Emerging Trends in Physical Security

Emerging Trends in Physical Security

Contemporary physical security is concerned with traditional security roles, assets protection, and loss prevention. All services are offered concurrent such that it cannot be cleared understood by a lay person. Emerging trends have kept the industry evolving rapidly. Traditional security refers to routine tasks that involve control of access to premises through checks, credentials authentication and authorization. Asset protection means that it has responsibility to ensure that organization’s physical assets (on-premise or on-transit) are not stolen, tampered with or damaged. Finally, loss prevention function of security demands that whatever should constitute risk with potential for loss must be prevented by security. Overtime physical security has been influenced by modern factors and realities of new world. Since 9/11/2001 terror attack on US, the perception and appreciation of security in general has been experiencing radical change. The service side is now a necessary evil. To some others it is a cost centre, yet to the conscious organization it is seen as business enabler that must be recognized and supported. This article highlights the developing and emerging trends that have kept security services on its toes. To remain relevant and command budget allocation, security must go with the tide of modernity. Below are the emerging trends in physical security. Sophisticated threat landscape: risk, threat and vulnerability are key components that is driving security service delivery. The goals are to ensure risks are strategically managed by proactive identification of threats and prompt resolutions for vulnerabilities. The threat model is increasingly evolving, threat actors have become sophisticated in knowledge, tools and collaboration. Automated Access Control System: many organizations are abandoning traditional manual access control for digitalized and automated type. This approach may adopt fingerprint, facial recognition, biometric, voice command, etc. Security Operations Centre: most businesses are currently either transforming their traditional CCTV control room to Security Operations Centre (SOC) or building new infrastructure. The centre serves as central hub for security operations. The core focus of SOC oftentimes includes Visual Surveillance System (VSS), Access Control System (ACS), and Intrusion Detection System (IDS). Security Operations Centre optimizes security service delivery for efficiency and agility where prompt response by a support Quick Response Force – QRF is the rule of thumb. Automation Of Operations: with dominance of artificial intelligence, some routine functions of security are being replaced with automated process. Such automation may include Visitor Management System (VMS), Electronic Patrol Management System (EPMS), Incident Management System (IMS), etc. This automation enables standardization, consistency and efficiency. Security Convergence: the gap between physical and cyber security is increasingly getting blurred. This novel approach enabled many organizations to integrate information technology solutions into physical security operations. For example, a facility may have physical deployment of guards at gate posts for physical security screening and digital boom barriers to compliment, at same time have a biometric access control at various access point in the buildings and restricted areas. All operations would be monitored real-time from a security operations centre. Data Analytics: physical security is traditionally not a data-driven filed however, current trend is favoring practitioners and service takers who are able to generate data that provide insights for informed decisions. Hybrid workforce: combining outsourced and proprietary security personnel to form a team with different background have become the norm in the industry. Hybrid work schedule: some middle level and executive security personnel have adopted a flexible work pattern of having some days at work and some days at home within the week. CPE & certifications: continuing professional education and certifications have become pillars of relevance and career growth for most security practitioners who are strategic about career success. Regulations and compliance: new regulations have been established to control and coordinate practices and actions in security industry. To avoid business disruptions and possible severe sanctions, organizations are duty bound to adhere and comply. Networking and collaboration: security practitioners, entrepreneurs, developers/technologists, etc. are appreciating the need to come together for mutual assistance and industry advancement. Networking and collaboration have form significant reference for stakeholders. Further to this, several organizations, institutes and interest groups have provided platforms for wiling players. In conclusion, physical security industry has established its value as a go-to business enabler. Several factors as highlighted above are playing key roles to keep it thriving in line with demands of modern business world. ALSO READ: 16 Trending Physical Security Threats Every Corporate Organization should Prepare to Deal with

