RiskXtraJune2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
x<br />
RISKXtra<br />
The Dawn of Intelligent and<br />
Predictive Security<br />
When did your<br />
business last<br />
undertake a security<br />
risk assessment? How<br />
do you evaluate<br />
threats or<br />
vulnerabilities? Are<br />
there any gaps in your<br />
security measures? Do<br />
you have full<br />
confidence in the<br />
security technologies<br />
that your business<br />
employs? Omar Abu-<br />
Rish explains why, as<br />
threats continue to<br />
grow and evolve,<br />
today’s organisations<br />
need intelligence on<br />
all of the risks which<br />
might impact their<br />
day-to-day operations<br />
In today’s complex security landscape, with<br />
businesses facing an ever-increasing array of<br />
risks and threats, it’s important to step back<br />
and ask yourself some serious questions like<br />
those outlined. From crime and disorder, violent<br />
extremism and activism through to fire risk, data<br />
leakage and cyber theft, understanding the<br />
threat landscape within and outside of your<br />
organisation represents half the battle.<br />
No matter what type of business you run, or<br />
the vertical sector in which you operate, it’s<br />
absolutely true to state that ‘knowledge is<br />
power’ and, indeed, vital when it comes to<br />
protecting the organisation’s people, property<br />
and assets.<br />
As businesses grow, so the risks posed to<br />
them increase still further. That being the case,<br />
it’s essential to regularly take a step back and<br />
review in some degree of detail whether or not<br />
your security solutions on site are pre-empting<br />
these threats and are perfectly ready to<br />
respond should the worst happen.<br />
For genuine and tangible peace of mind,<br />
organisations should be moving away from<br />
purely reactive security – a label often ascribed<br />
to security in UK plc over the years, given its<br />
tendency towards conservatism with a small ‘c’<br />
– and focus more on an integrated and fully<br />
predictive security solution.<br />
The foundation of predictive security stems<br />
from digitisation. There’s now an opportunity to<br />
gather and use large amounts of data from<br />
internal sources and combine these with<br />
external information including crime statistics<br />
and advanced analytics that can ultimately<br />
assist businesses to predict and then prevent<br />
criminal activity before it’s allowed to happen.<br />
This goes right to the very heart of predictive<br />
security – mitigate risks before they become<br />
threats and act in real-time to protect your<br />
organisation when needed.<br />
Accessing the right information and<br />
understanding how it fits into the overall<br />
security landscape is key to successful<br />
corporate risk management.<br />
Effective corporate risk management should<br />
follow a three-step process: evaluate, analyse<br />
and then plan. In the first instance, we need to<br />
use risk-based methodologies, detailed<br />
operational analysis and a Best-in-Class<br />
evaluation platform in order to evaluate the<br />
current security service.<br />
Second, combine on-site equipment – such<br />
as security sensors and surveillance cameras –<br />
with historical and real-time data as well as<br />
external crime and incident data sources with a<br />
view towards analysing and defining the<br />
business’ unique risk profile.<br />
Finally, by actively combining protective<br />
security services with the very best of today’s<br />
intelligence technology, you can then plan and<br />
implement a total security solution purposedesigned<br />
to keep your organisation safe.<br />
Security intelligence services<br />
Billions of people worldwide have access to the<br />
Internet which they use as a platform for<br />
communicating and socialising. From a security<br />
perspective, there has been a greater focus on<br />
online platforms over the last few years in order<br />
to help combat potential new threats.<br />
Law enforcement agencies have used open<br />
source investigation for years, gathering<br />
valuable intelligence from online platforms in a<br />
bid to keep members of the public safe from<br />
harm. Of late, the security business sector has<br />
itself recognised the value of open source<br />
investigation and duly established its own inhouse<br />
intelligence teams.<br />
From a business perspective, understanding<br />
and responding to online data of this nature<br />
can seem daunting, if not impossible. After all,<br />
if we look at social media as just one source of<br />
information, there are millions of posts shared<br />
every second right across the world. Social<br />
media platforms are a primary source of<br />
50<br />