Articles by Jim Swift
Risk, in a security context, is the product of threat, vulnerability, and consequence Security as a discipline has been an important feature of society since cavemen started using the environment around them to protect themselves and their families. As a discipline, security has developed exponentially and that trend is continuing; however, somewhere along the way key elements of physical security design have been forgotten. All too often solutions are deployed in a prescriptive way with little or no thought given to each aspect and its role in the overall security system. This has the potential to leave organizations exposed, unaware of the security threats they face, their vulnerabilities to these threats and ultimately, the potential consequences to their mission should they be subject to an attack. This article seeks to address why this is so often the case. Professionals are frequently reminded that security is a risk based discipline, and that solutions, measures, systems, etc. should be ‘risk based’. But, all too often, these practitioners, let alone the organizations they represent, do not fully appreciate what risk is or how it can be measured objectively. Risk, put simply, is a product. Risk, in a security context, is the product of threat, vulnerability, and consequence and is therefore directly proportionate to each, jointly and severally. So What Does This All Mean? It means that we need to identify the most effective way of reducing security risk through any or a combination of the component factors, i.e. threat, vulnerability, and/or consequence. Unfortunately, far too much emphasis can be placed on the application of the latest security technologies without fully understanding the current situation and the strategic options available to an organization. A balanced and holistic approach to security risk management can offer a host of benefits in addition to better security outcomes e.g. improved aesthetic, improved operational and cost efficiencies. Once vulnerabilities have beendetermined it is possible toassess whether treatment isrequired to bring security riskwithin the organizations riskacceptance criteria This article focuses on vulnerability in detail and how to develop an effective physical security system that responds to credible threats. This is done through the development of a ‘Design Basis Threat’ (DBT). This is a statement akin to a mission statement for the bad guys, and articulates the worst-case, most credible threats likely to manifest against the ‘asset(s)’ that we are securing. The sort of information will vary depending on the threat; however, key ingredients will include; the adversary’s intentions, their numbers, their motivations, their resources, their skill level, their target(s), their experience, their methodology, and their transportation. Once we have a list of developed DBTs, we can then move on to assess our facility security or security plans. Assessment And Planning This involves an assessment of vulnerabilities that would allow the adversary to succeed given the tactics outlined in the DBT. Vulnerabilities may exist in the planning and design of a building, the processes and procedures of a business, the networks and systems that support the business or even its staff. The accuracy of the outputs of the vulnerability assessment ultimately depend on the accuracy of the DBT. For example, a single, opportunist burglar looking for easy-to-sell items, will adopt very different tactics to those of an organized crime group looking to steal the contents of a jewelery store safe. Having identified ‘who’ the adversary is, we can consider the path that our attacker is likely to take in their effort to achieve their objective. In doing so, we are able to establish what they will need to do to get to their target asset, i.e. pass through a door, cross some floor space, pass through another door etc. Each of these ‘activities’ offers us an opportunity to achieve key security functions i.e. deterrence, detection, delay, disruption and response. An absence or inadequacy of these functions represents system vulnerabilities to the defined DBT. The paths are often referred to as the ‘adversary attack path’ (AAP) and analysis of these paths is critical to the success of the security system. It should be noted, that there will be a number of AAPs for any given asset and a thorough assessment of each may be necessary dependent on facility type, layout, purpose, risk etc. A systems approach to securitywhich builds on the principle of ‘defense in depth’ and providesa series of defensive layersaround assets, builds systemresilience Determining Vulnerabilities A systems approach to security which builds on the principle of ‘defense in depth’ and provides a series of defensive layers around assets, builds system resilience where an adversary has to defeat several different measures to be successful. This increases complexity for the adversary and removes single points of failure for the asset owner. Once vulnerabilities have been determined e.g. limited detection opportunities, inadequate delay or response capability; it is possible to assess whether treatment is required to bring security risk within the organizations risk acceptance criteria. A new security system or improvements to an existing security system should be based on mitigating the observed vulnerabilities. This will require definition of performance requirements and documentation of all assumptions related to operational security management and incident response. For example, if your vulnerability assessment identified that the adversary was able to remove an asset because existing controls did not provide sufficient delay for timely response, then treatment options will likely include identification of opportunities for: Earlier detection e.g. at an earlier point in the adversary path Increased delay e.g. increased robustness of physical measures Reduced response times. Finding Optimum Solution There will inevitably be various environmental, physical, technical and procedural solutions that can meet the security functional requirement, but a holistic approach will be required to find an optimum solution for the organization and this will need to take into account: Organizational and stakeholder requirements, policies and procedures; Site and building attributes; Use, functions and activities; Cost; Ease and time for procurement and implementation; Aesthetic quality. This is the ‘art’ of security system design and is often lacking in prescriptive, off-the-shelf solutions.
