RiskUKAugust2017
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
August 2017<br />
www.risk-uk.com<br />
Security and Fire Management<br />
Visions of Tomorrow’s World<br />
The Roadmap for Physical and IT Security Convergence<br />
News Analysis: Counter-Terrorism Procedural Reviews<br />
Violence Risk Management: Safeguards in the Workplace<br />
Business Resilience: Focusing on Successes and Failures<br />
Fire Safety Management and Installation Supplement
Simple & Easy Installation<br />
Integrated Security - Access Control<br />
Inception is an integrated access<br />
control and security alarm system with<br />
a design edge that sets it apart from the pack.<br />
Featuring built in web based software, the Inception<br />
system is simple to access using a web browser on a<br />
Computer, Tablet or Smartphone.<br />
With a step by step commissioning guide and outstanding user interface,<br />
Inception is easy to install and very easy to operate.<br />
For more information, visit www.innerrange.com/inception.<br />
There you will find installation guides and videos to help you<br />
get the most out of your Inception system.<br />
IN<br />
DESIGNED<br />
A U ST R A<br />
R<br />
LIA<br />
Security<br />
Alarm<br />
Access<br />
Control<br />
Automation<br />
No Software<br />
Required<br />
Multiple<br />
Devices<br />
Easy Setup<br />
with Checklist<br />
Prompting<br />
Send IP Alarms via<br />
the Multipath-IP<br />
Network<br />
Visit www.innerrange.com or call 0845 470 5000 for further information
August 2017<br />
Contents<br />
44 Meet The Security Company<br />
In association with the NSI, Risk UK continues its new ‘Meet The<br />
Security Company’ series by asking Cobra Security’s company<br />
director Stephen McComb the key questions of the day<br />
ISO 22316: Preparing for Brexit (pp14-15)<br />
5 Editorial Comment<br />
6 News Update<br />
EU Home Affairs Sub-Committee Report on Brexit. Surveillance<br />
Camera Commissioner introduces ‘Passport to Compliance’<br />
8 News Analysis: Counter-Terrorism Reviews<br />
MI5 and the National Counter-Terrorism Policing headquarters<br />
are conducting review procedures. Brian Sims reports<br />
11 News Special: BSIA Security Personnel Awards<br />
Brian Sims reports from The Grand Connaught Rooms in London<br />
on this year’s BSIA Security Personnel and Chairman’s Awards<br />
14 Opinion: ISO 22316 Security and Resilience<br />
ISO 22316:2017 on Security and Organisational Resilience has<br />
arrived. John Robinson appraises the content in relation to Brexit<br />
16 Opinion: Security’s VERTEX Voice<br />
Peter Webster takes an in-depth look at what can be done to<br />
make security a far more attractive career choice for females<br />
19 BSIA Briefing<br />
James Kelly details Best Practice for security search procedures<br />
22 Physical and IT Security Convergence<br />
Where are we now on the road to genuine convergence between<br />
physical and IT security? Damien Pezza investigates<br />
47 The Security Institute’s View<br />
Despite the attention afforded to preventing workplace violence,<br />
it seems that we’re no closer to a solution. Richard Diston feels<br />
it’s time to adopt a fresh perspective on the matter<br />
50 In The Spotlight: ASIS International UK Chapter<br />
Allison Wylde suggests that, even with the emergence of<br />
standards and research, there’s still deliberation on an agreed<br />
definition of resilience for today’s organisations<br />
53 FIA Technical Briefing<br />
Following the tragic events at Grenfell Tower in June, there<br />
appears to be a renewed interest around fire safety issues.<br />
Robert Yates focuses on regimes for care homes<br />
57 Security Services: Best Practice Casebook<br />
Organisations must take stock of the ways in which loss<br />
prevention is managed, as Jon Felix observes in detail<br />
60 Cyber Security: Automated Cyber Weapons<br />
Nicola Whiting evaluates the threat of automated cyber weapons<br />
62 Training and Career Development<br />
Next month, the Register of Certified Technical Security<br />
Professionals opens for business. Kevin Matthew has the detail<br />
64 Risk in Action<br />
66 Technology in Focus<br />
69 Appointments<br />
The latest people moves in the security and fire business sectors<br />
24 State of Mind: Developing ‘Risk Culture’<br />
How might you transform your risk culture such that it’s a key<br />
asset in managing risk? Alex Poppleton addresses this issue<br />
26 On The Mark<br />
James Brown highlights the property marking solutions available<br />
for today’s risk and security management professionals<br />
28 Touched By A Physical Presence<br />
David Mundy discusses how security installers are providing<br />
added value on physical security for their end user customers<br />
31 Fire Safety Management and Installation<br />
The FIA, Advanced, the FPA, Klaxon, BAFE and Hochiki Europe all<br />
feature in our regular Fire Safety Supplement<br />
72 The Risk UK Directory<br />
ISSN 1740-3480<br />
Risk UK is published monthly by Pro-Activ Publications<br />
Ltd and specifically aimed at security and risk<br />
management, loss prevention, business continuity and<br />
fire safety professionals operating within the UK’s largest<br />
commercial organisations<br />
© Pro-Activ Publications Ltd 2017<br />
All rights reserved. No part of this publication may be<br />
reproduced or transmitted in any form or by any means<br />
electronic or mechanical (including photocopying, recording<br />
or any information storage and retrieval system) without the<br />
prior written permission of the publisher<br />
The views expressed in Risk UK are not necessarily those of<br />
the publisher<br />
Risk UK is currently available for an annual subscription rate of<br />
£78.00 (UK only)<br />
www.risk-uk.com<br />
Risk UK<br />
PO Box 332<br />
Dartford DA1 9FF<br />
Editor Brian Sims BA (Hons) Hon FSyI<br />
Tel: 0208 295 8304 Mob: 07500 606013<br />
e-mail: brian.sims@risk-uk.com<br />
Design and Production Matt Jarvis<br />
Tel: 0208 295 8310 Fax: 0870 429 2015<br />
e-mail: matt.jarvis@proactivpubs.co.uk<br />
Advertisement Director Paul Amura<br />
Tel: 0208 295 8307 Fax: 01322 292295<br />
e-mail: paul.amura@proactivpubs.co.uk<br />
Administration Tracey Beale<br />
Tel: 0208 295 8306 Fax: 01322 292295<br />
e-mail: tracey.beale@proactivpubs.co.uk<br />
Managing Director Mark Quittenton<br />
Chairman Larry O’Leary<br />
Editorial: 0208 295 8304<br />
Advertising: 0208 295 8307<br />
3<br />
www.risk-uk.com
Premier Elite LCDLP-W<br />
Wireless LCD keypad with Ricochet® mesh technology<br />
Introducing a remarkable new wireless keypad from Texecom. The Premier Elite LCDLP-W is a fully functional, fully programmable<br />
wireless keypad with identical performance and capabilities of wired Premier Elite keypads.<br />
Featuring Ricochet mesh technology, the Premier Elite LCDLP-W operates with a 5-year battery life and completes the range of<br />
‘wire free’ Premier Elite system options, offering faster installations and greater flexibility than ever before.<br />
Outstanding features:<br />
• Wireless keypad with Ricochet mesh technology<br />
• Fully functional keypad; not just an arming station<br />
• Operating speed equivalent to wired keypads<br />
• 5-year battery life with typical usage<br />
(4x AA lithium batteries supplied)<br />
• Completes ‘wire free’ Premier Elite system options<br />
• Requires Premier Elite systems with V3.1 wireless receivers (or higher)<br />
• Integral proximity reader for use with Texecom RFID prox tags<br />
• EN50131-1, EN50131-3, EN50131-5-3, PD6662 Grade 2 Class II<br />
Texecom products are designed<br />
and manufactured in the UK
Editorial Comment<br />
Many applications<br />
The Premier Elite LCDLP-W is designed for use as the<br />
main system keypad, but is also ideal for upgrading<br />
existing systems. Typical uses include:<br />
• Main alarm keypad near front door<br />
• Additional keypad near back door or bedroom<br />
• Remote buildings, such as garages<br />
• Mobile engineer’s keypad<br />
Secure wireless<br />
Ricochet Mesh Technology provides secure, encrypted<br />
wireless communications with unparalleled<br />
performance. Ricochet enabled wireless devices<br />
receive and repeat messages from<br />
other devices. The size, scalability<br />
and range of the entire system<br />
are extended, as wireless<br />
signalling is no longer limited<br />
by point-to-point<br />
communications.<br />
Spot the difference<br />
The Premier Elite LCDLP-W is all but identical to its<br />
wired equivalent - in size, aesthetics and performance.<br />
The only difference is wireless connectivity powered<br />
by Ricochet mesh technology, the world’s most robust<br />
wireless security technology.<br />
Profile Building<br />
The National Business Crime Solution (NBCS) – the not-forprofit<br />
initiative that enables the sharing of data between law<br />
enforcement agencies and the business community in order<br />
to reduce crime – is now embarking on the next stage of its<br />
development after securing significant Government funding.<br />
The award of a six-figure sum is in recognition of the NBCS’<br />
success in supporting the police service in the fight against<br />
persistent and often travelling offenders and enables the<br />
organisation to become self-sustaining, make new appointments<br />
and implement a marketing and awareness campaign (including<br />
the introduction of a new independent corporate identity).<br />
By providing a central repository where business crime data is<br />
submitted, shared and analysed, the NBCS is able to gather the<br />
necessary intelligence needed to more effectively detect, prevent<br />
and respond to crime. In short, it’s function is essential.<br />
The money awarded to the organisation is part of the Police<br />
Transformation Fund, a Home Office programme that marks a<br />
real opportunity for police leaders and Police and Crime<br />
Commissioners to respond to the changing nature of crime.<br />
The new funding is a significant development in the evolution<br />
of the NBCS. Founded by Jason Trigg (the former owner of<br />
Cardinal Security), over the last three years the NBCS has grown<br />
its membership by over 200% to encompass nearly 50<br />
organisations, and acts as a valuable link between separate<br />
police services in the UK and its members by connecting crimes<br />
that would have traditionally been viewed as independent.<br />
Shared information is particularly valuable when looking at<br />
offences involving mobile teams of criminals who are known to<br />
have very specific targets and travel extensively across the UK in<br />
order to commit offences. Prior to the NBCS, collating details of<br />
these crimes and offences would most likely have gone<br />
unnoticed and unpunished.<br />
The NBCS also works closely with a number of policing bodies<br />
including the National Police Chiefs’ Council, in addition to the<br />
National Business Crime Centre. The latter’s operational lead,<br />
namely DCI Georgie Barnard, commented: “This is a unique<br />
service from a trusted partner that truly offers the way forward<br />
for the industry and the police service to work together in<br />
achieving a common goal. The NBCS offers timely information on<br />
crime trends that actively enables businesses in all market<br />
sectors to take better preventative action and realise more<br />
effective engagement with the police.”<br />
Not only will the funding help attract new members, but it will<br />
also enable the NBCS’ strategic priorities – among them<br />
corporate governance, data protection and sustainability – to be<br />
met through its new operating model.<br />
Importantly, the funding will also assist in continuing to<br />
improve the quality of information shared and circulated, protect<br />
those who face the growing risk of threats and violence, capture<br />
the criminals who pose the greatest harm (both physically and<br />
online) to member businesses and deliver a fraud sharing<br />
platform that supports businesses in eradicating persistent<br />
offenders and identifying emerging threats. A win-win scenario.<br />
Brian Sims BA (Hons) Hon FSyI<br />
Editor<br />
www.texe.com<br />
Sales: +44 (0)1706 220460<br />
December 2012<br />
5<br />
www.risk-uk.com
“Barrier to trade and security if data<br />
transfers are hindered post-Brexit”<br />
The Government should pursue full regulatory<br />
equivalence with the European Union (EU) with<br />
respect to data protection in order to ensure<br />
unhindered data flows between the UK and the<br />
EU post-Brexit, offer stability and certainty for<br />
businesses and maintain police and security cooperation.<br />
That’s the considered viewpoint of<br />
the EU Home Affairs Sub-Committee as outlined<br />
in its latest report.<br />
Maintaining unhindered and uninterrupted<br />
data flows between the UK and the EU following<br />
Brexit is an important aim, as any arrangement<br />
that results in greater friction could present a<br />
non-tariff trade barrier that places the UK at a<br />
competitive disadvantage and serves to hinder<br />
both police and security co-operation.<br />
Although the Government has stated that it<br />
“will seek to maintain the stability of data<br />
transfers between the EU, Member States and<br />
the UK”, little detail has so far been offered by<br />
the Conservative Party in terms of how the<br />
Government plans to deliver this outcome.<br />
By looking in depth at four elements of the<br />
EU’s data protection package within the pages<br />
of its report, the EU Home Affairs Sub-<br />
Committee has determined to examine the<br />
options available to the Government for<br />
securing uninterrupted data flows between the<br />
UK and the EU after the UK exits the EU.<br />
These four elements are the General Data<br />
Protection Regulation, the Police and Criminal<br />
Justice Directive, the EU-US Privacy Shield and<br />
the EU-US Umbrella Agreement.<br />
Lord Jay of Ewelme, chairman of the EU Home<br />
Affairs Sub-Committee, stated: “The volume of<br />
data stored electronically and moving across<br />
borders has grown hugely over the last 20<br />
years. Between 2005 and 2012 alone, Internet<br />
traffic across borders increased eighteen-fold.<br />
The maintenance of unhindered data flows is<br />
therefore crucial, both for business and for<br />
effective police co-operation.”<br />
Lord Jay continued: “The Committee has been<br />
concerned by the lack of detail on how the<br />
Government plans to maintain unhindered data<br />
flows post-Brexit. It’s also concerned by the risk<br />
that EU and UK data protection rules could<br />
diverge over time when the UK has left the EU.<br />
To avoid this scenario, the Committee urges the<br />
Government to secure a continuing role for the<br />
Information Commissioner’s Office on the<br />
European Data Protection Board.”<br />
There’s broad consensus among witnesses<br />
that the most effective way to achieve<br />
unhindered flows of data would be to secure<br />
adequacy decisions from the European<br />
Commission under Article 45 of the General<br />
Data Protection Regulation and Article 36 of the<br />
Police and Criminal Justice Directive, thereby<br />
confirming that the UK’s data protection rules<br />
would offer an equivalent standard of<br />
protection to that available within the EU.<br />
Surveillance Camera Commissioner launches ‘Passport to Compliance’<br />
Tony Porter QPM LLB (pictured), the Surveillance Camera Commissioner, has launched a ‘Passport<br />
to Compliance’ document (formerly known as an ‘Operational Requirement’ document).<br />
When organisations are considering the procurement and installation of a surveillance camera<br />
system, it’s crucial to be able to specify what they want the system to do, how they want it to<br />
perform and also to ensure that it complies with all relevant regulations. Of course, how much the<br />
system will cost to procure and operate are also key points to bear in mind.<br />
The ‘Passport to Compliance’ places the responsibility for CCTV system development in the<br />
hands of the organisations that operate them. It guides organisations on the stages they need to<br />
go through when planning, installing and eventually operating surveillance camera systems. The<br />
document should be completed for new systems or where there’s a significant change to an<br />
existing system (for example, due to the addition of a large number of cameras).<br />
Following the ‘Passport to Compliance’ will help organisations to meet the 12 guiding principles<br />
set out in the Surveillance Camera Code of Practice and, while not a guarantee, other relevant<br />
legislation such as the Data Protection Act and the Human Rights Act.<br />
The ‘Passport to Compliance’ is aimed primarily at public space CCTV surveillance systems such<br />
as those operated by local authorities or in large shopping centres, although in practice it can be<br />
used for any type of surveillance camera system.<br />
Surveillance Camera Commissioner Tony Porter commented: “I’m delighted to be able to launch<br />
the ‘Passport to Compliance’. It enhances, updates and simplifies the widely-used Home Office<br />
‘Operational Requirement’ document and aims to reduce technical jargon.”<br />
6<br />
www.risk-uk.com
News Update<br />
“Clarification on regulatory regime<br />
for private security industry<br />
essential” urges BSIA<br />
The British Security Industry Association<br />
(BSIA) is calling for urgent clarification on the<br />
future of the regulatory regime for the private<br />
security industry. This follows on from the<br />
news that a security firm is being investigated<br />
by the Security Industry Authority (SIA) for<br />
allegedly supplying cloned badges to<br />
unlicensed stewards. The company in question<br />
isn’t a BSIA member.<br />
“The industry has faced a great deal of<br />
uncertainty with regards to how it will be<br />
regulated in the future,” explained James<br />
Kelly, CEO at the BSIA (pictured). “This is an<br />
issue that has been ongoing for many years,<br />
despite overwhelming support from the<br />
industry for the transition to a new ‘lighter<br />
touch’ regulatory regime. A proposed system<br />
of business licensing for the security business<br />
sector received extensive backing from the<br />
industry, the Regulator and the Government<br />
following a consultation in 2012, but this is yet<br />
to materialise. This has left all stakeholders<br />
uncertain about the future regulatory<br />
framework which would govern its operations,<br />
as well as the cost of licensing.”<br />
Kelly continued: “An Independent Review of<br />
the SIA was carried out in 2016 during which<br />
the BSIA lobbied for the reaffirmation of<br />
business licensing in place of the current<br />
system. The outcome of this review has been<br />
left in situ with successive Governments for<br />
almost a year and appears no closer to being<br />
published in the foreseeable future.”<br />
In addition, Kelly stated: “Incidents such as<br />
the allegation of cloned badges being<br />
supplied to unlicensed stewards demonstrate<br />
the importance of clear and robust regulation<br />
for the security industry. A business licensing<br />
system would enable the Regulator to revoke<br />
a business’ licence and prevent it from<br />
operating within the industry should the firm<br />
fail to ensure that all of its personnel are<br />
licensed or carry out the required level of due<br />
diligence when sub-contracting work.”<br />
The BSIA is calling for the Government to<br />
“urgently address” the future of the regulatory<br />
regime for the private security industry. This<br />
starts with the results of the Independent<br />
Review of the SIA which, in Kelly’s opinion,<br />
“should be published as a priority.”<br />
Member companies of the BSIA are required<br />
to meet the Trade Association’s stringent<br />
eligibility criteria which serve as an assurance<br />
that those businesses operate in full<br />
compliance with the relevant licensing<br />
requirements (and British and European<br />
Standards) for the services they provide to<br />
their end user cohort.<br />
ASIS UK to host inaugural CSO<br />
Centre for Leadership and<br />
Development meeting in London<br />
ASIS International’s Chief Security Officer<br />
(CSO) Centre for Leadership and Development<br />
brings together the most senior security<br />
professionals from the largest and most<br />
influential organisations in the world.<br />
Now, on Wednesday 4 and Thursday 5<br />
October, ASIS UK will host a meeting – the<br />
first of its kind to take place in central London<br />
– specifically aimed at tackling some of the<br />
issues facing CSOs today, tomorrow and into<br />
the future.<br />
The gathering is to be informed by some<br />
leading thinkers and practitioners in the fields<br />
of risk, resilience and security.<br />
Speakers/participants confirmed thus far<br />
include Dr Jon Arthur (an expert in applied risk<br />
reasoning systems for complex organisations),<br />
Roddy Drummond (head of security at the<br />
Foreign and Commonwealth Office) and<br />
Professor Martin Gill CSyP FSyI (a leading<br />
security academic, researcher and writer and<br />
the director of PRCI).<br />
Additional speakers on the schedule are Dr<br />
Samir Puri (lecturer at Kings College London<br />
within the Department of War Studies), Chris<br />
Smith (global security risk director at HSBC)<br />
and David Thorp (executive director of the<br />
Business Continuity Institute).<br />
The event will begin with an informal<br />
networking reception on Wednesday 4<br />
October and conclude with a gala dinner in the<br />
celebrated Peers’ Dining Room in the Palace of<br />
Westminster.<br />
While attendance is by invitation only, any<br />
individuals who meet (or who are close to<br />
meeting) the eligibility criteria (see below) are<br />
invited to contact ASIS UK’s chairman David<br />
Clark CPP PCI PSP via e-mail at<br />
chairman@asis.org.uk for an invitation.<br />
Typically, CSO Centre membership is limited<br />
to the highest-level security professionals<br />
operational in organisations with turnovers of<br />
$500 million (or equivalent), a company that<br />
provides security services with at least<br />
US$300 million (or equivalent) in gross annual<br />
revenue, a significant Government<br />
(local/regional/national) department or<br />
agency, a significant not-for-profit or nonprofit<br />
organisation or professionals currently<br />
operational at another business, agency,<br />
facility or organisation with distinctive and<br />
notable global or national significance.<br />
7<br />
www.risk-uk.com
MI5 and police in joint review of operational<br />
procedures for counter-terror investigations<br />
Photograph: Harry Metcalfe<br />
Home Secretary Amber<br />
Rudd has announced<br />
that David Anderson<br />
QC, the former<br />
Independent Reviewer<br />
of Terrorism<br />
Legislation, will<br />
provide independent<br />
assurance of the<br />
reviews that MI5 and<br />
the National Counter-<br />
Terrorism Policing<br />
headquarters are<br />
conducting following<br />
the recent terrorist<br />
attacks in London and<br />
Manchester. Brian<br />
Sims reports<br />
The MI5 and police reviews were<br />
commissioned by MI5’s director Andrew<br />
Parker and Metropolitan Police Service<br />
Commissioner Cressida Dick following the<br />
recent attacks at London Bridge/Borough<br />
Market and the Manchester Arena and with the<br />
support of the National Police Chiefs’ Council.<br />
The reviews will examine in detail what was<br />
known and how investigative processes and<br />
decision-making operated prior to the attacks,<br />
and whether any further improvements can be<br />
made to help prevent future acts of terrorism.<br />
This work is scheduled to consider key<br />
elements of the investigative life-cycle,<br />
including processes for assessing incoming<br />
intelligence and prioritising investigations<br />
through to managing the potential risk posed<br />
by individuals after they’re no longer subject to<br />
investigation. It forms part of MI5 and National<br />
Counter-Terrorism Policing’s shared<br />
commitment to continued improvement as the<br />
threat evolves at pace.<br />
David Anderson QC will conclude his work by<br />
the end of October and report the resulting<br />
conclusions to the Home Secretary, copied to<br />
the Prime Minister and the Intelligence and<br />
Security Committee of Parliament.<br />
In a joint statement, Andrew Parker and<br />
Commissioner Cressida Dick said: “Since the<br />
appalling terrorist attacks in London and<br />
Manchester this year, the police and MI5 have<br />
been working relentlessly to investigate the<br />
events that led up to the attacks, pursue those<br />
involved and protect members of the public.”<br />
The statement continues: “After a major<br />
incident, we always look at how we can further<br />
strengthen the highly effective counterterrorism<br />
arrangements that we’ve developed in<br />
the UK over many years. We welcome the<br />
independent assurance that David Anderson<br />
will provide.”<br />
In conclusion, the joint statement reads: “Our<br />
organisations are deeply committed to being<br />
the best we can be at keeping the country safe.<br />
Our work necessarily involves difficult<br />
prioritisation decisions and professional<br />
judgements based on partial information.<br />
Sadly, we cannot stop every plot, but together<br />
with our partners we will do everything in our<br />
power to improve our ability to identify and<br />
disrupt those seeking to do our country harm.”<br />
The threat posed to the UK from terrorism is<br />
complex and ranges from lone actors carrying<br />
out simple, but deadly attacks through to<br />
networks plotting more co-ordinated activities.<br />
MI5, the police service and their law<br />
enforcement partners have together stopped 18<br />
terrorist plots in Great Britain since mid-2013,<br />
including five in the wake of the Westminster<br />
attack in March this year.<br />
At any one time, MI5 and the police service<br />
are reported to be conducting around 500<br />
active international counter-terrorism<br />
investigations involving 3,000 subjects of<br />
interest. In addition to this, there are around<br />
20,000 individuals who’ve been ‘subjects of<br />
interest’ in previous terrorism investigations.<br />
Briefing in Manchester<br />
In mid-June around 750 professionals gathered<br />
at Manchester’s One Central Convention<br />
Complex for a Project Griffin briefing. Attendees<br />
emanated from a range of industry and<br />
business sectors – including retail, hospitality,<br />
entertainment and the travel world – in a bid to<br />
learn how they can protect their organisations<br />
against terrorist attacks and what to do in the<br />
event of a major incident unfolding.<br />
These briefings are typically administered to<br />
groups of between 30 and 50 individuals, with<br />
the previous largest attendance in Manchester<br />
consisting of around 140 attendees. With this<br />
event being delivered to more than five times<br />
that number, it demonstrates the desire of local<br />
businesses to keep their employees – and<br />
members of the wider public – safe from harm<br />
at all times.<br />
8<br />
www.risk-uk.com
News Analysis: Counter-Terrorism Procedural Reviews<br />
The briefing consisted of a package devised<br />
by the National Counter-Terrorism Security<br />
Office (NaCTSO) and delivered by Counter-<br />
Terrorism Security Advisors from the North<br />
West Counter-Terrorism Unit (NWCTU).<br />
Project Griffin is a NaCTSO initiative designed<br />
to help protect workers, businesses and<br />
communities from the threat of terrorism.<br />
Launched back in 2004, the initiative builds on<br />
existing partnerships between counterterrorism<br />
police, the Emergency Services and<br />
local companies, helping businesses to improve<br />
their security posture and preparedness plans<br />
and better protect their staff and customers.<br />
In this day and age, companies have to guard<br />
against a variety of potential threats ranging<br />
from crude attacks by lone attackers inspired<br />
by terrorist or extremist political ideologies<br />
through to sophisticated and directed plots<br />
requiring significant planning and resources.<br />
Sense of perspective<br />
Detective Chief Superintendent Scott Wilson,<br />
the national police co-ordinator for Protect and<br />
Prepare, said: “Project Griffin has been a vitally<br />
important strand of our policing strategy for<br />
more than a decade, but the recent atrocities in<br />
Manchester and London have brought into<br />
sharp focus the necessity for the police and our<br />
partners in industry to work even more closely<br />
together. I’m delighted to see that this<br />
partnership is flourishing in the North West,<br />
and I’m absolutely sure this is typical of the<br />
close relationship police forces around the<br />
country share with local businesses.”<br />
Wilson continued: “While there’s no specific<br />
intelligence to suggest that an attack is<br />
imminent, the threat from terrorism is ‘Severe’<br />
and that means an attack is highly likely. It’s<br />
important to keep a sense of perspective,<br />
though. Our aim is to move public thinking from<br />
an irrational fear of terrorism to a rational<br />
concern, whereby the nature of the current<br />
threat is better understood and staff members<br />
know what to do if they find themselves<br />
involved at the scene of a terrorist incident or if<br />
they should witness the preparations for a<br />
future attack. This may include recognising and<br />
reporting suspicious behaviour, dealing with a<br />
suspect package or reacting to a firearms or<br />
weapons attack, even though such events are,<br />
thankfully, quite rare.”<br />
In addition, Wilson stated: “We’ve recently<br />
renewed our crowded places guidance to<br />
ensure that both the public and industry have<br />
the most up-to-date information on how to<br />
mitigate the risk from terrorism.”<br />
Vaughan Allen, CEO of CityCo (the city centre<br />
management company for Manchester and<br />
“The threat posed to the UK from terrorism is complex and<br />
ranges from lone actors carrying out simple, but deadly<br />
attacks to networks plotting more co-ordinated activities”<br />
Salford), explained: “Since the tragic night of<br />
the bombing at the Manchester Arena, CityCo<br />
has been working with businesses to keep the<br />
city open and help ensure that everyone<br />
working in, living in and visiting Manchester<br />
feels safe. It’s a sign of how seriously<br />
businesses take the need for their staff to be as<br />
well informed as possible that this Project<br />
Griffin event is one of the largest-ever counterterrorism<br />
awareness events organised in the<br />
UK. CityCo will continue to work with our<br />
partners at the NWCTU and the Greater<br />
Manchester Police in the months ahead, rolling<br />
out further training and ensuring businesses<br />
have up-to-date and accurate advice to hand.”<br />
Travel sector training<br />
The travel industry is providing training for staff<br />
working in the UK and overseas in a bid to help<br />
keep holidaymakers safe this summer. Over<br />
23,000 employees have attended education<br />
sessions, which include detailed advice on how<br />
to spot suspicious items and activities, as well<br />
as what to do in the event of a major incident.<br />
The programme is being run in partnership<br />
with the NaCTSO which has created a short<br />
presentation offering travel companies an easyto-deliver<br />
counter-terrorism awareness product.<br />
This covers the core counter-terrorism guidance<br />
required by staff working in crowded places<br />
either at home or abroad.<br />
The product – which is funded by the Foreign<br />
and Commonwealth Office – includes three new<br />
films which show staff what to expect and how<br />
to respond in the safest way possible to the<br />
terrorist threat: ‘Identify and Respond to<br />
Suspicious Behaviour’, ‘Identify and Deal with<br />
Suspicious Items’ and ‘How to React to<br />
Firearms or Weapons Attacks’.<br />
The presentation is accompanied by a helpful<br />
two-page leaflet which can be printed and<br />
distributed as an aide memoire for staff and<br />
refers to the ACT: Action Counters Terrorism<br />
guidelines for reporting any suspicious<br />
behaviour or items.<br />
In addition to this industry-specific training,<br />
holidaymakers travelling abroad this summer<br />
are also being urged to watch a new video<br />
designed to help keep them safe in the event of<br />
a terrorist attack. This film is four minutes long<br />
and outlines key actions to take if terrorists<br />
strike. The message is ‘Run, Hide, Tell’, which<br />
was first launched by UK police in late 2015.<br />
David Anderson QC<br />
Home Secretary Amber Rudd<br />
9<br />
www.risk-uk.com
“<br />
MY PASSION IS<br />
ALWAYS GOING THAT<br />
EXTRA MILE -<br />
WHATEVER THE JOB<br />
”<br />
Steve Lang, CNC Programmer/Operator, 3 years with Jacksons<br />
OUR PASSION<br />
IS YOUR SECURITY<br />
We combine the highest quality<br />
perimeter security fencing and<br />
gates with seventy years of expertise<br />
to provide you with the right solution<br />
for your project, large or small.<br />
www.jacksons-fencing.co.uk<br />
0800 953 3730<br />
Jacksons<br />
Fencing
News Special: BSIA Security Personnel Awards 2017<br />
BSIA’s national industry award winners<br />
demonstrate high value of security personnel<br />
The BSIA’s Security Personnel Awards are in<br />
their nineteenth year and have been<br />
sponsored by Camberford Law plc –<br />
specialist insurance broker to the security<br />
industry – since their inception. These awards<br />
serve to recognise the talent, dedication, skill<br />
and bravery exhibited by security personnel in<br />
their roles each and every day.<br />
This year, there was a special commendation,<br />
runner-up and overall winner for each of the<br />
five categories: Outstanding Act, Best<br />
Newcomer, Best Use of Technology, Service to<br />
the Customer and Best Team.<br />
Discussing the value of the Security<br />
Personnel Awards, James Kelly (CEO at the<br />
BSIA) explained: “The past year has been<br />
extremely testing for the United Kingdom, with<br />
numerous terror events shocking the nation. In<br />
times like these, it’s important to recognise the<br />
true value of security personnel who are often<br />
the first responders during emergency<br />
situations and play a vital role in keeping our<br />
country safe. This year’s winners are a perfect<br />
testament to the truly high calibre of personnel<br />
we have working within our industry.”<br />
Kelly went on to add: “We received a high<br />
number of fantastic nominations this year,<br />
making the judging process a particularly tough<br />
one. This year’s winners should be extremely<br />
proud of their achievements.”<br />
This year’s Keynote Speaker was renowned<br />
publisher, writer and broadcaster Andrew Neil,<br />
who entertained attendees with fascinating<br />
observations about the political climate in the<br />
UK, Europe and the United States.<br />
Talking about the company’s long-standing<br />
support of the Security Personnel Awards,<br />
David Ottewill (managing director at<br />
Camberford Law plc) commented: “Camberford<br />
Law plc is delighted to be involved in<br />
sponsoring the BSIA’s Security Personnel<br />
Awards 2017. We applaud and encourage the<br />
promotion of professionalism within the<br />
industry and also the hard work and dedication<br />
required by the award entrants to achieve their<br />
accolades. We’ve been insuring security<br />
companies for over 30 years now. All-too-often,<br />
though, the diligent work of security companies<br />
and their constituent individuals is overlooked,<br />
despite the fact that these businesses and<br />
individuals play such a crucial role in today’s<br />
public life. We feel it’s only fair to recognise the<br />
outstanding achievers in this field.”<br />
The British Security Industry Association (BSIA) has<br />
announced the national winners of its 2017 Security<br />
Personnel Awards. The award presentations took place on<br />
Wednesday 12 July at the Trade Association’s Annual<br />
Luncheon, held at The Grand Connaught Rooms near<br />
London’s Covent Garden. Brian Sims reports<br />
The overall winners, runners-up and special<br />
commendations in 2017 are as follows:<br />
Outstanding Act<br />
• Overall Winner: Megin Dorrian – The<br />
Westgrove Group<br />
• Runner-Up: John Atkins – Vision Security<br />
Group (VSG)<br />
• Special Commendation: Charles Stewart –<br />
SecuriGroup Services<br />
Best Newcomer<br />
• Overall Winner: Simon Searle – Vision<br />
Security Group (VSG)<br />
• Runner-Up: Erin Jackson – SecuriGroup<br />
Services<br />
• Special Commendation: John Moore –<br />
Robinson Services<br />
Best Use of Technology<br />
• Overall Winner: Andrew Horner – Kings<br />
Security Systems<br />
• Runner-Up: Steven McKenzie – SecuriGroup<br />
Services<br />
• Special Commendation: Jason Thomas – The<br />
Westgrove Group<br />
Keynote Speaker Andrew Neil<br />
