11.07.2019 Views

RiskXtraJune2019

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

x<br />

www.riskxtra.com<br />

RISKXtra<br />

Security and Risk Management June 2019<br />

The Gold Standard<br />

Chartered Security Professionals in the Spotlight<br />

><br />

News Special: IFSEC and FIREX International 2019 Preview<br />

The Centre of Attention: Converged Security Solutions<br />

Best Practice Casebook: Intelligent and Predictive Security<br />

Fire Safety Management and Installation Supplement


Inner Range’s Integriti<br />

High Security System is<br />

a complete Hardware/<br />

Software solution designed<br />

specifically for High Security<br />

installations.<br />

Our range includes:<br />

All Software<br />

Hardware Controllers<br />

End of Line Modules<br />

Power Supplies<br />

Keypads<br />

Enclosures<br />

Communications Devices<br />

Access Control Readers<br />

Credentials<br />

WHY TAKE CHANCES?<br />

FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />

T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.com


x<br />

RISKXtra<br />

June 2019<br />

Contents<br />

44 The Security Institute’ s View<br />

The post-nominals CSyP are now accepted as ‘The Gold<br />

Standard’ for strategic leaders operating in the security<br />

business sector. Rick Mounfield pinpoints precisely why<br />

Training and Career Development (pp54-55)<br />

5 Editorial Comment<br />

6 News Update<br />

Inaugural Surveillance Camera Day, Securitas Q1 financial<br />

results, IRM and IOR partnership, 1E study on cyber breaches<br />

8 News Special: IFSEC and FIREX International<br />

Brian Sims previews the 2019 editions of IFSEC International and<br />

FIREX International which run at ExCeL in the heart of London’s<br />

Docklands from 18-20 June<br />

12 Opinion: Fatal Accidents in the Workplace<br />

Fatal accidents in the workplace inevitably realise questions<br />

around responsibility and criminal liability. Guy Bastable and<br />

Tom McNeill examine in detail those occasions when<br />

organisations and individuals will be found criminally liable, for<br />

which offences and with what sanction<br />

15 BSIA Briefing<br />

This month, the British Security Industry Association focuses its<br />

attentions on the very heart of security as Carl Gibbard assesses<br />

the crime deterrents developed by numerous member<br />

companies and what they achieve in practice<br />

18 The Centre of Attention<br />

In today’s high-risk and high-threat environment, there’s a very<br />

real and immediate need for a converged security approach that<br />

unifies the monitoring of both physical and cyber security<br />

events through a single platform. With this in mind, James<br />

Willison and Sarb Sembhi outline what’s in store for visitors to<br />

the Converged Security Centre at IFSEC International 2019<br />

46 In The Spotlight: ASIS International UK Chapter<br />

Most security business sector professionals fit a certain<br />

demographic. This is particularly true when we consider senior<br />

leaders across the industry, but it’s fair to state that the times<br />

are slowly changing. James Morris focuses on the subjects of<br />

diversity and inclusion in the security world<br />

48 FIA Technical Briefing<br />

As Bernard Laluvein points out, errors in the selection of fire<br />

detectors for business premises can easily be avoided by<br />

following the standards set out in BS 5839-1:2017<br />

50 Security Services: Best Practice Casebook<br />

Omar Abu-Rish details that, as threats continue to grow and<br />

evolve, today’s organisations need intelligence on all of the<br />

risks which might impact their operations<br />

52 Cyber Security: Professional Services<br />

In the UK, we’re now predominantly a services-based economy.<br />

That means a vast and complex supply chain of professional<br />

services companies. Azeem Aleem duly observes and addresses<br />

the cyber security implications of this truism<br />

54 Training and Career Development<br />

Lawrence Fennelly and Marianna Perry evaluate professional<br />

development for security managers and supervisors<br />

56 Risk in Action<br />

57 Technology in Focus<br />

59 Appointments<br />

62 The Risk Xtra Directory<br />

21 Fire Safety Management and Installation<br />

The FIA, Klaxon, Hochiki, Vimpex and Kentec all feature in our<br />

regular Fire Safety Management and Installation Supplement<br />

32 The Changing Face of Security Services<br />

Risk Xtra’s ever-popular quarterly Security Guarding<br />

Supplement contains thought-provoking contributions from Axis<br />

Security, CIS Security, Securitas and Webeye<br />

40 Meet The Security Company<br />

In association with the NSI, Risk Xtra continues its ‘Meet The<br />

Security Company’ series by shining the spotlight on Sodexo<br />

ISSN 1740-3480<br />

Risk Xtra is published quarterly by Pro-Activ Publications<br />

Ltd and specifically aimed at security and risk<br />

management, loss prevention, business continuity and<br />

fire safety professionals operating within the UK’s largest<br />

commercial organisations<br />

© Pro-Activ Publications Ltd 2019<br />

All rights reserved. No part of this publication may be<br />

reproduced or transmitted in any form or by any means<br />

electronic or mechanical (including photocopying, recording<br />

or any information storage and retrieval system) without the<br />

prior written permission of the publisher<br />

The views expressed in Risk Xtra are not necessarily those of<br />

the publisher<br />

Risk Xtra is currently available for an annual subscription rate<br />

(UK only). Telephone 0208 295 8307 for more details<br />

www.riskxtra.com<br />

Risk Xtra<br />

PO Box 332<br />

Dartford DA1 9FF<br />

Editor Brian Sims BA (Hons) Hon FSyI<br />

Tel: 0208 295 8304 Mob: 07500 606013<br />

e-mail: brian.sims@risk-uk.com<br />

Design and Production Matt Jarvis<br />

Tel: 0208 295 8310 Fax: 0870 429 2015<br />

e-mail: matt.jarvis@proactivpubs.co.uk<br />

Advertisement Director Paul Amura<br />

Tel: 0208 295 8307 Fax: 01322 292295<br />

e-mail: paul.amura@proactivpubs.co.uk<br />

Administration Tracey Beale<br />

Tel: 0208 295 8306 Fax: 01322 292295<br />

e-mail: tracey.beale@proactivpubs.co.uk<br />

Managing Director Mark Quittenton<br />

Chairman Larry O’Leary<br />

Editorial: 0208 295 8304<br />

Advertising: 0208 295 8307<br />

3<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Editorial<br />

House in Order<br />

Businesses will be better protected from fraud under new<br />

Companies House reforms initiated by the Government that<br />

will “do more” to safeguard the personal data of owners<br />

and ensure the ongoing accuracy of the register itself.<br />

Business Minister Kelly Tolhurst has unveiled a substantial<br />

package of reforms with the clear aim of minimising the burden<br />

on law abiding companies. The reforms will contribute towards<br />

the UK’s efforts to tackle economic crime by increasing the<br />

traceability of company ownership and management, while also<br />

offering owners and businesses greater protection from fraud.<br />

The proposed reforms will assist when it comes to increasing<br />

the accuracy and usefulness of the information available on the<br />

companies register, which last year alone was accessed no fewer<br />

than 6.5 billion times and, as of March 2018, included the details<br />

of over four million limited companies.<br />

In the last three years there have been almost 10,000<br />

complaints to Companies House from people concerned about<br />

their personal details, with worries including the potential for<br />

fraud and the illegal use of such information topping the list.<br />

Going forward, better information sharing by Companies<br />

House, other Government bodies and financial institutions will<br />

more adequately protect businesses and ensure the faster and<br />

more sophisticated identification of possible criminal activity, in<br />

turn benefiting businesses and consumers alike.<br />

Sometimes, the register can be misused to identify personal<br />

information, which may then be used for criminal purposes.<br />

Under the new proposals, directors will be given additional<br />

rights over their information (such as personal home addresses),<br />

while ensuring this information is still available in a transparent<br />

manner to public authorities where and when appropriate.<br />

Importantly, the UK has one of the highest ratings for cracking<br />

down on anonymous companies, with the Government’s latest<br />

proposed measures designed to build on Britain’s world-leading<br />

and wide-ranging anti-corruption activity.<br />

Speaking about the Government’s move, Edwin Morgan<br />

(interim director general at the Institute of Directors) said: “We<br />

welcome the thrust of these proposals. The IoD receives regular<br />

complaints from its members concerning the misuse of data<br />

published by Companies House. Transparency is a key feature of<br />

UK-registered companies, but if that transparency can be<br />

exploited by criminals or fraudsters then trust in the legal<br />

framework of business is undermined. We look forward to<br />

working with Companies House on new powers to monitor and<br />

control company information on its register. This will help to<br />

provide a more secure and reliable repository of corporate data.”<br />

If brought forward, this new package of proposals from<br />

Westminster would represent the most sweeping changes to the<br />

Companies House system of setting up and operating companies<br />

since the register was first created way back in 1844.<br />

Reliable company information is critical to the financial and<br />

banking sector in meeting know-your-customer requirements<br />

and helping to protect customers from fraud. That being so, the<br />

new proposals are smart, timely and very much to be welcomed.<br />

Brian Sims BA (Hons) Hon FSyI<br />

Editor<br />

5<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Surveillance Camera Commissioner unveils<br />

detail of inaugural Surveillance Camera Day<br />

As part of the National Surveillance Camera<br />

Strategy for England and Wales, Tony Porter<br />

QPM LLB – the Surveillance Camera<br />

Commissioner – is holding the world’s first<br />

Surveillance Camera Day as part of IFSEC<br />

International in London on Thursday 20 June.<br />

The purpose of the day is to raise public<br />

awareness about the provision and operation of<br />

surveillance cameras and to enhance public<br />

debate. In doing so, the event will encourage<br />

conversations that will help inform policymakers<br />

and service providers regarding<br />

acceptable surveillance practices and legitimacy<br />

for surveillance camera systems that are<br />

delivered in line with society’s needs.<br />

There will be a number of different elements<br />

to the day. The Commissioner is encouraging<br />

surveillance camera Control Centres to ‘throw<br />

their doors open’ so that the public can see,<br />

first hand, how they operate. To complement<br />

the ‘doors open’ initiative, a number of<br />

surveillance camera operators will be<br />

publishing a surveillance camera fact sheet<br />

setting out the basic facts of their system(s),<br />

including what they’re designed to do.<br />

The Commissioner will also be launching a<br />

‘secure by default’ standard for manufacturers<br />

at the IFSEC International Conference at<br />

London’s ExCeL. Where surveillance<br />

manufacturers meet the new standard, it will<br />

ensure that the default settings of a product are<br />

the most secure settings possible. This means<br />

that given cameras are much less likely to be<br />

vulnerable to cyber attacks.<br />

Tony Porter informed Risk Xtra: “Surveillance<br />

Camera Day is a world-first. The UK is<br />

sometimes referred to as ‘the most surveilled<br />

country on the planet’. I want to start a<br />

conversation about how surveillance cameras<br />

are used, why they’re used and who’s using<br />

them. Cameras are used to keep people safe,<br />

but new and emerging technology can lead to<br />

greater infringements on our civil liberties. Civil<br />

engagement is a key strand of the National<br />

Surveillance Camera Strategy and I want people<br />

who use cameras to shine a light on what they<br />

do and show how they’re using cameras to<br />

protect communities, not spy on them.”<br />

Porter added: “Overt surveillance is now<br />

arguably becoming as intrusive as covert<br />

surveillance techniques. As a society, it’s vitally<br />

important that we talk about whether we want<br />

to be surveilled in this way and, if we do, what<br />

safeguards do we need to wrap around it?<br />

Surveillance Camera Day is essentially all about<br />

the start of that conversation.”<br />

Interim Report for Q1 2019 shows 7% organic sales growth at Securitas<br />

Securitas has issued its Interim Report detailing the company’s financial results for the period<br />

January to March this year. Total sales stand at MSEK 26 744 with an organic sales growth of 7%.<br />

Operating income before amortisation is MSEK 1 290. The operating margin is 4.8%. Earnings per<br />

share are SEK 2.08, while free cash flow/net debt is 0.14.<br />

Speaking about the results, Magnus Ahlqvist (president and CEO) stated: “We had a strong start<br />

to the year. All business segments contributed to the improvement. Our comprehensive offer of<br />

protective services in combination with strong commercial activities allows us to grow faster than<br />

the security market in general. The operating conditions are similar to 2018 and we have good<br />

momentum. Security solutions and electronic security sales also developed well and grew by 17%<br />

compared with 2018. They now represent 21% of total Group sales.”<br />

Adjusted for changes in exchange rates, the operating result grew by a figure of 11%. As stated,<br />

the operating margin was 4.8% in the first quarter, with a solid performance in North America as<br />

well as in Ibero-America where Spain continued to show strong performance. The operating margin<br />

in Europe also improved and was supported by the cost savings programme initiated last year. “We<br />

have a continuous focus on managing the price and wage balance and did so in the first quarter of<br />

2019,” observed Ahlqvist.<br />

Earnings per share, adjusted for changes in exchange rates and items affecting comparability,<br />

improved by 3%. The earnings per share growth was negatively impacted by a higher effective tax<br />

rate in the US and a negative net effect from IFRS 16. Operating and free cash flow has improved<br />

when compared with the same quarter last year, but Ahlqvist is quick to point out that cash<br />

management remains an area of keen focus across all business segments.<br />

Ahlqvist (pictured) concluded: “We’re progressing according to plan with our programmes. The<br />

business is very excited about the long-term impact they will have on our method of operation.”<br />

6<br />


News Update<br />

IRM brings Institute of Operational<br />

Risk into growing global risk<br />

management community<br />

The Institute of Risk Management (IRM) has<br />

announced that the Institute of Operational<br />

Risk (IOR) will be joining the IRM group. This<br />

news follows in the wake of a vote at the IOR’s<br />

Annual General Meeting held on Wednesday<br />

22 May in central London.<br />

The IRM’s objective is to provide education<br />

and training for the global risk management<br />

community and support the profession with<br />

cutting-edge thought leadership. The IOR has<br />

the same and complementary purpose focused<br />

on operational risk. Both organisations fully<br />

recognise that strong benefits and synergies<br />

can be achieved by coming together.<br />

The IRM will, in particular, provide full<br />

support for the promotion of the IOR<br />

Certificate in Operational Risk. This will<br />

become part of the IRM’s global portfolio of<br />

qualifications, complementing the<br />

International Certificate and Diploma in<br />

Enterprise Risk Management (ERM) as well as<br />

the new Digital Risk Management Certificate.<br />

In addition, the IRM will be funding a major<br />

joint research project to advance thinking in<br />

operational risk management and contribute<br />

towards further qualifications development.<br />

The IRM and the IOR are jointly committed to<br />

advancing the professional practice of<br />

operational risk management.<br />

The development of a global network of risk<br />

practitioners and professionals delivering<br />

value and service at a local and regional level<br />

is a key strategy of both the IRM and the IOR.<br />

The chapters and groups of the two<br />

organisations will co-operate at a regional<br />

level to provide global support for members<br />

and the wider risk management community.<br />

Importantly, the IOR brand is going to be<br />

retained and will continue to represent<br />

excellence in the practice and profession of<br />

operational risk management.<br />

Socrates Coudounaris CFIRM, chairman of<br />

the IRM, said: “The IRM has a long and<br />

productive association with the Institute of<br />

Operational Risk. We have built our<br />

partnership on the common ground between<br />

us and the joint interest we have in providing<br />

excellent education and training to the wider<br />

global risk community in ERM and in<br />

operational risk. Our groups and chapters<br />

complement one another. We believe it’s in<br />

the best interests of both organisations to<br />

further deepen and extend our strategic<br />

relationship. The exact form of the future<br />

strategy is currently under discussion, but<br />

we’re confident that whatever the direction<br />

taken the outcome will be a hugely positive<br />

one for the risk management profession.”<br />

Businesses “woefully unprepared”<br />

for cyber breaches due to lack of IT<br />

security and ops basics<br />

1E, the endpoint management and security<br />

company, has published ‘Getting Your House<br />

in Order’. The document contains research<br />

findings that showcase the considerable scale<br />

of security breaches and the challenges<br />

businesses still face surrounding cyber<br />

attacks. The detailed report concludes with a<br />

ten-point Action Plan for businesses compiled<br />

by cyber security expert Michael Daniel.<br />

With digital transformation on the rise and<br />

technology outpacing policy, companies must<br />

take the lead when it comes to securing their<br />

estates. While cyber security has received<br />

much fanfare – with global spend predicted to<br />

exceed $1 trillion through 2021 – the biggest<br />

gaps continue to endure in plain sight.<br />

Commissioned in partnership with Vanson<br />

Bourne, 1E’s independent study polled 600 IT<br />

decision-makers (300 from IT operations and<br />

300 specialists in IT security) from across the<br />

UK and the US. The research discovered that<br />

over three-quarters (77%) believe that they’re<br />

not extremely well prepared to react to a<br />

serious data breach. Over half (60%) have<br />

experienced a serious security breach in the<br />

last two years (31% more than once), while<br />

eight-in-ten claim that digital transformation<br />

increases cyber risk.<br />

Fewer than a quarter (23%) believe that<br />

their IT operations and IT security teams work<br />

together extremely well to secure the<br />

business. Nearly all (97%) believe that their<br />

organisation would benefit from better<br />

collaboration between these teams.<br />

On average, respondents to the survey have<br />

visibility of 64% of their organisation’s total<br />

software estate. Only 66% of this software is<br />

said to be current.<br />

Over three-quarters (77%) cite the belief<br />

that remote working will continue to be a<br />

security concern until organisations can find a<br />

way to effectively reach, patch and secure<br />

remote workers. The majority of respondents<br />

demand an investment increase in areas such<br />

as software migration automation (80%),<br />

breach response and remediation (67%)<br />

and/or software patching (65%).<br />

Sumir Karayi, CEO at 1E, told Risk Xtra:<br />

“Businesses are losing control of their estates<br />

because of fundamental issues such as the<br />

widening gap between IT operations and IT<br />

security and deferred responsibility.”<br />

7<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

IFSEC International welcomes return of<br />

Converged Security Centre to London’s ExCeL<br />

security systems can be aligned with<br />

supplementary information sources such as<br />

social media to provide operational security<br />

and risk managers with the developing picture.<br />

IFSEC International is<br />

Europe’s leading<br />

security event and the<br />

only global stage<br />

committed to cocreating<br />

the future of<br />

integrated security.<br />

The show represents<br />

the critical and<br />

measured response to<br />

a world of everevolving<br />

threats,<br />

inviting every vertical<br />

of the security<br />

industry to forge the<br />

global agenda. Here,<br />

Brian Sims previews<br />

the 2019 edition of the<br />

hugely popular event,<br />

which runs at ExCeL in<br />

London’s Docklands<br />

from 18-20 June<br />

alongside the colocated<br />

FIREX<br />

International<br />

In 2019, IFSEC International’s magnetism will<br />

again reach far beyond its status as a worldclass<br />

security exhibition and conference<br />

programme. Whatever your role in the industry,<br />

you have a part to play in global security and<br />

IFSEC International affords you the perfect<br />

platform to share ideas, discover Best Practice<br />

and be hands-on with the latest physical and<br />

integrated security products and solutions.<br />

Security is the world’s most critical<br />

challenge. In parallel, IFSEC International is all<br />

about driving global safety. The show and its<br />

parallel education programme is designed to<br />

focus on innovation, inspiring and transforming<br />

today’s security professionals and products.<br />

One of the outstanding highlights from IFSEC<br />

International 2018, the Converged Security<br />

Centre returns to this year’s show on an even<br />

bigger and better platform to showcase the<br />

very latest in integrated security management<br />

technology. Conceived and delivered by Vidsys,<br />

the Converged Security Centre is a state-of-theart<br />

demonstration area which expertly<br />

highlights the advancement of Converged<br />

Security and Information Management and how<br />

software, hardware and all forms of information<br />

media can be expertly used to gain a complete<br />

overview of a developing security situation.<br />

On each day at IFSEC International 2019,<br />

professionals in the Converged Security Centre<br />

will present a wide range of simulated security<br />

scenarios. These will relate to situations such<br />

as transport, the utilities, open spaces and<br />

infrastructure and reveal how integrated<br />

Situation management<br />

As a practising security professional, if your<br />

role is to manage the security of a large-scale<br />

asset then the Converged Security Centre is an<br />

absolute must-attend feature. It will expertly<br />

show you how this technology provides a vital<br />

and integrated approach towards situation<br />

management and how, with a fully converged<br />

security system, end users can correlate<br />

multiple events into one situation, track major<br />

assets, execute efficient building management<br />

operations, mitigate cyber threats, monitor<br />

social networks and enable high-level<br />

information security resilience.<br />

The Converged Security Centre is a<br />

cornerstone feature of IFSEC International’s<br />

role as a platform designed to show security<br />

professionals today’s technologies and<br />

capabilities in real-time, all of them delivered<br />

by world-leading experts with solutions they<br />

can trust. It’s also a key part of the IFSEC ‘Show<br />

Me How’ programme, providing direct access to<br />

learning and insights that today’s professionals<br />

might otherwise struggle to see.<br />

James Chong, CEO of Vidsys, commented:<br />

“We’re thrilled to be part of the Converged<br />

Security Centre’s return at IFSEC International<br />

2019 and to be working with our global<br />

partners and experts to showcase what a truly<br />

converged security solution can provide for<br />

organisations worldwide. Today, there’s a<br />

rapidly growing requirement for a converged<br />

security solution that monitors both physical<br />

and cyber security events under one unified<br />

software platform, especially due to the everincreasing<br />

amount of data created in the world<br />

of the Internet of Things and Smart Cities.”<br />

For more in-depth detail on the Converged<br />

Security Centre programme take a look at pp18-<br />

19 of this month’s edition of Risk Xtra.<br />

On the show floor<br />

Important advances in video technology,<br />

including a range of exciting new cameras and<br />

smarter deep learning analytics, will be<br />

showcased by IDIS on Stand IF1110. The<br />

selection of advanced cameras to be unveiled<br />

by the firm includes an easy-to-install 2 MP<br />

8<br />


News Special: IFSEC and FIREX International 2019 Show Preview<br />

micro-dome. This camera features in-built IR<br />

illumination with a range of 15 metres. The<br />

camera’s neat appearance makes it ideal for<br />

locations where aesthetics are important, such<br />

as high-end retail outlets.<br />

Also on display will be the IDIS LightMaster<br />

PTZ featuring a powerful 36x optical zoom, an<br />

auto-iris and a Hall sensor for optimum image<br />

quality. In operation, the camera benefits from<br />

“highly accurate” auto-return positioning that<br />

ensures the positioning index is never lost even<br />

if the camera has been forced to change angle.<br />

IDIS will also unveil a new range of 5 MP IP<br />

cameras meeting the demand from end users<br />

for a wider range of HD options. The range<br />

includes a choice of fixed and motorised focus<br />

domes for indoor and outdoor use as well as<br />

outdoor motorised bullet cameras.<br />

Partitioned systems and a new evidence vault<br />

with cryptographic fingerprinting are among a<br />

cluster of improvements included within Inner<br />

Range’s intelligent access control and intruder<br />

detection system Integriti, which will be on<br />

display at Stand IF1030.<br />

The Version 19 system update is expected to<br />

be available to all new and existing Integriti<br />

customers this month. The update introduces<br />

‘partitioned sites’, which allows security<br />

managers to create users and other global<br />

entities that only exist within the partition in<br />

which they were created. This is particularly<br />

useful for multi-tenanted buildings because the<br />

partitions are completely isolated and invisible<br />

to users in other partitions.<br />

The Inner Range stand will house eight large<br />

screens for demonstrating the manufacturer’s<br />

access control systems and software in action.<br />

Inner Range will also be taking part in the<br />

event’s aforementioned ‘Show Me How’ series<br />

of practical security demonstrations.<br />

The company’s award-winning Entry-level<br />

access control system Inception has also been<br />

upgraded with a new dedicated app and the<br />

ability to integrate with the Milestone Systems<br />

Access platform. New and existing customers<br />

can now use the Sky Command App to control<br />

access remotely. It allows interactive control<br />

and live status of areas, inputs, doors and<br />

outputs as well as simple or multimode area<br />

arming options. Push notifications can be sent<br />

to smart phones, in turn alerting security<br />

managers to any changes on site.<br />

HID Global, the specialist in trusted identity<br />

solutions, will showcase new offerings and<br />

integrations on Stand IF2130. The company has<br />

launched a fingerprint reader that merges<br />

credential excellence with globally-patented<br />

multispectral imaging technology to fuel broad<br />

adoption of biometrics at the door. The iCLASS<br />

SE RB25F fingerprint reader provides an<br />

“unrivalled experience” by dramatically<br />

increasing image capture performance and<br />

fingerprint matching in under a second.<br />

In tandem, the new integration of HID SAFE<br />

Enterprise – a centralised platform for identity<br />

management – with the cloud-based card<br />

issuance solution HID FARGO Connect “takes<br />

seamless on-boarding and credential issuance<br />

to a new level”.<br />

FIREX International in 2019<br />

Hochiki Europe, the manufacturer of life safety<br />

systems, is returning to FIREX at ExCeL in order<br />

to showcase its most recent technological<br />

advancements and discuss Best Practice when<br />

it comes to safety in specialist environments.<br />

A comprehensive array of Hochiki Europe’s<br />

fire safety technology, including its CDX<br />

Conventional and ESP Intelligent ranges, will be<br />

displayed on Stand FX840 at this year’s event.<br />

The manufacturer’s SIL-approved products<br />

will also be on show. Designed to meet the<br />

demands of various hazardous environments,<br />

this renders them ideal for specialist<br />

applications in the marine, transport and<br />

petrochemical sectors.<br />

Alongside fellow fire safety brands Apollo,<br />

Argus, FFE and Klaxon, Advanced will be<br />

helping to form the FIREX Solutions Sector at<br />

FIREX International. Visitors to Stand FX610 can<br />

expect to learn more about Advanced’s<br />

multiprotocol MxPro 5 fire alarm panel. Axis AX<br />

(the manufacturer’s UL 864 system) includes<br />

synchronised fire audio and the DynamixSmoke<br />

smoke control solution.<br />

TOA Corporation UK, the manufacturer of<br />

commercial audio and voice alarm equipment,<br />

is exhibiting its latest innovations on Stand<br />

FX915, among them the VX-3000 combining all<br />

of the important functions for public address<br />

and voice alarm (PA/VA) in one unit.<br />

Cost-effective, robust, reliable and energy<br />

efficient, the VX-3000’s limited number of<br />

components makes design and installation<br />

easier, saves space, reduces cable complexity<br />

and enables rapid system configuration.<br />

Also on display will be the wall-mounted<br />

version of this system – the VX-3308WM. As<br />

well as being ideal as a standalone unit in<br />

reception and building entrance areas, its<br />

compact size means that it takes up less space<br />

than a standard 19-inch equipment rack,<br />

making it perfect for decentralised installations<br />

where equipment is located in electrical risers.<br />

*For further information on IFSEC International<br />

2019 visit www.ifsec.co.uk<br />

**Additional detail about FIREX International<br />

2019 may be accessed at www.firex.co.uk<br />

9<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Advertisement Feature<br />

