04.08.2017 Views

RiskUKAugust2017

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

August 2017<br />

www.risk-uk.com<br />

Security and Fire Management<br />

Visions of Tomorrow’s World<br />

The Roadmap for Physical and IT Security Convergence<br />

News Analysis: Counter-Terrorism Procedural Reviews<br />

Violence Risk Management: Safeguards in the Workplace<br />

Business Resilience: Focusing on Successes and Failures<br />

Fire Safety Management and Installation Supplement


Simple & Easy Installation<br />

Integrated Security - Access Control<br />

Inception is an integrated access<br />

control and security alarm system with<br />

a design edge that sets it apart from the pack.<br />

Featuring built in web based software, the Inception<br />

system is simple to access using a web browser on a<br />

Computer, Tablet or Smartphone.<br />

With a step by step commissioning guide and outstanding user interface,<br />

Inception is easy to install and very easy to operate.<br />

For more information, visit www.innerrange.com/inception.<br />

There you will find installation guides and videos to help you<br />

get the most out of your Inception system.<br />

IN<br />

DESIGNED<br />

A U ST R A<br />

R<br />

LIA<br />

Security<br />

Alarm<br />

Access<br />

Control<br />

Automation<br />

No Software<br />

Required<br />

Multiple<br />

Devices<br />

Easy Setup<br />

with Checklist<br />

Prompting<br />

Send IP Alarms via<br />

the Multipath-IP<br />

Network<br />

Visit www.innerrange.com or call 0845 470 5000 for further information


August 2017<br />

Contents<br />

44 Meet The Security Company<br />

In association with the NSI, Risk UK continues its new ‘Meet The<br />

Security Company’ series by asking Cobra Security’s company<br />

director Stephen McComb the key questions of the day<br />

ISO 22316: Preparing for Brexit (pp14-15)<br />

5 Editorial Comment<br />

6 News Update<br />

EU Home Affairs Sub-Committee Report on Brexit. Surveillance<br />

Camera Commissioner introduces ‘Passport to Compliance’<br />

8 News Analysis: Counter-Terrorism Reviews<br />

MI5 and the National Counter-Terrorism Policing headquarters<br />

are conducting review procedures. Brian Sims reports<br />

11 News Special: BSIA Security Personnel Awards<br />

Brian Sims reports from The Grand Connaught Rooms in London<br />

on this year’s BSIA Security Personnel and Chairman’s Awards<br />

14 Opinion: ISO 22316 Security and Resilience<br />

ISO 22316:2017 on Security and Organisational Resilience has<br />

arrived. John Robinson appraises the content in relation to Brexit<br />

16 Opinion: Security’s VERTEX Voice<br />

Peter Webster takes an in-depth look at what can be done to<br />

make security a far more attractive career choice for females<br />

19 BSIA Briefing<br />

James Kelly details Best Practice for security search procedures<br />

22 Physical and IT Security Convergence<br />

Where are we now on the road to genuine convergence between<br />

physical and IT security? Damien Pezza investigates<br />

47 The Security Institute’s View<br />

Despite the attention afforded to preventing workplace violence,<br />

it seems that we’re no closer to a solution. Richard Diston feels<br />

it’s time to adopt a fresh perspective on the matter<br />

50 In The Spotlight: ASIS International UK Chapter<br />

Allison Wylde suggests that, even with the emergence of<br />

standards and research, there’s still deliberation on an agreed<br />

definition of resilience for today’s organisations<br />

53 FIA Technical Briefing<br />

Following the tragic events at Grenfell Tower in June, there<br />

appears to be a renewed interest around fire safety issues.<br />

Robert Yates focuses on regimes for care homes<br />

57 Security Services: Best Practice Casebook<br />

Organisations must take stock of the ways in which loss<br />

prevention is managed, as Jon Felix observes in detail<br />

60 Cyber Security: Automated Cyber Weapons<br />

Nicola Whiting evaluates the threat of automated cyber weapons<br />

62 Training and Career Development<br />

Next month, the Register of Certified Technical Security<br />

Professionals opens for business. Kevin Matthew has the detail<br />

64 Risk in Action<br />

66 Technology in Focus<br />

69 Appointments<br />

The latest people moves in the security and fire business sectors<br />

24 State of Mind: Developing ‘Risk Culture’<br />

How might you transform your risk culture such that it’s a key<br />

asset in managing risk? Alex Poppleton addresses this issue<br />

26 On The Mark<br />

James Brown highlights the property marking solutions available<br />

for today’s risk and security management professionals<br />

28 Touched By A Physical Presence<br />

David Mundy discusses how security installers are providing<br />

added value on physical security for their end user customers<br />

31 Fire Safety Management and Installation<br />

The FIA, Advanced, the FPA, Klaxon, BAFE and Hochiki Europe all<br />

feature in our regular Fire Safety Supplement<br />

72 The Risk UK Directory<br />

ISSN 1740-3480<br />

Risk UK is published monthly by Pro-Activ Publications<br />

Ltd and specifically aimed at security and risk<br />

management, loss prevention, business continuity and<br />

fire safety professionals operating within the UK’s largest<br />

commercial organisations<br />

© Pro-Activ Publications Ltd 2017<br />

All rights reserved. No part of this publication may be<br />

reproduced or transmitted in any form or by any means<br />

electronic or mechanical (including photocopying, recording<br />

or any information storage and retrieval system) without the<br />

prior written permission of the publisher<br />

The views expressed in Risk UK are not necessarily those of<br />

the publisher<br />

Risk UK is currently available for an annual subscription rate of<br />

£78.00 (UK only)<br />

www.risk-uk.com<br />

Risk UK<br />

PO Box 332<br />

Dartford DA1 9FF<br />

Editor Brian Sims BA (Hons) Hon FSyI<br />

Tel: 0208 295 8304 Mob: 07500 606013<br />

e-mail: brian.sims@risk-uk.com<br />

Design and Production Matt Jarvis<br />

Tel: 0208 295 8310 Fax: 0870 429 2015<br />

e-mail: matt.jarvis@proactivpubs.co.uk<br />

Advertisement Director Paul Amura<br />

Tel: 0208 295 8307 Fax: 01322 292295<br />

e-mail: paul.amura@proactivpubs.co.uk<br />

Administration Tracey Beale<br />

Tel: 0208 295 8306 Fax: 01322 292295<br />

e-mail: tracey.beale@proactivpubs.co.uk<br />

Managing Director Mark Quittenton<br />

Chairman Larry O’Leary<br />

Editorial: 0208 295 8304<br />

Advertising: 0208 295 8307<br />

3<br />

www.risk-uk.com


Premier Elite LCDLP-W<br />

Wireless LCD keypad with Ricochet® mesh technology<br />

Introducing a remarkable new wireless keypad from Texecom. The Premier Elite LCDLP-W is a fully functional, fully programmable<br />

wireless keypad with identical performance and capabilities of wired Premier Elite keypads.<br />

Featuring Ricochet mesh technology, the Premier Elite LCDLP-W operates with a 5-year battery life and completes the range of<br />

‘wire free’ Premier Elite system options, offering faster installations and greater flexibility than ever before.<br />

Outstanding features:<br />

• Wireless keypad with Ricochet mesh technology<br />

• Fully functional keypad; not just an arming station<br />

• Operating speed equivalent to wired keypads<br />

• 5-year battery life with typical usage<br />

(4x AA lithium batteries supplied)<br />

• Completes ‘wire free’ Premier Elite system options<br />

• Requires Premier Elite systems with V3.1 wireless receivers (or higher)<br />

• Integral proximity reader for use with Texecom RFID prox tags<br />

• EN50131-1, EN50131-3, EN50131-5-3, PD6662 Grade 2 Class II<br />

Texecom products are designed<br />

and manufactured in the UK


Editorial Comment<br />

Many applications<br />

The Premier Elite LCDLP-W is designed for use as the<br />

main system keypad, but is also ideal for upgrading<br />

existing systems. Typical uses include:<br />

• Main alarm keypad near front door<br />

• Additional keypad near back door or bedroom<br />

• Remote buildings, such as garages<br />

• Mobile engineer’s keypad<br />

Secure wireless<br />

Ricochet Mesh Technology provides secure, encrypted<br />

wireless communications with unparalleled<br />

performance. Ricochet enabled wireless devices<br />

receive and repeat messages from<br />

other devices. The size, scalability<br />

and range of the entire system<br />

are extended, as wireless<br />

signalling is no longer limited<br />

by point-to-point<br />

communications.<br />

Spot the difference<br />

The Premier Elite LCDLP-W is all but identical to its<br />

wired equivalent - in size, aesthetics and performance.<br />

The only difference is wireless connectivity powered<br />

by Ricochet mesh technology, the world’s most robust<br />

wireless security technology.<br />

Profile Building<br />

The National Business Crime Solution (NBCS) – the not-forprofit<br />

initiative that enables the sharing of data between law<br />

enforcement agencies and the business community in order<br />

to reduce crime – is now embarking on the next stage of its<br />

development after securing significant Government funding.<br />

The award of a six-figure sum is in recognition of the NBCS’<br />

success in supporting the police service in the fight against<br />

persistent and often travelling offenders and enables the<br />

organisation to become self-sustaining, make new appointments<br />

and implement a marketing and awareness campaign (including<br />

the introduction of a new independent corporate identity).<br />

By providing a central repository where business crime data is<br />

submitted, shared and analysed, the NBCS is able to gather the<br />

necessary intelligence needed to more effectively detect, prevent<br />

and respond to crime. In short, it’s function is essential.<br />

The money awarded to the organisation is part of the Police<br />

Transformation Fund, a Home Office programme that marks a<br />

real opportunity for police leaders and Police and Crime<br />

Commissioners to respond to the changing nature of crime.<br />

The new funding is a significant development in the evolution<br />

of the NBCS. Founded by Jason Trigg (the former owner of<br />

Cardinal Security), over the last three years the NBCS has grown<br />

its membership by over 200% to encompass nearly 50<br />

organisations, and acts as a valuable link between separate<br />

police services in the UK and its members by connecting crimes<br />

that would have traditionally been viewed as independent.<br />

Shared information is particularly valuable when looking at<br />

offences involving mobile teams of criminals who are known to<br />

have very specific targets and travel extensively across the UK in<br />

order to commit offences. Prior to the NBCS, collating details of<br />

these crimes and offences would most likely have gone<br />

unnoticed and unpunished.<br />

The NBCS also works closely with a number of policing bodies<br />

including the National Police Chiefs’ Council, in addition to the<br />

National Business Crime Centre. The latter’s operational lead,<br />

namely DCI Georgie Barnard, commented: “This is a unique<br />

service from a trusted partner that truly offers the way forward<br />

for the industry and the police service to work together in<br />

achieving a common goal. The NBCS offers timely information on<br />

crime trends that actively enables businesses in all market<br />

sectors to take better preventative action and realise more<br />

effective engagement with the police.”<br />

Not only will the funding help attract new members, but it will<br />

also enable the NBCS’ strategic priorities – among them<br />

corporate governance, data protection and sustainability – to be<br />

met through its new operating model.<br />

Importantly, the funding will also assist in continuing to<br />

improve the quality of information shared and circulated, protect<br />

those who face the growing risk of threats and violence, capture<br />

the criminals who pose the greatest harm (both physically and<br />

online) to member businesses and deliver a fraud sharing<br />

platform that supports businesses in eradicating persistent<br />

offenders and identifying emerging threats. A win-win scenario.<br />

Brian Sims BA (Hons) Hon FSyI<br />

Editor<br />

www.texe.com<br />

Sales: +44 (0)1706 220460<br />

December 2012<br />

5<br />

www.risk-uk.com


“Barrier to trade and security if data<br />

transfers are hindered post-Brexit”<br />

The Government should pursue full regulatory<br />

equivalence with the European Union (EU) with<br />

respect to data protection in order to ensure<br />

unhindered data flows between the UK and the<br />

EU post-Brexit, offer stability and certainty for<br />

businesses and maintain police and security cooperation.<br />

That’s the considered viewpoint of<br />

the EU Home Affairs Sub-Committee as outlined<br />

in its latest report.<br />

Maintaining unhindered and uninterrupted<br />

data flows between the UK and the EU following<br />

Brexit is an important aim, as any arrangement<br />

that results in greater friction could present a<br />

non-tariff trade barrier that places the UK at a<br />

competitive disadvantage and serves to hinder<br />

both police and security co-operation.<br />

Although the Government has stated that it<br />

“will seek to maintain the stability of data<br />

transfers between the EU, Member States and<br />

the UK”, little detail has so far been offered by<br />

the Conservative Party in terms of how the<br />

Government plans to deliver this outcome.<br />

By looking in depth at four elements of the<br />

EU’s data protection package within the pages<br />

of its report, the EU Home Affairs Sub-<br />

Committee has determined to examine the<br />

options available to the Government for<br />

securing uninterrupted data flows between the<br />

UK and the EU after the UK exits the EU.<br />

These four elements are the General Data<br />

Protection Regulation, the Police and Criminal<br />

Justice Directive, the EU-US Privacy Shield and<br />

the EU-US Umbrella Agreement.<br />

Lord Jay of Ewelme, chairman of the EU Home<br />

Affairs Sub-Committee, stated: “The volume of<br />

data stored electronically and moving across<br />

borders has grown hugely over the last 20<br />

years. Between 2005 and 2012 alone, Internet<br />

traffic across borders increased eighteen-fold.<br />

The maintenance of unhindered data flows is<br />

therefore crucial, both for business and for<br />

effective police co-operation.”<br />

Lord Jay continued: “The Committee has been<br />

concerned by the lack of detail on how the<br />

Government plans to maintain unhindered data<br />

flows post-Brexit. It’s also concerned by the risk<br />

that EU and UK data protection rules could<br />

diverge over time when the UK has left the EU.<br />

To avoid this scenario, the Committee urges the<br />

Government to secure a continuing role for the<br />

Information Commissioner’s Office on the<br />

European Data Protection Board.”<br />

There’s broad consensus among witnesses<br />

that the most effective way to achieve<br />

unhindered flows of data would be to secure<br />

adequacy decisions from the European<br />

Commission under Article 45 of the General<br />

Data Protection Regulation and Article 36 of the<br />

Police and Criminal Justice Directive, thereby<br />

confirming that the UK’s data protection rules<br />

would offer an equivalent standard of<br />

protection to that available within the EU.<br />

Surveillance Camera Commissioner launches ‘Passport to Compliance’<br />

Tony Porter QPM LLB (pictured), the Surveillance Camera Commissioner, has launched a ‘Passport<br />

to Compliance’ document (formerly known as an ‘Operational Requirement’ document).<br />

When organisations are considering the procurement and installation of a surveillance camera<br />

system, it’s crucial to be able to specify what they want the system to do, how they want it to<br />

perform and also to ensure that it complies with all relevant regulations. Of course, how much the<br />

system will cost to procure and operate are also key points to bear in mind.<br />

The ‘Passport to Compliance’ places the responsibility for CCTV system development in the<br />

hands of the organisations that operate them. It guides organisations on the stages they need to<br />

go through when planning, installing and eventually operating surveillance camera systems. The<br />

document should be completed for new systems or where there’s a significant change to an<br />

existing system (for example, due to the addition of a large number of cameras).<br />

Following the ‘Passport to Compliance’ will help organisations to meet the 12 guiding principles<br />

set out in the Surveillance Camera Code of Practice and, while not a guarantee, other relevant<br />

legislation such as the Data Protection Act and the Human Rights Act.<br />

The ‘Passport to Compliance’ is aimed primarily at public space CCTV surveillance systems such<br />

as those operated by local authorities or in large shopping centres, although in practice it can be<br />

used for any type of surveillance camera system.<br />

Surveillance Camera Commissioner Tony Porter commented: “I’m delighted to be able to launch<br />

the ‘Passport to Compliance’. It enhances, updates and simplifies the widely-used Home Office<br />