(above) addresses the BSIA’s<br />
members and guests at The<br />
Grand Connaught Rooms in<br />
central London<br />
11<br />
www.risk-uk.com
News Special: BSIA Security Personnel Awards 2017<br />
Tom Lewis (above, left) of The<br />
Westgrove Group and the<br />
BSIA’s CEO James Kelly<br />
BSIA Chairman Dirk Wilson<br />
The BSIA Chairman’s Award<br />
presented to Tim Geddes<br />
Service to the Customer<br />
• Overall Winner: Tom Lewis – The Westgrove<br />
Group<br />
• Runner-Up: Winston Cooper – Mitie Total<br />
Security Management<br />
• Special Commendation: Phillip Hillman –<br />
Mitie Total Security Management<br />
Best Team<br />
• Overall Winner: Union Square Security Team –<br />
Vision Security Group (VSG)<br />
• Runner-Up: North Bristol NHS Trust<br />
Southmead Hospital Security Team – OCS<br />
Group UK<br />
• Special Commendation: JLL Bridgewater Place<br />
Security Team – Vision Security Group (VSG)<br />
BSIA Chairman’s Awards<br />
Some of the security industry’s most influential<br />
practitioners were duly presented with<br />
prestigious BSIA Chairman’s Awards in<br />
recognition of the significant contributions<br />
they’ve made to the ongoing success of the<br />
UK’s private security industry.<br />
The awards were personally selected by the<br />
BSIA’s chairman, Dirk Wilson, and serve to<br />
recognise significant or life-long contributions<br />
in five different categories: Contribution to<br />
Standards, Contribution to the Community,<br />
Contribution to the Industry, Contribution to<br />
Training and Contribution to Exporting.<br />
Again, this year’s award winners were<br />
presented with their accolades at the Trade<br />
Association’s Annual Luncheon. Speaking<br />
ahead of the presentations, Dirk Wilson<br />
commented: “It’s a huge pleasure to formally<br />
recognise the contributions of this year’s<br />
winners, all of whom have made a lasting<br />
impression on the security sector through their<br />
dedication, commitment and passion.”<br />
The Chairman’s Award for Contribution to<br />
Standards was presented to Tim Geddes.<br />
Geddes has been described as one of the<br />
‘founding fathers’ of the electronic security<br />
industry and has helped to shape the industry<br />
we have today over the course of more than<br />
four decades. He was involved in the days of<br />
NACOSS, liaising with the police service to<br />
regulate and reduce the number of false alarms<br />
from which the early systems suffered.<br />
The Chairman’s Award for Contribution to the<br />
Community was presented to David Cain and<br />
Fiona Noble of Sword Security (Northern<br />
Ireland). Cain and Noble have both been an<br />
“This year’s winners of the BSIA’s Security Personnel<br />
Awards are a perfect testament to the truly high calibre of<br />
personnel we have working within our industry”<br />
active and consistent presence in the local<br />
communities in which the business operates.<br />
They’ve sponsored local sports teams for many<br />
years and have also arranged regular<br />
fundraising activities on behalf of charities such<br />
as the Northern Ireland Children’s Hospice, the<br />
Girls Brigade, Macmillan Cancer Charities and<br />
Action Cancer (to name but a few).<br />
The Association chose to honour the late<br />
Mike Tennent, one of the industry’s finest and<br />
most influential individuals, with the<br />
prestigious Chairman’s Award for Contribution<br />
to the Industry. Tennent founded Tavcom<br />
Training back in 1994 and built the business to<br />
become the leader in security systems training<br />
in the UK and a major provider in other nations<br />
across Africa, the Middle East and beyond.<br />
Tavcom’s growth was never at the expense of<br />
quality as Tennent insisted on the very highest<br />
standards. He played a pivotal role in the<br />
professionalisation of an industry wherein<br />
many aspects of regulation, licensing and<br />
training were once minimal or non-existent.<br />
Tennent was a true Gentleman and is very<br />
much missed by his many friends and<br />
colleagues right across the security industry.<br />
Lucie Banham of the Banham Group was<br />
deservedly presented with the Chairman’s<br />
Award for Contribution to Training. This award<br />
is particularly special as it serves to recognise<br />
those who’ve made significant contributions<br />
towards equipping the industry with the skills<br />
and knowledge required for it to develop.<br />
Banham received the 2017 award for her<br />
involvement in the establishment of The<br />
Banham Academy, which offers traineeship and<br />
apprenticeship schemes for those individuals<br />
looking to develop a career in the security and<br />
emergency systems industry.<br />
Lucie Banham has shown staunch support for<br />
apprenticeships in general and, more<br />
specifically, how an apprenticeship in the<br />
security industry is a fantastic career prospect<br />
with plenty of opportunity for progression.<br />
Last, but not least, the Chairman’s Award for<br />
Contribution to Exporting was presented to GJD<br />
Manufacturing, a specialist in the design,<br />
manufacture and supply of professional<br />
external detector equipment.<br />
The company’s products range from CCTV<br />
and lighting controllers through to white light<br />
and infrared LED illuminators used in the<br />
intruder surveillance industry.<br />
Highly regarded within the UK’s security<br />
industry and, indeed, throughout a wide range<br />
of international markets, the company has built<br />
an impressive network of trusted distributors<br />
worldwide and is a regular exhibitor at the<br />
industry’s key trade shows around the globe.<br />
12<br />
www.risk-uk.com
ISO 22316: Preparing for Brexit<br />
The long-awaited ISO<br />
22316:2017 Security<br />
and Resilience –<br />
Organisational<br />
Resilience – Principles<br />
and Attributes has<br />
arrived. At first read it<br />
doesn’t seem to offer<br />
much – a long title,<br />
but just ten pages of<br />
what might be<br />
construed as rather<br />
dry and heavilyengineered<br />
clauses.<br />
Surely, there must be<br />
value in there if only it<br />
can be unlocked? John<br />
Robinson decided to<br />
apply his own test<br />
that’s perhaps a little<br />
‘off-piste’ as far as<br />
conventional reviews<br />
go, but relevant for<br />
many: Brexit<br />
John Robinson MSc CEng FBCI:<br />
Managing Director of INONI<br />
14<br />
www.risk-uk.com<br />
Brexit isn’t just there to be ‘enjoyed’ by us<br />
British. Rather, it’s an international<br />
phenomenon. Set aside your personal<br />
views and think about it neutrally from the<br />
perspective of your organisation. Whether<br />
you’re based in Manchester, Milan or<br />
Melbourne, whether you represent a charity, a<br />
public body or a plc, there’s a good chance<br />
Brexit may affect what it is you do as a<br />
practising professional and, if ISO 22316 can<br />
help you deal with this, so much the better.<br />
Brexit represents a systemic, multi-faceted,<br />
enduring, changing and complex risk. It carries<br />
the possibility of both losses and opportunities<br />
that may be linked and, circumstantially, felt<br />
differently by each of us at different times. It’s a<br />
moving feast or famine and business resilience<br />
seems to be a necessary stabilising quality if<br />
we’re to complete the ‘exit’ journey acceptably.<br />
The approach adopted here is to work<br />
through the International Standard, interpreting<br />
the guidance it offers with Brexit as the subject.<br />
What follows is modestly informed opinion and<br />
will undoubtedly not apply for all, but reflects a<br />
personal search for value in the widest sense.<br />
By their very nature standards are generic<br />
and require interpretation for the context in<br />
which they’re applied. You simply cannot pick<br />
one up and expect to extract an instant list of<br />
tasks that must be performed in order for<br />
compliance. Instead, you must work at it (or<br />
maybe ask a specialist to do it for you).<br />
ISO 22316 begins by explaining what it<br />
means to be resilient. In short, this amounts to<br />
preserving the delivery of strategic objectives<br />
by anticipating and responding, absorbing<br />
shock and adapting to change. It states that<br />
there’s no absolute measure of resilience or a<br />
definitive goal, but that it’s possible to become<br />
more (or less) resilient. We cannot sensibly<br />
expect to compare between organisations as<br />
we all have different resilience appetites, but<br />
this truism doesn’t prevent us from creating<br />
internal Key Performance Indicators as a basis<br />
for improvement or convergence.<br />
Further, ISO 22316 states that resilience is<br />
brought about by the interaction of certain<br />
organisational attributes and activities and the<br />
application of specific expertise. It points out<br />
that these interactions are then shaped by how<br />
we handle uncertainty, decision-making and<br />
behaviour. This suggests that, once we know<br />
what drives our individual resilience condition,<br />
we should then be able to measure, manage<br />
and improve upon it.<br />
Most of the ISO document’s substance lies in<br />
three main sections. Section 4: Principles is a<br />
distillation, possibly acting as an aide-memoire,<br />
whereas the Attributes section defines more<br />
granular resilience indicators. Evaluation then<br />
provides a form of closed-loop control that<br />
keeps your resilience strategy aligned with<br />
organisational needs. The remainder of this<br />
discourse focuses on applying the Attributes.<br />
Clarity of purpose<br />
In this first of nine Attributes, ISO outlines that<br />
organisations clearly setting out their position<br />
and communicating it effectively are more likely<br />
to be resilient. This reflects the form of<br />
guidance used throughout and that resilience<br />
drivers will vary between organisations.<br />
Attribute structure is also broadly consistent,<br />
wherein each Attribute has a headline directive<br />
statement followed by a list of capabilities that<br />
should be enhanced and demonstrated and a<br />
list of activities that facilitate the capabilities,<br />
requiring prioritisation and resourcing.<br />
In this case, the ‘Clarity of purpose’ Attribute<br />
implies that we need all our resilience-related<br />
goals to be aligned, promoting synergy and<br />
reducing conflict and making the initiative roll<br />
smoothly. It implies that we should design a<br />
strategy that takes us safely through Brexit<br />
without compromising the business, make sure<br />
the strategy is adopted by the Board,<br />
communicate it internally and externally where<br />
appropriate, deliver the strategy while<br />
maximising resilience value for the organisation<br />
and repeat, monitor, adapt and improve.<br />
Note that the final continuous improvement<br />
point applies for all attributes and isn’t<br />
repeated hereafter. It ensures the system is<br />
optimised against organisational goals, in this<br />
case for Brexit. One would expect it to be<br />
applied fairly frequently to deal with the rapid<br />
rate of change.<br />
This Attribute provides overall stability and<br />
directional control. However, it begs the<br />
practical question: “How do we select the right<br />
strategy and what are its constituent parts?”<br />
As previously explained, this is unique for<br />
you. However, there are clues elsewhere and<br />
we’ll come to them in due course.<br />
Understanding context<br />
ISO 22316 suggests that organisations who<br />
understand their context are more likely to be<br />
resilient. Context is a term that doesn’t appear<br />
in the terminology listings, but in simplifying
Opinion: ISO 22316 Security and Organisational Resilience (Part One)<br />
the term it can be taken to mean ‘everything<br />
relevant to us’. It includes all direct and indirect<br />
external parties and internal organisational<br />
components, in addition to all of the ways in<br />
which they interrelate.<br />
Understanding context provides a basis for<br />
us to explain and anticipate the effects of<br />
change, and this is clearly valuable for Brexit as<br />
we want to know what might happen. It’s our<br />
very own crystal ball.<br />
Influencing context implies shaping our<br />
environment internally, but also persuading<br />
third parties to align with our strategy,<br />
modifying agreements and lobbying decisionmakers.<br />
It represents a powerful destinyshaping<br />
force and is something to which we<br />
might aspire.<br />
Steps we may take include developing a<br />
detailed context model for the organisation,<br />
thinking big and looking beyond the immediate<br />
(up and downstream and including a focus on<br />
competitors), factoring-in all relevant ‘climates’<br />
such as operational, commercial, socio-political<br />
and economic, mapping all the potential Brexitrelated<br />
sources of vulnerability, concentration<br />
and change and both identifying and<br />
strengthening relationships and entities that<br />
support the strategy.<br />
For me, the idea of a contextual map is the<br />
beating heart of resilience management.<br />
Effective leadership<br />
This Attribute implies that resilience will be<br />
enhanced by delegation and empowerment<br />
during periods of uncertainty and disruption. I<br />
would interpret this as instruction to carefully<br />
select and appoint a Brexit programme owner<br />
with a targeted brief and delegated authority.<br />
It implies that the nominated individual<br />
should be prepared to embrace and leverage<br />
the change, address problems and seize<br />
opportunities, be ready to identify and promote<br />
Brexit-compatible practices, be technically<br />
adept, adaptable, innovative and empowered to<br />
make tactical and strategic decisions.<br />
ISO 22316 seems to be saying: ‘Build a team<br />
with an executive leader with the experience to<br />
understand our unique position and resulting<br />
Brexit challenge, and whom the Board trusts<br />
enough to wield delegated authority when<br />
unplanned-for changes demand a fast<br />
response.’ Again, this will not apply for all<br />
businesses, but seems appropriate for those<br />
who perceive a major threat.<br />
Creating a resilient culture<br />
A strong culture implies a close-knit<br />
organisation whose members share consistent<br />
and ingrained values and beliefs. A weak or<br />
dilute culture suggests variance, fragmentation,<br />
uncertainty, fragility and diluted resilience. It<br />
follows that those with a strong culture are<br />
more likely to be resilient.<br />
This applies for Brexit due to its multi-faceted<br />
profile and its strong political, economic, social<br />
and emotional implications for individuals both<br />
within and outside of the workplace. It implies<br />
that we might enhance our cultural resilience<br />
by finding out what drives employees’ attitudes<br />
to Brexit and whether views are shared,<br />
determining if people will broadly resist or<br />
support the strategy, deciding how to position,<br />
promote and deliver the strategy while building<br />
support, encouraging people to innovate,<br />
improve and back the strategy and empowering<br />
them to identify and communicate Brexitrelated<br />
threats and opportunities.<br />
Culture is a slow-moving beast. It has inertia<br />
and naturally resists any wholesale change of<br />
mindset, implying that a resilient culture will<br />
not be created overnight, either in the general<br />
sense or, indeed, for Brexit. It also means that,<br />
in the short term, we may need to work with<br />
what we have and search for supportive<br />
influences that might already be present,<br />
adding only culturally-compatible new ideas.<br />
In the UK, Brexit has already caused divisions<br />
along unexpected lines between friends,<br />
businesses and even within families, with many<br />
still holding opposing views. With so great a<br />
divide, there seems little chance of imposing a<br />
Brexit position on a workforce. Indeed, it would<br />
be ill-advised to even consider doing so.<br />
*Next month: Attribute 5<br />
(Shared information and<br />
knowledge), Attribute 6<br />
(Availability of resources),<br />
Attribute 7 (Development and<br />
co-ordination of management<br />
disciplines), Attribute 8<br />
(Supporting continual<br />
improvement) and Attribute 9<br />
(Ability to anticipate and<br />
manage change) in focus<br />
“Brexit represents a systemic, multi-faceted, enduring,<br />
changing and complex risk. It carries the possibility of both<br />
losses and opportunities that may be linked”<br />
15<br />
www.risk-uk.com
All Things Being Equal<br />
recommends that the proportion of females<br />
present on FTSE 350 companies’ Boards of<br />
Directors should reach 33% by 2020.<br />
It’s not just the security industry that has<br />
work to do in this area, either. According to<br />
UCATT, women make up only 11% of the<br />
construction workforce and just 1% of workers<br />
on site, while the Office for National Statistics<br />
has stated that the number of females working<br />
as roofers, bricklayers and glaziers is so low as<br />
to be unmeasurable.<br />
Similarly, the latest figures issued from the<br />
2016 Women in IT Scorecard research –<br />
published by the BCS (The Chartered Institute<br />
for IT) and The Tech Partnership – show that<br />
females account for just 17% of IT<br />
professionals. It’s a figure that has remained<br />
essentially unchanged over the three years the<br />
report has been made available.<br />
Amid the wider<br />
requirement for<br />
gender diversity in the<br />
workplace, the<br />
number of females<br />
resident within the<br />
security industry<br />
remains<br />
disconcertingly low.<br />
Peter Webster<br />
examines why there’s<br />
such a gender<br />
imbalance and<br />
outlines what can be<br />
done to make security<br />
a more attractive<br />
career choice for<br />
women<br />
According to the British Security Industry<br />
Association (BSIA), an estimated 352,000<br />
individuals are presently employed by the<br />
UK’s security industry, yet research conducted<br />
by the Security Industry Authority (SIA) in 2015,<br />
which looked at gender and other protected<br />
characteristics, revealed that only 9% of SIA<br />
licence holders are female. Although there are<br />
indeed a number of women occupying highprofile<br />
roles within the industry, it remains the<br />
case that security is still very much a maledominated<br />
domain.<br />
There’s little doubt that the industry has an<br />
image problem. Just ask a member of the public<br />
to describe a security professional and the<br />
chances are that one of the first words<br />
mentioned will be ‘male’. The national media<br />
has to take its share of the blame here, with<br />
security officers on TV traditionally portrayed<br />
as men who are often lazy, overweight and<br />
‘jobsworth’ when it comes to their attitude.<br />
However, the blame for the current gender<br />
disparity cannot be foisted upon the media<br />
alone. It’s also still a general assumption that<br />
the security sector is misogynistic in nature,<br />
which is something that’s enough to dissuade<br />
many women from joining the ranks.<br />
Achieving greater gender diversity in the<br />
workplace is a massive problem in general,<br />
even at the highest levels of management. The<br />
Cranfield University School of Management<br />
Report found that, in 2016, the number of<br />
women with places on the top Boards of FTSE<br />
100 companies stood at 26%. This report<br />
Business benefits<br />
There’s plenty of research available to suggest<br />
that gender diversity is crucial for innovation<br />
and growth in a given business sector. For<br />
example, the Harvard Business Review reported<br />
that leaders who give diverse voices equal<br />
airtime are nearly twice as likely as others to<br />
unleash value-driving insights, while those<br />
employees working in a ‘speak up’ culture are<br />
over three times as likely to contribute their full<br />
innovative potential to the host business. In<br />
addition, customers can see the benefits of a<br />
more gender-balanced workforce.<br />
Going forward, if the security industry is to<br />
reach its full potential then, put simply, it needs<br />
the skills and mindsets of both men and women<br />
in order to do so.<br />
There’s already a severe skills shortage<br />
across the sector. Failing to attract enough<br />
candidates from the 50% of the UK workforce<br />
who are female can only add to this and will<br />
seriously hamper growth. The problem was<br />
highlighted earlier this year, in fact, when the<br />
Sunderland Echo reported that Peterlee-based<br />
Steadfast Security had been advertising for<br />
female officers for months, but applicants were<br />
proving impossible to find.<br />
Various initiatives have been kick-started to<br />
redress the balance, among them the Women’s<br />
Security Society, which aims to create an<br />
inspirational networking forum for females<br />
operating in the industry. Frankly, anything that<br />
helps to attract women into the security<br />
industry and address the negative perceptions<br />
of it should be welcomed.<br />
16<br />
www.risk-uk.com
Opinion: Security’s VERTEX Voice<br />
All that said, it’s dangerous to fall into the<br />
trap of gender stereotyping and positive<br />
discrimination. To put it bluntly, statements<br />
about ‘what women bring to the workplace’ are<br />
potentially damaging both to the cause itself<br />
and to its desired effect. If we are to have a<br />
truly inclusive and equal industry, women will<br />
demonstrate their strengths through their<br />
achievements. The more female role models<br />
there are then so much the better.<br />
Awareness is key to addressing the problem.<br />
Visits to schools, student visits to facilities,<br />
mentoring, work placements and campaigns<br />
designed to drive interest in the sector would<br />
all help to attract more women into the security<br />
workforce. Trade shows should invite more<br />
high-profile female guest speakers to educate<br />
the industry on how they’ve achieved their<br />
success and the benefits businesses can<br />
receive by dint of more gender diversity.<br />
Theory of evolution<br />
Particularly so when it comes to security<br />
guarding, security companies have often had to<br />
consider the physical attributes of an employee<br />
and their ability to ‘stand their ground’ in some<br />
challenging situations. There’s little point in<br />
pretending otherwise: security guarding isn’t a<br />
glamour profession.<br />
Combined with the inherent risks involved in<br />
this type of work, front line security officers<br />
who are not prepared to work hard, put up with<br />
long and often anti-social hours – including<br />
working at weekends – and travel to and from<br />
work at odd times of the night will soon realise<br />
that it’s not for them.<br />
The security industry is constantly evolving,<br />
though, and besides the aforementioned front<br />
line roles, the influx of technology in all aspects<br />
of security is creating new opportunities.<br />
Security is becoming so much more than just<br />
having a physical presence, with technology<br />
including electronic surveillance and access<br />
control making traditional guarding functions<br />
less dominant. However, technology cannot<br />
replace the need for human beings to interface<br />
with one another, which is precisely why, in<br />
modern security, good communication skills<br />
and high levels of emotional intelligence are<br />
required from professionals of both genders.<br />
Emotional intelligence<br />
Since 1990, Peter Salovey and John Mayer have<br />
been the leading researchers on the subject of<br />
emotional intelligence.<br />
Salovey and Mayer define it as the sub-set of<br />
social intelligence that involves the ability to<br />
monitor one’s own and others’ feelings and<br />
emotions, to discriminate among them and to<br />
use this information for guiding one’s thinking<br />
and actions.<br />
While many males have excellent levels of<br />
emotional intelligence, women have been found<br />
to be especially good at identifying, assessing<br />
and controlling situations, often diffusing<br />
particularly volatile epidodes through tone of<br />
voice and body language. Since men and<br />
women tend to think and solve problems<br />
differently, the combined gender talent pool<br />
can be amazing.<br />
A family affair<br />
Modern family life is changing just as rapidly as<br />
working life and accommodating this work/life<br />
balance is something that companies have to<br />
consider. Although the nature of security work<br />
itself might appeal to women, there’s no<br />
escaping the fact that much of it takes place<br />
outside of the 9.00 am to 5.00 pm parameter.<br />
That often makes retaining staff difficult. This is<br />
particularly evident in people of both genders<br />
who have young families and find arranging<br />
childcare a problem because their partners<br />
might also be at work.<br />
Work patterns also need to be more flexible.<br />
The sector must adopt a unified approach to<br />
the issue before the available talent dwindles<br />
still further. There’s a strong argument to<br />
suggest that, if security companies were able to<br />
offer regular hours, then they would be much<br />
closer to having a balanced workforce than they<br />
do at present.<br />
Unfortunately, and as stated, anti-social<br />
hours are an inherent part of the job. Indeed,<br />
it’s an aspect of the role that’s unlikely to ever<br />
change (unless, that is, security companies are<br />
prepared to look seriously at how they can<br />
provide more flexible working hours).<br />
The shortfall in female recruitment takes<br />
place at a time when the sector itself is in<br />
strong growth. This means that opportunities<br />
for employers and employees alike are being<br />
missed. The figures speak for themselves,<br />
though, and the industry needs to take<br />
ownership by attracting female talent.<br />
Although the barriers to gender equality in<br />
the workplace are slowly beginning to change,<br />
it’s fair to state that there’s much more work<br />
still to be done here. True balance can only be<br />
built if the people in leadership positions<br />
understand the many benefits that a diverse<br />
workforce can bring to their operations.<br />
Peter Webster: Chief Executive<br />
of Corps Security<br />
*The author of Risk UK’s regular<br />
column Security’s VERTEX Voice is<br />
Peter Webster, CEO of Corps<br />
Security. This is the space where<br />
Peter examines current and often<br />
key-critical issues directly<br />
affecting the security industry. The<br />
thoughts and opinions expressed<br />
here are intended to generate<br />
debate among practitioners within<br />
the professional security and risk<br />
management sectors. Whether you<br />
agree or disagree with the views<br />
outlined, or would like to make<br />
comment, do let us know (e-mail:<br />
pwebster@corpssecurity.co.uk or<br />
brian.sims@risk-uk.com)<br />
“Various initiatives have been kick-started, among them<br />
the Women’s Security Society, which aims to create an<br />
inspirational networking forum for females in the industry”<br />
17<br />
www.risk-uk.com
Institute of Risk Management<br />
Are your staff risk ready?<br />
<br />
It is essential that your staff have a knowledge of the<br />
principles and practices of effective risk management.<br />
<br />
Enterprise Risk Management is designed to do just that.<br />
What’s in it for employers?<br />
> Managing risks effectively will<br />
lower your costs.<br />
> Turn threats to your business into<br />
opportunities.<br />
> Enhance business performance<br />
and improve risk taking<br />
approaches.<br />
> Develop a motivated, skilled and<br />
knowledgeable team.<br />
> Attract high-calibre professionals<br />
by investing in personal<br />
development.<br />
What’s in it for students?<br />
> Enhance your ability to design<br />
and implement effective risk<br />
management strategies.<br />
> Develop a critical understanding<br />
of the relationship between<br />
risk management, governance,<br />
internal control and compliance.<br />
> Gain an internationally<br />
<br />
months.<br />
> Join our global network of risk<br />
management practitioners.<br />
Distance<br />
Learning<br />
International<br />
Recognition<br />
Relevant for<br />
All Sectors<br />
Email: studentqueries@theirm.org<br />
Phone: +44 (0)20 7709 4125<br />
or visit www.theirm.org/risk-uk
BSIA Briefing<br />
Security personnel operating in the retail<br />
sector are not only a vital form of<br />
protection against criminals, but also very<br />
often the first impression portrayed of a store’s<br />
brand. That being so, it’s critical that security<br />
personnel are well-trained, professional and<br />
presentable to ensure that losses are reduced<br />
and brand integrity constantly maintained.<br />
In the UK, private security personnel are<br />
regulated by the Security Industry Authority<br />
(SIA), an independent body reporting to the<br />
Home Secretary under the Terms and<br />
Conditions of the Private Security Industry Act<br />
2001. The SIA issues licences to private security<br />
personnel who operate in the spheres of<br />
security guarding, door supervision, close<br />
protection, Cash and Valuables in Transit,<br />
Public Space Surveillance (CCTV), key holding<br />
and vehicle immobilisation. This ensures that<br />
those operating within the private security<br />
industry are ‘fit and proper’ and have<br />
undertaken the necessary training and<br />
achieved the required qualifications to do so.<br />
However, the current regulatory ambit<br />
doesn’t extend to the in-house security sector.<br />
In practice, this means that many retailers in<br />
the UK could be employing their own security<br />
staff who are not subject to the same licensing,<br />
training or qualification requirements as those<br />
employed by a private security company.<br />
Within the pages of the security Regulator’s<br />
In-House Licensing Review Outcome Report<br />
(published in May 2009), the recommendation<br />
is that: ‘There is no clearly defined or<br />
substantiated risk to public protection to be<br />
addressed and so we are unable, at this time,<br />
to make a case which would justify extending<br />
the SIA’s remit to include the licensing of inhouse<br />
security officers.’<br />
Despite this, the report does acknowledge<br />
that there are two sides to the debate. First, the<br />
private security industry has long maintained<br />
that in-house security guarding should be<br />
subject to the same legislative and regulatory<br />
conditions to ensure there’s a level playing<br />
field. It has also been argued by the industry<br />
that, if the in-house sector was regulated, then<br />
a significant number of individuals would be<br />
unable to obtain an SIA licence.<br />
Furthermore, the in-house sector is subject to<br />
some form of regulation in other countries,<br />
among them the Republic of Ireland and France.<br />
Although many organisations employing inhouse<br />
security staff will have their own robust<br />
policies and procedures in place for the<br />
recruitment and training of security staff, it<br />
cannot be guaranteed that all are trained to the<br />
necessary level since there’s no legislative or<br />
regulatory requirement for them to be so.<br />
Showing Respect:<br />
Conducting Security Searches<br />
According to the 2016 Retail Crime Survey published in<br />
February by the British Retail Consortium, the cost of crime in<br />
the retail sector has continued to rise. As the first line of<br />
defence within many retail environments, security personnel<br />
have a key role to play in the fight against criminality. Here,<br />
James Kelly discusses how using high quality, professional<br />
security personnel can help to reduce both the financial and<br />
reputational impacts of crime for today’s businesses<br />
Respecting the individual<br />
Recently, the British Security Industry<br />
Association (BSIA) was asked to comment on<br />
the experience of a supermarket customer who<br />
had been stopped and searched in front of a<br />
crowd of other shoppers 1 . The experience left<br />
the woman involved feeling humiliated. The<br />
female concerned was also of the belief that<br />
she had been racially profiled.<br />
While retailers are perfectly within their<br />
rights to stop and question customers they<br />
suspect may be attempting to steal from their<br />
premises, they absolutely must have proper<br />
grounds for doing so, while any searches<br />
should be carried out with respect.<br />
To this end, the BSIA has published a Code of<br />
Practice for Security Searches 2 specifically for<br />
companies that offer a search service to<br />
customers (and would, in appropriate cases, be<br />
subject to the provisions of the Private Security<br />
Industry Act 2001), as well as businesses that<br />
directly employ in-house security staff. The<br />
James Kelly: CEO of the British<br />
Security Industry Association<br />
19<br />
www.risk-uk.com
BSIA Briefing<br />
References<br />
1 https://www.theguardian.<br />
com/money/2017/jun/18/<br />
high-street-security-guardsshoppers-theft<br />
2 https://www.bsia.co.uk/<br />
Portals/4/Publications/231-<br />
security-searches-cop.pdf<br />
Code outlines good practice recommendations<br />
for the conducting of searches by personnel<br />
employed to ensure the security and safety of<br />
property and individuals alike.<br />
First, consent to search is always required,<br />
except in those circumstances where statutes<br />
or regulations provide otherwise. There are<br />
serious implications for any person or company<br />
enforcing a search without explicit consent.<br />
Second, those people being searched may<br />
consider the search to be invasive. It’s therefore<br />
important that the searcher understands and<br />
respects the person concerned and operates in<br />
a manner that reduces the impact of that<br />
search. In particular, searchers should avoid<br />
discrimination and show respect for privacy,<br />
cultural differences and religious sensitivities.<br />
As part of this, there should be a definition,<br />
which is understood by all parties, of the object<br />
of the search and a clear definition of when the<br />
search is complete or has been carried out to a<br />
sufficient degree of thoroughness.<br />
Other factors that require to be considered to<br />
ensure that respect is given at all times include<br />
precautions about additional needs such as<br />
medical conditions or disabilities, advising<br />
individuals of their rights, confirming that<br />
individuals fully understand the search process,<br />
distance from other persons and the<br />
information that’s afforded to individuals<br />
following the search.<br />
There should be procedures in place that<br />
clearly define the principles under which an<br />
individual is searched and they shouldn’t be<br />
discriminatory. Such criteria might include<br />
whether all individuals carrying bags are<br />
searched, whether individuals are randomly<br />
selected to be searched (preferably where the<br />
decision-making isn’t controlled by the<br />
searcher) or the search of individuals where<br />
there’s suspicion (such as the activation of an<br />
Electronic Article Surveillance system).<br />
In terms of the case featured in The Guardian,<br />
it would appear that many of the good practice<br />
recommendations outlined in the BSIA’s Code<br />
of Practice hadn’t been followed. It’s an episode<br />
that may well have exerted a negative impact<br />
on the supermarket’s brand and reputation.<br />
Maintaining reputation<br />
The private security industry has built a solid<br />
and trusted reputation that’s favourable among<br />
“Consent to search is always required, except in those<br />
circumstances when statutes or regulations provide<br />
otherwise. There are serious implications for any person or<br />
company enforcing a search without explicit consent”<br />
Government, the police service and the general<br />
public, largely down to the very high standards<br />
maintained by the industry. Since the Private<br />
Security Industry Act 2001 was passed, the<br />
industry and the personnel working on the front<br />
line have upheld the image of a business sector<br />
that’s professional, whose staff are well-trained<br />
and which is, in broad terms, an essential<br />
component of public safety in today’s world.<br />
However, it may be argued that experiences<br />
like the one reported in The Guardian can have<br />
a negative impact on the reputation of the<br />
private security industry, as it’s unlikely that the<br />
general public will distinguish between a<br />
licensed security officer and an in-house one<br />
during any interaction they might have with<br />
them. Therefore, a bad experience with an inhouse<br />
security officer has the potential to cloud<br />