Security Operations Centre – SOC Essentials For Physical Security Operation

Rear view of security system operator looking at CCTV footage at desk in office

Security Operations Centre otherwise known as SOC is a central hub for security operations. The concept was originally applicable to cybersecurity operations. However, it is no more an exclusive field. Futuristic physical security is increasingly optimizing its operation through adaption of this niche functions of surveillance and response. With Artificial Intelligence dominating business world, Security Operations Centre is indeed the future of security value. The reality of future physical security is such that most organizations would go full automation. This disruption will lead to sharp drop on reliance on physical deployment of guardforce personnel. Many routine roles of guardforce that require less decision making will likely be replaced with automation. Given above scenario; most corporate security departments are currently expanding their traditional CCTV control room operation to reflect a classic Security Operations Centre settings. In this configuration, the SOC will be equipped with skilled personnel for complex tasks that would essentially include monitoring, analyzing and responding to security threats. Security Operations Centre will serve unique function, dedicated to using analysis of observed event to direct and guide field security operatives to respond to emerging security incidents within a facility or distant location being monitored remotely. In the age of Artificial Intelligence, the importance of Security Operations Centre cannot be relegated. It would play crucial roles in shaping the future of physical security operations. Field security force who are serving as quick response force – QRF would rely on SOC to activate response to security incident. See below, the summary of security routine security functions to be integrated into Security Operations Centre. Controlling access to premises and assets. Monitoring people, locations and activities. Managing security incidents. Responding to emergencies. Supporting investigations. Enforcing compliance to company rules and regulations. Reporting incidents. The two types of Security Operations Centre – SOC:  Managed SOC – this is an outsourced SOC, to a third-party service provider. It may be located onsite or offsite command centre operated by the vendor. Dedicated SOC – this is a proprietary or inhouse SOC; owned and operated by an organization. It is usually located onsite, however; it maybe tasked to manage various offsite locations that belong to same organization. It is correct to brand such, a command centre SOC. Security Operations Centre technologies and tools: Access Control System – ACS: this tool is deployed for management of access control. It makes use of pre-enrolled card, pin, code, fingerprint, facial or voice recognition, etc. SOC runs the enrollment, privileges, activations, deactivations, data analysis and archiving, etc. for efficient operation. Visual Surveillance System – VSS: this technology provides SOC with cameras, DVRs, cables, videowalls, spot monitors, dedicated software/application, etc. for real-time remote monitoring of people, assets/locations & activities. Intrusion Detection System – IDS: this comprised of alarms, alerts and prompts; it may be visual and/or audio. IDS relies on sensors to collect data, analyzers to process data, and response mechanism to initiate appropriate actions which SOC would act on. Standard Operating Procedures – SOP: this sets step by step guides on required response of SOC per event and the overall functions. It provides framework for uniformity, consistency and standardization in Security Operations Centre. Composition of SOC team: Tier 1 personnel: this is an operator and level 1 analyst. Tier 2 personnel: this is an operator with added functions and authority above tier 1. Tier 3 personnel: this person handles supervisory or coordinator roles; having authority above tier 1 & 2 personnel. SOC Manager: this person should be responsible for overall SOC resource management. Primary functions of SOC include: Monitor – this function requires active surveillance on cameras, alarms, and alerts. Analyze – requires making sense of people, location and event being monitored. Detect – identifies abnormal, odd, out of place, threats and security breach event. Respond – requires taking actions in response to events or incident. Communicate – entails reaching out to other functional personnel about the incident. Collaborate -demands working with the entire team from start to initial and final close of the incident. Record – will require documenting every piece of information about the incident. Investigate – entails fact-finding focused on what-when-where-who, how & possible why. Report – is about providing fact-based account or testimony of the incident. Archive– store and protect data, and exhibits about the incident using chain of custody guide. Security Operation Centre is the future of physical security operations. It is been driven by Artificial Intelligence. Its adoption will disrupt traditional physical security functions. It has potential for huge return on investment. Your organization’s CCTV control room operation can be expanded and transformed to SOC. ALSO READ: A Christian Journey That Started With Theft

