SlideShare a Scribd company logo
Contingency Planning
Remote Surveillance &
Facilities Management
By Steve Goodwin MBE MSyI
Compliance and Risk Director
This Session We will explore:
Contingency Planning &
Business Continuity
Management (BCM)
The role of the National
Intelligence Centre:
Remote location via IP
network
Monitoring, Control,
Management of multiple
sites and supply chain, 24-7
Protecting potential targets
in the City of London and
other locations
The systems and
technologies available:
Security & Facilities
Management
Access control post-
evacuation: audio-visual,
emergency services
Contingency Planning
Business Continuity Management
ISO 22301 / BS25999 -
British Standard for BCM
A holistic management
process that identifies
potential threats to an
organisation and the impacts
to business operations that
those threats, if realised, might
cause and which provides a
framework for building
organisational resilience with
the capability for an effective
response that safeguards the
interests of its key
stakeholders reputation, brand
and value creating activities.
Contingency Planning
and Resilience
Contingency Planning
and Resilience
Continuity of
Operations
Business
Continuity
Crisis
Communications
Disaster
Recovery
Cyber Incident
Response
Information
Systems Contingency
Occupant
Emergency
Critical Infrastructure
Protection
Stakeholders Frame Components Intended Outcome
Board Policy Procedures Understanding of Appetite
Executive & Senior Management Supporting Documents Proactive Assessment
Operational Management Plans & Training Understanding of Impact
Other Considerations
Impact on Capital Impact on Change Insurance
Synergies between the two
National Intelligence Centre
Connecting Sites & the Supply Chain
Remote:
1. Management
2. Monitoring
3. Access Control
1. Contingency Planning
2. Crisis & Vital Service Response
3. Disaster Recovery
4. Business Continuity
Data & Risk Analysis
Identify risks, scenarios
on site & in the chain
The Intelligence Centre is the hub for Plans:
Emergency services & local teams
Crisis Management Centre
Why Remote?
Central resource & control of multiple sites, teams,
disciplines & systems
Integration: alarms, CCTV, Facial Recognition, audio,
access control, man-down, EPOS, Detectives, vehicle
tracking
Away from danger, contamination, crime scene,
influence & tampering
Communication: deployment by multiple comms
links – RF, data over IP, SMS, email
Restore services to new, disabled or temporary site
Cost savings: outsource to share resources;
back-up; redundancy; extra expertise
Timeline
Pre-empt
and Prevent Disaster Strikes
Reduce
Within Minutes
or Hours
Respond
Within Hours
or Days
Recover
Resume
Within Weeks
to Months
Restore
Return
Disaster Strikes
Remote Monitoring
& Access Control
Lights On CCTV Unlock Doors Audio Link Man Down
Tested with out of hours delivery for major retailers
Vehicle in transit – GPS monitoring and 2-way comms
Control evacuation & emergency services entry & egress
Services control: power supply, lighting, Lifts, HVAC, fire control
Deploy local emergency & service teams (e.g. lift repairs)
Access Control:
Target Protection
Scenarios
Data
Risks
Plan
Deploy
Test
Consider traffic & spaces: staff, deliveries, suppliers, public access & out of hours
Analysts: assess statistics, incidents, response
time, costed alternatives
Evidence: coordination of technology,
detectives, investigation
Testing: rehearsals, detectives, ‘secret
shopper’ - training
• staff interviews & checks
• store detectives, ‘secret shopper’
External v Internal threats:
Technology & Systems
IP
Review range of technology platforms and compatible devices
Systems
RF radio, internet telephony, alarms, CCTV, audio, access
control, man-down, EPOS, Building Services
1. Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard Receivers
2. CCTV connections are supported via Immix, Sureview International, others
Lodge Service Accrington centre
Outsource to share resources; back-up; redundancy; extra expertise
Operational Risk Components
Purpose /
Vision
Strategy
External Events
Eg Weather/Terrorism
Core Processes Critical Systems Colleagues Facilities
Suppliers & Outsource
Partners
Change Agenda
1-3 Year
Strategic Plan
Control Self Assessment Operational Risk Business Continuity Insurance Programme
Operational Risk Strategy & Plan
Key Controls
End-to-end
Process View
Top-down Operational
Risk Profile
Bottom-up Operational
Risk Profile
Incident & Near
Miss Reporting
Resilience
Work-Area Recovery
Disaster Recovery
Policies
Claims
Incident &
Crisis Management
Operational
Risk Appetite
Operational
Risk Capital
Reporting
Scenarios
Finally…
Embedding the Culture
Define overall risk appetite at Board level. Holistic buy-in paramount
Aligned to business processes, including suppliers
Practical considerations – need policies & procedures
Integration: Risk Department, Business Continuity, Incident Management,
Security, Facilities Management. Keep things simple – common language
Reviews: data analysis, risk assessment, scenarios, TESTING
Potential to drive efficiencies and cost-savings: set KPIs and ROI
Lodge Service - Counter Terrorism

More Related Content

What's hot

Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
EnergySec
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj Purandare ☁
 
