One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable em...
There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...
The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the...
ASIS International, global association of security management professionals, announced that Cyber Security Summit will co-locate with Global Security Exchange (GSX), expanding the depth of cyber education in the blockbuster GSX conference program. In the first year of its rebrand following a 63-year history as the ASIS Annual Seminar and Exhibits, GSX—the security industry’s flagship event—is expected to attract more than 20,000 operational and cyber security professionals and...
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...
By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall vid...
BrainChip Holdings Limited, the neuromorphic computing company, has announced the availability of the Akida Development Environment. The Akida Development Environment is a machine learning framework for the creation, training and testing of spiking neural networks (SNNs), supporting the development of systems for edge and enterprise products on the company’s Akida Neuromorphic System-on-Chip (NSoC). Akida is the flagship product in BrainChip’s mission to become the leading neuromorphic computing company that solves complex problems to make worldwide industry more productive and improve the human condition. Applications that benefit from the Akida solution include public safety, transportation, agricultural productivity, financial security, cyber security and healthcare. These large growth markets represent a $4.5B opportunity by 2025. The framework leverages the Python scripting language and its associated tools and libraries, including Jupyter notebooks, NumPy and Matplotlib Commercialization Of Neuromorphic Computing The Akida Development Environment includes the Akida Execution Engine, data-to-spike converters and a model zoo of pre-created spiking neural network (SNN) models. The framework leverages the Python scripting language and its associated tools and libraries, including Jupyter notebooks, NumPy and Matplotlib. "This development environment is the first phase in the commercialisation of neuromorphic computing based on BrainChip’s ground-breaking Akida neuron design," said Bob Beachler, SVP of Marketing and Business Development. "It provides everything a user needs to develop, train and run inference for spiking neural networks. Akida is targeted at high-growth markets that provide a multi-billion dollar opportunity and we are already engaged with companies in major market segments." Akida Execution Engine The Akida Execution Engine is at the center of the framework and contains a software simulation of the Akida neuron, synapses and the multiple supported training methodologies. Easily accessed through API calls in a Python script, users can specify their neural network topologies, training method and datasets for execution. Based on the structure of the Akida neuron, the execution engine supports multiple training methods, including unsupervised training and unsupervised training with a labeled final layer. The Akida Development Environment includes pre-created SNN models Data-To-Spike Converters Spiking neural networks work on spike patterns. The development environment natively accepts spiking data created by Dynamic Vision Sensors (DVS). However, there are many other types of data that can be used with SNNs. Embedded in the Akida Execution Engine are data-to-spike converters, which convert common data formats such as image information (pixels) into the spikes required for an SNN. The development environment will initially ship with a pixel-to-spike data converter, to be followed by converters for audio and big data requirements in cybersecurity, financial information and the Internet-of-Things data. Users are also able to create their own proprietary data to spike converters to be used within the development environment. Akida Model Zoo The Akida Development Environment includes pre-created SNN models. Currently available models include a multi-layer perceptron implementation for MNIST in DVS format, a 7-layer network optimized for the CIFAR-10 dataset and a 22-layer network optimized for the ImageNet dataset. These models can be the basis for users to modify or to create their own custom SNN models. Akida Neuromorphic System-on-Chip "Akida is the Greek word for ‘spike’. The Akida NSoC is the culmination of over a decade of development and is the first spiking neural network acceleration device for production environments," said Peter van der Made, Founder and CTO of BrainChip. Additional information on the Akida NSoC will be made available in the third quarter of 2018.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting eventsThe IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis And Application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyze data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant Access To Connected Devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyze this data is of imperative importance. Real Time Data Storage Availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing Stored Data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilize surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