‘Operational Requirement’ document and aims to reduce technical jargon.”<br />

6<br />

www.risk-uk.com


News Update<br />

“Clarification on regulatory regime<br />

for private security industry<br />

essential” urges BSIA<br />

The British Security Industry Association<br />

(BSIA) is calling for urgent clarification on the<br />

future of the regulatory regime for the private<br />

security industry. This follows on from the<br />

news that a security firm is being investigated<br />

by the Security Industry Authority (SIA) for<br />

allegedly supplying cloned badges to<br />

unlicensed stewards. The company in question<br />

isn’t a BSIA member.<br />

“The industry has faced a great deal of<br />

uncertainty with regards to how it will be<br />

regulated in the future,” explained James<br />

Kelly, CEO at the BSIA (pictured). “This is an<br />

issue that has been ongoing for many years,<br />

despite overwhelming support from the<br />

industry for the transition to a new ‘lighter<br />

touch’ regulatory regime. A proposed system<br />

of business licensing for the security business<br />

sector received extensive backing from the<br />

industry, the Regulator and the Government<br />

following a consultation in 2012, but this is yet<br />

to materialise. This has left all stakeholders<br />

uncertain about the future regulatory<br />

framework which would govern its operations,<br />

as well as the cost of licensing.”<br />

Kelly continued: “An Independent Review of<br />

the SIA was carried out in 2016 during which<br />

the BSIA lobbied for the reaffirmation of<br />

business licensing in place of the current<br />

system. The outcome of this review has been<br />

left in situ with successive Governments for<br />

almost a year and appears no closer to being<br />

published in the foreseeable future.”<br />

In addition, Kelly stated: “Incidents such as<br />

the allegation of cloned badges being<br />

supplied to unlicensed stewards demonstrate<br />

the importance of clear and robust regulation<br />

for the security industry. A business licensing<br />

system would enable the Regulator to revoke<br />

a business’ licence and prevent it from<br />

operating within the industry should the firm<br />

fail to ensure that all of its personnel are<br />

licensed or carry out the required level of due<br />

diligence when sub-contracting work.”<br />

The BSIA is calling for the Government to<br />

“urgently address” the future of the regulatory<br />

regime for the private security industry. This<br />

starts with the results of the Independent<br />

Review of the SIA which, in Kelly’s opinion,<br />

“should be published as a priority.”<br />

Member companies of the BSIA are required<br />

to meet the Trade Association’s stringent<br />

eligibility criteria which serve as an assurance<br />

that those businesses operate in full<br />

compliance with the relevant licensing<br />

requirements (and British and European<br />

Standards) for the services they provide to<br />

their end user cohort.<br />

ASIS UK to host inaugural CSO<br />

Centre for Leadership and<br />

Development meeting in London<br />

ASIS International’s Chief Security Officer<br />

(CSO) Centre for Leadership and Development<br />

brings together the most senior security<br />

professionals from the largest and most<br />

influential organisations in the world.<br />

Now, on Wednesday 4 and Thursday 5<br />

October, ASIS UK will host a meeting – the<br />

first of its kind to take place in central London<br />

– specifically aimed at tackling some of the<br />

issues facing CSOs today, tomorrow and into<br />

the future.<br />

The gathering is to be informed by some<br />

leading thinkers and practitioners in the fields<br />

of risk, resilience and security.<br />

Speakers/participants confirmed thus far<br />

include Dr Jon Arthur (an expert in applied risk<br />

reasoning systems for complex organisations),<br />

Roddy Drummond (head of security at the<br />

Foreign and Commonwealth Office) and<br />

Professor Martin Gill CSyP FSyI (a leading<br />

security academic, researcher and writer and<br />

the director of PRCI).<br />

Additional speakers on the schedule are Dr<br />

Samir Puri (lecturer at Kings College London<br />

within the Department of War Studies), Chris<br />

Smith (global security risk director at HSBC)<br />

and David Thorp (executive director of the<br />

Business Continuity Institute).<br />

The event will begin with an informal<br />

networking reception on Wednesday 4<br />

October and conclude with a gala dinner in the<br />

celebrated Peers’ Dining Room in the Palace of<br />

Westminster.<br />

While attendance is by invitation only, any<br />

individuals who meet (or who are close to<br />

meeting) the eligibility criteria (see below) are<br />

invited to contact ASIS UK’s chairman David<br />

Clark CPP PCI PSP via e-mail at<br />

chairman@asis.org.uk for an invitation.<br />

Typically, CSO Centre membership is limited<br />

to the highest-level security professionals<br />

operational in organisations with turnovers of<br />

$500 million (or equivalent), a company that<br />

provides security services with at least<br />

US$300 million (or equivalent) in gross annual<br />

revenue, a significant Government<br />

(local/regional/national) department or<br />

agency, a significant not-for-profit or nonprofit<br />

organisation or professionals currently<br />

operational at another business, agency,<br />

facility or organisation with distinctive and<br />

notable global or national significance.<br />

7<br />

www.risk-uk.com


MI5 and police in joint review of operational<br />

procedures for counter-terror investigations<br />

Photograph: Harry Metcalfe<br />

Home Secretary Amber<br />

Rudd has announced<br />

that David Anderson<br />

QC, the former<br />

Independent Reviewer<br />

of Terrorism<br />

Legislation, will<br />

provide independent<br />

assurance of the<br />

reviews that MI5 and<br />

the National Counter-<br />

Terrorism Policing<br />

headquarters are<br />

conducting following<br />

the recent terrorist<br />

attacks in London and<br />

Manchester. Brian<br />

Sims reports<br />

The MI5 and police reviews were<br />

commissioned by MI5’s director Andrew<br />

Parker and Metropolitan Police Service<br />

Commissioner Cressida Dick following the<br />

recent attacks at London Bridge/Borough<br />

Market and the Manchester Arena and with the<br />

support of the National Police Chiefs’ Council.<br />

The reviews will examine in detail what was<br />

known and how investigative processes and<br />

decision-making operated prior to the attacks,<br />

and whether any further improvements can be<br />

made to help prevent future acts of terrorism.<br />

This work is scheduled to consider key<br />

elements of the investigative life-cycle,<br />

including processes for assessing incoming<br />

intelligence and prioritising investigations<br />

through to managing the potential risk posed<br />

by individuals after they’re no longer subject to<br />

investigation. It forms part of MI5 and National<br />

Counter-Terrorism Policing’s shared<br />

commitment to continued improvement as the<br />

threat evolves at pace.<br />

David Anderson QC will conclude his work by<br />

the end of October and report the resulting<br />

conclusions to the Home Secretary, copied to<br />

the Prime Minister and the Intelligence and<br />

Security Committee of Parliament.<br />

In a joint statement, Andrew Parker and<br />

Commissioner Cressida Dick said: “Since the<br />

appalling terrorist attacks in London and<br />

Manchester this year, the police and MI5 have<br />

been working relentlessly to investigate the<br />

events that led up to the attacks, pursue those<br />

involved and protect members of the public.”<br />

The statement continues: “After a major<br />

incident, we always look at how we can further<br />

strengthen the highly effective counterterrorism<br />

arrangements that we’ve developed in<br />

the UK over many years. We welcome the<br />

independent assurance that David Anderson<br />

will provide.”<br />

In conclusion, the joint statement reads: “Our<br />

organisations are deeply committed to being<br />

the best we can be at keeping the country safe.<br />

Our work necessarily involves difficult<br />

prioritisation decisions and professional<br />

judgements based on partial information.<br />

Sadly, we cannot stop every plot, but together<br />

with our partners we will do everything in our<br />

power to improve our ability to identify and<br />

disrupt those seeking to do our country harm.”<br />

The threat posed to the UK from terrorism is<br />

complex and ranges from lone actors carrying<br />

out simple, but deadly attacks through to<br />

networks plotting more co-ordinated activities.<br />

MI5, the police service and their law<br />

enforcement partners have together stopped 18<br />

terrorist plots in Great Britain since mid-2013,<br />

including five in the wake of the Westminster<br />

attack in March this year.<br />

At any one time, MI5 and the police service<br />

are reported to be conducting around 500<br />

active international counter-terrorism<br />

investigations involving 3,000 subjects of<br />

interest. In addition to this, there are around<br />

20,000 individuals who’ve been ‘subjects of<br />

interest’ in previous terrorism investigations.<br />

Briefing in Manchester<br />

In mid-June around 750 professionals gathered<br />

at Manchester’s One Central Convention<br />

Complex for a Project Griffin briefing. Attendees<br />

emanated from a range of industry and<br />

business sectors – including retail, hospitality,<br />

entertainment and the travel world – in a bid to<br />

learn how they can protect their organisations<br />

against terrorist attacks and what to do in the<br />

event of a major incident unfolding.<br />

These briefings are typically administered to<br />

groups of between 30 and 50 individuals, with<br />

the previous largest attendance in Manchester<br />

consisting of around 140 attendees. With this<br />

event being delivered to more than five times<br />

that number, it demonstrates the desire of local<br />

businesses to keep their employees – and<br />

members of the wider public – safe from harm<br />

at all times.<br />

8<br />

www.risk-uk.com


News Analysis: Counter-Terrorism Procedural Reviews<br />

The briefing consisted of a package devised<br />

by the National Counter-Terrorism Security<br />

Office (NaCTSO) and delivered by Counter-<br />

Terrorism Security Advisors from the North<br />

West Counter-Terrorism Unit (NWCTU).<br />

Project Griffin is a NaCTSO initiative designed<br />

to help protect workers, businesses and<br />

communities from the threat of terrorism.<br />

Launched back in 2004, the initiative builds on<br />

existing partnerships between counterterrorism<br />

police, the Emergency Services and<br />

local companies, helping businesses to improve<br />

their security posture and preparedness plans<br />

and better protect their staff and customers.<br />

In this day and age, companies have to guard<br />

against a variety of potential threats ranging<br />

from crude attacks by lone attackers inspired<br />

by terrorist or extremist political ideologies<br />

through to sophisticated and directed plots<br />

requiring significant planning and resources.<br />

Sense of perspective<br />

Detective Chief Superintendent Scott Wilson,<br />

the national police co-ordinator for Protect and<br />

Prepare, said: “Project Griffin has been a vitally<br />

important strand of our policing strategy for<br />

more than a decade, but the recent atrocities in<br />

Manchester and London have brought into<br />

sharp focus the necessity for the police and our<br />

partners in industry to work even more closely<br />

together. I’m delighted to see that this<br />

partnership is flourishing in the North West,<br />

and I’m absolutely sure this is typical of the<br />

close relationship police forces around the<br />

country share with local businesses.”<br />

Wilson continued: “While there’s no specific<br />

intelligence to suggest that an attack is<br />

imminent, the threat from terrorism is ‘Severe’<br />

and that means an attack is highly likely. It’s<br />

important to keep a sense of perspective,<br />

though. Our aim is to move public thinking from<br />

an irrational fear of terrorism to a rational<br />

concern, whereby the nature of the current<br />

threat is better understood and staff members<br />

know what to do if they find themselves<br />

involved at the scene of a terrorist incident or if<br />

they should witness the preparations for a<br />

future attack. This may include recognising and<br />

reporting suspicious behaviour, dealing with a<br />

suspect package or reacting to a firearms or<br />

weapons attack, even though such events are,<br />

thankfully, quite rare.”<br />

In addition, Wilson stated: “We’ve recently<br />

renewed our crowded places guidance to<br />

ensure that both the public and industry have<br />

the most up-to-date information on how to<br />

mitigate the risk from terrorism.”<br />

Vaughan Allen, CEO of CityCo (the city centre<br />

management company for Manchester and<br />

“The threat posed to the UK from terrorism is complex and<br />

ranges from lone actors carrying out simple, but deadly<br />

attacks to networks plotting more co-ordinated activities”<br />

Salford), explained: “Since the tragic night of<br />

the bombing at the Manchester Arena, CityCo<br />

has been working with businesses to keep the<br />

city open and help ensure that everyone<br />

working in, living in and visiting Manchester<br />

feels safe. It’s a sign of how seriously<br />

businesses take the need for their staff to be as<br />

well informed as possible that this Project<br />

Griffin event is one of the largest-ever counterterrorism<br />

awareness events organised in the<br />

UK. CityCo will continue to work with our<br />

partners at the NWCTU and the Greater<br />

Manchester Police in the months ahead, rolling<br />

out further training and ensuring businesses<br />

have up-to-date and accurate advice to hand.”<br />

Travel sector training<br />

The travel industry is providing training for staff<br />

working in the UK and overseas in a bid to help<br />

keep holidaymakers safe this summer. Over<br />

23,000 employees have attended education<br />

sessions, which include detailed advice on how<br />

to spot suspicious items and activities, as well<br />

as what to do in the event of a major incident.<br />

The programme is being run in partnership<br />

with the NaCTSO which has created a short<br />

presentation offering travel companies an easyto-deliver<br />

counter-terrorism awareness product.<br />

This covers the core counter-terrorism guidance<br />

required by staff working in crowded places<br />

either at home or abroad.<br />

The product – which is funded by the Foreign<br />

and Commonwealth Office – includes three new<br />

films which show staff what to expect and how<br />

to respond in the safest way possible to the<br />

terrorist threat: ‘Identify and Respond to<br />

Suspicious Behaviour’, ‘Identify and Deal with<br />

Suspicious Items’ and ‘How to React to<br />

Firearms or Weapons Attacks’.<br />

The presentation is accompanied by a helpful<br />

two-page leaflet which can be printed and<br />

distributed as an aide memoire for staff and<br />

refers to the ACT: Action Counters Terrorism<br />

guidelines for reporting any suspicious<br />

behaviour or items.<br />

In addition to this industry-specific training,<br />

holidaymakers travelling abroad this summer<br />

are also being urged to watch a new video<br />

designed to help keep them safe in the event of<br />

a terrorist attack. This film is four minutes long<br />

and outlines key actions to take if terrorists<br />

strike. The message is ‘Run, Hide, Tell’, which<br />

was first launched by UK police in late 2015.<br />

David Anderson QC<br />

Home Secretary Amber Rudd<br />

9<br />

www.risk-uk.com


“<br />

MY PASSION IS<br />

ALWAYS GOING THAT<br />

EXTRA MILE -<br />

WHATEVER THE JOB<br />

”<br />

Steve Lang, CNC Programmer/Operator, 3 years with Jacksons<br />

OUR PASSION<br />

IS YOUR SECURITY<br />

We combine the highest quality<br />

perimeter security fencing and<br />

gates with seventy years of expertise<br />

to provide you with the right solution<br />

for your project, large or small.<br />

www.jacksons-fencing.co.uk<br />

0800 953 3730<br />

Jacksons<br />

Fencing


News Special: BSIA Security Personnel Awards 2017<br />

BSIA’s national industry award winners<br />

demonstrate high value of security personnel<br />

The BSIA’s Security Personnel Awards are in<br />

their nineteenth year and have been<br />

sponsored by Camberford Law plc –<br />

specialist insurance broker to the security<br />

industry – since their inception. These awards<br />

serve to recognise the talent, dedication, skill<br />

and bravery exhibited by security personnel in<br />

their roles each and every day.<br />

This year, there was a special commendation,<br />

runner-up and overall winner for each of the<br />

five categories: Outstanding Act, Best<br />

Newcomer, Best Use of Technology, Service to<br />

the Customer and Best Team.<br />

Discussing the value of the Security<br />

Personnel Awards, James Kelly (CEO at the<br />

BSIA) explained: “The past year has been<br />

extremely testing for the United Kingdom, with<br />

numerous terror events shocking the nation. In<br />

times like these, it’s important to recognise the<br />

true value of security personnel who are often<br />

the first responders during emergency<br />

situations and play a vital role in keeping our<br />

country safe. This year’s winners are a perfect<br />

testament to the truly high calibre of personnel<br />

we have working within our industry.”<br />

Kelly went on to add: “We received a high<br />

number of fantastic nominations this year,<br />

making the judging process a particularly tough<br />

one. This year’s winners should be extremely<br />

proud of their achievements.”<br />

This year’s Keynote Speaker was renowned<br />

publisher, writer and broadcaster Andrew Neil,<br />

who entertained attendees with fascinating<br />

observations about the political climate in the<br />

UK, Europe and the United States.<br />

Talking about the company’s long-standing<br />

support of the Security Personnel Awards,<br />

David Ottewill (managing director at<br />

Camberford Law plc) commented: “Camberford<br />

Law plc is delighted to be involved in<br />

sponsoring the BSIA’s Security Personnel<br />

Awards 2017. We applaud and encourage the<br />

promotion of professionalism within the<br />

industry and also the hard work and dedication<br />

required by the award entrants to achieve their<br />

accolades. We’ve been insuring security<br />

companies for over 30 years now. All-too-often,<br />

though, the diligent work of security companies<br />

and their constituent individuals is overlooked,<br />

despite the fact that these businesses and<br />

individuals play such a crucial role in today’s<br />

public life. We feel it’s only fair to recognise the<br />

outstanding achievers in this field.”<br />

The British Security Industry Association (BSIA) has<br />

announced the national winners of its 2017 Security<br />

Personnel Awards. The award presentations took place on<br />

Wednesday 12 July at the Trade Association’s Annual<br />

Luncheon, held at The Grand Connaught Rooms near<br />

London’s Covent Garden. Brian Sims reports<br />

The overall winners, runners-up and special<br />

commendations in 2017 are as follows:<br />

Outstanding Act<br />

• Overall Winner: Megin Dorrian – The<br />

Westgrove Group<br />

• Runner-Up: John Atkins – Vision Security<br />

Group (VSG)<br />

• Special Commendation: Charles Stewart –<br />

SecuriGroup Services<br />

Best Newcomer<br />

• Overall Winner: Simon Searle – Vision<br />

Security Group (VSG)<br />

• Runner-Up: Erin Jackson – SecuriGroup<br />

Services<br />

• Special Commendation: John Moore –<br />

Robinson Services<br />

Best Use of Technology<br />

• Overall Winner: Andrew Horner – Kings<br />

Security Systems<br />

• Runner-Up: Steven McKenzie – SecuriGroup<br />

Services<br />

• Special Commendation: Jason Thomas – The<br />

Westgrove Group<br />

Keynote Speaker Andrew Neil<br />

(above) addresses the BSIA’s<br />

members and guests at The<br />

Grand Connaught Rooms in<br />

central London<br />

11<br />

www.risk-uk.com


News Special: BSIA Security Personnel Awards 2017<br />

Tom Lewis (above, left) of The<br />

Westgrove Group and the<br />

BSIA’s CEO James Kelly<br />

BSIA Chairman Dirk Wilson<br />

The BSIA Chairman’s Award<br />

presented to Tim Geddes<br />

Service to the Customer<br />

• Overall Winner: Tom Lewis – The Westgrove<br />

Group<br />

• Runner-Up: Winston Cooper – Mitie Total<br />

Security Management<br />

• Special Commendation: Phillip Hillman –<br />

Mitie Total Security Management<br />

Best Team<br />

• Overall Winner: Union Square Security Team –<br />

Vision Security Group (VSG)<br />

• Runner-Up: North Bristol NHS Trust<br />

Southmead Hospital Security Team – OCS<br />

Group UK<br />

• Special Commendation: JLL Bridgewater Place<br />

Security Team – Vision Security Group (VSG)<br />

BSIA Chairman’s Awards<br />

Some of the security industry’s most influential<br />

practitioners were duly presented with<br />

prestigious BSIA Chairman’s Awards in<br />

recognition of the significant contributions<br />

they’ve made to the ongoing success of the<br />

UK’s private security industry.<br />

The awards were personally selected by the<br />

BSIA’s chairman, Dirk Wilson, and serve to<br />

recognise significant or life-long contributions<br />

in five different categories: Contribution to<br />

Standards, Contribution to the Community,<br />

Contribution to the Industry, Contribution to<br />

Training and Contribution to Exporting.<br />

Again, this year’s award winners were<br />

presented with their accolades at the Trade<br />

Association’s Annual Luncheon. Speaking<br />

ahead of the presentations, Dirk Wilson<br />

commented: “It’s a huge pleasure to formally<br />

recognise the contributions of this year’s<br />

winners, all of whom have made a lasting<br />

impression on the security sector through their<br />

dedication, commitment and passion.”<br />

The Chairman’s Award for Contribution to<br />

Standards was presented to Tim Geddes.<br />

Geddes has been described as one of the<br />

‘founding fathers’ of the electronic security<br />

industry and has helped to shape the industry<br />

we have today over the course of more than<br />

four decades. He was involved in the days of<br />

NACOSS, liaising with the police service to<br />

regulate and reduce the number of false alarms<br />

from which the early systems suffered.<br />

The Chairman’s Award for Contribution to the<br />

Community was presented to David Cain and<br />

Fiona Noble of Sword Security (Northern<br />

Ireland). Cain and Noble have both been an<br />

“This year’s winners of the BSIA’s Security Personnel<br />

Awards are a perfect testament to the truly high calibre of<br />

personnel we have working within our industry”<br />

active and consistent presence in the local<br />

communities in which the business operates.<br />

They’ve sponsored local sports teams for many<br />

years and have also arranged regular<br />

fundraising activities on behalf of charities such<br />

as the Northern Ireland Children’s Hospice, the<br />

Girls Brigade, Macmillan Cancer Charities and<br />

Action Cancer (to name but a few).<br />

The Association chose to honour the late<br />

Mike Tennent, one of the industry’s finest and<br />

most influential individuals, with the<br />

prestigious Chairman’s Award for Contribution<br />

to the Industry. Tennent founded Tavcom<br />

Training back in 1994 and built the business to<br />

become the leader in security systems training<br />

in the UK and a major provider in other nations<br />

across Africa, the Middle East and beyond.<br />

Tavcom’s growth was never at the expense of<br />

quality as Tennent insisted on the very highest<br />

standards. He played a pivotal role in the<br />

professionalisation of an industry wherein<br />

many aspects of regulation, licensing and<br />

training were once minimal or non-existent.<br />

Tennent was a true Gentleman and is very<br />

much missed by his many friends and<br />

colleagues right across the security industry.<br />

Lucie Banham of the Banham Group was<br />

deservedly presented with the Chairman’s<br />

Award for Contribution to Training. This award<br />

is particularly special as it serves to recognise<br />

those who’ve made significant contributions<br />

towards equipping the industry with the skills<br />

and knowledge required for it to develop.<br />

Banham received the 2017 award for her<br />

involvement in the establishment of The<br />

Banham Academy, which offers traineeship and<br />

apprenticeship schemes for those individuals<br />

looking to develop a career in the security and<br />

emergency systems industry.<br />

Lucie Banham has shown staunch support for<br />

apprenticeships in general and, more<br />

specifically, how an apprenticeship in the<br />

security industry is a fantastic career prospect<br />

with plenty of opportunity for progression.<br />

Last, but not least, the Chairman’s Award for<br />

Contribution to Exporting was presented to GJD<br />

Manufacturing, a specialist in the design,<br />

manufacture and supply of professional<br />

external detector equipment.<br />

The company’s products range from CCTV<br />

and lighting controllers through to white light<br />

and infrared LED illuminators used in the<br />

intruder surveillance industry.<br />

Highly regarded within the UK’s security<br />

industry and, indeed, throughout a wide range<br />

of international markets, the company has built<br />

an impressive network of trusted distributors<br />

worldwide and is a regular exhibitor at the<br />

industry’s key trade shows around the globe.<br />

12<br />

www.risk-uk.com


ISO 22316: Preparing for Brexit<br />

The long-awaited ISO<br />

22316:2017 Security<br />

and Resilience –<br />

Organisational<br />

Resilience – Principles<br />

and Attributes has<br />

arrived. At first read it<br />

doesn’t seem to offer<br />

much – a long title,<br />

but just ten pages of<br />

what might be<br />

construed as rather<br />

dry and heavilyengineered<br />

clauses.<br />

Surely, there must be<br />

value in there if only it<br />

can be unlocked? John<br />

Robinson decided to<br />

apply his own test<br />

that’s perhaps a little<br />

‘off-piste’ as far as<br />

conventional reviews<br />

go, but relevant for<br />

many: Brexit<br />

John Robinson MSc CEng FBCI:<br />

Managing Director of INONI<br />

14<br />

www.risk-uk.com<br />

Brexit isn’t just there to be ‘enjoyed’ by us<br />

British. Rather, it’s an international<br />

phenomenon. Set aside your personal<br />

views and think about it neutrally from the<br />

perspective of your organisation. Whether<br />

you’re based in Manchester, Milan or<br />

Melbourne, whether you represent a charity, a<br />

public body or a plc, there’s a good chance<br />

Brexit may affect what it is you do as a<br />

practising professional and, if ISO 22316 can<br />

help you deal with this, so much the better.<br />

Brexit represents a systemic, multi-faceted,<br />

enduring, changing and complex risk. It carries<br />

the possibility of both losses and opportunities<br />

that may be linked and, circumstantially, felt<br />

differently by each of us at different times. It’s a<br />

moving feast or famine and business resilience<br />

seems to be a necessary stabilising quality if<br />

we’re to complete the ‘exit’ journey acceptably.<br />

The approach adopted here is to work<br />

through the International Standard, interpreting<br />

the guidance it offers with Brexit as the subject.<br />

What follows is modestly informed opinion and<br />

will undoubtedly not apply for all, but reflects a<br />

personal search for value in the widest sense.<br />

By their very nature standards are generic<br />

and require interpretation for the context in<br />

which they’re applied. You simply cannot pick<br />

one up and expect to extract an instant list of<br />

tasks that must be performed in order for<br />

compliance. Instead, you must work at it (or<br />

maybe ask a specialist to do it for you).<br />

ISO 22316 begins by explaining what it<br />

means to be resilient. In short, this amounts to<br />

preserving the delivery of strategic objectives<br />

by anticipating and responding, absorbing<br />

shock and adapting to change. It states that<br />

there’s no absolute measure of resilience or a<br />

definitive goal, but that it’s possible to become<br />

more (or less) resilient. We cannot sensibly<br />

expect to compare between organisations as<br />

we all have different resilience appetites, but<br />

this truism doesn’t prevent us from creating<br />

internal Key Performance Indicators as a basis<br />

for improvement or convergence.<br />

Further, ISO 22316 states that resilience is<br />

brought about by the interaction of certain<br />

organisational attributes and activities and the<br />

application of specific expertise. It points out<br />

that these interactions are then shaped by how<br />

we handle uncertainty, decision-making and<br />

behaviour. This suggests that, once we know<br />

what drives our individual resilience condition,<br />

we should then be able to measure, manage<br />

and improve upon it.<br />

Most of the ISO document’s substance lies in<br />

three main sections. Section 4: Principles is a<br />

distillation, possibly acting as an aide-memoire,<br />

whereas the Attributes section defines more<br />

granular resilience indicators. Evaluation then<br />

provides a form of closed-loop control that<br />

keeps your resilience strategy aligned with<br />

organisational needs. The remainder of this<br />

discourse focuses on applying the Attributes.<br />

Clarity of purpose<br />

In this first of nine Attributes, ISO outlines that<br />

organisations clearly setting out their position<br />

and communicating it effectively are more likely<br />

to be resilient. This reflects the form of<br />

guidance used throughout and that resilience<br />

drivers will vary between organisations.<br />

Attribute structure is also broadly consistent,<br />

wherein each Attribute has a headline directive<br />

statement followed by a list of capabilities that<br />

should be enhanced and demonstrated and a<br />

list of activities that facilitate the capabilities,<br />

requiring prioritisation and resourcing.<br />

In this case, the ‘Clarity of purpose’ Attribute<br />

implies that we need all our resilience-related<br />

goals to be aligned, promoting synergy and<br />

reducing conflict and making the initiative roll<br />

smoothly. It implies that we should design a<br />

strategy that takes us safely through Brexit<br />

without compromising the business, make sure<br />

the strategy is adopted by the Board,<br />

communicate it internally and externally where<br />

appropriate, deliver the strategy while<br />

maximising resilience value for the organisation<br />

and repeat, monitor, adapt and improve.<br />

Note that the final continuous improvement<br />

point applies for all attributes and isn’t<br />

repeated hereafter. It ensures the system is<br />

optimised against organisational goals, in this<br />

case for Brexit. One would expect it to be<br />

applied fairly frequently to deal with the rapid<br />

rate of change.<br />

This Attribute provides overall stability and<br />

directional control. However, it begs the<br />

practical question: “How do we select the right<br />

strategy and what are its constituent parts?”<br />

As previously explained, this is unique for<br />

you. However, there are clues elsewhere and<br />

we’ll come to them in due course.<br />

Understanding context<br />

ISO 22316 suggests that organisations who<br />

understand their context are more likely to be<br />

resilient. Context is a term that doesn’t appear<br />

in the terminology listings, but in simplifying


Opinion: ISO 22316 Security and Organisational Resilience (Part One)<br />

the term it can be taken to mean ‘everything<br />

relevant to us’. It includes all direct and indirect<br />

external parties and internal organisational<br />

components, in addition to all of the ways in<br />

which they interrelate.<br />

Understanding context provides a basis for<br />

us to explain and anticipate the effects of<br />

change, and this is clearly valuable for Brexit as<br />

we want to know what might happen. It’s our<br />

very own crystal ball.<br />

Influencing context implies shaping our<br />

environment internally, but also persuading<br />

third parties to align with our strategy,<br />

modifying agreements and lobbying decisionmakers.<br />

It represents a powerful destinyshaping<br />

force and is something to which we<br />

might aspire.<br />

Steps we may take include developing a<br />

detailed context model for the organisation,<br />

thinking big and looking beyond the immediate<br />

(up and downstream and including a focus on<br />

competitors), factoring-in all relevant ‘climates’<br />

such as operational, commercial, socio-political<br />

and economic, mapping all the potential Brexitrelated<br />

sources of vulnerability, concentration<br />

and change and both identifying and<br />

strengthening relationships and entities that<br />

support the strategy.<br />

For me, the idea of a contextual map is the<br />

beating heart of resilience management.<br />

Effective leadership<br />

This Attribute implies that resilience will be<br />

enhanced by delegation and empowerment<br />

during periods of uncertainty and disruption. I<br />

would interpret this as instruction to carefully<br />

select and appoint a Brexit programme owner<br />

with a targeted brief and delegated authority.<br />

It implies that the nominated individual<br />

should be prepared to embrace and leverage<br />

the change, address problems and seize<br />

opportunities, be ready to identify and promote<br />

Brexit-compatible practices, be technically<br />

adept, adaptable, innovative and empowered to<br />

make tactical and strategic decisions.<br />

ISO 22316 seems to be saying: ‘Build a team<br />

with an executive leader with the experience to<br />

understand our unique position and resulting<br />

Brexit challenge, and whom the Board trusts<br />

enough to wield delegated authority when<br />

unplanned-for changes demand a fast<br />

response.’ Again, this will not apply for all<br />

businesses, but seems appropriate for those<br />

who perceive a major threat.<br />

Creating a resilient culture<br />

A strong culture implies a close-knit<br />

organisation whose members share consistent<br />

and ingrained values and beliefs. A weak or<br />

dilute culture suggests variance, fragmentation,<br />

uncertainty, fragility and diluted resilience. It<br />

follows that those with a strong culture are<br />

more likely to be resilient.<br />

This applies for Brexit due to its multi-faceted<br />

profile and its strong political, economic, social<br />

and emotional implications for individuals both<br />

within and outside of the workplace. It implies<br />

that we might enhance our cultural resilience<br />

by finding out what drives employees’ attitudes<br />

to Brexit and whether views are shared,<br />

determining if people will broadly resist or<br />

support the strategy, deciding how to position,<br />

promote and deliver the strategy while building<br />

support, encouraging people to innovate,<br />

improve and back the strategy and empowering<br />

them to identify and communicate Brexitrelated<br />

threats and opportunities.<br />

Culture is a slow-moving beast. It has inertia<br />

and naturally resists any wholesale change of<br />

mindset, implying that a resilient culture will<br />

not be created overnight, either in the general<br />

sense or, indeed, for Brexit. It also means that,<br />

in the short term, we may need to work with<br />

what we have and search for supportive<br />

influences that might already be present,<br />

adding only culturally-compatible new ideas.<br />

In the UK, Brexit has already caused divisions<br />

along unexpected lines between friends,<br />

businesses and even within families, with many<br />

still holding opposing views. With so great a<br />

divide, there seems little chance of imposing a<br />

Brexit position on a workforce. Indeed, it would<br />

be ill-advised to even consider doing so.<br />

*Next month: Attribute 5<br />

(Shared information and<br />

knowledge), Attribute 6<br />

(Availability of resources),<br />

Attribute 7 (Development and<br />

co-ordination of management<br />

disciplines), Attribute 8<br />

(Supporting continual<br />

improvement) and Attribute 9<br />

(Ability to anticipate and<br />

manage change) in focus<br />

“Brexit represents a systemic, multi-faceted, enduring,<br />

changing and complex risk. It carries the possibility of both<br />

losses and opportunities that may be linked”<br />

15<br />

www.risk-uk.com


All Things Being Equal<br />

recommends that the proportion of females<br />

present on FTSE 350 companies’ Boards of<br />

Directors should reach 33% by 2020.<br />

It’s not just the security industry that has<br />

work to do in this area, either. According to<br />

UCATT, women make up only 11% of the<br />

construction workforce and just 1% of workers<br />

on site, while the Office for National Statistics<br />

has stated that the number of females working<br />

as roofers, bricklayers and glaziers is so low as<br />

to be unmeasurable.<br />

Similarly, the latest figures issued from the<br />

2016 Women in IT Scorecard research –<br />

published by the BCS (The Chartered Institute<br />

for IT) and The Tech Partnership – show that<br />

females account for just 17% of IT<br />

professionals. It’s a figure that has remained<br />

essentially unchanged over the three years the<br />

report has been made available.<br />

Amid the wider<br />

requirement for<br />

gender diversity in the<br />

workplace, the<br />

number of females<br />

resident within the<br />

security industry<br />

remains<br />

disconcertingly low.<br />

Peter Webster<br />

examines why there’s<br />

such a gender<br />

imbalance and<br />

outlines what can be<br />

done to make security<br />

a more attractive<br />

career choice for<br />

women<br />

According to the British Security Industry<br />

Association (BSIA), an estimated 352,000<br />

individuals are presently employed by the<br />

UK’s security industry, yet research conducted<br />

by the Security Industry Authority (SIA) in 2015,<br />

which looked at gender and other protected<br />

characteristics, revealed that only 9% of SIA<br />

licence holders are female. Although there are<br />

indeed a number of women occupying highprofile<br />

roles within the industry, it remains the<br />

case that security is still very much a maledominated<br />

domain.<br />

There’s little doubt that the industry has an<br />

image problem. Just ask a member of the public<br />

to describe a security professional and the<br />

chances are that one of the first words<br />

mentioned will be ‘male’. The national media<br />

has to take its share of the blame here, with<br />

security officers on TV traditionally portrayed<br />

as men who are often lazy, overweight and<br />

‘jobsworth’ when it comes to their attitude.<br />

However, the blame for the current gender<br />

disparity cannot be foisted upon the media<br />

alone. It’s also still a general assumption that<br />

the security sector is misogynistic in nature,<br />

which is something that’s enough to dissuade<br />

many women from joining the ranks.<br />

Achieving greater gender diversity in the<br />

workplace is a massive problem in general,<br />

even at the highest levels of management. The<br />

Cranfield University School of Management<br />

Report found that, in 2016, the number of<br />

women with places on the top Boards of FTSE<br />

100 companies stood at 26%. This report<br />

Business benefits<br />

There’s plenty of research available to suggest<br />

that gender diversity is crucial for innovation<br />

and growth in a given business sector. For<br />

example, the Harvard Business Review reported<br />

that leaders who give diverse voices equal<br />

airtime are nearly twice as likely as others to<br />

unleash value-driving insights, while those<br />

employees working in a ‘speak up’ culture are<br />

over three times as likely to contribute their full<br />

innovative potential to the host business. In<br />

addition, customers can see the benefits of a<br />

more gender-balanced workforce.<br />

Going forward, if the security industry is to<br />

reach its full potential then, put simply, it needs<br />

the skills and mindsets of both men and women<br />

in order to do so.<br />

There’s already a severe skills shortage<br />

across the sector. Failing to attract enough<br />

candidates from the 50% of the UK workforce<br />

who are female can only add to this and will<br />

seriously hamper growth. The problem was<br />

highlighted earlier this year, in fact, when the<br />

Sunderland Echo reported that Peterlee-based<br />

Steadfast Security had been advertising for<br />

female officers for months, but applicants were<br />

proving impossible to find.<br />

Various initiatives have been kick-started to<br />

redress the balance, among them the Women’s<br />

Security Society, which aims to create an<br />

inspirational networking forum for females<br />

operating in the industry. Frankly, anything that<br />

helps to attract women into the security<br />

industry and address the negative perceptions<br />

of it should be welcomed.<br />

16<br />

www.risk-uk.com


Opinion: Security’s VERTEX Voice<br />

All that said, it’s dangerous to fall into the<br />

trap of gender stereotyping and positive<br />

discrimination. To put it bluntly, statements<br />

about ‘what women bring to the workplace’ are<br />

potentially damaging both to the cause itself<br />

and to its desired effect. If we are to have a<br />

truly inclusive and equal industry, women will<br />

demonstrate their strengths through their<br />

achievements. The more female role models<br />

there are then so much the better.<br />

Awareness is key to addressing the problem.<br />

Visits to schools, student visits to facilities,<br />

mentoring, work placements and campaigns<br />

designed to drive interest in the sector would<br />

all help to attract more women into the security<br />

workforce. Trade shows should invite more<br />

high-profile female guest speakers to educate<br />

the industry on how they’ve achieved their<br />

success and the benefits businesses can<br />

receive by dint of more gender diversity.<br />

Theory of evolution<br />

Particularly so when it comes to security<br />

guarding, security companies have often had to<br />

consider the physical attributes of an employee<br />

and their ability to ‘stand their ground’ in some<br />

challenging situations. There’s little point in<br />

pretending otherwise: security guarding isn’t a<br />

glamour profession.<br />

Combined with the inherent risks involved in<br />

this type of work, front line security officers<br />

who are not prepared to work hard, put up with<br />

long and often anti-social hours – including<br />

working at weekends – and travel to and from<br />

work at odd times of the night will soon realise<br />

that it’s not for them.<br />

The security industry is constantly evolving,<br />

though, and besides the aforementioned front<br />

line roles, the influx of technology in all aspects<br />

of security is creating new opportunities.<br />

Security is becoming so much more than just<br />

having a physical presence, with technology<br />

including electronic surveillance and access<br />

control making traditional guarding functions<br />

less dominant. However, technology cannot<br />

replace the need for human beings to interface<br />

with one another, which is precisely why, in<br />

modern security, good communication skills<br />

and high levels of emotional intelligence are<br />

required from professionals of both genders.<br />

Emotional intelligence<br />

Since 1990, Peter Salovey and John Mayer have<br />

been the leading researchers on the subject of<br />

emotional intelligence.<br />

Salovey and Mayer define it as the sub-set of<br />

social intelligence that involves the ability to<br />

monitor one’s own and others’ feelings and<br />

emotions, to discriminate among them and to<br />

use this information for guiding one’s thinking<br />

and actions.<br />

While many males have excellent levels of<br />

emotional intelligence, women have been found<br />

to be especially good at identifying, assessing<br />

and controlling situations, often diffusing<br />

particularly volatile epidodes through tone of<br />

voice and body language. Since men and<br />

women tend to think and solve problems<br />

differently, the combined gender talent pool<br />

can be amazing.<br />

A family affair<br />

Modern family life is changing just as rapidly as<br />

working life and accommodating this work/life<br />

balance is something that companies have to<br />

consider. Although the nature of security work<br />

itself might appeal to women, there’s no<br />

escaping the fact that much of it takes place<br />

outside of the 9.00 am to 5.00 pm parameter.<br />

That often makes retaining staff difficult. This is<br />

particularly evident in people of both genders<br />

who have young families and find arranging<br />

childcare a problem because their partners<br />

might also be at work.<br />

Work patterns also need to be more flexible.<br />

The sector must adopt a unified approach to<br />

the issue before the available talent dwindles<br />

still further. There’s a strong argument to<br />

suggest that, if security companies were able to<br />

offer regular hours, then they would be much<br />

closer to having a balanced workforce than they<br />

do at present.<br />

Unfortunately, and as stated, anti-social<br />

hours are an inherent part of the job. Indeed,<br />

it’s an aspect of the role that’s unlikely to ever<br />

change (unless, that is, security companies are<br />

prepared to look seriously at how they can<br />

provide more flexible working hours).<br />

The shortfall in female recruitment takes<br />

place at a time when the sector itself is in<br />

strong growth. This means that opportunities<br />

for employers and employees alike are being<br />

missed. The figures speak for themselves,<br />

though, and the industry needs to take<br />

ownership by attracting female talent.<br />

Although the barriers to gender equality in<br />

the workplace are slowly beginning to change,<br />

it’s fair to state that there’s much more work<br />

still to be done here. True balance can only be<br />

built if the people in leadership positions<br />

understand the many benefits that a diverse<br />

workforce can bring to their operations.<br />

Peter Webster: Chief Executive<br />

of Corps Security<br />

*The author of Risk UK’s regular<br />

column Security’s VERTEX Voice is<br />

Peter Webster, CEO of Corps<br />

Security. This is the space where<br />

Peter examines current and often<br />

key-critical issues directly<br />

affecting the security industry. The<br />

thoughts and opinions expressed<br />

here are intended to generate<br />

debate among practitioners within<br />

the professional security and risk<br />

management sectors. Whether you<br />

agree or disagree with the views<br />

outlined, or would like to make<br />

comment, do let us know (e-mail:<br />

pwebster@corpssecurity.co.uk or<br />

brian.sims@risk-uk.com)<br />

“Various initiatives have been kick-started, among them<br />

the Women’s Security Society, which aims to create an<br />

inspirational networking forum for females in the industry”<br />

17<br />

www.risk-uk.com


Institute of Risk Management<br />

Are your staff risk ready?<br />

<br />

It is essential that your staff have a knowledge of the<br />

principles and practices of effective risk management.<br />

<br />

Enterprise Risk Management is designed to do just that.<br />

What’s in it for employers?<br />

> Managing risks effectively will<br />

lower your costs.<br />

> Turn threats to your business into<br />

opportunities.<br />

> Enhance business performance<br />

and improve risk taking<br />

approaches.<br />

> Develop a motivated, skilled and<br />

knowledgeable team.<br />

> Attract high-calibre professionals<br />

by investing in personal<br />

development.<br />

What’s in it for students?<br />

> Enhance your ability to design<br />

and implement effective risk<br />

management strategies.<br />

> Develop a critical understanding<br />

of the relationship between<br />

risk management, governance,<br />

internal control and compliance.<br />

> Gain an internationally<br />

<br />

months.<br />

> Join our global network of risk<br />

management practitioners.<br />

Distance<br />

Learning<br />

International<br />

Recognition<br />

Relevant for<br />

All Sectors<br />

Email: studentqueries@theirm.org<br />

Phone: +44 (0)20 7709 4125<br />

or visit www.theirm.org/risk-uk


BSIA Briefing<br />

Security personnel operating in the retail<br />

sector are not only a vital form of<br />

protection against criminals, but also very<br />

often the first impression portrayed of a store’s<br />

brand. That being so, it’s critical that security<br />

personnel are well-trained, professional and<br />

presentable to ensure that losses are reduced<br />

and brand integrity constantly maintained.<br />

In the UK, private security personnel are<br />

regulated by the Security Industry Authority<br />

(SIA), an independent body reporting to the<br />

Home Secretary under the Terms and<br />

Conditions of the Private Security Industry Act<br />

2001. The SIA issues licences to private security<br />

personnel who operate in the spheres of<br />

security guarding, door supervision, close<br />

protection, Cash and Valuables in Transit,<br />

Public Space Surveillance (CCTV), key holding<br />

and vehicle immobilisation. This ensures that<br />

those operating within the private security<br />

industry are ‘fit and proper’ and have<br />

undertaken the necessary training and<br />

achieved the required qualifications to do so.<br />

However, the current regulatory ambit<br />

doesn’t extend to the in-house security sector.<br />

In practice, this means that many retailers in<br />

the UK could be employing their own security<br />

staff who are not subject to the same licensing,<br />

training or qualification requirements as those<br />

employed by a private security company.<br />

Within the pages of the security Regulator’s<br />

In-House Licensing Review Outcome Report<br />

(published in May 2009), the recommendation<br />

is that: ‘There is no clearly defined or<br />

substantiated risk to public protection to be<br />

addressed and so we are unable, at this time,<br />

to make a case which would justify extending<br />

the SIA’s remit to include the licensing of inhouse<br />

security officers.’<br />

Despite this, the report does acknowledge<br />

that there are two sides to the debate. First, the<br />

private security industry has long maintained<br />

that in-house security guarding should be<br />

subject to the same legislative and regulatory<br />

conditions to ensure there’s a level playing<br />

field. It has also been argued by the industry<br />

that, if the in-house sector was regulated, then<br />

a significant number of individuals would be<br />

unable to obtain an SIA licence.<br />

Furthermore, the in-house sector is subject to<br />

some form of regulation in other countries,<br />

among them the Republic of Ireland and France.<br />

Although many organisations employing inhouse<br />

security staff will have their own robust<br />

policies and procedures in place for the<br />

recruitment and training of security staff, it<br />

cannot be guaranteed that all are trained to the<br />

necessary level since there’s no legislative or<br />

regulatory requirement for them to be so.<br />

Showing Respect:<br />

Conducting Security Searches<br />

According to the 2016 Retail Crime Survey published in<br />

February by the British Retail Consortium, the cost of crime in<br />

the retail sector has continued to rise. As the first line of<br />

defence within many retail environments, security personnel<br />

have a key role to play in the fight against criminality. Here,<br />

James Kelly discusses how using high quality, professional<br />

security personnel can help to reduce both the financial and<br />

reputational impacts of crime for today’s businesses<br />

Respecting the individual<br />

Recently, the British Security Industry<br />

Association (BSIA) was asked to comment on<br />

the experience of a supermarket customer who<br />

had been stopped and searched in front of a<br />

crowd of other shoppers 1 . The experience left<br />

the woman involved feeling humiliated. The<br />

female concerned was also of the belief that<br />

she had been racially profiled.<br />

While retailers are perfectly within their<br />

rights to stop and question customers they<br />

suspect may be attempting to steal from their<br />

premises, they absolutely must have proper<br />

grounds for doing so, while any searches<br />

should be carried out with respect.<br />

To this end, the BSIA has published a Code of<br />

Practice for Security Searches 2 specifically for<br />

companies that offer a search service to<br />

customers (and would, in appropriate cases, be<br />

subject to the provisions of the Private Security<br />

Industry Act 2001), as well as businesses that<br />

directly employ in-house security staff. The<br />

James Kelly: CEO of the British<br />

Security Industry Association<br />

19<br />

www.risk-uk.com


BSIA Briefing<br />

References<br />

1 https://www.theguardian.<br />

com/money/2017/jun/18/<br />

high-street-security-guardsshoppers-theft<br />

2 https://www.bsia.co.uk/<br />

Portals/4/Publications/231-<br />

security-searches-cop.pdf<br />

Code outlines good practice recommendations<br />

for the conducting of searches by personnel<br />

employed to ensure the security and safety of<br />

property and individuals alike.<br />

First, consent to search is always required,<br />

except in those circumstances where statutes<br />

or regulations provide otherwise. There are<br />

serious implications for any person or company<br />

enforcing a search without explicit consent.<br />

Second, those people being searched may<br />

consider the search to be invasive. It’s therefore<br />

important that the searcher understands and<br />

respects the person concerned and operates in<br />

a manner that reduces the impact of that<br />

search. In particular, searchers should avoid<br />

discrimination and show respect for privacy,<br />

cultural differences and religious sensitivities.<br />

As part of this, there should be a definition,<br />

which is understood by all parties, of the object<br />

of the search and a clear definition of when the<br />

search is complete or has been carried out to a<br />

sufficient degree of thoroughness.<br />

Other factors that require to be considered to<br />

ensure that respect is given at all times include<br />

precautions about additional needs such as<br />

medical conditions or disabilities, advising<br />

individuals of their rights, confirming that<br />

individuals fully understand the search process,<br />

distance from other persons and the<br />

information that’s afforded to individuals<br />

following the search.<br />

There should be procedures in place that<br />

clearly define the principles under which an<br />

individual is searched and they shouldn’t be<br />

discriminatory. Such criteria might include<br />

whether all individuals carrying bags are<br />

searched, whether individuals are randomly<br />

selected to be searched (preferably where the<br />

decision-making isn’t controlled by the<br />

searcher) or the search of individuals where<br />

there’s suspicion (such as the activation of an<br />

Electronic Article Surveillance system).<br />

In terms of the case featured in The Guardian,<br />

it would appear that many of the good practice<br />

recommendations outlined in the BSIA’s Code<br />

of Practice hadn’t been followed. It’s an episode<br />

that may well have exerted a negative impact<br />

on the supermarket’s brand and reputation.<br />

Maintaining reputation<br />

The private security industry has built a solid<br />

and trusted reputation that’s favourable among<br />

“Consent to search is always required, except in those<br />

circumstances when statutes or regulations provide<br />

otherwise. There are serious implications for any person or<br />

company enforcing a search without explicit consent”<br />

Government, the police service and the general<br />

public, largely down to the very high standards<br />

maintained by the industry. Since the Private<br />

Security Industry Act 2001 was passed, the<br />

industry and the personnel working on the front<br />

line have upheld the image of a business sector<br />

that’s professional, whose staff are well-trained<br />

and which is, in broad terms, an essential<br />

component of public safety in today’s world.<br />

However, it may be argued that experiences<br />

like the one reported in The Guardian can have<br />

a negative impact on the reputation of the<br />

private security industry, as it’s unlikely that the<br />

general public will distinguish between a<br />

licensed security officer and an in-house one<br />

during any interaction they might have with<br />

them. Therefore, a bad experience with an inhouse<br />

security officer has the potential to cloud<br />

a member of the general public’s perception of<br />

licensed security personnel.<br />

Given the increasingly important role that the<br />

private security industry plays in protecting<br />

people and assets, maintaining the industry’s<br />

reputation is essential. To this end, the BSIA<br />

has been lobbying for the inclusion of the inhouse<br />

sector in the regulatory regime for many<br />

years now. Indeed, this was one of the<br />

Association’s positions during the 2016<br />

Independent Review of the SIA. It’s hoped that<br />

this position – along with the reaffirmation of<br />

business licensing in place of the current<br />

system and greater recognition of the industry’s<br />

vital role in protecting the public – will be<br />

recognised in the final report when published.<br />

Sourcing a supplier<br />

Members of the BSIA’s Security Guarding<br />

Section must comply with the Association’s<br />

stringent eligibility criteria which is an<br />

assurance that they’re reputable service<br />

suppliers. This includes demonstrating that a<br />

given company is financially sound, that its<br />

directors are of good repute and that the<br />

company possesses ISO 9001 certification<br />

(accredited by a UKAS certification body).<br />

In addition to this, members of the BSIA’s<br />

Security Guarding Section must also meet the<br />

Section-specific criteria which include ensuring<br />

that all employees are security screened to BS<br />

7858 Security Screening of Individuals<br />

Employed in a Security Environment and<br />

conforming to the latest version of BS 7499<br />

Code of Practice for Static Site Guarding and<br />

Mobile Patrol Services.<br />

For retailers employing their own in-house<br />

security staff who may be required to conduct<br />

on-premise searches of individuals, the BSIA’s<br />

Code of Practice for Security Searches can be<br />

downloaded free from www.bsia.co.uk<br />

20<br />

www.risk-uk.com


The New Camera Line Mx6 Creates More Possibilities.<br />

More Images, in All Light Conditions, in Every Standard<br />

More Intelligence Is on the Way<br />

The new Mx6 6MP camera system from MOBOTIX offers increased performance.<br />

A frame rate that is up to twice as fast than that of other cameras allows it to capture<br />

quick movements even better and simultaneously deliver sharp images in MxPEG,<br />

MJPEG and, for the first time in H.264, the industry standard. The innovative Mx6<br />

camera line is faster, more flexible and higher-performing, opening up new application<br />