a member of the general public’s perception of<br />
licensed security personnel.<br />
Given the increasingly important role that the<br />
private security industry plays in protecting<br />
people and assets, maintaining the industry’s<br />
reputation is essential. To this end, the BSIA<br />
has been lobbying for the inclusion of the inhouse<br />
sector in the regulatory regime for many<br />
years now. Indeed, this was one of the<br />
Association’s positions during the 2016<br />
Independent Review of the SIA. It’s hoped that<br />
this position – along with the reaffirmation of<br />
business licensing in place of the current<br />
system and greater recognition of the industry’s<br />
vital role in protecting the public – will be<br />
recognised in the final report when published.<br />
Sourcing a supplier<br />
Members of the BSIA’s Security Guarding<br />
Section must comply with the Association’s<br />
stringent eligibility criteria which is an<br />
assurance that they’re reputable service<br />
suppliers. This includes demonstrating that a<br />
given company is financially sound, that its<br />
directors are of good repute and that the<br />
company possesses ISO 9001 certification<br />
(accredited by a UKAS certification body).<br />
In addition to this, members of the BSIA’s<br />
Security Guarding Section must also meet the<br />
Section-specific criteria which include ensuring<br />
that all employees are security screened to BS<br />
7858 Security Screening of Individuals<br />
Employed in a Security Environment and<br />
conforming to the latest version of BS 7499<br />
Code of Practice for Static Site Guarding and<br />
Mobile Patrol Services.<br />
For retailers employing their own in-house<br />
security staff who may be required to conduct<br />
on-premise searches of individuals, the BSIA’s<br />
Code of Practice for Security Searches can be<br />
downloaded free from www.bsia.co.uk<br />
20<br />
www.risk-uk.com
The New Camera Line Mx6 Creates More Possibilities.<br />
More Images, in All Light Conditions, in Every Standard<br />
More Intelligence Is on the Way<br />
The new Mx6 6MP camera system from MOBOTIX offers increased performance.<br />
A frame rate that is up to twice as fast than that of other cameras allows it to capture<br />
quick movements even better and simultaneously deliver sharp images in MxPEG,<br />
MJPEG and, for the first time in H.264, the industry standard. The innovative Mx6<br />
camera line is faster, more flexible and higher-performing, opening up new application<br />
and integration opportunities for to you to meet all requirements.<br />
MOBOTIX AG • Langmeil, Germany • www.mobotix.com
Physical and IT Security<br />
Convergence: Are We There Yet?<br />
Although historically<br />
distinct, physical<br />
security and<br />
information security<br />
have grown closer in<br />
recent times as a<br />
direct result of the<br />
integration of IPenabled<br />
devices<br />
within traditionally<br />
closed and isolated<br />
security systems.<br />
Where are we now,<br />
then, on the road to<br />
genuine convergence?<br />
Damien Pezza<br />
investigates<br />
Damien Pezza MSc FIHEDN<br />
FINHESJ: Security Consultant<br />
at CornerStone GRG<br />
Over recent decades, the increasing<br />
visibility and resourcefulness of cyber<br />
threat actors and the Internet of Things<br />
(IoT) have combined to revolutionise the<br />
security sector. Gartner recently forecasted that<br />
8.4 billion connected ‘things’ would be in use at<br />
the global level in 2017, representing an<br />
increase of nearly a third from 2016, and also<br />
predicted that the number of devices would<br />
reach 20.4 billion by 2020, with a rise in the<br />
share of ‘cross-industry business devices’ such<br />
as HVAC and physical security systems.<br />
For their part, video surveillance, access<br />
control, perimeter detection and alarm systems<br />
have become increasingly dependent on<br />
network electronics. Security systems are<br />
therefore exposed to a variety of cyber threats,<br />
necessitating that cyber protection is now as<br />
relevant to the security industry as it is for lowend<br />
and domestic ‘smart’ devices. This has<br />
prompted the need for holistic approaches<br />
towards security and risk management that<br />
emphasise formal co-operation between<br />
previously separate security functions. In<br />
industry parlance, this is ‘Convergence’.<br />
The interdependence of IT, physical and<br />
operational technology systems can bring<br />
concrete advantages to public and private<br />
sector organisations that wish to secure their<br />
assets. The same applies for convergence.<br />
Theoretically, the latter enables fast and<br />
informed responses to all types of threats,<br />
while bridging gaps between IT and Security<br />
Departments by merging them into a<br />
centralised risk management unit or otherwise<br />
creating overarching supervisory structures –<br />
thus improving organisational efficiency and<br />
eliminating both the vulnerabilities and<br />
inefficiencies of managing security and risks<br />
across silos.<br />
In such a converged risk management<br />
framework, cyber security plays an essential<br />
role in securing an organisation’s infrastructure<br />
and operations. In tandem, physical security<br />
measures ensure the integrity of its network<br />
and information assets.<br />
Problematic endeavour<br />
However, convergence is far easier and safer to<br />
achieve in theory than is the case in practice.<br />
Integrating an increasing number of devices<br />
into corporate networks presents a significant<br />
security risk to organisations. It has enabled<br />
external or ‘insider’ threats not only to impair<br />
security systems, supervisory control and data<br />
acquisition platforms or critical infrastructure<br />
through the Internet, but also to infiltrate or<br />
attack an organisation’s network by targeting<br />
IP-enabled equipment (such as cameras) or<br />
devices owned by employees themselves.<br />
Calls for greater convergence have naturally<br />
met with internal and organisational obstacles,<br />
as the setting out of such a massive project<br />
entails considerable resources and involves<br />
numerous departments. A study on Cyber<br />
Security and the Internet of Things published<br />
by EY in 2015 indicated that only 6% of all<br />
surveyed organisations claimed to have a<br />
robust incident response programme in place<br />
that includes third parties and that’s integrated<br />
with broader threat and vulnerability<br />
management functions.<br />
Even if successful in appearance,<br />
convergence at the structural level doesn’t<br />
necessarily solve underlying gaps and tensions<br />
within an organisation. A survey conducted by<br />
The Ponemon Institute in 2015 highlighted<br />
significant rifts in cyber security knowledge<br />
between decision-makers and IT security<br />
professionals. It revealed that cyber security<br />
has only begun to have an impact on the<br />
agenda of decision-makers in recent years, and<br />
that most IT professionals think their Board of<br />
Directors isn’t properly informed about every<br />
threat the organisation is facing.<br />
Hybrid environment<br />
Threat actors operate in a hybrid environment<br />
where the boundaries between virtual and<br />
physical threats are blurred. It’s now more<br />
important than ever for public and private<br />
sector organisations to implement holistic<br />
security strategies that address additional<br />
challenges stemming from convergence itself.<br />
As long as the physical and cyber domains are<br />
treated as segregated, there’s very little hope of<br />
securing either of them.<br />
Convergence isn’t only about form, but also<br />
about function. Organisations should<br />
encourage internal co-operation, co-ordination<br />
and training, not only by ‘changing the<br />
organisation chart’ and creating overarching<br />
risk management structures, but also by<br />
bridging gaps between security practitioners, IT<br />
22<br />
www.risk-uk.com
Convergence of Physical and IT Security<br />
specialists and senior executives. Knowledge of<br />
cyber threats is currently insufficient within<br />
company leaderships and, indeed, among non-<br />
IT professionals in most organisations. IT and<br />
physical security practitioners can potentially<br />
hold competing and partial views as to what<br />
motivates threat actors and how they operate in<br />
a hybrid environment.<br />
Physical security managers need to<br />
understand the criticality of their business’<br />
information and electronic assets, as well as<br />
the nature and potential consequences of a<br />
successful cyber attack on the company’s<br />
operations. Successful attacks on Data Centres<br />
or networks could result in the partial or total<br />
disruption of a company’s critical infrastructure.<br />
Physical security managers must also<br />
understand the criticality of all IP-enabled<br />
devices (from cameras, recorders and badge<br />
readers to loudspeakers) and move to ensure<br />
their proper protection and isolation in cooperation<br />
with IT security professionals.<br />
At the same time, IT security managers must<br />
understand the physical attack vectors to which<br />
their equipment and hardware may be exposed.<br />
Threat actors are now able to compromise<br />
electronic and information assets by infiltrating<br />
an organisation’s premises, bugging<br />
unprotected IP devices (such as security<br />
equipment or HVAC systems) on-site, stealing<br />
employees’ badges or electronic devices or<br />
setting up fake Wi-Fi networks in the vicinity of<br />
a given companies’ premises.<br />
Wider risk framework<br />
IT professionals need to comprehend to what<br />
extent cyber security must be embedded within<br />
a wider risk management framework and assist<br />
corporate-level and security managers in order<br />
to inform decisions that take into account the<br />
growing threats posed by the ‘cybersphere’ and<br />
the IoT to a company’s assets.<br />
Where convergence isn’t a possibility at the<br />
structural level, IT and Physical Security<br />
Departments should nonetheless be aligned,<br />
allowing Chief Information Security Officers<br />
(CISOs), Chief Security Officers (CSOs) and<br />
Chief Operations Officers to share overlapping<br />
goals and targets. Last year, for instance,<br />
Barclays merged the functions of CSO and CISO<br />
in an attempt to redefine the company’s<br />
approach to security and provide overall<br />
resilience against all kinds of threats by<br />
building group-wide investigations ably<br />
supported by joint Operations Centres.<br />
Implementing such organisational and<br />
structural changes can prove complex.<br />
Ensuring that all stakeholders and employees<br />
are on the same page entails considerable<br />
resources: time, money, people, technology and<br />
processes. The use of independent security<br />
consultancies and their expertise might well<br />
help organisations in optimising their transition<br />
towards a fully-converged security apparatus by<br />
bridging the gap between convergence at the<br />
strategic and operational levels. This allows<br />
companies to adopt an holistic view of security<br />
in which security equipment, Physical Security<br />
Information Management software and<br />
organisational dynamics are interdependent.<br />
It must be borne in mind that encouraging<br />
co-operation at the organisational level alone<br />
isn’t sufficient to achieve convergence in the<br />
current security context. Incidents have<br />
continuously highlighted the now global<br />
character of security threats and their<br />
mitigation. The multiplication of IP-based<br />
security systems at the global level has<br />
transformed each single device – ranging from<br />
security systems to coffee machines – into a<br />
potential attack vector against third parties that<br />
are not related in any way to said devices.<br />
It’s also essential to think beyond the<br />
individual business and seek to encourage a<br />
culture of communication and co-ordination not<br />
only within organisations, but also between<br />
them. As was highlighted in an excellent White<br />
Paper published only last November by The<br />
Economist: “Every organisation is more secure<br />
when all are more secure.”<br />
“In such a converged risk management framework, cyber<br />
security plays an essential role in securing an<br />
organisation’s infrastructure and operations”<br />
23<br />
www.risk-uk.com
State of Mind: Developing ‘Risk Culture’<br />
intelligence. Risk professionals often deal with<br />
culture as if it can be controlled and managed<br />
rather than recognising its evolving and<br />
complex character. Disciplines such as<br />
psychology and organisational development<br />
which bring methodologies for working with<br />
organisational cultures remain little explored.<br />
When organisations attempt to change their<br />
risk culture, they often delegate that objective<br />
to risk professionals: individuals ‘siloed’ in their<br />
functional discipline and who perhaps lack<br />
broader operational leadership experience.<br />
Alternatively, this task is delegated to Human<br />
Resources professionals who may not<br />
understand financial risk, for example.<br />
Risk culture needs the support of leadership<br />
across the whole business to change<br />
effectively. A series of high-profile fines and<br />
failures in the finance world over the last<br />
decade show that approaches based on<br />
conventional risk processes have little impact.<br />
During the last few<br />
years, we’ve moved<br />
from thinking about<br />
risk as a technical<br />
issue to<br />
understanding that,<br />
once the technical<br />
basics are covered,<br />
it’s primarily one of<br />
culture. What kind of<br />
risk culture prevails in<br />
your organisation?<br />
How does it influence<br />
risk management?<br />
How might you<br />
transform your risk<br />
culture such that it’s<br />
then a key asset in<br />
managing risk? Alex<br />
Poppleton addresses<br />
these core questions<br />
The 2008 financial crisis was underpinned<br />
by ineffective and entrenched risk cultures<br />
in investment banks. Following the crash,<br />
financial regulators began asking for evidence<br />
of how institutions were changing their ‘risk<br />
culture’ and, in the time since, the idea that<br />
‘risk culture’ is a critical aspect of managing<br />
risk has steadily gained currency.<br />
Dr John Kotter, founder of Kotter International<br />
and Emeritus Harvard Professor of Leadership,<br />
has spent decades studying the factors that can<br />
derail even the best-laid of business plans.<br />
Kotter’s research demonstrates that 70% of<br />
transformation efforts still fail to meet the<br />
expectations that were laid out when those<br />
efforts began. Kotter has observed that the<br />
human factors critical to effective change can<br />
become lost in the simplicity of a ‘formula’.<br />
Despite this history, the idea that you can<br />
transform culture primarily through a predetermined<br />
process or project plan has<br />
pervaded our organisational life. However, a<br />
key challenge for today’s risk management<br />
professionals is that they often don’t have<br />
experience of the leadership capabilities<br />
needed to change the culture of their business.<br />
Typically, risk has been understood primarily<br />
through systems and processes, creating a<br />
tendency to value numeracy over emotional<br />
Complex and nuanced<br />
Dr Kotter’s work demonstrates that only 5% of<br />
organisations fully succeed or exceed their<br />
transformational intentions. Culture change is<br />
critical to that success. Risk culture isn’t about<br />
binary compliance or non-compliance. Rather,<br />
it’s complex, nuanced and intrinsic to the<br />
organisational DNA. So can it be ‘changed’? The<br />
answer is ‘Yes’, it can, but institutions first need<br />
to alter their frame of reference.<br />
To draw a parallel here, we generally accept<br />
that we’re not able to ‘manage’ national<br />
cultures. Rather, we generally experience them<br />
changing over many years. Attempting to treat<br />
risk culture as part of a project plan belies its<br />
intrinsic complexity.<br />
Many begin to look at organisational culture<br />
change by defining the behaviours that will be<br />
needed as a future ‘blueprint’. However, as<br />
becomes obvious once you deal with complex<br />
risk, behaviour alone isn’t enough. Individuals<br />
can display the right behaviours, but with the<br />
wrong motivation, which still represents a key<br />
risk. This critical insight demonstrates the need<br />
to look beyond behaviours in organisational<br />
change initiatives which would otherwise<br />
operate on a superficial level.<br />
Risk professionals understand that rules and<br />
procedures are of limited value without a set of<br />
underpinning principles to guide decisions. For<br />
their part, organisations are increasingly<br />
recognising the need to move from setting out<br />
rules to establishing guiding principles.<br />
24<br />
www.risk-uk.com
Risk Management and Organisational Culture<br />
Managing risk through enforcing rules tends<br />
to create a compliant culture wherein people<br />
are discouraged from thinking for themselves<br />
or making their own decisions. This is often<br />
manifested as a superficial conformance in<br />
order to implement what’s required, but those<br />
involved will quietly wash their hands of the<br />
consequences of any actions with which they’re<br />
not engaged.<br />
From rules to principles<br />
Culture is about much more than just<br />
behaviour: definitions such as ‘the way we do<br />
things around here’ also implicitly include<br />
values, assumptions and collective<br />
understanding. Organisations have begun to<br />
understand that a set of binary rules that define<br />
behaviour isn’t sufficient. Decisions need to be<br />
made in fast-moving and highly-complex<br />
situations that, to be frank, are too diverse to<br />
legislate for every eventuality.<br />
To help people do the right thing, you need to<br />
give them principles to work with – fairness,<br />
decency, the right thing to do, accuracy,<br />
transparency – and they can then make<br />
decisions based on those principles. These<br />
principles need to be aligned to values – not<br />
words pinned on the wall, but what people<br />
genuinely believe in and care about. That takes<br />
time and real attention to do well. People will<br />
sniff out ‘values’ that don’t seem genuine and<br />
heart-felt. For example, hiring a high achiever<br />
with a tarnished reputation will damage efforts<br />
to create a principles-based risk culture.<br />
Organisations need to develop their<br />
employees’ ability to make principle-based<br />
decisions, in turn moving away from ‘Does this<br />
break the rule?’ to ‘Would this stand up to<br />
scrutiny?’ Have you done the right thing for the<br />
wrong reasons (ie ‘got away with it’, but with<br />
potential dangers for the future) or the wrong<br />
thing for the right reasons (ie made a genuine<br />
mistake that can be learned from)? Applying<br />
such tests consistently creates the opportunity<br />
to make real improvements in a business.<br />
How do we develop this new risk culture,<br />
then? Some key elements include clearly<br />
communicating how an effective risk culture<br />
functions, developing people’s understanding,<br />
empowering their decisions and enabling<br />
transparency around mistakes that supports<br />
learning rather than punishment.<br />
The resulting new and open organisation<br />
needs to be lived and modelled by senior<br />
leadership and communicated to all.<br />
Complete engagement<br />
It’s vital to engage stakeholders across the<br />
organisation so that they share in a common<br />
“Organisations need to develop their employees’<br />
ability to make principle-based decisions, in turn<br />
moving away from ‘Does this break the rule?’ to<br />
‘Would this stand up to scrutiny?’”<br />
purpose to own risk collectively and<br />
individually for all levels, roles and<br />
responsibilities. Cascading this from the top<br />
down is counter-productive to an initiative<br />
which is intending to make sure everyone in the<br />
organisation ‘owns’ risk. It has to be created<br />
and implemented in a way which demonstrates<br />
that ownership and doesn’t just talk about it.<br />
To create an effective risk culture, leaders<br />
need to work hard to establish transparency<br />
and trust over time. Initially, moving from rules<br />
to principles takes time and consistency to<br />
work. The key to success is to persist in<br />
creating an environment which enables<br />
individuals to raise challenging questions,<br />
discuss ethical dilemmas and flag potential<br />
conflicts without being personally damaged as<br />
a result of doing so.<br />
To create a culture of openness and<br />
genuinely learn from failures takes courage,<br />
leadership and consistency across time.<br />
Internal politics need to give way to an<br />
environment which is focused on the greater<br />
good of achieving better safety and less risk all<br />
round. Change comes from enabling those<br />
values to be put into action: trusting people to<br />
act well, empowering them to ask for help when<br />
they’re unsure and treating them as adults.<br />
One further requirement for changing risk<br />
culture is the necessity for risk specialists to<br />
have interpersonal as well as intellectual<br />
expertise. Successful transformation demands<br />
both passion and intellect. It also demands<br />
both management of day-to-operations and<br />
leadership to guide and inspire transformation.<br />
The move from a rules-based to a principlesbased<br />
culture imbues leadership with the<br />
courage to step forward and act with good<br />
intent, encouraging similar acts by others. It<br />
challenges us to act from our best intentions. In<br />
this context, it’s harder for risks to not be<br />
noticed and addressed, simply because<br />
everyone’s invested in being part of an<br />
organisation of which they can be proud.<br />
Does this sound too good to be true? Is it<br />
perhaps too optimistic for hard-nosed risk<br />
managers? Our experience in industries where<br />
establishing effective risk cultures is existential<br />
– such as in banking and pharmaceuticals –<br />
demonstrates that this really is possible. We’ve<br />
found that employees want to be part of<br />
initiatives that foster an effective risk culture.<br />
Alex Poppleton:<br />
Principal Consultant at Kotter<br />
International<br />
25<br />
www.risk-uk.com
On The Mark: Safeguarding Your<br />
Company’s Valuable Assets<br />
According to the British Security Industry Association, asset<br />
and property marking is one of the oldest sectors of the<br />
security industry. Not surprising, perhaps, given that the<br />
owners of valuable items have always sought ways in which<br />
to identify their belongings. Here, James Brown evaluates the<br />
solutions available for today’s practising risk and security<br />
management professionals<br />
Asset marking systems enable the marked<br />
asset – be it a laptop, a PC, an item of<br />
jewellery or perhaps a smart phone – to be<br />
traced to the legal owner via a secure database<br />
such as a Secure Asset Register (SAR). Today’s<br />
property marking systems have had to become<br />
increasingly high tech to counter ever-more<br />
sophisticated criminal activities. While property<br />
marking by itself will not necessarily prevent a<br />
theft from occurring, it can act as a significant<br />
deterrent to most thieves.<br />
In essence, asset marking is the covert or<br />
overt marking of a valuable item that allows<br />
unique identification of the legal owner of the<br />
asset. It can be applied in a variety of ways. For<br />
example, covert marking is a type of marking<br />
that’s not visible under normal lighting, but can<br />
“End users of forensic marking solutions are advised to look<br />
for products tested to PAS 820. Where marked items are<br />
being used outdoors always seek a Grade A external rating”<br />
be read by simple equipment. Examples include<br />
forensic DNA marking and microdots with a UV<br />
tracer. Criminals know that DNA is the police’s<br />
most powerful weapon in convicting them. The<br />
DNA ‘fear factor’ is highly understood and acts<br />
as a huge deterrent against theft.<br />
Overt marking is easily visible and certified<br />
as complying with the requirements of LPS<br />
1225 (the LPCB Approval and Listing of Asset<br />
Marking Systems). Overt marking also includes<br />
stencil etching and labels.<br />
Stencils can be personalised and include a<br />
unique identification number in addition to the<br />
contact details of the SAR. It’s a case of sticking<br />
the stencil on to the item and then applying an<br />
etching compound over the matrix holes to<br />
leave a permanent and visible mark.<br />
Personalised TESA security labels – which<br />
have an extremely high-tack adhesive and are<br />
resistant to tampering, chemicals and<br />
temperatures of -40°C to 270°C – are ideal for<br />
outdoor use and the most secure and durable<br />
label option. It should be noted, though, that<br />
any form of label on its own cannot be used or<br />
classified as a form of security marking.<br />
Forensic DNA property marking (covert) is a<br />
type of marking in which the asset is uniquely<br />
identified using DNA markers and a UV tracer,<br />
and which is sent for laboratory analysis. Each<br />
DNA code is unique to each client. If thieves<br />
break in to a property and steal electronic items<br />
that have been marked, it makes it very difficult<br />
for them to sell them on. If the police find the<br />
stolen goods they can then reunite them with<br />
their rightful owners. The advantage of<br />
synthetic DNA marking is that it can be used to<br />
mark just about anything without damaging it.<br />
It’s extremely quick to apply and also virtually<br />
impossible to remove.<br />
Deterrent warning stickers can be placed in<br />
office windows at your premises. It has been<br />
proven that thieves don’t even want to risk<br />
breaking into a property in the first place if they<br />
see a sticker stating that DNA marking’s in use.<br />
Forensic offender marking<br />
Also referred to as event-triggered tagging,<br />
forensic offender marking is a covert solution<br />
that’s becoming widespread both here in the<br />
UK and across Europe due to its powerful<br />
ability to deter acquisitive crime. It involves the<br />
marking of a suspected offender to provide<br />
26<br />
www.risk-uk.com
Property and Asset Protection: Best Practice Methodologies<br />
evidence of a crime by use of a system such as<br />
a DNA spray, which is employed by retailers,<br />
banks and petrol station managers to deter<br />
robbery and commercial burglaries.<br />
In practice, the spray is either delivered<br />
automatically in conjunction with an intruder<br />
alarm or by a device set off by an offender or<br />
employee during an incident (such as a robbery,<br />
for example). When a suspected offender<br />
arrives at a police station, they’re examined<br />
under UV light in the custody suite as a matter<br />
of course. If the suspect’s skin and/or clothes<br />
fluoresce under the UV light then samples will<br />
be taken from them and submitted for analysis.<br />
As each batch of DNA is uniquely coded, the<br />
police will be able to link the criminal to the<br />
scene of the crime.<br />
Systems are provided with warning signs to<br />
alert criminals to its use and keep them away<br />
from protected sites. A new hand-held version<br />
of the DNA spray system is being used by the<br />
police to tackle the scrambler bike epidemic in<br />
the UK and has been successful in catching and<br />
convicting offenders for dangerous bike riding<br />
and forms of anti-social behaviour.<br />
Transferrable markers realise a type of mark<br />
that transfers from the marked asset to an<br />
offender coming into contact with it, such as<br />
DNA grease that can transfer from a lead roof or<br />
copper piping to the hands and clothing of a<br />
metal thief and can still be visible weeks later.<br />
A DNA gel is also available that can be smeared<br />
on indoor items, such as door and window<br />
handles and cash tills. This type of marker is<br />
used as a short-term solution where there’s<br />
intelligence to suggest an offence is imminent.<br />
Advice should be clear as to whether the<br />
mark is permanent or transferable. This ought<br />
to include information about the marking and<br />
the suitability of the adhesive and any overt,<br />
covert or forensic content for use on different<br />
materials (such as glass, metal and plastics)<br />
and exposure to different environments (ie<br />
sunlight, water and varying temperatures) as<br />
well as cleaning materials. Where components<br />
of a mark have different durations of<br />
permanence this should always be stated.<br />
End users of forensic marking solutions are<br />
advised to look for products tested to PAS 820.<br />
Where marked items are being used and/or<br />
kept outdoors, a Grade A external rating should<br />
be sought. This is the highest industry standard<br />
and means that the solution has been tested to<br />
last for at least five years.<br />
Providing a SAR<br />
Company premises used for the provision of the<br />
SAR should be secure. The management of data<br />
held by the SAR should be operated in an ISO<br />
9001:2008-approved manner by security-vetted<br />
staff working to protocols for data handling in<br />
accordance with the Data Protection Act 1998.<br />
Controls should be implemented to preserve<br />
the integrity and validity of the asset<br />
registration data. These controls should comply<br />
with industry-recognised information security<br />
standard requirements such as LPS 1224 Issue<br />
3 for SARs and ISO 27001 for Information<br />
Security Management.<br />
Another benefit of using such a database is<br />
that the presence of security marks of a certain<br />
type (such as an owner’s name and postcode)<br />
can prevent the legitimate transfer of<br />
ownership while other marks in conjunction<br />
with a SAR can actually help the transfer.<br />
Property marking is generally a low-cost<br />
option, especially when compared to the value<br />
of the asset it’s being used to protect. The cost<br />
of any of these marking products is determined<br />
by how much product is needed and how many<br />
assets have to be protected.<br />
Insurance considerations<br />
Many insurance companies offer discounts to<br />
customers who mark their property. Users are<br />
advised to check with their insurer or broker<br />
when taking out or renewing a policy as they<br />
may be entitled to a reduction in premiums if<br />
their property, equipment or vehicles are DNA<br />
security marked.<br />
Also worth noting is the fact that some<br />
companies still charge annual renewal fees<br />
after the initial purchase or to use the<br />
manufacturer’s database. Read manufacturers’<br />
sites carefully to avoid any additional charges<br />
and find the right product for your organisation.<br />
Each manufacturer has different procedures for<br />
you to follow when you move or sell an item<br />
that you’ve marked.<br />
Asset and property marking solutions are<br />
making a genuine difference and helping the<br />
police service, communities and businesses to<br />
reduce crime and protect their assets – all with<br />
the added bonus that such solutions are very<br />
simple to use, low cost and highly effective.<br />
James Brown:<br />
Managing Director of<br />
Selectamark Security Systems<br />
plc and Chairman of the<br />
British Security Industry<br />
Association’s Asset and<br />
Property Marking Section<br />
27<br />
www.risk-uk.com
Touched By A Physical Presence<br />
Physical security’s<br />
three important<br />
components – namely<br />
access control,<br />
surveillance and<br />
testing – can<br />
sometimes be<br />
overlooked (and their<br />
importance<br />
underestimated) in<br />
favour of more<br />
technical threats<br />
posed to an<br />
organisation by<br />
hacking, malware and<br />
cyber espionage.<br />
Focusing in particular<br />
on the present state of<br />
play in the education<br />
sector, Dave Mundy<br />
discusses what<br />
physical security is<br />
and how it has<br />
progressed before<br />
evaluating ways in<br />
which installers are<br />
providing added value<br />
for their end users<br />
28<br />
www.risk-uk.com<br />
Currently, there are 8.7 million children in<br />
England attending over 24,000 primary<br />
and secondary schools resident within the<br />
state and independent sectors. That their<br />
security is paramount goes without saying, and<br />
it’s the security industry’s responsibility to face<br />
the challenges of securing schools to the very<br />
highest standards within budgets that those<br />
educational establishments can afford.<br />
The principal purpose of security is the<br />
prevention of unauthorised access. As security<br />
installers, the tools we have at our disposal are<br />
a vast range of access control and perimeter<br />
protection products, from basic card entry<br />
systems through to the most sophisticated<br />
intrusion detection technologies – all of them<br />
designed to manage and control access.<br />
Digital technology also plays its part, of<br />
course, whether in the form of basic CCTV or<br />
rather more futuristic facial recognition<br />
systems, but again with the principal aim of<br />
allowing the good people in and keeping the<br />
bad ones out (while also being able to track<br />
them across a given site).<br />
It’s easy to take for granted how advanced<br />
these systems have become, forgetting a time<br />
in days gone by when so much of physical<br />
security was heavily reliant on manpower. In<br />
fact, the school environment provides a good<br />
example of just how far access control and<br />
CCTV systems have progressed and how new<br />
solutions continue to evolve.<br />
Changing environments<br />
It used to be that anyone could walk into a<br />
school’s grounds and head for reception.<br />
Nowadays, perimeters are more tightly<br />
controlled and, in general, no-one enters a<br />
school’s grounds without authorisation. This is<br />
achieved through turnstiles, electronic gates<br />
and barriers granting access with codes, ID<br />
cards or – in the case of vehicles – via CCTV<br />
incorporating Automatic Number Plate<br />
Recognition functionality.<br />
Physical security of this kind is about<br />
convenience as well as security. For example,<br />
it’s important for schools that gates close<br />
automatically such that parents who arrive with<br />
buggies and other children are given a helping<br />
hand in keeping the school secure.<br />
In school reception areas, visitor and entry<br />
management systems provide fast, userfriendly<br />
and intelligent mechanisms for<br />
authorising access and ensuring the school’s<br />
management team knows exactly who’s on the<br />
premises at any given time.<br />
Systems can pre-register guests, providing<br />
faster access and significantly enhanced<br />
security. For supply agency teachers, for<br />
example, a photograph supplied by the agency<br />
can be used with a unique code to create a<br />
temporary, time-specific and secure ID pass.<br />
Automated systems of this nature reduce the<br />
paperwork and resources required by school<br />
administration staff and ensure that temporary<br />
staff and guests don’t threaten the integrity of<br />
a school’s security.<br />
Systems also allow individuals to sign<br />
themselves in on intuitive touch screens, again<br />
making their ‘journey’ much easier, but without<br />
compromising security. Systems can be<br />
branded to add further value and afford an<br />
impression of a school that takes a professional<br />
approach to safeguarding its pupils and staff.<br />
Data recording and reporting are important<br />
elements of a modern visitor management<br />
system and particularly useful in the event of<br />
an emergency such as a fire outbreak, when<br />
quick access to detail regarding who is or isn’t<br />
present on the premises is imperative.<br />
Systems also need to be flexible. It’s now<br />
common for schools to lease sports and drama<br />
facilities after school hours and, indeed, at<br />
weekends. That being so, any system installed<br />
has to accommodate multiple needs.<br />
Balancing budgets<br />
Whatever we do and whichever systems we<br />
recommend, we have to strike the balance<br />
between safeguarding people and protecting<br />
the public sector purse. A good example of this
Physical Security: Delivering Added Value for End Users<br />
can be seen at Oak Hill Theological College<br />
(pictured, below left), a facility that presented<br />
us with an unusual access control challenge<br />
because not only do plenty of its students live<br />