SensLynx introduces all-inclusive programme designed to turn sales professionals and existing businesses into fleet/asset tracking entrepreneurs. Though still a young company, SensLynx has quickly established itself as one of the foremost brands in the fleet and asset management industry. Some of the credit goes to its co-founders, both of whom have long-standing track records as executives with other wireless entities and top tier fleet tracking companies. But SensLynx’s innovative GPS tracking hardware and software, as well as its full suite of mobile solutions for companies of all sizes, is another driving force behind its sterling reputation. The new SensLynx GPS Management Accelerator Program (GMAP) can either enable start-ups or enhance existing business portfolios IoT Fleet Management Since its inception, SensLynx has broadened its scope into many other IoT areas, but sees a powerful opportunity for unlimited growth in the fleet tracking arena through a network of newly minted resale business owners. IoT fleet management continues to be one of the fastest growing markets globally, and is forecasted to be worth over $15 Billion by 2024. Yet, it is also one of the most under-penetrated, opening a wide window for agile entrepreneurs in a broad range of verticals, such as Transportation, Plumbing, Heating/Air Conditioning, Landscaping, Electricians, Food Delivery, Utilities/Oil/Gas, Construction, Non-Emergency Medical Transport, Airports, Waste Management and Public Safety/Security. The new SensLynx GPS Management Accelerator Program (GMAP) can either enable start-ups or enhance existing business portfolios with the addition of tracking solutions. GMAP requires no upfront investment or inventory warehousing, and is structured to deliver recurring revenue via new sales channels, while also being compatible with legacy business models to capitalize on similar customer profiles. And because SensLynx white labels its solutions under certain criteria, entrepreneurs earn significant margin on hardware sales (up to 75%!) plus monthly subscription income from the customers they will own outright. Senslynx’s GMAP Programme “We believe in the entrepreneurial spirit,” said Rob Garry, Co-Founder and CEO of SensLynx. “Not only does this Accelerator Program help us grow our IoT Fleet sector on a grass roots level, it inspires others to strike out on their own or expand.” The GMAP programme is built around SensLynx’s bundled solution components, which include Fleet & Asset Tracking, Electronic Logging Device, Routing Application, Video/DashCam capture and Workforce Management for smart phones. At the heart is its comprehensive fleet/asset tracking software, packed with features like Data Handling, Parsing, Database, Mapping, Alerting, Reporting, Dispatch, Maintenance Logging, e-Logs, Local Posted Speed Limits, Addressing, Geofencing, Interstate Miles, Open API-based software and more. The complete bundled solution with software, hardware and data connectivity is attractively packaged at one guaranteed monthly price. Senslynx’s GMAP programme provides every tool necessary for companies to succeed GPS Tracking Solution Senslynx’s GMAP programme provides every tool necessary for companies to succeed, including initial training, planning for roll-out, conducting telemarketing for launch, developing website content, providing custom branded marketing materials and online demo support, accessible through the streamlined GMAP Reseller Portal where businesses can also easily manage supply chain and customer accounts. Tom Maguire, Co-Founder, COO and CMO of SensLynx said, “We’ve worked hard to create a superior, all-encompassing, yet simple programme that will ensure our resellers see measurable results in record time with dedicated support from us.” GPS Tracking makes customer fleets, assets and personnel safer and more productive, while reducing operating costs and increasing profitability overall. The SensLynx GPS Tracking Solution delivers everything and then some. And the low expenditure, high return GMAP programme allows sales professionals to become successful proprietors in an emerging industry rather than employees, and augments existing businesses with a leading-edge technology. The future of IoT Fleet Management is very bright.
Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those traveling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveler take to protect their calls, texts and data streams from being spied on? Duvall: When traveling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travelers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilized by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilize Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travelers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travelers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travelers’ hotel rooms. When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveler take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travelers? Companies should educate their employees on the importance of maintaining good internet hygiene while traveling abroad Duvall: When traveling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while traveling abroad. Some general tips to recommend to your employees when traveling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if traveling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveler benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related Apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customizable healthy travel packing list. The app can store travel documents, keep records of medications and immunizations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travelers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travelers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travelers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