and integration opportunities for to you to meet all requirements.<br />

MOBOTIX AG • Langmeil, Germany • www.mobotix.com


Physical and IT Security<br />

Convergence: Are We There Yet?<br />

Although historically<br />

distinct, physical<br />

security and<br />

information security<br />

have grown closer in<br />

recent times as a<br />

direct result of the<br />

integration of IPenabled<br />

devices<br />

within traditionally<br />

closed and isolated<br />

security systems.<br />

Where are we now,<br />

then, on the road to<br />

genuine convergence?<br />

Damien Pezza<br />

investigates<br />

Damien Pezza MSc FIHEDN<br />

FINHESJ: Security Consultant<br />

at CornerStone GRG<br />

Over recent decades, the increasing<br />

visibility and resourcefulness of cyber<br />

threat actors and the Internet of Things<br />

(IoT) have combined to revolutionise the<br />

security sector. Gartner recently forecasted that<br />

8.4 billion connected ‘things’ would be in use at<br />

the global level in 2017, representing an<br />

increase of nearly a third from 2016, and also<br />

predicted that the number of devices would<br />

reach 20.4 billion by 2020, with a rise in the<br />

share of ‘cross-industry business devices’ such<br />

as HVAC and physical security systems.<br />

For their part, video surveillance, access<br />

control, perimeter detection and alarm systems<br />

have become increasingly dependent on<br />

network electronics. Security systems are<br />

therefore exposed to a variety of cyber threats,<br />

necessitating that cyber protection is now as<br />

relevant to the security industry as it is for lowend<br />

and domestic ‘smart’ devices. This has<br />

prompted the need for holistic approaches<br />

towards security and risk management that<br />

emphasise formal co-operation between<br />

previously separate security functions. In<br />

industry parlance, this is ‘Convergence’.<br />

The interdependence of IT, physical and<br />

operational technology systems can bring<br />

concrete advantages to public and private<br />

sector organisations that wish to secure their<br />

assets. The same applies for convergence.<br />

Theoretically, the latter enables fast and<br />

informed responses to all types of threats,<br />

while bridging gaps between IT and Security<br />

Departments by merging them into a<br />

centralised risk management unit or otherwise<br />

creating overarching supervisory structures –<br />

thus improving organisational efficiency and<br />

eliminating both the vulnerabilities and<br />

inefficiencies of managing security and risks<br />

across silos.<br />

In such a converged risk management<br />

framework, cyber security plays an essential<br />

role in securing an organisation’s infrastructure<br />

and operations. In tandem, physical security<br />

measures ensure the integrity of its network<br />

and information assets.<br />

Problematic endeavour<br />

However, convergence is far easier and safer to<br />

achieve in theory than is the case in practice.<br />

Integrating an increasing number of devices<br />

into corporate networks presents a significant<br />

security risk to organisations. It has enabled<br />

external or ‘insider’ threats not only to impair<br />

security systems, supervisory control and data<br />

acquisition platforms or critical infrastructure<br />

through the Internet, but also to infiltrate or<br />

attack an organisation’s network by targeting<br />

IP-enabled equipment (such as cameras) or<br />

devices owned by employees themselves.<br />

Calls for greater convergence have naturally<br />

met with internal and organisational obstacles,<br />

as the setting out of such a massive project<br />

entails considerable resources and involves<br />

numerous departments. A study on Cyber<br />

Security and the Internet of Things published<br />

by EY in 2015 indicated that only 6% of all<br />

surveyed organisations claimed to have a<br />

robust incident response programme in place<br />

that includes third parties and that’s integrated<br />

with broader threat and vulnerability<br />

management functions.<br />

Even if successful in appearance,<br />

convergence at the structural level doesn’t<br />

necessarily solve underlying gaps and tensions<br />

within an organisation. A survey conducted by<br />

The Ponemon Institute in 2015 highlighted<br />

significant rifts in cyber security knowledge<br />

between decision-makers and IT security<br />

professionals. It revealed that cyber security<br />

has only begun to have an impact on the<br />

agenda of decision-makers in recent years, and<br />

that most IT professionals think their Board of<br />

Directors isn’t properly informed about every<br />

threat the organisation is facing.<br />

Hybrid environment<br />

Threat actors operate in a hybrid environment<br />

where the boundaries between virtual and<br />

physical threats are blurred. It’s now more<br />

important than ever for public and private<br />

sector organisations to implement holistic<br />

security strategies that address additional<br />

challenges stemming from convergence itself.<br />

As long as the physical and cyber domains are<br />

treated as segregated, there’s very little hope of<br />

securing either of them.<br />

Convergence isn’t only about form, but also<br />

about function. Organisations should<br />

encourage internal co-operation, co-ordination<br />

and training, not only by ‘changing the<br />

organisation chart’ and creating overarching<br />

risk management structures, but also by<br />

bridging gaps between security practitioners, IT<br />

22<br />

www.risk-uk.com


Convergence of Physical and IT Security<br />

specialists and senior executives. Knowledge of<br />

cyber threats is currently insufficient within<br />

company leaderships and, indeed, among non-<br />

IT professionals in most organisations. IT and<br />

physical security practitioners can potentially<br />

hold competing and partial views as to what<br />

motivates threat actors and how they operate in<br />

a hybrid environment.<br />

Physical security managers need to<br />

understand the criticality of their business’<br />

information and electronic assets, as well as<br />

the nature and potential consequences of a<br />

successful cyber attack on the company’s<br />

operations. Successful attacks on Data Centres<br />

or networks could result in the partial or total<br />

disruption of a company’s critical infrastructure.<br />

Physical security managers must also<br />

understand the criticality of all IP-enabled<br />

devices (from cameras, recorders and badge<br />

readers to loudspeakers) and move to ensure<br />

their proper protection and isolation in cooperation<br />

with IT security professionals.<br />

At the same time, IT security managers must<br />

understand the physical attack vectors to which<br />

their equipment and hardware may be exposed.<br />

Threat actors are now able to compromise<br />

electronic and information assets by infiltrating<br />

an organisation’s premises, bugging<br />

unprotected IP devices (such as security<br />

equipment or HVAC systems) on-site, stealing<br />

employees’ badges or electronic devices or<br />

setting up fake Wi-Fi networks in the vicinity of<br />

a given companies’ premises.<br />

Wider risk framework<br />

IT professionals need to comprehend to what<br />

extent cyber security must be embedded within<br />

a wider risk management framework and assist<br />

corporate-level and security managers in order<br />

to inform decisions that take into account the<br />

growing threats posed by the ‘cybersphere’ and<br />

the IoT to a company’s assets.<br />

Where convergence isn’t a possibility at the<br />

structural level, IT and Physical Security<br />

Departments should nonetheless be aligned,<br />

allowing Chief Information Security Officers<br />

(CISOs), Chief Security Officers (CSOs) and<br />

Chief Operations Officers to share overlapping<br />

goals and targets. Last year, for instance,<br />

Barclays merged the functions of CSO and CISO<br />

in an attempt to redefine the company’s<br />

approach to security and provide overall<br />

resilience against all kinds of threats by<br />

building group-wide investigations ably<br />

supported by joint Operations Centres.<br />

Implementing such organisational and<br />

structural changes can prove complex.<br />

Ensuring that all stakeholders and employees<br />

are on the same page entails considerable<br />

resources: time, money, people, technology and<br />

processes. The use of independent security<br />

consultancies and their expertise might well<br />

help organisations in optimising their transition<br />

towards a fully-converged security apparatus by<br />

bridging the gap between convergence at the<br />

strategic and operational levels. This allows<br />

companies to adopt an holistic view of security<br />

in which security equipment, Physical Security<br />

Information Management software and<br />

organisational dynamics are interdependent.<br />

It must be borne in mind that encouraging<br />

co-operation at the organisational level alone<br />

isn’t sufficient to achieve convergence in the<br />

current security context. Incidents have<br />

continuously highlighted the now global<br />

character of security threats and their<br />

mitigation. The multiplication of IP-based<br />

security systems at the global level has<br />

transformed each single device – ranging from<br />

security systems to coffee machines – into a<br />

potential attack vector against third parties that<br />

are not related in any way to said devices.<br />

It’s also essential to think beyond the<br />

individual business and seek to encourage a<br />

culture of communication and co-ordination not<br />

only within organisations, but also between<br />

them. As was highlighted in an excellent White<br />

Paper published only last November by The<br />

Economist: “Every organisation is more secure<br />

when all are more secure.”<br />

“In such a converged risk management framework, cyber<br />

security plays an essential role in securing an<br />

organisation’s infrastructure and operations”<br />

23<br />

www.risk-uk.com


State of Mind: Developing ‘Risk Culture’<br />

intelligence. Risk professionals often deal with<br />

culture as if it can be controlled and managed<br />

rather than recognising its evolving and<br />

complex character. Disciplines such as<br />

psychology and organisational development<br />

which bring methodologies for working with<br />

organisational cultures remain little explored.<br />

When organisations attempt to change their<br />

risk culture, they often delegate that objective<br />

to risk professionals: individuals ‘siloed’ in their<br />

functional discipline and who perhaps lack<br />

broader operational leadership experience.<br />

Alternatively, this task is delegated to Human<br />

Resources professionals who may not<br />

understand financial risk, for example.<br />

Risk culture needs the support of leadership<br />

across the whole business to change<br />

effectively. A series of high-profile fines and<br />

failures in the finance world over the last<br />

decade show that approaches based on<br />

conventional risk processes have little impact.<br />

During the last few<br />

years, we’ve moved<br />

from thinking about<br />

risk as a technical<br />

issue to<br />

understanding that,<br />

once the technical<br />

basics are covered,<br />

it’s primarily one of<br />

culture. What kind of<br />

risk culture prevails in<br />

your organisation?<br />

How does it influence<br />

risk management?<br />

How might you<br />

transform your risk<br />

culture such that it’s<br />

then a key asset in<br />

managing risk? Alex<br />

Poppleton addresses<br />

these core questions<br />

The 2008 financial crisis was underpinned<br />

by ineffective and entrenched risk cultures<br />

in investment banks. Following the crash,<br />

financial regulators began asking for evidence<br />

of how institutions were changing their ‘risk<br />

culture’ and, in the time since, the idea that<br />

‘risk culture’ is a critical aspect of managing<br />

risk has steadily gained currency.<br />

Dr John Kotter, founder of Kotter International<br />

and Emeritus Harvard Professor of Leadership,<br />

has spent decades studying the factors that can<br />

derail even the best-laid of business plans.<br />

Kotter’s research demonstrates that 70% of<br />

transformation efforts still fail to meet the<br />

expectations that were laid out when those<br />

efforts began. Kotter has observed that the<br />

human factors critical to effective change can<br />

become lost in the simplicity of a ‘formula’.<br />

Despite this history, the idea that you can<br />

transform culture primarily through a predetermined<br />

process or project plan has<br />

pervaded our organisational life. However, a<br />

key challenge for today’s risk management<br />

professionals is that they often don’t have<br />

experience of the leadership capabilities<br />

needed to change the culture of their business.<br />

Typically, risk has been understood primarily<br />

through systems and processes, creating a<br />

tendency to value numeracy over emotional<br />

Complex and nuanced<br />

Dr Kotter’s work demonstrates that only 5% of<br />

organisations fully succeed or exceed their<br />

transformational intentions. Culture change is<br />

critical to that success. Risk culture isn’t about<br />

binary compliance or non-compliance. Rather,<br />

it’s complex, nuanced and intrinsic to the<br />

organisational DNA. So can it be ‘changed’? The<br />

answer is ‘Yes’, it can, but institutions first need<br />

to alter their frame of reference.<br />

To draw a parallel here, we generally accept<br />

that we’re not able to ‘manage’ national<br />

cultures. Rather, we generally experience them<br />

changing over many years. Attempting to treat<br />

risk culture as part of a project plan belies its<br />

intrinsic complexity.<br />

Many begin to look at organisational culture<br />

change by defining the behaviours that will be<br />

needed as a future ‘blueprint’. However, as<br />

becomes obvious once you deal with complex<br />

risk, behaviour alone isn’t enough. Individuals<br />

can display the right behaviours, but with the<br />

wrong motivation, which still represents a key<br />

risk. This critical insight demonstrates the need<br />

to look beyond behaviours in organisational<br />

change initiatives which would otherwise<br />

operate on a superficial level.<br />

Risk professionals understand that rules and<br />

procedures are of limited value without a set of<br />

underpinning principles to guide decisions. For<br />

their part, organisations are increasingly<br />

recognising the need to move from setting out<br />

rules to establishing guiding principles.<br />

24<br />

www.risk-uk.com


Risk Management and Organisational Culture<br />

Managing risk through enforcing rules tends<br />

to create a compliant culture wherein people<br />

are discouraged from thinking for themselves<br />

or making their own decisions. This is often<br />

manifested as a superficial conformance in<br />

order to implement what’s required, but those<br />

involved will quietly wash their hands of the<br />

consequences of any actions with which they’re<br />

not engaged.<br />

From rules to principles<br />

Culture is about much more than just<br />

behaviour: definitions such as ‘the way we do<br />

things around here’ also implicitly include<br />

values, assumptions and collective<br />

understanding. Organisations have begun to<br />

understand that a set of binary rules that define<br />

behaviour isn’t sufficient. Decisions need to be<br />

made in fast-moving and highly-complex<br />

situations that, to be frank, are too diverse to<br />

legislate for every eventuality.<br />

To help people do the right thing, you need to<br />

give them principles to work with – fairness,<br />

decency, the right thing to do, accuracy,<br />

transparency – and they can then make<br />

decisions based on those principles. These<br />

principles need to be aligned to values – not<br />

words pinned on the wall, but what people<br />

genuinely believe in and care about. That takes<br />

time and real attention to do well. People will<br />

sniff out ‘values’ that don’t seem genuine and<br />

heart-felt. For example, hiring a high achiever<br />

with a tarnished reputation will damage efforts<br />

to create a principles-based risk culture.<br />

Organisations need to develop their<br />

employees’ ability to make principle-based<br />

decisions, in turn moving away from ‘Does this<br />

break the rule?’ to ‘Would this stand up to<br />

scrutiny?’ Have you done the right thing for the<br />

wrong reasons (ie ‘got away with it’, but with<br />

potential dangers for the future) or the wrong<br />

thing for the right reasons (ie made a genuine<br />

mistake that can be learned from)? Applying<br />

such tests consistently creates the opportunity<br />

to make real improvements in a business.<br />

How do we develop this new risk culture,<br />

then? Some key elements include clearly<br />

communicating how an effective risk culture<br />

functions, developing people’s understanding,<br />

empowering their decisions and enabling<br />

transparency around mistakes that supports<br />

learning rather than punishment.<br />

The resulting new and open organisation<br />

needs to be lived and modelled by senior<br />

leadership and communicated to all.<br />

Complete engagement<br />

It’s vital to engage stakeholders across the<br />

organisation so that they share in a common<br />

“Organisations need to develop their employees’<br />

ability to make principle-based decisions, in turn<br />

moving away from ‘Does this break the rule?’ to<br />

‘Would this stand up to scrutiny?’”<br />

purpose to own risk collectively and<br />

individually for all levels, roles and<br />

responsibilities. Cascading this from the top<br />

down is counter-productive to an initiative<br />

which is intending to make sure everyone in the<br />

organisation ‘owns’ risk. It has to be created<br />

and implemented in a way which demonstrates<br />

that ownership and doesn’t just talk about it.<br />

To create an effective risk culture, leaders<br />

need to work hard to establish transparency<br />

and trust over time. Initially, moving from rules<br />

to principles takes time and consistency to<br />

work. The key to success is to persist in<br />

creating an environment which enables<br />

individuals to raise challenging questions,<br />

discuss ethical dilemmas and flag potential<br />

conflicts without being personally damaged as<br />

a result of doing so.<br />

To create a culture of openness and<br />

genuinely learn from failures takes courage,<br />

leadership and consistency across time.<br />

Internal politics need to give way to an<br />

environment which is focused on the greater<br />

good of achieving better safety and less risk all<br />

round. Change comes from enabling those<br />

values to be put into action: trusting people to<br />

act well, empowering them to ask for help when<br />

they’re unsure and treating them as adults.<br />

One further requirement for changing risk<br />

culture is the necessity for risk specialists to<br />

have interpersonal as well as intellectual<br />

expertise. Successful transformation demands<br />

both passion and intellect. It also demands<br />

both management of day-to-operations and<br />

leadership to guide and inspire transformation.<br />

The move from a rules-based to a principlesbased<br />

culture imbues leadership with the<br />

courage to step forward and act with good<br />

intent, encouraging similar acts by others. It<br />

challenges us to act from our best intentions. In<br />

this context, it’s harder for risks to not be<br />

noticed and addressed, simply because<br />

everyone’s invested in being part of an<br />

organisation of which they can be proud.<br />

Does this sound too good to be true? Is it<br />

perhaps too optimistic for hard-nosed risk<br />

managers? Our experience in industries where<br />

establishing effective risk cultures is existential<br />

– such as in banking and pharmaceuticals –<br />

demonstrates that this really is possible. We’ve<br />

found that employees want to be part of<br />

initiatives that foster an effective risk culture.<br />

Alex Poppleton:<br />

Principal Consultant at Kotter<br />

International<br />

25<br />

www.risk-uk.com


On The Mark: Safeguarding Your<br />

Company’s Valuable Assets<br />

According to the British Security Industry Association, asset<br />

and property marking is one of the oldest sectors of the<br />

security industry. Not surprising, perhaps, given that the<br />

owners of valuable items have always sought ways in which<br />

to identify their belongings. Here, James Brown evaluates the<br />

solutions available for today’s practising risk and security<br />

management professionals<br />

Asset marking systems enable the marked<br />

asset – be it a laptop, a PC, an item of<br />

jewellery or perhaps a smart phone – to be<br />

traced to the legal owner via a secure database<br />

such as a Secure Asset Register (SAR). Today’s<br />

property marking systems have had to become<br />

increasingly high tech to counter ever-more<br />

sophisticated criminal activities. While property<br />

marking by itself will not necessarily prevent a<br />

theft from occurring, it can act as a significant<br />

deterrent to most thieves.<br />

In essence, asset marking is the covert or<br />

overt marking of a valuable item that allows<br />

unique identification of the legal owner of the<br />

asset. It can be applied in a variety of ways. For<br />

example, covert marking is a type of marking<br />

that’s not visible under normal lighting, but can<br />

“End users of forensic marking solutions are advised to look<br />

for products tested to PAS 820. Where marked items are<br />

being used outdoors always seek a Grade A external rating”<br />

be read by simple equipment. Examples include<br />

forensic DNA marking and microdots with a UV<br />

tracer. Criminals know that DNA is the police’s<br />

most powerful weapon in convicting them. The<br />

DNA ‘fear factor’ is highly understood and acts<br />

as a huge deterrent against theft.<br />

Overt marking is easily visible and certified<br />

as complying with the requirements of LPS<br />

1225 (the LPCB Approval and Listing of Asset<br />

Marking Systems). Overt marking also includes<br />

stencil etching and labels.<br />

Stencils can be personalised and include a<br />

unique identification number in addition to the<br />

contact details of the SAR. It’s a case of sticking<br />

the stencil on to the item and then applying an<br />

etching compound over the matrix holes to<br />

leave a permanent and visible mark.<br />

Personalised TESA security labels – which<br />

have an extremely high-tack adhesive and are<br />

resistant to tampering, chemicals and<br />

temperatures of -40°C to 270°C – are ideal for<br />

outdoor use and the most secure and durable<br />

label option. It should be noted, though, that<br />

any form of label on its own cannot be used or<br />

classified as a form of security marking.<br />

Forensic DNA property marking (covert) is a<br />

type of marking in which the asset is uniquely<br />

identified using DNA markers and a UV tracer,<br />

and which is sent for laboratory analysis. Each<br />

DNA code is unique to each client. If thieves<br />

break in to a property and steal electronic items<br />

that have been marked, it makes it very difficult<br />

for them to sell them on. If the police find the<br />

stolen goods they can then reunite them with<br />

their rightful owners. The advantage of<br />

synthetic DNA marking is that it can be used to<br />

mark just about anything without damaging it.<br />

It’s extremely quick to apply and also virtually<br />

impossible to remove.<br />

Deterrent warning stickers can be placed in<br />

office windows at your premises. It has been<br />

proven that thieves don’t even want to risk<br />

breaking into a property in the first place if they<br />

see a sticker stating that DNA marking’s in use.<br />

Forensic offender marking<br />

Also referred to as event-triggered tagging,<br />

forensic offender marking is a covert solution<br />

that’s becoming widespread both here in the<br />

UK and across Europe due to its powerful<br />

ability to deter acquisitive crime. It involves the<br />

marking of a suspected offender to provide<br />

26<br />

www.risk-uk.com


Property and Asset Protection: Best Practice Methodologies<br />

evidence of a crime by use of a system such as<br />

a DNA spray, which is employed by retailers,<br />

banks and petrol station managers to deter<br />

robbery and commercial burglaries.<br />

In practice, the spray is either delivered<br />

automatically in conjunction with an intruder<br />

alarm or by a device set off by an offender or<br />

employee during an incident (such as a robbery,<br />

for example). When a suspected offender<br />

arrives at a police station, they’re examined<br />

under UV light in the custody suite as a matter<br />

of course. If the suspect’s skin and/or clothes<br />

fluoresce under the UV light then samples will<br />

be taken from them and submitted for analysis.<br />

As each batch of DNA is uniquely coded, the<br />

police will be able to link the criminal to the<br />

scene of the crime.<br />

Systems are provided with warning signs to<br />

alert criminals to its use and keep them away<br />

from protected sites. A new hand-held version<br />

of the DNA spray system is being used by the<br />

police to tackle the scrambler bike epidemic in<br />

the UK and has been successful in catching and<br />

convicting offenders for dangerous bike riding<br />

and forms of anti-social behaviour.<br />

Transferrable markers realise a type of mark<br />

that transfers from the marked asset to an<br />

offender coming into contact with it, such as<br />

DNA grease that can transfer from a lead roof or<br />

copper piping to the hands and clothing of a<br />

metal thief and can still be visible weeks later.<br />

A DNA gel is also available that can be smeared<br />

on indoor items, such as door and window<br />

handles and cash tills. This type of marker is<br />

used as a short-term solution where there’s<br />

intelligence to suggest an offence is imminent.<br />

Advice should be clear as to whether the<br />

mark is permanent or transferable. This ought<br />

to include information about the marking and<br />

the suitability of the adhesive and any overt,<br />

covert or forensic content for use on different<br />

materials (such as glass, metal and plastics)<br />

and exposure to different environments (ie<br />

sunlight, water and varying temperatures) as<br />

well as cleaning materials. Where components<br />

of a mark have different durations of<br />

permanence this should always be stated.<br />

End users of forensic marking solutions are<br />

advised to look for products tested to PAS 820.<br />

Where marked items are being used and/or<br />

kept outdoors, a Grade A external rating should<br />

be sought. This is the highest industry standard<br />

and means that the solution has been tested to<br />

last for at least five years.<br />

Providing a SAR<br />

Company premises used for the provision of the<br />

SAR should be secure. The management of data<br />

held by the SAR should be operated in an ISO<br />

9001:2008-approved manner by security-vetted<br />

staff working to protocols for data handling in<br />

accordance with the Data Protection Act 1998.<br />

Controls should be implemented to preserve<br />

the integrity and validity of the asset<br />

registration data. These controls should comply<br />

with industry-recognised information security<br />

standard requirements such as LPS 1224 Issue<br />

3 for SARs and ISO 27001 for Information<br />

Security Management.<br />

Another benefit of using such a database is<br />

that the presence of security marks of a certain<br />

type (such as an owner’s name and postcode)<br />

can prevent the legitimate transfer of<br />

ownership while other marks in conjunction<br />

with a SAR can actually help the transfer.<br />

Property marking is generally a low-cost<br />

option, especially when compared to the value<br />

of the asset it’s being used to protect. The cost<br />

of any of these marking products is determined<br />

by how much product is needed and how many<br />

assets have to be protected.<br />

Insurance considerations<br />

Many insurance companies offer discounts to<br />

customers who mark their property. Users are<br />

advised to check with their insurer or broker<br />

when taking out or renewing a policy as they<br />

may be entitled to a reduction in premiums if<br />

their property, equipment or vehicles are DNA<br />

security marked.<br />

Also worth noting is the fact that some<br />

companies still charge annual renewal fees<br />

after the initial purchase or to use the<br />

manufacturer’s database. Read manufacturers’<br />

sites carefully to avoid any additional charges<br />

and find the right product for your organisation.<br />

Each manufacturer has different procedures for<br />

you to follow when you move or sell an item<br />

that you’ve marked.<br />

Asset and property marking solutions are<br />

making a genuine difference and helping the<br />

police service, communities and businesses to<br />

reduce crime and protect their assets – all with<br />

the added bonus that such solutions are very<br />

simple to use, low cost and highly effective.<br />

James Brown:<br />

Managing Director of<br />

Selectamark Security Systems<br />

plc and Chairman of the<br />

British Security Industry<br />

Association’s Asset and<br />

Property Marking Section<br />

27<br />

www.risk-uk.com


Touched By A Physical Presence<br />

Physical security’s<br />

three important<br />

components – namely<br />

access control,<br />

surveillance and<br />

testing – can<br />

sometimes be<br />

overlooked (and their<br />

importance<br />

underestimated) in<br />

favour of more<br />

technical threats<br />

posed to an<br />

organisation by<br />

hacking, malware and<br />

cyber espionage.<br />

Focusing in particular<br />

on the present state of<br />

play in the education<br />

sector, Dave Mundy<br />

discusses what<br />

physical security is<br />

and how it has<br />

progressed before<br />

evaluating ways in<br />

which installers are<br />

providing added value<br />

for their end users<br />

28<br />

www.risk-uk.com<br />

Currently, there are 8.7 million children in<br />

England attending over 24,000 primary<br />

and secondary schools resident within the<br />

state and independent sectors. That their<br />

security is paramount goes without saying, and<br />

it’s the security industry’s responsibility to face<br />

the challenges of securing schools to the very<br />

highest standards within budgets that those<br />

educational establishments can afford.<br />

The principal purpose of security is the<br />

prevention of unauthorised access. As security<br />

installers, the tools we have at our disposal are<br />

a vast range of access control and perimeter<br />

protection products, from basic card entry<br />

systems through to the most sophisticated<br />

intrusion detection technologies – all of them<br />

designed to manage and control access.<br />

Digital technology also plays its part, of<br />

course, whether in the form of basic CCTV or<br />

rather more futuristic facial recognition<br />

systems, but again with the principal aim of<br />

allowing the good people in and keeping the<br />

bad ones out (while also being able to track<br />

them across a given site).<br />

It’s easy to take for granted how advanced<br />

these systems have become, forgetting a time<br />

in days gone by when so much of physical<br />

security was heavily reliant on manpower. In<br />

fact, the school environment provides a good<br />

example of just how far access control and<br />

CCTV systems have progressed and how new<br />

solutions continue to evolve.<br />

Changing environments<br />