In 2019, Forum Events<br />

is once again running<br />

its focused flagship<br />

events for the security<br />

business sector,<br />

namely the Total<br />

Security Summit and<br />

the Security IT<br />

Summit. Risk Xtra is<br />

serving as the Official<br />

Media Partner for<br />

both. Selected VIP<br />

delegates will be able<br />

to meet with several of<br />

the sector’s foremost<br />

solution suppliers in a<br />

structured<br />

environment and learn<br />

from the advice<br />

offered in detailed<br />

Best Practice seminars<br />

Meet, Learn and Connect at the<br />

Total Security Summit and the<br />

Security IT Summit 2019<br />

The Total Security Summit is designed to<br />

allow senior security professionals to meet<br />

with innovative and competitive suppliers<br />

to the industry. This two-day event takes place<br />

on 14-15 October at the Midland Hotel in<br />

Manchester. As a VIP guest of Forum Events,<br />

attending security and risk-focused<br />

professionals can engage with chosen suppliers<br />

based on their own requirements and upcoming<br />

projects. All meetings are pre-arranged. There’s<br />

no time wasted and absolutely no ‘hard sell’.<br />

You’ll also have the opportunity to network<br />

with like-minded peers who share your ongoing<br />

security and risk management challenges.<br />

Security professionals with the following job<br />

titles are invited to attend the Summit for free:<br />

Security Director, Loss Prevention<br />

Director/Manager, Procurement<br />

Director/Manager, Business Continuity<br />

Director, Head of Security, Buildings Manager,<br />

Security Advisor or Head of Corporate Security.<br />

Forum Events will take care of all hospitality<br />

throughout, including lunches, refreshments,<br />

overnight accommodation and an invitation to<br />

the Total Security Summit networking dinner<br />

complete with entertainment.<br />

Delegates at previous Summits have included<br />

representatives from the likes of Allen & Overy,<br />

Barnet Council, Buro Happold Engineering,<br />

Canary Wharf Group, David McBrayne HR, DHL<br />

Supply Chain, HSBC, Johnson Matthey,<br />

Ladbrokes Coral Group, Loopel, Nottingham<br />

College, NHS Dorset County Hospital,<br />

Portmeirion, Sodexo, Thames Water, Token Inc,<br />

Travelodge, The Babraham Institute, The<br />

Football Association, Travelex and the Victoria<br />

& Albert Museum.<br />

Seminar sessions will also be hosted<br />

throughout the two days, with speakers<br />

including Darren Stanton (TV’s ‘Human Lie<br />

Detector’). His session is entitled ‘Seeing Is Not<br />

Always Believing’. From ensuring someone’s<br />

insurance claim is real, or that a job candidate<br />

is being truthful, through to preventing<br />

terrorism, Stanton will evidence how his subtle<br />

techniques are being used to keep us all safe<br />

from those who would seek to do harm.<br />

Security solutions on show<br />

Suppliers attending the Total Security Summit<br />

cover the whole spectrum of security, including<br />

access control, biometrics, business continuity,<br />

risk management, CCTV, fire safety, IP/IT<br />

security, lone worker security, loss prevention,<br />

perimiter security, SIA-focused training, Cashin-Transit,<br />

screening and security scanning.<br />

The Total Security Summit could be the best<br />

two days you spend out of the office this year.<br />

Here’s what delegates at previous Summit’s<br />

have had to say about the event:<br />

• “I found the Total Security Summit a very<br />

useful opportunity to develop my<br />

understanding of a range of new and<br />

occasionally cutting-edge physical security<br />

capabilities. Well attended by a range of very<br />

credible suppliers. It was the ideal opportunity<br />

to broaden my network of expert contacts”<br />

(Allen & Overy LLP)<br />

• “Always a pleasure to attend this event.<br />

Informative, well organised and productive”<br />

(Luton & Dunstable Hospital)<br />

• “This event provides an excellent opportunity<br />

to have meaningful conversations with key<br />

suppliers. The atmosphere is totally relaxed,<br />

with suppliers happy to explore your ‘best fit’<br />

solution with no ‘hard sell’ pressure. A<br />

worthwhile and productive event” (Vodafone)<br />

*To find out more about attending the Total<br />

Security Summit contact Lucia Gulisano on (tel)<br />

01992 374094 or send an e-mail to:<br />

l.gulisano@forumevents.co.uk<br />

**If you’re a supplier to the sector and would<br />

like to take part contact Charlotte Doniger<br />

(01992 374070/c.doniger@forumevents.co.uk)<br />

for details of available packages and costs


Advertisement Feature<br />

The Security IT Summit follows a similar<br />

format to the Total Security Summit, but is<br />

aimed specifically at senior cyber security<br />

professionals. In addition, all of the<br />

networking, learning and business-building<br />

activity happens in one day. It takes place on 2<br />

July at the Hilton London Hotel, Canary Wharf.<br />

As our VIP guest, you’ll be able to meet with<br />

suppliers to the sector based on your specific<br />

cyber security requirements and upcoming<br />

projects. As is the case with the Total Security<br />

Summit, all meetings are pre-arranged. No time<br />

will be wasted and there’s no ‘hard sell’ at all.<br />

Delegates can network with like-minded<br />

peers who share similar day-to-day challenges.<br />

Seminar sessions will be hosted throughout<br />

the day. One of the presentations this time<br />

around is entitled ‘Weaponising Data: The Dark<br />

Nexus of Hacking, Leaking, Journalism and<br />

Information Warfare’. Over the last two<br />

decades, hacking has become a cash-cow for<br />

organised crime operations. This hasn’t gone<br />

unnoticed by rich and powerful forces who’ve<br />

begun to harness hackers’ tactics in order to<br />

fight wars, control financial markets, skew<br />

elections and seize the news agenda.<br />

Without understanding the hackers’<br />

dynamics, we all risk being drawn into a world<br />

created to serve their interests alone.<br />

Journalist Geoff White will examine the<br />

growth of hacking as an organised crime<br />

machine, the emergence of hacktivism as an<br />

information warfare tool, the use of these<br />

tactics in the hacking of the last US Presidential<br />

Election and the nexus of journalists,<br />

whistleblowers, hackers and thieves actively<br />

fostered by Dark Web technology.<br />

Registered delegates<br />

The Security IT Summit is entirely free for you<br />

to attend, with Forum Events providing<br />

luncheon and all refreshments on the day.<br />

You’ll be joining 60-plus senior cyber<br />

security professionals, with the registered<br />

delegate list to date including representatives<br />

from the ABF Soldiers Charity, Ageas<br />

Insurance, Arcadia Group, Artemis Fund<br />

Management, Associated British Foods,<br />

Birketts LLP, the Bloomsbury Institute, the<br />

Department of Work & Pensions, Derwentside<br />

College, Drivetech UK, EDF Energy, Elysium<br />

Healthcare, EPR Architects, ExCeL London,<br />

Fabulous Fan Fayre, the Federation of Royal<br />

Colleges of Physicians of the UK, Girls’ Day<br />

School Trust, Glenny LLP, Heathrow Airport,<br />

Hesley Group, Hireright, Homebase, HS1, HS2,<br />

International Alert, Marshall Motor Group, the<br />

Natural History Museum, the North London<br />

Forensic Service BEH NHS Trust, Pickering<br />

Interfaces, the Royal Mail Group, the RPS<br />

Group, Save the Children International, Sequel,<br />

SNA Europe, St Andrew’s Healthcare, TES<br />

Global, Tesco Mobile, Tesco Underwriting, TGI<br />

Fridays UK, The Salvation Army UK Territory,<br />

Tructyre ATS, Twentieth Century Fox Film Co,<br />

United International Pictures, United Utilities,<br />

Wales & West Utilities and XP Power.<br />

Suppliers attending the Security IT Summit<br />

cover the whole spectrum of cyber security,<br />

including advanced threat dashboards, antivirus,<br />

application control, blockchain, botnets,<br />

browser security, cloud security, data theft/loss,<br />

DDoS protection, encryption, firewalls, gateway<br />

threat analysis, ID/privacy protection, malicious<br />

software removal, malware, mobile security,<br />

network security management, phishing<br />

detection and social media security, etc.<br />

Here’s what some of the delegates at<br />

previous Security IT Summits have had to say<br />

about the event:<br />

• “A great event. Very well organised and an<br />

excellent venue. Well looked after throughout<br />

the day and a good experience. Kudos to the<br />

staff behind the scenes for putting this<br />

together. Attendance thoroughly<br />

recommended” (Global Switch)<br />

• “Well organised event. Great communications<br />

leading up to the day. Would definitely attend<br />

again” (Catalyst Housing)<br />

• “Works very well for all parties. There’s<br />

enough time to cover the basics of the products<br />

without prolonging conversations. Overall, it’s a<br />

fast and intense, but ultimately valuable source<br />

of vendor contact” (Nomura)<br />

*To attend the Security IT Summit, telephone<br />

Emily Gallagher on 01992 374085 or send an e-<br />

mail to: e.gallagher@forumevents.co.uk<br />

**If you’re a supplier to the sector and would<br />

like to take part contact Chris Cannon (01992<br />

374096/c.cannon@forumevents.co.uk) for<br />

details of available packages and costs


x<br />

RISKXtra<br />

Fatal Accidents and Criminal Liability:<br />

Examining the Legal Landscape<br />

Fatal accidents in the<br />

workplace are usually<br />

preventable, which<br />

leads to questions of<br />

responsibility and<br />

criminal liability. Here,<br />

Guy Bastable and Tom<br />

McNeill seek to<br />

explain those<br />

occasions when<br />

organisations and<br />

individuals will be<br />

found criminally liable,<br />

for which offences and<br />

with what sanction<br />

12<br />


Opinion: Fatal Accidents in the Workplace<br />

This is well demonstrated by the<br />

misconceived attempted prosecution of the<br />

Maidstone and Tunbridge Wells NHS Trust, the<br />

largest organisation to date prosecuted for<br />

corporate manslaughter under the Act. A<br />

mother died following a Caesarean section<br />

while under the care of two qualified and<br />

experienced anaesthetists. The Crown alleged<br />

manslaughter against both anaesthetists. Its<br />

case against the Trust, at its highest, was that<br />

there were failings in its system of appointment<br />

and appraisal of the anaesthetists.<br />

In dismissing the case, the Judge found that<br />

any such failings by the Trust – even if proven –<br />

were “nowhere near the sufficient gravity<br />

required to categorise their failure as criminal”.<br />

The Act specifically doesn’t apply to<br />

individuals and expressly states that an<br />

individual cannot be guilty of aiding, abetting,<br />

counselling or procuring corporate<br />

manslaughter. However, although the Act<br />

abolishes the common law offence of gross<br />

negligence manslaughter so far as it applies to<br />

organisations, an individual can still be<br />

prosecuted and imprisoned on conviction for<br />

gross negligence manslaughter, as well as a<br />

number of Health and Safety offences.<br />

Breaches of the Act<br />

Irrespective of the applicability of corporate<br />

manslaughter, fatal accidents ordinarily involve<br />

the potential breach of the Health and Safety at<br />

Work etc Act 1974. Indeed, the Health and<br />

Safety at Work etc Act 1974 places a number of<br />

general duties on employers and others, the<br />

breach of which constitutes a criminal offence.<br />

So far as organisations are concerned, the<br />

most significant duties are those contained in<br />

Sections 2 and 3 of the Health and Safety at<br />

Work etc Act 1974. Broadly speaking, Section 2<br />

sets out the duty on employer organisations to<br />

ensure, so far as is reasonably practicable, the<br />

health, safety and welfare at work of all<br />

employees. Similarly, Section 3 sets out the<br />

duty to ensure – again, so far as is reasonably<br />

practicable – that non-employees are not<br />

exposed to risks to their health or safety arising<br />

from its undertaking.<br />

It’s important to note here that the<br />

employer’s duties are personal and nondelegable,<br />

meaning that employers can<br />

delegate the performance of the duty to others,<br />

whether employees or contractors, but not the<br />

responsibility for its non-performance.<br />

Failing to discharge either of these duties is a<br />

criminal offence of ‘strict liability’ (ie requiring<br />

no mental element such as intention,<br />

knowledge or negligence). In addition,<br />

following the decision of the House of Lords in<br />

R versus Chargot (2008) 2 All ER 1077, a<br />

person’s death is strong evidence that there<br />

was exposure to risk such that the burden of<br />

proof effectively shifts to the defence. The<br />

defendant organisation has to prove that it took<br />

all reasonably practicable steps to ensure the<br />

Health and Safety of the deceased.<br />

The extent of these duties is important to<br />

emphasise. Even if an organisation has devised<br />

a safe system of work, any failure to operate<br />

that system, whether by an employee<br />

(including the deceased) or a contractor, may<br />

place the employer in breach of its duty.<br />

Reasonably practicable steps will include not<br />

only instructing employees on safety<br />

procedures, but also ensuring that they’re<br />

followed, such as by reasonable supervision<br />

and monitoring.<br />

In addition, Section 37 of the Health and<br />

Safety at Work etc Act 1974 creates secondary<br />

liability for senior officers arising out of the<br />

organisation’s conduct. If either of the above<br />

Health and Safety offences is committed by an<br />

organisation with the consent or connivance of<br />

(or is attributable to any neglect on the part of)<br />

a senior officer of the organisation, that person<br />

can also be prosecuted for the offence.<br />

Finally, Section 7 places a duty on employees<br />

to take reasonable care for the Health and<br />

Safety of others who may be affected by their<br />

acts or omissions. Again, by virtue of Section<br />

33, any failure to do so is a criminal offence.<br />

Effective from 1 February 2016, the<br />

Sentencing Council’s definitive guidelines on<br />

Health and Safety Offences, Corporate<br />

Manslaughter and Food Safety and Hygiene<br />

Offences have brought about a sea change in<br />

penalties for corporate manslaughter and<br />

Health and Safety offences with significantly<br />

increased fines.<br />

The guidelines set out a sentencing decision<br />

sequence beginning with an assessment of<br />

culpability and harm and proceed to consider<br />

the financial means of the defendant and other<br />

relevant factors. Significantly, and unlike<br />

previous guidance, it introduces turnoverlinked<br />

sentencing bands for fines. For example,<br />

the bands for large organisations for corporate<br />

manslaughter range from £4.8 million to £20<br />

million. The bands for large organisations that<br />

commit the most serious Health and Safety<br />

offences range from £2.6 million to £10 million.<br />

Guy Bastable: Head of the<br />

Corporate Crime and Regulation<br />

Team at BCL Solicitors LLP<br />

Tom McNeill: Senior Associate<br />

at BCL Solicitors LLP<br />

“Corporate manslaughter, gross negligence manslaughter<br />

and Health and Safety offences are all criminal offences<br />

prosecuted in the criminal courts and which attract<br />

significant penalties”<br />

13<br />

www.riskxtra.com>


WORLD CLASS.<br />

BRITISH MADE.<br />

Chris.E<br />

Chris Elliot has been managing our textiles factory<br />

for 4 years, where all textiles elements are<br />

manufactured for the Evac+Chair.<br />

Textiles Manager - 4 years


x<br />

RISKXtra<br />

BSIA Briefing<br />

What with standards being constantly<br />

updated and the national media often<br />

focusing on very few aspects of what is<br />

demonstrably an important and complex<br />

industry, it’s all-too-easy to overlook the<br />

fundamentals of security and its ultimate goal –<br />

to protect people from harm and their assets<br />

from being damaged or stolen.<br />

When it comes to security systems, smoke<br />

screens can be deemed the ultimate deterrent<br />

because they take away criminals’ ability to<br />

grab and steal. Criminals know that they can<br />

evade CCTV by wearing a baseball cap, for<br />

example, to hide their face. They also know<br />

that shutters and grilles can be broken through<br />

force, but they have no defence whatsoever<br />

against the blinding and disorientating effects<br />

of a smoke screen.<br />

The initial burst of security fog stops<br />

criminals in their tracks, preventing them from<br />

committing a grab-and-go attack. The fog will<br />

hang in the air for around 45 minutes,<br />

protecting the property that’s under attack until<br />

the police or private security staff arrive on<br />

scene. Such smoke screens can be triggered<br />

either automatically or manually.<br />

Non-toxic, non-contaminating and extremely<br />

effective, security fog currently provides<br />

protection where all other forms of<br />

conventional security have failed.<br />

The key takeaway of this particular deterrent<br />

is its non-harmful, but nevertheless striking<br />

impact on the senses – in this case visibility –<br />

that triggers a fight-or-flight response. A<br />

criminal may expect an intruder alarm or CCTV<br />

cameras to confront them, but not necessarily<br />

thick and dense fog.<br />

Preventing an intrusion<br />

Visibility can play a vital role in deterring<br />

criminals in other ways, and especially so if<br />

they’re pre-warned that a given premises is<br />

protected. Simon Banks, founder and Group<br />

managing director at CSL and current chairman<br />

of the BSIA, stated: “One of the two main<br />

deterrents aligned with intruder alarm systems<br />

is the window sticker and the bell or siren on<br />

the commercial property. Research has shown<br />

that the sight of a siren box with a logo on the<br />

exterior of the property will prevent an<br />

intrusion. It’s about credibility, though. If it’s a<br />

respected security company with a good<br />

reputation and credentials such as an<br />

Inspectorate and/or Trade Associationapproved<br />

‘badging’ then this will carry more<br />

clout. Brands associated with DIY alarms will<br />

likely not meet with the same response.”<br />

Tim Raynor, video surveillance product<br />

manager at ADT, suggests that visibility alone<br />

Deterring The Criminals<br />

Recently, a story appeared in the national media about how a<br />

robbery was thwarted due to the in situ security measures<br />

which scared the criminals away. Situations like this make us<br />

reflect on the fundamental roots of security and the reasons<br />

why it exists in the first place. This month we head to the<br />

very heart of security as Carl Gibbard assesses the various<br />

crime deterrents developed by BSIA member companies<br />

will not always deter crime. It depends on the<br />

type of criminal. “The visibility of a security<br />

system is enough to deter an opportunist<br />

criminal, but a career criminal who has planned<br />

ahead probably wouldn’t be put off,” asserted<br />

Raynor. “It’s now a sad fact that most people<br />

ignore a ringing alarm, so it’s the responsibility<br />

of security industry leaders to develop<br />

innovations that help to reduce crime.”<br />

Raynor continued: “When it comes to<br />

monitored systems, these functionalities have<br />

evolved significantly over the last decade. An<br />

audio challenge feature, which enables an<br />

operator to remotely challenge an intruder on a<br />

property, adds an extra protective layer to any<br />

physical security system. In fact, statistics<br />

issued last year by Johnson Controls state that<br />

98.5% of intruders are deterred in this way.”<br />

In addition, Raynor went on to assert:<br />

“Community groups such as Neighbourhood<br />

Watch are still prevalent to this day. As crime<br />

levels around the UK continue to be an issue,<br />

we’re seeing both businesses and consumers<br />

using platforms such as Facebook and<br />

WhatsApp to share information in real-time,<br />

allowing them to quickly take steps to protect<br />

Carl Gibbard:<br />

Chairman of the BSIA’s Export<br />

Council and Chairman of<br />

Concept Smoke Screen<br />

15<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

BSIA Briefing<br />

their property. For its part, the security industry<br />

is now starting to talk about the use of Artificial<br />

Intelligence as the solution for improving<br />

security and reducing false alarms. As this<br />

technology develops, there could be significant<br />

improvements in terms of operatives only<br />

needing to respond to genuine alarm<br />

activations, making these systems even more of<br />

a deterrent and helping to reduce crime.”<br />

What about larger venues?<br />

How do the management teams for larger<br />

venues and open spaces deter crime? James<br />

Walker, managing director of Dallmeier UK, has<br />

mentioned the use of a sophisticated<br />

surveillance system for larger venues and<br />

stadiums to ensure the safety of fans at all<br />

times. Unchecked crowds or brawls between<br />

spectators seem to be the most feared<br />

scenarios for on-duty security personnel.<br />

“With today’s multifocal sensor systems, a<br />

huge area can be monitored from a single<br />

location extremely efficiently,” observed<br />

Walker. “The most impressive aspect of these<br />

systems is that they combine the overall view<br />

with simultaneous top detail resolution. Even<br />

more distant objects are displayed with the<br />

same resolution as objects in the foreground of<br />

the picture.”<br />

Walker went on to add: “Further, these<br />

systems solve the well-known problem with<br />

PTZ cameras whereby the operator has to<br />

choose between an overview image and a<br />

detailed view. It doesn’t matter which section<br />

of a surveillance area an operator focuses on at<br />

any time as the system always records the<br />

entire scene. Therefore, it’s possible to<br />

reconstruct any event for later use as evidence<br />

in court, regardless of where that occurrence<br />

took place, and to recognise all individuals<br />

involved thanks to frame-by-frame playback.”<br />

Gideon Reichental (commercial sales<br />

manager at Clearway Services, the specialist in<br />

site security, and current chairman of the<br />

Vacant Property Section of the BSIA) explained:<br />

“Open spaces such as construction sites, car<br />

parks, sports grounds or leisure areas are a real<br />

temptation for criminal or anti-social behaviour.<br />

Statistics show that at least one-in-five building<br />

sites are hit as frequently as once every week,<br />

and possibly even more than that as minor<br />

incidents are often not reported.”<br />

However, Reichental is swift to point out that<br />

it isn’t difficult to secure such locations.<br />

“Where appropriate, proper secure fencing is a<br />

‘must’. Temporary concrete blocks can be<br />

installed at site access points if it’s a vacant<br />

property. This will prevent unauthorised ingress<br />

and theft or fly-tipping, which is now a major<br />

menace. A wireless alarm system can be fitted<br />

to the fencing and advanced temporary CCTV<br />

camera towers located at key points.”<br />

Running off mains or solar power and<br />

engineered to remain outside in all conditions,<br />

CCTV camera towers communicate via the<br />

mobile network. These installations are the end<br />

user’s remote eyes, surveying an entire site<br />

thanks to movement-activated HD cameras.<br />

When triggered, they issue voice warnings to<br />

trespassers so they know they’ve been spotted<br />

if they’ve managed to break in or are simply<br />

causing mischief. They’re a great deterrent.<br />

Activation and live video can be beamed back<br />

to an Alarm Receiving Centre whose trained<br />

operators will, in turn, raise an alarm, send a<br />

security guarding patrol and/or contact the<br />

police to apprehend the intruders if the audio<br />

warnings should be ignored.<br />

In the real world<br />

A final scenario relating to this subject involves<br />

a real-life Case Study. One of the fastestgrowing<br />

districts in the upper Midwest of the<br />

United States, Harrisburg in South Dakota is<br />

home to an educational system that serves<br />

almost 4,000 students across eight schools.<br />

Gallagher Security was selected to meet the<br />

district’s security requirements and, in October<br />

2015, those security measures were put to the<br />

test when the local High School became the<br />

target of a shooting incident.<br />

Although one staff member was injured in the<br />

episode, it was prevented from escalating<br />

further due to Gallagher’s lockdown procedure<br />

being activated by members of staff. From the<br />

time the emergency button was pressed, it took<br />

just four seconds for Command Centre to lock<br />

all outside doors, notify the district authorities<br />

and limit building access to emergency<br />

responders only. “Command Centre was directly<br />

involved with placing physical barriers between<br />

an active gunman and hundreds of High School<br />

students,” explained James Straatmeyer, CEO of<br />

Integrated Technology & Security.<br />

“The security industry is now starting to talk about the use of AI as the<br />

solution for improving security and reducing false alarms. As this<br />

technology develops, there could be significant improvements in terms<br />

of operatives only needing to respond to genuine alarm activations”<br />

16<br />


Video – analyse that!<br />

Facit Data Systems is a leading data and video analytics specialist. Facit’s development<br />

