The DTU3G/IP connects to the and DirectWireless Network, Australia’s control for all users in commercial enterprise environments. The only dedicated and private alarm transmission network. Nano NXT is PoE, web interface configured and supports single To dual find out more about the DTU3G/IP contact Wiegand SCSI on 1300 555 570. or factor authentication using an,external or OSDP connected reader.



> 1300 319 499

■ Website Web > g >


Theyou Paradox NVX80 withthe all-new SeeTrue™ technology delivers superior Do wake up dreading mountain of paperwork waiting for you? Is motion detection withfilled advanced capabilities, beyond others its to class. your day-to-day work with difficult processes? When you in need put extra hoursain combination just to keep your on track - you need a solution! Boasting of business technologies including: active infrared, Give yourand business the edge with simPRO, the essential business microwave, SeeTrue™, this unique aggregation enablessecurity highly efficient tool and let it manage your daily processes, so you can focus on the detector sensitivity while at the same time, enhances reliability and important simPRO provides simple job management from start to minimisesthings. false alarms. finish, and equips you to run a successful business, the simple way, with Programming and configuration are simple with the NVX80's full-colour Quick Quoting, Smart Scheduling and Instant Invoicing. OLED screen and four-button interface. Suitable for both indoor and outdoor Join other successful tradies in Australia who enjoy the benefits of having NVX80 is truly the detector to choose when protecting high aapplications, streamlinedthe system supporting their businesses on the path to success. value, high security sites that demand high performance.


■ Inner Range Melbourne > +61 3 9780 4300 g Central Security Distribution > 1300 319 499 ■ Email > g Website > ■ Web > Paradox introduces the TM70 which is a user-friendly, 7-inch colour In today’s demanding security environment, monitoring of the powersupply touch screen keypad with an impressive resolution of 800 x 400 status is pivotal to the operation and performance of anysecurity system, and the pixels. The TM70 supports Spectra, Magellan, EVO and their next Integriti 8Amp Smart Power supply deliversthis very effectively.The new Inner generation Built with power a sleeksupply designisaand low-profile Range Integriti Swan 8Amppanels. 13.75Vdc Smart highly efficientof purpose just 15mm the TM70 is perfect for any environment. Exciting built power supply solution designed to meetthe modern high specfeatures requirements include a screen saver,and adjustable with auto dim used mode, unique to Access Control Intruderbrightness Security Systems.When with Inner indoorIntegriti temperature display, bus voltage reading, multi-partition control Ranges system, the 8Amp powersupply offers quick connect status and the for ability to work as a digital picturesuch frame. keypad great monitoring critical powerrelated aspects, as This Battery Fault,isLow Battery, for allNot users. For more information contact local CSDPower branch. Battery Present, Battery Failed Test, Mains your Power failure, Supply Low Volts, Power Supply Failure and status monitoring of all Smart Fuses.





Central Security Distribution > 1300 319 499 Email >

g > ■ Website Web >

Hikvision introduceswireless their new tough and robust, Anti-Corrosion range and SCSI’s DTU3G/IP alarm communicator is Australian made of cameras.Dual-SIM Built with technology 304L and 316L grade 6stainless forusing maximum designed. provides secure steel paths Telstra corrosion resistance, these cameras are designed effectively combatWith NextG, Optus 3G, Telstra GPRS, Optus GPRS, to Ethernet & PSTN. and neutralise acidicsold and and salt fog conditions that cause has corrosion. thousands already installed, the DTU3G/IP been released This range has an IP67 rating which is ideal coastal regions where The to the Australian Security Industry withforoutstanding success. salt corrosion of is multiple, a major concern. Hikvision also offers combination proven communication pathsAnti-Explosion ending the days of cameras haveand an IP68 rating thatguard are capable of enduring nuisancewhich “poll fails” unwarranted attendances. extreme environmental conditions that DirectWireless have exposure to gas, oil Australia’s or harsh The DTU3G/IP connects to the Network, chemicals. The Anti-Explosion cameras are perfect for high risk areas only dedicated and private alarm transmission network. where explosives could be the usedDTU3G/IP and other arrangements such as 555 marine To find out more about , contact SCSI on 1300 570. projects, chemical plants or deep mines. For more information contact your local CSD branch.




