ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 1
UNITED KINGDOM CHAPTER 208
ASIS NEWSLETTER OF THE YEAR – WINNER 2013, 2012, 2008 & 2003 – HONOURABLE MENTION 2011, 2006.
ASIS Europe 2015 Mike Hurst - Chapter Vice Chairman A busy weekend all in all, starting with the ASIS UK Spring Seminar on the Thursday, Dublin on Friday to join the Irish Chapter celebrating their 21st anniversary at Facebook’s European HQ, before heading off to Frankfurt for the main event, the ASIS International 14th European Security Conference & Exhibition. With 500 attendees from 46 countries you would think that it’s easy to get lost in the crowd, but, I think that (probably) the best thing about these conferences is the positive and inclusive spirit amongst the delegates: everyone is pleased to talk and network. Yes, there are great, expert speakers, brilliant networking and social events and exceptional keynote speakers, including the UK’s very own Prof Martin Gill, but that is only part of the picture. After attending meetings of the European Advisory Council (I am a member) and another with the European Chapter leaders, we met up with most of the 60 or so Brits attending, along with some of our international colleagues for a brief soirée before heading off to the Welcome Party – Powered by Nedap. The importance of the event was underlined by the presence of the
opening Key Note speaker Dr. Thomas de Maizière, Federal Minister of the Interior of Germany (the equivalent of our Home Secretary, but without the leopard print shoes). The Minister gave a comprehensive overview of the security situation in particular for industry and introduced the economic security architecture in Germany, focussing on areas such as countermeasures against crime and espionage, also in cyberspace. This was followed by a day of educational sessions on topics such as “the future of security technology”, “protecting soft targets from hard-line Terror”, “social media - how does policing respond to mass data in crisis” and “eliminating Syria’s chemical weapons – the security challenges for the OPCW”. My co-UK Vice Chairman, Graham Bassett and I gave a presentation on Personal Branding and Career Development to 60 colleagues.In the evening we all gathered for the President’s Reception, hosted by ASIS President Dave Tyson CPP and sponsored by Tyco Integrated Fire & Security.Day Two was as good as Day One and was closed by Axel Petri, SVP Group Security Governance at Deutsche Telekom AG, Germany, who spoke about the impact of the Snowden revelations on the telecoms industry and need to regain the trust of the consumer. I also got a lot out of attending the sessions of CSO Roundtable Summit which ran alongside the main conference. The ASIS CSO Roundtable is the forum for the most senior security officers in some of the world’s leading organisations. continued over
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 2
Chairman’s Notes We have often been privileged to hear from some inspirational speakers at our Chapter meetings, but I can’t remember one that I’ve enjoyed so much as our March meeting when Graham Hodgkinson, CEO of London’s Air Ambulance, gave an excellent account of the organisation’s work. Countless thousands of lives have been saved and families all over London have been positively affected by the work that this organisation undertakes. It is incredible therefore that, despite some funding for staff, the vast majority of the running costs are met by charitable donations. I’ve had the privilege of working closely with London’s Air Ambulance teams over many years, initially as a Police officer in London and later when I was the Security Manager at the Royal London Hospital, where they are based. As such I am incredibly proud of our Chapter’s relationship with them and am keen to support them in the coming years. Even a heart stopping “Go around”, as we were about to land back at Heathrow on our return from Frankfurt, couldn’t spoil a magnificent European Conference. The UK Chapter had a large contingent, many of whom were speaking at the three day event held at Frankfurt’s Messe Conference Hall. The opportunity to network with colleagues and fellow ASIS members from across the globe, was one of the highlights and the main differentiator between ASIS and any other membership organisation in the UK. April saw the first major non London based meeting for Chapter members. Chapter Secretary, Dr Peter Speight
organised a fantastic event at Leeds University on 9th April, and thanks to a wonderful turnout of members and guests, together with tremendous support from our sponsors and exhibitors, we were able to deliver a truly memorable meeting. Further meetings outside of London are being planned; if you have a suggestion for a venue or speakers, please let us know. Our collaboration with other organisations continues to develop. At the Spring meeting, I was delighted to co-sign the Memorandum of Understanding between our Chapter and London First with Robert Hall, Director of the Security and Resilience Network at London First. This will allow a number of members from each organisation to attend the other’s events. Such an arrangement already exists between us and TINYg, the international Counter Terrorism organisation and we are in discussion with other organisations, to see if similar arrangements can be put in place for the benefit of our respective members. In closing, I would like to publicly thank my fellow members of the leadership team for their support and hard work whilst I have been incapacitated. Our Chapter can only operate because of the selfless efforts of a small but dedicated team of volunteers. Thank you all. Andy
from Page 1
So where next? Well we are delighted to announce that in 2016, the 15th European Conference will be returning to London. Running from April 6th – 8th it will be the biggest and, dare I say it, the best security education and networking event of the year. The Call for Papers is already out www.asisonline.org/london and we hope to have a huge number of abstracts to consider when we
meet in October: we had 140 submissions in 2012. We look forward to working inclusively with friends, colleagues and media partners from across the profession and from all security organisations to make the event a huge success, because if we do, the security profession and society will be the real winners. See Page 4 for more photos.