team has created a suite of products that help organisations to monitor, count, analyse<br />

and manage customers, visitors and staff in high footfall locations.<br />

Install Facit Analytics over your current CCTV system. Make more of your analytics in<br />

retail, banking, transport, healthcare and the public sector<br />

PeopleCounter QueueManager HeatMap<br />

Capture intelligence for efficiency savings,<br />

competitive advantage and risk management.<br />

Call or book a demo info@facitdatasystems.com<br />

Or visit us at IfSec Stand IF1310, 18-20 June<br />

OBSERVE I ANALYSE I ACT<br />

t: +44 (0)3700 424217 w: facitdatasystems.com


x<br />

RISKXtra<br />

The Centre of Attention<br />

In today’s high-risk<br />

and high-threat<br />

environment, there’s a<br />

very real and<br />

immediate need for a<br />

converged security<br />

approach that unifies<br />

the monitoring of both<br />

physical and cyber<br />

security events<br />

through a single<br />

platform. Here, James<br />

Willison and Sarb<br />

Sembhi outline in<br />

detail what’s in store<br />

for visitors to the<br />

Converged Security<br />

Centre at IFSEC<br />

International 2019<br />

While some organisations choose to<br />

develop Security Control Rooms focused<br />

specifically on physical security and<br />

Network Operations Centres targeting cyber<br />

security, others are building Converged<br />

Security Centres orchestrated to provide a<br />

unified approach towards all security risks, in<br />

turn giving operators the ability to identify<br />

cyber-physical attacks on Internet of Things<br />

(IoT) systems and devices in near real-time.<br />

These Converged Security Centres use a<br />

single platform to bring many systems together<br />

such that the security team can prioritise<br />

critical risks quickly and respond appropriately.<br />

Teams can communicate more effectively as<br />

they share the same technologies and<br />

determine how the risk is managed. This might<br />

mean investigating an identified threat on<br />

social media that has a direct impact on the<br />

safety of a building’s systems or preventing<br />

fraud through robust physical-logical access<br />

control and the automated lock-out of an<br />

account attacked by anomalous behaviour.<br />

For the last decade, we’ve actively promoted<br />

cross-functional teaming and collaboration<br />

between the physical and cyber security<br />

arenas. In June 2017, Gerry Dunphy (strategy<br />

director for security and fire at IFSEC<br />

International) shared with us his vision for a<br />

new feature at the annual London show. We<br />

were delighted to note that his own thoughts<br />

were very much in tune with what we had been<br />

recommending to organisations.<br />

What we agreed should fill the gap other<br />

shows didn’t appear to be bridging was to<br />

make IFSEC International even more visual and<br />

a far more immersive experience such that<br />

visitors could see something like a cyber attack<br />

on a CCTV system actually taking place. We<br />

knew that a few leading organisations and<br />

Governments had the capability to do just that,<br />

but it wasn’t/isn’t something familiar to most.<br />

We were then subsequently delighted to gain<br />

the interest of Vidsys. In the last couple of<br />

years, the company has formed partnerships<br />

with Micro Focus and others which enable the<br />

business to provide a converged technological<br />

response to the cyber and physical incidents<br />

confronting today’s security teams. Indeed,<br />

we’ve been working closely with Vidsys and the<br />

team at UBM since last September to develop<br />

the newly expanded Converged Security Centre<br />

as you will see it at ExCeL this month.<br />

From comprehensive event security<br />

management through to converged cyber<br />

security solutions and on again to advanced<br />

critical infrastructure protection, the Converged<br />

Security Centre (located at Stand IF820) will<br />

have something for everyone. Visitors will bear<br />

witness to much converged technology using<br />

Artificial Intelligence (AI) and the latest cyber<br />

security solutions.<br />

In addition, leading physical and cyber<br />

security professionals will give their<br />

independent analyses such that security and<br />

risk specialists in attendance will have an idea<br />

of what a Converged Security Centre might look<br />

like in practice and can then fully understand<br />

how to protect their host organisation from<br />

complex attacks going forward.<br />

Converged education<br />

On each day of IFSEC International 2019 we will<br />

chair sessions on three different topics, with<br />

each of those sessions lasting around 45<br />

minutes. We’ll introduce the concept of<br />

converged security as well as the teams from<br />

Vidsys, Micro Focus and Axis Communications.<br />

From Vidsys, we’ll be welcoming Phil<br />

Stockham (vice-president of operations for<br />

EMEA) and Kris Heath (global solutions<br />

architect for product management). Micro<br />

Focus is to be represented by David Humphrey<br />

(CTO responsible for rich media). The Axis<br />

Communications team comprises Daren Lang<br />

(regional manager for business development<br />

across Northern Europe), Steven Kenny<br />

(industry liaison for architecture and<br />

18<br />


Converged Security Centre at IFSEC International 2019<br />

engineering) and John Allen (business<br />

development manager for access control, again<br />

across Northern Europe).<br />

These professionals will present a variety of<br />

scenarios on two 75-inch screens and show<br />

how combined security technologies identify<br />

incidents and automate a fast response. By<br />

leveraging disparate sources of data,<br />

organisations can manage a situation in realtime<br />

without having to go to multiple individual<br />

sub-systems in order to ‘get the job done’.<br />

There will be much informed discussion<br />

around the concept, reality and evolution of<br />

having both physical and cyber security teams<br />

managing and collaborating in the same<br />

Security Operations Centre, with Micro Focus’<br />

IDOL providing the AI capability to make sense<br />

of all the volumes of data.<br />

The technological advancements in<br />

Converged Security and Information<br />

Management (CSIM) mean that Vidsys readily<br />

connects an organisation’s vital security<br />

systems, such as IT security information and<br />

event management (SIEM), video surveillance<br />

and management systems, security analysis,<br />

investigative tools and reporting platforms, in<br />

turn allowing operators to base their decisions<br />

on an holistic view of the entire ecosystem. The<br />

software alerts operators of potential security<br />

risks to the host company’s IT infrastructure,<br />

buildings, assets and/or employees.<br />

Together, Vidsys and Micro Focus’ IDOL<br />

enable the real-time processing of data (eg<br />

video, images, audio, text, logs and<br />

transactions) that’s diverse in format and in<br />

origin (eg CCTV corporate databases, e-mail,<br />

sensors, social media and broadcast media), as<br />

well as automated analysis to identify issues or<br />

potential threats, streamlined workflow for<br />

alerts and responses and, last but by no means<br />

least, open standards connectivity to third<br />

party systems for easy integration.<br />

Smarter and safer<br />

Axis Communications will demonstrate how<br />

cyber secure CCTV solutions can integrate with<br />

the Vidsys platform such that physical and IoT<br />

systems are protected.<br />

The company stated: “We’re pleased to be<br />

participating in the Converged Security Centre.<br />

As the premier event for the physical security<br />

industry, it’s vital that IFSEC educates its<br />

visitors on the threat posed by cyber security<br />

and the urgent requirement for physical<br />

security and information security to converge.<br />

The issues surrounding converged security are<br />

critical in terms of helping to ensure that the<br />

security industry works together to offer the<br />

smartest and safest future possible.”<br />

“What’s so good to see is the collaboration across the cyber<br />

and physical security space that can be enabled by the<br />

technologies on display at IFSEC International”<br />

Our fourth partner, Ipsotek, specialises in<br />

scenario-based video analytics. Its patented<br />

approach allows multiple behaviour<br />

descriptions to be applied simultaneously or in<br />

predefined sequences. Indeed, it’s these<br />

scenario combinations that create an exact<br />

description of the target behaviour, thereby<br />

affording dependable real alerts and<br />

dramatically reduced false alarms.<br />

In addition, Salam Technology will join us to<br />

share its in-depth insights into how all of these<br />

systems can integrate within myriad host<br />

organisations’ own business environments.<br />

What’s so good to see is the collaboration<br />

across the cyber and physical security space<br />

that can be enabled by the technologies on<br />

display at IFSEC International. We’ll ask all of<br />

the invited guest speakers to comment on what<br />

has been shown and conclude each session<br />

with all-important Q&A time involving the<br />

audience. The Converged Security Centre has<br />

space for around 50 attendees. We hope some<br />

passers-by will stop and listen in, too.<br />

Interested parties are advised to arrive early as<br />

there has been a great deal of interest in the<br />

Centre on social media, with thousands of<br />

views of our Twitter posts.<br />

Guest speakers include Professor Martin Gill<br />

CSyP FSyI (director of Perpetuity Research and<br />

Consultancy International), Alan Jenkins (head<br />

of advisory services at 2|SEC Consulting) and<br />

David Clark (CSO and head of logistics at The<br />

Francis Crick Institute and also chair of ASIS<br />

International’s UK Chapter 208), all of whom<br />

will provide highly knowledgeable and practical<br />

responses to security convergence based on<br />

their own research and experiences.<br />

The first session on Tuesday 18 June focuses<br />

on how Converged Security Centres respond in<br />

real-time to physical and online threats.<br />

One of the scenarios to be presented focuses<br />

on a large sporting event. Tweets start pouring<br />

in about an upcoming protest at a stadium<br />

aimed at disrupting the event at a certain time.<br />

Some protestors threaten to march inside and<br />

attempt to halt the game. All Tweets are from<br />

anonymous sources whose identities cannot be<br />

confirmed. Vidsys’ CSIM automatically allows<br />

security officers to view live video feeds from<br />

stationary cameras, drones and the incoming<br />

Tweets all under one common operating<br />

picture, monitor the situation and respond<br />

swiftly to any developing scenarios.<br />

James Willison BA MA MSyI:<br />

Founder of Unified Security<br />

Sarb Sembhi CISM:<br />

CISO at Virtually Informed<br />

19<br />

www.riskxtra.com>


D E S I G N I M A N U F A C T U R E I I N S T A L L<br />

PERIMETER SECURITY<br />

SOLUTIONS<br />

OUR PASSION<br />

IS YOUR SECURITY<br />

High security perimeter and<br />

access solutions, including fence<br />

and gate systems, designed and<br />

built in the UK to answer the needs<br />

of your project, from security<br />

rating of LPS 1175 SR1 to SR5.<br />

Call 0800 408 47 49 or visit<br />

www.jacksons-fencing.co.uk/security


FIRE SAFETY<br />

Management & Installation<br />

Fire Protection and Prevention<br />

with Technology and Innovation<br />

Special Supplement in association with:


FIRE SAFETY<br />

Andrew Speake: National<br />

Technical Manager at Aico, a Fire<br />

Industry Association member<br />

company. Andrew works closely<br />

with a number of leading industry<br />

organisations and assists with<br />

R&D on new products<br />

Improved Protection<br />

and Clarification<br />

Andrew Speake examines the<br />

revised British Standard focused<br />

on domestic fire alarms<br />

BS 5839-6 is the Code of Practice for the<br />

design, installation, commissioning and<br />

maintenance of fire detection and fire<br />

alarm systems in domestic premises. When it<br />

was first introduced back in 1995, BS 5839-6<br />

changed everything. Whether you were a<br />

landlord, a specifier or an installer, here at last<br />

was a clear and detailed set of standards to be<br />

observed. The contents of BS 5839-6 were<br />

quickly adopted and have been standard<br />

practice since then in both existing dwellings<br />

and new builds. The Building Regulations and<br />

other guidance documents reference this British<br />

Standard, so its importance cannot be over<br />

emphasised.<br />

BS 5839-6 was revised in 2004 and then<br />

again in 2013, both times taking into<br />

consideration technological developments and<br />

addressing Best Practice accordingly. Its been<br />

around a decade between each set of revisions<br />

so why, just six years since the last set of<br />

revisions, was a new version released this year<br />

on Tuesday 30 April?<br />

The answer isn’t to be found in new<br />

technology, but rather in the will of<br />

professionals in housing, fire and safety to<br />

improve the level of fire protection in domestic<br />

dwellings, which ultimately provides residents<br />

with a greater chance of escape unharmed from<br />

a fire in their home.<br />

While there have been a number of minor<br />

revisions within BS 5839-6:2019, plus multiple<br />

definitions that have been updated throughout,<br />

the biggest changes by far apply to the grades<br />

of alarms and the type/level of protection for<br />

each identified dwelling. The ‘Grade’ determines<br />

the type of alarm to be used and the ‘Category’<br />

the level of protection required.<br />

Changes to Fire Alarm Grades<br />

Under BS 5839-6, fire alarms are classified into<br />

grades from A to F. Grades B and E have been<br />

removed in 2019, with Grade D being the common<br />

for domestic properties that will form the focus of<br />

this particular discourse.<br />

Under the previous standard, Grade D required<br />

one or more interlinked mains powered smoke<br />

alarms (and heat alarms if required), each with an<br />

integral back-up supply, with the back-up supply to<br />

be delivered in the form of a rechargeable lithium<br />

or alkaline battery.<br />

Under the revised BS 5839-6, Grade D has been<br />

replaced with Grades D1 and D2 which differ in<br />

terms of the back-up power supply:<br />

• Grade D1 calls for a tamper-proof standby supply<br />

consisting of a battery or batteries, with lithium<br />

being the standard battery type. These are long-life<br />

battery cells lasting the recommended lifespan of<br />

the alarm and are designed such that they cannot<br />

easily be removed by the user. Grade D1 alarms are<br />

the preferred option for social housing as they<br />

remove the risk factor<br />

• Grade D2, on the other hand, requires an integral<br />

standby supply consisting of a battery or batteries<br />

(usually 9 V PP3) which need to be replaced at<br />

regular intervals by the end user throughout the<br />

life of the alarm by<br />

Changes to these grades provide greater clarity<br />

for alarm specifiers and installers, which is very<br />

much to be welcomed.<br />

While Grade D alarms feature most heavily in<br />

BS 5839-6:2019, Grade F systems also warrant<br />

mention here due to changes in Scottish legislation<br />

earlier this year which permits their use. Grade F<br />

systems use only battery-powered alarms. As with<br />

Grade D, Grade F has now been divided into F1 and<br />

F2 in the same fashion as that noted above.<br />

Minimum levels of protection<br />

Under BS 5839-6, different classes of premises<br />

are identified and the minimum grade of fire<br />

alarm system and category of fire protection<br />

provided for that specific type of property are<br />

22<br />

www.riskxtra.com


listed. It’s here, in the 2019 revisions, that we’ve<br />

seen the biggest changes that will have a major<br />

impact on what type of fire alarms are fitted and<br />

where. In the main, this is due to an increase in<br />

the category of fire protection from LD3 where<br />

previously listed, which requires one mainspowered<br />

optical alarm in the hallway and<br />

another upstairs on the landing, interconnected<br />

together, to Category LD2. LD2 involves<br />

additional alarm coverage, with a heat alarm in<br />

the kitchen and a further smoke alarm in the<br />

main living area, once again all interconnected.<br />

This upgrade in fire protection is most<br />

notable in existing rental properties and Houses<br />

in Multiple Occupation (HMOs):<br />

• Existing two and three-storey maisonettes<br />

and houses in the rental sector have now been<br />

upgraded from the low category of fire<br />

protection (LD3) to the medium category LD2<br />

and graded D1 (ie mains-powered alarm with<br />

tamper-proof battery back-up power). New build<br />

properties of this nature remain LD3 (unless a<br />

risk assessment indicates otherwise)<br />

• Existing HMOs have been set as the category<br />

of LD2 whereas before it was a mixture of LD2<br />

and LD3 depending on the nature of the property<br />

and inhabitants. Grade D1 is now the requirement<br />

Other property types that have made an<br />

appearance in the BS 5839-6 property<br />

classification are supported housing and shortterm<br />

holiday lets. Both are allocated the highest<br />

category of protection (ie Grade D1, LD1).<br />

Other changes of note<br />

Weekly alarm testing was previously<br />

recommended in BS 5839-6, but this has now<br />

been changed to monthly (apart from Grade A<br />

“BS 5839-6:2019 is a Code of Practice for fire detection and<br />

fire alarm systems in domestic premises, not a set of legal<br />

requirements. There’s no penalty if an organisation or<br />

individual chooses to ignore it and no date for ‘compliance’”<br />

systems). Although weekly testing of alarms<br />

remains ideal, it’s not a realistic expectation,<br />

whereas monthly is far more manageable and<br />

therefore likely. The important message to note<br />

here is that end users should continue to test<br />

their alarms at regular intervals.<br />

Recommendations contained within the NFCC<br />

Specialised Housing Guide regarding all fire<br />

detection, alarm and transmission/signalling to<br />

an Alarm Receiving Centre has been<br />

incorporated into BS 5839-6:2019, which is<br />

useful and recognises that valuable document.<br />

Carbon Monoxide alarms have been<br />

acknowledged for the first time in BS 5839-6<br />

2019 as they’re increasingly been installed<br />

alongside fire alarm systems or incorporated<br />

within them. BS 5839-6 states that mainspowered<br />

Carbon Monoxide alarms conforming<br />

to BS EN 50291 and installed in compliance with<br />

BS EN 50292 may also be interlinked with the<br />

fire detection and alarm system if the<br />

manufacturer of all the components makes such<br />

a recommendation.<br />

Implications for the future<br />

BS 5839-6:2019 is a Code of Practice for fire<br />

detection and fire alarm systems in domestic<br />

premises, not a set of legal requirements.<br />

There’s no penalty if an organisation or<br />

individual chooses to ignore it and no date for<br />

About the Fire Industry Association<br />

The Fire Industry Association (FIA) is a not-for-profit<br />

organisation. We’re the leading Trade Association for the fire<br />

industry in the UK. The education and training that we offer<br />

through our qualifications and industry-recognised courses<br />

exists to provide you with a high level of knowledge and<br />

understanding that will help in terms of developing your career<br />

and building your business.<br />

Our courses are delivered by experienced professionals from the industry who can not only<br />

deliver the courses, but also answer questions and provide real-life examples, in turn enabling<br />

all delegates to deliver excellent results for their organisations.<br />

Combined with our website (fia.uk.com), we aim to provide a service that contributes towards<br />

and promotes technical developments in the industry. Standards are constantly being revised<br />

and updated and it’s vital to stay up-to-date with the changes. By taking our qualifications and<br />

courses and using our extensive Resource Library on the website, you can be sure that you’ll be<br />

well informed of any recent changes as and when they happen.<br />

Our range of professional qualifications and training programmes – along with our extensive<br />

membership benefits – are all designed to support learners and their organisations to grow,<br />

develop technical knowledge and increase their professional networks.<br />

www.riskxtra.com<br />

23


FIRE SAFETY<br />

“We’ve lived by BS 5839-6 for almost a quarter of a century<br />

now and the standard has served us well. There’s no doubt<br />

that it has helped to save lives. BS 5839-6:2019 builds on the<br />

success of the original document”<br />

‘compliance’. However, the standard is<br />

considered Best Practice and those who choose<br />

to ignore it do so at their own risk. Certainly,<br />

social housing organisations place great<br />

emphasis on it and complying with it is<br />

regarded as being essential.<br />

Many RSLs have been moving towards LD2<br />

systems over the past year in the anticipation of<br />

the revisions and we’re now witnessing a large<br />

number rewriting their alarm specifications<br />

accordingly and planning upgrade programmes<br />

as part of their overall process.<br />

With the 2019 revisions, we’ve benefited<br />

from greater clarity and, in a number of cases,<br />

an increase in the level of fire protection. Of<br />

course, with this comes a need for additional<br />

alarms per property which has an associated<br />

cost, not just in alarm units, but also in terms of<br />

installation. Some of this cost can be mitigated<br />

by using wireless alarm interconnection<br />

technology and by employing alarms that have<br />

been designed to be quick and easy to install.<br />

Control and maintenance<br />

With larger fire alarm systems come issues over<br />

control and maintenance as more alarms will<br />

need to be tested. It’s important to be able to<br />

locate the precise alarm which originally<br />

triggered. In these cases, an alarm controller<br />

should be considered (especially important if a<br />

Carbon Monoxide alarm is included in the<br />

system). These wall-mounted devices feature<br />

test, silence and locate features, subsequently<br />

adding an extremely valuable extra measure of<br />

controllability to an LD2 system.<br />

We’ve lived by BS 5839-6 for almost a quarter<br />

of a century now and there’s no doubt that the<br />

standard has served us well. There’s also no<br />

doubt that it has helped to save lives. BS 5839-<br />

6:2019 builds on the success of the original<br />

document and, if adhered to in the correct<br />

manner, should always ensure greater safety and<br />

even better practice across the industry.<br />

www.fia.uk.com


Gas Suppression<br />

Voice Evacuation<br />

UPGRADING<br />

TO VOICE<br />

UPGRADING TO VOICE<br />

is simple with the Fire-Cryer® Solo<br />

Come and find us<br />

at FIREX on stand FX940<br />

It’s a bold new approach for<br />

evacuation and<br />

alarms products.<br />

FAIR AND<br />

SQUARE<br />

Voice enhanced alarm sounders are proven to<br />

improve response rates in evacuation times. The<br />

Fire-Cryer solo delivers excellent intelligibility with<br />

a clear, unambiguous message.<br />

Manufactured in the UK by Vimpex<br />

Single message 24v voice sounder<br />

Ideal for alarm upgrades or new installs<br />

Use with any conventional sounder/notification<br />

alarm circuit<br />

Fully synchronised<br />

Optional integrated VID strobe<br />

The exciting new range of Identifire<br />

products provides over 50 variations of<br />

beautifully designed fire evacuation and<br />

alarm accessories.<br />

EN 54-3<br />

MADE IN<br />

THE UK<br />

Manufactured in the UK by Vimpex<br />

Surface or flush mountings across range<br />

EN 54 & CPR compliant<br />

PAD printing for own-labelling<br />

Customised OEM solutions<br />

“Fire emergency. Please remain<br />

calm and evacuate the building<br />

immediately”