Leaders in the security industry, government and technology gathered on June 27-28 in Washington, D.C., as the Security Industry Association (SIA) hosted its 2018 GovSummit. Each year, SIA GovSummit offers top-quality information sharing and education on security topics affecting federal, state and local agencies. This year’s summit tackled key security and policy issues like moving security services to the cloud, the use of artificial intelligence and machine learning for surveillance and the path forward for government and private security regarding the commercial use of aerial drones. Additionally, the event featured a half-day, expanded version of SIA’s popular Secure Schools Roundtable, SIA member visits on Capitol Hill, a networking breakfast at the Capitol Hill Club and presentation of the 2018 Legislator of the Year and Statesman Awards. DHS works to protect federal networks and facilities and critical infrastructure Protecting Federal Networks & Facilities Providing keynote remarks at the 2018 GovSummit were Chris Krebs, undersecretary of the National Program and Programs Directorate (NPPD) at the U.S. Department of Homeland Security (DHS), and Soraya Correa, DHS’ chief procurement officer. Krebs highlighted DHS’ work to protect federal networks and facilities and critical infrastructure, the threat of nation-state attacks on American democracy through targeting election equipment and spreading false information on social media to sow division and discord and NPPD’s focus on blending physical security and cybersecurity in a holistic, top-down risk management approach. “Government’s role is to assist in raising the security baseline,” said Krebs. Correa spoke about DHS’ procurement efforts in support of the department’s strategic vision and interest in inviting creativity and innovation in its contracts with organizations. “When we understand each other’s business processes, we can do better business together,” Correa said. “We work with industry, associations and more – we want you to do business with us.” Cybersecurity And Identity Policy In a panel discussion of the Office of Management and Budget’s new cybersecurity and identity policy, Jeff Nigriny highlighted the Interagency Security Committee’s new instructions to federal chief security officers on physical access control systems implementations being fully compliant with federal security standards. “2018 is the year we fix the policy,” Nigriny said. In another session, a panel of experts considered the path forward for government and private security when it comes to unmanned aerial system (UAS) and counter-UAS policy. As drones have become more widely used, national security agencies have raised drone security as an important policy issue. “We could call this time the years of drone security,” said Lisa Ellman, partner at Hogan Lovells LLP and Company and co-executive director of the Commercial Drone Alliance. Rob Reiter was recognized for his leadership on issues related to protective and architectural bollards to address the need for greater perimeter security Public Safety And Security During the summit’s Policy Leadership Awards Dinner, SIA also presented its 2018 Legislator of the Year and Statesman Awards. The SIA Legislator of the Year Award is presented annually to members of Congress and other elected officials who have demonstrated extraordinary leadership in advancing legislation and policies that encourage the effective use of technology solutions to enhance public safety and security and protect critical infrastructure. This year, SIA honored Sen. Orrin Hatch (R-Utah) and Rep. John Rutherford (R-Fla.) for their work on the STOP School Violence Act, Sen. John Thune (R-S.D.) for authoring the Investment in New Ventures and Economic Success Today (INVEST) Act, Sen. Gary Peters (D-Mich.) for authoring the Secure Airport Spaces Act and Rep. Dan Donovan (R-N.Y.) for authoring the Shielding Public Spaces From Vehicular Terrorism Act. The Statesman Award is presented each year to SIA member volunteers who have made extraordinary contributions of professional time, leadership and resources to position SIA to address the public policy challenges impacting the security industry. This year’s recipient was Rob Reiter, co-founder of the Storefront Safety Council and chief security consultant at Calpipe Industries, recognized for his leadership on issues related to protective and architectural bollards to address the need for greater perimeter security. SIA 2018 Partners & Sponsors This event was made possible through Washington sponsor United Technologies (Lenel and Interlogix); Lincoln sponsor HID Global; Jefferson sponsor Johnson Controls; dinner and reception sponsor Allegion; event sponsors AMAG Technology, American Fuel & Petrochemical Manufacturers, Ameristar Perimeter Security, ASIS International, Axis Communications, BCDVideo, Calpipe Security Bollards, Chenega Security, Christie Digital Systems, Defense Forensics and Biometrics Agency, Gallagher, GSA Schedules, Inc., Hanwha Techwin America, DHS Science & Technology, Identiv, Louroe Electronics, Marshalls, Milestone, Nasatka Security, Panasonic, the Partner Alliance for Safer Schools, Renova Technology and the Secure Schools Alliance; media sponsors Campus Safety and DomesticPreparedness.com; and industry partner ISC Security Events.