ASIS International Vision Be the recognized leader advancing security worldwide.
ASIS International Mission Promote excellence and leadership in the security management profession.
ASIS International Goals Fulfil the needs of members and the profession. Deliver quality education, information, research, and opportunities for networking. Develop and promote security standards. Promote professionalism, certification, and ethical conduct. Advocate to key audiences for ASIS International and the profession. Strengthen and grow ASIS International.
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 3
40,000 BUYERS AND BUSINESS PARTNERS
Jun-15 3rd 3rd—4th 5th 16th-18th 18th 25th Jul-15 7th 9th Sep-15 TBC 22nd 28 - 31 Oct-15 15th 15th 19th - 20th 28th Nov-15 TBC Dec-15 2nd - 3rd 10th Feb-16 21-23 April-16 6th-8th
Access to leading global technology, solutions and knowledge to enable security excellence
Spring SASIG Lie Detection Briefing, US Embassy ASIS UK CPE Day, Stockport International Port Security Conference, London ASIS UK CPE Day, London IFSEC IFSEC – ASIS Education Sessions ASIS UK Summer Seminar Security IT Summit, London Security TWENTY 15, Newcastle
16-18 June 2015, ExCeL London @IFSEC #IFSEC2015
Photo courtesy of: Crossrail
May-15 8th 27th
ASIS UK Autumn Seminar Security Institute Annual Conference 61st Annual Seminar and Exhibits, Anaheim, California Consec Global Resilience Summit, London Total Security Summit Security Twenty 16, Heathrow
3 Hear from industry leaders on how we are securing our cities at the Safe Cities Theatre
9th ASIS Asia-Pacific Security Forum & Exhibition Transport Security Expo ASIS UK Winter Seminar and AGM
3 Meet international thought leaders at the Euralarm conference 3 Pre-book meetings with your preferred suppliers through the Global Meetings Programme 3 Get all your security solutions, education and training in one place
REGISTER AS AN ASIS MEMBER at www.ifsec.co.uk/asis
7th ASIS Middle East Conference, Dubai
The global stage for security innovation and expertise at ExCeL London, 16-18 June 2015
15th ASIS European Conference, London Supported by
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 4
14th European Conference in Pictures - Frankfurt 29—31 March
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 5
ASIS UK ENTERPRISE RISK MANAGEMENT SEMINAR
ASIS UK Ventures t’North They do say that you never have to ask someone if they are from Yorkshire, because they will tell you anyway. Well the ASIS UK Enterprise Risk Management Seminar, our first trip to God’s own county (at least recently) was organised by Chapter Secretary and proud Yorkshireman, Dr Peter Speight CSyP, Director of Risk Management for Securitas and hosted by Leeds University. The feedback from the 80 delegates was unanimously positive and was a testament to the hard work Peter put in to this (as my inbox will show). Massive thanks to our speakers Neil Gammon - Head of Physical Security BSKyB, Dr Kevin Macnish - Teaching Fellow at University of Leeds and Gail Pinkerton-Field of Securitas. Equally massive thanks to our sponsors and
Neil Wainman CPP flying the flag at Security TWENTY 15 in Nottingham
Heather Brand and Chapter Technology Lead Dr Vibhor Gupta, manning the stand at Security TWENTY 15 in Bristol.
exhibitors, without whose support, the event would not have been possible. Securitas; Reliance High-Tech; Teledata;i-Comply; IFSEC International; InTech Solutions; Moneypenny and Nedap Security Management.