It used to be that anyone could walk into a<br />

school’s grounds and head for reception.<br />

Nowadays, perimeters are more tightly<br />

controlled and, in general, no-one enters a<br />

school’s grounds without authorisation. This is<br />

achieved through turnstiles, electronic gates<br />

and barriers granting access with codes, ID<br />

cards or – in the case of vehicles – via CCTV<br />

incorporating Automatic Number Plate<br />

Recognition functionality.<br />

Physical security of this kind is about<br />

convenience as well as security. For example,<br />

it’s important for schools that gates close<br />

automatically such that parents who arrive with<br />

buggies and other children are given a helping<br />

hand in keeping the school secure.<br />

In school reception areas, visitor and entry<br />

management systems provide fast, userfriendly<br />

and intelligent mechanisms for<br />

authorising access and ensuring the school’s<br />

management team knows exactly who’s on the<br />

premises at any given time.<br />

Systems can pre-register guests, providing<br />

faster access and significantly enhanced<br />

security. For supply agency teachers, for<br />

example, a photograph supplied by the agency<br />

can be used with a unique code to create a<br />

temporary, time-specific and secure ID pass.<br />

Automated systems of this nature reduce the<br />

paperwork and resources required by school<br />

administration staff and ensure that temporary<br />

staff and guests don’t threaten the integrity of<br />

a school’s security.<br />

Systems also allow individuals to sign<br />

themselves in on intuitive touch screens, again<br />

making their ‘journey’ much easier, but without<br />

compromising security. Systems can be<br />

branded to add further value and afford an<br />

impression of a school that takes a professional<br />

approach to safeguarding its pupils and staff.<br />

Data recording and reporting are important<br />

elements of a modern visitor management<br />

system and particularly useful in the event of<br />

an emergency such as a fire outbreak, when<br />

quick access to detail regarding who is or isn’t<br />

present on the premises is imperative.<br />

Systems also need to be flexible. It’s now<br />

common for schools to lease sports and drama<br />

facilities after school hours and, indeed, at<br />

weekends. That being so, any system installed<br />

has to accommodate multiple needs.<br />

Balancing budgets<br />

Whatever we do and whichever systems we<br />

recommend, we have to strike the balance<br />

between safeguarding people and protecting<br />

the public sector purse. A good example of this


Physical Security: Delivering Added Value for End Users<br />

can be seen at Oak Hill Theological College<br />

(pictured, below left), a facility that presented<br />

us with an unusual access control challenge<br />

because not only do plenty of its students live<br />

on site, but many of their families do, too.<br />

Oak Hill College is set in 60 acres of land in<br />

Hertfordshire. It houses a modern academic<br />

centre with lecture theatres, seminar rooms,<br />

library space and study facilities, as well as<br />

considerable residential facilities for both yearround<br />

and term-time residents.<br />

To securely accommodate access for young<br />

families and teenagers, as well as employees<br />

and deliveries, Delta Security installed a Salto<br />

access control system, including ID passes and<br />

ad hoc printable passes as well as automatic<br />

electronic gates at the college entrance.<br />

The customer was keen that the new system<br />

had the ability to provide quick information on<br />

access usage and give stakeholders greater<br />

control over what access was afforded to<br />

different parties. The system was therefore<br />

designed such that Oak Hill College can tailor<br />

access according to the user’s needs and to<br />

accommodate different entry ‘media’ including<br />

ID cards, codes and help buttons that transfer<br />

to either reception or relevant mobile numbers.<br />

In addition, Oak Hill College’s management<br />

wanted the system to be able to integrate<br />

seamlessly with other technologies, notably the<br />

fire alarm system, so that the entry gates would<br />

open automatically in the event of an alarm<br />

activation and afford access to the local Fire<br />

and Rescue Service. As the Salto system is fully<br />

IP-based it’s also future-proof, enabling the<br />

school to make good use of additional<br />

capabilities as and when budgets allow.<br />

CCTV in schools<br />

In the 1980s, cameras were fixed, offered black<br />

and white images and had no night vision.<br />

Footage was captured on video cassette tapes<br />

at a rate of only one or two frames per second,<br />

creating a series of still images that made for a<br />

largely unhelpful playback experience. Add to<br />

that equation the fact that viewing monitors<br />

were enormous, heavy, suffered from ‘screen<br />

burn’ and consumed so much power as to be<br />

permanently ‘hot’ and it wasn’t a good mix.<br />

Functionality today is a world apart. Speed<br />

dome cameras with optical zoom and motion<br />

detectors allow for the intelligent capture and<br />

recording of events, while digital zoom<br />

functionality means that areas of interest can<br />

be closely monitored during playback. Critically,<br />

infrared technology now delivers reliable<br />

images at night or in poor lighting conditions.<br />

Again, CCTV cameras can be integrated with<br />

access control technology – as well as fire<br />

alarms – to give further ‘visible’ evidence (and<br />

confirmation) as an incident unfolds. In truth,<br />

the advent of event-tagging functionality has<br />

been extremely significant as it means footage<br />

periods where the environment has changed<br />

are highlighted and instantly accessible rather<br />

than the system end user having to trawl<br />

through hours (or even days) of footage to<br />

locate the particular event they wish to review.<br />

Other useful developments are in the way<br />

users are able to view images. Most influential<br />

has been remote viewing, made possible<br />

through mobile Apps and the Internet. This<br />

gives school management or security staff realtime<br />

visibility of events direct to their mobile or<br />

tablet device wherever they are in the school or<br />

if they’re off-site for that matter. Management<br />

then has the ability to take immediate and<br />

appropriate decisions for mitigating risk.<br />

Installers adding value<br />

It’s the installer’s job to ensure all security<br />

equipment is appropriate to its environment.<br />

For educational establishments, High Definition<br />

CCTV with infrared functionality is preferred,<br />

with video content stored for a minimum of 28<br />

days. Most importantly, playback needs to be<br />

intuitive and user-friendly.<br />

For larger sites like Oak Hill, perimeter<br />

protection is a must. Here, the installer’s skill is<br />

in advising end users where cameras and<br />

detectors are best placed in order to create<br />

both an actual and a ‘virtual’ perimeter to<br />

ensure that perimeter isn’t compromised.<br />

Data protection and privacy laws, of course,<br />

can impact where cameras are situated and<br />

how footage is stored, which is of particular<br />

importance in schools. Installers need to be<br />

registered with the Information Commissioner’s<br />

Office. Accreditation ensures customers that<br />

security installations are compliant and gives<br />

the installer the authority to advise the client<br />

on how to store CCTV footage correctly.<br />

With regard to access control, installers can<br />

add value by advising on lockdown procedures.<br />

They’re able to advise on specific alarm<br />

systems, sealing off boundaries and using CCTV<br />

with intelligent tracking software to monitor<br />

any security breaches.<br />

The biggest challenge isn’t around whether<br />

the technology is available to provide the type<br />

of security schools need, but rather whether<br />

ambition can be matched with budgets.<br />

Dave Mundy: Operations<br />

Director at Delta Security<br />

“Data recording and reporting are important elements of a<br />

modern visitor management system and particularly useful<br />

in the event of an emergency such as a fire outbreak”<br />

29<br />

www.risk-uk.com


Net2 Entry Touch<br />

Smart, Simple Door Entry with a Premium Touch<br />

Durable 7" colour<br />

touch screen<br />

Personalise with<br />

multiple theme options<br />

Fully compatible with<br />

Net2 access control<br />

For more information:<br />

paxton.info/2853<br />

2017<br />

PSI PREMIER AWARDS<br />

WINNER


FIRE SAFETY<br />

Management & Installation<br />

Fire Protection and Prevention<br />

with Technology and Innovation<br />

Special Supplement in association with:


FIRE SAFETY<br />

New Qualifications for Fire Detection<br />

and Alarm Systems<br />

The Fire Industry<br />

Association (FIA) is<br />

about release four allnew<br />

qualifications in<br />

fire detection and<br />

alarm systems. In<br />

short, there’ll be on<br />

qualification each for<br />

designers, installers,<br />

maintainers and<br />

commissioners. Here,<br />

Martin Duggan<br />

examines the<br />

reasoning behind this<br />

move and what it<br />

means for the FIA,<br />

learners and the<br />

industry as a whole<br />

fter a soft launch at FIREX International<br />

A2017, the Fire Industry Association (FIA)<br />

will be releasing four new qualifications in<br />

fire detection and alarm systems. In short, one<br />

each for designers, installers, maintainers and<br />

commissioners. The overiding intention here is<br />

to replace the general training that the FIA has<br />

been conducting for many years now.<br />

In fact, we’ve been running fire detection and<br />

alarm systems training in a similar format since<br />

2000 and trained over 30,000 delegates across<br />

our 17 different courses (so not just in fire<br />

detection and alarms). Our current run-rates are<br />

300 courses across the year and the country, in<br />

turn training around 4,000 delegates each year.<br />

FIA training has pretty much become the de<br />

facto standard for proving (or partially proving)<br />

competence. I discovered a job advert on a<br />

recruiter’s website only last week, and the<br />

common language was the FIA’s Units 1 and 5,<br />

etc (ie the names of our current courses). So it’s<br />

becoming a common language within fire<br />

detection and alarms (and within recruitment),<br />

and is often a requirement set by employers.<br />

Why is the FIA involved in training and<br />

education? We have a Memorandum of<br />

Association – it’s our constitution, and the very<br />

second objective is education and training. Put<br />

simply, it’s in our DNA.<br />

The FIA is a not-for-profit organisation so any<br />

moneys that we make are put back into training<br />

and development or are ploughed back into<br />

research. We launched a project five years ago<br />

with the aim that 5% of our turnover goes back<br />

into research projects. Those research projects<br />

are for the good of the fire industry. Everything<br />

that the FIA does is fed back into the industry.<br />

What have we done to underpin the new<br />

qualifications? We’ve become an Awarding<br />

Organisation. What does that mean in the real<br />

world? Essentially, it means that we’ve been<br />

placed on the Register for Awarding<br />

Organisations and can write qualifications for<br />

subsequent approval by Ofqual and other<br />

official Government bodies for examinations.<br />

To become an Awarding Organisation has<br />

taken us a long time and much hard work.<br />

There’s an awful lot of policies and protocols<br />

that we had to put in place that must be<br />

inspected against. Suffice it to say that we had<br />

to jump through a good many hoops in order to<br />

become an Awarding Organisation.<br />

32<br />

www.risk-uk.com


To build the qualifications themselves, we<br />

held a ‘Voice of the Customer’ Day and talked to<br />

our members and training customers to find out<br />

what they wanted from a qualification. They<br />

know what our training delivers, but if we were<br />

going to provide a qualification we wanted to<br />

find out exactly what they would like within that<br />

qualification. We tested what we learned from<br />

the ‘Voice of the Customer’ Day through<br />

surveys. We surveyed everybody, with the<br />

results helping us to build our qualifications.<br />

Individuals begin with the Foundation<br />

course, then move on to an Environmental Unit<br />

and a Health and Safety Unit before they can<br />

specialise in one of the four areas (ie designer,<br />

maintainer, installer or commissioner). If the<br />

learner wishes to take on an additional one of<br />

the four courses, they don’t need to repeat the<br />

Foundation, Environmental and Health and<br />

Safety Units first. They simply need to take the<br />

specialist Unit in which they’re interested.<br />

One of the biggest changes we’ve had to<br />

make in preparation for the new qualifications<br />

arriving is that we’ve had to separate out our IT<br />

systems. Training is completely divorced from<br />

the Awarding Organisation. We’ve had to<br />

develop an Awarding Organisation website with<br />

a separate CRM system. We’ve had to work with<br />

and invest in a ‘software exam’ company and<br />

we’ve had to link all of that together with our<br />

existing CRM system and website. We’re<br />

currently undergoing, then, a huge IT project.<br />

The idea is that if you’re used to FIA training<br />

(or if you’ve been booking FIA training), we’ve<br />

been trying to continue along those lines. It will<br />

feel very much the same when you come to<br />

book on to the new qualifications. You’ll access<br />

the FIA website and be able to book the courses<br />

there. The only slight difference is that learners<br />

first have to complete the Foundation Unit. Once<br />

they log on to the foundation unit they then<br />

register as a learner and receive a unique<br />

learner’s reference number. That number is used<br />

to book on to the other courses.<br />

Learners must have also completed the<br />

Foundation Unit and successfully passed it in<br />

order to be allowed to book on to the<br />

specialised courses at the end. There are some<br />

IT tricks in there to stop people from booking<br />

unless they possess a unique learner number.<br />

We’ve had to invest in 250 tablets so that we<br />

can move our examination process to a digital<br />

platform and examine learners at the end of<br />

each training module.<br />

We’ve had to separate the personnel, too.<br />

We’ve moved Ian Gurling (formerly our training<br />

manager and the individual who has guided us<br />

through the application process to become<br />

Ofqual-registered). Ian has become our new<br />

Awarding Organisation manager (which is a<br />

completely new role for the FIA).<br />

We’ve also moved Michael Gregg into the<br />

training manager’s role.<br />

In essence, then, we have two individuals<br />

working on the different parts, and we have to<br />

keep those parts completely separate. The<br />

Awarding Organisation looks at the exam<br />

processes, while the training side of things<br />

concentrates on the actual learning provided so<br />

you can actually pass those examinations.<br />

The Awarding Organisation is currently<br />

working on the seven modules that we have. At<br />

the time of writing, the focus is on completing<br />

all of the question banks and putting the exams<br />

together. Meanwhile, the FIA’s training team has<br />

completed some analyses looking at our<br />

existing Units 1-6 and mapped across the old<br />

training to what the new qualifications will<br />

provide – what we had compared to what’s new.<br />

It’s so much more in depth than it was.<br />

Learners are going to have much more<br />

knowledge and a far greater understanding of<br />

the subject. Not only have we expanded on<br />

every area from Unit 1 for Foundation – we’ve<br />

enhanced everything that was in Unit 1 and<br />

added a set of new subjects as well.<br />

The Health and Safety Unit is completely new<br />

to us, too, and so is the Environmental Unit.<br />

These new areas are all based on what our<br />

‘Voice of the Customer’ Day and our survey said<br />

the industry wants from a qualification.<br />

Essentially, all of our old training has been<br />

significantly enhanced with the addition of new<br />

areas and new topics for study. There’s no doubt<br />

that we’ve compiled a much more rigorous<br />

programme of learning.<br />

For example, our current training for a<br />

designer has dramatically increased for the new<br />

qualifications. There’s lots more standards<br />

involved that we feel the designer needs to<br />

know about so we’ve made the course for the<br />

designer qualification much longer and far more<br />

in-depth than was the case previously.<br />

www.fia.uk.com<br />

“Individuals begin<br />

with the Foundation<br />

course, then move on<br />

to an Environmental<br />

Unit and a Health and<br />

Safety Unit before<br />

they can specialise in<br />

one of the four areas<br />

(ie designer,<br />

maintainer, installer<br />

or commissioner)”<br />

www.risk-uk.com<br />

33


FIRE SAFETY<br />

False Fire Alarm Management<br />

The latest innovations<br />

in fire system<br />

technology offer a<br />

number of solutions<br />

for minimising false<br />

alarms, writes Aston<br />

Bowles (marketing<br />

manager at<br />

Advanced). The key is<br />

to verify whether<br />

there’s a real fire<br />

before the next stage<br />

of the building<br />

evacuation strategy<br />

commences<br />

alse alarm reduction should be considered<br />

Fas part of the risk assessment before any<br />

specification is written. Each building will<br />

have different users and specific circumstances<br />

that may require unique verification,<br />

investigation and evacuation processes. All of<br />

this can occur under one roof and over multiple<br />

floors, so flexibility is very definitely the key.<br />

Intelligent detectors<br />

The industry has taken two main approaches:<br />

one focused on detector head technology that<br />

looks at reducing incorrect signals in the heads<br />

themselves, the other an approach that centres<br />

on signal processing and decision-making in the<br />

fire control panel. Some forward-thinking<br />

manufacturers are combining the two into<br />

approaches to combat the causes of false<br />

alarms from multiple directions.<br />

The development of intelligent detectors, the<br />

most sophisticated of which use smart<br />

algorithms to differentiate between real fires<br />

and false signals perhaps caused by steam or<br />

cooking smoke, has accelerated in recent years.<br />

Detectors can also be used together or in<br />

other modes specifically designed to reduce<br />

false alarms. For example, multi-sensor<br />

detectors may be switched between heat and<br />

smoke in order to confirm a signal. Several<br />

detectors may also be combined, for example<br />

using double-knock or coincidence to confirm a<br />

genuine signal.<br />

Automatic, addressable fire systems will<br />

analyse detector signals and then, if the signals<br />

match expected criteria, activate a range of<br />

verification and confirmation procedures. A<br />

good fire system can do a huge amount<br />

automatically and much can be achieved with<br />

minimal human intervention.<br />

However, one of the key ways to reduce false<br />

alarms is to involve people and, in order to make<br />

this effective, some manufacturers have<br />

introduced dedicated false alarm input devices.<br />

Verification time extensions<br />

The AlarmCalm Button, part of Advanced’s<br />

AlarmCalm solution, allows the verification time<br />

on a system to be extended by the occupant of a<br />

room if they believe the signal to be ‘false’ in<br />

their area. If the signal clears then the system<br />

will return to normal. If it persists beyond the<br />

pre-set verification time then the system will go<br />

into full alarm and implement the next phase of<br />

‘cause and effect’ such as evacuation.<br />

Involving people, even trained individuals,<br />

means fail-safes must be strong. The AlarmCalm<br />

button can only be pressed once before a<br />

system reset and times are programmable. If an<br />

alarm signal has been verified by the panel or if<br />

a manual Call Point is activated, the system will<br />

enter a full fire alarm condition immediately.<br />

Equally, if a pre-set number of areas are in<br />

verification (ie detecting potential fire signals)<br />

the system will go into full alarm. The benefits<br />

of involving the occupants of, say, a student<br />

accommodation building are, however, pretty<br />

hard to ignore.<br />

Another key aspect to consider when<br />

specifying a false alarm management system is<br />

ease of system management. Can the system be<br />

divided precisely into different areas? Can<br />

points be managed singly or grouped, as in an<br />

apartment, and is it easy to programme and<br />

install? Wiring and configuration on larger sites<br />

can add much complexity and cost.<br />

Intuitive in operation<br />

Equally, priority should be given to selecting a<br />

system that’s acceptably intuitive for staff and<br />

designated users alike to operate. The ability to<br />

share information in dynamic fire conditions has<br />

also developed rapidly. For example, some<br />

touchscreen displays are a key tool that can<br />

make it far easier to identify the location and<br />

status of an alarm.<br />

Careful consideration should also be given to<br />

how the system will be monitored, serviced and<br />

maintained. There are a growing number of<br />

solutions that allow fire systems to be remotely<br />

monitored and controlled over the Internet,<br />

which means an engineer can arrive with a plan<br />

agreed and all spare parts required, in turn<br />

minimising disruption to the building’s users.<br />

In summary, then, false fire alarms most<br />

certainly remain a problem, but the industry has<br />

the tools at its disposal to radically reduce them<br />

and, indeed, their impact. This will certainly<br />

involve trained professionals at the design and<br />

specification stage and, possibly, the trained<br />

occupants of a given building.<br />

34<br />

www.risk-uk.com


The most sophisticated configurable<br />

water leak detection system available<br />

Protect your assets from the greatest risk to<br />

buildings and managed systems: Water.<br />

The only way to mitigate the risk of water damage is to continuously monitor for water<br />

leaks. The risk assessment of water damage and the installation of Water Leak Detection<br />

Systems are increasingly being recommended by commercial insurers and is often a<br />

requirement for full cover.<br />

Hydrosense systems deliver a new standard in water leak detection. Unlike other<br />

systems, Hydrosense is fully customisable and configurable allowing connection to<br />

Building Management Systems (BMS) and a wealth of other vital supporting systems.<br />

Hydrosense continuously monitors for water leaks protecting a company’s building and<br />

assets year in year out.<br />

Contact Us Today!<br />

vimpex.co.uk<br />

sales@vimpex.co.uk<br />

01702 216 99


FIRE SAFETY<br />

Fire Alarms and Detection: Best Practice<br />

Mike Floyd of the Fire Protection Association examines the<br />

management, use and maintenance of fire alarm and<br />

detection systems<br />

Further guidance<br />

Further guidance on the<br />

completion of these tasks<br />

is available from the FPA’s<br />

Training or Publications<br />

Departments. The FPA also<br />

hosts a monthly webinar<br />

series which recently<br />

covered alarm systems,<br />

roles and responsibilities.<br />

All webinars are recorded<br />

and available in the<br />

member’s area of the FPA’s<br />

website: www.thefpa.co.uk<br />

*For more information on<br />

alarm systems and<br />

maintenance needs send<br />

an e-mail to:<br />

technical@thefpa.co.uk<br />

ire alarm and detection systems are<br />

Fundoubtedly an integral part of the fire<br />

protection strategy for a property. However,<br />

the management and maintenance of these<br />

systems are all-too-often overlooked, poorly<br />

maintained and/or poorly managed. The<br />

severity of this situation is often<br />

underestimated. This can leave people and<br />

assets badly exposed, invalidate insurance<br />

policies and. in many cases, fall foul of the law.<br />

System management<br />

In any premises subject to the requirements of<br />

the Regulatory Reform (Fire Safety) Order 2005<br />

or equivalent legislation, a responsible person<br />

or duty holder must carry out a fire risk<br />

assessment that considers the safety in case of<br />

fire of all ‘relevant persons’. A relevant person is<br />

any individual who is or may be lawfully on the<br />

premises or any person in the immediate vicinity<br />

who’s at risk from a fire on the premises.<br />

Particular attention needs to be paid to those<br />

at special risk, such as disabled people and<br />

those with special support needs, and must<br />

include consideration of any dangerous<br />

substance likely to be on the premises.<br />

The person with day-to-day responsibility for<br />

the system, not necessarily a competent person,<br />

is now termed ‘premises management’ to<br />

remove the confusion with the former title of<br />

‘responsible person’ which had been used in the<br />

previous edition of the British Standard and is<br />

used in overarching legislation in England and<br />

Wales as described above.<br />

This person may be the first point of contact<br />

on fire alarm problems for any member of staff<br />

or service contractors. They may also keep the<br />

log book up to date, including false alarm<br />

entries. The evacuation arrangements and<br />

warnings will have been determined from the<br />

building’s fire risk assessment.<br />

Evacuation arrangements and<br />

warnings<br />

In some cases, a general evacuation warning<br />

may be inappropriate and a delayed or staged<br />

evacuation, perhaps by floor or defined area,<br />

may be adopted. In those places such as<br />

hospitals or department stores where a general<br />

audible alarm isn’t deemed to be immediately<br />

desirable, the alarm may be transmitted to a<br />

permanently staffed control point or discretely<br />

to pagers held by key staff whereby trained<br />

people can assess the warning required and<br />

then pass on the necessary instructions to staff<br />

or the Controol Room as appropriate.<br />

In taller commercial buildings designed with<br />

reduced stair capacity, the evacuation signal<br />

may be ‘phased’. This requires the fire alarm<br />

system to emit a clear message to individual<br />

floors in sequence so as to avoid overloading<br />

the staircases.<br />

A voice message system is the preferred<br />

arrangement in such cases as an ordinary<br />

sounder tone may ‘bleed’ into additional areas,<br />

causing confusion as to when to evacuate.<br />

Maintenance regimes<br />

BS 5839-1 outlines the current guidelines for<br />

servicing and maintenance regimes related to<br />

automatic fire detection and alarm systems.<br />

Many organisations, though, continue to service<br />

systems to the previous guidelines. Practising<br />

professionals should be aware that this doesn’t<br />

ensure compliance with the current standards.<br />

A maintenance regime may include the<br />

following elements:<br />

• Weekly test<br />

• Monthly user requirements (where generators<br />

are used as a form of standby power)<br />

• Quarterly inspection of vented batteries<br />

• Periodic inspection and testing of the system<br />

(not exceeding six months between tests)<br />

• Annual service which may be undertaken<br />

across two six-monthly services or any other<br />

pattern that assures not more than 12 months<br />

pass since any device has received attention<br />

36<br />

www.risk-uk.com


ATTRACTING<br />

YOUNG TALENT<br />

INTO THE LIFE SAFETY INDUSTRY<br />

95% the<br />

Of life safety installers think the industry<br />

isn’t doing enough to provide training for<br />

next generation of professionals<br />

JUST<br />

17%<br />

Work for a company<br />

that offers a graduate<br />

programme<br />

9IN10<br />

Said that the sector had<br />

a responsiblity to educate<br />

secondary school pupils<br />

on the range of life safety<br />

roles available<br />

78%<br />

Of respondents felt that<br />

young people don’t know<br />

what jobs are available<br />

in the life safety sector<br />

2IN 5<br />

Respondents work for<br />

a company that offers an<br />

apprenticeship programme<br />

TWO THIRDS<br />

Are worried that young people don’t view the industry as a viable career path<br />

Based on a study of European fire safety and emergency lighting installers by Hochiki Europe


FIRE SAFETY<br />

Audible and Visual Protection<br />

Pulse Alert Technology from Klaxon Signals is an award-winning beacon<br />

warning system which produces a light output that can protect most<br />

rooms with just a single device<br />

“All buildings deserve<br />

the latest fire<br />

evacuation<br />

technology, all fire<br />

alarm systems should<br />

be able to be<br />

upgraded and<br />

everyone deserves to<br />

feel safe and secure”<br />

odels in the Sonos Pulse range of EN54-<br />

M23 compliant beacons and sounder<br />

beacons are designed to ensure that all<br />

personnel, including those individuals with<br />

sensory impairments or working in sensory<br />

depriving conditions, are notified of fire<br />

emergencies. Featuring Pulse Alert Technology,<br />

Klaxon’s EN54-23 compliant beacons enable<br />

buildings to be evacuated much quicker, make<br />

evacuation requirements clear and<br />

unambiguous and allow personnel to feel safe.<br />

Relying on audible fire alarm notification<br />

alone disadvantages those people with hearing<br />

impairments or those working, or living in<br />

sound-reducing conditions. Even something as<br />

simple as wearing a pair of headphones could<br />

prevent someone from hearing an audible fire<br />

evacuation warning. To evacuate everyone from<br />

a building, fire systems need to signal<br />

effectively using light as well as sound.<br />

EN54-23 specifies the minimum performance<br />

requirements for Visual Alarm Devices. Klaxon’s<br />

Sonos Pulse beacons produce a light output<br />

that can protect most rooms with the<br />

installation of just a single device.<br />

Optical systems disperse light evenly,<br />

ensuring the most efficient distribution of light<br />

to maximise effectiveness.<br />

Klaxon’s Pulse Alert Technology affords all of<br />

the benefits an EN54-23 compliant system can<br />

bring, while at the same time answering all of<br />

the design challenges.<br />

Featuring the latest high-power LED<br />

technology, Pulse Alert Technology contains<br />

advance LED drive circuitry, further improving<br />

efficiency, light output performance and longterm<br />

device reliability. Sonos Pulse LED circuits<br />

are designed to exceed five years of continual<br />

operation without degradation of light output.<br />

As a company, Klaxon firmly believes that all<br />

buildings deserve the latest fire evacuation<br />

technology, that all fire alarm systems should be<br />

able to be upgraded and that everyone deserves<br />

to feel safe and secure.<br />

Installation<br />

EN54-23 specifies three different classification categories for Visual Alarm Devices: Wall, Ceiling and Open. Wall and Ceiling mount<br />

categories are specified at designated mounting heights and particular coverage pattern areas, as detailed by EN54-23. Open<br />

classification allows the manufacturer to specify the coverage volume and coverage shape and doesn’t restrict mounting height.<br />

