Country Risks Influence Security Levels

Aon Interactive Country Risk Map_2014

Source: http://www.riskmap.aon.co.uk/

Being exposed to different countries with varying risk levels, I’ developed a keen sense of the proper security layers that should be implemented. The most often asked question by company executives is as follows: Why are more resources invested in essentially identical business operations in different geographical locations?

The short answer is this, a country’s risk level is a fundamental external catalyst which added to the risk analysis enables decision making on the proper security layers to implement in the protection of people, assets and the well-being of all stakeholders. A number of different strategies are intertwined forming an effective protective fabric.  For instance, depending on your business activities (considering the difference between transporting valuables and commodities which require different mitigation strategies) in terms of duty of care for a broader geographical spectrum, few resources are allocated to staff protection in Alberta, Canada where the country risk level for violent criminal activities is relatively low, as opposed to Cairo, Egypt where political instability may trigger violent criminal acts (also considering the absence of or overreaction by state authorities), thus requiring more resources to assure the integrity of staff for on-going business operations. Even more resources would need to be invested if the risk levels reach a climax forcing business operations to be either temporarily or permanently interrupted.

Think of it as the layers and various fabrics that should be worn to protect yourself against the climatic elements. For instance, you’d be ill advised to don a heavy wool sweater or goose down jacket to the hot desert climate of Cairo for a business trip; just the same as you would not be fitted in a fashionable light linen shirt for a similar trip to Alberta at the height of the winter season. If traveling back and forth between these regions, care would be taken to wear the right clothing based on the prevailing climate. Equal permutations should be considered when tailoring the proper security strategies for these regions respectably and as mentioned before, based on your particular business operation.

 

Security in the news

 

Meet Bob

While monitoring information channels, I came across a thought-provoking article related to the application of a robot, appropriately named Bob (As of now in the research stage) to the task of building security. The immediate reactions are to associate this adaptation of advance robotics andAi, setting aside the inherent weaknesses in this technology platform, with two very sensitive areas of our current economic model, that of replacing human labor with technology at a time when there remains soft pockets of labor markets in the global economy. There is also a more acidic view, that of another creepy intrusion of advance technology into personal privacy as such “droids” may lend themselves to abuse either willingly by its operators or unwillingly by malicious intrusion from hackers exploiting flaws in its software architecture.

But there is another reading to this. For years we in the security profession have been witnesses to the convergence of physical and logical security, where in many cases these two separate ops centers functioned seamlessly. In other words the same command and control centers that handle cybersecurity and other InfoSec countermeasures also integrate surveillance, access control and the human (security officer) interactions forming a concentric mesh of enterprise protection. I see the development of new nodes, such as robotic technology powered by the latest in artificial intelligence technology as an inevitable evolution in the converged ecosystem. The challenge will be to leverage the new technology to plug gaps in existing security programs with augmented nodes of information. For instance this would take the surveillance technology which is for the most part fixed on particular locations and make it mobile and interactive with people occupying the space where deployed. Furthermore, promising technology such as facial or pattern recognition which has yielded limited results in protection schemes could have more effective applications when loaded onto a roaming droid.

These are just quick reflections on this development. In time we can come up with more sophisticated approaches to the application of robotic technology to protection programs and more importantly in a way that’s not detrimental to our privacy and to the millions of men and women that depend on the security profession as a livelihood.

Read article:

Meet Bob, Britain’s First Robotic Security Guard http://dailym.ai/U6foMN

Daily Mail (United Kingdom) (06/16/14) Zolfagharifard, Ellie

_____________________________________________________________________________________________________

The tin can: CLICK HERE 

 

 

Reloading: a road-map to re-engage with readers

After a long hiatus, I feel the need to return to providing valuable security information through this blog. If you care to know, I have been immersed in a very exciting project with a MNC providing a full range of security services in challenging environment. Although I’m forbidden from disclosing confidential information regarding any of past, present and future companies I’m engage to provide these services, I see value in sharing with you all the methods by which a protection program is articulated. It’s my firm believe that this grain of sand not only contributes to the discussions of more resilient people, communities and enterprises.

It’s my sincere commitment to continue to provide more valuable information through frequent posts and interactive discussions on comments and Q&A sections.

Security Beyond Borders 8