Stephen Ackroyd, CSyP, Mike Hurst, John Murphy CPP PSP and Dr Vibhor Gupta at CTX
Dave Clark CPP PSP in full ASIS recruiting mode at CTX
Angus Watts receiving his 208 Veteran’s Certificate.
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 6
WHY CERTIFICATION? Having been a security manager with responsibility for the development of my staff, and for the past seven years delivering security management training, I have often been asked two questions. Firstly, ‘How can I further my career?’ The obvious answer is ‘be good at what you do, demonstrate how you are adding value to your organisation and undertake relevant training’. Whilst these factors are always important and will justify the remuneration package paid by the employer, it is the second question that requires more careful consideration. ‘If I want to, or have to move on, what should I do to maximise my chance of impressing a potential employer for a security management position?’ There is no simple answer to this question, but perhaps we should ask the question from the perspective of the employer, thus ‘what do I want from this candidate to give me confidence I am making the best selection?’ I suspect that many of us are familiar with the three key questions that those interviewing candidates for positions in their organisation seek to answer, ‘Can the candidate do the job?’, ‘will the candidate do the job? and ‘will they fit in?’ Having been on both sides of the table, I am aware that the judgements of those making the selection are often very subjective, and sometimes it is the final question that determines the candidate’s chances of success.
Barry Vincent MA, MSc, CPP, PCI, in the sector. In cases where a candidate is coming into the industry via the police or military, even this is not available so the employer may be taking a gamble that the appointment will work out.
However, I would argue that it is the first question ‘Can the candidate do the job? that deserves more prominence, but in many cases the employer has to base their judgement on the candidate’s CV and previous employer’s references. Important as these are, both are fallible. We know that the CV is a promotional tool in which the individual will have presumably tailored the content to best suit the position for which they are applying. References can also be problematic as some are not taken up, and in some cases the referee may have a variety of motives for endorsing the candidate to another employer. Hence, the employer is often forced to make a subjective assessment of the candidate’s capacity to ‘do the job’, perhaps based on not much more than the fact that the individual has previous experience
I am sure that some employers have a much more rigorous process than that I have described above and have recruited security managers with excellent track records, but there are many examples of individuals who have been appointed to such positions and singularly failed to meet the employer’s expectations. This is unfortunate for both parties, since for the employer it involves the time and cost of going back to the market place perhaps to take another chance on appointing the ‘right’ person, and for the candidate can be a damaging blow to their career from which it may be difficult to recover. So, what can be done to improve the chances of both for a successful appointment? Obviously experience is a major factor but, as outlined above, experience alone may not be a guarantee of success. How can the odds be shortened? Space precludes a debate about what constitutes ‘professional’ security management, or a discussion about the relevance of an accepted body of knowledge that underpins other professions such as the law or medicine, which is absent in security. Perhaps the
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 7
closest we have to this is provided by ASIS as set out in the Protection of Assets Manual and the product of their Global Security Initiative which has produced credible security standards and guidelines. ASIS enables suitably qualified individuals who have studied these materials and demonstrated their understanding, tested in a challenging examination, to achieve certification as Certified Protection Professional (CPP®), Physical Security Professional (PSP®) or Professional Certified Investigator (PCI®), and in doing so to have demonstrated ‘mastery of core principles and skills essential to best practice of security management’ (ASIS Board Certifications guide). Those of us who have undertaken any of these certifications will know how demanding the examination can be, but I would also suggest that there is a clear benefit of studying the breadth of the syllabus itself which broadens one’s knowledge base beyond any particular specialism we may already possess, and is therefore valuable for application beyond the individual’s current role. These benefits are well understood in the United States where ASIS has been active for more than 60 years, but less well appreciated in other parts of the World including here in the UK. One of the challenges we face here is that employers are largely ignorant of the ASIS certifications, although I was interested to learn recently from some Irish colleagues that companies in the Republic of Ireland, especially those with American connections are now starting to specify the need for a CPP in job advertisements. It may be some time before the ASIS Board certifications gain the same credence in the UK as in the US, but I suspect that a candidate who is asked at a job interview ‘I see that you have a CPP, tell me about that’, may well enhance their chances of selection, and provide a degree of assurance to the employer’s dilemma of ‘can they do the job?’ TheSMA runs CPP®/PSP® Studyflex examination preparation programmes which are designed to offer you maximum support towards attaining these high level certifications. Delivered with the busy security manager in mind, allowing those with busy work schedules up to 12 months to complete their course through a combination of home study and intensive classroom review. For further information, please contact Caroline Bashford at email@example.com or call her on +44 (0) 1491 699 685 to discuss your training requirements.
