• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
International Security Expo Itpo New Delhi Finl
 

International Security Expo Itpo New Delhi Finl

on

  • 621 views

security

security

Statistics

Views

Total Views
621
Views on SlideShare
621
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Version 14 7/07
  • Instructor Notes: The term “Conducted Energy Weapons” has been changed to “Electronic Control Devices” in order to maintain consistency in terminology with law enforcement agencies and research groups.Version 14 7/07
  • INSTRUCTOR NOTES: The TASER X26 and M26 send out short duration, high voltage electrical impulses that overpower the normal electrical signals within the nerve fibers. The TASER device output is similar to the signals used by the nerves. These waves create extra “noise” within the nervous system much like static on the “phone lines” of the human body. Discuss how the body's communication is analogous to having a conversation on a telephone where signals are sent from one phone to another via electrical signals. Should a third person pick up this phone line and begin to scream (analogous to a TASER Wave in the body), the other two persons can no longer hear communication. Just as important, when the screaming stops, communications begins again without damage to the phone line. The graphics on this slide are not actual scope readings. They are simply illustrative of how TASER ECDs cause involuntary muscle contractions.Version 14 7/07
  • Instructor Notes: Other less-lethal weapons have worked on pain compliance that can be overcome by drugs, alcohol, EDPs (Emotionally Disturbed Persons) or by mental focus.The M26 and X26 do not rely on pain to achieve compliance. They affect the sensory and motor functions of the nervous system and achieve incapacitation.Version 14 7/07

International Security Expo Itpo New Delhi Finl International Security Expo Itpo New Delhi Finl Presentation Transcript