Pulse Alert Technology has been designed to exceed the requirements of both Wall and Ceiling classifications, providing system<br />

designers with simple device performance specifications.<br />

Wall Classification<br />

Wall-mounted devices provide a rectangular prism of light. Wall<br />

classification devices with Pulse Alert Technology can be<br />

mounted up to 3.1 m in height and cover an 11.3 m x 11.3 m area<br />

Ceiling Classification<br />

Ceiling-mounted devices provide a cylinder of light. Ceiling<br />

classification devices with Pulse Alert Technology can be<br />

mounted up to 3 m in height and cover a 15 m-diameter area<br />

38<br />

www.risk-uk.com


The Standard in Fire Systems<br />

Advanced fire systems are famously easy<br />

to install, maintain and operate, with<br />

quality and performance levels that lead<br />

the industry in over 60 countries.<br />

MxPro 5 is our unbeatable multiprotocol<br />

panel. It includes AlarmCalm false alarm<br />

management and supports TouchControl<br />

repeaters with Active Maps.<br />

Contact us now for more information or a demo<br />

Tel: +44 (0)1670 707 111 Fax: +44 (0)1670 707 222<br />

Email: sales@advancedco.com Web: www.advancedco.com


FIRE SAFETY<br />

Following the Grenfell<br />

Tower fire in June,<br />

BAFE’s CEO Stephen<br />

Adams focuses on<br />

the subject of fire risk<br />

assessments and the<br />

need for genuine<br />

measures of<br />

competence to be<br />

included for individual<br />

assessors as part of<br />

legislative<br />

requirements<br />

40<br />

www.bafe.org.uk<br />

Assessing Fire Risk<br />

n a recent statement issued by BAFE, we said:<br />

I“While there can never be absolute certainty<br />

that even the most experienced fire risk<br />

assessor will be able to inspect and analyse<br />

every part of a building’s construction – for<br />

example, there are parts of a structure that will<br />

be inaccessible when a building’s completed<br />

and, without extensive re-examination, material<br />

test reports have to be taken at face value – a<br />

competent assessor will recognise and highlight<br />

any potential concerns.”<br />

Unfortunately, Grenfell Tower highlighted a<br />

situation wherein the external materials used<br />

were apparently not suitable for the building<br />

and would require extensive re-examination by<br />

a testing authority to confirm this point.<br />

This tragedy has also shone the spotlight on<br />

fire risk assessors and the law behind this<br />

process. With a suitable assessment, actions<br />

may have been raised to ensure that common<br />

areas of the building were as safe as possible in<br />

order for residents to evacuate.<br />

Grenfell Tower was an horrific tragedy with a<br />

large loss of life, but we would also highlight<br />

another major fire at the Rosepark Care Home in<br />

Scotland during January 2004 that took the lives<br />

of 14 elderly residents. Sheriff Principal Brian<br />

Lockhart, who led the fatal accident inquiry,<br />

stated that “some or all” of the deaths could<br />

have been prevented and also said: “The<br />

management of fire safety at Rosepark was<br />

systematically and seriously defective. The<br />

deficiencies in the management of fire safety<br />

contributed to the deaths.”<br />

As a result of the Rosepark Care Home fire,<br />

the Regulation and Quality Improvement<br />

Authority in Northern Ireland issued information<br />

to the managers and proprietors of all regulated<br />

residential care establishments. This stated that<br />

all new fire risk assessments should be<br />

performed by a competent provider holding the<br />

appropriate registration or certification (which<br />

includes the BAFE SP205 Life Safety Fire Risk<br />

Assessment Scheme).<br />

While this isn’t a fully-mandatory<br />

requirement, it’s certainly a step in the right<br />

direction for fire safety.<br />

Despite the various national legislation<br />

requirements which came into force over ten<br />

years ago (changing the responsibility from the<br />

Fire and Rescue Services to the ‘Responsible<br />

Person’ or duty holder), there are still no<br />

statutory requirements in place to measure the<br />

competence of a fire risk assessor, even in care<br />

homes or other high risk premises.<br />

Reforming the system<br />

David Sibert, an experienced firefighter and<br />

qualified fire engineer who advises the Fire<br />

Brigades Union, informed the BBC that the<br />

Government had failed to respond to demands<br />

from the fire industry to reform the system<br />

following the Lakanal House blaze in July 2009<br />

that claimed six lives.<br />

In fact, Sibert said: “There are no controls on<br />

who can be a fire risk assessor or over the<br />

competence or skills that they should have.”<br />

Stuart Edgar, chief fire officer for<br />

Gloucestershire Fire and Rescue Service and<br />

chairman of the Protection Committee of the<br />

National Fire Chiefs’ Council, told ITV Tonight<br />

that they would encourage third party<br />

certification of fire risk assessors.<br />

After the Lakanal House fire, a Competency<br />

Council comprising experts from across the fire<br />

industry was established and produced a ‘Guide<br />

for Choosing a Competent Fire Risk Assessor’<br />

which is now available through the Fire Sector<br />

Federation, CFOA and the BAFE website. This<br />

highlights the need for assessors to be qualified<br />

through a professional body and that companies<br />

providing such a service should be third party<br />

certificated by a UKAS-accredited certification<br />

body (even if they’re a sole provider). The<br />

largest of these company certification schemes<br />

is the BAFE SP205 register.<br />

BAFE considers it imperative that genuine<br />

measures of competence for fire risk<br />

assessments are included as part of legislative<br />

requirements. While we’re pleased with the<br />

recent announcement from Government relating<br />

to a review of the Building Regulations,<br />

mandatory fire safety requirements need to be<br />

introduced to help in identifying where there are<br />

potential life safety risks before there’s another<br />

tragedy. All businesses must adhere to fire<br />

safety legislation and it’s imperative that they’re<br />

using competent providers to help them fulfil<br />

their duties, primarily to protect life, but also<br />

the buildings themselves and their contents.<br />

www.risk-uk.com


Evacuate everyone<br />

EN54-23 Approved Fire Beacons<br />

<br />

<br />

<br />

<br />

<br />

Seminars<br />

<br />

<br />

EN54-3 Sonders & Beacons<br />

Nexus 105/110/120 Sounders<br />

<br />

Sonos Sounder Beacon<br />

<br />

Tel: +44 (0)1706 233879


FIRE SAFETY<br />

Emergency Lighting Standards<br />

Ian Watts, emergency<br />

lighting manager at<br />

Hochiki Europe,<br />

explains the most<br />

recent updates to BS<br />

5266 and what they<br />

mean for life safety<br />

system installers in<br />

the UK<br />

To find out more about<br />

Hochiki Europe visit<br />

www.hochikieurope.com<br />

42<br />

he British Standards Institution’s BS 5266<br />

TPart 1 2016 Emergency Lighting Code of<br />

Practice is a key standard in the life safety<br />

industry, helping to define Best Practice in the<br />

design, installation and maintenance of<br />

emergency lighting in order to protect the wellbeing<br />

of building occupants at all times.<br />

Recent updates to the standard bring a raft of<br />

changes that installers and duty holders need to<br />

be aware of to make certain that new and<br />

existing buildings continue to be compliant and<br />

keep occupants safe.<br />

Under the latest fire safety legislation in the<br />

UK and Europe, BS 5266 is no longer a<br />

prescriptive requirement. Buildings’ life safety<br />

systems can be legally compliant without being<br />

certified to this British Standard. However,<br />

compliance with BS 5266 is the easiest way to<br />

demonstrate to the auditing authorities that<br />

adequate safety precautions are in place.<br />

Certification needs to be reviewed every 12<br />

months (and after any renovation work has been<br />

carried out) to ensure a given property<br />

continues to meet the latest requirements.<br />

New lighting categories<br />

BS 5266 now stipulates the inclusion of<br />

emergency safety lighting that allows occupants<br />

to see their surroundings in the event of a mains<br />

supply failure and the loss of normal lighting.<br />

The British Standard also recommends that<br />

procedures are put in place to determine<br />

whether a premises needs to be evacuated<br />

immediately in the event of a safety incident<br />

and, if a ‘defended place’ or ‘stay-put’ solution is<br />

agreed upon, to then direct occupants to safe<br />

refuges. Duty holders can use risk assessments<br />

to identify these situations and put the<br />

necessary measures in place to address them.<br />

While lux level guidance for escape lighting<br />

remains the same as in previous editions of BS<br />

5266, a host of design conditions for lux<br />

calculations have been added to ensure lighting<br />

remains at the minimum level required for the<br />

duration of a potential incident. The effects of a<br />

reduction in voltage, ageing batteries and lamps<br />

and dirt accumulation should be accounted for.<br />

In those areas where dangerous processes<br />

are carried out, it’s now advised to implement<br />

procedures to automatically shut down any<br />

hazardous operations. Lux values of 10% of the<br />

mains lighting level or 15 lux (whichever is the<br />

greater) should always be adhered to.<br />

Of equal importance is the time taken for the<br />

emergency lighting to switch on. In high risk<br />

areas, this period should never be more than 0.5<br />

seconds in order to minimise the risk of harm to<br />

building occupants.<br />

Testing and maintenance<br />

To ensure optimum performance and safeguard<br />

occupants’ well-being, emergency lighting<br />

systems should be tested and cleaned at least<br />

once every month.<br />

Furthermore, each luminaire must be visually<br />

inspected no less than once each year in order<br />

to ensure it’s in good working order and,<br />

importantly, offering the correct lux level.<br />

Under the new guidelines, this testing regime<br />

should be carried out at a period of low risk, or<br />

while the building is empty, in order to minimise<br />

risk to occupants. Alternate luminaires should<br />

be tested in any 24-hour period with a view to<br />

ensuring that the building always has a charged<br />

and fully-operational evacuation system<br />

available to assist occupants.<br />

Systems should also be tested for their full<br />

rated duration to make sure that they do indeed<br />

meet specified performance requirements.<br />

The simplest way in which to achieve these<br />

requirements is by incorporating a certified EN<br />

62034 automatic testing system.<br />

Acting on faults<br />

BS 5266 requires that a qualified engineer<br />

carries out corrective action whenever a failure<br />

has been identified. It also recommends that<br />

alternative safety procedures be put in place<br />

until the repair is complete and the system has<br />

been re-tested satisfactorily to ensure occupant<br />

safety is never compromised.<br />

Standards relating to fire detection and<br />

emergency lighting are updated all the time,<br />

duly reflecting the evolving safety requirements<br />

of the built environment. It’s crucial that<br />

installers and duty holders do all they can to<br />

keep up with these changes in order to ensure<br />

their premises remain legally compliant.<br />

www.risk-uk.com


CUT OUT AND KEEP<br />

<br />

DO IT<br />

<br />

You could face jail<br />

or six-figure fines if<br />

you don’t appoint a<br />

competent person<br />

to perform your fire<br />

risk assessment.<br />

Receive training to complete<br />

your Fire Risk Assessment.<br />

• Helps prove your competency<br />

• Choose courses to suit all<br />

experience levels<br />

• Courses held across the<br />

UK or at your offices<br />

Email: training@thefpa.co.uk or visit<br />

www.thefpa.co.uk/training<br />

CUT HERE<br />

Let us complete your<br />

Fire Risk Assessment.<br />

We have the experience to complete<br />

assessments of all sizes and complexity<br />

• Accredited with BAFE SP205 Certification<br />

Email: technical@thefpa.co.uk or visit<br />

www.thefpa.co.uk/services<br />

Do your Fire Risk Assessment<br />

justice. Call us now on<br />

01608 812 500 or<br />

visit www.thefpa.co.uk


Meet The<br />

Security Company<br />

This is the second<br />

instalment of a new<br />

series of articles for<br />

the readers of Risk UK<br />

in which we focus the<br />

spotlight on NSIapproved<br />

businesses<br />

for the benefit of risk<br />

and security managers<br />

who purchase security<br />

guarding as well as<br />

systems-focused<br />

solutions. Answering<br />

our questions on this<br />

occasion is Stephen<br />

McComb, director of<br />

Cobra Security<br />

Risk UK: Can you briefly describe your<br />

business’ activities and what you consider to<br />

be your USP as an organisation?<br />

Stephen McComb: Cobra Security is a security<br />

services business based in Lisburn, Northern<br />

Ireland that has been delivering tailored<br />

security solutions to its client base throughout<br />

the UK and Ireland since 1998.<br />

We have a dedicated and experienced team<br />

of security professionals on board whose<br />

constituent members provide the following<br />

services: key holding and alarm response, door<br />

supervision, CCTV installation and monitoring,<br />

corporate concierge solutions and a security<br />

guard dogs/dog handling service.<br />

As an organisation, Cobra Security has one<br />

overarching goal: to protect our clients’ people,<br />

customers and assets. We tailor a specific<br />

security solution for the benefit of each of our<br />

clients by listening to their requirements and<br />

advising on how we can best meet their needs<br />

while also adhering to budget.<br />

This formula has led us to be trusted by a<br />

wide range of clients, from individuals to SMEs<br />

and on to some of the top brands and blue chip<br />

companies in the UK, Northern Ireland and the<br />

Republic of Ireland. We provide security<br />

services for Government, councils, the<br />

education, healthcare and construction sectors<br />

and private commercial and industrial concerns.<br />

Having been in operation since 1998, we’ve<br />

developed a deep understanding of the security<br />

issues impacting UK and Irish companies and<br />

organisations on a daily basis. In turn, the<br />

business has nurtured robust and bespoke<br />

systems that allow us to respond both quickly<br />

and effectively to situations that arise, ensuring<br />

peace of mind for our customers at all times.<br />

Risk UK: What do your clients value most<br />

about the services you deliver?<br />

Stephen McComb: Cobra Security is proud of<br />

the security services it provides to each of its<br />

clients and the bespoke solutions we offer<br />

depending on their defined requirements.<br />

Customer satisfaction is of the utmost<br />

importance to us, with our main priority being<br />

to ensure we provide the best service possible.<br />

The company has always embraced the ethos<br />

that its customers must receive reliability,<br />

honesty and transparency at all times.<br />

As stated, we tailor our security solutions to<br />

fit each client’s requirements and budget and,<br />

above all, we do what we say we’ll do in an<br />

efficient and professional manner. Our clients<br />

most certainly appreciate the personal service<br />

Cobra Security offers them.<br />

As company director, I value building longlasting<br />

working relationships with every client.<br />

I’m in constant and regular contact with our<br />

client companies, whether it be by visiting<br />

sites, meeting with their representatives faceto-face<br />

or via the telephone, and am always<br />

there should they need to speak with me. This<br />

level of personal service runs throughout Cobra<br />

Security’s management team and is instilled<br />

within the whole organisation.<br />

About the National Security Inspectorate<br />

The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />

company limited by guarantee and operates as a UKAS-accredited certification<br />

body specialising in the security and fire safety sectors.<br />

For over 40 years, the NSI has served to protect businesses, homeowners<br />

and the general public alike, raising standards by providing robust and high<br />

quality audits of both security and fire safety service providers.<br />

Risk UK: How do you feel accreditations have<br />

assisted your company?<br />

Stephen McComb: Cobra Security has always<br />

harboured an ethos of securing the most<br />

important accreditations within the security<br />

industry. For example, we’re a registered<br />

business on the Security Industry Authority’s<br />

(SIA) Approved Contractor Scheme (ACS) for the<br />

provision of security guarding and key holding,<br />

44<br />

www.risk-uk.com


Meet The Security Company: Cobra Security<br />

In association with the<br />

NSI Guarding Gold-approved and accredited to<br />

ISO 9001:2008, BS 7984:2008, BS 7825:2012,<br />

BS 7499:2013 and BS 7958:2015.<br />

The fact that we’ve been awarded these<br />

accreditations shows clients that the business<br />

is professional, audited and regulated. In short,<br />

they’re in safe hands when they work with us.<br />

Risk UK: Specifically, what value does ACS<br />

registration and NSI Guarding Gold approval<br />

bring to your business and its clients?<br />

Stephen McComb: ACS registration and NSI<br />

Guarding Gold approval demonstrate to clients<br />

the level of service and quality they will receive<br />

from a highly accredited company. They show<br />

that we adhere to the most stringent auditing<br />

processes available in the industry.<br />

In terms of our business, this helps us to<br />

continually raise our standards, embrace new<br />

methods of working, develop efficiencies in<br />

order to advance our company and improve on<br />

what it is that we already do.<br />

Risk UK: In practice, what are the main<br />

differences between ACS registration and NSI<br />

Guarding Gold approval?<br />

Stephen McComb: ACS registration and NSI<br />

Guarding Gold approval are voluntary schemes<br />

in the security business sector. Security<br />

companies don’t have to have these<br />

accreditations to operate in the industry. Cobra<br />

Security chose to be audited at the highest<br />

level as we know that not only does this afford<br />

our customers added peace of mind, but it also<br />

helps us to achieve more as a business.<br />

NSI Guarding Gold is a more rigorous<br />

auditing scheme than that imposed by the ACS.<br />

The ACS audits to ensure that a company<br />

understands what it should be doing, while the<br />

NSI audits to make certain that a business is<br />

actually doing what it should be doing.<br />

Risk UK: How do you think technology has<br />

changed the industry over the last couple of<br />

years and what do you feel will be the<br />

direction of travel in the future?<br />

Stephen McComb: Technology is moving at a<br />

very fast pace and, at Cobra Security, we<br />

absolutely believe in embracing it.<br />

We’ve found that the business community in<br />

particular also embraces advancements in<br />

technology and fully realises the benefits of<br />

using it in terms of their budgetary spend. This<br />

trend is speeding up, and specifically so in<br />

relation to the apparent decline in the demand<br />

for manned security personnel.<br />

Risk UK: When it comes to negotiating<br />

contracts and responding to tender requests,<br />

what aspects are of most value to customers<br />

and how are these changing?<br />

Stephen McComb: Value for money and cost<br />

savings are two of the most important elements<br />

here. Clients are constantly looking for ways in<br />

which to save money. Introducing technology<br />

and value-added services to contracts is the<br />

way forward, while at the same always ensuring<br />

that a given contract is tailored to the client’s<br />

specific and stated needs.<br />

Risk UK: How has Government legislation (eg<br />

the National Minimum Wage, the National<br />

Living Wage and holiday pay) affected your<br />

business? Do you believe such legislation is<br />

a good thing?<br />

Stephen McComb: The legislation you’ve<br />

mentioned is attempting to improve the living<br />

standards of workers in low or minimum wage<br />

jobs. I can completely understand the<br />

sentiment behind what the Government is<br />

attempting to do here, but in the security<br />

industry it’s simply not working.<br />

In practice, clients now offset these increases<br />

with a change in service requirements such as<br />

replacing physical security guarding with a<br />

technology-based solution or otherwise<br />

reducing man hours. This is a massive factor<br />

facing the security industry as the increases are<br />

set to continue until 2020.<br />

As time goes on, I strongly believe this will<br />

show a direct correlation with a reduction of<br />

people employed in the security industry.<br />

Risk UK: What are the most important<br />

attributes you look for in your security<br />

officers and staff members in general?<br />

Stephen McComb: Cobra Security ensures its<br />

employees understand the importance of<br />

customer service and customer care. Without<br />

doubt, the key attributes we look for in<br />

employees are honesty, integrity, a hardworking<br />

attitude, excellent presentation and smartness,<br />

the ability to think quickly, conscientiousness<br />

and the overriding desire to be a team player.<br />

Risk UK: How can the SIA, the NSI and<br />

industry standards best serve the sector in<br />

addition to the needs of your company’s<br />

clients and the wider public interest? Will<br />

the introduction of business licensing be a<br />

positive step?<br />

Stephen McComb: I don’t believe there’s<br />

enough of an understanding of who or what the<br />

NSI and the SIA are, and specifically so in<br />

Northern Ireland. Raising awareness is key.<br />

Mandatory business licensing would be a<br />

good thing because, as stated, the ACS and NSI<br />

Guarding Gold are voluntary schemes.<br />

Name<br />

Stephen McComb<br />

Job title<br />

Company Director<br />

Time in the security sector<br />

I’ve worked in the security<br />

industry since 1985 for<br />

companies including Federal<br />

Security Services, Resource<br />

and Mitie. I joined Cobra<br />

Security in July 2015. I’ve<br />

served at every level in<br />

security, including the roles<br />

of security officer, CCTV<br />

operator, operations coordinator,<br />

operations<br />

manager, regional manager<br />

and general manager<br />

Location of the business<br />

Lisburn, Northern Ireland<br />

Areas of expertise<br />

Cobra provides services in the<br />

commercial, industrial and<br />

events sectors, with those<br />

services including door<br />

supervision, corporate<br />

concierge, CCTV installation<br />

and monitoring, security<br />

guard dog and guard dog<br />

handling provision, key<br />

holding and alarm response<br />

Accreditations<br />

SIA ACS, NSI Guarding Gold<br />

Scheme, ISO 9001:2008, BS<br />

7984:2008, BS 7825:2012, BS<br />

7499:2013 and BS 7958:2015<br />

Stephen McComb:<br />

Director of Cobra Security<br />

45<br />

www.risk-uk.com


Advertisement Feature<br />

Reaping the Benefits of Full Security Integration<br />

The widespread use of<br />

truly integrated<br />

systems is one of the<br />

most important<br />

developments in the<br />

security sector for<br />

decades. With a heavy<br />

reliance on software,<br />

using open systems<br />

has gone from being a<br />

desirable selling point<br />

to a necessity in only<br />

a few years, writes<br />

John Davies<br />

John Davies:<br />

Managing Director of TDSi<br />

As well as the obvious security advantages,<br />

there’s potentially a whole new world of<br />

opportunities for operators thanks to the<br />

arrival of the Internet of Things (IoT), but at the<br />

same time there are additional factors that<br />

need to be considered which may not have<br />

been an issue in the past.<br />

It might seem obvious at first glance, but this<br />

is a valid question: ‘Why does the security<br />

industry and its customers need full<br />

integration?’ Put simply, if all the components<br />

within the security and wider IT network have<br />

the ability to interact, they can offer so much<br />

more than their individual capabilities. This is<br />

certainly something that has transformed the<br />

way in which organisations think about their<br />

security systems and how they work in the<br />

wider context of their business systems.<br />

From passive, yet rather elaborate electronic<br />

doors/locks and basic CCTV over the past few<br />

decades, we now have Artificial Intelligence and<br />

connected surveillance systems with an in-built<br />

analytics capability which not only match, but<br />

in practice usually outperform a human<br />

operator fulfilling the same role.<br />

Reducing costs, broadening choice<br />

Another key factor in the popularity of<br />

integrated networks is cost. Producing<br />

compatible systems makes it both simpler and<br />

cheaper for customers to choose, purchase and<br />

use the most efficient components for their<br />

needs. Equally, for manufacturers and suppliers<br />

it’s more cost-effective to produce standardised<br />

products. The IoT is going a long way towards<br />

driving demand and the security industry has<br />

sensibly taken this on board, catering heavily<br />

for these market forces.<br />

Within the security industry itself there have<br />

also been interesting and helpful<br />

developments. The International<br />

Electrotechnical Commission recently adopted<br />

ONVIF Profile A and C as the de facto new<br />

international standard for access control which<br />

will offer a truly universal benchmark for<br />

security software and hardware integration.<br />

Naturally, full integration also provides<br />

greater choice, offering the ability to ‘mix and<br />

match’ different components to find the most<br />

suitable and bespoke solution. On the face of<br />

it, it may seem that older legacy systems will<br />

struggle to cope with this, but actually the<br />

flexibility of a fully-integrated approach means<br />

that isn’t necessarily the case. Modern<br />

integrated open protocol systems are often<br />

able to ‘bridge the gap’ in a way that<br />

proprietary systems would simply have failed to<br />

do in the past.<br />

It’s also somewhat ironic that developments<br />

in the latest technology may actually make it<br />

possible for some older systems to continue<br />

being used beyond their expected lifespan.<br />

Mining and analysing data<br />

With integrated systems, the benefits go<br />

beyond just the security provision. If an<br />

intelligent system can learn the behaviours and<br />

trends of people and property within its remit,<br />

it can then predict patterns and, from this, help<br />

to increase efficiencies across the whole<br />

organisation and its facilities.<br />

By mining the data from security systems, it’s<br />

possible to form a detailed picture of any<br />

controlled area and the activity going on within<br />

it. This is a powerful tool for any organisation,<br />

affording an instant snapshot of people<br />

movement or the use of resources while also<br />

monitoring for security threats.<br />

A good example of such data analysis in<br />

practice is the widespread integration of<br />

security with IT infrastructure, power, lighting,<br />

heating and ventilation systems. As CCTV and<br />

intruder detection systems can equally check<br />

the real-time occupancy of a designated area,<br />

these sensors can advise when the correct<br />

individuals are attempting to log-in to the<br />

network. Equally so, when environmental<br />

systems are not required, these solutions can<br />

intelligently lower energy consumption (where<br />

possible) and ensure secured access to the<br />

host organisation’s IT network.<br />

This ability to assess a given situation<br />

renders security components the ideal ‘eyes<br />

and ears’ of more intelligent automated<br />

systems. Such technology is now being used to<br />

assess and report on people traffic in busy<br />

office spaces. Security and detection systems<br />

can ascertain who’s entering the space and<br />

where they need to go and then direct them to<br />

the most appropriate route for their destination<br />

(be that a lift, a ‘hot desk’ or a meeting room).<br />

Going forward, security providers and<br />

operators will need to be even more aware of<br />

how their whole organisation works (right down<br />

to a granular level) when it comes to systems<br />

integration. This may seem somewhat<br />

daunting, but with the right planning and<br />

respect for their needs and benefits, the<br />

development and evolution of fully-integrated<br />

systems is set to continue being a key driving<br />

force for the security industry, in turn offering<br />

many more benefits than disadvantages.