SE C U RI N G
ACCESS CONTROL, CCTV, & INTRUDER DETECTION HEAD OFFICE: Reﬂex House The Vale Chalfont St Peter Bucks SL9 9RZ Tel: +44 (0)1753 482248 LEEDS OFFICE: 1200 Century Way Thorpe Park Business Park Colton Leeds LS15 8ZA Tel: +44 (0)1133 221026
Email: firstname.lastname@example.org follow us at:
Barry Vincent MA, MSc, CPP, PCI, FSyI is an independent security consultant and a lead trainer with The Security Management Academy (TheSMA)
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 8
MAKING THE MOST OF MOBILE ACCESS Daniel Bailin The latest access control systems improve security by enabling mobile devices to be used as credentials, significantly improving convenience while delivering a better user experience. Mobile access control simplifies the secure identity management process for facility access, while also paving the way for solutions that can integrate multi-layered physical access control (PACS) and IT security into unified systems. Other exciting developments include the emergence of gesture technology that makes long-range door opening both safe and convenient, new mobile credential form factors such as smart watches, wristbands and other wearables, and the emergence of biometric authentication to further
improve mobile access security and convenience. With today’s mobile access technologies, smart devices can be used as universal credentials for accessing multiple buildings, IT systems and other applications using NFC and Bluetooth. These devices provide users with extremely convenient vehicles for opening doors and performing other tasks that require the presentation of a secure credential. Today’s solutions enable organisations to immediately begin using Bluetooth Smart and NFCenabled smartphones and other smart devices as an alternative to metal keys and smart cards in today’s increasingly popular BYOD mobility environment. Some can also take advantage of new advancements in gesture technology so that users can
unlock doors from a distance. Physical access control has historically relied on close-range “tap” transactions (directly tapping an RFID card to a reader) to authenticate a user and open a door. Logical access control has used the same tap authentication model, but this precludes such desirable use cases as automatically locking the laptop when a user walks a certain distance away from it. Achieving this longer-distance transaction capability results in a new model that increases security while also improving convenience – two concepts that have typically been mutually exclusive. While the most common RFID card technologies for tap transactions typically have a read range of one to three centimetres, Bluetooth extends the transaction distance that systems can manage from a
YOUR CAMPUS. CONNECTED
ONE CAMPUS. ONE SOLUTION. HID Global has the world’s largest portfolio of secure, inter-operable solutions for education, providing physical and logical access control, on and off campus. Combined with a global network of technical support and authorised partners, you’re sure to get the powerful security you need today, with the ﬂexibility you need for the future. To ﬁnd out more, visit hidglobal.com/education © 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 9
few cm to many meters, making it an ideal choice for the longerrange authentication model with mobile devices. A new and special feature of Bluetooth Smart is the ability to configure this read range allowing the user to determine if a phone should be tapped to a reader in order to open a door, or if longerrange activation should be used. When this Bluetooth connection is combined with gesture technology, users can open doors from these longer distances by twisting their smartphone as they approach a mobile-enabled reader. The benefits of mobile access will only grow as new devices are added to the product ecosystem. For instance, adding wearables to the ecosystem will give users the freedom to leave home with nothing but a smart wristband carrying their ID. Plus, as wearables join smartphones and other mobile devices for access control, we will see greater momentum behind biometric authentication models. We’re already seeing the growing adoption of mobile biometrics for payment applications. The latest solutions focus less on technology and more on the user experience, taking a key step toward the long-time goal of killing PINs and passwords by making it easier to know if someone is who he or she claims to be. As this model grows in popularity along with the value of the transactions it protects, there will be new pressures to provide even better security. Advancements in biometric technologies will help here, along with improvements in privacy, encryption, tamper protection and anti-spoofing capabilities. New innovative uses include “binding” a person to a device such as a key fob with a fingerprint sensor – all without deploying biometrics readers – for multi-factor authentication. Growing adoption of mobile access
will also drive the move to converged access control. This will not only make it easier to accommodate a combination of cards, phones, wearables, but also enable organisations to combine secure physical and logical access as part of their facility and IT access strategies. The ultimate objective goes beyond supporting multiple form factors, though. Even more valuable is the ability to use a variety of devices for multi factor authentication – to secure access to the door, to data and to cloud
applications, while providing a seamless user experience. Mobile access has opened a new chapter in the creation and management of digital identities. Moving forward, the adoption of mobile access and new credential form factors such as wearables will create new opportunities for innovative use cases beyond opening doors and converged physical and IT security. Daniel Bailin - is Director, Strategic Business Development and Innovation with HID Global
Register of Chartered Security Professionals Recognising the difference The Register of Chartered Security Professionals is a qualification recognising personal ability and competence which allows confidence in the highest standards of service. Admittance to the Register demonstrates to clients, employers, peers and the public an ability to deliver quality results, compliance with a Code of Conduct, a professional Disciplinary Code and a commitment to Continual Professional Development.