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedCMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
Ignyte Assurance Platform
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
EMC
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software Development
Hernan Huwyler, MBA CPA
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance Program
William McBorrough
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
Huntsman Security
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
Christophe Briguet
 
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Power System Operation
 
Limitless Tech 2
Limitless Tech 2Limitless Tech 2
Limitless Tech 2gconroy
 
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterBuilding a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
Priyanka Aash
 
The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?
Unanet
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
PROFIBUS and PROFINET InternationaI - PI UK
 
Educause+V4
Educause+V4Educause+V4
Educause+V4
ecarrow
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
Murray Security Services
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
ShivamSharma909
 
德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
俠客科技
 

What's hot (20)

Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
 
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedCMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software Development
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance Program
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
 
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
 
Limitless Tech 2
Limitless Tech 2Limitless Tech 2
Limitless Tech 2
 
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterBuilding a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
 
The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
Educause+V4
Educause+V4Educause+V4
Educause+V4
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Soc
SocSoc
Soc
 
德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
 

Similar to Lodge Service - Counter Terrorism

Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013SitexOrbis
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
Philippe A. R. Schaeffer
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
LongJidin1
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptx
MarcelPitelli1
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani Technologies
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docx
keturahhazelhurst
 
Anticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security SurveillanceAnticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security Surveillance
cgiprotects
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
cgiprotects
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
IBMITServicesUS
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
Dale Butler
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
Yulia Rotar
 
Extronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseExtronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use case
Susie Marriott
 
Deimos building control suite eng
Deimos building control suite engDeimos building control suite eng
Deimos building control suite eng
Vicente Muelas Sanz de Andino
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
European Services Institute
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
European Services Institute
 
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
Valentijn de Leeuw
 

Similar to Lodge Service - Counter Terrorism (20)

Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptx
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentation
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docx
 
Anticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security SurveillanceAnticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security Surveillance
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
 
MIservices
MIservicesMIservices
MIservices
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
Extronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseExtronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use case
 
Deimos building control suite eng
Deimos building control suite engDeimos building control suite eng
Deimos building control suite eng
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Stanley Security Solutions
Stanley Security SolutionsStanley Security Solutions
Stanley Security Solutions
 
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
 

Recently uploaded

The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
jamalseoexpert1978
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 

Recently uploaded (20)

The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 

Lodge Service - Counter Terrorism

  • 1. Contingency Planning Remote Surveillance & Facilities Management By Steve Goodwin MBE MSyI Compliance and Risk Director
  • 2. This Session We will explore: Contingency Planning & Business Continuity Management (BCM) The role of the National Intelligence Centre: Remote location via IP network Monitoring, Control, Management of multiple sites and supply chain, 24-7 Protecting potential targets in the City of London and other locations The systems and technologies available: Security & Facilities Management Access control post- evacuation: audio-visual, emergency services
  • 3. Contingency Planning Business Continuity Management ISO 22301 / BS25999 - British Standard for BCM A holistic management process that identifies potential threats to an organisation and the impacts to business operations that those threats, if realised, might cause and which provides a framework for building organisational resilience with the capability for an effective response that safeguards the interests of its key stakeholders reputation, brand and value creating activities.
  • 4. Contingency Planning and Resilience Contingency Planning and Resilience Continuity of Operations Business Continuity Crisis Communications Disaster Recovery Cyber Incident Response Information Systems Contingency Occupant Emergency Critical Infrastructure Protection
  • 5. Stakeholders Frame Components Intended Outcome Board Policy Procedures Understanding of Appetite Executive & Senior Management Supporting Documents Proactive Assessment Operational Management Plans & Training Understanding of Impact Other Considerations Impact on Capital Impact on Change Insurance Synergies between the two
  • 6. National Intelligence Centre Connecting Sites & the Supply Chain Remote: 1. Management 2. Monitoring 3. Access Control 1. Contingency Planning 2. Crisis & Vital Service Response 3. Disaster Recovery 4. Business Continuity Data & Risk Analysis Identify risks, scenarios on site & in the chain The Intelligence Centre is the hub for Plans: Emergency services & local teams Crisis Management Centre
  • 7. Why Remote? Central resource & control of multiple sites, teams, disciplines & systems Integration: alarms, CCTV, Facial Recognition, audio, access control, man-down, EPOS, Detectives, vehicle tracking Away from danger, contamination, crime scene, influence & tampering Communication: deployment by multiple comms links – RF, data over IP, SMS, email Restore services to new, disabled or temporary site Cost savings: outsource to share resources; back-up; redundancy; extra expertise
  • 8. Timeline Pre-empt and Prevent Disaster Strikes Reduce Within Minutes or Hours Respond Within Hours or Days Recover Resume Within Weeks to Months Restore Return Disaster Strikes
  • 9. Remote Monitoring & Access Control Lights On CCTV Unlock Doors Audio Link Man Down Tested with out of hours delivery for major retailers Vehicle in transit – GPS monitoring and 2-way comms Control evacuation & emergency services entry & egress Services control: power supply, lighting, Lifts, HVAC, fire control Deploy local emergency & service teams (e.g. lift repairs) Access Control:
  • 10. Target Protection Scenarios Data Risks Plan Deploy Test Consider traffic & spaces: staff, deliveries, suppliers, public access & out of hours Analysts: assess statistics, incidents, response time, costed alternatives Evidence: coordination of technology, detectives, investigation Testing: rehearsals, detectives, ‘secret shopper’ - training • staff interviews & checks • store detectives, ‘secret shopper’ External v Internal threats:
  • 11. Technology & Systems IP Review range of technology platforms and compatible devices Systems RF radio, internet telephony, alarms, CCTV, audio, access control, man-down, EPOS, Building Services 1. Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard Receivers 2. CCTV connections are supported via Immix, Sureview International, others Lodge Service Accrington centre Outsource to share resources; back-up; redundancy; extra expertise
  • 12. Operational Risk Components Purpose / Vision Strategy External Events Eg Weather/Terrorism Core Processes Critical Systems Colleagues Facilities Suppliers & Outsource Partners Change Agenda 1-3 Year Strategic Plan Control Self Assessment Operational Risk Business Continuity Insurance Programme Operational Risk Strategy & Plan Key Controls End-to-end Process View Top-down Operational Risk Profile Bottom-up Operational Risk Profile Incident & Near Miss Reporting Resilience Work-Area Recovery Disaster Recovery Policies Claims Incident & Crisis Management Operational Risk Appetite Operational Risk Capital Reporting Scenarios
  • 13. Finally… Embedding the Culture Define overall risk appetite at Board level. Holistic buy-in paramount Aligned to business processes, including suppliers Practical considerations – need policies & procedures Integration: Risk Department, Business Continuity, Incident Management, Security, Facilities Management. Keep things simple – common language Reviews: data analysis, risk assessment, scenarios, TESTING Potential to drive efficiencies and cost-savings: set KPIs and ROI