on site, but many of their families do, too.<br />
Oak Hill College is set in 60 acres of land in<br />
Hertfordshire. It houses a modern academic<br />
centre with lecture theatres, seminar rooms,<br />
library space and study facilities, as well as<br />
considerable residential facilities for both yearround<br />
and term-time residents.<br />
To securely accommodate access for young<br />
families and teenagers, as well as employees<br />
and deliveries, Delta Security installed a Salto<br />
access control system, including ID passes and<br />
ad hoc printable passes as well as automatic<br />
electronic gates at the college entrance.<br />
The customer was keen that the new system<br />
had the ability to provide quick information on<br />
access usage and give stakeholders greater<br />
control over what access was afforded to<br />
different parties. The system was therefore<br />
designed such that Oak Hill College can tailor<br />
access according to the user’s needs and to<br />
accommodate different entry ‘media’ including<br />
ID cards, codes and help buttons that transfer<br />
to either reception or relevant mobile numbers.<br />
In addition, Oak Hill College’s management<br />
wanted the system to be able to integrate<br />
seamlessly with other technologies, notably the<br />
fire alarm system, so that the entry gates would<br />
open automatically in the event of an alarm<br />
activation and afford access to the local Fire<br />
and Rescue Service. As the Salto system is fully<br />
IP-based it’s also future-proof, enabling the<br />
school to make good use of additional<br />
capabilities as and when budgets allow.<br />
CCTV in schools<br />
In the 1980s, cameras were fixed, offered black<br />
and white images and had no night vision.<br />
Footage was captured on video cassette tapes<br />
at a rate of only one or two frames per second,<br />
creating a series of still images that made for a<br />
largely unhelpful playback experience. Add to<br />
that equation the fact that viewing monitors<br />
were enormous, heavy, suffered from ‘screen<br />
burn’ and consumed so much power as to be<br />
permanently ‘hot’ and it wasn’t a good mix.<br />
Functionality today is a world apart. Speed<br />
dome cameras with optical zoom and motion<br />
detectors allow for the intelligent capture and<br />
recording of events, while digital zoom<br />
functionality means that areas of interest can<br />
be closely monitored during playback. Critically,<br />
infrared technology now delivers reliable<br />
images at night or in poor lighting conditions.<br />
Again, CCTV cameras can be integrated with<br />
access control technology – as well as fire<br />
alarms – to give further ‘visible’ evidence (and<br />
confirmation) as an incident unfolds. In truth,<br />
the advent of event-tagging functionality has<br />
been extremely significant as it means footage<br />
periods where the environment has changed<br />
are highlighted and instantly accessible rather<br />
than the system end user having to trawl<br />
through hours (or even days) of footage to<br />
locate the particular event they wish to review.<br />
Other useful developments are in the way<br />
users are able to view images. Most influential<br />
has been remote viewing, made possible<br />
through mobile Apps and the Internet. This<br />
gives school management or security staff realtime<br />
visibility of events direct to their mobile or<br />
tablet device wherever they are in the school or<br />
if they’re off-site for that matter. Management<br />
then has the ability to take immediate and<br />
appropriate decisions for mitigating risk.<br />
Installers adding value<br />
It’s the installer’s job to ensure all security<br />
equipment is appropriate to its environment.<br />
For educational establishments, High Definition<br />
CCTV with infrared functionality is preferred,<br />
with video content stored for a minimum of 28<br />
days. Most importantly, playback needs to be<br />
intuitive and user-friendly.<br />
For larger sites like Oak Hill, perimeter<br />
protection is a must. Here, the installer’s skill is<br />
in advising end users where cameras and<br />
detectors are best placed in order to create<br />
both an actual and a ‘virtual’ perimeter to<br />
ensure that perimeter isn’t compromised.<br />
Data protection and privacy laws, of course,<br />
can impact where cameras are situated and<br />
how footage is stored, which is of particular<br />
importance in schools. Installers need to be<br />
registered with the Information Commissioner’s<br />
Office. Accreditation ensures customers that<br />
security installations are compliant and gives<br />
the installer the authority to advise the client<br />
on how to store CCTV footage correctly.<br />
With regard to access control, installers can<br />
add value by advising on lockdown procedures.<br />
They’re able to advise on specific alarm<br />
systems, sealing off boundaries and using CCTV<br />
with intelligent tracking software to monitor<br />
any security breaches.<br />
The biggest challenge isn’t around whether<br />
the technology is available to provide the type<br />
of security schools need, but rather whether<br />
ambition can be matched with budgets.<br />
Dave Mundy: Operations<br />
Director at Delta Security<br />
“Data recording and reporting are important elements of a<br />
modern visitor management system and particularly useful<br />
in the event of an emergency such as a fire outbreak”<br />
29<br />
www.risk-uk.com
Net2 Entry Touch<br />
Smart, Simple Door Entry with a Premium Touch<br />
Durable 7" colour<br />
touch screen<br />
Personalise with<br />
multiple theme options<br />
Fully compatible with<br />
Net2 access control<br />
For more information:<br />
paxton.info/2853<br />
2017<br />
PSI PREMIER AWARDS<br />
WINNER
FIRE SAFETY<br />
Management & Installation<br />
Fire Protection and Prevention<br />
with Technology and Innovation<br />
Special Supplement in association with:
FIRE SAFETY<br />
New Qualifications for Fire Detection<br />
and Alarm Systems<br />
The Fire Industry<br />
Association (FIA) is<br />
about release four allnew<br />
qualifications in<br />
fire detection and<br />
alarm systems. In<br />
short, there’ll be on<br />
qualification each for<br />
designers, installers,<br />
maintainers and<br />
commissioners. Here,<br />
Martin Duggan<br />
examines the<br />
reasoning behind this<br />
move and what it<br />
means for the FIA,<br />
learners and the<br />
industry as a whole<br />
fter a soft launch at FIREX International<br />
A2017, the Fire Industry Association (FIA)<br />
will be releasing four new qualifications in<br />
fire detection and alarm systems. In short, one<br />
each for designers, installers, maintainers and<br />
commissioners. The overiding intention here is<br />
to replace the general training that the FIA has<br />
been conducting for many years now.<br />
In fact, we’ve been running fire detection and<br />
alarm systems training in a similar format since<br />
2000 and trained over 30,000 delegates across<br />
our 17 different courses (so not just in fire<br />
detection and alarms). Our current run-rates are<br />
300 courses across the year and the country, in<br />
turn training around 4,000 delegates each year.<br />
FIA training has pretty much become the de<br />
facto standard for proving (or partially proving)<br />
competence. I discovered a job advert on a<br />
recruiter’s website only last week, and the<br />
common language was the FIA’s Units 1 and 5,<br />
etc (ie the names of our current courses). So it’s<br />
becoming a common language within fire<br />
detection and alarms (and within recruitment),<br />
and is often a requirement set by employers.<br />
Why is the FIA involved in training and<br />
education? We have a Memorandum of<br />
Association – it’s our constitution, and the very<br />
second objective is education and training. Put<br />
simply, it’s in our DNA.<br />
The FIA is a not-for-profit organisation so any<br />
moneys that we make are put back into training<br />
and development or are ploughed back into<br />
research. We launched a project five years ago<br />
with the aim that 5% of our turnover goes back<br />
into research projects. Those research projects<br />
are for the good of the fire industry. Everything<br />
that the FIA does is fed back into the industry.<br />
What have we done to underpin the new<br />
qualifications? We’ve become an Awarding<br />
Organisation. What does that mean in the real<br />
world? Essentially, it means that we’ve been<br />
placed on the Register for Awarding<br />
Organisations and can write qualifications for<br />
subsequent approval by Ofqual and other<br />
official Government bodies for examinations.<br />
To become an Awarding Organisation has<br />
taken us a long time and much hard work.<br />
There’s an awful lot of policies and protocols<br />
that we had to put in place that must be<br />
inspected against. Suffice it to say that we had<br />
to jump through a good many hoops in order to<br />
become an Awarding Organisation.<br />
32<br />
www.risk-uk.com
To build the qualifications themselves, we<br />
held a ‘Voice of the Customer’ Day and talked to<br />
our members and training customers to find out<br />
what they wanted from a qualification. They<br />
know what our training delivers, but if we were<br />
going to provide a qualification we wanted to<br />
find out exactly what they would like within that<br />
qualification. We tested what we learned from<br />
the ‘Voice of the Customer’ Day through<br />
surveys. We surveyed everybody, with the<br />
results helping us to build our qualifications.<br />
Individuals begin with the Foundation<br />
course, then move on to an Environmental Unit<br />
and a Health and Safety Unit before they can<br />
specialise in one of the four areas (ie designer,<br />
maintainer, installer or commissioner). If the<br />
learner wishes to take on an additional one of<br />
the four courses, they don’t need to repeat the<br />
Foundation, Environmental and Health and<br />
Safety Units first. They simply need to take the<br />
specialist Unit in which they’re interested.<br />
One of the biggest changes we’ve had to<br />
make in preparation for the new qualifications<br />
arriving is that we’ve had to separate out our IT<br />
systems. Training is completely divorced from<br />
the Awarding Organisation. We’ve had to<br />
develop an Awarding Organisation website with<br />
a separate CRM system. We’ve had to work with<br />
and invest in a ‘software exam’ company and<br />
we’ve had to link all of that together with our<br />
existing CRM system and website. We’re<br />
currently undergoing, then, a huge IT project.<br />
The idea is that if you’re used to FIA training<br />
(or if you’ve been booking FIA training), we’ve<br />
been trying to continue along those lines. It will<br />
feel very much the same when you come to<br />
book on to the new qualifications. You’ll access<br />
the FIA website and be able to book the courses<br />
there. The only slight difference is that learners<br />
first have to complete the Foundation Unit. Once<br />
they log on to the foundation unit they then<br />
register as a learner and receive a unique<br />
learner’s reference number. That number is used<br />
to book on to the other courses.<br />
Learners must have also completed the<br />
Foundation Unit and successfully passed it in<br />
order to be allowed to book on to the<br />
specialised courses at the end. There are some<br />
IT tricks in there to stop people from booking<br />
unless they possess a unique learner number.<br />
We’ve had to invest in 250 tablets so that we<br />
can move our examination process to a digital<br />
platform and examine learners at the end of<br />
each training module.<br />
We’ve had to separate the personnel, too.<br />
We’ve moved Ian Gurling (formerly our training<br />
manager and the individual who has guided us<br />
through the application process to become<br />
Ofqual-registered). Ian has become our new<br />
Awarding Organisation manager (which is a<br />
completely new role for the FIA).<br />
We’ve also moved Michael Gregg into the<br />
training manager’s role.<br />
In essence, then, we have two individuals<br />
working on the different parts, and we have to<br />
keep those parts completely separate. The<br />
Awarding Organisation looks at the exam<br />
processes, while the training side of things<br />
concentrates on the actual learning provided so<br />
you can actually pass those examinations.<br />
The Awarding Organisation is currently<br />
working on the seven modules that we have. At<br />
the time of writing, the focus is on completing<br />
all of the question banks and putting the exams<br />
together. Meanwhile, the FIA’s training team has<br />
completed some analyses looking at our<br />
existing Units 1-6 and mapped across the old<br />
training to what the new qualifications will<br />
provide – what we had compared to what’s new.<br />
It’s so much more in depth than it was.<br />
Learners are going to have much more<br />
knowledge and a far greater understanding of<br />
the subject. Not only have we expanded on<br />
every area from Unit 1 for Foundation – we’ve<br />
enhanced everything that was in Unit 1 and<br />
added a set of new subjects as well.<br />
The Health and Safety Unit is completely new<br />
to us, too, and so is the Environmental Unit.<br />
These new areas are all based on what our<br />
‘Voice of the Customer’ Day and our survey said<br />
the industry wants from a qualification.<br />
Essentially, all of our old training has been<br />
significantly enhanced with the addition of new<br />
areas and new topics for study. There’s no doubt<br />
that we’ve compiled a much more rigorous<br />
programme of learning.<br />
For example, our current training for a<br />
designer has dramatically increased for the new<br />
qualifications. There’s lots more standards<br />
involved that we feel the designer needs to<br />
know about so we’ve made the course for the<br />
designer qualification much longer and far more<br />
in-depth than was the case previously.<br />
www.fia.uk.com<br />
“Individuals begin<br />
with the Foundation<br />
course, then move on<br />
to an Environmental<br />
Unit and a Health and<br />
Safety Unit before<br />
they can specialise in<br />
one of the four areas<br />
(ie designer,<br />
maintainer, installer<br />
or commissioner)”<br />
www.risk-uk.com<br />
33
FIRE SAFETY<br />
False Fire Alarm Management<br />
The latest innovations<br />
in fire system<br />
technology offer a<br />
number of solutions<br />
for minimising false<br />
alarms, writes Aston<br />
Bowles (marketing<br />
manager at<br />
Advanced). The key is<br />
to verify whether<br />
there’s a real fire<br />
before the next stage<br />
of the building<br />
evacuation strategy<br />
commences<br />
alse alarm reduction should be considered<br />
Fas part of the risk assessment before any<br />
specification is written. Each building will<br />
have different users and specific circumstances<br />
that may require unique verification,<br />
investigation and evacuation processes. All of<br />
this can occur under one roof and over multiple<br />
floors, so flexibility is very definitely the key.<br />
Intelligent detectors<br />
The industry has taken two main approaches:<br />
one focused on detector head technology that<br />
looks at reducing incorrect signals in the heads<br />
themselves, the other an approach that centres<br />
on signal processing and decision-making in the<br />
fire control panel. Some forward-thinking<br />
manufacturers are combining the two into<br />
approaches to combat the causes of false<br />
alarms from multiple directions.<br />
The development of intelligent detectors, the<br />
most sophisticated of which use smart<br />
algorithms to differentiate between real fires<br />
and false signals perhaps caused by steam or<br />
cooking smoke, has accelerated in recent years.<br />
Detectors can also be used together or in<br />
other modes specifically designed to reduce<br />
false alarms. For example, multi-sensor<br />
detectors may be switched between heat and<br />
smoke in order to confirm a signal. Several<br />
detectors may also be combined, for example<br />
using double-knock or coincidence to confirm a<br />
genuine signal.<br />
Automatic, addressable fire systems will<br />
analyse detector signals and then, if the signals<br />
match expected criteria, activate a range of<br />
verification and confirmation procedures. A<br />
good fire system can do a huge amount<br />
automatically and much can be achieved with<br />
minimal human intervention.<br />
However, one of the key ways to reduce false<br />
alarms is to involve people and, in order to make<br />
this effective, some manufacturers have<br />
introduced dedicated false alarm input devices.<br />
Verification time extensions<br />
The AlarmCalm Button, part of Advanced’s<br />
AlarmCalm solution, allows the verification time<br />
on a system to be extended by the occupant of a<br />
room if they believe the signal to be ‘false’ in<br />
their area. If the signal clears then the system<br />
will return to normal. If it persists beyond the<br />
pre-set verification time then the system will go<br />
into full alarm and implement the next phase of<br />
‘cause and effect’ such as evacuation.<br />
Involving people, even trained individuals,<br />
means fail-safes must be strong. The AlarmCalm<br />
button can only be pressed once before a<br />
system reset and times are programmable. If an<br />
alarm signal has been verified by the panel or if<br />
a manual Call Point is activated, the system will<br />
enter a full fire alarm condition immediately.<br />
Equally, if a pre-set number of areas are in<br />
verification (ie detecting potential fire signals)<br />
the system will go into full alarm. The benefits<br />
of involving the occupants of, say, a student<br />
accommodation building are, however, pretty<br />
hard to ignore.<br />
Another key aspect to consider when<br />
specifying a false alarm management system is<br />
ease of system management. Can the system be<br />
divided precisely into different areas? Can<br />
points be managed singly or grouped, as in an<br />
apartment, and is it easy to programme and<br />
install? Wiring and configuration on larger sites<br />
can add much complexity and cost.<br />
Intuitive in operation<br />
Equally, priority should be given to selecting a<br />
system that’s acceptably intuitive for staff and<br />
designated users alike to operate. The ability to<br />
share information in dynamic fire conditions has<br />
also developed rapidly. For example, some<br />
touchscreen displays are a key tool that can<br />
make it far easier to identify the location and<br />
status of an alarm.<br />
Careful consideration should also be given to<br />
how the system will be monitored, serviced and<br />
maintained. There are a growing number of<br />
solutions that allow fire systems to be remotely<br />
monitored and controlled over the Internet,<br />
which means an engineer can arrive with a plan<br />
agreed and all spare parts required, in turn<br />
minimising disruption to the building’s users.<br />
In summary, then, false fire alarms most<br />
certainly remain a problem, but the industry has<br />
the tools at its disposal to radically reduce them<br />
and, indeed, their impact. This will certainly<br />
involve trained professionals at the design and<br />
specification stage and, possibly, the trained<br />
occupants of a given building.<br />
34<br />
www.risk-uk.com
The most sophisticated configurable<br />
water leak detection system available<br />
Protect your assets from the greatest risk to<br />
buildings and managed systems: Water.<br />
The only way to mitigate the risk of water damage is to continuously monitor for water<br />
leaks. The risk assessment of water damage and the installation of Water Leak Detection<br />
Systems are increasingly being recommended by commercial insurers and is often a<br />
requirement for full cover.<br />
Hydrosense systems deliver a new standard in water leak detection. Unlike other<br />
systems, Hydrosense is fully customisable and configurable allowing connection to<br />
Building Management Systems (BMS) and a wealth of other vital supporting systems.<br />
Hydrosense continuously monitors for water leaks protecting a company’s building and<br />
assets year in year out.<br />
Contact Us Today!<br />
vimpex.co.uk<br />
sales@vimpex.co.uk<br />
01702 216 99
FIRE SAFETY<br />
Fire Alarms and Detection: Best Practice<br />
Mike Floyd of the Fire Protection Association examines the<br />
management, use and maintenance of fire alarm and<br />
detection systems<br />
Further guidance<br />
Further guidance on the<br />
completion of these tasks<br />
is available from the FPA’s<br />
Training or Publications<br />
Departments. The FPA also<br />
hosts a monthly webinar<br />
series which recently<br />
covered alarm systems,<br />
roles and responsibilities.<br />
All webinars are recorded<br />
and available in the<br />
member’s area of the FPA’s<br />
website: www.thefpa.co.uk<br />
*For more information on<br />
alarm systems and<br />
maintenance needs send<br />
an e-mail to:<br />
technical@thefpa.co.uk<br />
ire alarm and detection systems are<br />
Fundoubtedly an integral part of the fire<br />
protection strategy for a property. However,<br />
the management and maintenance of these<br />
systems are all-too-often overlooked, poorly<br />
maintained and/or poorly managed. The<br />
severity of this situation is often<br />
underestimated. This can leave people and<br />
assets badly exposed, invalidate insurance<br />
policies and. in many cases, fall foul of the law.<br />
System management<br />
In any premises subject to the requirements of<br />
the Regulatory Reform (Fire Safety) Order 2005<br />
or equivalent legislation, a responsible person<br />
or duty holder must carry out a fire risk<br />
assessment that considers the safety in case of<br />
fire of all ‘relevant persons’. A relevant person is<br />
any individual who is or may be lawfully on the<br />
premises or any person in the immediate vicinity<br />
who’s at risk from a fire on the premises.<br />
Particular attention needs to be paid to those<br />
at special risk, such as disabled people and<br />
those with special support needs, and must<br />
include consideration of any dangerous<br />
substance likely to be on the premises.<br />
The person with day-to-day responsibility for<br />
the system, not necessarily a competent person,<br />
is now termed ‘premises management’ to<br />
remove the confusion with the former title of<br />
‘responsible person’ which had been used in the<br />
previous edition of the British Standard and is<br />
used in overarching legislation in England and<br />
Wales as described above.<br />
This person may be the first point of contact<br />
on fire alarm problems for any member of staff<br />
or service contractors. They may also keep the<br />
log book up to date, including false alarm<br />
entries. The evacuation arrangements and<br />
warnings will have been determined from the<br />
building’s fire risk assessment.<br />
Evacuation arrangements and<br />
warnings<br />
In some cases, a general evacuation warning<br />
may be inappropriate and a delayed or staged<br />
evacuation, perhaps by floor or defined area,<br />
may be adopted. In those places such as<br />
hospitals or department stores where a general<br />
audible alarm isn’t deemed to be immediately<br />
desirable, the alarm may be transmitted to a<br />
permanently staffed control point or discretely<br />
to pagers held by key staff whereby trained<br />
people can assess the warning required and<br />
then pass on the necessary instructions to staff<br />
or the Controol Room as appropriate.<br />
In taller commercial buildings designed with<br />
reduced stair capacity, the evacuation signal<br />
may be ‘phased’. This requires the fire alarm<br />
system to emit a clear message to individual<br />
floors in sequence so as to avoid overloading<br />
the staircases.<br />
A voice message system is the preferred<br />
arrangement in such cases as an ordinary<br />
sounder tone may ‘bleed’ into additional areas,<br />
causing confusion as to when to evacuate.<br />
Maintenance regimes<br />
BS 5839-1 outlines the current guidelines for<br />
servicing and maintenance regimes related to<br />
automatic fire detection and alarm systems.<br />
Many organisations, though, continue to service<br />
systems to the previous guidelines. Practising<br />
professionals should be aware that this doesn’t<br />
ensure compliance with the current standards.<br />
A maintenance regime may include the<br />
following elements:<br />
• Weekly test<br />
• Monthly user requirements (where generators<br />
are used as a form of standby power)<br />
• Quarterly inspection of vented batteries<br />
• Periodic inspection and testing of the system<br />
(not exceeding six months between tests)<br />
• Annual service which may be undertaken<br />
across two six-monthly services or any other<br />
pattern that assures not more than 12 months<br />
pass since any device has received attention<br />
36<br />
www.risk-uk.com
ATTRACTING<br />
YOUNG TALENT<br />
INTO THE LIFE SAFETY INDUSTRY<br />
95% the<br />
Of life safety installers think the industry<br />
isn’t doing enough to provide training for<br />
next generation of professionals<br />
JUST<br />
17%<br />
Work for a company<br />
that offers a graduate<br />
programme<br />
9IN10<br />
Said that the sector had<br />
a responsiblity to educate<br />
secondary school pupils<br />
on the range of life safety<br />
roles available<br />
78%<br />
Of respondents felt that<br />
young people don’t know<br />
what jobs are available<br />
in the life safety sector<br />
2IN 5<br />
Respondents work for<br />
a company that offers an<br />
apprenticeship programme<br />
TWO THIRDS<br />
Are worried that young people don’t view the industry as a viable career path<br />
Based on a study of European fire safety and emergency lighting installers by Hochiki Europe
FIRE SAFETY<br />
Audible and Visual Protection<br />
Pulse Alert Technology from Klaxon Signals is an award-winning beacon<br />
warning system which produces a light output that can protect most<br />
rooms with just a single device<br />
“All buildings deserve<br />
the latest fire<br />
evacuation<br />
technology, all fire<br />
alarm systems should<br />
be able to be<br />
upgraded and<br />
everyone deserves to<br />
feel safe and secure”<br />
odels in the Sonos Pulse range of EN54-<br />
M23 compliant beacons and sounder<br />
beacons are designed to ensure that all<br />
personnel, including those individuals with<br />
sensory impairments or working in sensory<br />
depriving conditions, are notified of fire<br />
emergencies. Featuring Pulse Alert Technology,<br />
Klaxon’s EN54-23 compliant beacons enable<br />
buildings to be evacuated much quicker, make<br />
evacuation requirements clear and<br />
unambiguous and allow personnel to feel safe.<br />
Relying on audible fire alarm notification<br />
alone disadvantages those people with hearing<br />
impairments or those working, or living in<br />
sound-reducing conditions. Even something as<br />
simple as wearing a pair of headphones could<br />
prevent someone from hearing an audible fire<br />
evacuation warning. To evacuate everyone from<br />
a building, fire systems need to signal<br />
effectively using light as well as sound.<br />
EN54-23 specifies the minimum performance<br />
requirements for Visual Alarm Devices. Klaxon’s<br />
Sonos Pulse beacons produce a light output<br />
that can protect most rooms with the<br />
installation of just a single device.<br />
Optical systems disperse light evenly,<br />
ensuring the most efficient distribution of light<br />
to maximise effectiveness.<br />
Klaxon’s Pulse Alert Technology affords all of<br />
the benefits an EN54-23 compliant system can<br />
bring, while at the same time answering all of<br />
the design challenges.<br />
Featuring the latest high-power LED<br />
technology, Pulse Alert Technology contains<br />
advance LED drive circuitry, further improving<br />
efficiency, light output performance and longterm<br />
device reliability. Sonos Pulse LED circuits<br />
are designed to exceed five years of continual<br />
operation without degradation of light output.<br />
As a company, Klaxon firmly believes that all<br />
buildings deserve the latest fire evacuation<br />
technology, that all fire alarm systems should be<br />
able to be upgraded and that everyone deserves<br />
to feel safe and secure.<br />
Installation<br />
EN54-23 specifies three different classification categories for Visual Alarm Devices: Wall, Ceiling and Open. Wall and Ceiling mount<br />
categories are specified at designated mounting heights and particular coverage pattern areas, as detailed by EN54-23. Open<br />
classification allows the manufacturer to specify the coverage volume and coverage shape and doesn’t restrict mounting height.<br />
Pulse Alert Technology has been designed to exceed the requirements of both Wall and Ceiling classifications, providing system<br />
designers with simple device performance specifications.<br />
Wall Classification<br />
Wall-mounted devices provide a rectangular prism of light. Wall<br />
classification devices with Pulse Alert Technology can be<br />
mounted up to 3.1 m in height and cover an 11.3 m x 11.3 m area<br />
Ceiling Classification<br />
Ceiling-mounted devices provide a cylinder of light. Ceiling<br />
classification devices with Pulse Alert Technology can be<br />
mounted up to 3 m in height and cover a 15 m-diameter area<br />
38<br />
www.risk-uk.com
The Standard in Fire Systems<br />
Advanced fire systems are famously easy<br />
to install, maintain and operate, with<br />
quality and performance levels that lead<br />
the industry in over 60 countries.<br />
MxPro 5 is our unbeatable multiprotocol<br />
panel. It includes AlarmCalm false alarm<br />
management and supports TouchControl<br />
repeaters with Active Maps.<br />
Contact us now for more information or a demo<br />
Tel: +44 (0)1670 707 111 Fax: +44 (0)1670 707 222<br />
Email: sales@advancedco.com Web: www.advancedco.com
FIRE SAFETY<br />
Following the Grenfell<br />
Tower fire in June,<br />
BAFE’s CEO Stephen<br />
Adams focuses on<br />
the subject of fire risk<br />
assessments and the<br />
need for genuine<br />
measures of<br />
competence to be<br />
included for individual<br />
assessors as part of<br />
legislative<br />
requirements<br />
40<br />
www.bafe.org.uk<br />
Assessing Fire Risk<br />
n a recent statement issued by BAFE, we said:<br />
I“While there can never be absolute certainty<br />
that even the most experienced fire risk<br />
assessor will be able to inspect and analyse<br />
every part of a building’s construction – for<br />
example, there are parts of a structure that will<br />
be inaccessible when a building’s completed<br />
and, without extensive re-examination, material<br />
test reports have to be taken at face value – a<br />
competent assessor will recognise and highlight<br />
any potential concerns.”<br />
Unfortunately, Grenfell Tower highlighted a<br />
situation wherein the external materials used<br />
were apparently not suitable for the building<br />
and would require extensive re-examination by<br />
a testing authority to confirm this point.<br />
This tragedy has also shone the spotlight on<br />
fire risk assessors and the law behind this<br />
process. With a suitable assessment, actions<br />
may have been raised to ensure that common<br />
areas of the building were as safe as possible in<br />
order for residents to evacuate.<br />
Grenfell Tower was an horrific tragedy with a<br />
large loss of life, but we would also highlight<br />
another major fire at the Rosepark Care Home in<br />
Scotland during January 2004 that took the lives<br />
of 14 elderly residents. Sheriff Principal Brian<br />
Lockhart, who led the fatal accident inquiry,<br />
stated that “some or all” of the deaths could<br />
have been prevented and also said: “The<br />
management of fire safety at Rosepark was<br />
systematically and seriously defective. The<br />
deficiencies in the management of fire safety<br />
contributed to the deaths.”<br />
As a result of the Rosepark Care Home fire,<br />
the Regulation and Quality Improvement<br />
Authority in Northern Ireland issued information<br />
to the managers and proprietors of all regulated<br />
residential care establishments. This stated that<br />
all new fire risk assessments should be<br />
performed by a competent provider holding the<br />
appropriate registration or certification (which<br />
includes the BAFE SP205 Life Safety Fire Risk<br />
Assessment Scheme).<br />
While this isn’t a fully-mandatory<br />
requirement, it’s certainly a step in the right<br />
direction for fire safety.<br />
Despite the various national legislation<br />
requirements which came into force over ten<br />
years ago (changing the responsibility from the<br />
Fire and Rescue Services to the ‘Responsible<br />
Person’ or duty holder), there are still no<br />
statutory requirements in place to measure the<br />
competence of a fire risk assessor, even in care<br />
homes or other high risk premises.<br />
Reforming the system<br />
David Sibert, an experienced firefighter and<br />
qualified fire engineer who advises the Fire<br />
Brigades Union, informed the BBC that the<br />
Government had failed to respond to demands<br />
from the fire industry to reform the system<br />
following the Lakanal House blaze in July 2009<br />
that claimed six lives.<br />
In fact, Sibert said: “There are no controls on<br />
who can be a fire risk assessor or over the<br />
competence or skills that they should have.”<br />
Stuart Edgar, chief fire officer for<br />
Gloucestershire Fire and Rescue Service and<br />
chairman of the Protection Committee of the<br />
National Fire Chiefs’ Council, told ITV Tonight<br />
that they would encourage third party<br />
certification of fire risk assessors.<br />
After the Lakanal House fire, a Competency<br />
Council comprising experts from across the fire<br />
industry was established and produced a ‘Guide<br />
for Choosing a Competent Fire Risk Assessor’<br />
which is now available through the Fire Sector<br />
Federation, CFOA and the BAFE website. This<br />
highlights the need for assessors to be qualified<br />
through a professional body and that companies<br />
providing such a service should be third party<br />
certificated by a UKAS-accredited certification<br />
body (even if they’re a sole provider). The<br />
largest of these company certification schemes<br />
is the BAFE SP205 register.<br />
BAFE considers it imperative that genuine<br />
measures of competence for fire risk<br />
assessments are included as part of legislative<br />
requirements. While we’re pleased with the<br />
recent announcement from Government relating<br />
to a review of the Building Regulations,<br />
mandatory fire safety requirements need to be<br />
introduced to help in identifying where there are<br />
potential life safety risks before there’s another<br />
tragedy. All businesses must adhere to fire<br />
safety legislation and it’s imperative that they’re<br />
using competent providers to help them fulfil<br />
their duties, primarily to protect life, but also<br />
the buildings themselves and their contents.<br />
www.risk-uk.com
Evacuate everyone<br />
EN54-23 Approved Fire Beacons<br />
<br />
<br />
<br />
<br />
<br />
Seminars<br />
<br />
<br />
EN54-3 Sonders & Beacons<br />
Nexus 105/110/120 Sounders<br />
<br />
Sonos Sounder Beacon<br />
<br />
Tel: +44 (0)1706 233879
FIRE SAFETY<br />
Emergency Lighting Standards<br />
Ian Watts, emergency<br />
lighting manager at<br />
Hochiki Europe,<br />
explains the most<br />
recent updates to BS<br />
5266 and what they<br />
mean for life safety<br />
system installers in<br />
the UK<br />
To find out more about<br />
Hochiki Europe visit<br />
www.hochikieurope.com<br />
42<br />
he British Standards Institution’s BS 5266<br />
TPart 1 2016 Emergency Lighting Code of<br />
Practice is a key standard in the life safety<br />
industry, helping to define Best Practice in the<br />
design, installation and maintenance of<br />
emergency lighting in order to protect the wellbeing<br />
of building occupants at all times.<br />
Recent updates to the standard bring a raft of<br />
changes that installers and duty holders need to<br />
be aware of to make certain that new and<br />
existing buildings continue to be compliant and<br />
keep occupants safe.<br />
Under the latest fire safety legislation in the<br />
UK and Europe, BS 5266 is no longer a<br />
prescriptive requirement. Buildings’ life safety<br />
systems can be legally compliant without being<br />
certified to this British Standard. However,<br />
compliance with BS 5266 is the easiest way to<br />
demonstrate to the auditing authorities that<br />
adequate safety precautions are in place.<br />
Certification needs to be reviewed every 12<br />
months (and after any renovation work has been<br />
carried out) to ensure a given property<br />
continues to meet the latest requirements.<br />
New lighting categories<br />
BS 5266 now stipulates the inclusion of<br />
emergency safety lighting that allows occupants<br />