  • International Security Expo ITPO New Delhi Corporate Security Firoze Zia Hussain Former Superintendent of Police Pondicherry Firoze.hussain@gmail.com Cell 00919910333249 05/24/09 1
  • India Corporate Security Scenario  Mumbai blasts - Wake up call for the Indian industry Leaders have rethink on corporate security policies .  Incident led the industry to decide to work with government on security and governance issues rather than dealing with it as another man’s subject.  Indian industry hit by global recession and by image of India as a soft target due to terrorist strikes and now with the Satyam episode as country lacking in good corporate governance policies .  What are the new leadership strategies to overcome and move forward.  Foremost concern being safety and security. 05/24/09 2
  • India's commercial security woes  More to do with the DNA of the security professionals rather than the prevailing threats at presents.  Commercial security is the gap filler between the state, servicing the general public and the corporate requirements to protect, preserve and maximize their vested assets. 05/24/09 3
  • Opportunity-security providers  India has a greater divide between the capacity of the government and commercial demands, therefore a much greater opportunity and gap to be filled by security providers.  The problem with the current approach is that it is still very ex-military or ex-police driven.  The overall global view of India's security remains below par, and this affects everything from investment to trust and relationships.  One of the very outdated practices in India only continues to perpetuate this issue with everyone in security introducing themselves as Captain, Major, General, etc.  No one cares! Corporations want business enablers with sound competent business managers first and security managers second, not professional inhibitors or someone living in the ancient past from their days in the military/police. If the company wants a war or police department, then then the retention of rank is appropriate but not for professional commercial security solutions.  Despite the oversight and protection mandate of security professionals, very few are actually adequately checked to ensure they meet the corporate needs and technical requirements, merely what did they do in the army/police/government and so on. This approach is a fundamental flaw globally, and emphasized in India.  05/24/09 4
  •  In developed countries the escalation of cost for security begins with policy, then technical measures and manpower last.  In developed countries, policy, manpower and then technical solutions are the prescribed route for a number of reasons but largely due to the reality that manpower is cheaper than technical measures and therefore dominates the solution options.  Not necessarily cost effective or mitigation solution based.   05/24/09 5
  • 05/24/09 6
  • VALUE ADD and corporate security debate  Any investment needs to be validated by VALUE ADD it brings in  Security is viewed as necessary expense.  Companies making a business case from utilizing security devices and systems to protect life and property (assets), to helping improve productivity, assist with training, and decrease losses 05/24/09 7
  • Leverage Security to Maximize Revenue Vital partner to protect company assets and IP  Gives management peace of mind to make decisions for business improvement.  Use security technology to improve business processes and operational efficiencies.  End user and integrator ingenuity are merging to bring innovative services eg Video surveillance and access control services  Internet provides realtime, anywhere access to surveillance cameras, activities of employees and visitors via access control logs.  Access provides valuable information on security measures  Customer and employee patterns begin to emerge. 05/24/09 8
  • ROI With Security Technology  Is the new line of merchandise displayed prominently in the front of the store? Do I need more lunch staff on Thursdays and Fridays? Are my employees being honest about their hours worked?  A security director can view and download footage of an incident online in one city without having to make the roundtrip to pull the incident from the DVR.  Remote access can potentially save a business in fleet expenses, travel expenditures, and time and resource management.  Be in multiple places at one time. A win-win for all parties anytime, anywhere access  Funding is now coming from the customer’s IT, sales and marketing departments.  Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution. 05/24/09 9
  • Corporate financial fraud Investigation-Satyam Saga  Financial investigators search for information on the integrity, financial health and reputation of an organization or company.  This is done by probing public records and international databases covering patents, corporations, partnerships, contracts, SEC filings, news, business references  Uncover critical information regarding corporate documents, material contracts and agreements, financial status , litigations, taxation, insurance and liability, governmental regulation filings, financial history, and acquisition, partnership, or joint venture agreements. 05/24/09 10
  • Computer Forensics and Electronic Discovery Specialized team of leading experts in information security, focusing on computer forensics, electronic discovery, physical & IT security, and cyber investigations. IT practice supports technology-driven litigation and engagements in the following ways:  Computer Forensics/Expert Witness Testimony  Physical & IT Security 05/24/09 11
  • Intellectual Property (Brand) Protection Illegal use of legitimate companies’ brands, trademarks, and product has increased exponentially and become very sophisticated in the process. 05/24/09 12
  • ISSUES  Can enhancement of awareness in corporates prevent terrorist attacks  Can 10 security guards standing outside a mall deter a terrorist 05/24/09 13
  • We need to study how Corporates in Srilanka and Israel have been coping with continuous terrorist attacks and yet are able to develop their economy fairly well. 05/24/09 14
  • Protecting Assets and Increasing Effectiveness  Virtual security Physical security  Financial security IP intellectual property  Detection Prevention Monitoring  3 rings of security  Perimeter Entry point Usage areas 05/24/09 15
  • Business SEGMENTS Travel and Tourism Industry-Hotels  Transportation - aviation security , mass transit rail systems ,shipping ,bus,taxi,auto,cycle  Critical Infrastructure - The industries and institutions, buildings and distribution networks that are essential to everyday life ,refineries,banks  Ports & Borders -Systems for Customs officers and border protection, including monitoring cross-border cargo and reducing international shipments of contraband, screening for explosives, arms and weapons of mass destruction.  Emergency Responders - Enabling emergency response teams to face potential threats with confidence when dealing with a potentially toxic incident, equipped with the most advanced technology.  Military - Meeting the requirements of our armed forces and the application of smart science on the battlefield, principally the threat from potentially lethal chemical and biological warfare agents.  Diagnostics – eg hospital screening programmes for infectious diseases. 05/24/09 16