Visit www.csyp-register.org for more details and to apply Why become Chartered? x Independent verification of your competence x Prove your ability to deliver quality results x Confirm you are at the top of your game x Show commitment to Continual Professional Development x Lead by example
Who can Apply? Chartered Security Professionals must be of undisputed integrity and have a high level of expertise, operating at a strategic level, or the senior end of the operational level of security practice.
Contact Us: PO Box 208 Princes Risborough HP27 0YR United Kingdom T: +44 (0)1494 488599 W: www.csyp-register.org E: email@example.com
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 10
CPP / PSP
Good News for ISMI®-Prepared CPP and PSP Candidates Sixteen candidates have recently completed preparation programmes with ISMI® for the ASIS CPP® and PSP® certifications. A number are still to sit the examination: our congratulations go to those listed below who have been successful so far, some achieving unprecedented high scores. Anyone who has gone through the exam process will tell you that neither examination is easy. Whilst it is possible to self-study, we lead busy lives and balancing work and family is difficult enough, so following a guided-learning programme will help you better focus your studies and keep you on track to complete within 6 months. This is endorsed by the following delegate comments: “I definitely could not have passed without your programme and I am very grateful for your interpretation of the materials.” (CPP) “The course was very useful thanks David, both the classroom and DL (distance learning) really helped to focus the mind.” (PSP) If you are considering either designation, ISMI’s support programme is proven to deliver results – it comprises 2 x 3-day classroom sessions, interspersed with 4 months of distance learning and coaching support plus access to ISMI®’s unique online library of security management resources. David Cresswell CPP PSP, who will guide you through the programmes, is a globally-
recognised leader in security management certification training with many years of relevant experience. He has helped hundreds of professionals achieve certification over the last 10 years and his knowledge of the source materials and likely examination topics is unequalled in the UK.
contraband detection, lighting etc), this unique credential will verify that you have the knowledge and expertise to best serve your customers and employer in the application of physical security, specifically. Note: In both cases, eligibility criteria apply – check out the ASIS International website https://www.asisonline.org/Certi fication/BoardCertifications/Pages/default.asp x
So which certification is for you? CPP: For the general security practitioner the CPP syllabus covers the following key areas of security management: Security and Business Principles and Practices, Investigations, Personnel Security, Physical Security, Information Security and Crisis Management. Studying the reference materials and achieving the designation will be an endorsement of your experience and knowledge and add value to your credibility as a board-certified security management professional.
PSP: For security managers, consultants or specifiers involved in the selection, specification, recommendation, project management, procurement or surveying of physical protection systems (access management, barriers, CCTV, intrusion detection,
Forthcoming ISMI® preparation programme dates for each ASIS certification are as follows. For details of these and future programmes, please contact Janet Ward firstname.lastname@example.org or call +44 (0)1386 871918 if you would like any advice or have any questions. PSP programme: 17-19 June to 18-20 November 2015 including distance learning CPP programme: 13-15 May to 14-16 October 2015 including distance learning Congratulations to the following recently successful certificants: Richard Austin CPP David Clark (CPP) PSP Tony Gledhill (CPP) PSP Simon Jones PSP James Lavender PSP Chris Mitchel (CPP) PSP Stella Sass PSP Michael Wood CPP (bracket indicates previously held designation) And good luck to those taking their examinations in the next few weeks.