to see their surroundings in the event of a mains<br />
supply failure and the loss of normal lighting.<br />
The British Standard also recommends that<br />
procedures are put in place to determine<br />
whether a premises needs to be evacuated<br />
immediately in the event of a safety incident<br />
and, if a ‘defended place’ or ‘stay-put’ solution is<br />
agreed upon, to then direct occupants to safe<br />
refuges. Duty holders can use risk assessments<br />
to identify these situations and put the<br />
necessary measures in place to address them.<br />
While lux level guidance for escape lighting<br />
remains the same as in previous editions of BS<br />
5266, a host of design conditions for lux<br />
calculations have been added to ensure lighting<br />
remains at the minimum level required for the<br />
duration of a potential incident. The effects of a<br />
reduction in voltage, ageing batteries and lamps<br />
and dirt accumulation should be accounted for.<br />
In those areas where dangerous processes<br />
are carried out, it’s now advised to implement<br />
procedures to automatically shut down any<br />
hazardous operations. Lux values of 10% of the<br />
mains lighting level or 15 lux (whichever is the<br />
greater) should always be adhered to.<br />
Of equal importance is the time taken for the<br />
emergency lighting to switch on. In high risk<br />
areas, this period should never be more than 0.5<br />
seconds in order to minimise the risk of harm to<br />
building occupants.<br />
Testing and maintenance<br />
To ensure optimum performance and safeguard<br />
occupants’ well-being, emergency lighting<br />
systems should be tested and cleaned at least<br />
once every month.<br />
Furthermore, each luminaire must be visually<br />
inspected no less than once each year in order<br />
to ensure it’s in good working order and,<br />
importantly, offering the correct lux level.<br />
Under the new guidelines, this testing regime<br />
should be carried out at a period of low risk, or<br />
while the building is empty, in order to minimise<br />
risk to occupants. Alternate luminaires should<br />
be tested in any 24-hour period with a view to<br />
ensuring that the building always has a charged<br />
and fully-operational evacuation system<br />
available to assist occupants.<br />
Systems should also be tested for their full<br />
rated duration to make sure that they do indeed<br />
meet specified performance requirements.<br />
The simplest way in which to achieve these<br />
requirements is by incorporating a certified EN<br />
62034 automatic testing system.<br />
Acting on faults<br />
BS 5266 requires that a qualified engineer<br />
carries out corrective action whenever a failure<br />
has been identified. It also recommends that<br />
alternative safety procedures be put in place<br />
until the repair is complete and the system has<br />
been re-tested satisfactorily to ensure occupant<br />
safety is never compromised.<br />
Standards relating to fire detection and<br />
emergency lighting are updated all the time,<br />
duly reflecting the evolving safety requirements<br />
of the built environment. It’s crucial that<br />
installers and duty holders do all they can to<br />
keep up with these changes in order to ensure<br />
their premises remain legally compliant.<br />
www.risk-uk.com
CUT OUT AND KEEP<br />
<br />
DO IT<br />
<br />
You could face jail<br />
or six-figure fines if<br />
you don’t appoint a<br />
competent person<br />
to perform your fire<br />
risk assessment.<br />
Receive training to complete<br />
your Fire Risk Assessment.<br />
• Helps prove your competency<br />
• Choose courses to suit all<br />
experience levels<br />
• Courses held across the<br />
UK or at your offices<br />
Email: training@thefpa.co.uk or visit<br />
www.thefpa.co.uk/training<br />
CUT HERE<br />
Let us complete your<br />
Fire Risk Assessment.<br />
We have the experience to complete<br />
assessments of all sizes and complexity<br />
• Accredited with BAFE SP205 Certification<br />
Email: technical@thefpa.co.uk or visit<br />
www.thefpa.co.uk/services<br />
Do your Fire Risk Assessment<br />
justice. Call us now on<br />
01608 812 500 or<br />
visit www.thefpa.co.uk
Meet The<br />
Security Company<br />
This is the second<br />
instalment of a new<br />
series of articles for<br />
the readers of Risk UK<br />
in which we focus the<br />
spotlight on NSIapproved<br />
businesses<br />
for the benefit of risk<br />
and security managers<br />
who purchase security<br />
guarding as well as<br />
systems-focused<br />
solutions. Answering<br />
our questions on this<br />
occasion is Stephen<br />
McComb, director of<br />
Cobra Security<br />
Risk UK: Can you briefly describe your<br />
business’ activities and what you consider to<br />
be your USP as an organisation?<br />
Stephen McComb: Cobra Security is a security<br />
services business based in Lisburn, Northern<br />
Ireland that has been delivering tailored<br />
security solutions to its client base throughout<br />
the UK and Ireland since 1998.<br />
We have a dedicated and experienced team<br />
of security professionals on board whose<br />
constituent members provide the following<br />
services: key holding and alarm response, door<br />
supervision, CCTV installation and monitoring,<br />
corporate concierge solutions and a security<br />
guard dogs/dog handling service.<br />
As an organisation, Cobra Security has one<br />
overarching goal: to protect our clients’ people,<br />
customers and assets. We tailor a specific<br />
security solution for the benefit of each of our<br />
clients by listening to their requirements and<br />
advising on how we can best meet their needs<br />
while also adhering to budget.<br />
This formula has led us to be trusted by a<br />
wide range of clients, from individuals to SMEs<br />
and on to some of the top brands and blue chip<br />
companies in the UK, Northern Ireland and the<br />
Republic of Ireland. We provide security<br />
services for Government, councils, the<br />
education, healthcare and construction sectors<br />
and private commercial and industrial concerns.<br />
Having been in operation since 1998, we’ve<br />
developed a deep understanding of the security<br />
issues impacting UK and Irish companies and<br />
organisations on a daily basis. In turn, the<br />
business has nurtured robust and bespoke<br />
systems that allow us to respond both quickly<br />
and effectively to situations that arise, ensuring<br />
peace of mind for our customers at all times.<br />
Risk UK: What do your clients value most<br />
about the services you deliver?<br />
Stephen McComb: Cobra Security is proud of<br />
the security services it provides to each of its<br />
clients and the bespoke solutions we offer<br />
depending on their defined requirements.<br />
Customer satisfaction is of the utmost<br />
importance to us, with our main priority being<br />
to ensure we provide the best service possible.<br />
The company has always embraced the ethos<br />
that its customers must receive reliability,<br />
honesty and transparency at all times.<br />
As stated, we tailor our security solutions to<br />
fit each client’s requirements and budget and,<br />
above all, we do what we say we’ll do in an<br />
efficient and professional manner. Our clients<br />
most certainly appreciate the personal service<br />
Cobra Security offers them.<br />
As company director, I value building longlasting<br />
working relationships with every client.<br />
I’m in constant and regular contact with our<br />
client companies, whether it be by visiting<br />
sites, meeting with their representatives faceto-face<br />
or via the telephone, and am always<br />
there should they need to speak with me. This<br />
level of personal service runs throughout Cobra<br />
Security’s management team and is instilled<br />
within the whole organisation.<br />
About the National Security Inspectorate<br />
The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />
company limited by guarantee and operates as a UKAS-accredited certification<br />
body specialising in the security and fire safety sectors.<br />
For over 40 years, the NSI has served to protect businesses, homeowners<br />
and the general public alike, raising standards by providing robust and high<br />
quality audits of both security and fire safety service providers.<br />
Risk UK: How do you feel accreditations have<br />
assisted your company?<br />
Stephen McComb: Cobra Security has always<br />
harboured an ethos of securing the most<br />
important accreditations within the security<br />
industry. For example, we’re a registered<br />
business on the Security Industry Authority’s<br />
(SIA) Approved Contractor Scheme (ACS) for the<br />
provision of security guarding and key holding,<br />
44<br />
www.risk-uk.com
Meet The Security Company: Cobra Security<br />
In association with the<br />
NSI Guarding Gold-approved and accredited to<br />
ISO 9001:2008, BS 7984:2008, BS 7825:2012,<br />
BS 7499:2013 and BS 7958:2015.<br />
The fact that we’ve been awarded these<br />
accreditations shows clients that the business<br />
is professional, audited and regulated. In short,<br />
they’re in safe hands when they work with us.<br />
Risk UK: Specifically, what value does ACS<br />
registration and NSI Guarding Gold approval<br />
bring to your business and its clients?<br />
Stephen McComb: ACS registration and NSI<br />
Guarding Gold approval demonstrate to clients<br />
the level of service and quality they will receive<br />
from a highly accredited company. They show<br />
that we adhere to the most stringent auditing<br />
processes available in the industry.<br />
In terms of our business, this helps us to<br />
continually raise our standards, embrace new<br />
methods of working, develop efficiencies in<br />
order to advance our company and improve on<br />
what it is that we already do.<br />
Risk UK: In practice, what are the main<br />
differences between ACS registration and NSI<br />
Guarding Gold approval?<br />
Stephen McComb: ACS registration and NSI<br />
Guarding Gold approval are voluntary schemes<br />
in the security business sector. Security<br />
companies don’t have to have these<br />
accreditations to operate in the industry. Cobra<br />
Security chose to be audited at the highest<br />
level as we know that not only does this afford<br />
our customers added peace of mind, but it also<br />
helps us to achieve more as a business.<br />
NSI Guarding Gold is a more rigorous<br />
auditing scheme than that imposed by the ACS.<br />
The ACS audits to ensure that a company<br />
understands what it should be doing, while the<br />
NSI audits to make certain that a business is<br />
actually doing what it should be doing.<br />
Risk UK: How do you think technology has<br />
changed the industry over the last couple of<br />
years and what do you feel will be the<br />
direction of travel in the future?<br />
Stephen McComb: Technology is moving at a<br />
very fast pace and, at Cobra Security, we<br />
absolutely believe in embracing it.<br />
We’ve found that the business community in<br />
particular also embraces advancements in<br />
technology and fully realises the benefits of<br />
using it in terms of their budgetary spend. This<br />
trend is speeding up, and specifically so in<br />
relation to the apparent decline in the demand<br />
for manned security personnel.<br />
Risk UK: When it comes to negotiating<br />
contracts and responding to tender requests,<br />
what aspects are of most value to customers<br />
and how are these changing?<br />
Stephen McComb: Value for money and cost<br />
savings are two of the most important elements<br />
here. Clients are constantly looking for ways in<br />
which to save money. Introducing technology<br />
and value-added services to contracts is the<br />
way forward, while at the same always ensuring<br />
that a given contract is tailored to the client’s<br />
specific and stated needs.<br />
Risk UK: How has Government legislation (eg<br />
the National Minimum Wage, the National<br />
Living Wage and holiday pay) affected your<br />
business? Do you believe such legislation is<br />
a good thing?<br />
Stephen McComb: The legislation you’ve<br />
mentioned is attempting to improve the living<br />
standards of workers in low or minimum wage<br />
jobs. I can completely understand the<br />
sentiment behind what the Government is<br />
attempting to do here, but in the security<br />
industry it’s simply not working.<br />
In practice, clients now offset these increases<br />
with a change in service requirements such as<br />
replacing physical security guarding with a<br />
technology-based solution or otherwise<br />
reducing man hours. This is a massive factor<br />
facing the security industry as the increases are<br />
set to continue until 2020.<br />
As time goes on, I strongly believe this will<br />
show a direct correlation with a reduction of<br />
people employed in the security industry.<br />
Risk UK: What are the most important<br />
attributes you look for in your security<br />
officers and staff members in general?<br />
Stephen McComb: Cobra Security ensures its<br />
employees understand the importance of<br />
customer service and customer care. Without<br />
doubt, the key attributes we look for in<br />
employees are honesty, integrity, a hardworking<br />
attitude, excellent presentation and smartness,<br />
the ability to think quickly, conscientiousness<br />
and the overriding desire to be a team player.<br />
Risk UK: How can the SIA, the NSI and<br />
industry standards best serve the sector in<br />
addition to the needs of your company’s<br />
clients and the wider public interest? Will<br />
the introduction of business licensing be a<br />
positive step?<br />
Stephen McComb: I don’t believe there’s<br />
enough of an understanding of who or what the<br />
NSI and the SIA are, and specifically so in<br />
Northern Ireland. Raising awareness is key.<br />
Mandatory business licensing would be a<br />
good thing because, as stated, the ACS and NSI<br />
Guarding Gold are voluntary schemes.<br />
Name<br />
Stephen McComb<br />
Job title<br />
Company Director<br />
Time in the security sector<br />
I’ve worked in the security<br />
industry since 1985 for<br />
companies including Federal<br />
Security Services, Resource<br />
and Mitie. I joined Cobra<br />
Security in July 2015. I’ve<br />
served at every level in<br />
security, including the roles<br />
of security officer, CCTV<br />
operator, operations coordinator,<br />
operations<br />
manager, regional manager<br />
and general manager<br />
Location of the business<br />
Lisburn, Northern Ireland<br />
Areas of expertise<br />
Cobra provides services in the<br />
commercial, industrial and<br />
events sectors, with those<br />
services including door<br />
supervision, corporate<br />
concierge, CCTV installation<br />
and monitoring, security<br />
guard dog and guard dog<br />
handling provision, key<br />
holding and alarm response<br />
Accreditations<br />
SIA ACS, NSI Guarding Gold<br />
Scheme, ISO 9001:2008, BS<br />
7984:2008, BS 7825:2012, BS<br />
7499:2013 and BS 7958:2015<br />
Stephen McComb:<br />
Director of Cobra Security<br />
45<br />
www.risk-uk.com
Advertisement Feature<br />
Reaping the Benefits of Full Security Integration<br />
The widespread use of<br />
truly integrated<br />
systems is one of the<br />
most important<br />
developments in the<br />
security sector for<br />
decades. With a heavy<br />
reliance on software,<br />
using open systems<br />
has gone from being a<br />
desirable selling point<br />
to a necessity in only<br />
a few years, writes<br />
John Davies<br />
John Davies:<br />
Managing Director of TDSi<br />
As well as the obvious security advantages,<br />
there’s potentially a whole new world of<br />
opportunities for operators thanks to the<br />
arrival of the Internet of Things (IoT), but at the<br />
same time there are additional factors that<br />
need to be considered which may not have<br />
been an issue in the past.<br />
It might seem obvious at first glance, but this<br />
is a valid question: ‘Why does the security<br />
industry and its customers need full<br />
integration?’ Put simply, if all the components<br />
within the security and wider IT network have<br />
the ability to interact, they can offer so much<br />
more than their individual capabilities. This is<br />
certainly something that has transformed the<br />
way in which organisations think about their<br />
security systems and how they work in the<br />
wider context of their business systems.<br />
From passive, yet rather elaborate electronic<br />
doors/locks and basic CCTV over the past few<br />
decades, we now have Artificial Intelligence and<br />
connected surveillance systems with an in-built<br />
analytics capability which not only match, but<br />
in practice usually outperform a human<br />
operator fulfilling the same role.<br />
Reducing costs, broadening choice<br />
Another key factor in the popularity of<br />
integrated networks is cost. Producing<br />
compatible systems makes it both simpler and<br />
cheaper for customers to choose, purchase and<br />
use the most efficient components for their<br />
needs. Equally, for manufacturers and suppliers<br />
it’s more cost-effective to produce standardised<br />
products. The IoT is going a long way towards<br />
driving demand and the security industry has<br />
sensibly taken this on board, catering heavily<br />
for these market forces.<br />
Within the security industry itself there have<br />
also been interesting and helpful<br />
developments. The International<br />
Electrotechnical Commission recently adopted<br />
ONVIF Profile A and C as the de facto new<br />
international standard for access control which<br />
will offer a truly universal benchmark for<br />
security software and hardware integration.<br />
Naturally, full integration also provides<br />
greater choice, offering the ability to ‘mix and<br />
match’ different components to find the most<br />
suitable and bespoke solution. On the face of<br />
it, it may seem that older legacy systems will<br />
struggle to cope with this, but actually the<br />
flexibility of a fully-integrated approach means<br />
that isn’t necessarily the case. Modern<br />
integrated open protocol systems are often<br />
able to ‘bridge the gap’ in a way that<br />
proprietary systems would simply have failed to<br />
do in the past.<br />
It’s also somewhat ironic that developments<br />
in the latest technology may actually make it<br />
possible for some older systems to continue<br />
being used beyond their expected lifespan.<br />
Mining and analysing data<br />
With integrated systems, the benefits go<br />
beyond just the security provision. If an<br />
intelligent system can learn the behaviours and<br />
trends of people and property within its remit,<br />
it can then predict patterns and, from this, help<br />
to increase efficiencies across the whole<br />
organisation and its facilities.<br />
By mining the data from security systems, it’s<br />
possible to form a detailed picture of any<br />
controlled area and the activity going on within<br />
it. This is a powerful tool for any organisation,<br />
affording an instant snapshot of people<br />
movement or the use of resources while also<br />
monitoring for security threats.<br />
A good example of such data analysis in<br />
practice is the widespread integration of<br />
security with IT infrastructure, power, lighting,<br />
heating and ventilation systems. As CCTV and<br />
intruder detection systems can equally check<br />
the real-time occupancy of a designated area,<br />
these sensors can advise when the correct<br />
individuals are attempting to log-in to the<br />
network. Equally so, when environmental<br />
systems are not required, these solutions can<br />
intelligently lower energy consumption (where<br />
possible) and ensure secured access to the<br />
host organisation’s IT network.<br />
This ability to assess a given situation<br />
renders security components the ideal ‘eyes<br />
and ears’ of more intelligent automated<br />
systems. Such technology is now being used to<br />
assess and report on people traffic in busy<br />
office spaces. Security and detection systems<br />
can ascertain who’s entering the space and<br />
where they need to go and then direct them to<br />
the most appropriate route for their destination<br />
(be that a lift, a ‘hot desk’ or a meeting room).<br />
Going forward, security providers and<br />
operators will need to be even more aware of<br />
how their whole organisation works (right down<br />
to a granular level) when it comes to systems<br />
integration. This may seem somewhat<br />
daunting, but with the right planning and<br />
respect for their needs and benefits, the<br />
development and evolution of fully-integrated<br />
systems is set to continue being a key driving<br />
force for the security industry, in turn offering<br />
many more benefits than disadvantages.
The Security Institute’s View<br />
The first consideration needs to be what the<br />
organisation believes violence looks like.<br />
Over the years, panels of international<br />
experts have attempted on several occasions to<br />
create a unified definition of violence, all of<br />
them failing to reach a consensus.<br />
The Health and Safety Executive has<br />
espoused a definition that bears consideration,<br />
not least because this may be the standard by<br />
which an organisation is held to account in<br />
court. However, this definition falls well short of<br />
what an organisation needs to consider. It’s<br />
recommended that businesses work to develop<br />
their own definition which then becomes<br />
enshrined in their policies and processes.<br />
If we consider that the roots of the word<br />
‘violence’ come from the Latin words ‘vis’<br />
(force) and ‘latus’ (to carry), we’re eventually<br />
led to the word ‘violans’. Since the modern<br />
words ‘violence’ and ‘violation’ share the same<br />
root, we should consider that any act that’s a<br />
violation of a person (including acts against<br />
their body, dignity, autonomy and rights to the<br />
consequences of their actions) should be<br />
considered as violence. Without a clear and<br />
formal definition of what violence within an<br />
organisation means, there’s no foundation for<br />
incident reporting or risk measurement activity.<br />
An incident of violence within a workplace<br />
has a wide range of effects. ‘Conventional’<br />
physical violence has the obvious effect of<br />
harms to staff that range from physical harm to<br />
those affected through to emotional harm to<br />
them and others not directly involved, reduced<br />
employee commitment, reduced customer<br />
satisfaction, reduced productivity, increased<br />
conflict, absenteeism, staff attrition and<br />
recruitment costs and therefore increased<br />
training costs in addition to cultural harm.<br />
All of this is in addition to potential civil<br />
claims, criminal prosecutions and reputational<br />
harm that may arise.<br />
Shocking incidents of physical violence are<br />
not commonplace, yet gain far more attention<br />
than the day-to-day, lower-level negative<br />
workplace behaviours ultimately more corrosive<br />
to organisations. An incident of physical<br />
violence may harm one person, while a poor<br />
culture can harm hundreds or even thousands.<br />
When that number is multiplied by factors<br />
such as stress-related illness and absence,<br />
reduced productivity, the loss of human capital,<br />
replacement recruitment and training costs and<br />
settlements at tribunals, an idea of what<br />
violence can cost a business begins to emerge.<br />
Strategic level<br />
The scale of these risks clearly makes violence<br />
an organisational risk to be managed at a<br />
Violence Risk Management<br />
Violence in the workplace has been the subject of discussion<br />
for over 20 years, with concerns arising in sectors as diverse<br />
as healthcare, education, aviation, prisons and retail. As a<br />
result, it has arguably become one of the most researched<br />
areas of crime risk. Despite all of this attention, it seems that<br />
we’re no closer to an overall solution. Richard Diston argues<br />
that it may be time to adopt a fresh perspective on this issue<br />
strategic level rather than it being viewed as an<br />
operational risk. That said, most organisations<br />
still have little clarity on who’s actually<br />
responsible at Board level.<br />
Violence is commonly seen as an issue for<br />
security, Health and Safety or – in the cases of<br />
‘horizontal’ (eg staff on staff) violence – Human<br />
Resources. Given that violence is a specialist<br />
risk area, none of these departments are<br />
usually equipped to respond proactively in the<br />
prevention of such incidents. There’s an<br />
argument to be put forward that a formal risk<br />
management approach might be more effective.<br />
Referring to the ISO 31000 risk management<br />
standard, the first step is to establish the<br />
context of risk. If we apply this process directly<br />
to the matter of violence, we start to<br />
understand the importance of defining what<br />
violence means to an organisation. Due to the<br />
level of subjectivity involved, it’s worth<br />
considering the current models that are in place<br />
to help contextualise violence.<br />
Perhaps the most common typology in use<br />
was created by the Californian Occupational<br />
Safety and Health Administration and later<br />
amended by Vaughan Bowie. This model<br />
identifies four types of violence based on the<br />
Richard Diston MSc MSyI:<br />
Director and Principal<br />
Consultant at Ark Services<br />
(www.ark-services.co.uk)<br />
47<br />
www.risk-uk.com
The Security Institute’s View<br />
relationship between the perpetrator and the<br />
victim. These are intrusive violence (where<br />
there’s no legitimate business for the<br />
perpetrator at the site), consumer violence (the<br />
perpetrators of which initially have a legitimate<br />
reason to be present, but then act violently),<br />
relationship violence (whereby a relationship<br />
between parties, such as ex-colleagues or<br />
partners, exists) and, last but not least,<br />
organisational violence (which is violence<br />
performed by the organisation, such as through<br />
poor conditions, poor management or poor<br />
culture). This model has been in use for many<br />
years, but offers little detail of practical use in<br />
the management of the problem. Knowing that<br />
a customer may present a threat of violence<br />
doesn’t do much to assist in reducing the risks.<br />
Model of understanding<br />
To this end, it’s worth introducing a new model<br />
for understanding the nature of violence in the<br />
workplace. Focusing on the actual causes of<br />
violent conduct, we can identify seven different<br />
types collectively known as the V7 Model.<br />
Functional violence refers to violence being<br />
employed as a ‘means to an end’, such as in the<br />
perpetration of a crime. In contrast, predatory<br />
violence is perpetrated as its own end and can<br />
be used to refer to acts of terrorism, active<br />
shooters, rape, stalking and other incidents.<br />
Social violence describes situations where<br />
violence is used as social currency, such as in<br />
gangs where it’s employed to increase<br />
reputation or credibility or in incidents of<br />
bullying. Intimate violence takes place between<br />
individuals where there’s an existing intimate<br />
relationship, such as when situations of<br />
domestic abuse enter the workplace.<br />
Impaired violence refers to actions by people<br />
who may be under the influence of drink or<br />
drugs or otherwise suffering from mental<br />
illness. Expressive violence refers to the actions<br />
of individuals who struggle to communicate<br />
their needs (due to disability, for example).<br />
Finally, reactive violence describes situations<br />
where violence is triggered as a response to<br />
stimuli and can include customer outbursts as<br />
well as acts of self-defence.<br />
This typology of violence is based on the<br />
perceived motivations or intentions of the<br />
perpetrator according to their observable<br />
actions and behaviours. For greater context,<br />
each of these types is then subject to a further<br />
“Shocking incidents of physical violence are not<br />
commonplace, yet gain far more attention than the day-today,<br />
lower-level negative workplace behaviours”<br />
range of influences. These include situational<br />
variables (influences present in the actual<br />
‘moment’) as well as personal variables, such<br />
as psychology, personality, worldview,<br />
pathology and history.<br />
There are also social factors (referring to the<br />
ways in which the participants engaged in the<br />
event function within wider society). Finally,<br />
there needs to be a reflection on the<br />
organisational factors present in line with the<br />
concept of organisational violence.<br />
Each type of violence in the V7 Model is<br />
significantly different in purpose and so<br />
requires distinct mitigation methods that are<br />
contextually appropriate. What works for<br />
reducing one type might well exacerbate<br />
another. It can also be argued that an incident<br />
could include a number of these types of<br />
violence, such as an incident of intimate<br />
violence also including impaired and predatory<br />
types. As such, it would be worth planning for<br />
what are felt to be the most predominant types<br />
and designing mitigations as required.<br />
The V7 Model also affords us a solid<br />
foundation for a reporting scheme, given that it<br />
allows us to respect the subjectivity of the<br />
victim in describing what they felt the reason<br />
for the incident was, as well as supporting a<br />
parallel root cause analysis process.<br />
Common mitigations<br />
Common mitigations employed for violence<br />
management by organisations are usually<br />
focused on training. There are several problems<br />
with this approach, which lends itself to<br />
reducing liability through compliance with the<br />
Health and Safety at Work Act 1974 instead of<br />
actually trying to resolve the problems.<br />
There’s no academic evidence to suggest that<br />
physical intervention training is effective, while<br />
similar claims have recently been made about<br />
de-escalation training. Further, it can be argued<br />
that, in focusing on training of this nature, the<br />
organisational response to violence is more<br />
violence. There are also commentators who<br />
consider that training staff in conflict<br />
management indirectly blames them for<br />
contributing to situations in the first place.<br />
At this point, it may be worth pausing to<br />
consider our general approach to violence.<br />
Organisations focus on developing policies and<br />
procedures that centre heavily on what’s not<br />
acceptable. Anyone who has ever had any life<br />
coaching will be familiar with the statement<br />
that ‘what we resist persists’.<br />
It might be time, then, to switch our focus to<br />
a ‘positive peace’ model wherein we emphasise<br />
the behaviours and culture in which we wish to<br />
work instead of ‘fighting the fighting’.<br />
48<br />
www.risk-uk.com
EXTREME<br />
PERFORMANCE<br />
• eXperience the world’s best WDR (150dB)<br />
• 4X frames to create a more natural image<br />
• eXceptional clarity with adjustable light levels,<br />
even with backlight<br />
eXperience it now www.WisenetX.com
Resilience Revisited: Turning Our<br />
Attentions To Successes and Failures<br />
Despite widespread<br />
acknowledgement of<br />
the importance of<br />
‘resilience’ to today’s<br />
organisations, in<br />
practice a number of<br />
questions remain<br />
unanswered. Allison<br />
Wylde suggests that,<br />
despite the emergence<br />
of standards and<br />
research, there’s still<br />
deliberation on an<br />
agreed definition for<br />
the term, while<br />
methods for<br />
understanding and<br />
applying resilience are<br />
somewhat unclear<br />
Dr Allison Wylde BSc (Hons) MA<br />
FRGS FHEA DIC (Imperial):<br />
Faculty Member with Cardiff<br />
University’s Business School<br />
and a Research Fellow at<br />
Cardiff University’s Crime and<br />
Security Research Institute<br />
50<br />
www.risk-uk.com<br />
Arguably, the prevailing position around the<br />
definition of resilience and its<br />
understanding and application appears to<br />
arise partly as a result of its trans-disciplinary<br />
nature. As a consequence, a number of<br />
different schools of thought, theories and<br />
approaches have developed over the years, in<br />
turn giving rise to so-called ‘gurus’ on the<br />
discipline aside from those practitioners<br />
operating in this specialist realm.<br />
Findings from a recent UK survey which<br />
asked what resilience means within private<br />
sector organisations found that more than 80%<br />
of respondents named IT disaster recovery as<br />
the most important element of resilience. 55%<br />
suggested that it was security and 45%<br />
favoured Health and Safety.<br />
There’s an important gap in our knowledge<br />
and understanding of resilience. Further<br />
research might assist our comprehension of the<br />
different ways in which resilience may be<br />
understood and applied and its performance<br />
assessed. Clearly, further work must be<br />
undertaken in discussion with practitioners and<br />
those companies responsible for resilience<br />
plans being implemented.<br />
In addition, the specific requirements for<br />
each company, setting and industry need to be<br />
accounted for. In the here and now, we can<br />
focus on recent empirical studies and<br />
discussions concerning the topic of a resilience<br />
‘success and failure’-style approach. The<br />
overarching aim for all of us is to make sense of<br />
resilience as a discipline.<br />
In the field, practitioners typically<br />
concentrate their focus on a particular stage or<br />
phase of resilience. For example, the business<br />
continuity sector has been concerned with the<br />
stages of recovery from – and to – a ‘business<br />
as usual’ mode of operation.<br />
As is the case with the emergency sectors,<br />
security practitioners have tended to focus on a<br />
broader scope for resilience from the<br />
perspectives of anticipation and preparation as<br />
well incident and/or crisis management and<br />
recovery, together with issues of quality (eg ISO<br />
9000:2005) as well as the key drivers of risk<br />
(ISO Guide 73:2009 and ISO 31000:2009) and<br />
the supply chain (ISO 28002:2011).<br />
Engineers were arguably the first to adopt a<br />
reliability (ie repeatability) lifetime-focused<br />
approach. For their part, some researchers have<br />
more recently suggested that strengthening the<br />
anticipation element of resilience through<br />
concentrating on understanding ‘successes’, as<br />
well as failure, may provide benefits.<br />
Resilient system<br />
According to Hollnagel 1 , a resilient system will<br />
exhibit several different traits or ‘abilities’.<br />
First, there’s the ability to respond. It’s all about<br />
knowing what to do or being able to respond to<br />
regular and irregular changes, disturbances and<br />
opportunities by activating prepared actions or<br />
adjusting the current mode of functioning<br />
within the host organisation.<br />
Then there’s the ability to monitor. Knowing<br />
what to look for, or being able to monitor that<br />
which is or could seriously affect the system’s<br />
performance in the near term (either in a<br />
positive or negative way). The monitoring must<br />
cover the system’s own performance as well as<br />
what happens in the environment.<br />
Next on Hollnagel’s list is the ability to learn.<br />
Knowing what has happened or otherwise<br />
being able to learn from experience, and in<br />
particular learning the right lessons from the<br />
right experiences.<br />
Last, but by no means least, there’s the<br />
ability to anticipate. Here, the focus is squarely<br />
on knowing what to expect or being able to<br />
anticipate developments – such as potential<br />
disruptions, novel demands or constraints, new<br />
opportunities or changing operating conditions<br />
– further into the future.<br />
It’s interesting to note that, from a<br />
policymaker’s perspective, concerns regarding<br />
resilience have largely resulted in the creation<br />
of new standards and guidelines, as well as<br />
additional requirements for governance and/or<br />
safety regulations across organisations and<br />
civil society and during disaster recovery. As a<br />
direct consequence, the requirements for<br />
reporting near misses, due diligence and audit<br />
have increased.<br />
Yet, as the fire at Grenfell Tower in West<br />
London illustrated with such tragic effect back<br />
in June, even in advanced economies disastrous<br />
events and fatalities still occur. Tensions<br />
between the goals of resources versus<br />
efficiencies might have meant that standards<br />
were simply applied as minimum standards,<br />
while collaborations and partnerships may have<br />
fostered confusion and gaps in responsibility.
