Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/Hate-Crimes-in-2015.aspxHate Crimes in 2015GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-02-01T05:00:00ZSM Staff<p>Hate crimes increased in the United States from 2014 to 2015.​​</p><p><a href="/ASIS%20SM%20Article%20Images/Asset%203.jpg" target="_blank"><img class="ms-rteImage-0" src="/ASIS%20SM%20Article%20Images/Asset3_small.jpg" alt="" style="margin:5px;" /></a> </p>

Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/Hate-Crimes-in-2015.aspx2017-02-01T05:00:00ZHate Crimes in 2015
https://sm.asisonline.org/Pages/January-2017-Industry-News.aspx2017-01-01T05:00:00ZJanuary 2017 Industry News
https://sm.asisonline.org/Pages/Maturity--Model-101.aspx2016-12-01T05:00:00ZMaturity Model 101
https://sm.asisonline.org/Pages/Industry-News-October-2016.aspx2016-10-01T04:00:00ZIndustry News October 2016
https://sm.asisonline.org/Pages/ASIS-To-Host-First-Security-Week.aspx2016-09-11T04:00:00ZASIS To Host First Security Week
https://sm.asisonline.org/Pages/ASIS-2016-Product-Showcase.aspx2016-09-01T04:00:00ZASIS 2016 Product Showcase
https://sm.asisonline.org/Pages/A-Security-Triumvirate-in-Orlando.aspx2016-06-13T04:00:00ZA Security Triumvirate in Orlando
https://sm.asisonline.org/Pages/SM-Online-January-2016.aspx2016-01-01T05:00:00ZSM Online January 2016
https://sm.asisonline.org/Pages/December-2015-Product-Showcase.aspx2015-12-01T05:00:00ZDecember 2015 Product Showcase
https://sm.asisonline.org/Pages/How-to-Manage-a-Merger.aspx2015-10-06T04:00:00ZHow to Manage a Merger
https://sm.asisonline.org/Pages/2015-Seminar-Product-Showcase.aspx2015-09-17T04:00:00Z2015 Seminar Product Showcase
https://sm.asisonline.org/Pages/Proper-Persuasion.aspx2015-08-03T04:00:00ZProper Persuasion
https://sm.asisonline.org/Pages/Book-Review---The-Handbook-of-Security.aspx2015-08-01T04:00:00ZBook Review: The Handbook of Security
https://sm.asisonline.org/Pages/Book-Review--Three-Sisters-Pond.aspx2015-08-01T04:00:00ZBook Review: Three Sisters Ponds
https://sm.asisonline.org/Pages/Safety-at-Sea.aspx2015-07-20T04:00:00ZSafety at Sea
https://sm.asisonline.org/Pages/Crime-Trackers.aspx2015-04-01T04:00:00ZCrime Trackers
https://sm.asisonline.org/Pages/Intelligent-Infrastructure.aspx2015-04-01T04:00:00ZIntelligent Infrastructure
https://sm.asisonline.org/Pages/ISC-West-2015-Product-Showcase.aspx2015-04-01T04:00:00ZISC West 2015 Product Showcase
https://sm.asisonline.org/Pages/Security-Careers-Skills,-Compensation,-and-Career-Paths.aspx2015-03-30T04:00:00ZBook Review: Security Careers: Skills, Compensation, and Career Paths
https://sm.asisonline.org/Pages/Liability-and-Insurance-Implications-of-Body-Cameras.aspx2015-03-17T04:00:00ZLiability and Insurance Implications of Body Cameras

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Security-Careers-Skills,-Compensation,-and-Career-Paths.aspxBook Review: Security Careers: Skills, Compensation, and Career Paths<p><em>Elsevier; Elsevier.com; 224 pages; $99.95.</em>​</p><p><span style="line-height:1.5em;">This book is a guide to various careers within the security industry—from global security directors to unarmed security officers—with job descriptions of each category and graphs illustrating compensation trends. The book is quite detailed in the illustration of the various positions within the industry and is businesslike in its narrative on these jobs. One missing element is commentary on current trends and geography that may alter the pay scales.</span></p><p>The overall design of the book is to factually outline the parameters of positions within the security industry, describe the training that may be useful in attaining those positions, and then show a corresponding table of wages to be considered. The book is thorough in listing the various positions within the industry but the wages cannot be verified, especially at the high end of the spectrum, which is well over $300,000 per year. The compensation package does not denote whether this pay is solely pay for work or includes performance bonuses, stock options, and other benefits that may translate into compensation, such as use of a company vehicle.</p><p>This book would appeal to new entrants into the security industry, but it is less useful as a guide by seasoned professionals, who may rely on colleagues and contacts within the industry to verify pay and job requirements.</p><p><em><b>Reviewer: Dan Popowich, CPP</b>, is CEO of Commissionaires BC. He is a member of ASIS, the CSO Roundtable, and the Security Services Council. He is also ASIS assistant regional vice president of Region 6A and past chair of two chapters within Canada.</em></p>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Five-Post-Incident-Concerns.aspxFive Post-Incident Concerns<p>​<span style="line-height:1.5em;">On June 12, 2016, a gunman shot 102 people in an Orlando, Florida, nightclub, killing 49. Agencies, both government and private, must be prepared to recover from such major incidents. Following are five issues that should be considered when crafting post-incident plans.</span></p><p><strong>1. COUNSELING.</strong> Identify a list of counselors for the living victims, family members of the deceased, and other persons who were directly or indirectly involved with the incident. This includes first responders. (In this case, where the gay community was targeted, special emphasis was placed on their needs.) Counselors can include certified therapy animals and their trained handlers. Providing privacy and personal time for the families and friends of the victims in their time of grief is crucial. It is also important to shield those who ask for privacy from the media.  </p><p><strong>2. BUSINESSES. </strong>Access must be granted to the area surrounding the incident so that local businesses can resume operation as soon as possible. The crime scene should be processed in a timely manner to allow the community to return to a feeling of normalcy and business as usual.</p><p><strong>3. COMMUNITY AWARENESS.</strong> The use of the friendly and concerned media can help keep the community informed and involved. Holding frequent press conferences and meetings with the community and its leaders conveys that agencies plan to be open about the incident and the follow-up.</p><p><strong> 4. DEBRIEFING.</strong> Ensure that all victims, witnesses, and responders are fully interviewed in a humane and caring way. This will assist the lead agency in trying to reconstruct the incident and come to a fuller understanding of its causes and outcomes.