FIRE SAFETY<br />

Pulse Alert Visual<br />

Alarm Devices (VADs)<br />

from Klaxon lower<br />

installation costs,<br />

making the latest fire<br />

evacuation<br />

technology affordable<br />

without compromising<br />

on system<br />

performance<br />

Klaxon achieves<br />

ISO 9001:2015<br />

ahead of deadline<br />

To ensure thet the business<br />

adheres to the high standards<br />

its customers and partners<br />

have come to expect, Klaxon<br />

Signals transitioned to the<br />

new ISO 9001:2015 standard<br />

ahead of the deadline of<br />

Friday 15 March 2019.<br />

The new standard focuses<br />

on quality management,<br />

ensuring that customers<br />

receive consistently good<br />

quality products, while at the<br />

same time suppliers are<br />

always strongly customerfocused.<br />

It reflects the new<br />

and different challenges that<br />

businesses now face.<br />

Klaxon Signals is the fire<br />

safety brand of Texecom,<br />

which has itself been ISOaccredited<br />

with the BSI since<br />

1996.<br />

To view the certificate<br />

access the QR code here:<br />

Pulse Alert Technology<br />

Fire alarm systems should be able to assist in<br />

evacuating everyone from a given building.<br />

Relying on audible fire alarm notification<br />

alone, however, disadvantages those with<br />

hearing impairments or individuals working or<br />

living in a sound-reducing environment. Even<br />

something as simple as wearing a pair of<br />

headphones could prevent someone from hearing<br />

an audible fire evacuation warning. To<br />

successfully evacuate everyone from a building,<br />

fire alarms should signal effectively using light as<br />

well as sound.<br />

Klaxon Signals’ Pulse Alert Technology is a<br />

beacon warning system which produces a light<br />

output that can protect most rooms with just a<br />

single device. Using new LED lighting technology<br />

derived from automotive applications, it<br />

disperses light evenly and efficiently, in turn<br />

maximising its effectiveness. Its patented<br />

electronic design also maximises electrical<br />

efficiency and reduces current<br />

consumption, minimising the cost<br />

of ownership and allowing more<br />

devices to be installed on a<br />

single alarm system.<br />

Pulse Alert Technology<br />

provides all the benefits that<br />

an EN54-23-compliant<br />

system can bring, while<br />

answering all of the design<br />

challenges in doing so. This<br />

means a greater coverage area<br />

with lower current consumption in<br />

tandem with greater flexibility for system<br />

designers. There’s also the benefit of reduced<br />

cost of ownership for end users with no<br />

compromise on evacuation notification<br />

performance.<br />

Pulse Alert: how it works<br />

Pulse Alert is able to provide EN54-23-compliant<br />

visual alarm signalling without any increase in<br />

power consumption because of three essential<br />

technological breakthroughs:<br />

• Intelligent Power Management Pulse Alert<br />

converts power intelligently, minimising power<br />

usage and presenting a near-perfect current<br />

source to fire alarm panels. This means the Sonos<br />

Pulse and Nexus Pulse VADs require less power<br />

than previous models, while also exceeding<br />

EN54-23 light output requirements<br />

• LED Drive Pulse Alert features the latest highpower<br />

LED technology and advanced LED Drive<br />

circuitry, further improving efficiency, light output<br />

performance and long-term device reliability.<br />

Sonos Pulse and Nexus Pulse LED circuits are<br />

both designed to provide over five years of<br />

continual operation without any degradation of<br />

light output<br />

• Lens Technology The optics for both ceilingmount<br />

and wall-mount versions are optimised to<br />

produce an even light dispersion over the covered<br />

area. This minimises ‘hot spots’ and ensures that<br />

all of the available light is contributing towards<br />

alerting people of any active fire emergency<br />

Extent of coverage<br />

The simpler an evacuation system is, the more<br />

effective it’s likely to be. Sonos Pulse and Nexus<br />

Pulse fulfil evacuation requirements with just a<br />

single device for most rooms. Ceiling-mounted<br />

devices are rated at 15 metre-diameter coverage,<br />

while wall-mounted devices can cover an 11.5 x<br />

11.5 metre square room. System design<br />

requirements are therefore made easier,<br />

evacuation messages are<br />

clearer and more people<br />

are protected than ever<br />

before.<br />

Energy efficiency<br />

Pulse Alert technology<br />

ensures that Klaxon<br />

Signals’ VADs notify all<br />

personnel of a fire<br />

emergency, while also<br />

reducing the power consumption<br />

of each device.<br />

Ultimately, this means that systems can be<br />

upgraded without imposing any restrictions on<br />

the number of devices used or otherwise<br />

compromising system performance in any way.<br />

Low power consumption is vital to fire system<br />

designers and installers – Sonos Pulse and Nexus<br />

Pulse ensure that all buildings can provide the<br />

very best standards of fire evacuation.<br />

Low installation costs<br />

Pulse Alert VADs lower installation costs, making<br />

the latest fire evacuation technology affordable.<br />

A wider coverage area per device reduces both<br />

the number of devices needed and expensive<br />

cabling requirements, while low current<br />

consumption removes the need for additional<br />

power supplies.<br />

With a greater coverage pattern, fewer devices<br />

are required to cover open areas. Sonos Pulse<br />

ceiling-mount units have a 15-metre coverage<br />

diameter capable of covering a 10 x 10-metre<br />

room with a single device.<br />

26<br />

www.riskxtra.com


Marine<br />

www.hochikieurope.com<br />

18 - 20<br />

June 2019<br />

ExCeL London UK<br />

Find us<br />

in the South Hall<br />

on stand #FX840


FIRE SAFETY<br />

Roland Martin-Bessey<br />

(operations director at<br />

Hochiki Europe) looks<br />

at the global<br />

component shortage<br />

and what this means<br />

for manufacturers<br />

and installers alike<br />

To find out more about<br />

Hochiki Europe visit<br />

www.hochikieurope.com<br />

Downsizing Technology to Mitigate<br />

Bigger Security Risks<br />

The key issue affecting all industries today is<br />

a simple, but important one. Over the last<br />

decade, there has been a huge rise in<br />

demand for micro electrical components.<br />

Manufacturers are having to find new ways in<br />

which to build devices without increasing unit<br />

size so the producers of electronic components<br />

are meeting demand by downsizing everything<br />

they create.<br />

Much of the technology we use today<br />

incorporates similar components all fitted to a<br />

printed circuit board (PCB) which determines<br />

the function of the product. To correctly fit each<br />

component and keep production moving,<br />

manufacturing lines need to be equipped with<br />

the right machinery.<br />

As the miniaturisation of mainstream<br />

technology continues, manufacturers in all<br />

industries must follow suit. This is especially<br />

true in the life safety sector. Life safety<br />

solutions are not as space-hungry as products<br />

like mobile phones. This means there’s no great<br />

need for them to become smaller. However,<br />

when these new, smaller components are<br />

manufactured, the predecessors are usually<br />

phased out, leaving a shortage for the rest of<br />

the industry. It’s a process known as component<br />

obsolescence.<br />

To keep production going in the face of this,<br />

life safety manufacturers need to adopt a<br />

strategy that’s built with the future in mind.<br />

That must be a key focus for any R&D team.<br />

Regardless of sector, R&D divisions should<br />

understand how technology might change, or is<br />

changing, and how their business may need to<br />

adapt to suit.<br />

Manufacturing for the Future<br />

There are a number of relatively straightforward measures manufacturers can<br />

take to combat the risks posed by the component shortage. We’ve recently<br />

invested hundreds of thousands of pounds in our production capabilities and<br />

equipment to ensure we can handle the smallest of components. By being aware<br />

that such an investment will be required for long-term success, we can plan our<br />

operations more effectively, factoring-in any costs as part of business planning.<br />

We must always be looking for new ways in which to increase productivity,<br />

outputs and everything in-between despite challenges like the global<br />

component shortage. Being ahead of the curve is key and, by maintaining close<br />

relationships with suppliers and customers and investing in capabilities, our<br />

industry will be able to continue to operate efficiently now and into the future.<br />

At Hochiki, we use various software tools to<br />

ensure our R&D teams can track such changes<br />

and use the data to develop plans that will<br />

ensure the business can continue to operate.<br />

Manufacturers will have a quota of the<br />

number of products they need to be able to<br />

produce to keep up with customer demand and<br />

maintain a suitable level of stock, meaning<br />

there should never be a product shortage.<br />

Meeting this quota requires a certain number of<br />

components. If these are not available then<br />

manufacturing processes can be very quickly<br />

thrown out of sync, causing issues for the<br />

manufacturer, customers and end users alike.<br />

To address this risk, we need to be forwardthinking<br />

and more collaborative. This is why we<br />

work closely with suppliers to ensure they’re at<br />

the top of the list for product deliveries.<br />

Simultaneously, we’re also planning well in<br />

advance to ensure that our component stock is<br />

continually maintained. We’re ensuring we have<br />

enough components to maintain a steady and<br />

constant stream of production.<br />

As with any product, an increase in demand<br />

drives costs upwards. When the cost of<br />

individual components rises, so too does the<br />

cost of the final product. Manufacturers then<br />

have to make a difficult decision – how much of<br />

the cost do they pass on to their customers and<br />

how do they communicate the increase?<br />

Essentially, there’s no right or wrong way to<br />

do this. It very much depends on the<br />

manufacturer. One thing that’s constant,<br />

however, is the need for excellent relationships<br />

and stakeholder management processes.<br />

Another reason why manufacturers must<br />

manage the risks of the global component<br />

shortage effectively is the installer. If a company<br />

is unable to produce solutions, installers could<br />

find themselves without the products they need<br />

to fulfil a project. Being in such a position could<br />

mean that installers then have to turn down<br />

work, which is bad from a reputation and<br />

business perspective. There’s also the risk that<br />

customers could re-specify projects to<br />

incorporate less advanced systems. It’s<br />

essential, then, to manage, mitigate and<br />

communicate risk throughout the supply chain.<br />

28<br />

www.riskxtra.com


Evacuate everyone<br />

EN54-23 Approved Fire Beacons<br />

Sonos Pulse and Nexus Pulse devices contain Pulse Alert Technology,<br />

Klaxon’s EN54-23 compliant visual notification for wall and ceiling<br />

mount devices. Pulse Alert Technology provides visual notifications that<br />

are unmissable and unmistakable, ensuring that everyone is notified of<br />

a fire evacuation emergency.<br />

Seminars<br />

Klaxon currently run a certified EN54-23 CPD seminar for Consultants, Integrators and End Users.<br />

Please contact us now to book a ‘lunch and learn’ EN54-23 CPD Seminar.<br />

Phone +44 (0)1706 212524 or visit www.klaxonsignals.com/fire<br />

EN54-3 Sonders & Beacons<br />

Nexus 105/110/120 Sounders<br />

High output sounders certified to EN54-3.<br />

Sonos Sounder Beacon<br />

Electronic sounder beacon certified to EN54-3.<br />

VISIT US: STAND FX415


FIRE SAFETY<br />

Voice is Choice for Emergency Response<br />

www.vimpex.co.uk<br />

In modern buildings there may be literally<br />

dozens of different types of audible warning<br />

specified (fire alarm systems, emergency exit<br />

alarms, lifts/elevators, intrusion alarm systems)<br />

and each can have its own audible warning<br />

device. In industrial settings, there may also be<br />

audible warning devices on production<br />

equipment, assembly lines and forklifts, etc.<br />

With so many different types of audible<br />

warning devices, it can be confusing for building<br />

occupants when an alarm sounds. Is it the fire<br />

alarm? Perhaps an emergency exit alarm? Or<br />

has a unit of production equipment jammed? To<br />

counter these conflicting responses, voice<br />

sounders are now making an established and<br />

effective contribution to voice evacuation<br />

systems in public and commercial buildings,<br />

and can be a viable alternative to more complex<br />

voice alarm) systems.<br />

The concept of voice commands to instruct<br />

and direct people on how to leave a building or<br />

other area during an emergency is widely<br />

recognised as the most efficient and sensible<br />

way to fulfil an important safety-critical job.<br />

Models in the Vimpex Fire-Cryer range of<br />

voice sounders are a good example of how voice<br />

technology is working to reduce delays and<br />

increase response rates in evacuation scenarios.<br />

Fire-Cryer can be used as a single message 24 V<br />

conventional voice sounder on any<br />

sounder/notification alarm circuit or,<br />

alternatively, as part of a sophisticated multimessage,<br />

multilingual evacuation system.<br />

Alongside Fire-Cryer, Vimpex has developed<br />

an exciting new range of Identifire products to<br />

provide the fire, detection and alarms sector<br />

with a variety of sleek, aesthetically-pleasing<br />

evacuation and alarm accessories that offer a<br />

consistent look and feel across the entire range.<br />

Vimpex brings ‘dynamic duo’ to FIREX 2019<br />

As one of the industry’s<br />

leading independent<br />

manufacturers and<br />

distributors of fire alarm<br />

evacuation and building<br />

infrastructure products<br />

and accessories, Vimpex will be bringing its Identifire and Fire-<br />

Cryer ‘dynamic duo’ ranges of evacuation and alarm sounders,<br />

beacons and system accessories together at this year’s FIREX<br />

International (to be held at ExCeL in London on 18-20 June).<br />

The company’s industry-leading, state-of-the-art Identifire<br />

range of 50-plus evacuation and alarm sounders, beacons and<br />

system accessories is manufactured here in the UK. Flawless<br />

functionality combined with sleek design ensures easy<br />

installation on any project and products that are easy on the<br />

eye. Identifire products can be customised and supplied with<br />

flush or surface-mounted options.<br />

The company’s Fire-Cryer voice enhanced sounders are<br />

proven to reduce delay and response rates in evacuation times<br />

and are as simple to install as electronic sounders. Fire-Cryer<br />

Solo provides the clearest and most unambiguous voice<br />

messaging for communication at critical times.<br />

*Visit Vimpex on Stand FX940 at FIREX International 2019<br />

Vimpex’s bold vision becoming a reality<br />

Vimpex’s Identifire TriTone sounder has recently been certified<br />

by UL Laboratories, an important move that marks a<br />

strategically important development for Vimpex. It’s the first<br />

stage of a strategy that will use UL for all future strategically<br />

important products since the UL brand is recognised worldwide<br />

as a mark of quality, safety and reliability.<br />

Vimpex’s managing director James Jones (pictured) told Risk<br />

Xtra: “Following the opening of the company’s new UK<br />

manufacturing production facility, this first certification by UL<br />

Laboratories is yet another step in our ambitious plans that will<br />

allow Vimpex to innovate and increase its product ranges,<br />

markets and territories, as well as significantly increase our<br />

export activity in specifically targeted markets.”<br />

30<br />

www.riskxtra.com


FIRE SAFETY<br />

Innovation Award for Taktis<br />

Kentec won the Fire Innovation of<br />

the Year Award at the National<br />

Safety and Health Excellence<br />

Awards for its 16L Taktis analogue<br />

addressable fire panel<br />

The Fire Innovation of the Year award<br />

celebrates products or services that<br />

demonstrate genuine innovation and<br />

differentiation to other products in the<br />

marketplace. Beating ten other nominated fire<br />

products and services, the Taktis 16L extends<br />

the standard Taktis fire panel to 16 detection<br />

loops to provide up to 144 zone indications.<br />

This scalability impressed the Judges. “It<br />

supports more than 2,000 detection devices and<br />

can network up to 128 panels, making it ideal<br />

for the largest sites such as schools, hospitals<br />

and retail,” said a spokesperson for the awards.<br />

Kevin Swann, managing director at Kentec,<br />

says the fact that the awards were judged by<br />

peers within the fire industry is very gratifying:<br />

“We’re thrilled Taktis has been recognised with<br />

this prestigious award that’s considered to be<br />

an important industry accolade.”<br />

Swann continued: “The Taktis 16L has been<br />

built with both the end user and installer in<br />

mind. As a truly open protocol panel, it offers<br />

installers and their end user customers<br />

maximum flexibility in terms of system design<br />

and site customisation as well as in terms of the<br />

third party devices that they specify. Taktis 16L<br />

also protects legacy installations, enabling the<br />

extension and replacement of Syncro network<br />

systems using the Taktis bridge functionality. It<br />

protects future investment, too, since the panel<br />

is future-proofed with a highly impressive road<br />

map of additional functions, features and<br />

integration possibilities.”<br />

This latest award win follows on from the<br />

company’s Manufacturing Innovation Award at<br />

the 2018 Made in the South East Awards.<br />

Kentec’ s Liz Millward and Peter<br />

Bone collect the latest award for<br />

the Taktis 16L fire panel<br />

www.kentec.co.uk<br />

BE SMART!<br />

Read Risk Xtra<br />

Magazine on your tablet<br />

or smartphone using<br />

the FREE app<br />

x<br />

RISKXtra


x<br />

RISKXtra<br />

The Changing Face of Security Services<br />

Naomi Austen<br />

considers the often<br />

vital role that security<br />

officers play in helping<br />

vulnerable people who<br />

find themselves in the<br />

worst of times and<br />

goes on to evaluate<br />

how those officers<br />

might be better<br />

supported on site<br />

when doing so<br />


• • • ••• •• • •• • • •• • ••<br />

• • • • • •• • •<br />

INTELLIGENCE UNIT<br />

In a world where businesses constantly<br />

face an ever-increasing array of risks and<br />

threats, how confident are you that your<br />

business is safe?<br />

Securitas has a global network of security<br />

risk experts ready to evaluate your current<br />

security service.<br />

Whether you need 24/7 support from our<br />

Securitas Intelligence Unit, or access to<br />

intelligence services for specific events<br />

or live incidents, our analysts provide<br />

actionable intelligence based on specific<br />

threat assessments and investigations.<br />

Get in touch today to find out how we can<br />

keep your business safe.<br />

soc.intelligence@securitas.uk.com<br />

@SecuritasUK<br />

www<br />

securitas.uk.com<br />

••••••••••••••


x<br />

RISKXtra<br />

The Changing Face of Security Services<br />

Many pressing issues<br />

weigh heavily as they<br />

escalate in our society.<br />

Counter-narratives are<br />

unfolding all the while,<br />

among them<br />

compassionate<br />

responses,<br />

constructive voices<br />

and practical<br />

solutions. Neill Catton<br />

sheds some light on<br />

the bigger security<br />

industry picture<br />

Neill Catton:<br />

Managing Director of CIS<br />

Security<br />

All-Inclusive Security<br />

The shift towards a compassionate,<br />

competency-driven law enforcement culture<br />

is essential for efficient and sustainable<br />

policing. Notwithstanding the need to be there<br />

if a more robust approach is required<br />

(something about which I was recently<br />

reminded by a former senior police officer).<br />

This combined approach can result in improved<br />

performances, fewer incidents, decreased<br />

stress levels and enhanced public support.<br />

Compassion-based conflict management<br />

training is certainly becoming more and more<br />

widespread in the industry.<br />

In a social scenario that allows endless and<br />

chaotic connections between organisations and<br />

people, along with a rise in empathy and<br />

human trust, we witness an increase in mental<br />

health illnesses. In the face of this, diversity is<br />

proving key to innovation, thus attracting a<br />

broader range of emotionally intuitive<br />

individuals with different backgrounds and<br />

skills to the security world.<br />

It’s no coincidence that there has been a rise<br />

in the female presence across the policing<br />

ranks over the last few years, with female<br />

officers now accounting for 30% of the total<br />

headcount in the UK.<br />

Though public security has seen this growth,<br />

the gender evolution is moving much more<br />

slowly in the private sector. In this digital age,<br />

we look into how technology is opening up<br />

routes for people to better influence how<br />

society is governed. Bridging the gender gap<br />

does matter. We can never change things by<br />

crushing the existing. To change something, we<br />

should build a new model that makes the<br />

current one obsolete. Thus, as security<br />

professionals we need to encourage inclusion<br />

and diversity to help strengthen our nation’s<br />

security posture and that of the world itself.<br />

Behind both private and public security,<br />

there is after all the same vocation to be a force<br />

for good. The private sector has shown no signs<br />

of dwelling on what it used to be. Private<br />

security now operates in the realm of what was<br />

once part of public functions. Today, the public<br />

interacts with and depends upon a private<br />

sector model which branches out to touch every<br />

aspect of communal living, from<br />

neighbourhoods through to education and from<br />

hospitals to open spaces.<br />

Greater responsibility<br />

Increasing public demands call for professional<br />

planning and a renewed dedication to the<br />

advancement of our industry. Whether it be<br />

executive protection, community intelligence,<br />

consultancy or patrolling security officers, we<br />

witness the overlapping of a private model in<br />

public sector functions.<br />

However, despite this positive transition from<br />

its early stages, we still need to do more in<br />

order to deconstruct the common view of the<br />

security officer as being nothing more than an<br />

ordinary employee wearing a uniform. To raise<br />

the profile of this profession and turn it into a<br />

solid and reputable career of choice, not only<br />

do we constantly need to keep calling for a<br />

skilled workforce and highly-regulated<br />

standards, but also for respect and thorough<br />

co-operation with the police.<br />

As the security industry assumes greater<br />

levels of responsibility in crime prevention, the<br />

enforcement of law and the maintenance of<br />

communities’ well-being, we need to advocate<br />

the integration of private sector security<br />

companies working in conjunction with public<br />

law enforcement.<br />

It’s time to acknowledge the security industry<br />

for the vital role it plays in protecting the<br />

nation. There are twice as many licensed<br />

security officers than police officers and, when<br />

you add to this the thousands of security<br />

systems technicians, consultants and physical<br />

security professionals, the weight of the<br />

security business sector is significant.<br />

The industry needs to be more balanced in<br />

terms of gender, race, religion and orientation.<br />

The changing face of the security services<br />

sector is not a person or a group of people,<br />

though. Rather, it’s an overarching feeling of<br />

professionalism, acknowledgement and pride.<br />

34<br />


for a safer world 0115 714 9990<br />

CALL FOR A<br />

FREE DEMO<br />

COST EFFECTIVE<br />

PAY-AS-YOU-GO<br />

SERVICE.<br />

CANCEL AT ANY TIME.<br />

LOW-COST - ADVANCED CLOUD-BASED ALARM PLATFORM<br />

Use the management function<br />

of webeyeCMS to easily control<br />

and monitor all your alarms<br />

PATENTED SYSTEM<br />

FOR RELIABLE<br />

ALARM DELIVERY<br />

FULL<br />

AUDIT<br />

TRAIL<br />

VIDEO<br />

CLIPS TO<br />

PHONE/BROWSER<br />

FREE<br />

TRAINING<br />

PROVIDED*<br />

FREE UK BASED<br />

TECH SUPPORT*<br />

8.00AM-10.30PM<br />

GIVING INSTALLERS THE POWER TO IMPROVE EFFICIENCY & SAFETY<br />

Part of webeyeCMS is a web-based portal operating on any internet-connected device and is<br />

<br />

<br />

<br />

Delivery in seconds for immediate response<br />

<br />

worker safety<br />

Won many awards for reliable alarm delivery<br />

<br />

Browser version can be white labelled with<br />

your own logo<br />

<br />

Call 0115 714 9990 for a FREE demonstration<br />

*Availavle on products and services supplied by Webeye Limited.