The Security Institute’s View<br />

The first consideration needs to be what the<br />

organisation believes violence looks like.<br />

Over the years, panels of international<br />

experts have attempted on several occasions to<br />

create a unified definition of violence, all of<br />

them failing to reach a consensus.<br />

The Health and Safety Executive has<br />

espoused a definition that bears consideration,<br />

not least because this may be the standard by<br />

which an organisation is held to account in<br />

court. However, this definition falls well short of<br />

what an organisation needs to consider. It’s<br />

recommended that businesses work to develop<br />

their own definition which then becomes<br />

enshrined in their policies and processes.<br />

If we consider that the roots of the word<br />

‘violence’ come from the Latin words ‘vis’<br />

(force) and ‘latus’ (to carry), we’re eventually<br />

led to the word ‘violans’. Since the modern<br />

words ‘violence’ and ‘violation’ share the same<br />

root, we should consider that any act that’s a<br />

violation of a person (including acts against<br />

their body, dignity, autonomy and rights to the<br />

consequences of their actions) should be<br />

considered as violence. Without a clear and<br />

formal definition of what violence within an<br />

organisation means, there’s no foundation for<br />

incident reporting or risk measurement activity.<br />

An incident of violence within a workplace<br />

has a wide range of effects. ‘Conventional’<br />

physical violence has the obvious effect of<br />

harms to staff that range from physical harm to<br />

those affected through to emotional harm to<br />

them and others not directly involved, reduced<br />

employee commitment, reduced customer<br />

satisfaction, reduced productivity, increased<br />

conflict, absenteeism, staff attrition and<br />

recruitment costs and therefore increased<br />

training costs in addition to cultural harm.<br />

All of this is in addition to potential civil<br />

claims, criminal prosecutions and reputational<br />

harm that may arise.<br />

Shocking incidents of physical violence are<br />

not commonplace, yet gain far more attention<br />

than the day-to-day, lower-level negative<br />

workplace behaviours ultimately more corrosive<br />

to organisations. An incident of physical<br />

violence may harm one person, while a poor<br />

culture can harm hundreds or even thousands.<br />

When that number is multiplied by factors<br />

such as stress-related illness and absence,<br />

reduced productivity, the loss of human capital,<br />

replacement recruitment and training costs and<br />

settlements at tribunals, an idea of what<br />

violence can cost a business begins to emerge.<br />

Strategic level<br />

The scale of these risks clearly makes violence<br />

an organisational risk to be managed at a<br />

Violence Risk Management<br />

Violence in the workplace has been the subject of discussion<br />

for over 20 years, with concerns arising in sectors as diverse<br />

as healthcare, education, aviation, prisons and retail. As a<br />

result, it has arguably become one of the most researched<br />

areas of crime risk. Despite all of this attention, it seems that<br />

we’re no closer to an overall solution. Richard Diston argues<br />

that it may be time to adopt a fresh perspective on this issue<br />

strategic level rather than it being viewed as an<br />

operational risk. That said, most organisations<br />

still have little clarity on who’s actually<br />

responsible at Board level.<br />

Violence is commonly seen as an issue for<br />

security, Health and Safety or – in the cases of<br />

‘horizontal’ (eg staff on staff) violence – Human<br />

Resources. Given that violence is a specialist<br />

risk area, none of these departments are<br />

usually equipped to respond proactively in the<br />

prevention of such incidents. There’s an<br />

argument to be put forward that a formal risk<br />

management approach might be more effective.<br />

Referring to the ISO 31000 risk management<br />

standard, the first step is to establish the<br />

context of risk. If we apply this process directly<br />

to the matter of violence, we start to<br />

understand the importance of defining what<br />

violence means to an organisation. Due to the<br />

level of subjectivity involved, it’s worth<br />

considering the current models that are in place<br />

to help contextualise violence.<br />

Perhaps the most common typology in use<br />

was created by the Californian Occupational<br />

Safety and Health Administration and later<br />

amended by Vaughan Bowie. This model<br />

identifies four types of violence based on the<br />

Richard Diston MSc MSyI:<br />

Director and Principal<br />

Consultant at Ark Services<br />

(www.ark-services.co.uk)<br />

47<br />

www.risk-uk.com


The Security Institute’s View<br />

relationship between the perpetrator and the<br />

victim. These are intrusive violence (where<br />

there’s no legitimate business for the<br />

perpetrator at the site), consumer violence (the<br />

perpetrators of which initially have a legitimate<br />

reason to be present, but then act violently),<br />

relationship violence (whereby a relationship<br />

between parties, such as ex-colleagues or<br />

partners, exists) and, last but not least,<br />

organisational violence (which is violence<br />

performed by the organisation, such as through<br />

poor conditions, poor management or poor<br />

culture). This model has been in use for many<br />

years, but offers little detail of practical use in<br />

the management of the problem. Knowing that<br />

a customer may present a threat of violence<br />

doesn’t do much to assist in reducing the risks.<br />

Model of understanding<br />

To this end, it’s worth introducing a new model<br />

for understanding the nature of violence in the<br />

workplace. Focusing on the actual causes of<br />

violent conduct, we can identify seven different<br />

types collectively known as the V7 Model.<br />

Functional violence refers to violence being<br />

employed as a ‘means to an end’, such as in the<br />

perpetration of a crime. In contrast, predatory<br />

violence is perpetrated as its own end and can<br />

be used to refer to acts of terrorism, active<br />

shooters, rape, stalking and other incidents.<br />

Social violence describes situations where<br />

violence is used as social currency, such as in<br />

gangs where it’s employed to increase<br />

reputation or credibility or in incidents of<br />

bullying. Intimate violence takes place between<br />

individuals where there’s an existing intimate<br />

relationship, such as when situations of<br />

domestic abuse enter the workplace.<br />

Impaired violence refers to actions by people<br />

who may be under the influence of drink or<br />

drugs or otherwise suffering from mental<br />

illness. Expressive violence refers to the actions<br />

of individuals who struggle to communicate<br />

their needs (due to disability, for example).<br />

Finally, reactive violence describes situations<br />

where violence is triggered as a response to<br />

stimuli and can include customer outbursts as<br />

well as acts of self-defence.<br />

This typology of violence is based on the<br />

perceived motivations or intentions of the<br />

perpetrator according to their observable<br />

actions and behaviours. For greater context,<br />

each of these types is then subject to a further<br />

“Shocking incidents of physical violence are not<br />

commonplace, yet gain far more attention than the day-today,<br />

lower-level negative workplace behaviours”<br />

range of influences. These include situational<br />

variables (influences present in the actual<br />

‘moment’) as well as personal variables, such<br />

as psychology, personality, worldview,<br />

pathology and history.<br />

There are also social factors (referring to the<br />

ways in which the participants engaged in the<br />

event function within wider society). Finally,<br />

there needs to be a reflection on the<br />

organisational factors present in line with the<br />

concept of organisational violence.<br />

Each type of violence in the V7 Model is<br />

significantly different in purpose and so<br />

requires distinct mitigation methods that are<br />

contextually appropriate. What works for<br />

reducing one type might well exacerbate<br />

another. It can also be argued that an incident<br />

could include a number of these types of<br />

violence, such as an incident of intimate<br />

violence also including impaired and predatory<br />

types. As such, it would be worth planning for<br />

what are felt to be the most predominant types<br />

and designing mitigations as required.<br />

The V7 Model also affords us a solid<br />

foundation for a reporting scheme, given that it<br />

allows us to respect the subjectivity of the<br />

victim in describing what they felt the reason<br />

for the incident was, as well as supporting a<br />

parallel root cause analysis process.<br />

Common mitigations<br />

Common mitigations employed for violence<br />

management by organisations are usually<br />

focused on training. There are several problems<br />

with this approach, which lends itself to<br />

reducing liability through compliance with the<br />

Health and Safety at Work Act 1974 instead of<br />

actually trying to resolve the problems.<br />

There’s no academic evidence to suggest that<br />

physical intervention training is effective, while<br />

similar claims have recently been made about<br />

de-escalation training. Further, it can be argued<br />

that, in focusing on training of this nature, the<br />

organisational response to violence is more<br />

violence. There are also commentators who<br />

consider that training staff in conflict<br />

management indirectly blames them for<br />

contributing to situations in the first place.<br />

At this point, it may be worth pausing to<br />

consider our general approach to violence.<br />

Organisations focus on developing policies and<br />

procedures that centre heavily on what’s not<br />

acceptable. Anyone who has ever had any life<br />

coaching will be familiar with the statement<br />

that ‘what we resist persists’.<br />

It might be time, then, to switch our focus to<br />

a ‘positive peace’ model wherein we emphasise<br />

the behaviours and culture in which we wish to<br />

work instead of ‘fighting the fighting’.<br />

48<br />

www.risk-uk.com


EXTREME<br />

PERFORMANCE<br />

• eXperience the world’s best WDR (150dB)<br />

• 4X frames to create a more natural image<br />

• eXceptional clarity with adjustable light levels,<br />

even with backlight<br />

eXperience it now www.WisenetX.com


Resilience Revisited: Turning Our<br />

Attentions To Successes and Failures<br />

Despite widespread<br />

acknowledgement of<br />

the importance of<br />

‘resilience’ to today’s<br />

organisations, in<br />

practice a number of<br />

questions remain<br />

unanswered. Allison<br />

Wylde suggests that,<br />

despite the emergence<br />

of standards and<br />

research, there’s still<br />

deliberation on an<br />

agreed definition for<br />

the term, while<br />

methods for<br />

understanding and<br />

applying resilience are<br />

somewhat unclear<br />

Dr Allison Wylde BSc (Hons) MA<br />

FRGS FHEA DIC (Imperial):<br />

Faculty Member with Cardiff<br />

University’s Business School<br />

and a Research Fellow at<br />

Cardiff University’s Crime and<br />

Security Research Institute<br />

50<br />

www.risk-uk.com<br />

Arguably, the prevailing position around the<br />

definition of resilience and its<br />

understanding and application appears to<br />

arise partly as a result of its trans-disciplinary<br />

nature. As a consequence, a number of<br />

different schools of thought, theories and<br />

approaches have developed over the years, in<br />

turn giving rise to so-called ‘gurus’ on the<br />

discipline aside from those practitioners<br />

operating in this specialist realm.<br />

Findings from a recent UK survey which<br />

asked what resilience means within private<br />

sector organisations found that more than 80%<br />

of respondents named IT disaster recovery as<br />

the most important element of resilience. 55%<br />

suggested that it was security and 45%<br />

favoured Health and Safety.<br />

There’s an important gap in our knowledge<br />

and understanding of resilience. Further<br />

research might assist our comprehension of the<br />

different ways in which resilience may be<br />

understood and applied and its performance<br />

assessed. Clearly, further work must be<br />

undertaken in discussion with practitioners and<br />

those companies responsible for resilience<br />

plans being implemented.<br />

In addition, the specific requirements for<br />

each company, setting and industry need to be<br />

accounted for. In the here and now, we can<br />

focus on recent empirical studies and<br />

discussions concerning the topic of a resilience<br />

‘success and failure’-style approach. The<br />

overarching aim for all of us is to make sense of<br />

resilience as a discipline.<br />

In the field, practitioners typically<br />

concentrate their focus on a particular stage or<br />

phase of resilience. For example, the business<br />

continuity sector has been concerned with the<br />

stages of recovery from – and to – a ‘business<br />

as usual’ mode of operation.<br />

As is the case with the emergency sectors,<br />

security practitioners have tended to focus on a<br />

broader scope for resilience from the<br />

perspectives of anticipation and preparation as<br />

well incident and/or crisis management and<br />

recovery, together with issues of quality (eg ISO<br />

9000:2005) as well as the key drivers of risk<br />

(ISO Guide 73:2009 and ISO 31000:2009) and<br />

the supply chain (ISO 28002:2011).<br />

Engineers were arguably the first to adopt a<br />

reliability (ie repeatability) lifetime-focused<br />

approach. For their part, some researchers have<br />

more recently suggested that strengthening the<br />

anticipation element of resilience through<br />

concentrating on understanding ‘successes’, as<br />

well as failure, may provide benefits.<br />

Resilient system<br />

According to Hollnagel 1 , a resilient system will<br />

exhibit several different traits or ‘abilities’.<br />

First, there’s the ability to respond. It’s all about<br />

knowing what to do or being able to respond to<br />

regular and irregular changes, disturbances and<br />

opportunities by activating prepared actions or<br />

adjusting the current mode of functioning<br />

within the host organisation.<br />

Then there’s the ability to monitor. Knowing<br />

what to look for, or being able to monitor that<br />

which is or could seriously affect the system’s<br />

performance in the near term (either in a<br />

positive or negative way). The monitoring must<br />

cover the system’s own performance as well as<br />

what happens in the environment.<br />

Next on Hollnagel’s list is the ability to learn.<br />

Knowing what has happened or otherwise<br />

being able to learn from experience, and in<br />

particular learning the right lessons from the<br />

right experiences.<br />

Last, but by no means least, there’s the<br />

ability to anticipate. Here, the focus is squarely<br />

on knowing what to expect or being able to<br />

anticipate developments – such as potential<br />

disruptions, novel demands or constraints, new<br />

opportunities or changing operating conditions<br />

– further into the future.<br />

It’s interesting to note that, from a<br />

policymaker’s perspective, concerns regarding<br />

resilience have largely resulted in the creation<br />

of new standards and guidelines, as well as<br />

additional requirements for governance and/or<br />

safety regulations across organisations and<br />

civil society and during disaster recovery. As a<br />

direct consequence, the requirements for<br />

reporting near misses, due diligence and audit<br />

have increased.<br />

Yet, as the fire at Grenfell Tower in West<br />

London illustrated with such tragic effect back<br />

in June, even in advanced economies disastrous<br />

events and fatalities still occur. Tensions<br />

between the goals of resources versus<br />

efficiencies might have meant that standards<br />

were simply applied as minimum standards,<br />

while collaborations and partnerships may have<br />

fostered confusion and gaps in responsibility.


In the Spotlight: ASIS International UK Chapter<br />

One area that shows promise concerns<br />

apparent differences in the methodology of risk<br />

assessment and, in particular, risk ‘acceptance’<br />

as practised in different industries, sectors and<br />

countries. An example centres on industries<br />

operating in Scandinavian countries when<br />

compared with those in EU nations and, indeed,<br />

the US. Different approaches in the<br />

specification of controls and factors associated<br />

with risk aversion can be identified according to<br />

the country under examination.<br />

Different disciplines<br />

A further promising avenue has been identified<br />

among the differing views of resilience that, to<br />

date, have been viewed as separate (for<br />

example the engineering and built environment<br />

disciplines and between healthcare<br />

management and patient care).<br />

In the discipline of engineering, following an<br />

external shock the focus will be turned towards<br />

the ability of a system to return to equilibrium.<br />

The scope of interest will be resistance to<br />

shocks that occur near equilibrium. In ecology,<br />

the main characteristics are the scale of shock<br />

that a system’s capable of absorbing before it<br />

changes to a new and stable state. The scope of<br />

interest is far from equilibrium behaviour.<br />

When it comes to complex adaptive systems,<br />

attentions are drawn towards the ability for<br />

anticipatory or reactionary re-organisation in<br />

order to minimise the impact of the shock. In<br />

terms of the scope of interest, the adaptive<br />

capability of systems might result in a new form<br />

which may – or may not – be desirable.<br />

The scope of each interest varies in context<br />

and scale from near-normal to irreversible<br />

change. Returning to the case of engineering,<br />

the suggestion is that the entity exerts<br />

resistance to prevent and resist any change. If<br />

change occurs, the entity will be able to return<br />

to its original condition.<br />

This condition appears similar to the horizon<br />

scanning-style ‘anticipate and prepare’ stages<br />

outlined within BS 11200: 2014 Crisis<br />

Management Guidance and Good Practice.<br />

The examples of ecology and complex<br />

adaptive systems are more related to the<br />

events involved in crisis management, where a<br />

return to the initial condition may not be<br />

possible since change (ie ‘adaptation’) has<br />

already occurred. Furthermore, if the ‘change’<br />

had been preceded by unsafe, insecure or<br />

illegal practices then, as mentioned, a return to<br />

the original state may not be desirable.<br />

One example here concerns the BP-operated<br />

Macondo oil and gas prospect oil spill in the<br />

Gulf of Mexico which began on 20 April 2010.<br />

Killing eleven people, it’s considered to be the<br />

largest marine oil spill in the history of the<br />

petroleum industry. The US Government<br />

estimated the total discharge to be 4.9 million<br />

barrels of oil (that’s 210 million US gallons or<br />

780,000 m 3 ).<br />

After several failed efforts to contain the oil<br />

flow, the well was declared sealed on 19<br />

September 2010, although reports in early 2012<br />

indicated that the well site was still leaking.<br />

The subsequent US Presidential report on<br />

this episode highlights at least four<br />

preventative barriers that failed. Further, a<br />

similar event to Macondo had occurred six<br />

months earlier, but warnings had apparently<br />

not been heeded and, despite the<br />

establishment of a dedicated Commission,<br />

lessons from the earlier incident were not<br />

implemented. In July 2015, BP agreed to pay a<br />

massive sum of $18.7 billion in fines.<br />

Academic scholarship in and beyond the<br />

sphere of security management appears to<br />

have been constrained by a view of the<br />

‘inevitability’ of the failure of resilience. Here,<br />

then, managing resilience for some scholars<br />

has been about managing the effects and<br />

impacts of an inevitable failure of resilience.<br />

The argument presented for focusing on<br />

successes and failures opens many promising<br />

avenues to help us develop further questions<br />

and research that will hopefully bridge some of<br />

the remaining gaps in our understanding.<br />

Reference<br />

1 Hollnagel E (2016):<br />

‘Resilience Analysis Graphs’<br />

and ‘Resilience Assessment<br />

Grid’<br />

“One area that shows promise concerns apparent<br />

differences in the methodology of risk assessment and, in<br />

particular, risk ‘acceptance’ as practised in different<br />

industries, sectors and countries”<br />

51<br />

www.risk-uk.com


FIA Technical Briefing<br />

Fire Prevention in Care Homes:<br />

What Strategies Should Be Considered?<br />

Those who have been in the fire industry for<br />

some time will remember the Rosepark<br />

Care Home incident wherein 14 elderly<br />

residents died at the facility in Scotland after a<br />

fire broke out in a cupboard back in 2004.<br />

If you think that’s long in the past, you only<br />

need to filter through the News on the Fire<br />

Industry Association’s website to find multiple<br />

stories of care homes in breach of fire<br />

regulations. Only recently, a care home in<br />

Cheshire was fined £50,000 for two breaches.<br />

All of this shows the severity of the need for<br />

careful fire risk management and planning.<br />

Let’s examine the problems of fitting out care<br />

homes with the correct equipment and putting<br />

in place the maintenance that’s required.<br />

The responsibility to actually plan and<br />

schedule the installation and maintenance of<br />

any fire protection equipment lies solely with<br />

the ‘Responsible Person’ as outlined in the<br />

Regulatory Reform (Fire Safety) Order 2005.<br />

This is usually the care home itself. So, while<br />

those contracted to the care home are not<br />

necessarily in the immediate firing line (so to<br />

speak) if something goes wrong, there’s a duty<br />

upon technicians and contractors to follow<br />

standards and Best Practice in order to ensure<br />

that the highest possible levels of safety are<br />

maintained and that the blame cannot be<br />

shifted in the event of a fire.<br />

It’s worth noting that a fire alarm contractor<br />

was actually fined over £11,000 in 2016 for<br />

failing to inform a care home owner of faults<br />

within the system after the court decided the<br />

contractor flouted fire safety legislation.<br />

Main challenge posed<br />

The main challenge with most care homes is<br />

the inability of occupants to evacuate quickly.<br />

Some residents may be bedridden while others<br />

will take a significant amount of time and staff<br />

support to enable their mobility. In addition,<br />

even able-bodied residents may experience<br />

significant confusion upon hearing an alarm<br />

and have difficulty in finding building exits.<br />

When added to commercial pressures on<br />

staffing levels, it’s somewhat challenging to<br />

ensure a care home could be evacuated fully<br />

and safely in the event of a fire. Clearly, then,<br />

the necessity to detect fires as quickly as<br />

possible (and before they become too large to<br />

deal with on a safe basis) plays an important<br />

role in ensuring the safety of occupants.<br />

Following the tragic events at Grenfell Tower in June, it seems<br />

that there’s a renewed focus on fire safety issues.<br />

Unfortunately, it often takes a disaster such as this to<br />

rekindle public interest in the discipline. Naturally, this will<br />

likely lead to an upsurge in new business, with fire<br />

companies increasingly involved in new projects, system<br />

updates and refurbishments of specific building types. Robert<br />

Yates focuses on fire safety regimes for care homes<br />

To this end, BS 5839 Part 1 recommends L1<br />

(coverage throughout) fire detection in large<br />

nursing homes, while many specifications for<br />

smaller care homes will also specify L1 after the<br />

appropriate risk assessment is conducted.<br />

The Rosepark Care Home episode led to BS<br />

5839 Part 1 making two important<br />

recommendations. First, that nursing homes<br />

with more than ten occupants should be<br />

protected by addressable systems and, second,<br />

that those homes should have an automatic<br />

connection to the Fire Brigade.<br />

The key advantage of addressability in a<br />

system is in providing accurate information as<br />

regards the point of detection. This can be<br />

critical in reducing the time taken between<br />

detection and the commencement of<br />

firefighting either by staff using portable<br />

extinguishers or by the Fire and Rescue Service<br />

if the fire’s more significant in scale.<br />

Connectivity to the Fire Brigade is also an<br />

essential point. In the event of fire, members of<br />

staff need to react quickly and may already be<br />

Robert Yates:<br />

Technical Manager at the Fire<br />

Industry Association<br />

53<br />

www.risk-uk.com


FIA Technical Briefing<br />

*The Fire Industry Association<br />

has compiled plenty of useful<br />

guidance that can be<br />

consulted when it comes to<br />

fire safety in care homes, with<br />

a number of downloadable<br />

and printable resources<br />

available free of charge on the<br />

website (www.fia.uk.com).<br />

Some documents that may be<br />

of particular interest for fire<br />

professionals include:<br />

• Guidance on Fire Alarm<br />

Detector Applications and<br />

Documentation of the<br />

Selection<br />

• Guidance on the Application<br />

of Primary Visual Alarm<br />

Devices and Supplementary<br />

Visual Indication Devices<br />

• Guidance on the Selection<br />

and Specification of Fire<br />

Alarm Categories in<br />

Accordance with BS 5839-1<br />

dealing with other important issues. Therefore,<br />

relying on staff to make a call to the Fire<br />

Brigade while under such pressure is<br />

unreasonable. Rather, they’re better tasked<br />

with undertaking their Fire Action Plan.<br />

Excessive false alarms<br />

Such intensive detection coverage allied to<br />

automatic connection to the Fire Brigade leads<br />

to the obvious concern of excessive false<br />

alarms. Typical sources of false alarms in care<br />

homes include steam from showering and<br />

laundry rooms, cooking fumes and the use of<br />

hair spray or air fresheners.<br />

Often, attempts are made to reduce false<br />

calls either by reducing detector sensitivity or<br />

introducing delay features into the system. One<br />

common response is to install heat detection<br />

instead of smoke detection as the former type<br />

of detector is much less likely to ‘false alarm’.<br />

However, heat detectors only activate when the<br />

fire has established itself. By the time staff<br />

members have responded to the alarm, it’s<br />

unlikely that the fire can be tackled without Fire<br />

and Rescue Service intervention.<br />

In addition, heat detectors cannot fully<br />

protect occupants who are asleep within a room<br />

where the fire breaks out as the smoke may<br />

well overcome those occupants before such<br />

time that a heat detector could respond. Smoke<br />

detection should be used throughout, then,<br />

with heat detection only being employed where<br />

absolutely necessary.<br />

Where thermal detection is the only option,<br />

it’s once again essential to maintain as high a<br />

sensitivity as possible. Heat detectors come in<br />

two basic types: fixed temperature and rate of<br />

rise. Fixed temperature devices only respond<br />

when the temperature at the detector reaches a<br />

pre-defined limit. Typically, this is 58 o C, but<br />

higher temperature devices are also available.<br />

Rate of rise heat detectors have a fixed<br />

temperature limit in addition to a response<br />

based on a temperature increase over a certain<br />

period of time. The rate of rise heat detector is<br />

normally faster in its response than fixed<br />

temperature and should be used as the next<br />

best alternative. Occasionally, rate of rise<br />

detectors can still false alarm (for instance,<br />

when an oven door’s opened directly below a<br />

detector). This can normally be handled by<br />

careful positioning of the detectors in the<br />

installation phase.<br />

With the clear goal of maintaining detection<br />

sensitivity throughout care premises, the<br />

installer is well advised to consider some of the<br />

latest multi-sensor technologies now available.<br />

This enables smoke detection to be provided<br />

where previously only heat detection could be<br />

reliably used. Installers should seek the advice<br />

of the manufacturers to establish Best Practice<br />

with their products.<br />

A further tendency to reduce false alarms is<br />

to introduce delays in calling the Fire Brigade.<br />

BS 5839 Part 1 2013 updated the guidance and<br />

recommendations of Clause 19 and sub-clause<br />

35.2.7 to address the need to avoid delay in<br />

summoning the Fire and Rescue Service to<br />

residential care premises. Again, the extensive<br />

support and time needed to evacuate<br />

occupants is the primary concern here.<br />

Another key issue regarding the design of fire<br />

alarm systems in care homes is the topic of<br />

alarming. In some premises, it might not be<br />

Best Practice to provide alarming for all areas in<br />

one initial step. Fire alarms may well cause an<br />

unwanted level of disruption to occupants who<br />

could then draw support away from critical fire<br />

response activity at the very worst moment.<br />

Staff alarms and/or zonal alarming strategies<br />

may well be helpful. Any such alarm strategy<br />

needs careful consideration based on a risk<br />

assessment and full consultation with all<br />

interested parties (ie care home management,<br />

the local Fire and Rescue Service and insurers,<br />

etc). BS 5839 Part 1 outlines recommendations<br />

for such systems and should be a key point of<br />

reference for these discussions.<br />

Containing fire and smoke<br />

With prolonged evacuation, a major concern is<br />

the control and containment of fire and smoke.<br />

Sprinklers were highlighted as a key topic<br />

subsequent to the investigations into the<br />

Rosepark Care Home tragedy.<br />

Smoke control systems and passive fire<br />

protection are also critical in allowing<br />

occupants sufficient time to safely evacuate the<br />

premises. Again, the fire detection and alarm<br />

system has an important role to play.<br />

Fire doors are an essential element of passive<br />

fire protection and need to be closed in the<br />

event of fire. Unfortunately, they’re also<br />

inconvenient in daily use, and especially for<br />

elderly people, so tend to be held open with<br />

electrical door holder units and released in the<br />

event of a fire alarm.<br />

For their part, final exit doors need to<br />

balance the security of residents with the needs<br />

of evacuation in the event of a fire outbreak.<br />

Door release from the fire detection and<br />

alarm system needs to be 100% reliable in all<br />

events and should be according to the<br />

recommendations of BS 7273 Part 4. For care<br />

homes, Category A operation is required. The<br />

systems installer should ensure that all the<br />

requirements for this category are included in<br />

the system design.<br />

54<br />

www.risk-uk.com


FRONTIER PITTS<br />

Protecting Your World<br />

www.frontierpitts.com +44 (0)1293 422800<br />

SECURITY AND<br />

HOSTILE VEHICLE MITIGATION<br />

GATES BARRIERS BLOCKERS BOLLARDS PEDESTRIAN


POWER OUT.<br />

INTRUDER IN.<br />

NOT WITH YUASA!<br />

Security & fire alarm systems depend on<br />

reliable backup power.<br />

As European market leader for over 30 years & the number one choice for<br />

reliability, quality & performance, you can always trust Yuasa batteries to<br />

perform at the critical moment.<br />

Don’t take risks with your backup power.<br />

Demand the best standby batteries... Demand Yuasa!<br />

Discover more at www.yuasa.com


Security Services: Best Practice Casebook<br />

Last year, the Crime Survey for England and<br />

Wales recorded the highest level of<br />

shoplifting for 13 years and, indeed, a 3%<br />

uplift on the prior 12 months. With a much<br />

higher percentage of shopping now being<br />

transacted online, perhaps in-store shoplifting<br />

is a more attractive way for a ‘professional’<br />

criminal to avoid leaving a digital footprint?<br />

Security professionals are responsible for<br />

continuously analysing the loss prevention<br />

equation and identifying triggers, signals and<br />

barriers to communication, all of which can be<br />

logged, tracked and pattern-analysed for better<br />

outcomes. In terms of retail security, things<br />

have changed quite substantially and, in<br />

addition to the accepted ASCONE (Approach,<br />

Selection, Concealment, Observation, Non-<br />

Payment and Exit) method, the importance of<br />

intelligence analysis and planning cannot be<br />

overstated as part of the loss prevention mix.<br />

The powers of retail security professionals<br />

are among the most poorly understood by the<br />

casual observer. Does anyone outside of the<br />

profession really understand the limited<br />

parameters within which a retail security<br />

professional is often required to work?<br />

What about the ‘rock and a hard place’ legal<br />

situations which can mean that loss prevention<br />

specialists have to take decisions that could<br />

lead to shoplifters being allowed to walk away<br />

from the premises with products for which they<br />

haven’t paid?<br />

Not surprisingly, this doesn’t make them feel<br />

good as practising professionals. Security<br />

officers have come into this business to be a<br />

force for good, but it’s little wonder that the<br />

general public harbours negative perceptions of<br />

these officers when the former doesn’t have an<br />

understanding of the limited options at the<br />

latter’s disposal when it comes to chasing after,<br />

detaining or restraining a suspected shoplifter.<br />

A high-profile example happened in one of<br />

the larger supermarket chains and involved<br />

stolen glass bottles that resulted in a fatal<br />

injury during the detention situation. More<br />

recently, a security officer was suspended from<br />

working for a well-known High Street retailer as<br />

a result of being deemed to have used<br />

excessive force in detaining a shoplifter who,<br />

unbeknown to the officer involved, was<br />

pregnant. The female was given a six-week jail<br />

term having pleaded guilty to her crime.<br />

Even searching a suspect can pose problems,<br />

with the risk factor stretching from negative PR<br />

to allegations of sexual assault being made.<br />

Mobile technology<br />

Set against this backdrop, what’s the on-duty<br />

security officer supposed to do? It’s not yet<br />

Addressing Modern Challenges<br />

Recent high-profile security incidents have served to remind<br />

us all of the need for constantly questioning our security<br />

focus and addressing the balance between expenditure<br />

versus public safety in a period where we’re experiencing<br />

peaks in threat levels. Assuming that public safety is in hand,<br />

organisations also need to look at ways in which loss<br />

prevention is managed, as Jon Felix observes in detail<br />

widely implemented, but mobile technology<br />

simply must be embraced to allow our<br />

professionals to document evidence in the<br />

fastest and most accurate way possible.<br />

Recently, we carried out an analysis exercise<br />

to look at the barriers to loss prevention<br />

procedures which can serve to prevent the<br />

accurate and timely documentation of evidence.<br />

It was clearly evident that the deployment of<br />

staff with mobile technology had the potential<br />

to eradicate a number of time-consuming tasks<br />

from the overall process.<br />

Taking time-stamped photos on the shop<br />

floor, for example, eradicates the need for a<br />

security officer to find someone to cover his or<br />

her station, go to the back office and accurately<br />

recall and document time, dates, description<br />

and methods. This ‘digitisation’ of evidence<br />

facilitates easy information sharing with<br />

neighbouring security teams for collaboration,<br />

pattern analysis and effective case building for<br />

litigation purposes once the offender has left a<br />

clear trail of digital evidence behind them.<br />

Indeed, a given offender could well be lulled<br />

into a false sense of security in their mission,<br />

reassured that the security officers on the<br />

premises are otherwise engaged with mobile<br />

Jon Felix BSc (Hons) MDIP<br />

MBCI MSyl: Security<br />

Consultant at CIS Security<br />

57<br />

www.risk-uk.com


Security Services: Best Practice Casebook<br />

devices when really they’re watching via the<br />

camera lenses and happily snapping evidence<br />

of offenders for potential prosecution.<br />

The role of communication in the<br />

management of public safety is clear and,<br />

again, can be better facilitated through mobile<br />

technology. The provision of a digital platform<br />

for instant documentation, communication and<br />

information references (such as the Citizen Aid<br />

critical incident First Aid App, for example)<br />

would better equip officers on the front line to<br />

limit all kinds of losses.<br />

Event security management<br />

Effective security management at an event, and<br />

particularly so a crowded one, will hinge upon<br />

the provision of clear and easily digestible<br />

information for security officers and members<br />

of the public alike. This will enable a joint<br />

understanding of roles and the powers security<br />

operatives have, the location of key amenities<br />

such as exits, medical stations and meeting<br />

points and also manage expectations in terms<br />

of individuals’ experiences and degree of<br />

security awareness.<br />

Airlines do this extremely well by placing<br />

emergency advice right in front of passengers’<br />

noses and supplementing that detail with a live<br />

run-through of safety awareness by members of<br />

the cabin crew to really hammer home the way<br />

in which to remain safe on an aeroplane.<br />

Event security specialists look to issue<br />

guidance such as this, particularly for the<br />

collection of children from events like the<br />

recent Ariana Grande concert at the Manchester<br />

Arena. That guidance will be around<br />

communication with loved ones and outlining<br />

clear meeting points, with consideration<br />

afforded to stated meeting point area<br />

capacities and designated escape routes.<br />

In addition to the awful outcome of that<br />

tragic episode in Manchester, there’s always<br />

the potential for serious injury to occur among<br />

crowds of people trying to exit a venue in haste.<br />

Could Near Field Communication tags be used<br />

to track attendees at an event, perhaps with<br />

systems embedded on a wristband to monitor<br />

crowd flow? The technology is there to do this.<br />

Maybe it’s time for the Security Industry<br />

Authority to make a plan to communicate<br />

directly with the public through adverts<br />

outlining the roles and responsibilities of<br />

“Maybe it’s time for the Security Industry Authority to<br />

make a plan to communicate directly with the public<br />

through adverts outlining the roles and responsibilities of<br />

security personnel operating in different environments?”<br />

security personnel operating in different<br />

environments? If the Regulator opens the<br />

dialogue, we can potentially gain more support<br />

from the public who will then start becoming<br />

more knowledgeable on security issues.<br />

Anyone watching the coverage of the recent<br />

terror attack at London Bridge on BBC News<br />

will have heard the straining voices of the<br />

police officers on scene trying to communicate<br />

with the public and reporters about the<br />

seriousness of complying with the security<br />

cordon. Perhaps it’s time to trust the public<br />

with more information and provide them with<br />

facts in a more relatable and ‘bite size’ format<br />

(ie a handgun bullet can injure someone within<br />

the distance of a double decker bus, whereas a<br />

bomb blast can harm an individual as far away<br />

as the length of Tower Bridge)?<br />

Critical incident response<br />

As a company, CIS Security is working to<br />

encourage its clients/end users to cascade<br />

more critical incident response and situational<br />

awareness messages to their own staff through<br />

the encouragement of the mental rehearsal of<br />

critical incident situations. Where are the<br />

emergency exits? What happens if the power<br />

drops out?<br />

If athletes and dancers can perform better by<br />

mentally rehearsing their skills and moves,<br />

then those individuals who find themselves in a<br />

critical incident scenario can do as well. Instead<br />

of receiving a medal, they’re able to stay alive if<br />

an event should unfold.<br />

Our responsibility as security professionals<br />

now encompasses a stronger need to<br />

communicate with the public about how to alter<br />

the way in which they think about critical<br />

incidents so they’re more ready when the time<br />

might – but hopefully doesn’t – arise. Yes,<br />

critical incidents are rare, but I’ve been reading<br />

about people who’ve found themselves at (or<br />

close to) more than one of the recent terror<br />

incidents, so one supposes such events don’t<br />

feel so rare for them.<br />

Perhaps society should examine the role of<br />

security and allocate more importance to<br />

investments placed in it? Technology is a big<br />

part of this, but the security officer will always<br />

be the essential director and decision-maker<br />

requiring increasingly higher quality training<br />

and better tools in order to do the job well.<br />

Many diligent companies are working hard to<br />

raise both the profile and skill sets of practising<br />

security officers. To really capitalise on this<br />

effort, though, the industry needs to recognise<br />

those officers with the same level of respect<br />

afforded to police officers and embrace their<br />

ability to use modern technology effectively.<br />

58<br />

www.risk-uk.com


A New Model for Guarding<br />

Cardinal's new 5M model gives clients a unique view of<br />

their investment and the true cost or return.<br />

Measure Mobilise Monitor Manage Monetise Test<br />

Contact us today and request a free data-driven health check on your incumbent provider<br />

Kerinda.Trigg@thecardinalgroup.co.uk<br />

Group Sales and Marketing Director +44 (0) 1799 533 635 +44 (0) 781 801 3200<br />