319 499 464 455 >

The Videofied Range has a new addition, the OMV-VX Outdoor Video The Paradox NVX80 with all-new SeeTrue™ technology delivers superior Verification Detector. motion detection with advanced capabilities, beyond others its class. The OMV-VX is a completely wireless, battery powered motion in detector that Boasting a combination of OMV-VX technologies active® infrared infrared, has built in video verification. The comesincluding: with Dual OPTEX detection, the and OMV-VX Motionthis Viewer provides high-quality andhighly very accurate microwave, SeeTrue™, unique aggregation enables efficient detection to help reduce false alarms. The infrared motion detectors can be detector sensitivity while at the same time, enhances reliability and repositioned to vary the orientation and detection range. minimises false alarms. Product features include: Programming and configuration with the NVX80's full-colour • PIR detection adjustment (distanceare andsimple orientation) screen and four-button interface. Suitable for both indoor and outdoor • OLED Fully weatherproof (IP55 and temperature resistant (-20°C/+60°C) • applications, Powered by the 3 Lithium fordetector up to 4 year batterywhen life protecting high NVX80batteries is truly the to choose ® • value, Dual OPTEX infrared detectors • Night illumination: up to 12 meters using high security sites that demand high performance. four infrared LEDs • Motion detection with Video Verification


g Video Alarm Technologies > 1300 464 455 ■ Inner Range Melbourne > +61 3 9780 4300 g Website > ■ Email > TheWeb NEW>Guardforce solar panel camera kits are a “Plug and Play” standalone ■ CCTV camera system. With two options available you can choose between In today’s environment, monitoring of dome the powersupply either a fixeddemanding bullet camerasecurity with zoom or a motorised PTZ speed status is Both pivotal to the options operation and performance of anysecurity system, and camera. camera have inbuilt 4G modems for easy connectivity to the Integriti 8Amp Smart Power supply deliversthis very effectively.The new a free smartphone app (compatible with both IOS and Android). You can also Inner Range 8Amp Smartallowing power supply isa highly purpose use theIntegriti 4G camera as 13.75Vdc a Wi-Fi hotspot, the connection of efficient additional ® built power solution designed to meetthe modern high requirements devices. Forsupply example: connect a Videofied W-Series panels or spec any other Wi-Fi unique to Access Control and Intruder Security Systems.When used with Inner compatible device to the internet. This system IP66 andthe also8Amp has uppowersupply to 3 day battery life from theconnect 24AH status Ranges Integritiis system, offers quick rechargeable monitoring forbattery. critical powerrelated aspects, such as Battery Fault, Low Battery, ProductNot features: 2MPBattery 1080p Failed camera • Built-in modem withPower Wi-Fi Hotspot Battery Present, Test, Mains4G Power failure, Supply Low • Micro SD Supply StorageFailure Slot – up tostatus 128Gbmonitoring • IP66 Rated • APP controllable Volts, Power and of all Smart Fuses. • Images and alarms sent via FTP or Email • Supports ONVIF protocol



WELCOME OUR NEW MEMBERS ASIAL welcomes the following members who have recently joined the Association. CORPORATE

A V S Services National Pty Ltd NSW Action Systems Pty Ltd t/a Active Assurance Services QLD ATTN Pty Ltd t/a Australian Academic Solutions VIC Australasian Intercom Systems Pty Ltd t/a N.A.S.A. Electronic Security Systems QLD Elite Security & Protection Pty Ltd ACT FDC Industries Pty Limited NSW Halang Pty Ltd t/a Integrated Cabling Installations NSW I-Sec Australia Pty Ltd NSW JLM Integrated Pty Limited NSW Lee Brothers Fencing Pty Ltd VIC Macxsec WA Pty Ltd VIC Mercury Group of Companies Pty Ltd VIC Newcastle Locksmiths & Security P/L NSW One Touch Living Pty Ltd t/s One Touch Integrated & One Touch Security VIC Planet Security Pty Ltd WA Rising Connection Pty Ltd NSW SAT (Stacey and Taylor) Pty Limited NSW Thales Australia Limited NSW The Unit Security Services Pty Ltd VIC TNL Tech Pty Ltd QLD Unified Electronic Solutions Pty Ltd VIC VZ Industries Pty Ltd QLD