Editor's Notes

  1. Contingency Planning   Remote Surveillance and Facilities Management Advances   By Steve Goodwin MBE MSyI Compliance and Risk Director Lodge Service
  2. This Session – Target - we will explore:-   Contingency Planning & Business Continuity Management (BCM)   The role of the National Intelligence Centre: remote location via IP network   Monitoring, Control, Management of multiple sites and supply chain, 24-7   Access control post-evacuation: audio-visual, emergency services   The systems and technologies available: Security & Facilities Management   Protecting potential targets in the City of London and other locations
  3. Contingency Planning - Business Continuity Management   “ A holistic management process that identifies potential threats to an organisation and the impacts to business operations that those threats, if realised, might cause and which provides a framework for building organisational resilience with the capability for an effective response that safeguards the interests of its key stakeholders reputation, brand and value creating activities.” (ISO 22301 / BS25999 – British Standard for BCM (24 month transition 30th May 2014)
  4. National Intelligence Centre: Connecting Sites & the Supply Chain   Remote 1) Management 2) Monitoring 3) Access Control.   Data & Risk analysis – identify risks, scenarios on site & in the chain   The Intelligence Centre is the hub for Plans: Contingency Planning Crisis & Vital Service Response Disaster Recovery Business Continuity   Crisis Management Centre – emergency services & local teams
  5. Why Remote?   Central resource & control of multiple sites, teams, disciplines and systems   Integration: alarms, CCTV, Facial Recognition, audio, access control, man-down, EPOS, Detectives, vehicle tracking   Away from danger, contamination, crime scene, influence & tampering   Communication: deployment by multiple comms links – RF, data over IP, SMS, email   Restore services to new, disabled or temporary site   Cost savings. Outsource to share resources; back-up; redundancy; extra expertise
  6. Remote Monitoring & Access Control   Tested with out of hours delivery for major retailers   Vehicle in transit – GPS monitoring and 2-way comms   Access control: lights on > CCTV > unlock doors > audio link > man-down   Control evacuation & emergency services entry & egress   Services control: power supply, lighting, Lifts, HVAC, fire control   Deploy local emergency & service teams (e.g. lift repairs)
  7. Target Protection   Loop: Data – Scenarios – Risks – Plan – Deploy - Test   Consider traffic & spaces: staff, deliveries, suppliers, public access + out of hours   External v Internal threats: staff interviews & checks store detectives, ‘secret shopper’   Analysts: assess statistics, incidents, response time, costed alternatives   Evidence: coordination of technology, detectives, investigation   Testing: rehearsals, detectives, ‘secret shopper’ - training
  8. Technology & systems   IP – review range of technology platforms and compatible devices   Systems - RF radio, internet telephony, alarms, CCTV, audio, access control, man-down, EPOS, Building Services   Lodge Service Accrington centre– Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard Receivers CCTV connections are supported via Immix, Sureview International, others   Outsource to share resources; back-up; redundancy; extra expertise
  9. Finally: Embedding the Culture   Define overall risk appetite at Board level. Holistic buy-in paramount   Aligned to business processes, including suppliers   Practical considerations – need policies & procedures   Integration: Risk Department, Business Continuity, Incident Management, Security, Facilities Management. Keep things simple – common language   Reviews: data analysis, risk assessment, scenarios, TESTING   Potential to drive efficiencies and cost-savings: set KPIs and ROI