</p><p><strong>5. PLANNING.</strong> Continue to work within the community to plan for possible future incidents, identify possible soft targets, educate the public on the appropriate response to such an attack, work with the public on developing strategic response plans, and communicate openly with all involved.</p><p>--<br></p><p><em><strong>H.R. "Hank" Nolin, CPP,</strong> is a retired U.S. Army Master Sergeant who has owned various security agencies in Central Florida. He is an active member of the ASIS Military Liaison Council.</em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Infrastructure-Protection-Trends.aspxInfrastructure Protection Trends<p></p><p>If you fail to upgrade your Internet technologies, you’ll find yourself stuck in 1997. But if you fail to upgrade your infrastructure, you’ll find yourself stuck in 1897. It’s a well-worn joke, but it illustrates the importance of secure, well-functioning infrastructure to modern society.</p><p>Moreover, the rise of sophisticated cyberattacks on infrastructure make it an area of increasing vulnerability, experts say. As a result, the global market for critical infrastructure protection is growing, and it is projected to reach $94 billion by 2020, according to Global Industry Analysts, Inc. This demand is being driven by the increasing need to protect critical assets and prevent disruptions to normalcy due to threats, the company reports. And because critical infrastructure assets and systems are vital to the economy, disruptions or breaches can be catastrophic.</p><p>Given the stakes in play, Yves Duguay, CEO and founder of HCIWorld, sees a clear trend in infrastructure protection—a greater focus on resilience, on being prepared before an incident occurs, and on maintaining operating continuity before and after an incident. HCIWorld’s clients include airports, transportation systems, and other key infrastructure facilities.</p><p>“Resilient organizations have moved from the ‘if’ to the ‘when,’” he says. “It’s not a question of whether or not a given scenario will materialize, it’s when and how often it will be repeated, as exemplified by the viral number of cyberattacks recorded by security agencies.”</p><p>This is an important issue in the business community, because while governments do oversee and protect some critical infrastructure, much infrastructure is in the hands of the private sector. For example, in Canada, where HCIWorld is based, a recent survey found that 80 percent of the infrastructure in the energy and water sectors is privately held. The situation is similar in the United States. “Generally speaking, there is a lot more private sector involvement, on both sides of the border,” Duguay says.</p><p>By focusing on resilience and risk management in infrastructure security, companies can dem­onstrate proper due diligence in managing the range of risks they face. “This not only offers a protection of the company’s reputation, but it also reduces its legal liabilities, and possibly its insurance costs,” Duguay says. </p><p>Some forward-thinking firms have adopted infrastructure resilience strategies that include contingency and emergency plans, which are practiced and reviewed with their employees. “Resilience must become part of everyone’s job description, not only of the security department,” Duguay says. When employees understand why certain measures are taken and their own role in contingency and emergency planning, they become much more involved and committed, Duguay explains.</p><p>When a crisis does happen, communication is crucial, he adds. “The key to the success of protecting infrastructure also lies in the ability of companies, especially large ones, to involve their employees by communicating with them in real time, and providing them with accurate information and guidance during an emergency,” he explains. </p><p>Resilience can also have bottom-line financial benefits. “Activating a contingency plan quickly to resume business activities will translate into a competitive advantage for these companies,” Duguay says.  </p><p>In addition to the move toward greater resilience, another clear trend in infrastructure security is greater interconnectedness, says Jeffrey Slotnick, CPP, PSP, CSO of OR3M and president of Setracon. Slotnick has been an architect in the U.S. homeland security enterprise, including stints writing standards and managing assessments for critical infrastructure protection. </p><p>He offers the example of a computer, which may be connected to a printer, a scanner, and other hardware. It works under the “plug-and-play” concept: all equipment is integrated, and can be operated by simply turning on one switch. Right now, infrastructure protection tools are not interconnected to the level where an access camera, a door controller, and other systems are fully integrated to the plug-and-play level. “We haven’t got there yet in the security industry,” he says. </p><p>But that’s the direction that infrastructure security will be moving in the next five years, Slotnick says. The next logical step is a common operating platform, on which disparate systems will be integrated and can talk to one another. This is already happening in some smart cities, where integrated systems are becoming more common, he explains.  </p><p>There’s also a demographic driver to this trend, as the number of technology-savvy millennials increases in the workplace. “Millennials manipulate technology differently,” Slotnick says, and they will demand more integration. </p><p>However, Slotnick also cites one negative trend that continues: the fact that infrastructure facilities are often guarded by officers who are inadequately compensated and insufficiently trained. “We take a minimum wage security officer and place that officer in front of multimillion dollar infrastructure facility, and then we wonder why situations arise that may not necessarily be to our liking,” he says. </p><p>Europe has a better model, he explains. There, security officers are in a “guild profession” with a more equitable pay scale that correlates to different position levels, such as site supervisor or area manager, for example. In contrast, the modest wages in the American system means that turnover is often a problem because officers will switch companies for a 25-cent-per-hour increase.</p><p>“If I could change one thing in the security industry,” Slotnick says, “it would be that.”</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465