360 Solutions Australia Pty Ltd t/a 360 Global Security VIC 4S Security Pty Ltd NSW Alkemade Services Pty Ltd t/a Only Security Solutions VIC Auscorp Protective Services Pty Ltd VIC Australian K9 Detection Unit Pty Ltd VIC Auswide Security Group Pty Ltd VIC Aviation Ground Support Pty Ltd QLD Bandit Security Pty Ltd VIC Business ICT Partners Pty Ltd t/a We Connect You (Victoria) VIC Cablewise Electrical Services Pty Ltd VIC Canny Electrics Pty Ltd VIC Chi Teng Services Pty Ltd t/a CT Integrated SecurityQLD Cleansec Property Management Pty Ltd VIC CTFE Pty Ltd NSW Defining Automation Pty Ltd t/a My Clever Home VIC Farm Cam Pty Ltd QLD Fast Electronic Systems Pty Ltd VIC Gopali Business Services Pty Ltd t/as Sharp Eyes Group Solutions NSW H.C Wesseh Nah Konteh & M.K Wesseh Nah Konteh t/a Wilkinson Security QLD iBrown Property Developments Pty Ltd t/a B 38 | OCT/NOV 2017 | SECURITY INSIDER

Switch VIC Insight Security Pty Ltd NSW JONESEC QLD Kaavish Pty Ltd QLD Mason Security Solutions Pty Ltd QLD Michael James Mahoney t/a Garden AceQLD Mustafa Ali Zaidi t/a Fog Bandit ANZ WA Ngembe Group Pty Ltd t/a Capacity1 QLD Protective Services Pty Ltd VIC Secureway Event Security Pty Ltd VIC Sixth Gen Pty Ltd t/a Vic Armourtrans Security VIC Spotless Services Group Pty Ltd NSW Teris Group Pty Ltd QLD Time Lapse Pty Ltd QLD Trident Services Australia Pty Ltd QLD TSL Construction Services Pty Ltd NSW UNE Life Pty Ltd t/a UNE Life Safety, Security & Information NSW Unified Security (Australia) Pty Ltd NSW Unique Security Services Pty Ltd WA V Protect Pty Ltd VIC Vanguard Security Pty Ltd VIC Wade Pastoral QLD Pty Ltd t/a Toowoomba Antennas & T.V. Services QLD


Prime Protection Services NSW P/L Total Managed Solutions Pty Ltd TSW Security Solutions Pty Ltd


ASIAL MEMBER RECOGNITION PROGRAM The ASIAL member recognition program acknowledges longstanding association members. Recognition categories include Platinum (25 years+), Gold (16-24 years), Silver (11-15 years) and Bronze (6-10 years).


Adept Security Pty Ltd Beyond 2000 Alarms Pty Ltd



B Bjedov & S Bjedov t/a Slobis Security QLD Digital Connections & Security Systems Pty Ltd NSW Eris McCarthy Pty Limited t/a Eris McCarthy Electronic Security NSW Grant's Security Alarm Installations P/L NSW Jack and Nadine Boghos t/a Apex Alarms Electronics & Communications NSW Securecom Group Pty Ltd NSW Sledge Security Services Pty Ltd NSW


Churchill Education Pty Ltd Covert Security Group Pty Ltd


John David Holdings Pty Ltd t/a Knightsbridge Security and Communication NSW Keycut Services Pty Ltd QLD Kymera Pty Ltd NSW Marilink Pty Ltd t/a Peninsula Lock & Key Company QLD Metro Security Pty Ltd QLD Michael Przemyslaw Mackowiak t/a Aucom Surveillance VIC Morpho Australasia Pty Ltd t/a Sagem Australasia Pty Ltd NSW Safeguard Security Group Pty Ltd t/a Safeguard Security VIC Sean Denis O'Brien t/a Padbury Security WA Southbank Locksmiths and Security Service Pty Ltd QLD Specialty Programming Services Pty Ltd NSW Stallion Electronic Security Pty Ltd NSW Superb Security Services Pty Ltd VIC Theo Palyvos t/a Trust Protection Services NSW


