Page 32 - Security Today, May/June 2020
P. 32

GUARD SERVICES
“Inevitably, technology will continue to evolve and enhance security dur- ing one of the most transformational times in human history.”
too are internal business drivers and ever-tightening budgets. Regulatory changes in particular are requiring adjustments in regard to the responsibilities and coverage of security personnel.
Enterprise standards, policies and procedures must keep pace with the changes in regulations. By deploying a risk-based approach, organizations can easily identify gaps in current or future scenarios.
The threat environment can change quickly, which means se- curity teams will need to continually scan and monitor their op- erating environments, forecast, and be able to adapt on the fly. If a program hasn’t considered the forecasted threats, mapped out the gaps and identified resolutions, then they simply won’t be able to respond effectively.
It’s important to be aware of changes to an environment, though equally valuable are the budgets that organizations are working through. In the face of shrinking budgets, security teams and organizations are being tasked to think more strategically.
Private entities and security service providers need to partner together to identify solutions that make the program more effi- cient. Based on the risk profile of a customer, programs can be developed to identify security risks and leverage the full spectrum of technology enabled security services.
This doesn’t mean that the security industry is moving to- wards a technology-only security solution. Rather, organizations are utilizing technology to enhance the capabilities of security personnel and, in turn, making the program as a whole more ca- pable and efficient.
REMAINING RELEVANT
Today’s security landscape is constantly changing, introducing new threats and challenges that security programs need to address in re- al-time. In order to keep the program relevant, organizations need to be in a constant state of assessment, while also understanding the triggers that will drive changes. A risk-based approach to se- curity services helps organizations prepare for regulatory changes, manage internal business drivers, and, if developed appropriately, can also allow the team to respond to new threats.
Through the introduction of threat conditions, such as a nor- mal operating environment, high-risk environment and variations between them, teams can develop plans on what needs to be de- ployed depending on each environment. Changes to the operat- ing environment can be a result of internal factors, such as buying or selling a piece of business or the introduction of a new product to the market, or external factors like political unrest or a natural disaster. @Text:Regardless of the type of factors, an efficient and capable program should be prepared for events in advance, al- lowing the personnel and the program to adjust accordingly and avoid potential gaps in coverage. Alternatively, programs that are not proactively managing risk and do not have a plan to manage unforeseen situations can become especially vulnerable.
This preparation goes beyond simply changing the environment and adjusting the technology, it also encompasses pre-assignment and on-site training of personnel. The training program that all members of the security program go through should prepare the team according
24
to how they should respond and act within each threat environment. By doing so, personnel will be able to immediately adjust to their new responsibilities and post orders based on a new threat, avoiding a po- tential disruption to the integrity of the security program.
While training the team and ensuring they understand their responsibilities, a connected program should be in place to ensure that the team is aware of the changes to the threat environment immediately. Security personnel can’t rely on word-of-mouth, and in a world where technology is so prevalent, an organization’s security shouldn’t either.
INTEGRATION OF REAL-TIME COMMUNICATION
Real-time communication capabilities through handheld devices that immediately update and notify security teams of changes al- lows them to adjust immediately. Introducing these capabilities also enables the organization to identify vulnerabilities and to keep the entire security team in constant contact. By connecting technology across the system, team members can know about se- curity incidents or potential vulnerabilities in real-time, reducing the risk of gaps in coverage or lapses in communication.
If a monitoring tool identifies an active shooter at a nearby location, the security team, through connected communications, can immediately adjust their threat environment and be prepared for a potential impact. Without monitoring tools and real-time communication capabilities at their disposal, the security team may be unaware of the ongoing issues and the subsequent threats that may arise at their location, which makes them vulnerable.
WHAT THE FUTURE HOLDS
The security industry is transitioning to a do more-with-less approach as security programs are being challenged to provide more coverage with shrinking budgets. This can be difficult, but it is possible so long as programs are built and deployed strategi- cally, utilizing a connected program that breaks down silos and brings together personnel, technology and automation.
Throughout the next decade, we will see the security officer and security program become more connected through technol- ogy. Consider the impact of capability-expanding technology like Artificial Intelligence, Machine Learning and emerging technolo- gies such as wearables. This will undoubtedly drive increasing lev- els of automation within enterprise security programs.
Security officers will need to have a better understanding of the technologies deployed and must have the capacity to be trained on the various levels of risk mitigation from a post to post perspective. Organizations will aim to invest in the personnel who will be leveraging the technology that is in place, which will allow them to provide expanded coverage with fewer resources devoted to the program.
Resisting the necessary commitments to fully integrating per- sonnel and technology resources will place the enterprise at a significant disadvantage. The longer an organization takes to in- tegrate technology into the security program the more difficult it will be to catch up. Inevitably, technology will
continue to evolve and enhance security during one of the most transformational times in hu- man history. It is up to the security profession and industry at large to embrace it.
John Petruzzi is the executive vice president at G4S.
MAY/JUNE 2020 | SECURITY TODAY


































































































   30   31   32   33   34