  • Security Products  Modern arms ammunition  Lethal arms  Non lethal arms  Intelligence collection and analysis and sharing  Innovative products 05/24/09 17
  • TASER  Ideal non lethal weapon for private security guards  Can be used extensively by Aviation personnel –for example to temporarily disable a drunken deranged person in an aircraft 05/24/09 18
  • Definitions Electronic Control Devices (ECD) use propelled wires or direct contact to conduct energy to affect the sensory and motor functions of the nervous system. The TASER X26 and ADVANCED TASER M26 are Electronic Control Devices manufactured by TASER International, lnc. 05/24/09 19
  • Technology Illustrative Example Nerve impulse TASER impulse • The human nervous system communicates with simple electrical impulses • TASER technology uses similar electrical impulses to cause stimulation of the nerves that control movement 05/24/09 20
  • Pain to Incapacitation • All previous less-lethal weapons have worked on pain compliance that can be overcome by drugs, alcohol, emotionally disturbed persons (EDPs), or by focused, combative individuals. • The X26 and M26 ECDs do not solely rely on pain to achieve compliance. They affect the sensory and motor functions of the nervous system and can cause incapacitation. 05/24/09 21
  • TASER X26 Constructed of impact resistant sonic welded polymer. Mass = 7 ounces. Available in Black, Yellow & Clear DPM Stainless Steel Release Button Illumination Safety Serial No. Plate Selector High Visibility Sights TASER Cartridge TASER Wire Probes Trigger Stainless Steel Shock Plates Enhanced Grip Zones Blast Doors LIL: Low Intensity Lights (LEDs) AFIDs Laser Sight DPM: Digital 05/24/09 Power Magazine 22
  • TASER  Legal issues in usage of same by private personnel 05/24/09 23
  • TASER video clip 05/24/09 24
  • CARGO SECURITY  Whether the container is a seagoing CAN, carried on flatbed by rail or road, or a long- haul trailer or aircraft ULD, system secures it.  Analyze every equipped container for chemical indicators, biologicals, volatiles and radiation and ensure that dangerous materials and illegal goods are not given free passage.  By verifying that the Bill of Lading is accurate actually speed up the handling process and throughput for the handling yard. 05/24/09 25
  • 05/24/09 26
  • Virtual security  Cyber warfare  Networked video surveillance systems 05/24/09 27
  • Leverage Customer IT Investments  New video services are changing the way companies conduct business.  Security providers offer online services that allow a customer to access their local video surveillance systems via the Internet for realtime and historical viewing of their cameras, plus control pan/tilt/zoom (p/t/z) units.  Customers view, store and retrieve video images from their local DVR unit, while leveraging their existing infrastructure.  A common misconception by customers is that they need Internet protocol (IP) video solutions to perform the aforementioned tasks.  When a customer requests IP video, to access live and stored video footage using a secure Internet network.  build robust IT capabilities to provide services without taxing the customer’s IT infrastructure.  these systems allow companies to leverage their existing security and IT investments. 05/24/09 28
  • Innovative video search  Image Content Navigation (ICN)  ICN is a tool designed especially to make operator navigation faster and easier when tracking targets.  An invisible mesh of hyperlinks connects cameras together in the video.  To track a target with ICN operators simply need to click areas in the video to switch cameras and track targets.  This makes real-time tracking targets easier and faster removing the need to switch cameras by manually inputting camera id numbers. D mapping Cware 2.5D advanced mapping technology enables a virtual duplicate to be made of the monitored location in near 3D, improving the site perspective while enabling intuitive navigation that delivers faster operator response times to incidents.  In 3D users can plan new camera sites to improve performance of the system. 05/24/09 29
  • Monitoring Via Video Auditing   eVideo Audit is a video monitoring service that provides realtime audits, notification and exception reporting of a customer’s business processes.  Connect to the customer’s CCTV system to ensure documented business practices are followed with immediate notification to customers as needed.   Regional manager with multiple locations may need to ensure his employees are wearing the correct attire, the correct promotional items are displayed, the correct number of employees is behind the service counter, and the sales demo units are on display.  However, time and cost to travel to each location to ensure these basic processes are being followed diverts their time from focusing on customers and more pressing business activities.  Work is done remotely & customer notified only if process is not followed.  This service represents a true business partnership, helping customers ensure that their business processes are being followed on a daily basis by their employees at all locations. 05/24/09 30
  • VIDEO ANALYTICS-MATE  Mate's Video Analytics offering covers quot;simplequot; Video Motion Detection to identification of Static Objects (like abandoned Luggage)  provides directional counting and Video tailgating solutions for Physical Access Control  High End Analytics - including the ability to add logic statements that create a dependency between two or more alarms (quot;ANDquot; quot;IFquot; quot;Repeatquot;)  System Topology - products are available as DSP based appliances (edge device) and as a Server based system at your monitoring station.  End-user experience – a simple user friendly interface  Total cost of ownership – systems are easy to install, configure, train and provide ongoing support  specific additional advantages in specific configurations that include DVTel, GE (VisioWave), American Dynamics/Tyco (Intellex & VideoEdge), Milestone, Cisco, Advansis and others ( can add additional platforms to this integration) 05/24/09 31