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 11
Video Surveillance Resolution 4K Ultra HD is revolutionising resolution in video surveillance says Ed Thompson, CTO DVTEL. Above, A mini-dome and bullet from DVTEL’s Quasar 4K Ultra HD line.
Resolution and clarity in video surveillance has always been a challenge in evidence gathering and investigation analysis. Who hasn’t seen the blurred and choppy images of crime scene getaways on TV shows such as Crimewatch – images that often help the culprits get away with it! Lights, Cameras, No action! Fortunately as with other technologies, camera manufacturers continue to push the boundaries of image clarity to enable catch-up. Some manufacturers have introduced cameras that can deliver as much as 40-megapixel resolution. However, these cameras can only be used in a very limited number of applications at best and, at worst, merely serve as a marketing gimmick. If you’ve been keeping up with the market, you’ve heard about the buzz around 4K Ultra HD cameras. 4K holds realistic potential. Although 10-megapixel cameras, which are essentially the equivalent of 4K cameras in terms of resolution, have been around for years, the devices haven’t exactly generated a lot of excitement or demand from end users. There are several reasons: frame rates and light sensitivity on these cameras are very, very low and the costs of storing high-resolution footage can be high. These factors combine to make the deployment of cameras in the 10-megapixel range and above simply out of reach for most users. The difference with 4K is that a new set of high-quality sensors have been developed to accompany these next generation cameras, enabling the cameras to operate at up to 30 frames per second. This has significantly changed the quality of the image coming into the camera. At the same time, there have been some breakthroughs on the back end with digital signal processors (DSPs), which can handle larger image formats. With the combination of these new sensors and DSPs, manufacturers can now offer 4K at around the same total cost of ownership as 1080p. Four times the evidence detail What does this mean for police and the legal community? Harder evidence and forensic capability, in a nutshell! Users can now have four times the amount of evidentiary detail with minimal impact to storage costs. Those who may have only been able to afford cameras in the 720p to 1080p range can realistically think about using 4K and having much higher quality. What’s more, 4K provides more forensic zoom and delivers greater detail out of an image than previously possible; even with a higher megapixel camera. Even with the high-quality images from highdefinition and megapixels, many users still run into a problem of
the image becoming ‘choppy’ or the pixels ‘blocky’ soon after they the digital zoom. With 4K, you can zoom in quite a bit further on an image before it degrades. The finer pixel geometry that comes with 4K resolution also results in enhanced video analytic capabilities as algorithms are positively affected by the improved image quality and could, in some cases, even double detection ranges. While the evidence gathering benefits of 4K resolution are obvious, users still face challenges: primarily network and bandwidth needs, and storage demands. The workstation processing for many applications also will have to expand substantially in many cases. However, many of these hurdles can be addressed without the need for extra infrastructure. For ex- ample, a 4K camera running at 30fps could operate at 4Mbps, which is no higher than a 1080p camera. In that case, storage would be virtually unaffected and there would be relatively little impact to a workstation because the decompression rate is about the same, depending on the camera and how it is optimised. Another factor often discussed is the need for a 4K monitor to view the live feed in 4K resolution. Prices of 4K monitors have fallen dramatically in recent months. Value vs Cost of evidence Although 4K is still in its early adoption stages, there are enough clear advantages to using 4K to seriously consider the technology now. Those looking to move should consider a package. Complete systems incorporate closely integrated video management software, adaptive streaming, streamlined deployment with plugand-play, and ease of use through an intuitive drag-and-drop interface. Indeed, users in a variety of markets have only begun to make the transition to IP-based products, let alone high-definition and megapixel. Adoption relies heavily on manufacturers and channel partners educating the market about what users can hope to achieve. For some, 4K may just be another offering among many, but others will look to make it their preferred solution. It really comes down to the value versus the cost of the evidence. The value tends to increase with resolution and, typically, the cost of the evidence rose faster than the resolution, which kept demand for high-resolution in check. Because costs associated with migrating to 4K are minimal, demand for this image quality will surge. ■
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 12
London First and ASIS International UK Chapter are proud to announce that they have signed a Memorandum of Understanding. The agreement was signed at the ASIS UK Spring Seminar on March 26th by the London First Director of Security & Resilience, Robert Hall MBCI MSyI and ASIS UK Chairman Andy Williams CPP FSyI. Both organisations have been working together informally for some time but they hope and expect that the MoU will be the start of a long-term and meaningful relationship with a view to: Developing greater cooperation and synergies between the Parties in order to promote mutual objectives in security and resilience. Allowing members of the respective Parties to partake in one another’s events so as to maximise effectiveness in subject areas and minimise duplication of effort. Enhancing both Parties’ reputation, exposure in the market and business interests. Announcing the agreement Andy Williams said "I am delighted to have signed this MOU with London First on behalf of ASIS UK. I believe that it will prove to be of significant benefit to the members of both organisations.