Campbell will deliver a presentation on growing trend toward proactive risk & threat identification Quantum Secure, part of HID Global, a worldwide leader in secure identity solutions, recently announced that Don Campbell, Quantum Secure’s Director of Product Management, will take part in two informational sessions to be held at IFSEC International 2015, which takes place from June 16-18 at London ExCel. At 2 p.m. on Tuesday, June 16, Campbell will be part of a panel discussion titled “State of the Nation – Current & Evolving Security Threats.” He will be joined by James Kelly, Chief Executive of the British Security Industry Association, and Jim Swift, Head of Security Engineering for consulting firm BB7. Benefits Of Big Data Analytics In Security – Helping Proactivity & Value Creation Following the panel discussion, at 4 p.m. Campbell will deliver a presentation titled “Benefits of Big Data Analytics in Security – Helping Proactivity and Value Creation”. During this educational session, Campbell will discuss the growing trend toward proactive risk and threat identification and the benefits of analyzing the virtual mountains of data available from multiple disparate systems to generate valuable security intelligence. This session will take place in the Keynote & Convergence Theatre. “In today’s world, the necessary data organizations need to improve security, identify threats and streamline policies, processes and overall operations is available; it’s just a matter of collecting and analyzing that data to discover potential risks,” Campbell said. “By connecting the dots between identities and security and other systems, predictive analysis has the power to turn raw data generated by multiple systems into actionable intelligence that allows organizations to initiate preventative action and thwart potential incidents, transforming security departments into proactive enterprise resources.” SAFE Product Line Analyzes Identity & Security Data With its SAFE Predictive Security Software, the latest addition to its SAFE Security Intelligence Portfolio, Quantum Secure continues to set new benchmarks in predictive analysis solutions and physical identity and access management (PIAM) solutions. The SAFE product line analyzes identity and security data and applies both operational and risk-based analytics to provide a clear understanding of security operations and risks. To further support analysis, SAFE Predictive Security includes automated, actionable responses which can help reduce costs, reduce insider threat and enhance compliance. Quantum Secure’s SAFE Security Intelligence Portfolio provides web-based solutions that detail an executive-level, graphical dashboard view of a global physical security infrastructure. In addition to SAFE Predictive Security, the portfolio also includes SAFE Security Reporter 5.0, which provides real-time monitoring and event correlation of physical security activities and a custom report creation wizard.
