In today’s world, businesses face a growing threat landscape. Looking back on just the past few months, there have been increased incidents of workplace violence (e.g. the recent New York city hospital shooting), terrorist activities (e.g. London Bridge attack, Manchester attack), and cyberattacks (e.g. Petya and WannaCry). While critical events have become more frequent, more complex, and costly to businesses, organizations’ emergency communications systems, plans and processes have remained surprisingly siloed and constrained by an inability to holistically manage the lifecycle of a critical event—from assessment, to communication, to analysis.

The reality is that organizations today find themselves tasked with maintaining multiple, separate emergency, security, and IT command centers that each require 24x7 availability and utilize a different set of siloed tools and processes to monitor and triage threats.

Situational Awareness For The Modern Workplace

Siloed processes aren’t desirable because they result in individual departments conducting their own threat assessment, which can lead to inconsistent responses to critical events. Without situational awareness, response to operational risks is delayed, leaving an organization’s employees, facilities, travelers, and other critical assets vulnerable.

Current event management processes
can severely impact employee safety
while also harming business operations

The fluidity of the modern workplace is also a challenge for businesses. With 72 percent of workers projected to be mobile by 2020, and spending significant time away from a traditional office facility, locating and protecting workers, sharing critical information and directives, and activating the right responders becomes an even more complicated task. For example, it can take hours – and even days – for companies to determine if all their people, including traveling and remote employees, are safe after a terrorist event.

The bottom line is that the way current event management processes are set up is inefficient, ineffective, and – most importantly – can severely impact employee safety while also harming business operations.

Centralized Incident Management

To better communicate with their people and protect them from harm, organizations must adopt a holistic approach to critical event management inclusive of crisis communications and incident management. This includes consolidating physical and digital tools that are traditionally siloed under multiple disciplines and operations centers. Combining these functions enables organizations to develop a common operating picture of a situation and implement an effective resolution plan complete with predefined communication paths to senior management, on-site and remote workers, customers and any other effected parties.

Having a single platform that combines employee safety capabilities with threat assessment and visualization capabilities allows organizations to better manage the full array of intelligence, coordination, collaboration, and execution required to speed response times, reduce risk, and, above all, keep their employees safe in any critical event.

How Security Teams Can Manage Critical Events

With a consolidated Critical Event Management platform, security teams within an organization can dynamically do the following to keep their people safe and the business running effectively:

1. Assess critical events

Leveraging a more integrated operational approach in lieu of the disparate systems used today allows organizations to better asses what is happening in their offices, on their campuses, or near their traveling and remote employees. By integrating physical and digital tools, such as front line, social, trusted threat, and weather intelligence, organizations have an end-to-end view integrating threats, operational impact, and response status information on a “single pane of glass.” When all information is housed in a centralized location, it is far more effective and efficient for an organization to determine the likelihood, severity, and impact of a specific event on its people.

Organisations need to first identify who is in harm’s way, and then notify those affected on what action to take
Linking access control and badging systems, biometric systems, and Wi-Fi access points provide information on an employee’s static, last known, or expected location

2. Locate employees in harm’s way and communicate in a timely manner

The increasing regularity of critical events worldwide necessitates the need to locate and alert employees of any nearby risks at a moment’s notice. Organizations need to first identify who is in harm’s way, and then notify those affected on what action to take. Aggregating data across multiple systems allows for dynamic location tracking and alerting of impacted personnel, response team members and key stakeholders. This includes employees, executives, emergency responders, Boards of Directors, and others who require detailed information of the response effort.

For example, linking access control and badging systems, biometric systems, and Wi-Fi access points provide information on an employee’s static, last known, or expected location to a master database that an organization’s security personnel can use for triggering automated incident communication. This information allows security teams to provide critical information – including site evacuation directions – while an event is occurring to ensure the safety of employees based on their targeted geographic region (e.g. a specific building, floor, neighborhood or zip code) and coordinate the efforts of responders.

If an active shooter is seen approaching from the western half of an organization’s campus, for example, the targeted alert may tell all employees on east campus to get off the property and go across the street, while all employees on west campus may be told to barricade themselves behind locked doors, as they might not have time to run. Visitors who are expected to arrive on campus later that day would be warned to stay away until police secure the premises.

With a centralized system that houses all location information and communication processes, the right messages will be sent to the right people in a matter of seconds.

3. Identify decision makers and automate action

A huge part in managing a crisis is not only identifying who is in danger, but who can help, and how. This process needs to be as streamlined as possible so there’s no question about who should be contacted and who is responsible for doing what. Leveraging an integrated critical event management system in which all information is centrally located allows organizations to initiate instant communications that share all relevant information and status updates with key stakeholders – there’s no confusion as to who should send out the communications, and no one is waiting on important information that is essential to convey.