x<br />

RISKXtra<br />

The Changing Face of Security Services<br />

Redefining the Role of the Security Officer<br />

In a world where<br />

businesses constantly<br />

face an everincreasing<br />

array of<br />

new threats, Craig<br />

Robb explains why the<br />

role of the security<br />

officer now carries<br />

even greater<br />

responsibility in what<br />

are often complex and<br />

challenging<br />

environments<br />


STRENGTH IN<br />

DIVERSITY.<br />

We build a culture of engagement and<br />

inclusivity that enhances our services<br />

and commitment to excellence for better<br />

security.<br />

Our wide range of services, from<br />

corporate security to car park<br />

management, innovative training<br />

programmes and future-proofed<br />

technologies make us stand out as one of<br />

the leading security specialists in the UK,<br />

50 years on.<br />

CIS_Facing the future copy.indd 1 23/05/2019 16:1


x<br />

RISKXtra<br />

The Changing Face of Security Services<br />

Given the background<br />

of increasing violence<br />

(both real and<br />

perceived) in today’s<br />

society, are you doing<br />

enough to protect<br />

your members of<br />

staff? Trevor Lee<br />

evaluates how<br />

technology can be<br />

used to reduce the<br />

risk of violence and<br />

aggression faced by<br />

security officers and<br />

lone workers<br />


We go to greater lengths.<br />

Axis Security – setting new standards in customer service.<br />

• Our employees – are highly trained, valued and rewarded<br />

• Our proactive management approach – ensures service is continually improving<br />

• Our intelligent technology – ensures open lines of communication and transparency<br />

• Our prestigious industry recognition – includes 4 Security Guarding Company of the Year awards<br />

T. 020 7520 2100 | E. info@axis-security.co.uk | axis-security.co.uk


x<br />

RISKXtra<br />

Meet The Security Company<br />

on customer service and risk management. Our<br />

security services are managed by a central<br />

team from our Security Control Room in<br />

Salford. The members of the team work closely<br />

with those of local teams based at client sites.<br />

Sodexo’s global subject matter experts and<br />

partner organisations enable us to operate<br />

security services across the world in a diverse<br />

range of environments.<br />

This is the eighteenth<br />

instalment in a series<br />

of articles for the<br />

readers of Risk Xtra<br />

where we shine the<br />

spotlight on NSIapproved<br />

businesses<br />

for the benefit of risk<br />

and security managers<br />

who purchase security<br />

guarding as well as<br />

systems-focused<br />

solutions. Answering<br />

our questions this<br />

time around is Jane<br />

Farrell, head of<br />

security for the UK and<br />

Ireland at Sodexo<br />

About the National Security Inspectorate<br />

Risk Xtra: Can you briefly describe your<br />

business’ activities and what you consider to<br />

be your USP as an organisation?<br />

Jane Farrell: In the UK and Ireland, Sodexo<br />

delivers services that improve the quality of life<br />

for its clients at some 2,100 locations in the<br />

corporate, healthcare, education, leisure,<br />

justice and defence sectors.<br />

Sodexo provides a complete security offer<br />

aimed at client organisations seeking a<br />

customised response to their on-site security<br />

needs. We work in strategic partnership with all<br />

of our clients, combining high-quality electronic<br />

and physical security solutions to deliver<br />

results that are at once visible and measurable.<br />

Sodexo has taken a leading position in the<br />

security industry by providing our clients with a<br />

next generation service that’s focused on<br />

implementing prevention strategies instead of<br />

over-corrective measures.<br />

Our approach to security is based on systems<br />

and processes that have proven effective in<br />

providing a consistently high-quality service,<br />

using a resourcing model based on our<br />

practical experience in deploying an<br />

appropriate number of officers who perform<br />

their duties with diligence and a constant focus<br />

The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />

company limited by guarantee and operates as a UKAS-accredited certification<br />

body specialising in the security and fire safety sectors.<br />

For over 40 years, the NSI has served to protect businesses, homeowners<br />

and the general public alike, raising standards by providing robust and high<br />

quality audits of both security and fire safety service providers.<br />

Risk Xtra: What do your clients value most<br />

about the services you deliver?<br />

Jane Farrell: Our people are critical to the<br />

success of our business, ensuring that our<br />

clients’ expectations are understood and met.<br />

Through their hard work and commitment, we<br />

are viewed as a trusted security partner by our<br />

clients rather than just a supplier of manpower.<br />

Our robust processes and deliverables, along<br />

with the company’s accredited standards and<br />

extensive industry knowledge, enable our<br />

clients to put their trust in our ability to deliver<br />

the standard of security they expect. We’re<br />

often credited during periods of transition –<br />

such as the mobilisation of new contracts – for<br />

maintaining a high level of service throughout<br />

the change process.<br />

We give our clients the confidence that the<br />

resources and competences are in place to<br />

manage staffing issues if a risk was presented.<br />

It’s particularly important to us and our<br />

clients that we work closely on strategic forums<br />

with the Security Industry Authority (SIA),<br />

ensuring that we’re at the very forefront of<br />

industry standards.<br />

Risk Xtra: How do you feel accreditations<br />

have assisted your company?<br />

Jane Farrell: Sodexo has a number of security<br />

accreditations which involve disciplined<br />

processes and good communications with our<br />

operators in order that they’re maintained. We<br />

can never underestimate the amount of work<br />

and co-ordination that this proof of competency<br />

takes to maintain.<br />

We’re accredited in our standards to provide<br />

security services in terms of both security<br />

guarding and electronic security in the UK and<br />

Ireland, train our employees and provide an<br />

40<br />


Meet The Security Company: Sodexo<br />

In association with the<br />

accredited Security Control Room. We’re also<br />

an ACS Pacesetters company.<br />

Having accreditations not only generates<br />

trust and assurance for our clients, but also<br />

supports our business development teams as<br />

we’re able to prove that we’re a trusted security<br />

provider that has been offering a high-quality<br />

and accredited security service since 2007.<br />

From an operational point of view, as we’re<br />

audited several times a year by each<br />

professional body, we’re able to create a<br />

framework which readily enables us to check<br />

our own standards and continually look for<br />

further improvement when it comes to the<br />

services we deliver.<br />

Risk Xtra: Specifically, what value does ACS<br />

registration and NSI Guarding Gold approval<br />

bring to your business and its clients?<br />

Jane Farrell: Industry accreditations and<br />

approval schemes can only add value to the<br />

security services we realise for our clients and<br />

prospective clients by providing assurance that<br />

our service is of the highest standard and<br />

regularly audited and monitored by<br />

independent industry bodies.<br />

As an Approved Contractor Scheme (ACS)-<br />

registered security provider, we have to adhere<br />

to a system of inspection which satisfactorily<br />

meets the agreed standards under the Private<br />

Security Industry Act 2001. This ensures that<br />

we’re not only compliant, but that we provide a<br />

Best-in-Class security service whereby we<br />

continually seek improvements. It’s a service<br />

underpinned by training courses to suit the<br />

current security threat level and which seeks<br />

innovation in technology for our clients.<br />

The NSI is widely recognised as the leading<br />

certification body for the security sector in the<br />

UK and, as such, the organisation audits and<br />

closely monitors its approved companies like<br />

Sodexo to ensure that all of them are<br />

maintaining the high standards required to<br />

achieve certification.<br />

Sodexo is proud to have achieved NSI Gold.<br />

It’s a voluntary and very thorough process<br />

which provides current and prospective clients<br />

alike with the knowledge that Sodexo’s<br />

Security Control Room has achieved all of the<br />

NSI’s requirements to be awarded Gold status.<br />

Risk Xtra: In practice, what are the main<br />

differences between ACS registration and NSI<br />

Guarding Gold approval?<br />

Jane Farrell: Both the SIA and the NSI aim to<br />

raise the standard in the security industry. The<br />

ACS and Guarding Gold cross-over in certain<br />

areas, with the latter requiring compliance with<br />

BS 7858 which focuses on screening.<br />

The main difference rests with who carries<br />

out the audits. The ACS is not audited directly<br />

by the SIA. The Regulator has four core<br />

assessing bodies who conduct assessments on<br />

its behalf. The results are then submitted to the<br />

SIA for review and compliance to ensure that<br />

we’ve met the required standard.<br />

The NSI runs the scheme for Guarding Gold<br />

which is audited by its own internal auditors.<br />

Once audited, a company’s results are then<br />

passed across to a team of NSI auditors who<br />

validate the audit to ensure that the business<br />

under scrutiny has met the required standard.<br />

All accreditations require auditing to ensure<br />

that we meet the required standard. The initial<br />

stage of the ACS is a desktop exercise. There’s<br />

also a workbook that needs to be completed.<br />

Once the desktop exercise has been tackled,<br />

this is then followed up by site visits across the<br />

business and requires the auditors to meet with<br />

up to 30 of the firm’s security officers.<br />

NSI Gold is based around the requirements of<br />

ISO 9001:2015 looking at BS 7858 and BS 7499.<br />

We need to meet certain requirements along<br />

with the standards mentioned previously. It’s a<br />

one-day audit looking in detail at all of the<br />

processes and procedures we operate within<br />

our dedicated Security Control Room.<br />

Risk Xtra: How do you feel technology has<br />

changed the industry over the last couple of<br />

years and what do you believe will be the<br />

direction of travel in the future?<br />

Jane Farrell: Clients continually seek more<br />

efficient cost-saving solutions for providing<br />

security services, often at the expense of<br />

security guarding provision. It seems that<br />

almost every week a new technology emerges<br />

whether it‘s new cameras, access control,<br />

reporting mechanisms or robots.<br />

There’s no question that technology has<br />

improved efficiencies in managing security and<br />

enables providers to think outside the box<br />

when it comes to providing solutions.<br />

As we operate our own NSI Gold-accredited<br />

Security Control Room we understand the<br />

requirements and complexities of the electronic<br />

security market and are well placed to guide<br />

clients in this area. If chosen correctly,<br />

electronic security can be a valuable addition to<br />

current on-site security arrangements. We can<br />

not only design and recommend security<br />

systems, but also ensure that they’re installed<br />

and maintained to the right specification, giving<br />

clients the reassurance that their valuable<br />

investment is well protected.<br />

There are still a number of clients who are<br />

not confident that remotely monitoring access<br />

control is the complete answer. They continue<br />

Jane Farrell:<br />

Head of Security for the UK<br />

and Ireland at Sodexo<br />

41<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Meet The Security Company: Sodexo<br />