Business And Career Opportunities In Private Security Industry

ImgResizer 20240731 0814 08207

Private security industry is growing rapidly globally. It is estimated to worth about 235.37 billion USD in 2023. Contemporary society is faced with myriads of security threats. Virtually every aspect of life has one of security challenges or the other. There are challenges in physical, socio-political, health, economic, cyber, and food security amongst others.  Security challenges have kept abreast with societal development. Of recent, the 9/11 2001 terrorist attack at World Trade Centre in New York USA has completely changed the perception of security and pushed it to front burner of budget proposals. Organizations, being it public or private have obligations to protect their assets including people and information. Those who have the required knowledge, competence and skills to assist in fulfilling these needs are creating values, wealth and confidence and earn from it. Business and career opportunities abound in private security industry and the field is large, it is still expanding. For basic understanding, private security industry refers to all security related functions, services and products outside of public law enforcement and the military. It is driven by private individuals but regulated by government of the state. See below, some business and career opportunities available in private security industry. Contractor to military, police and others: provision of services, supply of kits and various accessories to government security agencies, e.g., Military, Police, etc. Security consultancy: proffer and execute advanced security solutions to meet needs that are peculiar to clients. Training consultancy: develop and sell security related knowledge. Guard force service: provide man-guarding solution to clients. Road or Rail escort: provide road or rail escort to people and cargo. Airport protocols: provide meet, greet, & ease services at airport. Cash-In-Transit escort: provide fortified escort for cash movements to financial institutions. Executive protection: provide intelligence, & physical protection to VIPs and their interests. Bouncer/body guard: provide body-guard protection for personnel and for events. Security kits & accessories: supply security uniform kits and accessories to security companies and others. Canine (K9) dog service provision: provide security dog services to clients. Canine dog training (instructor): breed, train and provide dogs for k9 service companies. Private investigation: provide fact-finding security solutions to clients. e.g., due diligence, routine investigation, background screening and vetting as well as undercover security operations. Technical security (IT based): this involves production, installation & management of surveillance system, software development and franchise, vehicle tracking, drone patrol, system & information security, etc. CCTV Control room operation: provide management, administration & operation at CCTV control room. Security Project Management: this involves executing security projects like physical security installations, calibrations and testing, training, security risk assessment, security content design/development, audit. Marketing & branding: identify and provide market for security solutions. Talk show host: provide security related talk show for public enlightenment and education through radio, tv, YouTube, podcast etc. and security event compere/MC. Security operation and management (practitioners): provide direct security functions to organizations or individuals, e.g., guards, officers, supervisors, coordinators, analysts, managers, directors, vice presidents, etc. Security blogging: provide security information to public through blogging and other journalistic writings, e.g., this article you are reading now. Pipeline protection for oil & gas industry: provide physical security to pipelines, jetties and platforms. Ship/Vessel escort: provide maritime security escort to vessels, boats, fishing trolleys, and others. Community vigilante service (CVS): provide security protection using legal vigilante team in a community. Lease security patrol vehicles: provide security patrol vehicles, motorcycles, bicycles, horses, etc. on lease or hire. Sale of high-profile security gadget: supply security saves, vaults, doors, etc. Exhibition & trade shows: provide/organize security exhibitions and trade shows. Peace & Security NGO: run humanity-based security non-governmental organization focusing on peace and security, e.g., International Peace Bureau. Chaplaincy service (guidance & counseling): provide faith-based support services to security practitioners in the industry. Self-defense academy: provide training on non-lethal self-defense, e.g., taekwondo, karate, aerobics, martial art, etc. Security awareness coach: provide training on basic domestic security to organizations, individuals, families, homes, groups, etc. Write security text books, podcast, DVDs: research and produce security knowledge in soft or hard copy format, e.g., “Access Control” by Azubuike Nwenewo. Defensive driving school: provide defensive driving (driving against adverse condition and/or mistakes from other road users.) service for security protocol drivers. ALSO READ: You Need A Bodyguard