Robert commented that he was “delighted with the association which demonstrated that two strong, independent organisations can work together for the benefit of their respective memberships in advancing the collective security of organisations based in London.” London First will be supporting The European Conference in London in 2016.
London’s Deputy Mayor welcomes the return of the European Conference to London Sir Edward Lister, Deputy Mayor of London, said: “We are delighted that ASIS International has chosen London as the destination of its 2016 European meeting. We look forward to welcoming back this world-class event for security professionals.” Ed Lister spent a long career in the security sector and was an ASIS Member for many years. Congratulations to Dave Clark CPP PSP and Rowena Fell CPP on their admission to the ASIS CSO Roundtable, and ASIS Membership group open to the
most senior security executives at the world’s largest organisations. Garry Evanson appointed as Security Institute Chairman Congratulations to Garry Evanson CSyP who was appointed as the new Chairman of the Security Institute, taking over from Esoteric Ltd MD Emma Shaw CSyP. Talking of The Security Institute, the outgoing Chairman, Emma Shaw CSyP of Esoteric received a certification on appreciation from Chapter Chairman Andy Williams CPP.
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 13
SPRING SEMINAR 26 MARCH 2015
ASIS International – UK Chapter
Summer Seminar – June 25th Hosted by BAT, Globe House, Temple Place, London (Temple tube) Contact email@example.com for booking details 14:00
Registration, Coffee, Networking
Dr Kieran Mitton Kings College London, Department of War Studies Professor Tim Grant Director, Centre for Forensic Linguistics, Aston University ACC Peter Davies Lincolnshire Police
Drinks, nibbles and networking on the roof terrace enjoying the summer sunshine and the unique views along the Thames
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 14
AXIS WHITE PAPER
White Paper abstract: As shown by the globally recognised IHS report, IP surveillance cameras will outsell Analogue cameras for the first time since IP cameras were introduced back in 1996. However there are still operational requirements that dictate the need for an IP camera to comply with the original Rotakin standards* and provide an image as a percentage of screen height, a
Lenel to showcase Integrated Solutions at IFSEC 2015 Lenel Systems International, a provider of integrated access and video solutions, will present Prism, its open Internet protocol (IP) video management solution (VMS), at the upcoming International Fire and Security Exhibition and Conference (IFSEC). Lenel Systems International, a provider of integrated access and video solutions, will present Prism, its open Internet protocol (IP) video management solution (VMS), at the upcoming International Fire and Security Exhibition and Conference
challenge with a technology that use pixels per metre as its measuring stick. In this White Paper you will learn how, with the right camera features and technologies, we are able to utilise IP cameras within the Rotakin standard and address the challenging operationalissues. Rotakin standards: was developed by the Home Office and is the only device specified in BSI EN 50132-7 :
(IFSEC). Prism is based on an advanced, intuitive and operator-friendly user interface and features OnGuard compatibility. Lenel is a part of UTC Building & Industrial Systems, a unit of United Technologies Corp. (NYSE: UTX). Offered in three configurations (standard, professional and enterprise), and available as a stand-alone VMS or integrated with OnGuard, Prism is scalable, flexible and reliable to meet evolving video surveillance needs. Prism fits in an enterprise video platform by offering customers a single user-friendly VMS for small to large installations, whether they are using Lenel network video recorders or UltraView recording engines.