The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, today announced the appointment of Robert Anderson as a principal in its Strategic Advisory Services practice. As a recognized expert in cybersecurity, incident response, cyber hacking, counterintelligence and economic espionage, Anderson will advise C-suite clients on strategies to help them grow, manage security risks and protect their commercial businesses. “We enthusiastically welcome Robert Anderson to our award-winning Strategic Advisory Services team,” said Chad Sweet, co-founder and CEO of The Chertoff Group. “Robert possesses unique expertise in industry-leading cyber security threats and incident response strategies. He served as executive assistant director of the FBI in a very distinguished public career. In addition to his more than 20 years of honorable service to our nation, Robert has a successful track record collaborating with clients to tackle their most critical security issues, making him the ideal executive for this leadership role at our firm. Anderson held several senior level positions at the Federal Bureau of Investigation, where he spent more than 20 years rising through the ranks Information Security Expert Prior to joining The Chertoff Group, Anderson served as managing director and practice leader at Navigant Consulting Inc., where he led the initiative to build out their information security practice, exponentially growing the business and offering new services such as “CISO-as-a service.” Before Navigant, Anderson held several senior level positions at the Federal Bureau of Investigation, where he spent more than 20 years rising through the ranks from a special agent in charge to executive assistant director of the criminal, cyber, response and services branch. His top achievements include upgrading the FBI’s technology infrastructure - positioning the bureau as a global leader in complex national security, criminal and cyber investigations - as well as establishing a new, second branch within the international operations division which focuses on intelligence driven international operations, to name a few. “The Chertoff Group is a globally respected advisory services firm that brings unparalleled industry expertise to help clients understand the implications of changes in security risk, technology and policy,” said Anderson. “It is an honor to be a part of this elite team of security experts who are helping clients build resilient organizations, gain competitive advantage and accelerate growth.” The Chertoff Group applies industry insights around security technology, global threats, strategy and public policy to enable a more secure world Cyber Security Solutions An internationally recognized leader in security and risk management advisory services, The Chertoff Group applies industry insights around security technology, global threats, strategy and public policy to enable a more secure world. Through its Strategic Advisory Services practice, The Chertoff Group leverages a trusted approach, proven methodology and deep understanding for security effectiveness to enable clients to reduce cyber and physical risk, protect critical assets and position their enterprise for growth.
Genetec Inc., global technology provider of unified security, public safety, operations, and business intelligence solutions, announced that its unified platform, Security Center has been integrated with Secure Store, a profit protection and exception reporting solution developed by Appriss Retail. With this integration, retailers can now immediately disprove or validate suspicious transactions by accessing the security video evidence associated with suspected fraudulent activity. Security Center And Store Integration Secure Store enables retailers to significantly mitigate losses related to fraud, theft, and operational/systemic breakdowns. Using artificial intelligence and machine learning, Secure Store performs advanced exception modeling from multiple data sources and enables immediate corrective action. US-based retailer, DICK’s Sporting Goods, is using the Security Center platform to monitor over 18,000 cameras across 720 stores and manage 230 cameras and 130 doors at its headquarters. The organization is now using the joint Genetec/Appriss Retail solution to provide immediate insight, reduce shrink, improve profitability and achieve rapid ROI, as Jacob Gillette, Director of Loss Prevention and Operations, DICK’s Sporting Goods explains: Genetec/Appriss Retail Solution The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations" “The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations, which has been hugely beneficial to our organization. Our investigation team can now easily retrieve video from Security Center to validate suspicious transactions that are flagged by the Appriss Retail exception reporting system.” Thanks to the integration of Security Center and Secure Store, retailers can now simply click on the video icon within the Secure Store interface to immediately identify and review the security video related to individual transactions. This allows them to evaluate detailed evidence related to all refunds, transaction items, discrepancies between what is being scanned and what is on the bill, and quickly determine if there was indeed a problem. Importance Of Video Evidence In Fraud Cases The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users" “When you investigate fraud, you need to be able to validate questionable behavior. This is why video evidence is so critical. Thanks to our partnership with Genetec, we are now able to provide our customers with immediate insights that allow them to make informed decisions and build defensible cases based on hard evidence,” said Corey Adams Vice President of Global Client Services for Appriss Retail. “We’re pleased to be able to assist retailers with integrations that help make their teams more productive and significantly reduce loss. The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users,” said Scott Thomas, Director of Retail Market Development at Genetec.