  • On Guard With 24/7 Virtual Security   Audio and video clips are filtered, reviewed, transmitted and verified.  Integrates with intrusion and access control systems,  Monitoring centers a virtual security guard for an organization, protecting it during or after-hours.  Systems can be programmed when an activation signal is tripped.  When someone enters an invalid alarm code after-hours, when an outside motion detector is crossed or whenever anyone enters a server room.  “Innovative alarm companies investing to integrate field systems with monitoring software .  Investment in open architecture technology and a common IT platform allows a to offer their customer online, realtime alarm data and video that helps a customer improve their security and improve their business operations.” 05/24/09 32
  • Managed Access Control Services  Central station managed access control is ideal.  Provides 100 percent of the management and administration of the customer’s local access control system.  Provide new employee access cards, photo ID badges, changing of door lock schedules, deleting or modifying access levels, generating activity reports and more for the customer.  Eliminates the customer having to purchase, administer or manage access control software on their computer.  Customers can pick up the phone or request all changes via an online, realtime Web portal.  Has access to realtime reports and other system and activity information without an IT infrastructure investment. 05/24/09
  • Corporate Security Advisors  Develop formulate appropriate (fit-for-purpose) cost effective strategies,processes, practices, oversee and support the implementation of chosen solutions.  Identify, assess, and control protective security related risks and effectiveness of controls and processes and programs around protective security management  Strategies, policies & practices for protective and technology security  Relevant processes in support of protective and technical security strategies  Programme/project performance is up to required standards  Internal and external customer relationships are developed and maintained  Protective security incidents and/or crisis do not compromise operations  Security function as a centre of excellence  MI and reporting is reflective of risk (appetite, profile, and status)  Understand the operational, regulatory, compliance, and governance environments 05/24/09 34
  • Key outputs:CSO •Develop maintain quality, timely, risk focused MI and reporting • Protective security policies in accordance with regulatory requirements •Provide recommendations ensuring sound leadership and direction •Co-ordination of resources to ensure cost-effective control •Identify implications of relevant policies, legislation, and regulation •Ensure appropriate and consistent compliance with relevant policies •Ensure business driven requirements and solutions are identified and agreed •Identify scope (e.g. costs, time scales, benefits) and sponsor key initiatives •Support, as appropriate, enterprise wide protective security management •Establish key metrics and measures key performance indicators •Validate existing protective security management processes •Ensure awareness training and education programmes are implemented •satisfy objectives , are delivered on time and within budget 05/24/09 35
  • SMART ORGANISATIONS  Make onsite security personnel more efficient.  Having a security guard stare at a bank of monitors for an extended period of time is an ineffective way to detect crime or suspicious activity. The result is “surveillance information overload.”  Cannot humanly process that much information fast enough to prevent or even be effective at minimizing theft or vandalism.  Smart organizations are making their security personnel more efficient by integrating video with security control so that video is pushed directly to security guard’s monitor, PDA or cell phone. 05/24/09 36
  •  Bomb proof trash cans equipped with lcd screens to relay the days news  Colombian Designer miguel cabelloro blazors and T shirts - 05/24/09 37
  • Unprecedented security at the 2008 Olympics Technological wonders that officials employed to protect the games MATE Intelligent Video’s system was part of a large, highly secretive integrated video surveillance system installed at the Beijing National Stadium.  Bird’s Nest, cost $423 million to build and years of planning to protect.  seating capacity of 80,000 and, in August of 2008, was a central location of much of the Games  Officials in Beijing chose MATE’s Trigger, an embedded processor for video detection and transmission, to upgrade the Bird’s Nest’s CCTV system to an intelligent video detection system.  Trigger monitored strategic areas and critical points in and around the stadium around the clock.  automated surveillance allowed stadium management to lower supervising costs and increase response time to security alerts. 05/24/09 38
  • RISK Assesment Assess and manage security across your international operations. Mitigate the risks and threats facing each of your operating facilities, security consultants will develop a detailed risk assessment and provide a report with specific, actionable recommendations to reduce and mitigate your risks. Specialized intelligence designed to meet organization’s strategic requirements. including forecasts for specific countries, risk comparisons of specific locations, and in-depth reports on threats such as terrorism, kidnapping and crime. Security plans Identifies the security risks and steps required to protect organization and assets. Plans cover physical security, personnel security and emergency response protocols. 05/24/09 39
  •  Site security management in high-risk remote locations, experienced security managers help manage everyday security risks on site. They also provide a seamless link to our regional security and medical teams so that immediate support can be accessed in an emergency.  Security training Provide realistic scenarios on personal security protocols and traveler security awareness and preparedness  Logistics management in high-risk environments Provide expertise to assist your operations with the movement and management of resources. 05/24/09 40
  • A Balanced Approach to Security  New exciting technologies and service offerings aside, security providers should never lose sight of primary objective of asset safety.  Technology gains have created new opportunities  Successful companies will complement their security message with tangible business benefits — a true partnership 05/24/09 41
  •  Security needs to continue to grow to become a viable and competent technical skill such as medicine, law, engineering and the like. India is well short of this objective and the companies that sell product or people to suit their revenue projections are and endangered species but until more professional security personnel, companies, business skills and vendors come into the market, they will continue to exploit the uneducated client market and leave a dirty stain in the industry until it happens.  Risk management is not discretionary spending and business resilience is rapidly becoming a competitive edge. 05/24/09 42
  • Thank You 05/24/09 43