In the Spotlight: ASIS International UK Chapter<br />
One area that shows promise concerns<br />
apparent differences in the methodology of risk<br />
assessment and, in particular, risk ‘acceptance’<br />
as practised in different industries, sectors and<br />
countries. An example centres on industries<br />
operating in Scandinavian countries when<br />
compared with those in EU nations and, indeed,<br />
the US. Different approaches in the<br />
specification of controls and factors associated<br />
with risk aversion can be identified according to<br />
the country under examination.<br />
Different disciplines<br />
A further promising avenue has been identified<br />
among the differing views of resilience that, to<br />
date, have been viewed as separate (for<br />
example the engineering and built environment<br />
disciplines and between healthcare<br />
management and patient care).<br />
In the discipline of engineering, following an<br />
external shock the focus will be turned towards<br />
the ability of a system to return to equilibrium.<br />
The scope of interest will be resistance to<br />
shocks that occur near equilibrium. In ecology,<br />
the main characteristics are the scale of shock<br />
that a system’s capable of absorbing before it<br />
changes to a new and stable state. The scope of<br />
interest is far from equilibrium behaviour.<br />
When it comes to complex adaptive systems,<br />
attentions are drawn towards the ability for<br />
anticipatory or reactionary re-organisation in<br />
order to minimise the impact of the shock. In<br />
terms of the scope of interest, the adaptive<br />
capability of systems might result in a new form<br />
which may – or may not – be desirable.<br />
The scope of each interest varies in context<br />
and scale from near-normal to irreversible<br />
change. Returning to the case of engineering,<br />
the suggestion is that the entity exerts<br />
resistance to prevent and resist any change. If<br />
change occurs, the entity will be able to return<br />
to its original condition.<br />
This condition appears similar to the horizon<br />
scanning-style ‘anticipate and prepare’ stages<br />
outlined within BS 11200: 2014 Crisis<br />
Management Guidance and Good Practice.<br />
The examples of ecology and complex<br />
adaptive systems are more related to the<br />
events involved in crisis management, where a<br />
return to the initial condition may not be<br />
possible since change (ie ‘adaptation’) has<br />
already occurred. Furthermore, if the ‘change’<br />
had been preceded by unsafe, insecure or<br />
illegal practices then, as mentioned, a return to<br />
the original state may not be desirable.<br />
One example here concerns the BP-operated<br />
Macondo oil and gas prospect oil spill in the<br />
Gulf of Mexico which began on 20 April 2010.<br />
Killing eleven people, it’s considered to be the<br />
largest marine oil spill in the history of the<br />
petroleum industry. The US Government<br />
estimated the total discharge to be 4.9 million<br />
barrels of oil (that’s 210 million US gallons or<br />
780,000 m 3 ).<br />
After several failed efforts to contain the oil<br />
flow, the well was declared sealed on 19<br />
September 2010, although reports in early 2012<br />
indicated that the well site was still leaking.<br />
The subsequent US Presidential report on<br />
this episode highlights at least four<br />
preventative barriers that failed. Further, a<br />
similar event to Macondo had occurred six<br />
months earlier, but warnings had apparently<br />
not been heeded and, despite the<br />
establishment of a dedicated Commission,<br />
lessons from the earlier incident were not<br />
implemented. In July 2015, BP agreed to pay a<br />
massive sum of $18.7 billion in fines.<br />
Academic scholarship in and beyond the<br />
sphere of security management appears to<br />
have been constrained by a view of the<br />
‘inevitability’ of the failure of resilience. Here,<br />
then, managing resilience for some scholars<br />
has been about managing the effects and<br />
impacts of an inevitable failure of resilience.<br />
The argument presented for focusing on<br />
successes and failures opens many promising<br />
avenues to help us develop further questions<br />
and research that will hopefully bridge some of<br />
the remaining gaps in our understanding.<br />
Reference<br />
1 Hollnagel E (2016):<br />
‘Resilience Analysis Graphs’<br />
and ‘Resilience Assessment<br />
Grid’<br />
“One area that shows promise concerns apparent<br />
differences in the methodology of risk assessment and, in<br />
particular, risk ‘acceptance’ as practised in different<br />
industries, sectors and countries”<br />
51<br />
www.risk-uk.com
FIA Technical Briefing<br />
Fire Prevention in Care Homes:<br />
What Strategies Should Be Considered?<br />
Those who have been in the fire industry for<br />
some time will remember the Rosepark<br />
Care Home incident wherein 14 elderly<br />
residents died at the facility in Scotland after a<br />
fire broke out in a cupboard back in 2004.<br />
If you think that’s long in the past, you only<br />
need to filter through the News on the Fire<br />
Industry Association’s website to find multiple<br />
stories of care homes in breach of fire<br />
regulations. Only recently, a care home in<br />
Cheshire was fined £50,000 for two breaches.<br />
All of this shows the severity of the need for<br />
careful fire risk management and planning.<br />
Let’s examine the problems of fitting out care<br />
homes with the correct equipment and putting<br />
in place the maintenance that’s required.<br />
The responsibility to actually plan and<br />
schedule the installation and maintenance of<br />
any fire protection equipment lies solely with<br />
the ‘Responsible Person’ as outlined in the<br />
Regulatory Reform (Fire Safety) Order 2005.<br />
This is usually the care home itself. So, while<br />
those contracted to the care home are not<br />
necessarily in the immediate firing line (so to<br />
speak) if something goes wrong, there’s a duty<br />
upon technicians and contractors to follow<br />
standards and Best Practice in order to ensure<br />
that the highest possible levels of safety are<br />
maintained and that the blame cannot be<br />
shifted in the event of a fire.<br />
It’s worth noting that a fire alarm contractor<br />
was actually fined over £11,000 in 2016 for<br />
failing to inform a care home owner of faults<br />
within the system after the court decided the<br />
contractor flouted fire safety legislation.<br />
Main challenge posed<br />
The main challenge with most care homes is<br />
the inability of occupants to evacuate quickly.<br />
Some residents may be bedridden while others<br />
will take a significant amount of time and staff<br />
support to enable their mobility. In addition,<br />
even able-bodied residents may experience<br />
significant confusion upon hearing an alarm<br />
and have difficulty in finding building exits.<br />
When added to commercial pressures on<br />
staffing levels, it’s somewhat challenging to<br />
ensure a care home could be evacuated fully<br />
and safely in the event of a fire. Clearly, then,<br />
the necessity to detect fires as quickly as<br />
possible (and before they become too large to<br />
deal with on a safe basis) plays an important<br />
role in ensuring the safety of occupants.<br />
Following the tragic events at Grenfell Tower in June, it seems<br />
that there’s a renewed focus on fire safety issues.<br />
Unfortunately, it often takes a disaster such as this to<br />
rekindle public interest in the discipline. Naturally, this will<br />
likely lead to an upsurge in new business, with fire<br />
companies increasingly involved in new projects, system<br />
updates and refurbishments of specific building types. Robert<br />
Yates focuses on fire safety regimes for care homes<br />
To this end, BS 5839 Part 1 recommends L1<br />
(coverage throughout) fire detection in large<br />
nursing homes, while many specifications for<br />
smaller care homes will also specify L1 after the<br />
appropriate risk assessment is conducted.<br />
The Rosepark Care Home episode led to BS<br />
5839 Part 1 making two important<br />
recommendations. First, that nursing homes<br />
with more than ten occupants should be<br />
protected by addressable systems and, second,<br />
that those homes should have an automatic<br />
connection to the Fire Brigade.<br />
The key advantage of addressability in a<br />
system is in providing accurate information as<br />
regards the point of detection. This can be<br />
critical in reducing the time taken between<br />
detection and the commencement of<br />
firefighting either by staff using portable<br />
extinguishers or by the Fire and Rescue Service<br />
if the fire’s more significant in scale.<br />
Connectivity to the Fire Brigade is also an<br />
essential point. In the event of fire, members of<br />
staff need to react quickly and may already be<br />
Robert Yates:<br />
Technical Manager at the Fire<br />
Industry Association<br />
53<br />
www.risk-uk.com
FIA Technical Briefing<br />
*The Fire Industry Association<br />
has compiled plenty of useful<br />
guidance that can be<br />
consulted when it comes to<br />
fire safety in care homes, with<br />
a number of downloadable<br />
and printable resources<br />
available free of charge on the<br />
website (www.fia.uk.com).<br />
Some documents that may be<br />
of particular interest for fire<br />
professionals include:<br />
• Guidance on Fire Alarm<br />
Detector Applications and<br />
Documentation of the<br />
Selection<br />
• Guidance on the Application<br />
of Primary Visual Alarm<br />
Devices and Supplementary<br />
Visual Indication Devices<br />
• Guidance on the Selection<br />
and Specification of Fire<br />
Alarm Categories in<br />
Accordance with BS 5839-1<br />
dealing with other important issues. Therefore,<br />
relying on staff to make a call to the Fire<br />
Brigade while under such pressure is<br />
unreasonable. Rather, they’re better tasked<br />
with undertaking their Fire Action Plan.<br />
Excessive false alarms<br />
Such intensive detection coverage allied to<br />
automatic connection to the Fire Brigade leads<br />
to the obvious concern of excessive false<br />
alarms. Typical sources of false alarms in care<br />
homes include steam from showering and<br />
laundry rooms, cooking fumes and the use of<br />
hair spray or air fresheners.<br />
Often, attempts are made to reduce false<br />
calls either by reducing detector sensitivity or<br />
introducing delay features into the system. One<br />
common response is to install heat detection<br />
instead of smoke detection as the former type<br />
of detector is much less likely to ‘false alarm’.<br />
However, heat detectors only activate when the<br />
fire has established itself. By the time staff<br />
members have responded to the alarm, it’s<br />
unlikely that the fire can be tackled without Fire<br />
and Rescue Service intervention.<br />
In addition, heat detectors cannot fully<br />
protect occupants who are asleep within a room<br />
where the fire breaks out as the smoke may<br />
well overcome those occupants before such<br />
time that a heat detector could respond. Smoke<br />
detection should be used throughout, then,<br />
with heat detection only being employed where<br />
absolutely necessary.<br />
Where thermal detection is the only option,<br />
it’s once again essential to maintain as high a<br />
sensitivity as possible. Heat detectors come in<br />
two basic types: fixed temperature and rate of<br />
rise. Fixed temperature devices only respond<br />
when the temperature at the detector reaches a<br />
pre-defined limit. Typically, this is 58 o C, but<br />
higher temperature devices are also available.<br />
Rate of rise heat detectors have a fixed<br />
temperature limit in addition to a response<br />
based on a temperature increase over a certain<br />
period of time. The rate of rise heat detector is<br />
normally faster in its response than fixed<br />
temperature and should be used as the next<br />
best alternative. Occasionally, rate of rise<br />
detectors can still false alarm (for instance,<br />
when an oven door’s opened directly below a<br />
detector). This can normally be handled by<br />
careful positioning of the detectors in the<br />
installation phase.<br />
With the clear goal of maintaining detection<br />
sensitivity throughout care premises, the<br />
installer is well advised to consider some of the<br />
latest multi-sensor technologies now available.<br />
This enables smoke detection to be provided<br />
where previously only heat detection could be<br />
reliably used. Installers should seek the advice<br />
of the manufacturers to establish Best Practice<br />
with their products.<br />
A further tendency to reduce false alarms is<br />
to introduce delays in calling the Fire Brigade.<br />
BS 5839 Part 1 2013 updated the guidance and<br />
recommendations of Clause 19 and sub-clause<br />
35.2.7 to address the need to avoid delay in<br />
summoning the Fire and Rescue Service to<br />
residential care premises. Again, the extensive<br />
support and time needed to evacuate<br />
occupants is the primary concern here.<br />
Another key issue regarding the design of fire<br />
alarm systems in care homes is the topic of<br />
alarming. In some premises, it might not be<br />
Best Practice to provide alarming for all areas in<br />
one initial step. Fire alarms may well cause an<br />
unwanted level of disruption to occupants who<br />
could then draw support away from critical fire<br />
response activity at the very worst moment.<br />
Staff alarms and/or zonal alarming strategies<br />
may well be helpful. Any such alarm strategy<br />
needs careful consideration based on a risk<br />
assessment and full consultation with all<br />
interested parties (ie care home management,<br />
the local Fire and Rescue Service and insurers,<br />
etc). BS 5839 Part 1 outlines recommendations<br />
for such systems and should be a key point of<br />
reference for these discussions.<br />
Containing fire and smoke<br />
With prolonged evacuation, a major concern is<br />
the control and containment of fire and smoke.<br />
Sprinklers were highlighted as a key topic<br />
subsequent to the investigations into the<br />
Rosepark Care Home tragedy.<br />
Smoke control systems and passive fire<br />
protection are also critical in allowing<br />
occupants sufficient time to safely evacuate the<br />
premises. Again, the fire detection and alarm<br />
system has an important role to play.<br />
Fire doors are an essential element of passive<br />
fire protection and need to be closed in the<br />
event of fire. Unfortunately, they’re also<br />
inconvenient in daily use, and especially for<br />
elderly people, so tend to be held open with<br />
electrical door holder units and released in the<br />
event of a fire alarm.<br />
For their part, final exit doors need to<br />
balance the security of residents with the needs<br />
of evacuation in the event of a fire outbreak.<br />
Door release from the fire detection and<br />
alarm system needs to be 100% reliable in all<br />
events and should be according to the<br />
recommendations of BS 7273 Part 4. For care<br />
homes, Category A operation is required. The<br />
systems installer should ensure that all the<br />
requirements for this category are included in<br />
the system design.<br />
54<br />
www.risk-uk.com
FRONTIER PITTS<br />
Protecting Your World<br />
www.frontierpitts.com +44 (0)1293 422800<br />
SECURITY AND<br />
HOSTILE VEHICLE MITIGATION<br />
GATES BARRIERS BLOCKERS BOLLARDS PEDESTRIAN
POWER OUT.<br />
INTRUDER IN.<br />
NOT WITH YUASA!<br />
Security & fire alarm systems depend on<br />
reliable backup power.<br />
As European market leader for over 30 years & the number one choice for<br />
reliability, quality & performance, you can always trust Yuasa batteries to<br />
perform at the critical moment.<br />
Don’t take risks with your backup power.<br />
Demand the best standby batteries... Demand Yuasa!<br />
Discover more at www.yuasa.com
Security Services: Best Practice Casebook<br />
Last year, the Crime Survey for England and<br />
Wales recorded the highest level of<br />
shoplifting for 13 years and, indeed, a 3%<br />
uplift on the prior 12 months. With a much<br />
higher percentage of shopping now being<br />
transacted online, perhaps in-store shoplifting<br />
is a more attractive way for a ‘professional’<br />
criminal to avoid leaving a digital footprint?<br />
Security professionals are responsible for<br />
continuously analysing the loss prevention<br />
equation and identifying triggers, signals and<br />
barriers to communication, all of which can be<br />
logged, tracked and pattern-analysed for better<br />
outcomes. In terms of retail security, things<br />
have changed quite substantially and, in<br />
addition to the accepted ASCONE (Approach,<br />
Selection, Concealment, Observation, Non-<br />
Payment and Exit) method, the importance of<br />
intelligence analysis and planning cannot be<br />
overstated as part of the loss prevention mix.<br />
The powers of retail security professionals<br />
are among the most poorly understood by the<br />
casual observer. Does anyone outside of the<br />
profession really understand the limited<br />
parameters within which a retail security<br />
professional is often required to work?<br />
What about the ‘rock and a hard place’ legal<br />
situations which can mean that loss prevention<br />
specialists have to take decisions that could<br />
lead to shoplifters being allowed to walk away<br />
from the premises with products for which they<br />
haven’t paid?<br />
Not surprisingly, this doesn’t make them feel<br />
good as practising professionals. Security<br />
officers have come into this business to be a<br />
force for good, but it’s little wonder that the<br />
general public harbours negative perceptions of<br />
these officers when the former doesn’t have an<br />
understanding of the limited options at the<br />
latter’s disposal when it comes to chasing after,<br />
detaining or restraining a suspected shoplifter.<br />
A high-profile example happened in one of<br />
the larger supermarket chains and involved<br />
stolen glass bottles that resulted in a fatal<br />
injury during the detention situation. More<br />
recently, a security officer was suspended from<br />
working for a well-known High Street retailer as<br />
a result of being deemed to have used<br />
excessive force in detaining a shoplifter who,<br />
unbeknown to the officer involved, was<br />
pregnant. The female was given a six-week jail<br />
term having pleaded guilty to her crime.<br />
Even searching a suspect can pose problems,<br />
with the risk factor stretching from negative PR<br />
to allegations of sexual assault being made.<br />
Mobile technology<br />
Set against this backdrop, what’s the on-duty<br />
security officer supposed to do? It’s not yet<br />
Addressing Modern Challenges<br />
Recent high-profile security incidents have served to remind<br />
us all of the need for constantly questioning our security<br />
focus and addressing the balance between expenditure<br />
versus public safety in a period where we’re experiencing<br />
peaks in threat levels. Assuming that public safety is in hand,<br />
organisations also need to look at ways in which loss<br />
prevention is managed, as Jon Felix observes in detail<br />
widely implemented, but mobile technology<br />
simply must be embraced to allow our<br />
professionals to document evidence in the<br />
fastest and most accurate way possible.<br />
Recently, we carried out an analysis exercise<br />
to look at the barriers to loss prevention<br />
procedures which can serve to prevent the<br />
accurate and timely documentation of evidence.<br />
It was clearly evident that the deployment of<br />
staff with mobile technology had the potential<br />
to eradicate a number of time-consuming tasks<br />
from the overall process.<br />
Taking time-stamped photos on the shop<br />
floor, for example, eradicates the need for a<br />
security officer to find someone to cover his or<br />
her station, go to the back office and accurately<br />
recall and document time, dates, description<br />
and methods. This ‘digitisation’ of evidence<br />
facilitates easy information sharing with<br />
neighbouring security teams for collaboration,<br />
pattern analysis and effective case building for<br />
litigation purposes once the offender has left a<br />
clear trail of digital evidence behind them.<br />
Indeed, a given offender could well be lulled<br />
into a false sense of security in their mission,<br />
reassured that the security officers on the<br />
premises are otherwise engaged with mobile<br />
Jon Felix BSc (Hons) MDIP<br />
MBCI MSyl: Security<br />
Consultant at CIS Security<br />
57<br />
www.risk-uk.com
Security Services: Best Practice Casebook<br />
devices when really they’re watching via the<br />
camera lenses and happily snapping evidence<br />
of offenders for potential prosecution.<br />
The role of communication in the<br />
management of public safety is clear and,<br />
again, can be better facilitated through mobile<br />
technology. The provision of a digital platform<br />
for instant documentation, communication and<br />
information references (such as the Citizen Aid<br />
critical incident First Aid App, for example)<br />
would better equip officers on the front line to<br />
limit all kinds of losses.<br />
Event security management<br />
Effective security management at an event, and<br />
particularly so a crowded one, will hinge upon<br />
the provision of clear and easily digestible<br />
information for security officers and members<br />
of the public alike. This will enable a joint<br />
understanding of roles and the powers security<br />
operatives have, the location of key amenities<br />
such as exits, medical stations and meeting<br />
points and also manage expectations in terms<br />
of individuals’ experiences and degree of<br />
security awareness.<br />
Airlines do this extremely well by placing<br />
emergency advice right in front of passengers’<br />
noses and supplementing that detail with a live<br />
run-through of safety awareness by members of<br />
the cabin crew to really hammer home the way<br />
in which to remain safe on an aeroplane.<br />
Event security specialists look to issue<br />
guidance such as this, particularly for the<br />
collection of children from events like the<br />
recent Ariana Grande concert at the Manchester<br />
Arena. That guidance will be around<br />
communication with loved ones and outlining<br />
clear meeting points, with consideration<br />
afforded to stated meeting point area<br />
capacities and designated escape routes.<br />
In addition to the awful outcome of that<br />
tragic episode in Manchester, there’s always<br />
the potential for serious injury to occur among<br />
crowds of people trying to exit a venue in haste.<br />
Could Near Field Communication tags be used<br />
to track attendees at an event, perhaps with<br />
systems embedded on a wristband to monitor<br />
crowd flow? The technology is there to do this.<br />
Maybe it’s time for the Security Industry<br />
Authority to make a plan to communicate<br />
directly with the public through adverts<br />
outlining the roles and responsibilities of<br />
“Maybe it’s time for the Security Industry Authority to<br />
make a plan to communicate directly with the public<br />
through adverts outlining the roles and responsibilities of<br />
security personnel operating in different environments?”<br />
security personnel operating in different<br />
environments? If the Regulator opens the<br />
dialogue, we can potentially gain more support<br />
from the public who will then start becoming<br />
more knowledgeable on security issues.<br />
Anyone watching the coverage of the recent<br />
terror attack at London Bridge on BBC News<br />
will have heard the straining voices of the<br />
police officers on scene trying to communicate<br />
with the public and reporters about the<br />
seriousness of complying with the security<br />
cordon. Perhaps it’s time to trust the public<br />
with more information and provide them with<br />
facts in a more relatable and ‘bite size’ format<br />
(ie a handgun bullet can injure someone within<br />
the distance of a double decker bus, whereas a<br />
bomb blast can harm an individual as far away<br />
as the length of Tower Bridge)?<br />
Critical incident response<br />
As a company, CIS Security is working to<br />
encourage its clients/end users to cascade<br />
more critical incident response and situational<br />
awareness messages to their own staff through<br />
the encouragement of the mental rehearsal of<br />
critical incident situations. Where are the<br />
emergency exits? What happens if the power<br />
drops out?<br />
If athletes and dancers can perform better by<br />
mentally rehearsing their skills and moves,<br />
then those individuals who find themselves in a<br />
critical incident scenario can do as well. Instead<br />
of receiving a medal, they’re able to stay alive if<br />
an event should unfold.<br />
Our responsibility as security professionals<br />
now encompasses a stronger need to<br />
communicate with the public about how to alter<br />
the way in which they think about critical<br />
incidents so they’re more ready when the time<br />
might – but hopefully doesn’t – arise. Yes,<br />
critical incidents are rare, but I’ve been reading<br />
about people who’ve found themselves at (or<br />
close to) more than one of the recent terror<br />
incidents, so one supposes such events don’t<br />
feel so rare for them.<br />
Perhaps society should examine the role of<br />
security and allocate more importance to<br />
investments placed in it? Technology is a big<br />
part of this, but the security officer will always<br />
be the essential director and decision-maker<br />
requiring increasingly higher quality training<br />
and better tools in order to do the job well.<br />
Many diligent companies are working hard to<br />
raise both the profile and skill sets of practising<br />
security officers. To really capitalise on this<br />
effort, though, the industry needs to recognise<br />
those officers with the same level of respect<br />
afforded to police officers and embrace their<br />
ability to use modern technology effectively.<br />
58<br />
www.risk-uk.com
A New Model for Guarding<br />
Cardinal's new 5M model gives clients a unique view of<br />
their investment and the true cost or return.<br />
Measure Mobilise Monitor Manage Monetise Test<br />
Contact us today and request a free data-driven health check on your incumbent provider<br />
Kerinda.Trigg@thecardinalgroup.co.uk<br />
Group Sales and Marketing Director +44 (0) 1799 533 635 +44 (0) 781 801 3200<br />
CERTIFYING<br />
SECURITY<br />
The leading certification body for Guarding Services.<br />
Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001<br />
and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guarding<br />
and Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuables<br />
in Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.<br />
Telephone : 0191 296 3242 www.ssaib.org<br />
SSAIB
How Can We Combat ‘Virtual Hackers’?<br />
The WannaCry<br />
ransomware attack in<br />
May, which affected<br />
elements of the<br />
National Health<br />
Service (NHS), has farreaching<br />
implications<br />
for the nature of the<br />
threat presently facing<br />
our connected<br />
economy. Nicola<br />
Whiting outlines the<br />
growing threat of<br />
automated cyber<br />
weapons in criminal<br />
hands and observes<br />
how leading<br />
organisations from<br />
NATO to the FBI are<br />
borrowing from the<br />
hackers’ ‘playbook’<br />
in order to fight back<br />
The revelation that the WannaCry attack was<br />
probably the work of a ‘script kiddie’<br />
indicates that the automation of hacking<br />
techniques is now enabling amateur hackers to<br />
launch attacks with nation state-level expertise,<br />
a development that dramatically increases the<br />
severity of cyber threats facing today’s major<br />
organisations. What was once the preserve of<br />
military forces and spy agencies is now within<br />
the reach of basement-dwelling hacktivists and<br />
generalist cyber criminals.<br />
The WannaCry network infection vector was<br />
among a slew of sophisticated tools apparently<br />
stolen from America’s National Security Agency,<br />
demonstrating that advanced cyber warfare<br />
technologies developed by Governments are<br />
increasingly falling into the hands of ordinary<br />
citizens. This could be construed as the<br />
equivalent of intercontinental ballistic missiles<br />
being stolen and sold to street criminals.<br />
Not only does this development dramatically<br />
increase the number of potentially devastating<br />
cyber attacks the world might face in times<br />
ahead, but also renders it that much harder for<br />
the authorities to trace the perpetrators.<br />
In the same way that automated cyber<br />
weapons may replicate the work of skilled<br />
Black Hat hackers, new software can<br />
autonomously replicate the work of leading<br />
White Hat hackers, analysing entire networks<br />
for vulnerabilities with the knowledge and skills<br />
of a penetration tester.<br />
The WannaCry attack on the NHS is a good<br />
example. Just as the attack was launched using<br />
an automated network ‘worm’ coded to find<br />
vulnerabilities, parts of the NHS were able to<br />
use their own automated tools to identify<br />
vulnerabilities and successfully protect<br />
themselves against the attack.<br />
Some NHS Trusts used the automated Nipper<br />
Studio tool to replicate the skills of expert<br />
human penetration testers and harden their<br />
firewalls and network devices at a speed and<br />
scale that’s beyond human capabilities, duly<br />
finding and closing vulnerabilities before they<br />
could be attacked.<br />
Nipper Studio creates a virtual model of how<br />
the setting and rules interact with each other<br />
and understands the interactions just like a<br />
human would, but in a fraction of the time and<br />
with repeatable accuracy.<br />
NHS Trusts with well-tested procedures in<br />
place and which had used automation to<br />
harden their networks against attack went<br />
unbreached when WannaCry struck,<br />
subsequently ensuring that the highly sensitive<br />
information in their systems remained secure.<br />
Rise of cyber warfare<br />
Behind the escalation of cyber attacks lies the<br />
increasing investment by Governments,<br />
terrorists and other groups in ‘cyber-offensive’<br />
capabilities: the development of hacking tools<br />
that offer the ability to penetrate enemy<br />
networks and systems and project ‘cyber<br />
power’ around the world.<br />
The capability of automated cyber warfare<br />
systems was first illustrated by Stuxnet, a selfreplicating<br />
cyber worm which destroyed over<br />
1,000 nuclear centrifuges across an Iranian<br />
nuclear facility, setting that nation’s nuclear<br />
ambitions back by at least two years.<br />
Security expert Claudio Guarnieri has noted<br />
that the so-called Regin malware, recently used<br />
to attack EU diplomatic delegations, also bore<br />
the signature of a nation state spy apparatus.<br />
Another such attack recently knocked out the<br />
Ukraine’s national grid.<br />
These military-grade cyber weapons are<br />
percolating down into the online underworld,<br />
largely because cyber weapons are far easier to<br />
steal than conventional armaments. It’s both<br />
easier and cheaper to copy a code than a cruise<br />
missile. Today, an entire cyber arsenal can be<br />
spirited away on a USB stick.<br />
In the subterranean networks of The Dark<br />
Web, there’s now a highly-developed cyber<br />
60<br />
www.risk-uk.com
Cyber Security: Risk Management for Automated Cyber Weapons<br />