IFSEC International will launch a brand new zone within the show - Innovation Arena 2015 has already seen major incidences that have tested the security industry across the globe and as threats continue to evolve IFSEC Internationalhas a crucial part to play in keeping the industry abreast of the latest technologies, developments and best practices. Taking place at ExCeL London IFSEC International 2015 will run from 16-18 June. IFSEC International has been at the heart of the security industry for over 40 years and this year it will continue to showcase the future of the industry alongside truly groundbreaking content. Core Theme - Innovation A core theme running across IFSEC International this year is innovation, having conducted a significant amount of research following the 2014 edition of the show, a key topic that both exhibitors and visitors kept coming back to was the opportunity to see genuine innovation across the show floor. With this in mind IFSEC International will launch a brand new zone within the show this June, the Innovation Arena in association with leading industry title, Benchmark Magazine. The new theater will host a series of 10 minute pitches from the Benchmark Innovation Awards finalists. With nearly 40 different companies already confirmed to participate, covering site protection hardware and software, business intelligence, video surveillance hardware and software, video analytics, infrastructure along with access control hardware and software, the Innovation Arena will showcase back to back innovation from across the industry throughout the three days. Short Presentation From Well-known Organizations Organizations such as Panasonic, Bosch Security, Vidicore, UTC Fire & Security and Secure Logiq, to name a few will give a short presentation about their shortlisted product and then open the floor to questions. This exciting new format provides visitors to IFSEC International a detailed look at those products that are delivering a real benefit to end users, integrators and installers. Running alongside the Innovation Arena is the IFSEC International Innovation Trail which will help visitors easily access the new technologies that have come to market that will be featured at the show this year. A core theme running across IFSEC International this year is innovation, a key topic that both exhibitors and visitors kept coming back NICE Suspect Search - Video Analytics Tool Highlights of the IFSEC International Innovation Trail include the NICE Suspect Search, a patent-pending video analytics tool that quickly locates and retraces the movements of a suspect, lost child, or other person of interest within a video surveillance network. Video footage from different cameras and time frames can be reviewed in just minutes, as the system automatically filters out 95 percent of irrelevant images. GP Systems will introduce their new palm vein identification technology at IFSEC International, an accurate and secure technology that makes it a perfect fit for the banking industry. RISCO HandyApp - Smartphone Application Additional confirmed participants in the Innovation Trail includes the RISCO HandyApp, the first smartphone application dedicated to supporting the sales and installation activities of professional security installers. The app allows installers working with RISCO products to increase their efficiency and sales potential by providing access to everything they need for a smooth installation. Vorty will launch the new Vorty Net smartphone operated access control system, a Bluetooth proximity reader that allows or denies a selected smartphone access to unlock any door electric strike, electromagnetic lock, automated garage door, motorized gate or barrier. Sony PXW-FS7 4k XDCAM Camera Also Sony Professional, who recently won the Technology Innovation of the Year at the Digital Studio 2015 Awards in Dubai, will be showcasing the PXW-FS7 4k XDCAM camera that features a Super35 CMOS sensor capable of shooting in 4K Quad Full HD (QFHD) and super slow-motion Full HD. Avertic Armour - Chainsaw Protective Textile Finally, Engtex AB will showcase its highly advanced textile Avertic Armour, developed from the No. 1 chainsaw protective textile, Avertic Pro+. This warp-knitted textile uses the world´s strongest fiber designed to withstand break-in attempts when heavy duty tools are used. These new products, plus many, many more, will make up the IFSEC International Innovation Trail; ensuring visitors can easily find all the groundbreaking technology and new products at the show. Gerry Dunphy, Event Director- IFSEC International states: “This year we really wanted to put new products, the latest technology and most importantly innovation at the very core of IFSEC International, the introduction of the Innovation Arena and the expansion of the Innovation Trail really highlights this. We are really excited to be shining a light on all the great advances that are currently being made within this industry and look forward to celebrating and showcasing these in June.” IFSEC International Innovation Trail which will help visitors easily access the new technologies that have come to market High-level Expertise Delivered By Leading Experts Along with all the innovation at IFSEC International there will be plenty of high-level expertise delivered by leading experts within the security industry and beyond. For 2015 IFSEC International launches its Inspirational Speaker Series with three high-profile personalities covering the sports, business and extreme adventure worlds, each of the keynote speakers have reached the