Name<br />

Jane Farrell<br />

Job title<br />

Head of Security for the UK<br />

and Ireland<br />

Time in security business<br />

sector<br />

Over 11 years of security<br />

experience applying expertise<br />

and leadership to develop<br />

Sodexo’s professional<br />

security services as part of an<br />

integrated service offer for<br />

myriad clients. 37 years with<br />

Sodexo in management roles<br />

across hospitality, project<br />

management and FM. Chair of<br />

the International Professional<br />

Security Association (IPSA)<br />

and a Board director of IPSA<br />

since 2015<br />

Location of the business<br />

Sodexo’s UK head office is<br />

based at Southampton Row in<br />

central London. The Ireland<br />

head office resides in Dublin<br />

Areas of expertise<br />

Security guarding, electronic<br />

security, Control Room<br />

services, service maintenance<br />

and fire detection/fire safety<br />

Accreditations<br />

NSI Gold, SIA Approved<br />

Contractor, ACS Pacesetters,<br />

Licensed by the Private<br />

Security Authority (Ireland),<br />

Qualsec Platinum, NOCN<br />

Approved Training Centre,<br />

IQ Approved Training Centre,<br />

ISO 27001<br />

to prefer a physical security presence. To help<br />

these clients overcome their concerns, we need<br />

to have strong Case Studies which demonstrate<br />

the benefits of these systems including the<br />

savings and efficiencies that have been made<br />

along with the standard of service delivered.<br />

Risk Xtra: When it comes to negotiating<br />

contracts and responding to tender requests,<br />

what aspects are of most value to customers<br />

and how are these changing?<br />

Jane Farrell: Understanding clients’<br />

requirements, values and culture is key as they<br />

are looking for a professional security solution<br />

which suits their approach to providing a safe<br />

place in which their employees can work in an<br />

efficient and effective manner.<br />

Awareness and understanding of current<br />

threats and how adaptable we are to respond<br />

accordingly are high on the list of expectations<br />

along with greater awareness of using cloudbased<br />

security solutions and the next<br />

generation of video management systems and<br />

associated technology.<br />

The development of our team members as<br />

the security professionals of tomorrow is<br />

featuring in more and more conversations,<br />

encompassing the stability of the team,<br />

individual career development and training<br />

programmes as well as our approach in terms<br />

of creating diverse teams.<br />

It’s important that our solutions for providing<br />

security services show innovation through<br />

blending traditional security guarding with<br />

technology and that any solutions we present<br />

emphasise the management of risk with clear<br />

and proven processes in place.<br />

Risk Xtra: How has Government legislation<br />

(eg the National Minimum Wage, the<br />

National Living Wage and changes to holiday<br />

pay) affected your business? Do you believe<br />

such legislation is a good thing?<br />

Jane Farrell: Labour costs have increased.<br />

Higher employment costs impact the bottom<br />

line and erode margins which many companies<br />

cannot afford to do, so invariably the cost to<br />

provide services will increase unless labour<br />

saving technologies are used.<br />

Front line security officers should be paid a<br />

fair wage, especially as we see crime statistics<br />

rise and our teams are increasingly placed in<br />

vulnerable situations. Many security officers<br />

risk their own lives while on duty and should<br />

be paid a decent wage for doing so.<br />

We absolutely need to think about the value<br />

of the assets and the lives that our teams are<br />

protecting and ensure that clients invest in an<br />

appropriate level of security service and<br />

account for the necessary protective equipment<br />

needed to support individuals and property.<br />

Risk Xtra: What are the most important<br />

attributes you look for in your security<br />

officers and staff members in general?<br />

Jane Farrell: Successful security officers have<br />

to be capable of doing a difficult and<br />

demanding job. They need integrity to manage<br />

change and deal with problems effectively. We<br />

aim to attract and recruit people with the<br />

ability, passion and commitment to be effective<br />

officers. We look for people who communicate<br />

well in all situations given that they’re often<br />

going to be the first point of contact.<br />

We expect our teams to be aware of their<br />

own behaviour and how it can determine the<br />

outcome of events. We want our security<br />

officers to be achievers. Individuals who are<br />

able to work on their own to achieve their<br />

objectives and ones that continually look for<br />

personal progression.<br />

We recognise the positive contribution<br />

women are making as security professionals<br />

and we’re taking steps to attract them to the<br />

industry to achieve their full potential. We’re<br />

proud that almost 20% of our workforce is<br />

female and that they’ve demonstrated career<br />

progression within our security teams.<br />

With the right attitude and commitment, a<br />

career in the security industry can be a<br />

satisfying and rewarding experience for many.<br />

Risk Xtra: How can the SIA, the NSI and<br />

industry standards best serve the sector in<br />

addition to the needs of your company’ s<br />

clients and the wider public interest? Will<br />

the planned introduction of business<br />

licensing be a positive step?<br />

Jane Farrell: Both the SIA and the NSI set high<br />

standards for companies to provide a highlevel<br />

security service and maintain standards<br />

for their clients’ premises and people.<br />

The annual audits allow security companies<br />

to improve their standards particularly towards<br />

employee development, but there isn’t much<br />

focus on new innovation which our clients<br />

continually require.<br />

Our clients are aware of both schemes, but<br />

as highlighted by the recent and extensive ACS<br />

Review, it’s arguably the case that the ACS<br />

isn’t being marketed well enough and it’s<br />

sometimes difficult for clients to understand<br />

the value it provides. Support in this area from<br />

both schemes would be beneficial.<br />

Business licensing would be a positive step,<br />

but would need revisiting to reflect how crime<br />

has changed since the idea was first<br />

introduced back in 2014.<br />

42<br />


thepaper<br />

Business News for Security Professionals<br />

Pro-Activ Publications is embarking on a revolutionary<br />

launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />

latest financial and business information for<br />

professionals operating in the security sector<br />

The Paper will bring subscribers (including CEOs,<br />

managing directors and finance directors within the<br />

UK’s major security businesses) all the latest company<br />

and sector financials, details of business re-brands,<br />

market research and trends and M&A activity<br />

FOR FURTHER INFORMATION<br />

ON THE PAPER CONTACT:<br />

Brian Sims BA (Hons) Hon FSyI<br />

(Editor, The Paper and Risk UK)<br />

Telephone: 020 8295 8304<br />

e-mail: brian.sims@risk-uk.com<br />

www.thepaper.uk.com


x<br />

RISKXtra<br />

CSyP: The Gold Standard for Leaders<br />

Back in 2011, The<br />

Worshipful Company<br />

of Security<br />

Professionals used its<br />

Royal Charter and the<br />

collective knowledge<br />

of The Security<br />

Institute to create a<br />

comparative standard<br />

for security. Eight<br />

years on, the postnominals<br />

CSyP are<br />

now accepted as The<br />

Gold Standard for<br />

strategic leaders in the<br />

security business<br />

sector. Rick Mounfield<br />

outlines precisely why<br />

44<br />


The Security Institute’s View<br />

in physical security and close protection is<br />

accepted, but I cannot rest on my laurels. I’m<br />

obliged to maintain a regime of Continuing<br />

Professional Development, something which I<br />

take very seriously indeed.<br />

CSyP: What it’s all about<br />

The Privy Council sets the standards for<br />

Chartered accreditation and the highest levels<br />

of professionalism in given business spheres.<br />

Security is no exception. Attaining Chartered<br />

status doesn’t mean you’re an expert in all<br />

areas of security, though. That’s virtually<br />

impossible. Like Chartered Engineering, Adam<br />

may be a civil engineer building motorways and<br />

Eve could well be an electrical engineer<br />

constructing computers. They’re not the same,<br />

but both are Chartered.<br />

In CSyP terms, Mahbubul Islam is a CSyP<br />

with the highest cyber security skills and Julia<br />

McClelland is a CSyP due to her specialism in<br />

nuclear security.<br />

Reaching this level in security means that an<br />

applicant can often be in the later years of a<br />

successful career, holding a position of<br />

leadership that means they may soon retire and<br />

thereafter have no professional use whatsoever<br />

for the accreditation. That said, our business<br />

sector is now promoting younger thought<br />

leaders into these positions. It’s essential that<br />

such leaders demonstrate their capability so<br />

that our industry is recognised as a profession<br />

with career goals at every stage of<br />

development. My challenge, then, to those<br />

security leaders who hold applicable positions<br />

and knowledge is to step forward and be<br />

recognised by attaining CSyP status.<br />

Our sector employs specialists with<br />

comprehensive experience and academic<br />

qualifications. That being so, the Chartered<br />

Security Professionals Registration Authority<br />

(CSPRA) accepts the fact that some leaders may<br />

not have degrees, but still accrue vast strategic<br />

experience and are therefore capable of<br />

attaining the CSyP designation.<br />

Routes to attainment<br />

There are two routes to attaining CSyP status:<br />

the direct route for those with degrees in<br />

security and an individual pathway for those<br />

without. While the individual pathway requires<br />

a written assessment (a research project, if you<br />

like), it’s still achievable. Accreditation is equal<br />

whichever route is taken.<br />

The Security Institute manages the Register<br />

and its application process. We do not own it.<br />

That’s the preserve of The Worshipful Company.<br />

The CSPRA is presided over by Baroness Ruth<br />

Henig CBE DL, with the competency framework<br />

and admittance overseen by the Registrar,<br />

namely David Gill CSyP. The Board consists of<br />

senior Board members from The Worshipful<br />

Company and the two licensees: The Security<br />

Institute and ASIS UK Chapter 208. Either<br />

organisation can offer strategic security<br />

professionals personal one-to-one guidance and<br />

mentoring to help them achieve their goal.<br />

Indeed, The Security Institute hosts monthly<br />

application workshops across the UK to assist<br />

applicants in navigating the evidence-based<br />

process which is arduous (as you would<br />

expect). The common mistake on application is<br />

that the candidate doesn’t sell their personal<br />

strategic influence as much as they do that of<br />

their parent company or team.<br />

Isn’t that just typical of security professionals<br />

and our tendency to downplay our personal<br />

achievements, instead accrediting our teams<br />

with the success of a project?<br />

Candidates should see past that desire and<br />

provide evidence of what they deliver on a<br />

personal level within the team. It’s their own<br />

knowledge and leadership that’s assessed.<br />

Five competencies<br />

There are five competencies that must be<br />

demonstrated, with evidence of work included<br />

to support a claim of strategic leadership.<br />

These are Security Knowledge, Practical<br />

Application, Communication, Leadership and<br />

Personal Commitment.<br />

The CSyP standard is recognised by both the<br />

Security Industry Authority (SIA) and the Centre<br />

for the Protection of National Infrastructure.<br />

The latter holds registrants in the highest<br />

regard and, as such, lists CSyPs alongside<br />

Chartered Engineers on the Register of Security<br />

Engineering Specialists.<br />

Further, CSyPs are invited to work with the<br />

CPNI on the security of Critical National<br />

Infrastructure, permitting attendance on CPNI<br />

courses (not available to anyone outside the<br />

realms of CNI security) and affording access to<br />

its Extranet where incredible resources and<br />

cutting-edge advice (that will, no doubt, benefit<br />

any security leader) is to be found.<br />

With Government and the wider industry<br />

collaborating to create comparative career<br />

pathways and professional development, The<br />

Security Institute and the CSPRA are aligning to<br />

support this initiative. Chartered status is the<br />

pinnacle to which all should aspire.<br />

The Security Institute’s View<br />

is compiled and edited by Dr<br />

Alison Wakefield FSyI<br />

(Chairman of The Security<br />

Institute) and Brian Sims BA<br />

(Hons) Hon FSyI (Editor of<br />

Risk Xtra)<br />

*If you believe that you can<br />

demonstrate strategic<br />

influence in security, feel free<br />

to explore an application for<br />

CSyP by sending an e-mail to<br />

di@security-institute.org<br />

Further details on the Royal<br />

Charter and application<br />

process can be found on the<br />

CSyP website at<br />

www.charteredsecurity<br />

professional.org<br />

Rick Mounfield CSyP FSyI:<br />

CEO of The Security Institute<br />

“The CSPRA accepts the fact that some leaders may not have<br />

degrees, but still accrue vast strategic experience and are<br />

therefore capable of attaining the CSyP designation”<br />

45<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Most security<br />

business sector<br />

professionals fit a<br />

certain demographic<br />

as the industry<br />

remains for the most<br />

part male, with many<br />

residents emanating<br />

from backgrounds in<br />

the military or the<br />

police service. This is<br />

particularly true when<br />

we consider senior<br />

leaders across the<br />

industry, but it’s fair<br />

to state that the times<br />

are slowly changing.<br />

James Morris focuses<br />

on the subjects of<br />

diversity and inclusion<br />

in the security world<br />

James Morris CPP MSyI:<br />

Director of ASIS UK’s Young<br />

Professionals Group and<br />

Regional Security Manager<br />

(EMEA) at Aon Business<br />

Services<br />

Diversity and Inclusion<br />

Driven by the ever-evolving business and<br />

threat environment, and fuelled by the<br />

growth in risk management degree<br />

courses, professionals from diverse<br />

backgrounds are now open to a range of career<br />

opportunities that the security business sector<br />

can offer, while companies in general are<br />

increasingly appreciating the value that diverse<br />

teams bring to the table. This is a good thing<br />

both for the security industry and the<br />

businesses whom it serves. However, there still<br />

remains much work to be done.<br />

There’s extensive research providing a<br />

wealth of evidence on the range of tangible<br />

benefits of diverse and inclusive organisational<br />

cultures. These encompass higher returns on<br />

equity and investment, better financial<br />

performance, improved corporate governance<br />

and increased innovation, creativity and<br />

competitiveness.<br />

A truly diverse workplace is one in which the<br />

best employees are welcomed and where all<br />

members of staff feel supported in their career<br />

development and empowered when it comes to<br />

achieving their goals. Such environments offer<br />

the best way forward for attracting quality<br />

employees and, importantly, keeping them.<br />

Hiring is one thing, but retention of good<br />

quality security staff is every bit as important.<br />

With high-performing employees come<br />

higher productivity and improved morale. When<br />

employees feel and see that diversity is<br />

appreciated and promoted in the workplace,<br />

they’re generally more satisfied with their jobs.<br />

Often, a diverse workforce will provide the<br />

opportunity to have many different points of<br />

view impacting the decision-making process,<br />

which then enables leaders to make better<br />

choices that are often more innovative.<br />

Diverse workforces are valuable to the<br />

security industry, but also to the clients and<br />

companies that employ security professionals.<br />

For all the technological advancements that the<br />

security industry enjoys, we are at our core a<br />

people industry. We employ people. We protect<br />

people. People are our most important asset<br />

and can be our best deterrent against<br />

adversaries. People can also be our biggest<br />

threat and our biggest weakness, of course, so<br />

it’s important that we employ the best possible<br />

individuals we can.<br />

Focusing on diversity<br />

On Tuesday 16 April, the ASIS UK Chapter’s<br />

Women in Security, Young Professionals and<br />

Education (WiSYPED) Group organised an event<br />

entitled ‘Diversity and Inclusion in the Security<br />

Arena’. The event was hosted by asset<br />

management specialist Schroders plc at its<br />

London Wall offices in the City of London and<br />

was particularly well attended.<br />

The event saw many attendees from across<br />

the security business sector hear a fantastic<br />

Keynote from Emma Cusdin, people director at<br />

Aviva. Cusdin is also the director of Global<br />

Butterflies which helps companies to create<br />

trans-inclusive working environments for both<br />

their employees and customers.<br />

On the day, Cusdin shared her own<br />

experiences – both positive and negative – while<br />

challenging attendees and companies to review<br />

their diversity and inclusion programmes and<br />

identify what it is they’re doing, but also what<br />

they could be doing better. Cusdin also<br />

discussed the difference between diversity and<br />

inclusion, noting that companies can be the<br />

diverse organisation, but if they don’t allow all<br />

employees equal career and development<br />

opportunities and the opportunity to contribute<br />

then they’re not truly inclusive.<br />

This presentation was followed by an<br />

informative panel discussion. Cusdin joined<br />

Ruben van Schalkwyk from Aon Business<br />

Services, Carolyn Pearson (of Maiden Voyage)<br />

and Houdah Al-Hakim from QuickClick Security.<br />

Each of these panel members are experts in<br />

diversity and inclusion in their own right. The<br />

ensuing discussion was enlightening.<br />

Cusdin, van Schalkwyk, Pearson and Al-<br />

Hakim shared their experiences from both<br />

within the industry and working alongside it,<br />

imparting useful tips on how to open company<br />

doors for a range of diverse employees from<br />

diverse backgrounds, and also how to ensure<br />

that companies are inclusive and absolutely<br />

making the most of the incredible range of<br />

talent to which the industry has access.<br />

Some of the key points from the discussion<br />

were for companies to:<br />

• Spend time reviewing the strengths and<br />

weaknesses of their teams in order to<br />

understand the gaps that new employees can<br />

bring. Diverse employees bring a range of<br />

backgrounds, experiences and skills that can<br />

enhance those of a team<br />

• Review the process for developing job<br />

descriptions (ie rather than ‘copy’ an existing<br />

member of the group, use the gaps identified to<br />

broaden the hiring process)<br />

• Share job descriptions for open postings<br />

widely in order to encourage a greater range of<br />

applicants and experience<br />

46<br />


In the Spotlight: ASIS International UK Chapter<br />

• Be clear with HR, hiring teams or recruiters<br />

that they’re looking for a range of candidates<br />

and should therefore consider non-traditional<br />

backgrounds while being prepared to review a<br />

greater number of applications<br />

• Create an interview process that targets<br />

talent rather than rewards past performance<br />

(this may require adding others to the interview<br />

panel who can identify different skills)<br />

• Create an open environment for all new<br />

employees to join and to thrive and to feel part<br />

of the team and for experienced professionals<br />

to feel that their experience is valuable<br />

• Focus on developing a culture wherein<br />

opportunities and development are possible for<br />

all based on talent, ability and performance<br />

rather than any personal factors<br />

• Support experienced professionals by<br />

providing them with the tools and knowledge to<br />

work with people of diverse backgrounds<br />

Creating the culture<br />

An important aspect of managing diversity is<br />

demonstrating and encouraging respect for all<br />

employees’ abilities and perspectives. There<br />

are several steps an employer can take, among<br />

them creating a culture of diversity and<br />

inclusion that’s driven from the top down.<br />

That’s a culture wherein the most senior<br />

leaders in the organisation demonstrate that<br />

they truly believe in the value and importance<br />

of a diverse and inclusive workforce.<br />

It’s also important that companies create a<br />

policy on diversity and inclusion and make sure<br />

that all employees have read and understood<br />

that policy. The document should be stored in a<br />

central portal for all to access.<br />

Training should be provided for all<br />

employees on the topics of diversity and<br />

inclusion. Employers must commit to recognise<br />

every employee’s abilities and perspectives,<br />

regardless of their background or beliefs.<br />

Similarly, training should be provided for<br />

supervisors and managers on the diversity<br />

policy and how to handle situations – should<br />

they arise – where differences between<br />

employees are causing conflicts or otherwise<br />

interfering with productivity.<br />

Only diverse professionals?<br />

There are many benefits that arise from hiring<br />

diverse professionals, but does that mean older<br />

professionals, for example, should be ‘put out<br />

to pasture’? The answer must be ‘No’.<br />

A study conducted by the website Undercover<br />

Reporter into the make-up of a great team and a<br />

2015 Forbes Report showed that there are<br />

important factors in successful teams. These<br />

include strong leadership and clear vision,<br />

open and constructive communication and clear<br />

goals and objectives, but also diversity and a<br />

balance among team members. The study<br />

showed that a variety of personalities, age<br />

groups and cultures bring creativity and a broad<br />

range of ideas to the table.<br />

A diverse team is more likely to be successful<br />

if the balance is correct so, rather than simply<br />

saying hire young only, the correct mix of youth<br />

and experience, male and female, culture and<br />

religious backgrounds is likely to create a team<br />

with much to offer to support the business.<br />

There will be a compelling mix of experience<br />

and new approaches to problems, a plethora of<br />

world views to solve challenges and myriad<br />

viewpoints to approach business opportunities.<br />

If the security business sector is to continue<br />

to adapt to support its host businesses then a<br />

shift towards younger and more diverse teams<br />

can only be a good thing, but this must be<br />

balanced with strong leadership, guidance and<br />

relevant experience brought forward by<br />

experienced professionals who understand the<br />

value of working in a diverse environment.<br />

If today’s security professionals truly want to<br />

be business enablers and demonstrate their<br />

value to business leaders then teams need to<br />

be able to offer solutions that are suitable for<br />

the environment in which we’re now<br />

increasingly doing business. Ultimately, our<br />

goal should be to reflect the clients whom we<br />

serve. Only then can we truly say that we are, in<br />

point of fact, a diverse cohort.<br />

“Often, a diverse workforce will provide the opportunity to have<br />

many different points of view impacting the decision-making<br />

process, which then enables leaders to make better choices”<br />

47<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Detector Selection: Do Your Homework<br />

There can be a<br />

number of issues that<br />

arise from choosing<br />

the wrong type of<br />

detector for the area it<br />

needs to protect from<br />

fire. For those that<br />

perhaps have less<br />

experience in this<br />

practice, it can<br />

become confusing. Do<br />

you use an optical<br />

smoke detector,<br />

ionisation or a multisensor<br />

detector? As<br />

Bernard Laluvein<br />

points out, errors can<br />

easily be avoided by<br />

following the<br />

standards and<br />

directions set out in<br />

BS 5839-1:2017<br />

Commonly, the main problems that people<br />

face when selecting a detector are to do<br />

with ensuring that the detector’s suitable<br />

for the fire risk present and, also, that it doesn’t<br />

respond to sources of non-fire phenomena.<br />

Doing so can give false alarms, which<br />

negatively affects people’s trust and reliance in<br />

the fire detection and fire alarm system (a fact<br />

that may realise some degree of reluctance to<br />

react when the alarm does sound).<br />

Selection of the detector depends on a<br />

number of factors, such as the type of building<br />

and the location of the detector. That said,<br />

these are not the only key factors involved in<br />

the process.<br />

During the design of a fire system,<br />

consideration should be given to the fire risk(s)<br />

and the false alarm risk(s). Fire detectors are<br />

selected depending on the nature of the<br />

protected area and the risks associated with it.<br />

Often, this involves using different fire detector<br />

technologies in order to meet the diverse needs<br />

of both fire detection and false alarm rejection<br />

in each scenario.<br />

Single-sensor detectors (eg optical smoke<br />

detectors and heat detectors) are suited to the<br />

detection of certain fire risks. Selection choices<br />

need to be made carefully in order to optimise<br />

the detection of fire, but also minimise the<br />

occurrence of false alarms. The deployment of<br />

multi-sensor detectors means that the system<br />

could potentially detect fires earlier and yet<br />

avoid troublesome false alarms to a greater<br />

extent as well.<br />

Fire system design<br />

The choices and decisions concerning which<br />

detector types to use are initially made during<br />

fire system design, but are also sometimes<br />

revisited – and even modified – during<br />

commissioning and/or maintenance. They’re<br />

not always well recorded, and neither is the<br />

rationale behind them. At a later juncture, for<br />

example during a maintenance visit, this can<br />

give rise to confusion. A clear understanding of<br />

the original reasons behind the choice of<br />

detector(s) and how they’re configured is<br />

needed in order to verify continued suitability.<br />

Aside from multi-sensor detectors, a visual<br />

inspection of a fire detector can often provide<br />

sufficient information for a maintenance<br />

technician to allow in situ functional testing to<br />

be undertaken (eg in the case of a smoke<br />

detector or a heat detector).<br />

However, in the case of multi-sensors, the<br />

type of detection employed within it and its<br />

settings, modes or specific configuration (which<br />

govern its detection performance) to the risk<br />

are not always apparent from a visual<br />

inspection. This information may not even be<br />

available from the CIE.<br />

In all cases, however, there remains the need<br />

to know the detection principles and to<br />

understand the reason for the choice of a given<br />

detection solution relative to the risks<br />

perceived in the protected area.<br />

Effects on the overall system<br />

Certain types of detector are designed to be<br />

very sensitive to certain products of fires. For<br />

example, optical smoke detectors respond very<br />

quickly to dense smoke that may reduce<br />

visibility in escape routes. Although this can be<br />

seen as a good thing, such detectors might also<br />

respond to non-fire products such as vapours<br />

or steam from kettles or showers. This will be<br />

regarded as undesirable false alarms or, as far<br />

as the Fire and Rescue Service is concerned,<br />

unwanted fire signals (a cost that’s estimated<br />

to be around the £1 million mark per annum).<br />

To avoid false/unwanted alarms, selecting<br />

the right detector can mean all the difference.<br />

For example, a warehouse may be a dusty<br />

environment due to the materials stored or<br />

manufactured within it. Here, an optical smoke<br />

detector is unlikely to be the best type of<br />

solution to use since they’re designed to detect<br />

small particles within smoke. As such, they’re<br />

likely to produce unwanted alarms.<br />

48<br />


FIA Technical Briefing: Selection of Fire Detectors<br />

Designers must therefore consider carefully<br />

the types of false alarm risks present before<br />

selecting a detector.<br />

Process of selection<br />

The process for deciding the right type of<br />

detectors is a two-stage exercise. First, it’s<br />

important to analyse the fire risk and, from<br />

that, select the best detectors for detecting that<br />

type of risk.<br />

Fire risks can be defined as a material,<br />

substance or action that increases the<br />

likelihood of an accidental fire occurring. For<br />

example, electric wiring is a potential fire risk,<br />

which when burning produces smouldering<br />

white smoke. Using multi-sensor detectors or<br />

optical detection would be the best solution in<br />

this type of situation, though it needs to be<br />

considered against the second step.<br />

That second step in the process is to<br />

consider which non-fire phenomena are likely<br />

to arise within the specific areas to be<br />

protected – whether this is steam, smoke, dust,<br />

high ambient air flow or rapid thermal change.<br />

The type of detector selected can then be<br />

refined to ensure the correct balance between<br />

detection and the avoidance of false alarms.<br />

However, if you’re not familiar with the types<br />

of risks and the protection that different<br />

detectors offer, this may be difficult to<br />

evaluate. Thankfully, there’s help available<br />

from the Fire Industry Association (FIA).<br />

Assistance in the process<br />

The FIA has created a document entitled ‘Fire<br />

Alarm Detector Applications and Documentation<br />

of the System’ to assist with the process of<br />

selecting the right type of detector based on<br />

false and unwanted alarm risks.<br />

Initially created as part of the FIA’s input into<br />

the revision of BS 5839-1 (published in 2017),<br />

the organisation subsequently updated the<br />

document to ensure that detection<br />

technologies not included in the original text<br />

were also taken into account. Specifically,<br />

aspirating smoke detection, line type heat<br />

detection and beam detectors were added.<br />

The document is designed to help practising<br />

professionals choose the correct detection<br />

technology for use in specific situations, taking<br />

into account the fire risk present as well as<br />

possible sources of false alarms. This<br />

document is deliberately intended to assist<br />

with the task of selecting and clearly recording<br />

the type, sensitivity and settings chosen for all<br />

detectors (including multi-sensor detectors)<br />

relating to the perceived risks.<br />

The guide begins with a simple, easy-to-use<br />

flowchart to help aid the selection process and<br />

solidify each step since there are other factors<br />

beyond considering the fire risks and the risks<br />

for false alarms mentioned here.<br />

In addition, the document includes a Detector<br />

Selection Table. It’s a template to allow the<br />

documentation of the main risks and all<br />

decisions and reasoning behind the detection<br />

choices made, either during system design or<br />

at the time of any subsequent change to the<br />

fire detection regime. It’s intended to assist<br />

designers, commissioning engineers and<br />

service/maintenance technicians to keep good<br />

records of their detection choice decisions and<br />

the rationale underpinning them.<br />

False alarm risks<br />

Since fire risk matters as well, only detector<br />

types best suited for a particular risk should be<br />

used to detect the potential fire. To help with<br />

the selection, the document also includes a<br />

table focused on false alarm risks (ie steam,<br />

smoke, dust, sparks or naked flames, etc).<br />

The table is included to assist the system<br />

designer in the process of assessing which<br />

types of detectors are most likely to realise<br />

false alarms in given situations. This will enable<br />

the designer to be more aware and, ultimately,<br />

end up with a more informed decision.<br />

By following the guide carefully – and using it<br />

in conjunction with the similar information<br />

given in BS 5839-1 – fire detection and alarm<br />

system designers should be able to provide<br />

buildings and their end user occupants with a<br />

high level of fire protection.<br />

*If you wish to access ‘Fire<br />

Alarm Detector Applications<br />

and Documentation of the<br />

System’, the guide is<br />

available to download free of<br />

charge from the FIA’s<br />

website. Visit www.fia.uk.com<br />

Bernard Laluvein:<br />

Director of BEH Laluvein<br />

Consulting Ltd and Chairman of<br />

the Fire Industry Association’s<br />

Fire Detection and Alarms<br />

Council<br />

“Certain types of detector are designed to be very sensitive<br />

to certain products of fires. For example, optical smoke<br />

detectors respond very quickly to dense smoke”<br />

49<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

The Dawn of Intelligent and<br />

Predictive Security<br />

When did your<br />

business last<br />

undertake a security<br />

risk assessment? How<br />

do you evaluate<br />

threats or<br />

vulnerabilities? Are<br />

there any gaps in your<br />

security measures? Do<br />

you have full<br />

confidence in the<br />

security technologies<br />

that your business<br />

employs? Omar Abu-<br />

Rish explains why, as<br />

threats continue to<br />

grow and evolve,<br />

today’s organisations<br />

need intelligence on<br />

all of the risks which<br />

might impact their<br />

day-to-day operations<br />

In today’s complex security landscape, with<br />

businesses facing an ever-increasing array of<br />

risks and threats, it’s important to step back<br />

and ask yourself some serious questions like<br />

those outlined. From crime and disorder, violent<br />

extremism and activism through to fire risk, data<br />

leakage and cyber theft, understanding the<br />

threat landscape within and outside of your<br />

organisation represents half the battle.<br />

No matter what type of business you run, or<br />

the vertical sector in which you operate, it’s<br />

absolutely true to state that ‘knowledge is<br />

power’ and, indeed, vital when it comes to<br />

protecting the organisation’s people, property<br />

and assets.<br />

As businesses grow, so the risks posed to<br />

them increase still further. That being the case,<br />

it’s essential to regularly take a step back and<br />

review in some degree of detail whether or not<br />

your security solutions on site are pre-empting<br />

these threats and are perfectly ready to<br />

respond should the worst happen.<br />

For genuine and tangible peace of mind,<br />

organisations should be moving away from<br />

purely reactive security – a label often ascribed<br />

to security in UK plc over the years, given its<br />

tendency towards conservatism with a small ‘c’<br />

– and focus more on an integrated and fully<br />

predictive security solution.<br />

The foundation of predictive security stems<br />

from digitisation. There’s now an opportunity to<br />

gather and use large amounts of data from<br />

internal sources and combine these with<br />

external information including crime statistics<br />

and advanced analytics that can ultimately<br />

assist businesses to predict and then prevent<br />

criminal activity before it’s allowed to happen.<br />

This goes right to the very heart of predictive<br />

security – mitigate risks before they become<br />

threats and act in real-time to protect your<br />

organisation when needed.<br />

Accessing the right information and<br />

understanding how it fits into the overall<br />

security landscape is key to successful<br />

corporate risk management.<br />

Effective corporate risk management should<br />

follow a three-step process: evaluate, analyse<br />

and then plan. In the first instance, we need to<br />

use risk-based methodologies, detailed<br />

operational analysis and a Best-in-Class<br />

evaluation platform in order to evaluate the<br />

current security service.<br />

Second, combine on-site equipment – such<br />

as security sensors and surveillance cameras –<br />

with historical and real-time data as well as<br />

external crime and incident data sources with a<br />

view towards analysing and defining the<br />

business’ unique risk profile.<br />

Finally, by actively combining protective<br />

security services with the very best of today’s<br />

intelligence technology, you can then plan and<br />

implement a total security solution purposedesigned<br />

to keep your organisation safe.<br />

Security intelligence services<br />

Billions of people worldwide have access to the<br />

Internet which they use as a platform for<br />

communicating and socialising. From a security<br />

perspective, there has been a greater focus on<br />

online platforms over the last few years in order<br />

to help combat potential new threats.<br />

Law enforcement agencies have used open<br />

source investigation for years, gathering<br />

valuable intelligence from online platforms in a<br />

bid to keep members of the public safe from<br />

harm. Of late, the security business sector has<br />

itself recognised the value of open source<br />

investigation and duly established its own inhouse<br />

intelligence teams.<br />

From a business perspective, understanding<br />

and responding to online data of this nature<br />

can seem daunting, if not impossible. After all,<br />

if we look at social media as just one source of<br />

information, there are millions of posts shared<br />

every second right across the world. Social<br />

media platforms are a primary source of<br />

50<br />


Security Services: Best Practice Casebook<br />

communication for many, meaning that there’s<br />

an enormous amount of information and<br />

intelligence to monitor. Blogs, websites and<br />

community pages can also be valuable sources<br />

of intelligence.<br />

Open source intelligence has made it<br />

possible to access previously unknown or<br />

unmonitored information. That being the case,<br />

we can now be more proactive with advanced,<br />

real-time analysis and plan for more complex<br />

security breaches.<br />

How can organisations looking to protect<br />

themselves keep up-to-date with the sheer<br />

volume of information, though? Few businesses<br />

have the right skills, time or capacity to monitor<br />

the many thousands of data signals with which<br />

we’re all bombarded on a daily basis. What,<br />

then, is the solution?<br />

Specialist intelligence teams can analyse and<br />

interpret this data, as well as other valuable<br />

sources of information, in order to identify any<br />

threats or suspicious activity that may lead to<br />

business disruption. Highly-skilled intelligence<br />

analysts are right at the heart of these teams,<br />

bringing with them a wealth of experience<br />

through similar roles performed with the police<br />

service, the military or Government.<br />

Being readily able to capture and analyse<br />

vast amounts of information in real-time or tap<br />

into services that can provide such intelligence<br />

for you is now critical to the security of your<br />

operation. Cutting-edge technology also plays<br />

an important role.<br />

For example, our own Securitas Intelligence<br />

Unit makes good use of an industry-leading,<br />

cloud-based open source listening platform<br />

with real-time access to multiple Internet data<br />

streams. Using this, we can monitor<br />

occurrences and advise our clients on unusual<br />

or concerning activity.<br />

Intelligence services in action<br />

One high-profile organisation commendably<br />

taking a proactive and preventative approach<br />

towards its security regime is Formula 1 (F1).<br />

Recognised the world over as representing<br />

the pinnacle of motorsport, F1 is a showcase for<br />

automotive engineering excellence, design<br />

innovation and unrivalled driving skill. Up to<br />

195,000 fans attend each race on the annual F1<br />

calendar, with 1.76 billion watching live at<br />

home. F1 enjoys an estimated global fan base<br />

of no less than 500 million-plus.<br />

When it comes to security, each F1 race<br />

venue is unique with the promoter responsible<br />

for arranging on-the-ground operations and<br />

security. In 2017, F1 undertook a<br />

comprehensive review of its event security<br />

operations which involved running a thorough<br />

“Open source intelligence has made it possible to access<br />

previously unknown or unmonitored information. We can<br />

now be more proactive with advanced real-time analysis<br />

and plan for more complex security breaches”<br />

corporate risk management workshop. Then,<br />

early last year, F1 signed a three-year contract<br />

for global corporate risk management services<br />

with a dedicated security advisor.<br />

A bespoke risk management tool and risk<br />

assessments have been specifically created for<br />

F1 to reflect the unique threats faced at each<br />

Grand Prix location. Risk levels are assessed by<br />

combining the likelihood and impact of threats<br />

and hazards observed. This information is then<br />

shared via an online dashboard, which is part<br />

of the risk management tool, such that F1’s<br />

management can log-in at any time to monitor<br />

and review the risks and threats identified.<br />

At the same time, recommendations and Best<br />

Practice solutions are put forward with a view<br />

towards closing gaps in security and fully<br />

mitigating risk.<br />

Given the dynamic and transient nature of<br />

travel to the various race locations, it’s a<br />

priority for F1 to provide its staff with critical<br />

information as they do so, thereby always<br />

ensuring their safety and security. To achieve<br />

this, F1 receives pre-travel threat assessments<br />

on the risks members of staff may face as they<br />

enter each new country and environment.<br />

During live Grand Prix proceedings, a team of<br />

highly-skilled intelligence analysts, all of whom<br />

are experts in investigating open source<br />

intelligence, will continually monitor for any<br />

emerging threats.<br />

As you can imagine, crowd safety and event<br />

security is of paramount importance at each<br />

Grand Prix. F1’s intelligent and preventative<br />

approach towards security helps to mitigate<br />

risks and provides assurances that its own<br />

people, the fans, race venues and the F1 brand<br />

itself are in safe hands.<br />

The security needs of businesses are<br />

evolving. We’re also facing a new reality that<br />

requires an holistic approach to security.<br />

Reassuringly, despite new threats and an everchanging<br />

security landscape, data-driven<br />

insight and innovation means that we’re now<br />

more tuned-in than ever before to both internal<br />

and external threats.<br />

Security solutions can now be designed for<br />

clients which combine corporate risk<br />

management with security intelligence such<br />

that we can proactively mitigate risks before<br />

they become threats and act determinedly in<br />

real-time when and where needed.<br />

Omar Abu-Rish:<br />

Security Operations Centre<br />

Excellence and Insight<br />

Manager at Securitas UK<br />

51<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Professional Services: A New Breed<br />