A.P.T. Security Pty Ltd QLD Aicom Pty Ltd t/a AICOM Security QLD AOS Group Pty Ltd t/a Ezi Security Systems NSW Ausecom Technology Pty Ltd NSW Ausgroup Australia Pty Ltd NSW Chris Pisani t/as CNP Electrical NSW David John Walpole t/a Scenic Rim Security Solutions QLD DVR Solutions Pty Ltd QLD GHM Security Services Pty Ltd NSW Hathway's Pty Ltd NSW Impact Security Australia Pty Ltd NSW Intune TV Pty Limited t/a Intune TV ACT John B Electrical Pty Ltd VIC Leagold Pty Ltd t/a Tecsec Consultancy Services (WA) WA PE Security Group Pty Ltd VIC Pro-System Training Services Pty Ltd QLD Protocomm Pty Ltd NSW Risk Protection Group Pty Ltd t/a Risk Protection Group VIC Secure Coast Solutions QLD Security Consultants Australia Pty Ltd VIC Security Market Pty Ltd NSW Silver Ute Services Pty Ltd QLD SMA Security Pty Ltd QLD Surveillance Central Australia Pty Ltd QLD Symetrix Pty Ltd NSW Synergy Technology Solutions Pty Ltd NSW Titan Security Group Pty Ltd VIC Tuff Enterprises Pty Ltd t/a Aus Guards QLD Wendy Sarah Mills t/a Suttons Security Service QLD Xpress Security Pty Ltd QLD

Individual Professional Recognition Program A recognition program for security professionals committed to the highest standards.

Setting the benchmark for security professionals Companies who put their people first create a culture that inspires leadership and promotes growth. The ASIAL Individual Professional Recognition program sets the benchmark for security professionals looking to progress

their careers and to be recognised by employers, peers and clients. Individuals who meet the entry criteria are eligible to receive the post-nominal credential of either MASIAL, AFASIAL, FASIAL or FASIAL (Life).

To enrol in the program go to


Australian Security Industry Awards Book your seats at

2017 EVENT Winners announced - 19 October 2017 The River Room, Crown Melbourne. The Australian Security Awards Ceremony & Dinner The night is an opportunity to celebrate excellence and innovation in the security industry, and network with likeminded security professionals.

Organised by



Lead dinner sponsor

Entertainment and centrepiece sponsor






Making health and safety easier for members

Mee t yo in 1 ur WH 5m inut S oblig es p a er w tions eek

Ava ilab ACCESSIBLE anywhere, Special l e ANYTIME to $27 OFFER 5 (in ASIAL mem Contact us to cl G The ST) A our new syst SIAL S per bediscuss r s em, afe f or promotion indu W d ann member stry esigne orkpla u d to c : m AS4 e Mana

801 g Inclu and ement man des an Sy tailo o pow red stem i er/e ffice acc to th s a t l o ectr Crea onic unt an e Au otal W tes a s sec d a m stra WHS urity obil lian HS plan staff e acc Stor secu for y e in th ount busi s forms rity our a e c fi c eld ness busi essib , ness , em inciden l e to ploy t rep and e o


To register visit

2017 Australian Security Awards

19 October 2017

The Australian Security Industry Awards for Excellence, organised by ASIAL, is now in its 22nd year. The Outstanding Security Performance Awards (OSPAs) return to Australia for the third year. Each provides an opportunity to recognise companies and individuals across the security sector who have demonstrated exceptional achievement. Time: 7pm - 10:30pm Venue: The River Room, Crown Casino Venue address: Crown Casino, 8 Whiteman Street, Southnank Victoria 3006 Price: $175 per person or $1,650 for a table of 10 (GST included in prices)

QLD Industry Briefing

15 November 2017

A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL’s Tania Laird. Time: 7.30am-9.00am Venue: Hillstone St Lucia Venue address: Carawa Street, St Lucia, QLD

NSW Industry Briefing and AGM

23 November 2017

A great opportunity to network with security professionals and hear the latest updates from guest speakers including an industry update by ASIAL. Time: 7.30am-9.00am Venue: Holiday Inn, Parramatta Venue address: 18-40 Anderson Street, Parramatta, NSW

SAVE THE DATE! The Security Exhibition & Conference is the industry's annual opportunity to reunite for three days of quality networking and unrivalled education alongside a showcase of the most innovative solutions to the Australian market. For over three decades it has been the largest and most established commercial event for the security industry in Australia, bringing together the entire supply chain of manufacturers, distributors, security professionals and end users to connect and create unparalleled business opportunities.

To book: visit To book: visit


Welcome to ASIAL We are here to help your business succeed. As an ASIAL member, advice and support is always within easy reach.

Leadership Providing a strong industry voice & advocacy



& Professional Development

To Quality

Promoting Your

A Trusted



Professional Advice &

Access To Industry


News & Resources

ASIAL is the peak body for security professionals. We are dedicated to supporting members, promoting standards and safeguarding public interests. | 1300 127 425

Security Insider October/ November 2017  
Security Insider October/ November 2017  

Security Insider October/ November 2017