Located one hour outside of London, the borough of Runnymede is a local government district with over 80,000 residents in the county of Surrey. It is one of the most prosperous parts of the London commuter belt and home to some of the UK’s most expensive real estate. In order to enhance public safety, the borough council contracted service provider Safer Runnymede. Working with Nottinghamshire-based systems integrator Central Security Systems, the experts installed a platform combining public safety technology with personal safety services such as care solutions for the elderly. Bosch Video Security System Today, Safer Runnymede coordinates all connected solutions in a Control Room in the town of Addlestone, where a staff of three operators monitor security feeds from over 500 security cameras deployed around various boroughs within Surrey. Next to public streets in the area, the flexible system also monitors schools, hospitals and other public buildings around the clock. Every year, the team responds to 20,000 incidents from cameras, and the video security system has proven an asset in monitoring traffic, preventing crime, as well as providing evidence and following suspects after incidents. But achieving this level of integration was a challenge. Connecting the solutions via the BVMS allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure Initially, the video security system consisted of hardware from several different manufacturers including Bosch – making updates or replacements a time-consuming process – that was networked on a Bosch Video Recording Management (VRM) solution. Looking for a future-proof and scalable system built on an integrated software platform, the officials in Runnymede tasked Bosch to design a fully IP-based security camera architecture. IP Video Surveillance System Since the Safer Runnymede system already included a Bosch monitor wall plus encoders, cameras, VRM and storage devices, system integrators could leverage the initial investment into a full suite of Bosch solutions. The system now combines new high-resolution AUTODOME IP 4000, AUTODOME IP 7000, MIC IP 7000 moving cameras, and FLEXIDOME IP 7000 fixed cameras, plus older Bosch and third-party analog cameras paired with encoders, decoders, and DIVAR IP 3000, 5000, 6000, and 7000 recorders. Connecting these solutions via the Bosch Video Management System (BVMS) allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure. The flexible system design and management has provided an integrated approach to our business delivery" As a result, Safer Runnymede has benefitted from superior image quality delivered by the added network video security cameras, without the need of replacing the complete existing analog video security infrastructure; all in a resilient, easily expandable system at a reduced total cost of ownership (TCO). What’s more, the customer has used the flexibility of Bosch solutions in a deployable video surveillance camera at remote locations. Installed in a custom-built enclosure provided by Central Security Systems, it streams video data from an AUTODOME IP 4000 camera via 4G and sends alerts via SMS to the Control Room upon detecting activity such as illegal waste dumping. Bosch Video Management System Migrating from a fragmented, analog system to an integrated IP network managed via BVMS (Bosch Video Management System) has proven a forward-facing decision. “The flexible system design and management has provided an integrated approach to our business delivery, allowing us to make better operational decisions and become more dynamic and competitive in the video surveillance marketplace, “says Les Bygrave at Safer Runnymede.
ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, the global provider of door opening solutions, has secured a series of high-profile contracts with Transport for London and Crossrail Limited. These contracts have included supplying and installing security doors for major London Underground redevelopments including London Bridge, Bond Street and King’s Cross, as well as station upgrades such as Victoria. ASSA ABLOY Security Doors has then gone on to secure multiple contracts within the Crossrail construction program. The new Transport for London-run Elizabeth line, built by Crossrail Limited, will open from December 2018 serving 10 newly-built accessible stations. Comprehensive Doorset Solutions Full doorset solutions have been delivered and installed to the new Elizabeth line stations at Canary Wharf, Paddington, Bond Street, Tottenham Court Road, Farringdon, Woolwich and Custom House. They have also been installed at other sites along the route including Pudding Mill, Eleanor Street and Mile End, as well as at the Elizabeth line depot at Old Oak Common. Each project presented its own demands and challenges in relation to product performance requirements. Doorsets had to be fully compliant to achieve the latest standards and meet the specialist needs of each environment: Factors to consider included fire, acoustics, air tightness, high-security and pressure resistance. Decorative finishes such as vitreous enamel, stainless-steel and bronze cladding helped complement the aesthetics of the surroundings on doors that required a finishing touch, and many of the doorsets required installation in challenging conditions, being underground, with tight access and restricted working hours. Our experience working with London Underground provided us with the ideal foundation for supporting our working partners on the Crossrail project" Powershield & Prima Door Ranges Brian Sofley, Managing Director at ASSA ABLOY Security Doors, said: “Our experience working with London Underground provided us with the ideal foundation for supporting our working partners on the Crossrail project for new Elizabeth line stations.” “Each contract brought its own individual challenges, but from the very beginning we worked closely with the architects and contractors involved to understand their requirements. This meant we could provide specialist and tailored solutions that met their exact needs. Solutions were carefully chosen from both our Powershield and Prima steel door ranges including cross corridor doors for high traffic fire escape routes, and pivoted fire rated platform doors to conceal station equipment rooms.” “We take great pride in our wide portfolio of well-respected transport contracts. It says a great deal that customers choose to work with us time and time again, and we put this down to our full-service offering, financial stability, and expert advice at every stage of the project, from specification to installation and inspection.”