of Third Party Cyber Risk to Manage<br />

In the UK, we are now<br />

predominantly a<br />

services-based<br />

economy. That<br />

realises a vast and<br />

complex supply chain<br />

of professional<br />

services companies (ie<br />

businesses that offer<br />

not tangible goods,<br />

but rather knowledgebased<br />

skills that<br />

cannot be sourced inhouse).<br />

Azeem Aleem<br />

observes the cyber<br />

security implications<br />

Professional services companies often have<br />

privileged access to their clients’ IT<br />

systems and store highly sensitive<br />

customer and corporate data. That means they<br />

represent a cyber security risk. A detailed NTT<br />

Security poll conducted only last year found<br />

that an overwhelming number (60%) of global<br />

business decision-makers believe third parties<br />

like these to be the weakest security link in<br />

their organisation.<br />

Fixing this problem will require a rigorous,<br />

risk-based approach focused around security<br />

Best Practice and achieving visibility, control<br />

and continuous improvement.<br />

Professional services are, in many ways, the<br />

lifeblood of the UK’s economy. According to<br />

PwC, firms that carry out auditing, advisory, tax<br />

and similar account for 15% of the UK’s GDP,<br />

14% of employment and 14% of exports. Even<br />

that estimate is likely to be on the conservative<br />

side. In fact, the sector covers a vast swathe of<br />

businesses including law firms, architects,<br />

accountants, advertising and marketing<br />

agencies and many more.<br />

Professional services can include virtually<br />

anything that might be thought of as a<br />

knowledge-based skill. As such, digital<br />

infrastructure is vital to the smooth running of<br />

these services, enabling seamless online<br />

collaboration, reporting, analysis and auditing.<br />

Yet where there’s data, people and money,<br />

there’s always cyber risk. According to NTT<br />

Security’s data, the business and professional<br />

services sector became the most attacked in<br />

the EMEA last year, accounting for just over<br />

20% of all attacks. It was third globally,<br />

comprising 10% of attacks.<br />

Part of the problem stems from the sheer size<br />

and complexity of modern digital supply chains.<br />

Last year, one vendor reported that the average<br />

US or UK company shares sensitive data with<br />

over 580 third parties, with nearly 60% of them<br />

having experienced a breach caused by one of<br />

these firms. Three-quarters suggested they<br />

thought such incidents were increasing.<br />

Visibility appears to be a major challenge,<br />

though. Over a fifth (22%) of respondents to<br />

the study claimed they didn’t even know if they<br />

had suffered a breach episode.<br />

It also appears as if third party risk may still<br />

not be receiving the Board-level attention it<br />

deserves: only a third (37%) of respondents<br />

claimed they have enough resources to manage<br />

supplier relationships, while a similar number<br />

rated their third party risk management<br />

programme as being highly effective.<br />

Supply chains under attack<br />

Attackers are targeting professional services<br />

firms with one of two goals in mind. They’re<br />

either after sensitive client data stored by that<br />

firm or are targeting the supplier in a kind of<br />

‘stepping stone’ or ‘island hopping’ attack<br />

focused on infiltrating the networks of its<br />

customers. Half of all attacks analysed recently<br />

by one vendor used ‘island hopping’ tactics.<br />

Examples of both types of threat are<br />

numerous. Law firms represent a particularly<br />

attractive target given the large volumes of<br />

sensitive information they hold on clients.<br />

Perhaps the best example of the potential<br />

risks involved comes from two infamous data<br />

leaks at separate law firms dubbed ‘The<br />

Panama Papers’ and ‘The Paradise Papers’.<br />

These episodes exposed the offshore tax<br />

avoidance plans of a large number of<br />

businesses, celebrities and even world leaders,<br />

destroying the trust these customers placed in<br />

their legal advisors and putting one of the law<br />

firms in question, Mossack Fonseca, out of<br />

business altogether.<br />

The threat posed to the legal sector is clearly<br />

growing, as both financially motivated cyber<br />

criminals and nation states look for valuable<br />

data on M&A deals, patents and other sensitive<br />

52<br />


Cyber Security: Risk Mitigation for Professional Services<br />

client information. A PwC report from 2017<br />

claimed that 60% of law firms had reported an<br />

information security incident over the previous<br />

year (up from 42% in 2014). That same year,<br />

the UK Solicitors Regulation Authority<br />

estimated that circa £11 million had been lost<br />

to cyber crime in the previous 12 months.<br />

Sometimes, professional services firms are<br />

their own worst enemy when it comes to risk<br />

exposure. A 2018 report found over one million<br />

corporate e-mail addresses belonging to staff<br />

at the UK’s Top 500 law firms for sale on Dark<br />

Web sites. Most were linked to a password,<br />

offering cyber criminals a simple way in which<br />

to crack open corporate accounts. It’s believed<br />

employees had used these corporate<br />

credentials to register accounts with consumer<br />

sites like Facebook and LinkedIn, which were<br />

subsequently breached.<br />

Nation states join the fray<br />

In the other type of attack, professional<br />

services firms are targeted with a view to<br />

compromising their clients. Operation Cloud<br />

Hopper, uncovered in 2017, saw an attack<br />

group (namely APT10) with links to the Chinese<br />

state compromise managed service providers<br />

(MSPs) on an “unprecedented” scale.<br />

“Given the level of client network access<br />

MSPs have once APT10 has gained access to a<br />

MSP, it’s likely to be straightforward to exploit<br />

this and move laterally to the networks of<br />

potentially thousands of other victims,” noted<br />

PwC. “In turn, this would provide access to a<br />

larger amount of Intellectual Property (IP) and<br />

sensitive data. APT10 has been observed to<br />

exfiltrate stolen IP via the MSPs, hence evading<br />

local network defences.”<br />

Other techniques include ‘watering hole’<br />

attacks, whereby the website of a professional<br />

services firm is compromised in order to spread<br />

malware to the computers of partner<br />

organisations whose users are likely to visit it.<br />

One vendor has even warned of a ‘reverse<br />

business e-mail compromise’ attack in which<br />

hackers compromise the mail server of a supply<br />

chain organisation in order to spread fileless<br />

malware to trusted partners.<br />

The cyber risk from third party professional<br />

services firms doesn’t just include data theft,<br />

either. Below par security among suppliers<br />

could also expose organisations to the threat of<br />

ransomware. According to NTT Security’s<br />

findings, business and professional services<br />

firms experienced the second highest rate of<br />

ransomware infection globally last year.<br />

Given the scale of the threats confronting<br />

organisations, it’s time to elevate third party<br />

risk management to the level it deserves. The<br />

“The cyber risk from third party professional services firms<br />

doesn’t just include data theft, either. Below par security<br />

among suppliers could also expose organisations to the<br />

threat of ransomware”<br />

National Cyber Security Centre has developed<br />

some useful guidance setting out four key<br />

principles which should inform any programme.<br />

These are: understand the risks, establish<br />

control, check your arrangements and then<br />

work towards continuous improvement.<br />

Understanding the risks means being clear<br />

about what needs to be protected and why,<br />

knowing who your suppliers are and being<br />

aware of what – if any – security gaps they<br />

have. Establishing control is all about<br />

communicating minimum standards expected<br />

of suppliers, building these considerations into<br />

contracts and providing cyber security support<br />

to suppliers where and when needed.<br />

Assurance requirements – such as pen<br />

testing and/or formal certifications – should<br />

then be built into supply chain management.<br />

Finally, it’s a case of encouraging a culture of<br />

continuous improvement and mutual trust. This<br />

will need to develop through time as supply<br />

chains evolve and change over time.<br />

Risk-based foundation<br />

No organisation can expect to be completely<br />

insulated from cyber risk, but this approach<br />

seems to set a useful risk-based foundation<br />

upon which to build. As for specific steps that<br />

we would recommend, they should include first<br />

conducting data auditing to understand what<br />

needs to be protected and which suppliers<br />

handle which high-risk data.<br />

Best Practice security controls and processes<br />

can include tighter access controls along the<br />

lines of least privilege, enforced with risk-based<br />

multi-factor authentication. Anti-malware<br />

protection and threat detection are also a<br />

‘must’ on endpoints, networks and servers, as<br />

well as for e-mail and web gateways.<br />

Regular patch management should be<br />

another ‘given’, alongside continuous network<br />

monitoring. Incident response and pen testing<br />

plans must be run regularly to ensure IT teams<br />

have an up-to-date view of their risk profile.<br />

Modern techniques like threat hunting can also<br />

provide a more proactive approach towards<br />

security which will help in heading off any<br />

attacks before they impact the organisation.<br />

Finally, don’t forget the role of people in the<br />

security environment. They’re often thought of<br />

as the weakest link, but if properly trained they<br />

can provide a welcome first line of defence.<br />

Azeem Aleem: Vice-President<br />

of Consulting at NTT Security<br />

53<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Professional Development Paths for<br />

Security Managers and Supervisors<br />

development. This is accomplished – at least in<br />

part – as a direct result of leading by example.<br />

Whether it’s an<br />

aspiring protection<br />

officer or a university<br />

student who’s<br />

interested in a career<br />

in the security<br />

profession, we all<br />

know there’s no<br />

substitute for<br />

experience. It should<br />

be remembered,<br />

though, that security<br />

managers and<br />

supervisors gain reallife<br />

experiences as<br />

well as a formal<br />

education and<br />

industry certifications<br />

to help prepare them<br />

for the journey on the<br />

security career path,<br />

as Lawrence Fennelly<br />

and Marianna Perry<br />

explain in detail<br />

Across the last decade, there have been<br />

many changes both nationally in the US<br />

and on the international stage. The US<br />

Department of Homeland Security was formed<br />

to address the ever-growing threat of terrorism.<br />

Organised retail crime, active shooter incidents,<br />

identity theft and cyber crime along with<br />

natural disasters continue to be major concerns<br />

for today’s protection professionals.<br />

Consequently, the education and training<br />

provided in the security industry must meet<br />

those threats. Supervisors and managers must<br />

be well-versed in these topics and inspire their<br />

subordinates to acquire more education, either<br />

through a formal degree programme or via<br />

industry certifications (or both), on-the-job<br />

training and experience. They must emphasise<br />

professional growth and development of the<br />

individual security operative in order to<br />

promote organisational development.<br />

Organisational development occurs when<br />

substantial numbers of the protection<br />

organisation have undergone professional<br />

development experiences. Programmes offered<br />

by the International Foundation of Protection<br />

Officers (IFPO) and our partner organisations<br />

are examples of professional growth<br />

experiences. Individual employers and colleges<br />

may create their own formal degree<br />

programmes and industry certifications.<br />

Regardless of the career path, the security<br />

supervisor is the conduit for professional<br />

growth. He or she must embrace opportunities<br />

for professional and organisational<br />

Defining the supervisor<br />

A security supervisor is someone who<br />

represents higher authority. The person who<br />

assesses situations and conditions to make onthe-spot<br />

judgements without favour, prejudice<br />

or fear. The person who’s a responder to any<br />

and all situations. The individual who must<br />

galvanise the efforts of many to attain stated<br />

goals. The person who must assign tasks and<br />

ensure compliance and constant quality<br />

performance. The person who’s accountable<br />

and, therefore, first in line to shoulder reaction,<br />

both good and bad. Finally, the supervisor is<br />

the person who must make decisions for<br />

management based on his or her own<br />

professional development.<br />

What does it mean to be a supervisor? First<br />

of all, a security supervisor may be called upon<br />

to handle different types of conflicts in myriad<br />

circumstances. Second, a security supervisor<br />

will be required to meet the expectations of<br />

management and/or the client in the daily<br />

routine of security operations. The security<br />

supervisor is the backbone of the organisation.<br />

His/her scope of responsibility is rather unique.<br />

A security manager designs and develops<br />

security, safety and investigative programmes.<br />

A manager works with budgets and other<br />

resources (equipment, uniforms, technology<br />

and software etc) to ensure that the protective<br />

mission is achieved. A manager oversees<br />

processes (procedures) that accomplish<br />

organisational goals and objectives. A manager<br />

is responsible for staff functions if there’s no<br />

supervisory span of control over line<br />

employees. This includes training, technical<br />

support and auditing, etc.<br />

Further, a manager should co-ordinate<br />

activity rather than supervise it. A manager is<br />

charged with policy formulation. A manager<br />

oversees line supervisors such as shift leaders<br />

and interacts with department heads as well as<br />

members of upper management.<br />

Professional development<br />

Professional development is a critical concept.<br />

It’s the pathway for supervisors to become<br />

managers. By professional development, we’re<br />

referring to the following key areas:<br />

• Leadership and networking skills are critical<br />

54<br />


Training and Career Development<br />

and the supervisor in transition knows the<br />

value of career development<br />

• Communicative abilities need to include oral,<br />

written and computer skills<br />

• Reasoning and logical thinking are very much<br />

must-have abilities<br />

• Formal training, accreditation and/or<br />

certification are needed for professional growth<br />

and personal satisfaction<br />

• A personal and professional Code of Ethics<br />

must be developed along with high standards<br />

by which the individual is guided<br />

• Never underestimate the value of mentoring<br />

and coaching through on-the-job training and<br />

in-house programmes<br />

• Knowledge of risk assessment and security<br />

countermeasures is ultimately important<br />

• Turnover and job rotation can create overall<br />

improvement and present a variety of new<br />

learning environments<br />

• Stay current on industry events by reviewing<br />

news sources such as trade publications<br />

• As the job changes, so must the training and<br />

the level of skill within the Security Department<br />

increase. Professionals develop a ‘discipline of<br />

training’ and continuously seek to improve their<br />

knowledge and abilities<br />

In with the new<br />

The most demanding problem for supervisors<br />

within a Security Department will be the<br />

transition from the position of security officer to<br />

that of supervisor. The supervisor’s role should<br />

be to assist in enabling the manager to provide<br />

a level of support within the organisation.<br />

Supervisors must take responsibility for<br />

corporate regulations and the moral and ethical<br />

tone of the Security Department as well as<br />

provide the required level of security and<br />

customer service.<br />

Similarly, new managers have some<br />

adjusting to do. As a new manager, the<br />

individual has to learn how to develop and<br />

exercise (not abuse) newly-acquired authority,<br />

power and influence effectively. This can be<br />

done by establishing credibility (ie earning the<br />

commitment and support of subordinates).<br />

Management is an art as well as a science. It<br />

is, perhaps, more art than science. New<br />

managers are at the crossroads, looking to<br />

make the right turns. Consider the following:<br />

• A new manager is the person in charge.<br />

His/her elevation to manager through<br />

promotion has given him/her the authority<br />

• A new manager is a person with a level of<br />

power and a decision-maker<br />

• A new manager is knowledgeable in his/her<br />

chosen field<br />

• A new manager uses his/her developed skills,<br />

“Supervisors must take responsibility for corporate<br />

regulations and the moral and ethical tone of the Security<br />

Department as well as provide the required level of<br />

security and customer service”<br />

ideas, education, certifications and experience<br />

• A new manager supervises his/her<br />

subordinates and passes information down the<br />

line as well as up the chain of command<br />

• A new manager has the responsibility to be<br />

aware of employer policy as well as client<br />

requirements and the level of security required<br />

within the organisation<br />

• A new manager develops his/her on-the-job<br />

experience as a new manager and starts to<br />

understand and accept the new responsibilities<br />

as well as what it means to be a manager<br />

A manager who has been promoted to the<br />

rank of supervisor or manager should learn how<br />

to supervise and adjust to the new role,<br />

develop leadership skills and the training of<br />

others, develop interpersonal skills and<br />

become a mentor to others, develop knowledge<br />

of who they are and learn how to cope and deal<br />

with the stress and emotion associated with<br />

management concerns.<br />

As someone progresses in his/her career,<br />

these learning points become ingrained. They<br />

become second nature. They become part of<br />

the individual.<br />

Agents of change<br />

As the last link between senior management<br />

and line employees or customers, it’s the<br />

leader’s job to assist in the implementation of<br />

change. To do this, certain obstacles must be<br />

overcome. There are several strategies for<br />

reducing resistance to change. Much resistance<br />

to change comes from lack of trust or people<br />

having to operate outside of their comfort zone.<br />

Resistance can sometimes be overcome or<br />

the impact lessened if the following actions are<br />

taken by the leader:<br />

• Fully explain the upcoming changes<br />

• Make certain employees or customers fully<br />

understand the change<br />

• When possible, discuss why the change is<br />

required in the first place<br />

• Identify and discuss the possible effects with<br />

employees or customers<br />

• Answer questions or take the information and<br />

then follow-up if you don’t know the answer<br />

• Be honest and consistent<br />

Being on the front line, fully prepared and<br />

always willing to make the tough decisions is<br />

really what being an effective security<br />

supervisor or manager is all about.<br />

Lawrence Fennelly CPOI CSSI:<br />

Secretary of the International<br />

Foundation of Protection<br />

Officers (IFPO)<br />

Marianna Perry MS CPP CPOI:<br />

Board Director of the<br />

International Foundation of<br />

Protection Officers (IFPO)<br />

55<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Risk in Action<br />

Risk in Action<br />

PAC proves to be<br />

tower of strength at<br />

London’ s mixed use<br />

Sutton Point<br />

development<br />

Located in South West<br />

London on the site of a<br />

former office block, Sutton<br />

Point is a cutting-edge mixed<br />

use development that<br />

features contemporary<br />

apartments surrounded by a<br />

diverse range of amenities. In order to provide residents with the highest level<br />

of security, access control technology from PAC (part of the Stanley Products &<br />

Solutions Group) has been installed in key areas of the complex.<br />

After the full demolition of an existing tower, the space now comprises three<br />

main structures – the East Tower, the Centre Tower and the West Tower. Within<br />

them are 332 one and two-bedroom apartments, a number of three-bedroom<br />

luxury penthouses, 21,000 ft 2 of retail space, 18,000 ft 2 of office space and a<br />

150-bedroom hotel, as well as a health and fitness centre, roof gardens, a<br />

cinema, shops and cafés.<br />

Following on from a thorough tender process, Harrow-based security systems<br />

and building technology integrator Interphone Limited was appointed to<br />

design, specify and install a fully-integrated security system. This included an<br />

optical fibre infrastructure, door entry, networked CCTV, an integrated<br />

reception system and access control.<br />

The access control solution needed to integrate with all other elements of the<br />

security system, so it was essential for Interphone to have highly responsive<br />

working relationships in place with its key technology partners.<br />

Easily configured to operate on a standalone PC or across a corporate<br />

network, SecureNet displays detailed real-time event information from a given<br />

facility. At Sutton Point, it’s configured to enable all management tasks related<br />

to the tenants and staff to be administered from a central computer as and<br />

when required, thereby ensuring the highest levels of security around the site.<br />

Integrated perimeter protection<br />

helps to secure Wales & West<br />

Utilities’ gas distribution<br />

Six Critical National Infrastructure (CNI)<br />

utilities sites across South West England and<br />

Wales have been secured from terrorist<br />

attacks and ongoing criminal threats in a<br />

£3.25 million security project.<br />

Gas distributor Wales & West Utilities<br />

appointed principal contractor Chubb Systems<br />

and Littlewood Fencing to work collaboratively<br />

on a fully-integrated perimeter protection<br />

upgrade. Littlewood Fencing has secured the<br />

perimeters with a Lochrin Bain ‘Combi’ Centre<br />

for the Protection of National Infrastructure<br />

(CPNI)-approved palisade fence system<br />

enhanced with Gallagher monitored pulse<br />

Addressable fire panel from Kentec<br />

actively protects Kent, Surrey and<br />

Sussex Air Ambulance headquarters<br />

Members of staff and the array of air<br />

ambulance helicopters housed at the Kent,<br />

Surrey and Sussex Air Ambulance headquarters<br />

in Chatham are being protected from the risk of<br />

fire outbreak by a fire safety solution that<br />

centres around the new Taktis addressable fire<br />

panel designed and developed by Kentec.<br />

The main office building at the headquarters<br />

is actively monitored by the Taktis panel in<br />

tandem with hard-wired Hochiki detectors, with<br />

wireless versions specified to cover the<br />

helicopter hangar.<br />

Alvin Lewis, operations manager at CSG Fire<br />

and Security (the company that installed the<br />

system) states that the customer has been<br />

impressed by the new panel. “We’ve worked<br />

with Kentec panels exclusively for about 15<br />

years now and the latest version is the best one<br />

we’ve installed. From our point of view, it’s very<br />

easy to install. Our engineers very rarely have<br />

any issues with it. From a customer<br />

perspective, the new touch screen on the panel<br />

has made it even easier to operate.”<br />

Kevin Swann, managing director at Kentec,<br />

feels the addressable panel is providing a new<br />

level of convenience and functionality. “The<br />

evolution of the Taktis family provides the<br />

utmost in flexibility for system designers.”<br />

fencing to a height of four metres. Crime &<br />

Fire Defence Systems’ MAP vault panels, CCTV<br />

towers, security and field marshalling kiosks<br />

have also been added along with associated<br />

concrete and civil works.<br />

In total, more than 2,500 metres of fencing<br />

has been installed along with 12 CPNI BASE<br />

vehicle gates and six Crime & Fire Defence<br />

Systems MAP vaults. With a number of sites<br />

located on the Brecon Beacons, access issues<br />

and inclement weather conditions made<br />

collaborative project management essential.<br />

Gallagher’s business development manager<br />

Jason Hunter said: “A Gallagher MPF delivers<br />

safe and controlled energised pulses. If seeing<br />

the fence and warning signage isn’t enough of<br />

a deterrent for criminals then receiving a short<br />

sharp shock should definitely deter them.”<br />

56<br />


Technology in Focus<br />

Technology in Focus<br />

Heald’s award-winning Matador sliding bollard range excels<br />

in double crash tests<br />

Heald has announced the success of<br />

two recent crash tests for Matador, the<br />

company’s award-winning sliding<br />

bollard system. The firm – which is<br />

based in Hornsea, East Yorkshire –<br />

designs and manufactures a range of<br />

products and solutions to protect highprofile<br />

buildings and pedestrianised<br />

areas from the ongoing threat of<br />

vehicle-borne attacks.<br />

Heald’s HT3-Matador 4, which had<br />

already been crash-tested to PAS 68 standards, has achieved a new record with<br />

an IWA crash test against a 7.2-tonne N2A specification truck travelling at a<br />

recorded speed of 80 kph (50 mph).<br />

The latest configuration, the HT2-Matador 6, consists of four central moving<br />

bollards and two fixed bollards to accommodate access for large vehicles or<br />

tight turning circles and has succeeded in its PAS 68 crash test, halting a 7.5-<br />

tonne truck travelling at a recorded speed of 64 kph (40 mph).<br />

www.heald.uk.com<br />

IDIS introduces DirectIP<br />

Super Fisheye 5 MP Compact<br />

camera as extension to range<br />

IDIS has launched the DirectIP Super<br />

Fisheye 5 MP Compact camera (DC-<br />

Y6513RX), thereby further extending<br />

its popular Super Fisheye range.<br />

Fisheye cameras are some of IDIS’<br />

best-selling models thanks to their<br />

dual-side de-warping and Smart UX<br />

Controls, allowing for smooth and intuitive panning, tracking and zooming with<br />

both ease and accuracy.<br />

The introduction of the DC-Y6513RX reflects IDIS’ continued commitment to<br />

market-responsive innovation and meets installer and end user requests for a<br />

more compact 360° camera that can capture HD images in all lighting<br />

conditions without blind spots. It also allows customers to benefit from heat<br />

mapping without the cost of additional appliances or analytics software.<br />

A broad, high-specification camera available in a compact form, the new<br />

Super Fisheye 5 MP model builds on the success of earlier IDIS Super Fisheye<br />

cameras, including the 12 MP DC-Y3C14WRX. It meets current industry<br />

demands for clear and accurate image capture, long-term performance and<br />

reliability, while also offering end users a low total cost of ownership.<br />

“The Super Fisheye 5 MP Compact camera is a great choice for wide area<br />

surveillance and is already contributing to successful project wins for our<br />

integration partners in retail applications, education, healthcare and other<br />

environments where customers benefit from cost-effective and simple-to-use<br />

analytics,” explained James Min, managing director for IDIS Europe.<br />

The IDIS 5 MP IR Compact Fisheye camera’s features include IDIS Smart UC<br />

Controls to enable very high accuracy and ease-of-use, with intuitive ‘rubber<br />

band’-style control designed to deliver “a new level” of operator experience.<br />