CERTIFYING<br />

SECURITY<br />

The leading certification body for Guarding Services.<br />

Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001<br />

and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guarding<br />

and Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuables<br />

in Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.<br />

Telephone : 0191 296 3242 www.ssaib.org<br />

SSAIB


How Can We Combat ‘Virtual Hackers’?<br />

The WannaCry<br />

ransomware attack in<br />

May, which affected<br />

elements of the<br />

National Health<br />

Service (NHS), has farreaching<br />

implications<br />

for the nature of the<br />

threat presently facing<br />

our connected<br />

economy. Nicola<br />

Whiting outlines the<br />

growing threat of<br />

automated cyber<br />

weapons in criminal<br />

hands and observes<br />

how leading<br />

organisations from<br />

NATO to the FBI are<br />

borrowing from the<br />

hackers’ ‘playbook’<br />

in order to fight back<br />

The revelation that the WannaCry attack was<br />

probably the work of a ‘script kiddie’<br />

indicates that the automation of hacking<br />

techniques is now enabling amateur hackers to<br />

launch attacks with nation state-level expertise,<br />

a development that dramatically increases the<br />

severity of cyber threats facing today’s major<br />

organisations. What was once the preserve of<br />

military forces and spy agencies is now within<br />

the reach of basement-dwelling hacktivists and<br />

generalist cyber criminals.<br />

The WannaCry network infection vector was<br />

among a slew of sophisticated tools apparently<br />

stolen from America’s National Security Agency,<br />

demonstrating that advanced cyber warfare<br />

technologies developed by Governments are<br />

increasingly falling into the hands of ordinary<br />

citizens. This could be construed as the<br />

equivalent of intercontinental ballistic missiles<br />

being stolen and sold to street criminals.<br />

Not only does this development dramatically<br />

increase the number of potentially devastating<br />

cyber attacks the world might face in times<br />

ahead, but also renders it that much harder for<br />

the authorities to trace the perpetrators.<br />

In the same way that automated cyber<br />

weapons may replicate the work of skilled<br />

Black Hat hackers, new software can<br />

autonomously replicate the work of leading<br />

White Hat hackers, analysing entire networks<br />

for vulnerabilities with the knowledge and skills<br />

of a penetration tester.<br />

The WannaCry attack on the NHS is a good<br />

example. Just as the attack was launched using<br />

an automated network ‘worm’ coded to find<br />

vulnerabilities, parts of the NHS were able to<br />

use their own automated tools to identify<br />

vulnerabilities and successfully protect<br />

themselves against the attack.<br />

Some NHS Trusts used the automated Nipper<br />

Studio tool to replicate the skills of expert<br />

human penetration testers and harden their<br />

firewalls and network devices at a speed and<br />

scale that’s beyond human capabilities, duly<br />

finding and closing vulnerabilities before they<br />

could be attacked.<br />

Nipper Studio creates a virtual model of how<br />

the setting and rules interact with each other<br />

and understands the interactions just like a<br />

human would, but in a fraction of the time and<br />

with repeatable accuracy.<br />

NHS Trusts with well-tested procedures in<br />

place and which had used automation to<br />

harden their networks against attack went<br />

unbreached when WannaCry struck,<br />

subsequently ensuring that the highly sensitive<br />

information in their systems remained secure.<br />

Rise of cyber warfare<br />

Behind the escalation of cyber attacks lies the<br />

increasing investment by Governments,<br />

terrorists and other groups in ‘cyber-offensive’<br />

capabilities: the development of hacking tools<br />

that offer the ability to penetrate enemy<br />

networks and systems and project ‘cyber<br />

power’ around the world.<br />

The capability of automated cyber warfare<br />

systems was first illustrated by Stuxnet, a selfreplicating<br />

cyber worm which destroyed over<br />

1,000 nuclear centrifuges across an Iranian<br />

nuclear facility, setting that nation’s nuclear<br />

ambitions back by at least two years.<br />

Security expert Claudio Guarnieri has noted<br />

that the so-called Regin malware, recently used<br />

to attack EU diplomatic delegations, also bore<br />

the signature of a nation state spy apparatus.<br />

Another such attack recently knocked out the<br />

Ukraine’s national grid.<br />

These military-grade cyber weapons are<br />

percolating down into the online underworld,<br />

largely because cyber weapons are far easier to<br />

steal than conventional armaments. It’s both<br />

easier and cheaper to copy a code than a cruise<br />

missile. Today, an entire cyber arsenal can be<br />

spirited away on a USB stick.<br />

In the subterranean networks of The Dark<br />

Web, there’s now a highly-developed cyber<br />

60<br />

www.risk-uk.com


Cyber Security: Risk Management for Automated Cyber Weapons<br />

arms ‘bazaar’ wherein criminals can purchase<br />

the cyber equivalent of smart bombs, complete<br />

with user guides, money-back guarantees and<br />

TripAdvisor-style user ratings.<br />

Powerful custom-made tools designed to<br />

exploit unpatched vulnerabilities and<br />

autonomously reproduce themselves across the<br />

world are widely available to buy, rent or<br />

franchise. They can also be repurposed and<br />

customised for any particular task, from<br />

hacking a bank through to attacking a hospital.<br />

These sophisticated weapons often contain<br />

an autonomous ‘transport’ mechanism that<br />

enables the malware to scan for vulnerabilities<br />

and spread itself along with a ‘payload’ that<br />

then delivers the attack.<br />

The Internet is also replete with intelligencegathering<br />

tools that lie dormant inside an<br />

enemy system like a cyber ‘sleeper cell’,<br />

covertly mapping out the network architecture,<br />

domains, servers and IP addresses of potential<br />

targets. A recent investigation showed that the<br />

UK’s national rail network had been unwittingly<br />

infiltrated by four nation state cyber attacks<br />

which appeared to be ‘exploratory’ exercises.<br />

Two-way relationship<br />

One cyber expert has warned the US<br />

Government that: “The Internet allows<br />

malicious cyber actors to deliver weaponised<br />

tools at a scope and scale we’ve never seen.”<br />

Even worse, nation states are deliberately<br />

‘leaking’ cyber weapons to illegal hacker<br />

collectives, hiding their activities behind proxy<br />

groups. The relationship works both ways, with<br />

cyber crime groups also sharing tools with<br />

Governments in return for payment or<br />

protection from prosecution. These tools then<br />

work their way lower down the food chain until<br />

they end up in the hands of low-level hackers,<br />

with the end result being that highly classified<br />

cyber offensive expertise is being transplanted<br />

into the laptops of teenagers.<br />

According to cyber security body (ISC) 2 , this<br />

comes at a time when the Human Resources<br />

needed to prevent these increasingly advanced<br />

and widespread attacks are in scarce supply.<br />

The world is set to face a shortfall of 1.8 million<br />

cyber security professionals in five years. Rising<br />

demand for a dwindling pool of talent is<br />

pushing up the cost of hiring, rendering it<br />

increasingly difficult for companies to recruit<br />

and retain the necessary and best talent.<br />

Given this major manpower shortage<br />

combined with a rise in automated hacking<br />

tools entering wider circulation, business and<br />

industry is now under greater threat than ever<br />

before. The central problem is that machines<br />

are far faster and more efficient at hacking than<br />

“The central problem is that machines are far faster and<br />

more efficient at hacking than humans. Automated tools<br />

can launch many simultaneous worldwide attacks at a<br />

speed and scale beyond the capacity of human attackers”<br />

humans. Automated tools can launch many<br />

simultaneous worldwide attacks at a speed and<br />

scale beyond the capacity of human attackers.<br />

For example, computer ‘worms’ are capable of<br />

autonomously replicating themselves millions<br />

of times in order to simultaneously infect a<br />

wide array of targets.<br />

To illustrate that statement, studies have<br />

shown how an automated worm could ‘infect’ a<br />

single lightbulb and then cross-contaminate all<br />

neighbouring lightbulbs, spreading like wildfire<br />

to plunge entire cities into darkness at<br />

lightning speed. In this way, widely-available<br />

automated weapons dramatically increase the<br />

speed, power and reach of cyber attacks on<br />

faraway targets.<br />

Autonomous tools also enable human<br />

hackers to cover their tracks, like a thief<br />

evading detection by sending a drone to burgle<br />

a house. While companies lack the time and<br />

Human Resources needed to find and fix all of<br />

their vulnerabilities, automated tools afford<br />

cyber criminals limitless time and resources to<br />

find and exploit vulnerabilities. It’s no surprise<br />

that, in a race between human defenders and<br />

autonomous attackers, the humans are losing.<br />

To turn this around, we simply must use<br />

autonomous tools as a defence mechanism.<br />

Automating our defences<br />

Whereas traditional ‘dumb’ scanners<br />

indiscriminately bombard a network from the<br />

outside in the hope of exposing a vulnerability,<br />

modern ‘smart’ tools can autonomously scour<br />

the individual blueprint of any network or<br />

system to find deep structural vulnerabilities<br />

and explain how to fix them. It’s the digital<br />

equivalent of going through every line of an<br />

architect’s drawings and identifying<br />

weaknesses in the structure within seconds.<br />

‘Smart’ tools dramatically reduce the<br />

demands placed on heavily-overstretched<br />

Human Resources, using automated systems to<br />

plug the cyber security skills gap that shows<br />

little sign of diminishing any time soon.<br />

With advances in automation enabling<br />

today’s criminals to launch devastating attacks<br />

in minimal time and with few Human Resources<br />

of their own, we really must begin to deploy the<br />

same ‘smart’ technologies to cut the time and<br />

cost of shoring up our defences. Frankly, we<br />

neglect to do so at our peril.<br />

Nicola Whiting: Chief<br />

Operating Officer at Titania<br />

61<br />

www.risk-uk.com


The Certified Technical Security<br />

Professional: Focusing on Systems<br />

brought about any discernible change or means<br />

of introducing minimum standards setting for<br />

individual practitioners. In short, there have<br />

been a good many expressions of<br />

dissatisfaction but, until now, no action.<br />

The demands placed upon the Government to<br />

address heightened levels of risk – and<br />

particularly so in relation to the increasing<br />

threat of terrorism – are unlikely to abate, while<br />

it’s generally accepted that the responsibility<br />

for safeguarding our society rests with central<br />

Government via the national police service, the<br />

Security and Intelligence Services and,<br />

increasingly, the private sector.<br />

Next month, the<br />

Register of Certified<br />

Technical Security<br />

Professionals opens<br />

for business in order<br />

to recognise the<br />

competence of – and<br />

qualifications gained<br />

by – installers as well<br />

as those individuals<br />

who maintain fire and<br />

security systems.<br />

Kevin Matthew<br />

recounts the benefits<br />

of this landmark<br />

development for<br />

practising in-house<br />

risk and security<br />

managers<br />

Many UK industries are governed by some<br />

form of regulation and Best Practice. In<br />

our business sector, the UK’s Private<br />

Security Industry Act 2001 led to the creation of<br />

the Security Industry Authority, the regulatory<br />

body that has subsequently realised mandatory<br />

licensing for various security activities, among<br />

them security guarding, door supervision, close<br />

protection, Cash and Valuables in Transit, key<br />

holding and Public Space CCTV Surveillance.<br />

However, there’s a viewpoint commonly held<br />

by many operating within the security industry<br />

that licensing hasn’t gone far enough in terms<br />

of instilling competencies and raising<br />

standards, nor has it reached far enough across<br />

what is today an extremely diverse sector.<br />

One significant area which has certainly<br />

escaped the Regulator’s reach is that of<br />

security systems, and more specifically those<br />

individuals who are responsible for installing<br />

and maintaining such systems.<br />

For many years, the technical security sector<br />

has expressed concern – all-too-often only<br />

within its own ranks – about the absence of<br />

recognised professional standards and<br />

protocols. This has allowed the proliferation of<br />

unqualified and potentially unscrupulous<br />

individuals operating within this field.<br />

Despite those protestations, no-one from the<br />

Regulator’s office, wider Government or,<br />

indeed, the technical security sector itself has<br />

Electronic security systems<br />

Security and fire detection systems have<br />

advanced beyond all recognition in the last<br />

decade. Anyone visiting IFSEC International at<br />

London’s ExCeL back in June would have<br />

witnessed the hugely diverse range of<br />

sophisticated technologies on display such as<br />

video surveillance systems with HDI, CVI and<br />

TVI cameras, 4K and 8K monitors, cyber tools,<br />

drones, analytical software, biometric access<br />

control solutions, wireless intruder alarms and<br />

fully-integrated systems orchestrated by a<br />

central Command and Control point.<br />

A major element of security planning and<br />

developing strategy is the use of electronic<br />

security systems. CCTV and many types of<br />

technical access controls are fundamental when<br />

it comes to combating crime and terrorism.<br />

With such reliance placed on security systems<br />

technology, it’s ever-more vital that those<br />

charged with installing and maintaining such<br />

high tech equipment are appropriately<br />

experienced and qualified to do so, while<br />

always looking to embellish and enhance their<br />

skills by dint of accredited training.<br />

Security systems which fail due to incorrect<br />

installation or sub-standard maintenance can<br />

result in major consequences for those<br />

responsible. The fall-out here can affect<br />

companies and directors, sometimes extending<br />

to criminal charges and/or litigation, not to<br />

mention untold reputational damage.<br />

In-house directors of security have a duty to<br />

ensure those systems they procure are fit for<br />

purpose and that the equipment harbours the<br />

requisite quality standards. Their ‘responsibility<br />

remit’ here also extends to taking all<br />

reasonable steps needed to ensure that such<br />

62<br />

www.risk-uk.com


Training and Career Development<br />

equipment is installed by a competent<br />

professional. Some manufacturers and<br />

installation companies do routinely outsource<br />

the installation and maintenance of security<br />

systems, but this is where a real risk can arise.<br />

To date, there hasn’t been any recognised<br />

means by which to check that a subcontractor’s<br />

competencies and background<br />

pass muster. By contrast, in the gas industry<br />

both installers and maintenance engineers are<br />

necessarily required to be Gas Safe (previously<br />

CORGI)-registered.<br />

Qualified installers<br />

As the security and fire sectors move<br />

increasingly towards integration, competent<br />

and demonstrably qualified systems installers<br />

and engineers are needed to ensure that<br />

systems design, installation, servicing and<br />

operation are all fit for purpose, comply with<br />

current standards and, importantly, meet the<br />

procuring end user’s needs.<br />

Often overlooked by procurers and end users<br />

are the issues relating to the retention of<br />

personal data, compliance with legislation such<br />

as the forthcoming EU General Data Protection<br />

Regulation and how that data may be provided<br />

in response to subject access requests. It also<br />

needs to be asked whether the installer or<br />

maintenance technician has been assessed, not<br />

just in terms of their technical competence, but<br />

also when it comes to their background and<br />

probity. System installations at schools and<br />

other sensitive locations in particular require<br />

careful vetting considerations.<br />

To address the absence of any meaningful<br />

regulation or Code of Conduct governing<br />

installers and maintenance technicians, Tavcom<br />

Training has developed a professional Register<br />

specifically for installers and those who<br />

maintain fire and security systems. On Friday 1<br />

September, the Register of Certified Technical<br />

Security Professionals (to be found at<br />

www.ctsp.org.uk) will go live.<br />

The British Security Industry Association<br />

(BSIA) and Dubai’s security sector Regulator<br />

the Security Industry Regulatory Agency (SIRA)<br />

have both welcomed and endorsed the creation<br />

of the Register.<br />

David Wilkinson, the BSIA’s director of<br />

technical services, said: “We’re very pleased to<br />

see this innovative registration that recognises<br />

many of our security systems members. In such<br />

a challenging technical environment, it’s more<br />

important than ever to demonstrate the<br />

professionalism of the personnel actively<br />

representing our specific market sector.”<br />

In recognising the CTSP Register, Khalifa<br />

Ibrahim Al Saleis (CEO of SIRA) stated: “The<br />

“Eligibility criteria for entry to the Register must be<br />

evidenced and include a sound working knowledge of<br />

electrical/electronic principles”<br />

Dubai Government is renowned in the region for<br />

setting the highest standards across all<br />

elements of security. By law, engineers and<br />

technicians who install and maintain security<br />

systems are required to be licensed. On that<br />

note, the CTSP Register will be another<br />

effective way in which to ensure professional<br />

standards are both achieved and maintained.”<br />

Verifying competencies<br />

The CTSP Register follows the framework of<br />

other professional bodies, including the<br />

Register of Chartered Security Professionals<br />

which is increasingly regarded as the ‘Gold<br />

Standard’ for those operating at the strategic<br />

management level within the security arena.<br />

The CTSP Register provides a resource that<br />

allows end users, contractors and prospective<br />

employers to verify that a given individual is<br />

competent and qualified and has attained the<br />

standard of a Certified Technical Security<br />

Professional (CTSP).<br />

The CTSP registration scheme aims to<br />

formally recognise security systems installers<br />

and maintainers and align them with their<br />

peers across the electrotechnical industries<br />

who possess similar skills/attributes. It also<br />

allows the Registrant to highlight their own<br />

credentials by using the post-nominals of<br />

‘CTSP’ on business marketing materials.<br />

The main disciplines covered by the CTSP<br />

Register are CCTV, access control, intruder and<br />

hold-up alarms, Internet Protocol and<br />

networking solutions and fire alarm systems.<br />

Each field of competence is listed on the CTSP<br />

Register against the Registrant’s profile,<br />

showing that they’re qualified to carry out work<br />

within that specified field.<br />

Eligibility criteria for entry to the Register<br />

must be evidenced and include a recognised<br />

industry-relevant qualification at QCF Level 3, a<br />

good working knowledge of<br />

electrical/electronic principles and a minimum<br />

of 12 months’ worth of practical experience.<br />

Applicants must be of good character and<br />

free from any criminal convictions for<br />

dishonesty, assault or sexual crimes. Two<br />

personal references are required.<br />

Registrants must also maintain a Continuing<br />

Professional Development (CPD) record to<br />

document their ongoing learning and affirm<br />

that they actively demonstrate a commitment<br />

towards their own future in the industry.<br />

*The Certified Technical<br />

Security Professional<br />

registration process is<br />

straightforward and can be<br />

accessed via the website at<br />

www.ctsp.org.uk The website<br />

is now open for those wishing<br />

to express an interest or who<br />

wish to apply immediately.<br />

However, the Register itself<br />

will not go live and be open<br />

to view until Friday 1<br />

September 2017<br />

**As is common with<br />

Registers of this nature,<br />

Registrants are subject to a<br />

Code of Ethics and a<br />

disciplinary process, with the<br />

ultimate sanction being that a<br />

Registrant may be struck off<br />

the Register (thus<br />

subsequently limiting their<br />

ability to operate in the<br />

security systems sector)<br />

Kevin Matthew:<br />

Certified Technical Security<br />

Professional Registrar<br />

63<br />

www.risk-uk.com


Risk in Action<br />

WES+ on fire safety<br />

duty at site of Great<br />

Scotland Yard Hotel<br />

Ramtech Electronics has<br />

supplied its popular WES+<br />

fire alarm system to protect<br />

the original Scotland Yard<br />

Police Station in London<br />

while it’s transformed into a<br />

five-star luxury hotel by<br />

Galliard Homes.<br />

The historic building<br />

served as the headquarters<br />

of the Metropolitan Police Service from 1829 to 1890. The new £110 million<br />

development involves retaining the original Edwardian façade. When<br />

completed, the five-star hotel will offer rooms costing up to £10,000 per night.<br />

Galliard Homes had used hard-wired fire alarm systems on other construction<br />

sites, but found them to be cumbersome. The trailing wires created a trip<br />

hazard, while the process of repositioning the Call Points as work progressed<br />

was deemed to consume too much time.<br />

The WES+ system installed at Great Scotland Yard will trigger a site-wide<br />

alarm even if just one of the manual Call Points or automatic heat/smoke<br />

detectors is activated. This will allow all personnel to evacuate the site and the<br />

Fire and Rescue Service to be alerted at the earliest possible opportunity.<br />

Incorporating heat/smoke detectors into the WES+ fire alarm system means<br />

that the iconic Great Scotland Yard is protected 24/7, even when personnel are<br />

not present on site. Nominated personnel at Galliard Homes will instantly<br />

receive a text alert if any Call Point is activated.<br />

The WES+ fire alarm system, which can be installed with a few simple buttonpresses<br />

to pair the interconnecting Call Points, creates a completely secure<br />

mesh network. The scalable nature of the system means that up to several<br />

thousand units may be paired, making it suitable for large-scale as well as<br />

smaller construction sites. A silent test facility eliminates downtime on site.<br />

As the dangers of fires on construction sites become better understood, an<br />

increasing number of developers are specifying bespoke fire alarm systems.<br />

Trigion orchestrates first class<br />

security solution on behalf of Royal<br />

Academy of Engineering<br />

Trigion has won the security contract at the<br />

Royal Academy of Engineering by dint of<br />

offering a combined security solution including<br />

electronic systems, security guarding,<br />

concierge services and reception cover.<br />

The Royal Academy of Engineering is based<br />

at Prince Philip House, an historic Grade I-listed<br />

building which has recently been renovated to<br />

introduce a contemporary and modern interior<br />

at Carlton House Terrace in central London.<br />

The building forms part of the Royal<br />

Household and is frequently visited by<br />

members of the Royal Family.<br />

This institution provides analysis and policy<br />

support to promote the UK’s role as a great<br />

place in which to do business, taking a lead on<br />

engineering education and investing in the UK’s<br />

world-class research base with a view towards<br />

underpinning innovation. In the wider sense,<br />

the Royal Academy works to improve public<br />

awareness and understanding of engineering.<br />

Speaking about the contract, Neil Ricketts<br />

(technical services director at Trigion) explained<br />

to Risk UK: “We’re proud to have secured the<br />

contract for this impressive location. In adding<br />

it to our expanding portfolio, we look forward<br />

to working with the Royal Academy of<br />

Engineering for many years to come.”<br />

Amthal revises fire and security for<br />

Garston Manor School<br />

Amthal Fire and Security has worked with<br />

Garston Manor School on creating a scalable<br />

solution to upgrade the fire and security<br />

systems in place for the benefit of staff, pupils<br />

and visitors alike.<br />

Located in Hertfordshire, Garston Manor<br />

School is a specialist school for pupils with<br />

autism, learning difficulties and speech and<br />

language problems. The vision is to ensure all<br />

students leave the school as confident and<br />

self-reliant individuals following a learning<br />

experience that’s rewarding and enjoyable.<br />

To ensure that all members of staff can<br />

focus on this mission, Amthal carried out an<br />

investigative site visit to understand the<br />

existing fire and security systems in place and<br />

make recommendations on how to build upon,<br />

complement and maintain them by dint of<br />

using the latest technology.<br />

The local fire and security specialist<br />

carefully created a works programme to<br />

complete additional works and, at the same<br />

time, ensure that a maintenance programme<br />

was in place to look after all intruder, CCTV<br />

and fire safety systems on site.<br />

Caroline Caisley, school business manager<br />

at Garston Manor School, said: “Security is,<br />

quite rightly, an absolute priority for the<br />

school, right from the perimeter and the site<br />

boundaries through to all internal areas.<br />

Amthal Fire and Security understands this and<br />

duly developed a works programme to<br />

maintain all of our fire and security systems.”<br />

64<br />

www.risk-uk.com


Risk in Action<br />

St George in the East Church<br />

Vicarage safeguarded thanks to<br />

all-new video door entry and<br />

intruder alarm systems<br />

Delta Security, the CCTV and access control<br />

specialist, has installed all-new video door<br />

entry and intruder alarm systems for the<br />

vicarage attached to St George in the East<br />

Church on behalf of long-standing client the<br />

London Diocesan Fund.<br />

The London Diocesan Fund is responsible<br />

for the administration and maintenance of all<br />

420 Church of England parishes located<br />

within the M25 region. That estate<br />

comprises approximately 600 properties.<br />

Managers of the Fund have worked with<br />

Delta Security for eight years on their CCTV<br />

and access control requirements, totalling<br />

circa 50 security projects per year.<br />

Kenny Cathro, head of operational housing<br />

for the London Diocesan Fund, explained:<br />

“Vicars can receive visitors at any time of the<br />

day or night, from those people organising<br />

weddings and funerals through to troubled<br />

individuals seeking some form of financial<br />

and/or spiritual support. It’s important that<br />

vicars have full control over whom they let<br />

into their residences.”<br />

A Videx door entry system has been<br />

installed at the St George in the East Church<br />

Vicarage, with an LCD screen that provides<br />

clear video footage of who’s trying to gain<br />

access. The vicar can speak to the visitor via<br />

a handset if they wish or do nothing without<br />

letting the visitor know they’re at home.<br />

Security has been further enhanced with a<br />

state-of-the-art wireless Visonic intruder<br />

alarm system that works with up to 60<br />

wireless devices. Users have remote access<br />

functionality via a specifically-designed App.<br />

In conclusion, Cathro informed Risk UK:<br />

“For me, it’s about working with suppliers<br />

who are honest and straightforward in<br />

providing the level of security we need and<br />

at a price point that we can afford. These<br />

needs are met by Delta Security.”<br />

Intelligent fire safety system from Advanced protects The<br />

Hippodrome Arts Centre<br />

An intelligent fire safety system<br />

from Advanced has been chosen to<br />

protect The Hippodrome Arts<br />

Centre, a newly-opened community<br />

hub housed in an historic listed<br />

building located in Eyemouth.<br />

Opened in 2016 and managed by<br />

a community interest company, The<br />

Hippodrome serves as a muchneeded<br />

Arts Centre and performance space for members of the local<br />

community. This landmark 1830s construction was originally a granary and has<br />

accommodated various uses through the years, most recently serving as a<br />

Fishermens’ Mission before closing in 2012.<br />

A pop-up cafe in the building, which was nicknamed ‘The Hippodrome’ by the<br />

fishermen who used to socialise there, offers a meeting and event space for<br />

visitors and members of the local community.<br />

The installation of the new fire system was undertaken by the team at longtime<br />

Advanced partner Safe Services Ltd, who duly specified the latest MxPro 5<br />

fire panel. The MxPro 5 range is a popular multiprotocol choice.<br />

Graeme Millar of Safe Services Ltd said: “An open protocol system was<br />

specified for the installation and, having used Advanced systems in the past,<br />

we knew the company’s panels would be ideal for the Eyemouth project.”<br />

Ian Tod, owner of The Hippodrome, commented: “As well as being a tourist<br />

attraction, The Hippodrome is an important venue that locals use year-round,<br />

so it’s essential that we have a reliable and effective fire system in place that’s<br />

adaptable for future expansion or upgrades. When we discussed the available<br />

options with Graeme and his team, MxPro seemed the ideal solution.”<br />

The MxPro 5 panel installed at The Hippodrome is a single loop system that<br />

covers both the entire ground floor and the roof space of the building.<br />

Dacorum takes digital leaps in Borough security with<br />

Security Center<br />

The Borough of Dacorum, a district in the<br />

county of Hertfordshire, counts<br />

approximately 150,000 residents and a<br />

growing number of businesses among its<br />

population. To enhance its services,<br />

Dacorum Borough Council invested in a<br />

new district-wide wireless network and<br />

began plans to upgrade its security<br />

operations and technologies.<br />

Previously, the Council was working<br />

with old analogue systems that were very limiting, not to mention the fact that<br />

they ran separately on different computers. The goal was to put in place a new<br />

and modern system that had the flexibility to easily integrate new<br />

technologies, and that would also afford members of the dedicated operations<br />

team one easy solution to access and manage everything.<br />

Dacorum Borough Council sent out a request for proposals and scored each<br />

system according to the outlined criteria. ID Integrated Security won the bid for<br />

the project. Security Center, the unified security platform by Genetec, has been<br />

installed to combine IP video surveillance, access control, ANPR and several<br />

other key systems within one intuitive solution.<br />

Today, members of the Dacorum Borough Council Control Room team manage<br />

over 170 cameras Borough-wide through Omnicast, the IP video surveillance<br />

system of Security Center.<br />

Photograph: David Howard<br />

65<br />

www.risk-uk.com


Technology in Focus<br />

Videx’s Digital GSM allows for<br />

integrated proximity access control<br />

Videx has launched its new digital GSM system that<br />

can provide access control for a wide range of<br />

gated properties, office blocks, apartments and<br />

commercial buildings.<br />

The new system uses mobile technology to<br />

communicate and operate doors, automatic gates,<br />

car parks and remote site applications, making it a<br />

perfect security solution for unmanned sites and<br />

communications outside of normal business hours.<br />

It’s available as part of the popular 4000 Series<br />

modular door entry system. The solution features a<br />

vandal-resistant surface and flush panel and can<br />

call up to 500 users, each with a divert facility of up to three additional<br />

numbers should the others be engaged or unanswered.<br />

Neil Thomas, national sales manager at Videx, stated: “The GSM system<br />

offers a number of advanced features. For example, the large graphical display<br />

enables departments and company names to be shown with an easy-to-use<br />

scroll facility, helping people to search for the business they’re visiting.”<br />

www.videxuk.com<br />

KBC launches range of videooptimised<br />

PoE switches<br />

KBC Networks – the manufacturer of<br />

industrial transmission equipment for<br />

analogue, IP and HD transmission systems –<br />

has expanded its industrial Ethernet switch<br />

range with a series of Power over Ethernet<br />

(PoE) switches.<br />

With the PoE data ports on the switches<br />

supplying power directly to the attached<br />

networked device, these additions to the<br />

KBC IP transmission range render new<br />

installations and system additions faster,<br />

easier and more flexible. The new hardened<br />

units are designed for a wide range of<br />

industrial, non-conditioned and outdoor<br />

applications with extended operating<br />

temperature ranges.<br />

Depending on the model selected, the<br />

switches are either IEEE 802.3af or the<br />

higher-powered IEEE 802.3at-compliant.<br />

www.kbcnetworks.com<br />

Hanwha Techwin Wisenet<br />

X cameras integrated<br />

with leading VMS<br />

Hanwha Techwin has successfully<br />

accelerated the programme to<br />

integrate its popular Wisenet X cameras with leading VMS solutions such as<br />

Genetec Security Center 5.6 and Milestone XProtect.<br />

‘Supercharged’ by the powerful Wisenet 5 chipset, models in the latest<br />

generation of Wisenet X cameras feature Wide Dynamic Range motorised<br />

varifocal low-light lenses. The 26 new H.265 cameras and domes are<br />

collectively able to meet the requirements of virtually any video surveillance<br />

project regardless of the lighting conditions, from bursts of bright sunlight to<br />

almost total darkness, without the need for IR LEDs or supplementary lighting.<br />