arms ‘bazaar’ wherein criminals can purchase<br />
the cyber equivalent of smart bombs, complete<br />
with user guides, money-back guarantees and<br />
TripAdvisor-style user ratings.<br />
Powerful custom-made tools designed to<br />
exploit unpatched vulnerabilities and<br />
autonomously reproduce themselves across the<br />
world are widely available to buy, rent or<br />
franchise. They can also be repurposed and<br />
customised for any particular task, from<br />
hacking a bank through to attacking a hospital.<br />
These sophisticated weapons often contain<br />
an autonomous ‘transport’ mechanism that<br />
enables the malware to scan for vulnerabilities<br />
and spread itself along with a ‘payload’ that<br />
then delivers the attack.<br />
The Internet is also replete with intelligencegathering<br />
tools that lie dormant inside an<br />
enemy system like a cyber ‘sleeper cell’,<br />
covertly mapping out the network architecture,<br />
domains, servers and IP addresses of potential<br />
targets. A recent investigation showed that the<br />
UK’s national rail network had been unwittingly<br />
infiltrated by four nation state cyber attacks<br />
which appeared to be ‘exploratory’ exercises.<br />
Two-way relationship<br />
One cyber expert has warned the US<br />
Government that: “The Internet allows<br />
malicious cyber actors to deliver weaponised<br />
tools at a scope and scale we’ve never seen.”<br />
Even worse, nation states are deliberately<br />
‘leaking’ cyber weapons to illegal hacker<br />
collectives, hiding their activities behind proxy<br />
groups. The relationship works both ways, with<br />
cyber crime groups also sharing tools with<br />
Governments in return for payment or<br />
protection from prosecution. These tools then<br />
work their way lower down the food chain until<br />
they end up in the hands of low-level hackers,<br />
with the end result being that highly classified<br />
cyber offensive expertise is being transplanted<br />
into the laptops of teenagers.<br />
According to cyber security body (ISC) 2 , this<br />
comes at a time when the Human Resources<br />
needed to prevent these increasingly advanced<br />
and widespread attacks are in scarce supply.<br />
The world is set to face a shortfall of 1.8 million<br />
cyber security professionals in five years. Rising<br />
demand for a dwindling pool of talent is<br />
pushing up the cost of hiring, rendering it<br />
increasingly difficult for companies to recruit<br />
and retain the necessary and best talent.<br />
Given this major manpower shortage<br />
combined with a rise in automated hacking<br />
tools entering wider circulation, business and<br />
industry is now under greater threat than ever<br />
before. The central problem is that machines<br />
are far faster and more efficient at hacking than<br />
“The central problem is that machines are far faster and<br />
more efficient at hacking than humans. Automated tools<br />
can launch many simultaneous worldwide attacks at a<br />
speed and scale beyond the capacity of human attackers”<br />
humans. Automated tools can launch many<br />
simultaneous worldwide attacks at a speed and<br />
scale beyond the capacity of human attackers.<br />
For example, computer ‘worms’ are capable of<br />
autonomously replicating themselves millions<br />
of times in order to simultaneously infect a<br />
wide array of targets.<br />
To illustrate that statement, studies have<br />
shown how an automated worm could ‘infect’ a<br />
single lightbulb and then cross-contaminate all<br />
neighbouring lightbulbs, spreading like wildfire<br />
to plunge entire cities into darkness at<br />
lightning speed. In this way, widely-available<br />
automated weapons dramatically increase the<br />
speed, power and reach of cyber attacks on<br />
faraway targets.<br />
Autonomous tools also enable human<br />
hackers to cover their tracks, like a thief<br />
evading detection by sending a drone to burgle<br />
a house. While companies lack the time and<br />
Human Resources needed to find and fix all of<br />
their vulnerabilities, automated tools afford<br />
cyber criminals limitless time and resources to<br />
find and exploit vulnerabilities. It’s no surprise<br />
that, in a race between human defenders and<br />
autonomous attackers, the humans are losing.<br />
To turn this around, we simply must use<br />
autonomous tools as a defence mechanism.<br />
Automating our defences<br />
Whereas traditional ‘dumb’ scanners<br />
indiscriminately bombard a network from the<br />
outside in the hope of exposing a vulnerability,<br />
modern ‘smart’ tools can autonomously scour<br />
the individual blueprint of any network or<br />
system to find deep structural vulnerabilities<br />
and explain how to fix them. It’s the digital<br />
equivalent of going through every line of an<br />
architect’s drawings and identifying<br />
weaknesses in the structure within seconds.<br />
‘Smart’ tools dramatically reduce the<br />
demands placed on heavily-overstretched<br />
Human Resources, using automated systems to<br />
plug the cyber security skills gap that shows<br />
little sign of diminishing any time soon.<br />
With advances in automation enabling<br />
today’s criminals to launch devastating attacks<br />
in minimal time and with few Human Resources<br />
of their own, we really must begin to deploy the<br />
same ‘smart’ technologies to cut the time and<br />
cost of shoring up our defences. Frankly, we<br />
neglect to do so at our peril.<br />
Nicola Whiting: Chief<br />
Operating Officer at Titania<br />
61<br />
www.risk-uk.com
The Certified Technical Security<br />
Professional: Focusing on Systems<br />
brought about any discernible change or means<br />
of introducing minimum standards setting for<br />
individual practitioners. In short, there have<br />
been a good many expressions of<br />
dissatisfaction but, until now, no action.<br />
The demands placed upon the Government to<br />
address heightened levels of risk – and<br />
particularly so in relation to the increasing<br />
threat of terrorism – are unlikely to abate, while<br />
it’s generally accepted that the responsibility<br />
for safeguarding our society rests with central<br />
Government via the national police service, the<br />
Security and Intelligence Services and,<br />
increasingly, the private sector.<br />
Next month, the<br />
Register of Certified<br />
Technical Security<br />
Professionals opens<br />
for business in order<br />
to recognise the<br />
competence of – and<br />
qualifications gained<br />
by – installers as well<br />
as those individuals<br />
who maintain fire and<br />
security systems.<br />
Kevin Matthew<br />
recounts the benefits<br />
of this landmark<br />
development for<br />
practising in-house<br />
risk and security<br />
managers<br />
Many UK industries are governed by some<br />
form of regulation and Best Practice. In<br />
our business sector, the UK’s Private<br />
Security Industry Act 2001 led to the creation of<br />
the Security Industry Authority, the regulatory<br />
body that has subsequently realised mandatory<br />
licensing for various security activities, among<br />
them security guarding, door supervision, close<br />
protection, Cash and Valuables in Transit, key<br />
holding and Public Space CCTV Surveillance.<br />
However, there’s a viewpoint commonly held<br />
by many operating within the security industry<br />
that licensing hasn’t gone far enough in terms<br />
of instilling competencies and raising<br />
standards, nor has it reached far enough across<br />
what is today an extremely diverse sector.<br />
One significant area which has certainly<br />
escaped the Regulator’s reach is that of<br />
security systems, and more specifically those<br />
individuals who are responsible for installing<br />
and maintaining such systems.<br />
For many years, the technical security sector<br />
has expressed concern – all-too-often only<br />
within its own ranks – about the absence of<br />
recognised professional standards and<br />
protocols. This has allowed the proliferation of<br />
unqualified and potentially unscrupulous<br />
individuals operating within this field.<br />
Despite those protestations, no-one from the<br />
Regulator’s office, wider Government or,<br />
indeed, the technical security sector itself has<br />
Electronic security systems<br />
Security and fire detection systems have<br />
advanced beyond all recognition in the last<br />
decade. Anyone visiting IFSEC International at<br />
London’s ExCeL back in June would have<br />
witnessed the hugely diverse range of<br />
sophisticated technologies on display such as<br />
video surveillance systems with HDI, CVI and<br />
TVI cameras, 4K and 8K monitors, cyber tools,<br />
drones, analytical software, biometric access<br />
control solutions, wireless intruder alarms and<br />
fully-integrated systems orchestrated by a<br />
central Command and Control point.<br />
A major element of security planning and<br />
developing strategy is the use of electronic<br />
security systems. CCTV and many types of<br />
technical access controls are fundamental when<br />
it comes to combating crime and terrorism.<br />
With such reliance placed on security systems<br />
technology, it’s ever-more vital that those<br />
charged with installing and maintaining such<br />
high tech equipment are appropriately<br />
experienced and qualified to do so, while<br />
always looking to embellish and enhance their<br />
skills by dint of accredited training.<br />
Security systems which fail due to incorrect<br />
installation or sub-standard maintenance can<br />
result in major consequences for those<br />
responsible. The fall-out here can affect<br />
companies and directors, sometimes extending<br />
to criminal charges and/or litigation, not to<br />
mention untold reputational damage.<br />
In-house directors of security have a duty to<br />
ensure those systems they procure are fit for<br />
purpose and that the equipment harbours the<br />
requisite quality standards. Their ‘responsibility<br />
remit’ here also extends to taking all<br />
reasonable steps needed to ensure that such<br />
62<br />
www.risk-uk.com
Training and Career Development<br />
equipment is installed by a competent<br />
professional. Some manufacturers and<br />
installation companies do routinely outsource<br />
the installation and maintenance of security<br />
systems, but this is where a real risk can arise.<br />
To date, there hasn’t been any recognised<br />
means by which to check that a subcontractor’s<br />
competencies and background<br />
pass muster. By contrast, in the gas industry<br />
both installers and maintenance engineers are<br />
necessarily required to be Gas Safe (previously<br />
CORGI)-registered.<br />
Qualified installers<br />
As the security and fire sectors move<br />
increasingly towards integration, competent<br />
and demonstrably qualified systems installers<br />
and engineers are needed to ensure that<br />
systems design, installation, servicing and<br />
operation are all fit for purpose, comply with<br />
current standards and, importantly, meet the<br />
procuring end user’s needs.<br />
Often overlooked by procurers and end users<br />
are the issues relating to the retention of<br />
personal data, compliance with legislation such<br />
as the forthcoming EU General Data Protection<br />
Regulation and how that data may be provided<br />
in response to subject access requests. It also<br />
needs to be asked whether the installer or<br />
maintenance technician has been assessed, not<br />
just in terms of their technical competence, but<br />
also when it comes to their background and<br />
probity. System installations at schools and<br />
other sensitive locations in particular require<br />
careful vetting considerations.<br />
To address the absence of any meaningful<br />
regulation or Code of Conduct governing<br />
installers and maintenance technicians, Tavcom<br />
Training has developed a professional Register<br />
specifically for installers and those who<br />
maintain fire and security systems. On Friday 1<br />
September, the Register of Certified Technical<br />
Security Professionals (to be found at<br />
www.ctsp.org.uk) will go live.<br />
The British Security Industry Association<br />
(BSIA) and Dubai’s security sector Regulator<br />
the Security Industry Regulatory Agency (SIRA)<br />
have both welcomed and endorsed the creation<br />
of the Register.<br />
David Wilkinson, the BSIA’s director of<br />
technical services, said: “We’re very pleased to<br />
see this innovative registration that recognises<br />
many of our security systems members. In such<br />
a challenging technical environment, it’s more<br />
important than ever to demonstrate the<br />
professionalism of the personnel actively<br />
representing our specific market sector.”<br />
In recognising the CTSP Register, Khalifa<br />
Ibrahim Al Saleis (CEO of SIRA) stated: “The<br />
“Eligibility criteria for entry to the Register must be<br />
evidenced and include a sound working knowledge of<br />
electrical/electronic principles”<br />
Dubai Government is renowned in the region for<br />
setting the highest standards across all<br />
elements of security. By law, engineers and<br />
technicians who install and maintain security<br />
systems are required to be licensed. On that<br />
note, the CTSP Register will be another<br />
effective way in which to ensure professional<br />
standards are both achieved and maintained.”<br />
Verifying competencies<br />
The CTSP Register follows the framework of<br />
other professional bodies, including the<br />
Register of Chartered Security Professionals<br />
which is increasingly regarded as the ‘Gold<br />
Standard’ for those operating at the strategic<br />
management level within the security arena.<br />
The CTSP Register provides a resource that<br />
allows end users, contractors and prospective<br />
employers to verify that a given individual is<br />
competent and qualified and has attained the<br />
standard of a Certified Technical Security<br />
Professional (CTSP).<br />
The CTSP registration scheme aims to<br />
formally recognise security systems installers<br />
and maintainers and align them with their<br />
peers across the electrotechnical industries<br />
who possess similar skills/attributes. It also<br />
allows the Registrant to highlight their own<br />
credentials by using the post-nominals of<br />
‘CTSP’ on business marketing materials.<br />
The main disciplines covered by the CTSP<br />
Register are CCTV, access control, intruder and<br />
hold-up alarms, Internet Protocol and<br />
networking solutions and fire alarm systems.<br />
Each field of competence is listed on the CTSP<br />
Register against the Registrant’s profile,<br />
showing that they’re qualified to carry out work<br />
within that specified field.<br />
Eligibility criteria for entry to the Register<br />
must be evidenced and include a recognised<br />
industry-relevant qualification at QCF Level 3, a<br />
good working knowledge of<br />
electrical/electronic principles and a minimum<br />
of 12 months’ worth of practical experience.<br />
Applicants must be of good character and<br />
free from any criminal convictions for<br />
dishonesty, assault or sexual crimes. Two<br />
personal references are required.<br />
Registrants must also maintain a Continuing<br />
Professional Development (CPD) record to<br />
document their ongoing learning and affirm<br />
that they actively demonstrate a commitment<br />
towards their own future in the industry.<br />
*The Certified Technical<br />
Security Professional<br />
registration process is<br />
straightforward and can be<br />
accessed via the website at<br />
www.ctsp.org.uk The website<br />
is now open for those wishing<br />
to express an interest or who<br />
wish to apply immediately.<br />
However, the Register itself<br />
will not go live and be open<br />
to view until Friday 1<br />
September 2017<br />
**As is common with<br />
Registers of this nature,<br />
Registrants are subject to a<br />
Code of Ethics and a<br />
disciplinary process, with the<br />
ultimate sanction being that a<br />
Registrant may be struck off<br />
the Register (thus<br />
subsequently limiting their<br />
ability to operate in the<br />
security systems sector)<br />
Kevin Matthew:<br />
Certified Technical Security<br />
Professional Registrar<br />
63<br />
www.risk-uk.com
Risk in Action<br />
WES+ on fire safety<br />
duty at site of Great<br />
Scotland Yard Hotel<br />
Ramtech Electronics has<br />
supplied its popular WES+<br />
fire alarm system to protect<br />
the original Scotland Yard<br />
Police Station in London<br />
while it’s transformed into a<br />
five-star luxury hotel by<br />
Galliard Homes.<br />
The historic building<br />
served as the headquarters<br />
of the Metropolitan Police Service from 1829 to 1890. The new £110 million<br />
development involves retaining the original Edwardian façade. When<br />
completed, the five-star hotel will offer rooms costing up to £10,000 per night.<br />
Galliard Homes had used hard-wired fire alarm systems on other construction<br />
sites, but found them to be cumbersome. The trailing wires created a trip<br />
hazard, while the process of repositioning the Call Points as work progressed<br />
was deemed to consume too much time.<br />
The WES+ system installed at Great Scotland Yard will trigger a site-wide<br />
alarm even if just one of the manual Call Points or automatic heat/smoke<br />
detectors is activated. This will allow all personnel to evacuate the site and the<br />
Fire and Rescue Service to be alerted at the earliest possible opportunity.<br />
Incorporating heat/smoke detectors into the WES+ fire alarm system means<br />
that the iconic Great Scotland Yard is protected 24/7, even when personnel are<br />
not present on site. Nominated personnel at Galliard Homes will instantly<br />
receive a text alert if any Call Point is activated.<br />
The WES+ fire alarm system, which can be installed with a few simple buttonpresses<br />
to pair the interconnecting Call Points, creates a completely secure<br />
mesh network. The scalable nature of the system means that up to several<br />
thousand units may be paired, making it suitable for large-scale as well as<br />
smaller construction sites. A silent test facility eliminates downtime on site.<br />
As the dangers of fires on construction sites become better understood, an<br />
increasing number of developers are specifying bespoke fire alarm systems.<br />
Trigion orchestrates first class<br />
security solution on behalf of Royal<br />
Academy of Engineering<br />
Trigion has won the security contract at the<br />
Royal Academy of Engineering by dint of<br />
offering a combined security solution including<br />
electronic systems, security guarding,<br />
concierge services and reception cover.<br />
The Royal Academy of Engineering is based<br />
at Prince Philip House, an historic Grade I-listed<br />
building which has recently been renovated to<br />
introduce a contemporary and modern interior<br />
at Carlton House Terrace in central London.<br />
The building forms part of the Royal<br />
Household and is frequently visited by<br />
members of the Royal Family.<br />
This institution provides analysis and policy<br />
support to promote the UK’s role as a great<br />
place in which to do business, taking a lead on<br />
engineering education and investing in the UK’s<br />
world-class research base with a view towards<br />
underpinning innovation. In the wider sense,<br />
the Royal Academy works to improve public<br />
awareness and understanding of engineering.<br />
Speaking about the contract, Neil Ricketts<br />
(technical services director at Trigion) explained<br />
to Risk UK: “We’re proud to have secured the<br />
contract for this impressive location. In adding<br />
it to our expanding portfolio, we look forward<br />
to working with the Royal Academy of<br />
Engineering for many years to come.”<br />
Amthal revises fire and security for<br />
Garston Manor School<br />
Amthal Fire and Security has worked with<br />
Garston Manor School on creating a scalable<br />
solution to upgrade the fire and security<br />
systems in place for the benefit of staff, pupils<br />
and visitors alike.<br />
Located in Hertfordshire, Garston Manor<br />
School is a specialist school for pupils with<br />
autism, learning difficulties and speech and<br />
language problems. The vision is to ensure all<br />
students leave the school as confident and<br />
self-reliant individuals following a learning<br />
experience that’s rewarding and enjoyable.<br />
To ensure that all members of staff can<br />
focus on this mission, Amthal carried out an<br />
investigative site visit to understand the<br />
existing fire and security systems in place and<br />
make recommendations on how to build upon,<br />
complement and maintain them by dint of<br />
using the latest technology.<br />
The local fire and security specialist<br />
carefully created a works programme to<br />
complete additional works and, at the same<br />
time, ensure that a maintenance programme<br />
was in place to look after all intruder, CCTV<br />
and fire safety systems on site.<br />
Caroline Caisley, school business manager<br />
at Garston Manor School, said: “Security is,<br />
quite rightly, an absolute priority for the<br />
school, right from the perimeter and the site<br />
boundaries through to all internal areas.<br />
Amthal Fire and Security understands this and<br />
duly developed a works programme to<br />
maintain all of our fire and security systems.”<br />
64<br />
www.risk-uk.com
Risk in Action<br />
St George in the East Church<br />
Vicarage safeguarded thanks to<br />
all-new video door entry and<br />
intruder alarm systems<br />
Delta Security, the CCTV and access control<br />
specialist, has installed all-new video door<br />
entry and intruder alarm systems for the<br />
vicarage attached to St George in the East<br />
Church on behalf of long-standing client the<br />
London Diocesan Fund.<br />
The London Diocesan Fund is responsible<br />
for the administration and maintenance of all<br />
420 Church of England parishes located<br />
within the M25 region. That estate<br />
comprises approximately 600 properties.<br />
Managers of the Fund have worked with<br />
Delta Security for eight years on their CCTV<br />
and access control requirements, totalling<br />
circa 50 security projects per year.<br />
Kenny Cathro, head of operational housing<br />
for the London Diocesan Fund, explained:<br />
“Vicars can receive visitors at any time of the<br />
day or night, from those people organising<br />
weddings and funerals through to troubled<br />
individuals seeking some form of financial<br />
and/or spiritual support. It’s important that<br />
vicars have full control over whom they let<br />
into their residences.”<br />
A Videx door entry system has been<br />
installed at the St George in the East Church<br />
Vicarage, with an LCD screen that provides<br />
clear video footage of who’s trying to gain<br />
access. The vicar can speak to the visitor via<br />
a handset if they wish or do nothing without<br />
letting the visitor know they’re at home.<br />
Security has been further enhanced with a<br />
state-of-the-art wireless Visonic intruder<br />
alarm system that works with up to 60<br />
wireless devices. Users have remote access<br />
functionality via a specifically-designed App.<br />
In conclusion, Cathro informed Risk UK:<br />
“For me, it’s about working with suppliers<br />
who are honest and straightforward in<br />
providing the level of security we need and<br />
at a price point that we can afford. These<br />
needs are met by Delta Security.”<br />
Intelligent fire safety system from Advanced protects The<br />
Hippodrome Arts Centre<br />
An intelligent fire safety system<br />
from Advanced has been chosen to<br />
protect The Hippodrome Arts<br />
Centre, a newly-opened community<br />
hub housed in an historic listed<br />
building located in Eyemouth.<br />
Opened in 2016 and managed by<br />
a community interest company, The<br />
Hippodrome serves as a muchneeded<br />
Arts Centre and performance space for members of the local<br />
community. This landmark 1830s construction was originally a granary and has<br />
accommodated various uses through the years, most recently serving as a<br />
Fishermens’ Mission before closing in 2012.<br />
A pop-up cafe in the building, which was nicknamed ‘The Hippodrome’ by the<br />
fishermen who used to socialise there, offers a meeting and event space for<br />
visitors and members of the local community.<br />
The installation of the new fire system was undertaken by the team at longtime<br />
Advanced partner Safe Services Ltd, who duly specified the latest MxPro 5<br />
fire panel. The MxPro 5 range is a popular multiprotocol choice.<br />
Graeme Millar of Safe Services Ltd said: “An open protocol system was<br />
specified for the installation and, having used Advanced systems in the past,<br />
we knew the company’s panels would be ideal for the Eyemouth project.”<br />
Ian Tod, owner of The Hippodrome, commented: “As well as being a tourist<br />
attraction, The Hippodrome is an important venue that locals use year-round,<br />
so it’s essential that we have a reliable and effective fire system in place that’s<br />
adaptable for future expansion or upgrades. When we discussed the available<br />
options with Graeme and his team, MxPro seemed the ideal solution.”<br />
The MxPro 5 panel installed at The Hippodrome is a single loop system that<br />
covers both the entire ground floor and the roof space of the building.<br />
Dacorum takes digital leaps in Borough security with<br />
Security Center<br />
The Borough of Dacorum, a district in the<br />
county of Hertfordshire, counts<br />
approximately 150,000 residents and a<br />
growing number of businesses among its<br />
population. To enhance its services,<br />
Dacorum Borough Council invested in a<br />
new district-wide wireless network and<br />
began plans to upgrade its security<br />
operations and technologies.<br />
Previously, the Council was working<br />
with old analogue systems that were very limiting, not to mention the fact that<br />
they ran separately on different computers. The goal was to put in place a new<br />
and modern system that had the flexibility to easily integrate new<br />
technologies, and that would also afford members of the dedicated operations<br />
team one easy solution to access and manage everything.<br />
Dacorum Borough Council sent out a request for proposals and scored each<br />
system according to the outlined criteria. ID Integrated Security won the bid for<br />
the project. Security Center, the unified security platform by Genetec, has been<br />
installed to combine IP video surveillance, access control, ANPR and several<br />
other key systems within one intuitive solution.<br />
Today, members of the Dacorum Borough Council Control Room team manage<br />
over 170 cameras Borough-wide through Omnicast, the IP video surveillance<br />
system of Security Center.<br />
Photograph: David Howard<br />
65<br />
www.risk-uk.com
Technology in Focus<br />
Videx’s Digital GSM allows for<br />
integrated proximity access control<br />
Videx has launched its new digital GSM system that<br />
can provide access control for a wide range of<br />
gated properties, office blocks, apartments and<br />
commercial buildings.<br />
The new system uses mobile technology to<br />
communicate and operate doors, automatic gates,<br />
car parks and remote site applications, making it a<br />
perfect security solution for unmanned sites and<br />
communications outside of normal business hours.<br />
It’s available as part of the popular 4000 Series<br />
modular door entry system. The solution features a<br />
vandal-resistant surface and flush panel and can<br />
call up to 500 users, each with a divert facility of up to three additional<br />
numbers should the others be engaged or unanswered.<br />
Neil Thomas, national sales manager at Videx, stated: “The GSM system<br />
offers a number of advanced features. For example, the large graphical display<br />
enables departments and company names to be shown with an easy-to-use<br />
scroll facility, helping people to search for the business they’re visiting.”<br />
www.videxuk.com<br />
KBC launches range of videooptimised<br />
PoE switches<br />
KBC Networks – the manufacturer of<br />
industrial transmission equipment for<br />
analogue, IP and HD transmission systems –<br />
has expanded its industrial Ethernet switch<br />
range with a series of Power over Ethernet<br />
(PoE) switches.<br />
With the PoE data ports on the switches<br />
supplying power directly to the attached<br />
networked device, these additions to the<br />
KBC IP transmission range render new<br />
installations and system additions faster,<br />
easier and more flexible. The new hardened<br />
units are designed for a wide range of<br />
industrial, non-conditioned and outdoor<br />
applications with extended operating<br />
temperature ranges.<br />
Depending on the model selected, the<br />
switches are either IEEE 802.3af or the<br />
higher-powered IEEE 802.3at-compliant.<br />
www.kbcnetworks.com<br />
Hanwha Techwin Wisenet<br />
X cameras integrated<br />
with leading VMS<br />
Hanwha Techwin has successfully<br />
accelerated the programme to<br />
integrate its popular Wisenet X cameras with leading VMS solutions such as<br />
Genetec Security Center 5.6 and Milestone XProtect.<br />
‘Supercharged’ by the powerful Wisenet 5 chipset, models in the latest<br />
generation of Wisenet X cameras feature Wide Dynamic Range motorised<br />
varifocal low-light lenses. The 26 new H.265 cameras and domes are<br />
collectively able to meet the requirements of virtually any video surveillance<br />
project regardless of the lighting conditions, from bursts of bright sunlight to<br />
almost total darkness, without the need for IR LEDs or supplementary lighting.<br />
“A key element of our ‘We Move With Trust’ philosophy is a commitment to<br />
ensure that our end user customers are able to achieve the full benefits from<br />
their investment in a video surveillance system,” said Bob Hwang, managing<br />
director of Hanwha Techwin Europe.<br />
Hwang continued: “By working in partnership with Genetec, Milestone and<br />
other VMS providers, our Wisenet X cameras can be controlled and monitored<br />
alongside equipment produced by other manufacturers. Regardless of which<br />
platform customers choose, they can expect to have a high degree of control<br />
over their Wisenet X cameras, as well as the flexibility to integrate with<br />
specialist analytics applications and access control.”<br />
Hanwha Techwin’s ranges of cameras and recording devices have also been<br />
successfully integrated with SureView’s Immix CS central station software<br />
platform. This allows the latest Wisenet IP camera series and NVRs, as well as<br />
analogue DVRs, to interact with the Immix CS which is specifically designed to<br />
improve the efficiency of central alarm monitoring stations offering video<br />
monitoring services.<br />
The same level of integration has also been achieved with Immix Command<br />
Centre, a PSIM software platform used by businesses, institutions and<br />
agencies to monitor alarms, access control and situational awareness systems.<br />
www.hanwha-security.eu<br />
OPTEX’s new active infrared beam<br />
series features flexible power source<br />
Sensor manufacturer OPTEX has extended its<br />
range of SmartLine active infrared beams with<br />
the SL-TNR Series of wireless and hybrid entrylevel<br />
outdoor active beams for simple point-topoint<br />
applications.<br />
The SL-TNR Series includes two models: a<br />
30-metre SL-100TNR and the 60-metre SL-<br />
200TNR outdoor battery-powered active beam<br />
that’s ideally suited for protecting smaller<br />
perimeters, open areas and driveways. The<br />
sensor has been designed to work with D-sized<br />
lithium batteries as well as the universal CR123<br />