Each critical event can be analyzed to identify which tasks took too long or what resources were missing

In addition to identifying team members who need to act, an integrated system distributes targeted alerts based on specific scenarios. Taking the same active shooter scenario, an organization’s security team can share incident details, collaborate with, and activate separate response teams, such as the police, SWAT team, and emergency responders, in a single platform – all while following standard operating procedures, escalation policies, and best practices for responding to that particular event.

4. Analyze the aftermath

Once a critical event is over, benchmarks related to an organization’s notification responses and incident time-to-resolution can be recorded, measured and assessed. Each critical event can be analyzed to identify which tasks took too long or what resources were missing in order to learn from and improve response rates for the next major incident.

Critical events should be managed as any major business function—through a single process with clear lines of responsibility, common situational understanding, accountability, and visibility of performance. Currently, processes are focused on the use of too many overlapping tools which only create noise and impedes an organization from following a prescribed procedure for assessing and resolving threats. It’s time for all organizations to take a careful look at how they approach critical event management and opt instead for a centralized system that offers a holistic view – siloed processes are simply no longer effective in today’s threat landscape.

Download PDF version

Author Profile

In case you missed it

Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda
Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda

Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world."   Science Fiction Becomes Reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie The Minority Report as highlighting a variety of gadgets and systems that seemed futuristic at the time but are now perfectly possible, and in some cases outdated. Movies have previously highlighted gadgets and systems that were futuristic, but are now perfectly possible, or outdated "If we dare to dream together we can make this a better world," says Petersen. "Through AI and machine learning, we can help define tomorrow. There's no doubt about it: There is a massive business opportunity for us in artificial intelligence." Despite all the talk about artificial intelligence, only about 0.5 percent of all the data in the world has currently been analyzed or used, says Peterson. "Our open platform technology is the foundation for intelligent video systems and our partners have the expertise and infrastructure needed to reach the next frontier in intelligent video solutions," said Bjørn Skou Eilertsen, Milestone Systems CTO. "Together, we can provide unlimited solutions for our customers." Deeper Integration And Broader Coverage Expanding the Milestone community this year has included the addition of 1,000 new models of supported hardware devices; there are currently more than 7,000 models supported. Milestone is also pursuing broader coverage of installations through their partners, with deeper integration of functionality, and by deepening existing relationships with customers. ‘Creating an intelligent world’ includes deep learning and lots of video systems, says Milestone at their annual conference Under new agreements, hardware partners such as Dell EMC and BCDVideo now provide XProtect Essential+ software pre-loaded on servers they sell. The focus at MIPS 2018 on AI included a presentation by Tanmay Bakshi, the "world's youngest IBM coder" and TED Talk speaker, at 14 years old. The prodigy, who has been coding since the age of 4, has worked with IBM and other companies on a variety of AI-related projects. Using deep learning with video is currently limited because so much video is unlabelled and unstructured In his MIPS 2018 keynote speech, Bakshi traced the development of AI through high-profile events, such as IBM's development of the "Watson" computer, which successfully competed on Jeopardy!, and Google's development of AlphaGo, a program that successfully plays the complex ancient board game, Go. Data Demands Deep-Learning Bakshi focused on security and healthcare as two disciplines where deep learning can potentially have a big impact. Using deep learning with video is currently limited because so much video is unlabeled and unstructured. Still, projections are that there will be a billion cameras worldwide by 2020, providing an over-abundance of data that demands the use of deep learning to make sense of it all. "There is a misconception that AI is meant to replace us, to make humans obsolete. AI is not replacing us. It is created by humans to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently," said Bakshi. He suggested that AI is equivalent to IA; Bakshi's abbreviation meaning "intelligence augmented." Johnmichael O’Hare (left) of the Hartford Police Department, and Tanmay Bakshi (right) discusses key security issues of the modern day The ability to scale AI applications using "distributed deep learning" and graphics processing unit (GPU) hardware is paving the way for greater use of deep learning in video applications. Adam Scraba, Global Business Development Lead at NVIDIA, outlined the trends that are making the current "Big Bang" of deep learning possible. He said it is "the most exciting time in tech history," with "software that can write its own software" now among the tools that make previously unsolvable problems now solvable. AI-driven intelligent video analytics can now achieve "super-human" results, he said. An Intelligent World To Combat Crime Instead of sitting for hours staking out a suspected drug dealer alone, entire investigations now take hours instead of days A success story about the game-changing capabilities of video data was supplied by Hartford, Conn.'s Capital City Crime Center (C4). The Hartford police department uses video data in a "predictive policing" approach. They have created an "intelligent world with smart policing to combat drug trafficking," according to C4 Supervisor Johnmichael O'Hare of the Hartford Police Department. Instead of sitting for hours staking out a suspected drug dealer, for example, video of a site can be analyzed to determine areas with higher levels of foot traffic that indicate drug buys. The result is investigations that take hours instead of days. Hartford incorporates several technologies, including ShotSpotter gunshot detection, Briefcam video synopsis and other systems, all tied together using the Milestone platform. More than 700 attendees make MIPS 2018 the largest such event ever, and exhibits by around 60 Milestone partner companies attest to the continuing expansion of the Milestone community. [Main image:Tanmay Bakshi (left) and Johnmichael O’Hare of the Hartford Police Department (right) discuss key security issues of the modern day]