pinnacle of their careers and will share their expertise and unique experiences with the IFSEC audience. In its inaugural year the Inspirational Speaker Series will host leading businesswoman Baroness Karren Brady CBE, the world’s greatest explorer Sir Ranulph Fiennes OBE and international cycling superstar Sir Chris Hoy MBE across the three days. Another popular education platform that will return in 2015 is Safe Cities, a stream at IFSEC International which will focus on the protection of larger urban areas, critical national infrastructure and business continuity. Suited for senior and strategic personnel responsible for the protection of major assets within a city, Safe Cities will provide high level thought leadership sessions to provide more insight into this fast growing concept. Networked technologies and current trends all feature heavily in the Safe Cities Seminar Theatre, exclusively sponsored by Eaton. Keynote Address On ‘Safe, Smart And Connected Cities’ A taste of what visitors can expect within Safe Cities this year includes a keynote address from the Futurologist Dr. Simon Moores on ‘Safe, Smart and Connected Cities’ where he will look at emerging trends and technologies, the impact of big data and the Internet of Things along with the challenges and opportunities. Paul Adams the Director of Strategic Marketing, EMEA at Alcatel Lucent will host a session on ‘Transforming Public Safety with Smart Technologies and Secure Infrastructure’. Finally, Brian Kilkelly, the CEO of World Cities Network will host a seminar with the title ‘Improving the Resilience of Cities – the Application of Technology’, he will explore the opportunities from the availability of data and ever cheaper computing power to anticipate problems and coordinate resources. Safe Cities visitors to IFSEC International can access the full Safe Cities seminar program and take advantage of the networking opportunities adjacent VIP Lounge, sponsored by Siemens. 2 New Partnerships Into Safe Cities Safe Cities will provide high level thought leadership sessions to provide more insight into this fast growing concept This year IFSEC International will also incorporate two new partnerships into Safe Cities, the first is with HyperCat, a leading consortium of major technology developers who are driving the standards of interoperability and they will be discussing their HyperCatCity Initiative at Safe Cities. The second exclusive partnership for Safe Cities is with Euralarm, the association that represents the electronic fire and security industry, who will run their own dedicated half-day conference called Smart Cities: Digital Solutions to Keeping Citizens Safe and Secure. The education program at IFSEC International also incorporates the Keynote and Convergence Theatre; here leading players from across the security industry will debate the latest issues in cyber security or access control along with case studies and panel discussions around the state of the nation. Trends & Technologies For Video Surveillance Sessions within this theater include Jim McHale, Managing Director, Owner and Founder of Memoori Business Intelligence Ltd who will present on the Internet of Things in Buildings (BIoT) and the part security will play in this. Additionally, Atul Rajput, Regional Director (Norther Europe) for Axis Communications will look at the game changing trends and technologies for video surveillance in 2015 and beyond. Another highlight in the theatre will be a cyber-security master class from David Emm from Kaspersky Lab UK, in this session he will review the threat landscape in 2015, assess the malware evolution and give predictions for the future. The third education theatre within IFSEC International is the Security Solutions Theatre that will run seminars led by Will Lloyd the product development manager at BRE Global, Jim Swift from BB7 and Dave Tynan the VP at MicroPower Technologies amongst others. New Additions To Gadget Zone In 2015, IFSEC International will also introduce some great new additions to some old favorites; the Gadget Zone will join the Security & Fire Installer Live feature. Research highlighted that visitors want to get hands on with the products before they buy and this will provide the perfect opportunity to try out the biggest and latest range of products in one place. Along with the new Gadget Zone, Security & Fire Installer Live will also incorporate the Toolshed in partnership with Anglia Tools, the Fire & Security Jobs Bar, the NSI Expertise Hub and Engineers of Tomorrow, amongst other activities. Protection & Management Series The education program at IFSEC International also incorporates the Keynote and Convergence Theatre IFSEC International will once again be presented as part of UBM EMEA’s Protection & Management Series. The Protection & Management Series encompasses five major shows in related marketplaces covering safety, service management, facilities, security and fire, the overall ethos of the series is about protecting and managing buildings and places of work, along with the people and information within those places of work. The Protection & Management Series encompasses IFSEC International, FIREX International, Safety & Health Expo, Service Management Expo as well as Facilities Show, in 2014 the combined events attracted more than 40, 000 attendees over three days to London’s ExCeL.
Protecting Dormitory Residents and AssetsDownload
Protecting Critical Infrastructure Through Facial RecognitionDownload
12 Questions To Ask Your Access Control ProviderDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download