batteries when using<br />
optional batteryholders<br />
(CRH-5).<br />
All are included<br />
in the SL-TNR-CH<br />
package.<br />
Four D-sized<br />
batteries in the<br />
receiver and<br />
transmitter will<br />
provide up to five years’<br />
worth of operation.<br />
www.optex-europe.com<br />
66<br />
www.risk-uk.com
Technology in Focus<br />
Vista unveils Viper family of IP and<br />
analogue products for risk managers<br />
Vista has introduced the new Viper family. The<br />
range consists of five innovative products and<br />
provides a solution for combining multi-format<br />
recording devices into a single, centrally<br />
controlled platform.<br />
The key benefit of Viper for the end user is<br />
that it allows for the flexibility of combining<br />
existing and new hardware in order to create a<br />
simple platform and a seamless system.<br />
Each product in the family plays an important<br />
role in simplifying recording systems. The Viper<br />
Virtual Matrix Controller (VMC) allows the<br />
system operator to view cameras from multiple<br />
remote Viper NVRs and hybrid DVRs. These<br />
remote devices can be recording standard<br />
analogue CVBS, TVI, AHD or IP cameras. All<br />
cameras are displayed to the operator as one<br />
single system when using the VMC.<br />
The Viper NVRs and DVRs can also be used as<br />
standalone systems. Their advanced ‘Smart’<br />
and ‘Thumbnail’ search facilities greatly<br />
simplify the operator’s task for finding and<br />
reviewing recorded footage.<br />
The patented ‘WARP’ function also means<br />
that a single NVR can become a master unit.<br />
www.vista-cctv.com<br />
Power Centres serve to render<br />
access installations more<br />
cost-effective<br />
Dantech Electronic Engineering, the<br />
manufacturer of power supplies and<br />
ancillary equipment for security<br />
applications, has enabled lower-cost<br />
Paxton Net2 installations with its<br />
DA481 and DA482 integrated access<br />
control Power Centres.<br />
Supporting profitability by reducing<br />
equipment and mains cabling costs,<br />
Power Centres provide reliable 12 V DC<br />
switch-mode power for two (DA481) or<br />
four (DA482) Paxton Net2 PCBs.<br />
The rugged power supply modules<br />
provide two sets of outputs for each<br />
controller position: 500 mA for the controller<br />
and 2 A for lock power. All outputs are<br />
protected by self-resetting fuses and<br />
equipped with status LEDs as standard.<br />
With only a single fire alarm input<br />
required to the Power Centres, lock power<br />
outputs are individually selectable as either<br />
continuously powered or fire-switched.<br />
Two VRLA battery packs up to 12 Ah can<br />
be mounted in the Power Centre, ensuring<br />
continuity of security in the event of a mains<br />
power failure. Mains and battery status may<br />
be monitored via volt-free contacts, while<br />
batteries are protected thanks to automatic<br />
deep-discharge disconnection.<br />
Physical security is assured by the keylockable,<br />
tamper-protected steel enclosure.<br />
www.dantech.uk.com<br />
Elmdene International brings the<br />
company’s dedicated 12 V DC CCTV<br />
PSU range to market<br />
Elmdene International has introduced the<br />
company’s 12 V DC CCTV PSU range. This<br />
range offers end users’ security installers a<br />
professional and neat termination junction<br />
within the PSU enclosure for the video signals<br />
between the camera and the DVR, ensuring an<br />
easy and efficient installation.<br />
This is accomplished by using the 4 or 8-<br />
way BNC ‘Loop IN – Loop OUT’ connections<br />
provided on the Fused Output Modules.<br />
Not only are these units easy to connect, but<br />
the enclosures are of a low-profile and<br />
compact design, with large cable access at the<br />
rear affording installation flexibility and<br />
therefore saving time on given projects.<br />
This range has been specifically designed<br />
for those CCTV installations that employ a<br />
single cabling method for transmitting video<br />
and power. Good examples here would be<br />
Coax + Power (Siamese or Shotgun cable)<br />
and Twisted Pair (UTP cabling).<br />
Another feature of this solution is the<br />
ability to select the type of fusing required.<br />
This is achieved by using the selection<br />
jumper provided on each channel, offering<br />
the security professional the following<br />
choices: 20 mm glass fuse protection<br />
(default F1A), PTC fuse protection (thermal<br />
fuse/self-resetting) and power disconnected<br />
(allows maintenance of the circuit).<br />
This 12 V DC range is currently available in<br />
two power variants: 4A (4 x 1A fused outputs)<br />
and 8A (8 x 1A fused outputs). Each<br />
individually-fused output has its own ‘Health<br />
LED’ allowing quick identification of a faulty<br />
channel in the event of a fault episode (such<br />
as a short circuit) occurring.<br />
www.elmdene.co.uk<br />
67<br />
www.risk-uk.com
thepaper<br />
Business News for Security Professionals<br />
Pro-Activ Publications is embarking on a revolutionary<br />
launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />
latest financial and business information for<br />
professionals operating in the security sector<br />
The Paper will bring subscribers (including CEOs,<br />
managing directors and finance directors within the<br />
UK’s major security businesses) all the latest company<br />
and sector financials, details of business re-brands,<br />
market research and trends and M&A activity<br />
FOR FURTHER INFORMATION<br />
ON THE PAPER CONTACT:<br />
Brian Sims BA (Hons) Hon FSyI<br />
(Editor, The Paper and Risk UK)<br />
Telephone: 020 8295 8304<br />
e-mail: brian.sims@risk-uk.com<br />
www.thepaper.uk.com
Appointments<br />
Helen Ball<br />
Helen Ball has been<br />
promoted to Assistant<br />
Commissioner at the<br />
Metropolitan Police Service<br />
by newly-installed<br />
Commissioner Cressida Dick<br />
and will now lead the Met’s<br />
Professionalism portfolio.<br />
Assistant Commissioner<br />
Ball’s responsibilities will include management<br />
of the Metropolitan Police Service’s Directorate<br />
of Professional Standards, the Inquiry and<br />
Review Support Group, the Specialist Crime<br />
Review Group, general operational support<br />
services and ongoing training.<br />
Ball began her policing career with the<br />
Metropolitan Police Service back in 1987,<br />
undertaking various uniform and detective<br />
roles. Ball was promoted to Commander of the<br />
Operational Command Unit in 2007. Three years<br />
later, Ball joined Thames Valley Police as<br />
Assistant Chief Constable, re-joining the Met in<br />
2012 in the role of Deputy Assistant<br />
Commissioner for Territorial Policing.<br />
In 2013, Ball became the Senior National Coordinator<br />
for Counter-Terrorism Policing ahead<br />
of a secondment to the College of Policing in<br />
2016 as strategic leadership advisor.<br />
A formal start date for the Metropolitan Police<br />
Service’s new Assistant Commissioner will be<br />
confirmed shortly.<br />
Metropolitan Police Service Commissioner<br />
Cressida Dick commented: “I’m delighted to<br />
appoint Helen Ball as our new Assistant<br />
Commissioner for Professionalism. Helen brings<br />
with her enormous experience of working not<br />
just in this organisation, but across policing in<br />
general. Her input and expertise will be<br />
invaluable as we seek to transform and provide<br />
the best possible service for Londoners.”<br />
Paula Warburton<br />
Integrated security solutions developer TDSi<br />
has announced the appointment of Paula<br />
Warburton as the Poole-based business’ new<br />
finance and operations director. Going<br />
forward, Warburton’s vital role will see her<br />
lead the company’s financial, commercial and<br />
operations development.<br />
Warburton joins a growing team at TDSi’s<br />
Dorset hq. In recent months, the company has<br />
appointed a new finance assistant, Luke<br />
Kleszcz, and (as reported in Risk UK’s July<br />
edition) an experienced marketing manager,<br />
namely Francesca Meyrick.<br />
Warburton has an impressive track record in<br />
financial strategy, qualifying as a Chartered<br />
Appointments<br />
Risk UK keeps you up-to-date with all the latest people<br />
moves in the security, fire, IT and Government sectors<br />
Ashish Surti<br />
Colt Technology Services has appointed Ashish<br />
Surti to the role of Chief Information Security<br />
Officer (CISO), reporting directly to Chief<br />
Technology Officer Rajiv Datta.<br />
Surti will now be responsible for Colt’s overall<br />
information and cyber security strategy, while<br />
also heading up the company’s Computer<br />
Security Incident Response Team.<br />
As a provider of network services for some of<br />
the world’s biggest brands, a responsible focus<br />
on information security forms a core part of Colt<br />
Technology Service’s customer experience.<br />
Under Surti’s direction, the business will<br />
strengthen its information security strategy by<br />
continually enhancing and embeddng cyber risk<br />
management and logical security practices into<br />
all company activities. As CISO, Surti will lead<br />
the assessment, evaluation, prioritisation and<br />
mitigation of the internal and external security<br />
threat to Colt’s products, network infrastructure<br />
and business information systems.<br />
“With the ever-present risk of cyber attack<br />
and increasing pressure from global threats,<br />
secure network connectivity matters now more<br />
than ever to organisations across all markets<br />
and industries,” explained Surti.<br />
A highly respected security expert with over<br />
15 years’ experience, Surti joins Colt from TSB<br />
where he served as the company’s first CISO. At<br />
TSB, Surti was accountable for key duties<br />
including information risk management, security<br />
consultancy and, indeed, security architecture.<br />
Accountant in 2000 and assuming her first role<br />
as a financial director back in 2007. Prior to<br />
joining TDSi, Warburton worked as the group<br />
financial director for a prominent property and<br />
construction surveying services organisation.<br />
John Davies, managing director of TDSi,<br />
commented: “TDSi is a fast-moving<br />
international business that requires strong<br />
financial leadership. Paula will now work as<br />
part of the executive team to maintain and<br />
grow our financial health and prosperity.”<br />
Warburton informed Risk UK: “TDSi boasts a<br />
very impressive track record as a truly<br />
innovative manufacturer in the security sector.<br />
My main focus is to ensure that the business<br />
is provided with the necessary management<br />
information and support it needs to excel.”<br />
69<br />
www.risk-uk.com
Appointments<br />
Christopher Evans<br />
Evolution, the integrated security and fire solutions<br />
business, has appointed Christopher Evans as its new<br />
compliance and Health and Safety manager.<br />
Joining the company from Teledyne Reynolds where he<br />
served as environment and Health and Safety officer,<br />
Evans also has extensive compliance experience gained<br />
from a number of lead auditor roles for ISO certification<br />
bodies – among them ISOQAR, IMS International and<br />
Exova BM TRADA – where he was certifying Quality,<br />
Environmental and OHSAS Management Systems.<br />
Prior to working in the private sector, Evans spent 18 years in the Royal Air<br />
Force in the role of ground support equipment bay manager, gaining IOSH<br />
‘Managing Safety’ and ‘Risk Assessor’ qualifications along the way.<br />
Immediate priorities for Evans will be supporting the business on its<br />
transition to ISO 9001:2015, as well as working towards achieving ISO 27001<br />
Security Information Management and ISO 14001 Environmental Management.<br />
“We already have the process systems in place and are currently monitoring<br />
and conducting audits to ensure that we’re on target for achieving additional<br />
certifications where required along with maintaining our current certifications,”<br />
explained Evans in conversation with Risk UK.<br />
Richard Preece<br />
BeCyberSure, an<br />
organisation covering the<br />
full spectrum of the<br />
information security and<br />
non-compliance threat,<br />
has announced the<br />
appointment of Richard<br />
Preece in the role of<br />
specialist consultant.<br />
Preece will now work with BeCyberSure<br />
customers at Board level in order to assist both<br />
directors and corporate officers in managing<br />
cyber security risk and compliance and<br />
protecting themselves and their businesses<br />
from attack and financial penalties.<br />
Preece is a ‘hybrid’ consultant who connects<br />
leadership and culture, governance, risk<br />
management and capability. His<br />
multidisciplinary approach focuses upon<br />
making organisations more agile and resilient<br />
in order to ‘win in the modern world’. This<br />
process begins by enabling senior leaders to<br />
take ownership of the cyber agenda, aligning<br />
strategy to exploit the opportunities of<br />
innovation, while also mitigating the everpresent<br />
dangers of hyper-connection.<br />
A former director at the cyber resilience,<br />
training, exercising and consultancy services<br />
company CybX, Preece also spent 24 years<br />
serving in the British Army in a wide variety of<br />
operational, intelligence, training and strategy<br />
roles around the world. His experience includes<br />
working with clients in financial services, the<br />
energy, oil and gas sectors, defence and law<br />
enforcement. He holds an MSc in the Design of<br />
Information Systems from Cranfield University.<br />
Phil Lea<br />
British software and<br />
services business<br />
Advanced has hired Phil<br />
Lea as head of security<br />
and compliance, further<br />
strengthening the<br />
company’s leadership<br />
team to deliver<br />
technology solutions with<br />
security very much in mind.<br />
Reporting to CTO Jon Wrennall, Lea will focus<br />
on customer security, security technologies and<br />
governance. This will include enhancing the<br />
tools that Advanced uses to secure its products,<br />
customers and internal IT as well as developing<br />
managed security service offerings for the<br />
business’ hosted and outsourced IT customers.<br />
In addition, Lea will be responsible for coordinating<br />
security governance across<br />
Advanced and ensuring that the entire business<br />
is ready for future regulatory requirements,<br />
including the EU’s upcoming GDPR.<br />
Lea brings with him over 20 years’ IT and<br />
security experience having previously worked<br />
at Fujitsu, Gartner and the Department for Work<br />
and Pensions. At Fujitsu, he spent over eight<br />
years as managing security consultant.<br />
Ben Davies<br />
Videx, the door entry<br />
and access control<br />
solutions developer, has<br />
appointed two new<br />
sales managers in order<br />
to drive business<br />
opportunity and growth<br />
in key areas across both<br />
the UK and Ireland.<br />
Ben Davies (pictured) joins the company<br />
as South East regional manager with over ten<br />
years’ experience gained in the door entry<br />
market where he has worked for several<br />
high-profile access control companies in the<br />
UK. Davies excels in generating new<br />
business, growing the profitability of existing<br />
clients and exceeding sales targets.<br />
Billy Paton takes on the role of manager<br />
for Scotland and Ireland, whereby he’ll be<br />
responsible for generating new business<br />
across both countries as well as managing<br />
existing customers and relationships.<br />
Paton has worked in the access control<br />
sector for nearly 20 years now and on behalf<br />
of numerous security, installation and door<br />
entry sales companies.<br />
Speaking about his new role at Videx,<br />
Davies said: “I’m very excited to join and<br />
share my experience with the Videx team.”<br />
70<br />
www.risk-uk.com
BENCHMARK<br />
Smart Solutions<br />
BENCHMARK<br />
Innovative and smart solutions can add value and benefits to<br />
modern systems for customers. With the technological landscape<br />
rapidly evolving, the Benchmark Smart Solutions project assesses<br />
the potential on offer from system integration, advanced<br />
connectivity and intelligent technology. Bringing together field trials<br />
and assessments, proof of concept and real-world experience of<br />
implementing smart solutions, it represents an essential resource<br />
for all involved in innovative system design.<br />
Launching in 2017, Benchmark Smart Solutions will be the industry’s only real-world resource for<br />
security professionals who are intent on offering added value through the delivery of smarter solutions.<br />
@Benchmark_Smart<br />
Partner Companies<br />
www.benchmarksmart.com
Best Value Security Products from Insight Security<br />
www.insight-security.com Tel: +44 (0)1273 475500<br />
...and<br />
lots<br />
more<br />
Computer<br />
Security<br />
Anti-Climb Paints<br />
& Barriers<br />
Metal Detectors<br />
(inc. Walkthru)<br />
Security, Search<br />
& Safety Mirrors<br />
Security Screws &<br />
Fastenings<br />
Padlocks, Hasps<br />
& Security Chains<br />
Key Safes & Key<br />
Control Products<br />
Traffic Flow &<br />
Management<br />
see our<br />
website<br />
ACCESS CONTROL<br />
KERI SYSTEMS UK LTD<br />
Tel: + 44 (0) 1763 273 243<br />
Fax: + 44 (0) 1763 274 106<br />
Email: sales@kerisystems.co.uk<br />
www.kerisystems.co.uk<br />
ACCESS CONTROL<br />
ACCESS CONTROL<br />
ACT<br />
ACT – Ireland, Unit C1, South City Business Park,<br />
Tallaght, Dublin, D24 PN28.Ireland. Tel: +353 1 960 1100<br />
ACT - United Kingdom, 601 Birchwood One, Dewhurst Road,<br />
Warrington, WA3 7GB. Tel: +44 161 236 9488<br />
sales@act.eu www.act.eu<br />
ACCESS CONTROL – BARRIERS, GATES, CCTV<br />
ABSOLUTE ACCESS<br />
Aberford Road, Leeds, LS15 4EF<br />
Tel: 01132 813511<br />
E: richard.samwell@absoluteaccess.co.uk<br />
www.absoluteaccess.co.uk<br />
Access Control, Automatic Gates, Barriers, Blockers, CCTV<br />
ACCESS CONTROL<br />
COVA SECURITY GATES LTD<br />
Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards<br />
Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68<br />
Tel: 01293 553888 Fax: 01293 611007<br />
Email: sales@covasecuritygates.com<br />
Web: www.covasecuritygates.com<br />
ACCESS CONTROL & DOOR HARDWARE<br />
ALPRO ARCHITECTURAL HARDWARE<br />
Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks,<br />
Waterproof Keypads, Door Closers, Deadlocks plus many more<br />
T: 01202 676262 Fax: 01202 680101<br />
E: info@alpro.co.uk<br />
Web: www.alpro.co.uk<br />
ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />
HTC PARKING AND SECURITY LIMITED<br />
St. James’ Bus. Centre, Wilderspool Causeway,<br />
Warrington Cheshire WA4 6PS<br />
Tel 01925 552740 M: 07969 650 394<br />
info@htcparkingandsecurity.co.uk<br />
www.htcparkingandsecurity.co.uk<br />
ACCESS CONTROL<br />
INTEGRATED DESIGN LIMITED<br />
Integrated Design Limited, Feltham Point,<br />
Air Park Way, Feltham, Middlesex. TW13 7EQ<br />
Tel: +44 (0) 208 890 5550<br />
sales@idl.co.uk<br />
www.fastlane-turnstiles.com<br />
ACCESS CONTROL<br />
SECURE ACCESS TECHNOLOGY LIMITED<br />
Authorised Dealer<br />
Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />
Email: info@secure-access.co.uk<br />
Website: www.secure-access.co.uk<br />
ACCESS CONTROL MANUFACTURER<br />
NORTECH CONTROL SYSTEMS LTD.<br />
Nortech House, William Brown Close<br />
Llantarnam Park, Cwmbran NP44 3AB<br />
Tel: 01633 485533<br />
Email: sales@nortechcontrol.com<br />
www.nortechcontrol.com<br />
Custom Designed Equipment<br />
• Indicator Panels<br />
• Complex Door Interlocking<br />
• Sequence Control<br />
• Door Status Systems<br />
• Panic Alarms<br />
<br />
• Bespoke Products<br />
www.hoyles.com<br />
sales@hoyles.com<br />
Tel: +44 (0)1744 886600<br />
ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES<br />
UKB INTERNATIONAL LTD<br />
Planet Place, Newcastle upon Tyne<br />
Tyne and Wear NE12 6RD<br />
Tel: 0845 643 2122<br />
Email: sales@ukbinternational.com<br />
Web: www.ukbinternational.com<br />
Hoyles are the UK’s leading supplier of<br />
custom designed equipment for the<br />
security and access control industry.<br />
From simple indicator panels to<br />
complex door interlock systems.<br />
BUSINESS CONTINUITY<br />
ACCESS CONTROL, INTRUSION DETECTION AND VIDEO MANAGEMENT<br />
VANDERBILT INTERNATIONAL (UK) LTD<br />
Suite 7, Castlegate Business Park<br />
Caldicot, South Wales NP26 5AD UK<br />
Main: +44 (0) 2036 300 670<br />
email: info.uk@vanderbiltindustries.com<br />
web: www.vanderbiltindustries.com<br />
BUSINESS CONTINUITY MANAGEMENT<br />
CONTINUITY FORUM<br />
Creating Continuity ....... Building Resilience<br />
A not-for-profit organisation providing help and support<br />
Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845<br />
Email: membership@continuityforum.org<br />
Web: www.continuityforum.org<br />
www.insight-security.com Tel: +44 (0)1273 475500
CCTV<br />
CCTV<br />
Rapid Deployment Digital IP High Resolution CCTV<br />
40 hour battery, Solar, Wind Turbine and Thermal Imaging<br />
Wired or wireless communication fixed IP<br />
CE Certified<br />
Modicam Europe, 5 Station Road, Shepreth,<br />
Cambridgeshire SG8 6PZ<br />
www.modicam.com sales@modicameurope.com<br />
CCTV SPECIALISTS<br />
PLETTAC SECURITY LTD<br />
Unit 39 Sir Frank Whittle Business Centre,<br />
Great Central Way, Rugby, Warwickshire CV21 3XH<br />
Tel: 01788 567811 Fax: 01788 544 549<br />
Email: jackie@plettac.co.uk<br />
www.plettac.co.uk<br />
CONTROL ROOM & MONITORING SERVICES<br />
CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS<br />
ALTRON COMMUNICATIONS EQUIPMENT LTD<br />
Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />
Tel: +44 (0) 1269 831431<br />
Email: cctvsales@altron.co.uk<br />
Web: www.altron.co.uk<br />
CCTV<br />
G-TEC<br />
Gtec House, 35-37 Whitton Dene<br />
Hounslow, Middlesex TW3 2JN<br />
Tel: 0208 898 9500<br />
www.gtecsecurity.co.uk<br />
sales@gtecsecurity.co.uk<br />
ADVANCED MONITORING SERVICES<br />
EUROTECH MONITORING SERVICES LTD.<br />
Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring<br />
• Vehicle Tracking • Message Handling<br />
• Help Desk Facilities • Keyholding/Alarm Response<br />
Tel: 0208 889 0475 Fax: 0208 889 6679<br />
E-MAIL eurotech@eurotechmonitoring.net<br />
Web: www.eurotechmonitoring.net<br />
DISTRIBUTORS<br />
CCTV/IP SOLUTIONS<br />
DALLMEIER UK LTD<br />
3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH<br />
Tel: +44 (0) 117 303 9 303<br />
Fax: +44 (0) 117 303 9 302<br />
Email: dallmeieruk@dallmeier.com<br />
SPECIALISTS IN HD CCTV<br />
MaxxOne<br />
Unit A10 Pear Mill, Lower Bredbury, Stockport. SK6 2BP<br />
Tel +44 (0)161 430 3849<br />
www.maxxone.com<br />
sales@onlinesecurityproducts.co.uk<br />
www.onlinesecurityproducts.co.uk<br />
CCTV & IP SECURITY SOLUTIONS<br />
PANASONIC SYSTEM COMMUNICATIONS COMPANY<br />
EUROPE<br />
Panasonic House, Willoughby Road<br />
Bracknell, Berkshire RG12 8FP UK<br />
Tel: 0207 0226530<br />
Email: info@business.panasonic.co.uk<br />
AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />
DISTRIBUTOR OF SECURITY AND LOW VOLTAGE PRODUCTS.<br />
ADI GLOBAL DISTRIBUTION<br />
Distributor of electronic security systems and solutions for over 250 leading manufacturers, the company<br />
also offers an internal technical support team, dedicated field support engineers along with a suite of<br />
training courses and services. ADI also offers a variety of fast, reliable delivery options, including specified<br />
time delivery, next day or collection from any one of 28 branches nationwide. Plus, with an ADI online<br />
account, installers can order up to 7pm for next day delivery.<br />
Tel: 0161 767 2990 Fax: 0161 767 2999 Email: sales.uk@adiglobal.com www.adiglobal.com/uk<br />
COMMUNICATIONS & TRANSMISSION EQUIPMENT<br />
KBC NETWORKS LTD.<br />
Barham Court, Teston, Maidstone, Kent ME18 5BZ<br />
www.kbcnetworks.com<br />
Phone: 01622 618787<br />
Fax: 020 7100 8147<br />
Email: emeasales@kbcnetworks.com<br />
WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS,<br />
PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.<br />
MAYFLEX<br />
Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ<br />
Tel: 0800 881 5199<br />
Email: securitysales@mayflex.com<br />
Web: www.mayflex.com<br />
DIGITAL IP CCTV<br />
SESYS LTD<br />
High resolution ATEX certified cameras, rapid deployment<br />
cameras and fixed IP CCTV surveillance solutions available with<br />
wired or wireless communications.<br />
1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG<br />
Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333<br />
Email: info@sesys.co.uk www.sesys.co.uk<br />
www.insight-security.com Tel: +44 (0)1273 475500
THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESS<br />
CONTROL AND INTRUDER DETECTION SOLUTIONS<br />
NORBAIN SD LTD<br />
210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP<br />
Tel: 0118 912 5000 Fax: 0118 912 5001<br />
www.norbain.com<br />
Email: info@norbain.com<br />
INTEGRATED SECURITY SOLUTIONS<br />
INNER RANGE EUROPE LTD<br />
Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead,<br />
Reading, Berkshire RG74GB, United Kingdom<br />
Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001<br />
Email: ireurope@innerrange.co.uk<br />
www.innerrange.com<br />
UK LEADERS IN BIG BRAND CCTV DISTRIBUTION<br />
SATSECURE<br />
Hikivision & MaxxOne (logos) Authorised Dealer<br />
Unit A10 Pear Mill, Lower Bredbury,<br />
Stockport. SK6 2BP<br />
Tel +44 (0)161 430 3849<br />
www.satsecure.uk<br />
IDENTIFICATION<br />
PERIMETER PROTECTION<br />
ADVANCED PRESENCE DETECTION AND SECURITY LIGHTING SYSTEMS<br />
GJD MANUFACTURING LTD<br />
Unit 2 Birch Business Park, Whittle Lane, Heywood, OL10 2SX<br />
Tel: + 44 (0) 1706 363998<br />
Fax: + 44 (0) 1706 363991<br />
Email: info@gjd.co.uk<br />
www.gjd.co.uk<br />
PERIMETER PROTECTION<br />
GPS PERIMETER SYSTEMS LTD<br />
14 Low Farm Place, Moulton Park<br />
Northampton, NN3 6HY UK<br />
Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />
E-mail: info@gpsperimeter.co.uk<br />
Web site: www.gpsperimeter.co.uk<br />
COMPLETE SOLUTIONS FOR IDENTIFICATION<br />
DATABAC GROUP LIMITED<br />
1 The Ashway Centre, Elm Crescent,<br />
Kingston upon Thames, Surrey KT2 6HH<br />
Tel: +44 (0)20 8546 9826<br />
Fax:+44 (0)20 8547 1026<br />
enquiries@databac.com<br />
INDUSTRY ORGANISATIONS<br />
POWER<br />
POWER SUPPLIES – DC SWITCH MODE AND AC<br />
DYCON LTD<br />
Unit A, Cwm Cynon Business Park, Mountain Ash, CF45 4ER<br />
Tel: 01443 471900 Fax: 01443 479 374<br />
Email: sales@dyconpower.com<br />
www.dyconpower.com<br />
TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY<br />
BRITISH SECURITY INDUSTRY ASSOCIATION<br />
Tel: 0845 389 3889<br />
Email: info@bsia.co.uk<br />
Website: www.bsia.co.uk<br />
Twitter: @thebsia<br />
THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY<br />
SSAIB<br />
7-11 Earsdon Road, West Monkseaton<br />
Whitley Bay, Tyne & Wear<br />
NE25 9SX<br />
Tel: 0191 2963242<br />
Web: www.ssaib.org<br />
INTEGRATED SECURITY SOLUTIONS<br />
STANDBY POWER<br />
UPS SYSTEMS PLC<br />
Herongate, Hungerford, Berkshire RG17 0YU<br />
Tel: 01488 680500<br />
sales@upssystems.co.uk<br />
www.upssystems.co.uk<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
ADEPT POWER SOLUTIONS LTD<br />
Adept House, 65 South Way, Walworth Business Park<br />
Andover, Hants SP10 5AF<br />
Tel: 01264 351415 Fax: 01264 351217<br />
Web: www.adeptpower.co.uk<br />
E-mail: sales@adeptpower.co.uk<br />
SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />
HONEYWELL SECURITY AND FIRE<br />
Tel: +44 (0) 844 8000 235<br />
E-mail: securitysales@honeywell.com<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
UNINTERRUPTIBLE POWER SUPPLIES LTD<br />
Woodgate, Bartley Wood Business Park<br />
Hook, Hampshire RG27 9XA<br />
Tel: 01256 386700 5152 e-mail:<br />
sales@upspower.co.uk<br />
www.upspower.co.uk<br />
www.insight-security.com Tel: +44 (0)1273 475500
SECURITY<br />
ANTI-CLIMB SOLUTIONS & SECURITY PRODUCT SPECIALISTS<br />
INSIGHT SECURITY<br />
Units 1 & 2 Cliffe Industrial Estate<br />
Lewes, East Sussex BN8 6JL<br />
Tel: 01273 475500<br />
Email:info@insight-security.com<br />
www.insight-security.com<br />
CASH & VALUABLES IN TRANSIT<br />
CONTRACT SECURITY SERVICES LTD<br />
Challenger House, 125 Gunnersbury Lane, London W3 8LH<br />
Tel: 020 8752 0160 Fax: 020 8992 9536<br />
E: info@contractsecurity.co.uk<br />
E: sales@contractsecurity.co.uk<br />
Web: www.contractsecurity.co.uk<br />
QUALITY SECURITY AND SUPPORT SERVICES<br />
CONSTANT SECURITY SERVICES<br />
Cliff Street, Rotherham, South Yorkshire S64 9HU<br />
Tel: 0845 330 4400<br />
Email: contact@constant-services.com<br />
www.constant-services.com<br />
ONLINE SECURITY SUPERMARKET<br />
EBUYELECTRICAL.COM<br />
Lincoln House,<br />
Malcolm Street<br />
Derby DE23 8LT<br />
Tel: 0871 208 1187<br />
www.ebuyelectrical.com<br />
LIFE SAFETY EQUIPMENT<br />
C-TEC<br />
Challenge Way, Martland Park,<br />
Wigan WN5 OLD United Kingdom<br />
Tel: +44 (0) 1942 322744<br />
Fax: +44 (0) 1942 829867<br />
Website: www.c-tec.com<br />
PERIMETER SECURITY<br />
TAKEX EUROPE LTD<br />
Aviary Court, Wade Road, Basingstoke<br />
Hampshire RG24 8PE<br />
Tel: +44 (0) 1256 475555<br />
Fax: +44 (0) 1256 466268<br />
Email: sales@takex.com<br />
Web: www.takex.com<br />
FENCING SPECIALISTS<br />
J B CORRIE & CO LTD<br />
Frenchmans Road<br />
Petersfield, Hampshire GU32 3AP<br />
Tel: 01730 237100<br />
Fax: 01730 264915<br />
email: fencing@jbcorrie.co.uk<br />
INTRUSION DETECTION AND PERIMETER PROTECTION<br />
OPTEX (EUROPE) LTD<br />
Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre<br />
optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B<br />
Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ<br />
Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311<br />
Email: sales@optex-europe.com<br />
www.optex-europe.com<br />
SECURITY EQUIPMENT<br />
PYRONIX LIMITED<br />
Secure House, Braithwell Way, Hellaby,<br />
Rotherham, South Yorkshire, S66 8QY.<br />
Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042<br />
www.facebook.com/Pyronix<br />
www.linkedin.com/company/pyronix www.twitter.com/pyronix<br />
SECURITY SYSTEMS<br />
BOSCH SECURITY SYSTEMS LTD<br />
PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />
Tel: 0330 1239979<br />
E-mail: uk.securitysystems@bosch.com<br />
Web: uk.boschsecurity.com<br />
INTRUDER AND FIRE PRODUCTS<br />
CQR SECURITY<br />
125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />
Tel: 0151 606 1000<br />
Fax: 0151 606 1122<br />
Email: andyw@cqr.co.uk<br />
www.cqr.co.uk<br />
SECURITY EQUIPMENT<br />
CASTLE<br />
Secure House, Braithwell Way, Hellaby,<br />
Rotherham, South Yorkshire, S66 8QY<br />
TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042<br />
www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity<br />
www.twitter.com/castlesecurity<br />
SECURE CONNECTIVITY PROVIDERS<br />
CSL<br />
T: +44 (0)1895 474 474<br />
sales@csldual.com<br />
@CSLDualCom<br />
www.csldual.com<br />
SECURITY PRODUCTS<br />
EATON<br />
Eaton is one of the world’s leading manufacturers of security equipment<br />
its Scantronic and Menvier product lines are suitable for all types of<br />
commercial and residential installations.<br />
Tel: 01594 545 400 Email: securitysales@eaton.com<br />
Web: www.uk.eaton.com Twitter: @securityTP<br />
INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS<br />
RISCO GROUP<br />
Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton,<br />
Manchester, M24 2SS<br />
Tel: 0161 655 5500 Fax: 0161 655 5501<br />
Email: sales@riscogroup.co.uk<br />
Web: www.riscogroup.com/uk<br />
SECURITY SYSTEMS<br />
VICON INDUSTRIES LTD.<br />
Brunel Way, Fareham<br />
Hampshire, PO15 5TX<br />
United Kingdom<br />
www.vicon.com<br />
www.insight-security.com Tel: +44 (0)1273 475500