There’s “super smooth de-warping” on the camera as well as on desktop<br />

applications and mobile devices for out-of-hours monitoring for end users.<br />

www.idisglobal.com<br />

EmeRed device assists end users<br />

with emergency lighting tests<br />

Vericon Systems – the provider of innovative<br />

building management systems and<br />

technologies – has launched EmeRed, an<br />

intelligent device that automates the<br />

process of testing emergency lighting to<br />

ensure such lighting is working when<br />

needed, in turn helping facilities and on-site<br />

safety managers to comply with relevant<br />

Health and Safety legislation.<br />

The intelligent device “re-imagines” how<br />

new technology can be created to improve<br />

safety, ensure compliance and reduce costs<br />

for the host organisation.<br />

EmeRed monitors the performance of<br />

every light and automatically transmits the<br />

results to a dedicated portal that can be<br />

accessed online via the cloud.<br />

www.vericonsystems.com<br />

Xellip2’s integration with Milestone<br />

VMS affords “seamless control”<br />

Castel Communication & Security’s open<br />

protocol Xellip2 IP intercom has been<br />

integrated with Milestone’s Xprotect video<br />

management system (VMS) to offer “seamless<br />

interoperability” between systems.<br />

The ONVIF-compatible Xellip2 features a<br />

1200 x 800 wide-angle HD camera. Sporting a<br />

sleek and contemporary design with backlit and<br />

flushed nameplates, the Xellip2 has two output<br />

relays and two inputs for third party<br />

integration. In addition, it features two Ethernet<br />

ports (ie a PoE plus an additional port for<br />

serial/bus architecture type and loopback).<br />

www.castel.co.uk<br />

57<br />

www.riskxtra.com>


BENCHMARK<br />

Smart Solutions<br />

BENCHMARK<br />

Innovative and smart solutions can add value and benefits to<br />

modern systems for customers. With the technological landscape<br />

rapidly evolving, the Benchmark Smart Solutions project assesses<br />

the potential on offer from system integration, advanced<br />

connectivity and intelligent technology. Bringing together field trials<br />

and assessments, proof of concept and real-world experience of<br />

implementing smart solutions, it represents an essential resource<br />

for all involved in innovative system design.<br />

Launched in 2017, Benchmark Smart Solutions is the industry’s only real-world resource for security<br />

professionals who are intent on offering added value through the delivery of smarter solutions.<br />

@Benchmark_Smart<br />

Partner Companies<br />

www.benchmarksmart.com


x<br />

RISKXtra<br />

Appointments<br />

Baroness Ruth Henig<br />

CBE DL<br />

After an eight-year term as<br />

chairman of the Chartered<br />

Security Professionals<br />

Registration Authority<br />

(CSPRA), Lord Alex Carlile<br />

CBE QC has stepped down<br />

from the role and passed<br />

the baton to The Security<br />

Institute’s President Baroness Ruth Henig CBE.<br />

Baroness Henig is non-executive chairman of<br />

SecuriGroup. Her commitment to security and<br />

policing is well documented having held the<br />

post of chair of the Lancashire Police Authority<br />

and chair of the Association of Police<br />

Authorities in England and Wales which led to<br />

the award of a CBE from Her Majesty The Queen<br />

back in 2000 for services to policing.<br />

Baroness Henig was appointed as Deputy<br />

Lieutenant for Lancashire in 2002 and made a<br />

life peer in 2004 as Baroness Henig of<br />

Lancaster. As a Deputy Speaker in the House of<br />

Lords, Baroness Henig takes her place on the<br />

European Security Committee on Foreign Affairs<br />

and is also a member of the Independent<br />

Policing Commission.<br />

The CSPRA is the dedicated Committee which<br />

was established to oversee the management<br />

and maintenance of standards for the Register<br />

of Chartered Security Professionals.<br />

Commenting on her appointment, Baroness<br />

Henig (former chair of the Security Industry<br />

Authority) said: “It’s a great honour to follow<br />

Lord Alex Carlile as chair. I very much look<br />

forward to working with senior security<br />

professionals on the Registration Authority. We<br />

all share a strong commitment to raise<br />

professional standards across the private<br />

security sector and encourage those working in<br />

the industry to gain Chartered status.”<br />

Appointments<br />

Risk Xtra keeps you up-to-date with all the latest people<br />

moves in the security, fire, IT and Government sectors<br />

Paul Lotter<br />

Paul Lotter has been promoted to the role of<br />

managing director for Corps Security’s security<br />

guarding business.<br />

Lotter has served as regional operations<br />

director for Corps Security since June last year.<br />

His focus has been on operations within London<br />

and the South of England, overseeing all<br />

aspects of service delivery to Corps Security’s<br />

myriad customers.<br />

The new appointment comes at a pivotal time<br />

for the business as it develops its suite of<br />

cutting-edge security solutions.<br />

In his new role, Lotter will look to strengthen<br />

Corps Security’s well-established security<br />

guarding offer with the latest sensor and CCTV<br />

surveillance technology as well as hospitalityfocused<br />

concierge services.<br />

Lotter boasts more than 20 years’ experience<br />

in the security industry. Before joining Corps<br />

Security, he worked with various service<br />

providers across a range of high-profile<br />

corporate sites in the South West of England<br />

and around Greater London. Lotter’s expertise<br />

really lies in managing the strategic direction of<br />

all operational security requirements.<br />

Commenting on his promotion, Lotter<br />

informed Risk Xtra: “It has been great working<br />

for a strong brand with such a powerful<br />

heritage. I’m really looking forward to further<br />

developing our services for customers by<br />

looking at the integration of technology through<br />

our Remote Monitoring Centre.”<br />

Billy Horgan<br />

Axis Group, one of the UK’s fastest-growing<br />

security, cleaning, Front of House and support<br />

services organisations, has appointed Billy<br />

Horgan as head of recruitment to further<br />

strengthen its people strategy aimed at<br />

attracting and retaining the very best talent<br />

across all parts of the business.<br />

Horgan joins from Hermes, where he was<br />

tasked with reducing recruitment costs and<br />

bringing processes in-house. Horgan has also<br />

worked for FM and construction recruitment<br />

agencies where he was responsible for setting<br />

team strategies and goals.<br />

Horgan has organised regular recruitment<br />

open days, which have attracted an additional<br />

120 security officers within the first three<br />

months. He has also introduced a new Applicant<br />

Tracking System that has streamlined the<br />

recruitment process, as well as providing further<br />

insight on Axis Group’s myriad stakeholders.<br />

Internally, Horgan is also promoting how<br />

existing staff can apply for new roles in order to<br />

help further employee progression.<br />

Horgan told Risk Xtra: “Attracting a higher<br />

volume of candidates is key to the strategy. By<br />

increasing the number of CVs we’re sent, we<br />

have a higher chance of finding the quality of<br />

employee that the business requires.”<br />

Jonathan Levine, Axis Group’s CEO, stated:<br />

“Billy will undoubtedly assist the Axis Group to<br />

deliver the best talent for its customers.”<br />

59<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Appointments<br />

David McCann<br />

Cordant Security, part of the Cordant Group, has further<br />

strengthened its senior management team with the<br />

appointment of David McCann to the role of risk and<br />

resilience director. McCann will now oversee the risk<br />

mitigation and resilience requirements for the company<br />

and its myriad clients.<br />

McCann is a specialist in crisis management, counterterrorism,<br />

risk assessment, close protection, operations<br />

management and physical security. He joins Cordant<br />

Security from First Security, where he was head of risk working on the<br />

company’s prestigious contract at the BBC. Responsibilities for that role<br />

included directing all security and risk management processes. This<br />

encompassed the legal governance of risk documents and protocols.<br />

McCann has also served as a counter-terrorism advisor for corporate<br />

contingency planning and was the Centre for the Protection of National<br />

Infrastructure’s lead for company risk.<br />

From 2004 until 2012, McCann was national training manager at The Senate<br />

Group with responsibility for providing security solutions to safeguard public<br />

and private sector organisations alike. He has also served as the lead<br />

security/training consultant for several Government agencies.<br />

Mark Briers<br />

Cranfield University and<br />

The Alan Turing Institute<br />

have jointly appointed<br />

Mark Briers as Professor<br />

of Cyber Security as the<br />

two organisations look to<br />

align their research and<br />

education agendas in<br />

Artificial Intelligence (AI)<br />

for defence, security and cyber security.<br />

Briers is the defence and security programme<br />

director for The Alan Turing Institute and, going<br />

forward, will be based at Cranfield University’s<br />

secure site at Shrivenham as well as The Alan<br />

Turing Institute’s headquarters in London.<br />

As part of this new role, Briers will be<br />

combining Cranfield University’s knowledge<br />

and experience in defence and security with<br />

The Alan Turing Institute’s foundational<br />

research base in data science and AI “in order<br />

to drive operational and societal impact”.<br />

Professor Mark Richardson, pro-vicechancellor<br />

for defence and security at Cranfield<br />

University, said: “It’s widely recognised that<br />

there’s a national and international skills<br />

shortage in data science and AI in all sectors,<br />

including defence and security. With Mark’s<br />

appointment and our evolving partnership with<br />

The Alan Turing Institute, we look forward to<br />

working together to tackle this gap through our<br />

education and research initiatives.”<br />

Professor Mark Briers responded: “It’s an<br />

honour to work at the intersection of two worldleading<br />

research and educational organisations<br />

and drive scientific and real-world impact. I’m<br />

excited by the opportunities ahead.”<br />

John Sephton MSyI<br />

MISRM<br />

John Sephton, an account<br />

director at Axis Security,<br />

has been appointed to<br />

the Board of Directors at<br />

The Security Institute.<br />

Sephton will now<br />

actively support the<br />

Institute in promoting the<br />

highest possible standards of integrity and<br />

professional competence in transacting the<br />

business of security.<br />

In addition to attending the Board’s AGM,<br />

conferences and strategy meetings, Sephton<br />

will have shared responsibility for membership<br />

communications, the Institute’s vitally<br />

important Continuing Professional<br />

Development programme, existing and new<br />

member engagement and the promotion of the<br />

prestigious Chartered Security Professional<br />

(CSyP) qualification.<br />

Having started out as a security officer,<br />

Sephton told Risk Xtra that he’s “honoured” to<br />

have been selected by the Institute for a<br />

prestigious director’s role. He stated: “I believe<br />

in mentoring security officers to help them<br />

realise their potential and achieve their goals.”<br />

Mike Hurst CPP<br />

In an effort to continue<br />

its expansion into<br />

various international<br />

markets, the<br />

International<br />

Foundation for<br />

Protection Officers<br />

(IFPO) has appointed<br />

Mike Hurst CPP to serve<br />

as the organisation’s representative in the<br />

UK. After several discussions with Hurst, the<br />

IFPO’s executive director Sandi Davies feels<br />

confident that he embraces the same goals<br />

and objectives as that of the Foundation.<br />

Hurst has spent over three decades<br />

operating in the security and fire professions<br />

as a specialist recruitment consultant and<br />

strategic advisor with HJA Consult (formerly<br />

HJA Fire and Security) and is also the cofounder<br />

of www.AllSecurityEvents.com (the<br />

dedicated security events listing site).<br />

Hurst is vice-chairman of the UK Chapter of<br />

ASIS International. He has held this role for<br />

nine years and also serves on the<br />

organisation’s Professional Development<br />

Council and its European Advisory Council.<br />

Hirst was a director of The Security<br />

Institute, standing down in 2017 having<br />

served the maximum six-year term of office.<br />

60<br />


Trial the technologies shaping the future of security.<br />

<br />

<br />

<br />

Show Me How<br />

<br />

To register for free visit: ifsec.co.uk/benchmark<br />

Running alongside:


ACCESS CONTROL<br />

ACCESS CONTROL<br />

ACCESS CONTROL<br />

KERI SYSTEMS UK LTD<br />

Tel: + 44 (0) 1763 273 243<br />

Fax: + 44 (0) 1763 274 106<br />

Email: sales@kerisystems.co.uk<br />

www.kerisystems.co.uk<br />

ACCESS CONTROL MANUFACTURER<br />

INTEGRATED DESIGN LIMITED<br />

Integrated Design Limited, Feltham Point,<br />

Air Park Way, Feltham, Middlesex. TW13 7EQ<br />

Tel: +44 (0) 208 890 5550<br />

sales@idl.co.uk<br />

www.fastlane-turnstiles.com<br />

ACCESS CONTROL<br />

NORTECH CONTROL SYSTEMS LTD.<br />

Nortech House, William Brown Close<br />

Llantarnam Park, Cwmbran NP44 3AB<br />

Tel: 01633 485533<br />

Email: sales@nortechcontrol.com<br />

www.nortechcontrol.com<br />

ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />

SECURE ACCESS TECHNOLOGY LIMITED<br />

Authorised Dealer<br />

Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />

Email: info@secure-access.co.uk<br />

Website: www.secure-access.co.uk<br />

HVM<br />

HTC PARKING AND SECURITY LIMITED<br />

St. James’ Bus. Centre, Wilderspool Causeway,<br />

Warrington Cheshire WA4 6PS<br />

Tel 01925 552740 M: 07969 650 394<br />

info@htcparkingandsecurity.co.uk<br />

www.htcparkingandsecurity.co.uk<br />

FRONTIER PITTS LTD<br />

+44 (0) 1293 422800<br />

marketing@frontierpitts.com<br />

www.frontierpitts.com


CCTV & IP SECURITY SOLUTIONS<br />

PANASONIC SYSTEM<br />

COMMUNICATIONS COMPANY EUROPE<br />

Panasonic House, Willoughby Road<br />

Bracknell, Berkshire RG12 8FP UK<br />

Tel: 0207 0226530<br />

Email: info@business.panasonic.co.uk<br />

CCTV POLES, COLUMNS, TOWERS AND<br />

MOUNTING PRODUCTS<br />

ALTRON COMMUNICATIONS<br />

EQUIPMENT LTD<br />

Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />

Tel: +44 (0) 1269 831431<br />

cctvsales@altron.co.uk www.altron.co.uk<br />

CCTV<br />

CCTV<br />

MODICAM EUROPE<br />

Rapid Deployment Digital IP High Resolution CCTV40<br />

hour battery, Solar, Wind Turbine and Thermal Imaging<br />

Wired or wireless communication fixed IP. CE Certified.<br />

Modicam Europe, 5 Station Road, Shepreth,<br />

Cambridgeshire SG8 6PZ<br />

www.modicam.com sales@modicameurope.com<br />

CCTV SPECIALISTS<br />

PLETTAC SECURITY LTD<br />

Unit 39 Sir Frank Whittle Business Centre,<br />

Great Central Way, Rugby, Warwickshire CV21 3XH<br />

Tel: 01788 567811 Fax: 01788 544 549<br />

Email: jackie@plettac.co.uk www.plettac.co.uk<br />

CONTROL ROOM & MONITORING<br />

ADVANCED MONITORING SERVICES<br />

CCTV<br />

G-TEC DISTRIBUTION<br />

Gtec House, 35-37 Whitton Dene<br />

Hounslow, Middlesex TW3 2JN<br />

Tel: 0208 898 9500<br />

www.gtecsecurity.co.uk<br />

sales@gtecsecurity.co.uk<br />

EUROTECH MONITORING SERVICES LTD.<br />

Specialist in:- Outsourced Control Room Facilities •<br />

Lone Worker Monitoring • Vehicle Tracking • Message<br />

Handling • Help Desk Facilities • Keyholding/Alarm<br />

Response<br />

Tel: 0208 889 0475 Fax: 0208 889 6679<br />

E-MAIL eurotech@eurotechmonitoring.net<br />

Web: www.eurotechmonitoring.net


DISTRIBUTORS<br />

LEADING DISTRIBUTOR OF CONVERGED IP<br />

SOLUTIONS, INCLUDING CCTV AND ACCESS CONTROL<br />

ONLINE SECURITY PRODUCTS<br />

Security distributors direct to installers, property<br />

maintenance & facilities management companies<br />

MAYFLEX<br />

Our product range not only covers IP security products<br />

but also incorporates the cabling infrastructure and the<br />

Ethernet switching products necessary for a comprehensive<br />

security installation. We have a knowledgeable team<br />

of sales and technical experts that provide advice and<br />

support with system design and product choice. You can<br />

also order online up to 8pm for next day FREE delivery.<br />

Excel House, Junction 6 Industrial Park, Electric Avenue,<br />

Birmingham, B6 7JJ<br />

Tel: 0800 75 75 65 www.mayflex.com<br />

THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP,<br />

CCTV, ACCESS CONTROL AND INTRUDER DETECTION<br />

SOLUTIONS<br />

Phone 0800 880 6123<br />

Phone 0113 850 6123<br />

sales@onlinesecurityproducts.co.uk<br />

www.onlinesecurityproducts.co.uk<br />

AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />

DISTRIBUTOR OF SECURITY AND LOW VOLTAGE<br />

PRODUCTS.<br />

NORBAIN SD LTD<br />

210 Wharfedale Road, IQ Winnersh, Wokingham,<br />

Berkshire, RG41 5TP<br />

Tel: 0118 912 5000 Fax: 0118 912 5001<br />

www.norbain.com<br />

Email: info@norbain.com<br />

IDENTIFICATION<br />

ADI GLOBAL DISTRIBUTION<br />

Distributor of electronic security systems and solutions<br />

for over 250 leading manufacturers, the company also<br />

offers an internal technical support team, dedicated<br />

field support engineers along with a suite of training<br />

courses and services. ADI also offers a variety of fast,<br />

reliable delivery options, including specified time delivery,<br />

next day or collection from any one of 28 branches<br />

nationwide. Plus, with an ADI online account, installers<br />

can order up to 7pm for next day delivery.<br />

Tel: 0161 767 2990 Fax: 0161 767 2999 Email:<br />

sales.uk@adiglobal.com www.adiglobal.com/uk<br />

WWW.IDENTIFICATIONSOLUTIONS.CO.UK<br />

IDENTIFICATION SOLUTIONS<br />

Members • Staff • Visitors • Contractors • Conference<br />

• Clubs • Delegates • Corporate ID<br />

www.identificationsolutions.co.uk


COMPLETE SOLUTIONS FOR IDENTIFICATION<br />

PERIMETER PROTECTION<br />

PERIMETER PROTECTION<br />

DATABAC GROUP LIMITED<br />

1 The Ashway Centre, Elm Crescent,<br />

Kingston upon Thames, Surrey KT2 6HH<br />

Tel: +44 (0)20 8546 9826<br />

Fax:+44 (0)20 8547 1026<br />

enquiries@databac.com<br />

INDUSTRY ORGANISATIONS<br />

TRADE ASSOCIATION FOR THE PRIVATE SECURITY<br />

INDUSTRY<br />

GPS PERIMETER SYSTEMS LTD<br />

14 Low Farm Place, Moulton Park<br />

Northampton, NN3 6HY UK<br />

Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />

E-mail: info@gpsperimeter.co.uk<br />

Web site: www.gpsperimeter.co.uk<br />

POWER<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

BSIA<br />

Tel: 0845 389 3889 Email: info@bsia.co.uk<br />

Website: www.bsia.co.uk Twitter: @thebsia<br />

INTEGRATED SECURITY SOLUTIONS<br />

SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />

HONEYWELL COMMERCIAL SECURITY<br />

Tel: +44 (0) 844 8000 235<br />

E-mail: securitysales@honeywell.com<br />

ADEPT POWER SOLUTIONS LTD<br />

Adept House, 65 South Way, Walworth Business Park<br />

Andover, Hants SP10 5AF<br />

Tel: 01264 351415 Fax: 01264 351217<br />

Web: www.adeptpower.co.uk<br />

E-mail: sales@adeptpower.co.uk<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

INTEGRATED SECURITY SOLUTIONS<br />

INNER RANGE LTD<br />

Units 10 - 11, Theale Lakes Business Park, Moulden Way,<br />

Sulhampstead, Reading, Berkshire RG74GB<br />

Tel: +44(0) 845 470 5000<br />

Fax: +44(0) 845 470 5001<br />

Email: ireurope@innerrange.co.uk<br />

www.innerrange.com<br />

UNINTERRUPTIBLE POWER SUPPLIES LTD<br />

Woodgate, Bartley Wood Business Park<br />

Hook, Hampshire RG27 9XA<br />

Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk<br />

www.upspower.co.uk


SECURITY<br />

LIFE SAFETY EQUIPMENT<br />

INTRUSION DETECTION AND PERIMETER PROTECTION<br />

OPTEX (EUROPE) LTD<br />

Redwall® infrared and laser detectors for CCTV applications<br />

and Fiber SenSys® fibre optic perimeter security<br />

solutions are owned by Optex. Platinum House, Unit<br />

32B Clivemont Road, Cordwallis Industrial Estate,<br />

Maidenhead, Berkshire, SL6 7BZ<br />

Tel: 01628 631000 Fax: 01628 636311<br />

sales@optex-europe.com www.optex-europe.com<br />

C-TEC<br />

Challenge Way, Martland Park,<br />

Wigan WN5 OLD United Kingdom<br />

Tel: +44 (0) 1942 322744<br />

Fax: +44 (0) 1942 829867<br />

Website: www.c-tec.com<br />

PERIMETER SECURITY<br />

INTRUDER AND FIRE PRODUCTS<br />

CQR SECURITY<br />

125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />

Tel: 0151 606 1000 Fax: 0151 606 1122<br />

Email: andyw@cqr.co.uk www.cqr.co.uk<br />

TAKEX EUROPE LTD<br />

Aviary Court, Wade Road, Basingstoke<br />

Hampshire RG24 8PE<br />

Tel: +44 (0) 1256 475555<br />

Fax: +44 (0) 1256 466268<br />

Email: sales@takex.com<br />

Web: www.takex.com<br />

SECURE CONNECTIVITY PROVIDERS<br />

SECURITY SYSTEMS<br />

CSL GROUP<br />

T: +44 (0)1895 474 474<br />

sales@csl-group.com<br />

@CSLDualCom<br />

www.csl-group.com<br />

ONLINE SECURITY SUPERMARKET<br />

BOSCH SECURITY SYSTEMS LTD<br />

PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />

Tel: 0330 1239979<br />

E-mail: uk.securitysystems@bosch.com<br />

Web: uk.boschsecurity.com<br />

EBUYELECTRICAL.COM<br />

Lincoln House, Malcolm Street, Derby DE23 8LT<br />

Tel: 0871 208 1187<br />

www.ebuyelectrical.com


VACANT PROPERTY TO<br />

SECURE?<br />

WE HAVE THE<br />

SOLUTION<br />

Steel Screens, Keyless Security Doors,<br />

Wireless Alarms, Temporary CCTV and<br />

Property Inspections. Our security solutions<br />

protect your vacant property against the<br />

threat of vandalism, theft, arson and<br />

squatters. FAST.<br />

With over 25 years’ experience, we’ll only<br />

install the most suitable and cost-effective<br />

solution for your individual property.<br />

www.clearwaysecurity.com | Tel: 0207 096 7736


Secure operations 24/7 to see all the details,<br />

all the time with Bosch FLEXIDOME IP starlight 8000i.<br />

With quick installation plus wireless and remote commissioning, camera<br />

adjustments can be corrected whenever needed plus up to 4k Ultra HD<br />

resolutions and starlight technology so you can see all the details all the time.<br />

Find out more at boschsecurity.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!