Has The Gap Closed Between Security Fiction And Security Reality?
Has The Gap Closed Between Security Fiction And Security Reality?

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?

How Moving To Security As A Service Benefits Both Providers And End Users
How Moving To Security As A Service Benefits Both Providers And End Users

The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products.   With the physical security industry becoming ever more integrated – and truly open systems now a reality – there is every reason to assume this service-lead trend will come to dominate the way our industry interacts with its clients as well. Interest In Service-Based Security There is a significant change of mindset that the security industry needs to embrace before a large-scale move to Security as a Service can take place. Like many technology sectors in the past, security providers have focussed on ‘shifting boxes’ as their definitive sales model. This approach was especially prevalent when proprietary systems were the mainstay of the security industry. Essentially, if the customer wanted more services they simply bought a new product. This was a straightforward and economic sales approach for manufacturers and installers alike.The security industry needs to embrace a change of mindset before a move to SaaS can take place The flexibility of integrated and open technology has changed the way consumers view their purchase, so it shouldn’t be any surprise that there is increased interest in a service-based approach. Customer choice equates to a change of focus and interest, with physical products being eclipsed by the benefits of the overall solution. We have already seen these changes in other technology areas, notably with smart devices and general IT systems. Cloud-based services put the onus on the result rather than which device the user chooses. This approach is even starting to manifest in areas that couldn’t have been predicted in the past, such as the car industry for example. Consumers are focusing more on the overall costs and convenience of buying a car over the specific specification of the vehicle. Equally, urban dwellers don’t necessarily want the hassle and expense of owning and parking their own vehicle anymore. If you don’t use it every day, it can make more sense to rent a vehicle only when you travel beyond public transport. For these consumers the car has become a service item for a specific journey. Benefits For End Users At the heart of this approach is the simple equation that consumers have a need and suppliers need to provide the most cost-effective, and easiest, solution. At the same time, the security operator may not necessarily want to know (or care) what specification the system has, they just want it to perform the task as required.   By discussing with consumers, we can ensure we work even more closely with them to provide the expert support they need and deserve Most security buyers will identify the specific business needs and their budget to achieve this. This is where a service approach really comes into its own. Customers need expert advice on a solution for their requirements which takes away the stress of finding the right products/systems. In the past there was always a risk of purchasing an unsuitable solution, which could potentially be disastrous. The other issue was having to budget for a big capital expenditure for a large installation and then having to find further resources once an upgrade was due when systems went end of life. Most businesses find it far easier to pay a sensible monthly or annual fee that is predictable and can easily be budgeted for. A service model makes this far easier to achieve. Great Opportunities As well as the benefits for end users, there are considerable benefits for security providers too. Rather than simply ‘shifting boxes’ and enduring the inevitable sales peaks and toughs this creates; a service sales model allows manufacturers and installers to enjoy a more stable business model. You don’t have to win new business with every product, but rather sell ongoing services for a set period. Its highly likely that the whole security industry will start to take this approach over the next few years. Manufacturers are already well aware of this shift in customer expectations and are changing their approach to meet demands.There are major opportunities on offer in return for a change of perspective in the security industry With the service and leasing approach already firmly entrenched in other industries, this is well proven in a consumer market. The airline industry is a great example. Manufacturers understand that airlines need flexibility to upscale and downscale operations and therefore whole aircraft and even individual key components (such as engines or seating) can be leased as required. Using this approach, airlines can concentrate on what customers demand and not worry about the logistics of doing this. Manufacturers and leasing businesses provide assurances and guarantees of service time for aircraft and engines, taking care of the servicing and maintenance to ensure this delivery. This approach is just as well suited for the provision of security systems. Servicing The Future Security Market Undoubtedly there are major opportunities on offer in return for a change of perspective in the security industry. However, this will involve substantial changes in some quarters to ensure the business model is aligned with the market. Overall, the security industry needs to not only develop the right systems for the market, but also to deliver them in the right way as well. This will ensure we work even more closely with customers to provide the expert support they need and deserve.