1996 test CCTV camera performance. If you have any questions about the Rotakin White paper please contact: Steven Kenny, Business Development Manager A&E ProgrammeEmail:Â steven.kenn firstname.lastname@example.org Phone: +44 (0)1923 211 417 http://tiny.cc/ip49wx
"By combining OnGuard and Prism industry-leading products with more than 100 open access alliance partners (OAAP), close to 100 OAAPcertified products and supporting more than 300 third-party cameras, customers can tailor the Lenel solution according to their specific security demands," said James Wheeler, Regional Director, Lenel UK and Ireland.
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 15
DUTY OF CARE
Do employers treat travellers equally when it comes to Duty of Care? David Rolfe CPP Todayâ€™s global market place has led to an explosion of international business travel that we all take for granted. What is surprising however, out of the 57m trips taken abroad last year by UK nationals, over 51% was by womenÂ (Source FCO). The advent of internet and social media has seen a number of femaleonly travel networking sites, for both business and leisure, promoting secure and safe ways for women to travel, allowing them to share that information for the benefit of others. These sites do a great job; providing relevant information for a trip in a specific country or personal experiences, and encourage safe practices. However, what's lacking is an understanding by corporate business of the different security issues that face their female travellers. This lack of understanding is leading to little, or no, specific advice being given on how to mitigate the risks they may face. A recent survey conducted by the European Interagency Security Forum (EISF) concluded that women are more likely to suffer specific threats such as harassment, gender-based violence, sexual harassment, verbal threats and theft/burglary, A number of questions companies should consider include: Do women in our organisation travel on business? Are they equipped to avoid a potential safety risk when travelling? Do we provide them with the knowledge to avoid these risks? It is widely acknowledged that a gender diverse workforce leads to greater organisational success, while companies that rely on strategies and decisions implemented solely by men are at a commercial disadvantage. Absence caused by travel related
stress and anxiety, due to incidents suffered by women whilst on business travel abroad, can present significant costs to an organisation, both in economic and moral terms. Senior management now needs to consider the quality of duty of care provided to their employees when working and travelling abroad. They may need to look at a more gender specific practice of risk management, one that accepts differences and addresses them within their risk management process. Does the current practice of single allinclusive risk management across genders really provide the mitigation required under legislation? Does it meet your company's corporate/social responsibility? Is it feasible that generic travel risk training can really provide the quality of training required? We believe that the answer is No. Generic travel risk training does not cover some important and specific areas that relate to women. A recent survey of businesswomen travellers discovered that less than 5% had female-specific advice from the risk managers. Cultural issues are a prime example of female-specific advice that should be included in the pre-planning of any trip. The differences between men and women in a large number of countries are at the heart of their culture and are generally driven by religious beliefs. Western women normally enjoy a more liberal existence, and naivety is no defence against contravention of these cultural rules. Some examples of these local cultural issues are: A woman runs the risk of being derobed for wearing trousers in Malawi
flirtatious in the Arabian Gulf A female reporting a sexual assault in the UAE can risk being charged with unlawful sex Innocent mistakes by a female traveller can quite easily cause great offence! Not only can these mistakes lead to problems with the authorities, such as arrest and detention, public humiliation, physical or sexual assault, but can also have a detrimental effect on the business represented, with a subsequent loss of income and reputation. Risk Managers, responsible for business travel and the duty of care of employees, need to consider whether they are fulfilling their remit sufficiently. Even in this age of equality, women clearly have a higher risk profile than their male counterparts when traveling on business to certain destinations and therefore should be provided the appropriate specific advice. The problem often occurs when organisations are reticent to provide gender or LGBT-based travel advice for fear of crossing the discriminatory line, being perceived as patronising, or because of a lack of experience when discussing issues of a sensitive nature with the opposite sex. Businesses can no longer turn a blind eye. The potential risks to their reputation, internally with their own staff and externally to the market and the general public, if best advice is not provided, will have a greater impact than the financial compensation dispensed to the victim. David Rolfe CPP DirectorSecurity & Risk FortuneWest Limited www.fwsecurityrisk.co.uk
A woman initiating a handshake or making eye contact could seen as
ASIS may15_ASIS_RiskUK_may15 12/05/2015 22:24 Page 16
ASIS 15 TH EUROPEAN
SECURITY CONFERENCE & EXHIBITION LONDON, UK | 6–8 APRIL 2016
Issue 2 - 2015