For the first time in Europe, bodycams have been deployed in public transport on a nationwide level. Dutch railway company NS has equipped 700 safety and service employees with Zepcam bodycams that they can use in unsafe situations to increase safety and prevent escalation of violence and aggression. Large Scale Bodycam Deployment Body worn video is mostly used by police, other law enforcement and first responders. However, there is a growing demand for this technology to be used in other sectors like public transport, in order to increase the safety of employees and passengers. In the Netherlands for instance, the number of people who are victims of an annoying violent incident in public transport has increased from 13.5 percent in 2016 to 15.5 percent last year, according to research center CROW. It’s the first time a public transportation organisation deploys bodycams on such a large scale within the EU Dutch Railways (NS) approached Dutch tech company Zepcam to develop bodycam solutions for its safety and service employees. These workers monitor the train stations and approach people who are for instance dodging the fare, behaving aggressively or otherwise causing problems. Thanks to the bodycams, they now can record situations for further investigation and prosecution purposes. Zepcam has over 400 customers in 45 countries, including the police forces of Germany, Netherlands, Switzerland, Hong Kong and Singapore, and already supplies mobile video and bodycam solutions to local public transport companies like Movia in Denmark, SBB in Switzerland, SNCF and Veolia in France and Arriva in the UK. At Dutch Railways, it’s the first time a public transportation organization deploys bodycams on such a large scale within the EU. Benefits Of Bodycam Solutions According to Marjolein Maasland, representative of Dutch Railways, the new bodycams are comfortable to wear and easy to use. "I believe that the bodycam can help employees positively influence an escalating situation and possibly even prevent an incident," she states. CEO Bart van der Aa of Zepcam: "We are very proud to be the ones helping Dutch Railways’ safety and service personnel and their passengers decrease violence and prevent escalations. A growing number of organizations is discovering the benefits of our bodycam solutions for application in busses and subway trains and stations. We aim to make public transport safer all over Europe."
Major events require a major security operation, and the recent Royal Wedding was one of the biggest operations in recent times. Security was heightened due to the importance of the occasion due to the potential threat of terror to such a major event. There was a drone no-fly zone put in place, however this measure does not necessarily stop drones from entering the area. This kind of measure is put in place to ensure the safety of the attendees, and to limit the threat posed by drones, but it doesn’t prevent it. Drone License Plate Detection System How can you ensure that these measures are adhered to? Drone detection systems are becoming more prominent. DJI’s recently released Aeroscope is ground-breaking Commercial drone experts COPTRZ supplied a number of units to law enforcements agencies involved in security at the Royal Weddingtechnology. It’s a purpose-built drone detection system that allows the operator to track telemetry data from DJI aircraft in surrounding airspace within a radius of up to 20km. It’s in effect, a drone license plate detection system, as well as a data provider. Commercial drone experts COPTRZ recently supplied a number of units to law enforcements agencies and made the technology available to various agencies involved with the security at the Royal Wedding. Monitoring And Intercepting Drone Intrusion The Aeroscope will be used by the law enforcement agencies to protect high profile events. Particularly following the recent Royal Wedding’s no-fly-zone, Aeroscope is a useful tool to ensure that drones in the air near the zone are monitored and if needed are intercepted to ensure the security of the wedding attendees and the royal family alike. Steve Coulson, Managing Director and Founder of COPTRZ has commented on the deal: “We are absolutely delighted to be able to supply drone detection systems to law enforcement agencies. Particularly with big events such as the Royal Wedding and the upcoming World Cup, it’s imperative agencies take advantage of the technology available to them. It’s only a matter of time until technology like the Aeroscope become a necessity for law enforcement agencies worldwide.”
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components has announced that The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world, recently completed installation of a Vicon Valerus video management system to secure the Cathedral and surrounding 11.3-acre complex in Manhattan. Valerus VMS As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, The Most Reverend Desmond Tutu and President Bill Clinton.The new Valerus system combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras include models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Vicon IP Cameras Cameras also provide coverage of the Cathedral’s’ exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally unstable and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. Crime Prevention and Incident Management Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine, says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-to-end Vicon solution, including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile of installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.