“A key element of our ‘We Move With Trust’ philosophy is a commitment to<br />

ensure that our end user customers are able to achieve the full benefits from<br />

their investment in a video surveillance system,” said Bob Hwang, managing<br />

director of Hanwha Techwin Europe.<br />

Hwang continued: “By working in partnership with Genetec, Milestone and<br />

other VMS providers, our Wisenet X cameras can be controlled and monitored<br />

alongside equipment produced by other manufacturers. Regardless of which<br />

platform customers choose, they can expect to have a high degree of control<br />

over their Wisenet X cameras, as well as the flexibility to integrate with<br />

specialist analytics applications and access control.”<br />

Hanwha Techwin’s ranges of cameras and recording devices have also been<br />

successfully integrated with SureView’s Immix CS central station software<br />

platform. This allows the latest Wisenet IP camera series and NVRs, as well as<br />

analogue DVRs, to interact with the Immix CS which is specifically designed to<br />

improve the efficiency of central alarm monitoring stations offering video<br />

monitoring services.<br />

The same level of integration has also been achieved with Immix Command<br />

Centre, a PSIM software platform used by businesses, institutions and<br />

agencies to monitor alarms, access control and situational awareness systems.<br />

www.hanwha-security.eu<br />

OPTEX’s new active infrared beam<br />

series features flexible power source<br />

Sensor manufacturer OPTEX has extended its<br />

range of SmartLine active infrared beams with<br />

the SL-TNR Series of wireless and hybrid entrylevel<br />

outdoor active beams for simple point-topoint<br />

applications.<br />

The SL-TNR Series includes two models: a<br />

30-metre SL-100TNR and the 60-metre SL-<br />

200TNR outdoor battery-powered active beam<br />

that’s ideally suited for protecting smaller<br />

perimeters, open areas and driveways. The<br />

sensor has been designed to work with D-sized<br />

lithium batteries as well as the universal CR123<br />

batteries when using<br />

optional batteryholders<br />

(CRH-5).<br />

All are included<br />

in the SL-TNR-CH<br />

package.<br />

Four D-sized<br />

batteries in the<br />

receiver and<br />

transmitter will<br />

provide up to five years’<br />

worth of operation.<br />

www.optex-europe.com<br />

66<br />

www.risk-uk.com


Technology in Focus<br />

Vista unveils Viper family of IP and<br />

analogue products for risk managers<br />

Vista has introduced the new Viper family. The<br />

range consists of five innovative products and<br />

provides a solution for combining multi-format<br />

recording devices into a single, centrally<br />

controlled platform.<br />

The key benefit of Viper for the end user is<br />

that it allows for the flexibility of combining<br />

existing and new hardware in order to create a<br />

simple platform and a seamless system.<br />

Each product in the family plays an important<br />

role in simplifying recording systems. The Viper<br />

Virtual Matrix Controller (VMC) allows the<br />

system operator to view cameras from multiple<br />

remote Viper NVRs and hybrid DVRs. These<br />

remote devices can be recording standard<br />

analogue CVBS, TVI, AHD or IP cameras. All<br />

cameras are displayed to the operator as one<br />

single system when using the VMC.<br />

The Viper NVRs and DVRs can also be used as<br />

standalone systems. Their advanced ‘Smart’<br />

and ‘Thumbnail’ search facilities greatly<br />

simplify the operator’s task for finding and<br />

reviewing recorded footage.<br />

The patented ‘WARP’ function also means<br />

that a single NVR can become a master unit.<br />

www.vista-cctv.com<br />

Power Centres serve to render<br />

access installations more<br />

cost-effective<br />

Dantech Electronic Engineering, the<br />

manufacturer of power supplies and<br />

ancillary equipment for security<br />

applications, has enabled lower-cost<br />

Paxton Net2 installations with its<br />

DA481 and DA482 integrated access<br />

control Power Centres.<br />

Supporting profitability by reducing<br />

equipment and mains cabling costs,<br />

Power Centres provide reliable 12 V DC<br />

switch-mode power for two (DA481) or<br />

four (DA482) Paxton Net2 PCBs.<br />

The rugged power supply modules<br />

provide two sets of outputs for each<br />

controller position: 500 mA for the controller<br />

and 2 A for lock power. All outputs are<br />

protected by self-resetting fuses and<br />

equipped with status LEDs as standard.<br />

With only a single fire alarm input<br />

required to the Power Centres, lock power<br />

outputs are individually selectable as either<br />

continuously powered or fire-switched.<br />

Two VRLA battery packs up to 12 Ah can<br />

be mounted in the Power Centre, ensuring<br />

continuity of security in the event of a mains<br />

power failure. Mains and battery status may<br />

be monitored via volt-free contacts, while<br />

batteries are protected thanks to automatic<br />

deep-discharge disconnection.<br />

Physical security is assured by the keylockable,<br />

tamper-protected steel enclosure.<br />

www.dantech.uk.com<br />

Elmdene International brings the<br />

company’s dedicated 12 V DC CCTV<br />

PSU range to market<br />

Elmdene International has introduced the<br />

company’s 12 V DC CCTV PSU range. This<br />

range offers end users’ security installers a<br />

professional and neat termination junction<br />

within the PSU enclosure for the video signals<br />

between the camera and the DVR, ensuring an<br />

easy and efficient installation.<br />

This is accomplished by using the 4 or 8-<br />

way BNC ‘Loop IN – Loop OUT’ connections<br />

provided on the Fused Output Modules.<br />

Not only are these units easy to connect, but<br />

the enclosures are of a low-profile and<br />

compact design, with large cable access at the<br />

rear affording installation flexibility and<br />

therefore saving time on given projects.<br />

This range has been specifically designed<br />

for those CCTV installations that employ a<br />

single cabling method for transmitting video<br />

and power. Good examples here would be<br />

Coax + Power (Siamese or Shotgun cable)<br />

and Twisted Pair (UTP cabling).<br />

Another feature of this solution is the<br />

ability to select the type of fusing required.<br />

This is achieved by using the selection<br />

jumper provided on each channel, offering<br />

the security professional the following<br />

choices: 20 mm glass fuse protection<br />

(default F1A), PTC fuse protection (thermal<br />

fuse/self-resetting) and power disconnected<br />

(allows maintenance of the circuit).<br />

This 12 V DC range is currently available in<br />

two power variants: 4A (4 x 1A fused outputs)<br />

and 8A (8 x 1A fused outputs). Each<br />

individually-fused output has its own ‘Health<br />

LED’ allowing quick identification of a faulty<br />

channel in the event of a fault episode (such<br />

as a short circuit) occurring.<br />

www.elmdene.co.uk<br />

67<br />

www.risk-uk.com


thepaper<br />

Business News for Security Professionals<br />

Pro-Activ Publications is embarking on a revolutionary<br />

launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />

latest financial and business information for<br />

professionals operating in the security sector<br />

The Paper will bring subscribers (including CEOs,<br />

managing directors and finance directors within the<br />

UK’s major security businesses) all the latest company<br />

and sector financials, details of business re-brands,<br />

market research and trends and M&A activity<br />

FOR FURTHER INFORMATION<br />

ON THE PAPER CONTACT:<br />

Brian Sims BA (Hons) Hon FSyI<br />

(Editor, The Paper and Risk UK)<br />

Telephone: 020 8295 8304<br />

e-mail: brian.sims@risk-uk.com<br />

www.thepaper.uk.com


Appointments<br />

Helen Ball<br />

Helen Ball has been<br />

promoted to Assistant<br />

Commissioner at the<br />

Metropolitan Police Service<br />

by newly-installed<br />

Commissioner Cressida Dick<br />

and will now lead the Met’s<br />

Professionalism portfolio.<br />

Assistant Commissioner<br />

Ball’s responsibilities will include management<br />

of the Metropolitan Police Service’s Directorate<br />

of Professional Standards, the Inquiry and<br />

Review Support Group, the Specialist Crime<br />

Review Group, general operational support<br />

services and ongoing training.<br />

Ball began her policing career with the<br />

Metropolitan Police Service back in 1987,<br />

undertaking various uniform and detective<br />

roles. Ball was promoted to Commander of the<br />

Operational Command Unit in 2007. Three years<br />

later, Ball joined Thames Valley Police as<br />

Assistant Chief Constable, re-joining the Met in<br />

2012 in the role of Deputy Assistant<br />

Commissioner for Territorial Policing.<br />

In 2013, Ball became the Senior National Coordinator<br />

for Counter-Terrorism Policing ahead<br />

of a secondment to the College of Policing in<br />

2016 as strategic leadership advisor.<br />

A formal start date for the Metropolitan Police<br />

Service’s new Assistant Commissioner will be<br />

confirmed shortly.<br />

Metropolitan Police Service Commissioner<br />

Cressida Dick commented: “I’m delighted to<br />

appoint Helen Ball as our new Assistant<br />

Commissioner for Professionalism. Helen brings<br />

with her enormous experience of working not<br />

just in this organisation, but across policing in<br />

general. Her input and expertise will be<br />

invaluable as we seek to transform and provide<br />

the best possible service for Londoners.”<br />

Paula Warburton<br />

Integrated security solutions developer TDSi<br />

has announced the appointment of Paula<br />

Warburton as the Poole-based business’ new<br />

finance and operations director. Going<br />

forward, Warburton’s vital role will see her<br />

lead the company’s financial, commercial and<br />

operations development.<br />

Warburton joins a growing team at TDSi’s<br />

Dorset hq. In recent months, the company has<br />

appointed a new finance assistant, Luke<br />

Kleszcz, and (as reported in Risk UK’s July<br />

edition) an experienced marketing manager,<br />

namely Francesca Meyrick.<br />

Warburton has an impressive track record in<br />

financial strategy, qualifying as a Chartered<br />

Appointments<br />

Risk UK keeps you up-to-date with all the latest people<br />

moves in the security, fire, IT and Government sectors<br />

Ashish Surti<br />

Colt Technology Services has appointed Ashish<br />

Surti to the role of Chief Information Security<br />

Officer (CISO), reporting directly to Chief<br />

Technology Officer Rajiv Datta.<br />

Surti will now be responsible for Colt’s overall<br />

information and cyber security strategy, while<br />

also heading up the company’s Computer<br />

Security Incident Response Team.<br />

As a provider of network services for some of<br />

the world’s biggest brands, a responsible focus<br />

on information security forms a core part of Colt<br />

Technology Service’s customer experience.<br />

Under Surti’s direction, the business will<br />

strengthen its information security strategy by<br />

continually enhancing and embeddng cyber risk<br />

management and logical security practices into<br />

all company activities. As CISO, Surti will lead<br />

the assessment, evaluation, prioritisation and<br />

mitigation of the internal and external security<br />

threat to Colt’s products, network infrastructure<br />

and business information systems.<br />

“With the ever-present risk of cyber attack<br />

and increasing pressure from global threats,<br />

secure network connectivity matters now more<br />

than ever to organisations across all markets<br />

and industries,” explained Surti.<br />

A highly respected security expert with over<br />

15 years’ experience, Surti joins Colt from TSB<br />

where he served as the company’s first CISO. At<br />

TSB, Surti was accountable for key duties<br />

including information risk management, security<br />

consultancy and, indeed, security architecture.<br />

Accountant in 2000 and assuming her first role<br />

as a financial director back in 2007. Prior to<br />

joining TDSi, Warburton worked as the group<br />

financial director for a prominent property and<br />

construction surveying services organisation.<br />

John Davies, managing director of TDSi,<br />

commented: “TDSi is a fast-moving<br />

international business that requires strong<br />

financial leadership. Paula will now work as<br />

part of the executive team to maintain and<br />

grow our financial health and prosperity.”<br />

Warburton informed Risk UK: “TDSi boasts a<br />

very impressive track record as a truly<br />

innovative manufacturer in the security sector.<br />

My main focus is to ensure that the business<br />

is provided with the necessary management<br />

information and support it needs to excel.”<br />

69<br />

www.risk-uk.com


Appointments<br />

Christopher Evans<br />

Evolution, the integrated security and fire solutions<br />

business, has appointed Christopher Evans as its new<br />

compliance and Health and Safety manager.<br />

Joining the company from Teledyne Reynolds where he<br />

served as environment and Health and Safety officer,<br />

Evans also has extensive compliance experience gained<br />

from a number of lead auditor roles for ISO certification<br />

bodies – among them ISOQAR, IMS International and<br />

Exova BM TRADA – where he was certifying Quality,<br />

Environmental and OHSAS Management Systems.<br />

Prior to working in the private sector, Evans spent 18 years in the Royal Air<br />

Force in the role of ground support equipment bay manager, gaining IOSH<br />

‘Managing Safety’ and ‘Risk Assessor’ qualifications along the way.<br />

Immediate priorities for Evans will be supporting the business on its<br />

transition to ISO 9001:2015, as well as working towards achieving ISO 27001<br />

Security Information Management and ISO 14001 Environmental Management.<br />

“We already have the process systems in place and are currently monitoring<br />

and conducting audits to ensure that we’re on target for achieving additional<br />

certifications where required along with maintaining our current certifications,”<br />

explained Evans in conversation with Risk UK.<br />

Richard Preece<br />

BeCyberSure, an<br />

organisation covering the<br />

full spectrum of the<br />

information security and<br />

non-compliance threat,<br />

has announced the<br />

appointment of Richard<br />

Preece in the role of<br />

specialist consultant.<br />

Preece will now work with BeCyberSure<br />

customers at Board level in order to assist both<br />

directors and corporate officers in managing<br />

cyber security risk and compliance and<br />

protecting themselves and their businesses<br />

from attack and financial penalties.<br />

Preece is a ‘hybrid’ consultant who connects<br />

leadership and culture, governance, risk<br />

management and capability. His<br />

multidisciplinary approach focuses upon<br />

making organisations more agile and resilient<br />

in order to ‘win in the modern world’. This<br />

process begins by enabling senior leaders to<br />

take ownership of the cyber agenda, aligning<br />

strategy to exploit the opportunities of<br />

innovation, while also mitigating the everpresent<br />

dangers of hyper-connection.<br />

A former director at the cyber resilience,<br />

training, exercising and consultancy services<br />

company CybX, Preece also spent 24 years<br />

serving in the British Army in a wide variety of<br />

operational, intelligence, training and strategy<br />

roles around the world. His experience includes<br />

working with clients in financial services, the<br />

energy, oil and gas sectors, defence and law<br />

enforcement. He holds an MSc in the Design of<br />

Information Systems from Cranfield University.<br />

Phil Lea<br />

British software and<br />

services business<br />

Advanced has hired Phil<br />

Lea as head of security<br />

and compliance, further<br />

strengthening the<br />

company’s leadership<br />

team to deliver<br />

technology solutions with<br />

security very much in mind.<br />

Reporting to CTO Jon Wrennall, Lea will focus<br />

on customer security, security technologies and<br />

governance. This will include enhancing the<br />

tools that Advanced uses to secure its products,<br />

customers and internal IT as well as developing<br />

managed security service offerings for the<br />

business’ hosted and outsourced IT customers.<br />

In addition, Lea will be responsible for coordinating<br />

security governance across<br />

Advanced and ensuring that the entire business<br />

is ready for future regulatory requirements,<br />

including the EU’s upcoming GDPR.<br />

Lea brings with him over 20 years’ IT and<br />

security experience having previously worked<br />

at Fujitsu, Gartner and the Department for Work<br />

and Pensions. At Fujitsu, he spent over eight<br />

years as managing security consultant.<br />

Ben Davies<br />

Videx, the door entry<br />

and access control<br />

solutions developer, has<br />

appointed two new<br />

sales managers in order<br />

to drive business<br />

opportunity and growth<br />

in key areas across both<br />

the UK and Ireland.<br />

Ben Davies (pictured) joins the company<br />

as South East regional manager with over ten<br />

years’ experience gained in the door entry<br />

market where he has worked for several<br />

high-profile access control companies in the<br />

UK. Davies excels in generating new<br />

business, growing the profitability of existing<br />

clients and exceeding sales targets.<br />

Billy Paton takes on the role of manager<br />

for Scotland and Ireland, whereby he’ll be<br />

responsible for generating new business<br />

across both countries as well as managing<br />

existing customers and relationships.<br />

Paton has worked in the access control<br />

sector for nearly 20 years now and on behalf<br />

of numerous security, installation and door<br />

entry sales companies.<br />

Speaking about his new role at Videx,<br />

Davies said: “I’m very excited to join and<br />

share my experience with the Videx team.”<br />

70<br />

www.risk-uk.com


BENCHMARK<br />

Smart Solutions<br />

BENCHMARK<br />

Innovative and smart solutions can add value and benefits to<br />

modern systems for customers. With the technological landscape<br />

rapidly evolving, the Benchmark Smart Solutions project assesses<br />

the potential on offer from system integration, advanced<br />

connectivity and intelligent technology. Bringing together field trials<br />

and assessments, proof of concept and real-world experience of<br />

implementing smart solutions, it represents an essential resource<br />

for all involved in innovative system design.<br />

Launching in 2017, Benchmark Smart Solutions will be the industry’s only real-world resource for<br />

security professionals who are intent on offering added value through the delivery of smarter solutions.<br />

@Benchmark_Smart<br />

Partner Companies<br />

www.benchmarksmart.com


Best Value Security Products from Insight Security<br />

www.insight-security.com Tel: +44 (0)1273 475500<br />

...and<br />

lots<br />

more<br />

Computer<br />

Security<br />

Anti-Climb Paints<br />

& Barriers<br />

Metal Detectors<br />

(inc. Walkthru)<br />

Security, Search<br />

& Safety Mirrors<br />

Security Screws &<br />

Fastenings<br />

Padlocks, Hasps<br />

& Security Chains<br />

Key Safes & Key<br />

Control Products<br />

Traffic Flow &<br />

Management<br />

see our<br />

website<br />

ACCESS CONTROL<br />

KERI SYSTEMS UK LTD<br />

Tel: + 44 (0) 1763 273 243<br />

Fax: + 44 (0) 1763 274 106<br />

Email: sales@kerisystems.co.uk<br />

www.kerisystems.co.uk<br />

ACCESS CONTROL<br />

ACCESS CONTROL<br />

ACT<br />

ACT – Ireland, Unit C1, South City Business Park,<br />

Tallaght, Dublin, D24 PN28.Ireland. Tel: +353 1 960 1100<br />

ACT - United Kingdom, 601 Birchwood One, Dewhurst Road,<br />

Warrington, WA3 7GB. Tel: +44 161 236 9488<br />

sales@act.eu www.act.eu<br />

ACCESS CONTROL – BARRIERS, GATES, CCTV<br />

ABSOLUTE ACCESS<br />

Aberford Road, Leeds, LS15 4EF<br />

Tel: 01132 813511<br />

E: richard.samwell@absoluteaccess.co.uk<br />

www.absoluteaccess.co.uk<br />

Access Control, Automatic Gates, Barriers, Blockers, CCTV<br />

ACCESS CONTROL<br />

COVA SECURITY GATES LTD<br />

Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards<br />

Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68<br />

Tel: 01293 553888 Fax: 01293 611007<br />

Email: sales@covasecuritygates.com<br />

Web: www.covasecuritygates.com<br />

ACCESS CONTROL & DOOR HARDWARE<br />

ALPRO ARCHITECTURAL HARDWARE<br />

Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks,<br />

Waterproof Keypads, Door Closers, Deadlocks plus many more<br />

T: 01202 676262 Fax: 01202 680101<br />

E: info@alpro.co.uk<br />

Web: www.alpro.co.uk<br />

ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />

HTC PARKING AND SECURITY LIMITED<br />

St. James’ Bus. Centre, Wilderspool Causeway,<br />

Warrington Cheshire WA4 6PS<br />

Tel 01925 552740 M: 07969 650 394<br />

info@htcparkingandsecurity.co.uk<br />

www.htcparkingandsecurity.co.uk<br />

ACCESS CONTROL<br />

INTEGRATED DESIGN LIMITED<br />

Integrated Design Limited, Feltham Point,<br />

Air Park Way, Feltham, Middlesex. TW13 7EQ<br />

Tel: +44 (0) 208 890 5550<br />

sales@idl.co.uk<br />

www.fastlane-turnstiles.com<br />

ACCESS CONTROL<br />

SECURE ACCESS TECHNOLOGY LIMITED<br />

Authorised Dealer<br />

Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />

Email: info@secure-access.co.uk<br />

Website: www.secure-access.co.uk<br />

ACCESS CONTROL MANUFACTURER<br />

NORTECH CONTROL SYSTEMS LTD.<br />

Nortech House, William Brown Close<br />

Llantarnam Park, Cwmbran NP44 3AB<br />

Tel: 01633 485533<br />

Email: sales@nortechcontrol.com<br />

www.nortechcontrol.com<br />

Custom Designed Equipment<br />

• Indicator Panels<br />

• Complex Door Interlocking<br />

• Sequence Control<br />

• Door Status Systems<br />

• Panic Alarms<br />

<br />

• Bespoke Products<br />

www.hoyles.com<br />

sales@hoyles.com<br />

Tel: +44 (0)1744 886600<br />

ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES<br />

UKB INTERNATIONAL LTD<br />

Planet Place, Newcastle upon Tyne<br />

Tyne and Wear NE12 6RD<br />

Tel: 0845 643 2122<br />

Email: sales@ukbinternational.com<br />

Web: www.ukbinternational.com<br />

Hoyles are the UK’s leading supplier of<br />

custom designed equipment for the<br />

security and access control industry.<br />

From simple indicator panels to<br />

complex door interlock systems.<br />

BUSINESS CONTINUITY<br />

ACCESS CONTROL, INTRUSION DETECTION AND VIDEO MANAGEMENT<br />

VANDERBILT INTERNATIONAL (UK) LTD<br />

Suite 7, Castlegate Business Park<br />

Caldicot, South Wales NP26 5AD UK<br />

Main: +44 (0) 2036 300 670<br />

email: info.uk@vanderbiltindustries.com<br />

web: www.vanderbiltindustries.com<br />

BUSINESS CONTINUITY MANAGEMENT<br />

CONTINUITY FORUM<br />

Creating Continuity ....... Building Resilience<br />

A not-for-profit organisation providing help and support<br />

Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845<br />

Email: membership@continuityforum.org<br />

Web: www.continuityforum.org<br />

www.insight-security.com Tel: +44 (0)1273 475500


CCTV<br />

CCTV<br />

Rapid Deployment Digital IP High Resolution CCTV<br />

40 hour battery, Solar, Wind Turbine and Thermal Imaging<br />

Wired or wireless communication fixed IP<br />

CE Certified<br />

Modicam Europe, 5 Station Road, Shepreth,<br />

Cambridgeshire SG8 6PZ<br />

www.modicam.com sales@modicameurope.com<br />

CCTV SPECIALISTS<br />

PLETTAC SECURITY LTD<br />

Unit 39 Sir Frank Whittle Business Centre,<br />

Great Central Way, Rugby, Warwickshire CV21 3XH<br />

Tel: 01788 567811 Fax: 01788 544 549<br />

Email: jackie@plettac.co.uk<br />

www.plettac.co.uk<br />

CONTROL ROOM & MONITORING SERVICES<br />

CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS<br />

ALTRON COMMUNICATIONS EQUIPMENT LTD<br />

Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />

Tel: +44 (0) 1269 831431<br />

Email: cctvsales@altron.co.uk<br />

Web: www.altron.co.uk<br />

CCTV<br />

G-TEC<br />

Gtec House, 35-37 Whitton Dene<br />

Hounslow, Middlesex TW3 2JN<br />

Tel: 0208 898 9500<br />

www.gtecsecurity.co.uk<br />

sales@gtecsecurity.co.uk<br />

ADVANCED MONITORING SERVICES<br />

EUROTECH MONITORING SERVICES LTD.<br />

Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring<br />

• Vehicle Tracking • Message Handling<br />

• Help Desk Facilities • Keyholding/Alarm Response<br />

Tel: 0208 889 0475 Fax: 0208 889 6679<br />

E-MAIL eurotech@eurotechmonitoring.net<br />

Web: www.eurotechmonitoring.net<br />

DISTRIBUTORS<br />

CCTV/IP SOLUTIONS<br />

DALLMEIER UK LTD<br />

3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH<br />

Tel: +44 (0) 117 303 9 303<br />

Fax: +44 (0) 117 303 9 302<br />

Email: dallmeieruk@dallmeier.com<br />

SPECIALISTS IN HD CCTV<br />

MaxxOne<br />

Unit A10 Pear Mill, Lower Bredbury, Stockport. SK6 2BP<br />

Tel +44 (0)161 430 3849<br />

www.maxxone.com<br />

sales@onlinesecurityproducts.co.uk<br />

www.onlinesecurityproducts.co.uk<br />

CCTV & IP SECURITY SOLUTIONS<br />

PANASONIC SYSTEM COMMUNICATIONS COMPANY<br />

EUROPE<br />

Panasonic House, Willoughby Road<br />

Bracknell, Berkshire RG12 8FP UK<br />

Tel: 0207 0226530<br />

Email: info@business.panasonic.co.uk<br />

AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />

DISTRIBUTOR OF SECURITY AND LOW VOLTAGE PRODUCTS.<br />

ADI GLOBAL DISTRIBUTION<br />

Distributor of electronic security systems and solutions for over 250 leading manufacturers, the company<br />

also offers an internal technical support team, dedicated field support engineers along with a suite of<br />

training courses and services. ADI also offers a variety of fast, reliable delivery options, including specified<br />

time delivery, next day or collection from any one of 28 branches nationwide. Plus, with an ADI online<br />

account, installers can order up to 7pm for next day delivery.<br />

Tel: 0161 767 2990 Fax: 0161 767 2999 Email: sales.uk@adiglobal.com www.adiglobal.com/uk<br />

COMMUNICATIONS & TRANSMISSION EQUIPMENT<br />

KBC NETWORKS LTD.<br />

Barham Court, Teston, Maidstone, Kent ME18 5BZ<br />

www.kbcnetworks.com<br />

Phone: 01622 618787<br />

Fax: 020 7100 8147<br />

Email: emeasales@kbcnetworks.com<br />

WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS,<br />

PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.<br />

MAYFLEX<br />

Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ<br />

Tel: 0800 881 5199<br />

Email: securitysales@mayflex.com<br />

Web: www.mayflex.com<br />

DIGITAL IP CCTV<br />

SESYS LTD<br />

High resolution ATEX certified cameras, rapid deployment<br />

cameras and fixed IP CCTV surveillance solutions available with<br />

wired or wireless communications.<br />

1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG<br />

Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333<br />

Email: info@sesys.co.uk www.sesys.co.uk<br />

www.insight-security.com Tel: +44 (0)1273 475500


THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESS<br />

CONTROL AND INTRUDER DETECTION SOLUTIONS<br />

NORBAIN SD LTD<br />

210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP<br />

Tel: 0118 912 5000 Fax: 0118 912 5001<br />

www.norbain.com<br />

Email: info@norbain.com<br />

INTEGRATED SECURITY SOLUTIONS<br />

INNER RANGE EUROPE LTD<br />

Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead,<br />

Reading, Berkshire RG74GB, United Kingdom<br />

Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001<br />

Email: ireurope@innerrange.co.uk<br />

www.innerrange.com<br />

UK LEADERS IN BIG BRAND CCTV DISTRIBUTION<br />

SATSECURE<br />

Hikivision & MaxxOne (logos) Authorised Dealer<br />

Unit A10 Pear Mill, Lower Bredbury,<br />

Stockport. SK6 2BP<br />

Tel +44 (0)161 430 3849<br />

www.satsecure.uk<br />

IDENTIFICATION<br />

PERIMETER PROTECTION<br />

ADVANCED PRESENCE DETECTION AND SECURITY LIGHTING SYSTEMS<br />

GJD MANUFACTURING LTD<br />

Unit 2 Birch Business Park, Whittle Lane, Heywood, OL10 2SX<br />

Tel: + 44 (0) 1706 363998<br />

Fax: + 44 (0) 1706 363991<br />

Email: info@gjd.co.uk<br />

www.gjd.co.uk<br />

PERIMETER PROTECTION<br />

GPS PERIMETER SYSTEMS LTD<br />

14 Low Farm Place, Moulton Park<br />

Northampton, NN3 6HY UK<br />

Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />

E-mail: info@gpsperimeter.co.uk<br />

Web site: www.gpsperimeter.co.uk<br />

COMPLETE SOLUTIONS FOR IDENTIFICATION<br />

DATABAC GROUP LIMITED<br />

1 The Ashway Centre, Elm Crescent,<br />

Kingston upon Thames, Surrey KT2 6HH<br />

Tel: +44 (0)20 8546 9826<br />

Fax:+44 (0)20 8547 1026<br />

enquiries@databac.com<br />

INDUSTRY ORGANISATIONS<br />

POWER<br />

POWER SUPPLIES – DC SWITCH MODE AND AC<br />

DYCON LTD<br />

Unit A, Cwm Cynon Business Park, Mountain Ash, CF45 4ER<br />

Tel: 01443 471900 Fax: 01443 479 374<br />

Email: sales@dyconpower.com<br />

www.dyconpower.com<br />

TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY<br />

BRITISH SECURITY INDUSTRY ASSOCIATION<br />

Tel: 0845 389 3889<br />

Email: info@bsia.co.uk<br />

Website: www.bsia.co.uk<br />

Twitter: @thebsia<br />

THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY<br />

SSAIB<br />

7-11 Earsdon Road, West Monkseaton<br />

Whitley Bay, Tyne & Wear<br />

NE25 9SX<br />

Tel: 0191 2963242<br />

Web: www.ssaib.org<br />

INTEGRATED SECURITY SOLUTIONS<br />

STANDBY POWER<br />

UPS SYSTEMS PLC<br />

Herongate, Hungerford, Berkshire RG17 0YU<br />

Tel: 01488 680500<br />

sales@upssystems.co.uk<br />

www.upssystems.co.uk<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

ADEPT POWER SOLUTIONS LTD<br />

Adept House, 65 South Way, Walworth Business Park<br />

Andover, Hants SP10 5AF<br />

Tel: 01264 351415 Fax: 01264 351217<br />

Web: www.adeptpower.co.uk<br />

E-mail: sales@adeptpower.co.uk<br />

SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />

HONEYWELL SECURITY AND FIRE<br />

Tel: +44 (0) 844 8000 235<br />

E-mail: securitysales@honeywell.com<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

UNINTERRUPTIBLE POWER SUPPLIES LTD<br />

Woodgate, Bartley Wood Business Park<br />

Hook, Hampshire RG27 9XA<br />

Tel: 01256 386700 5152 e-mail:<br />

sales@upspower.co.uk<br />

www.upspower.co.uk<br />

www.insight-security.com Tel: +44 (0)1273 475500


SECURITY<br />

ANTI-CLIMB SOLUTIONS & SECURITY PRODUCT SPECIALISTS<br />

INSIGHT SECURITY<br />

Units 1 & 2 Cliffe Industrial Estate<br />

Lewes, East Sussex BN8 6JL<br />

Tel: 01273 475500<br />

Email:info@insight-security.com<br />

www.insight-security.com<br />

CASH & VALUABLES IN TRANSIT<br />

CONTRACT SECURITY SERVICES LTD<br />

Challenger House, 125 Gunnersbury Lane, London W3 8LH<br />

Tel: 020 8752 0160 Fax: 020 8992 9536<br />

E: info@contractsecurity.co.uk<br />

E: sales@contractsecurity.co.uk<br />

Web: www.contractsecurity.co.uk<br />

QUALITY SECURITY AND SUPPORT SERVICES<br />

CONSTANT SECURITY SERVICES<br />

Cliff Street, Rotherham, South Yorkshire S64 9HU<br />

Tel: 0845 330 4400<br />

Email: contact@constant-services.com<br />

www.constant-services.com<br />

ONLINE SECURITY SUPERMARKET<br />

EBUYELECTRICAL.COM<br />

Lincoln House,<br />

Malcolm Street<br />

Derby DE23 8LT<br />

Tel: 0871 208 1187<br />

www.ebuyelectrical.com<br />

LIFE SAFETY EQUIPMENT<br />

C-TEC<br />

Challenge Way, Martland Park,<br />

Wigan WN5 OLD United Kingdom<br />

Tel: +44 (0) 1942 322744<br />

Fax: +44 (0) 1942 829867<br />

Website: www.c-tec.com<br />

PERIMETER SECURITY<br />

TAKEX EUROPE LTD<br />

Aviary Court, Wade Road, Basingstoke<br />

Hampshire RG24 8PE<br />

Tel: +44 (0) 1256 475555<br />

Fax: +44 (0) 1256 466268<br />

Email: sales@takex.com<br />

Web: www.takex.com<br />

FENCING SPECIALISTS<br />

J B CORRIE & CO LTD<br />

Frenchmans Road<br />

Petersfield, Hampshire GU32 3AP<br />

Tel: 01730 237100<br />

Fax: 01730 264915<br />

email: fencing@jbcorrie.co.uk<br />

INTRUSION DETECTION AND PERIMETER PROTECTION<br />

OPTEX (EUROPE) LTD<br />

Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre<br />

optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B<br />

Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ<br />

Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311<br />

Email: sales@optex-europe.com<br />

www.optex-europe.com<br />

SECURITY EQUIPMENT<br />

PYRONIX LIMITED<br />

Secure House, Braithwell Way, Hellaby,<br />

Rotherham, South Yorkshire, S66 8QY.<br />

Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042<br />

www.facebook.com/Pyronix<br />

www.linkedin.com/company/pyronix www.twitter.com/pyronix<br />

SECURITY SYSTEMS<br />

BOSCH SECURITY SYSTEMS LTD<br />

PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />

Tel: 0330 1239979<br />

E-mail: uk.securitysystems@bosch.com<br />

Web: uk.boschsecurity.com<br />

INTRUDER AND FIRE PRODUCTS<br />

CQR SECURITY<br />

125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />

Tel: 0151 606 1000<br />

Fax: 0151 606 1122<br />

Email: andyw@cqr.co.uk<br />

www.cqr.co.uk<br />

SECURITY EQUIPMENT<br />

CASTLE<br />

Secure House, Braithwell Way, Hellaby,<br />

Rotherham, South Yorkshire, S66 8QY<br />

TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042<br />

www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity<br />

www.twitter.com/castlesecurity<br />

SECURE CONNECTIVITY PROVIDERS<br />

CSL<br />

T: +44 (0)1895 474 474<br />

sales@csldual.com<br />

@CSLDualCom<br />

www.csldual.com<br />

SECURITY PRODUCTS<br />

EATON<br />

Eaton is one of the world’s leading manufacturers of security equipment<br />

its Scantronic and Menvier product lines are suitable for all types of<br />

commercial and residential installations.<br />

Tel: 01594 545 400 Email: securitysales@eaton.com<br />

Web: www.uk.eaton.com Twitter: @securityTP<br />

INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS<br />

RISCO GROUP<br />

Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton,<br />

Manchester, M24 2SS<br />

Tel: 0161 655 5500 Fax: 0161 655 5501<br />

Email: sales@riscogroup.co.uk<br />

Web: www.riscogroup.com/uk<br />

SECURITY SYSTEMS<br />

VICON INDUSTRIES LTD.<br />

Brunel Way, Fareham<br />

Hampshire, PO15 5TX<br />

United Kingdom<br />

www.vicon.com<br />

www.insight-security.com Tel: +44 (0)1273 475500

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!