SlideShare uma empresa Scribd logo
1 de 14
Contingency Planning
Remote Surveillance &
Facilities Management
By Steve Goodwin MBE MSyI
Compliance and Risk Director
This Session We will explore:
Contingency Planning &
Business Continuity
Management (BCM)
The role of the National
Intelligence Centre:
Remote location via IP
network
Monitoring, Control,
Management of multiple
sites and supply chain, 24-7
Protecting potential targets
in the City of London and
other locations
The systems and
technologies available:
Security & Facilities
Management
Access control post-
evacuation: audio-visual,
emergency services
Contingency Planning
Business Continuity Management
ISO 22301 / BS25999 -
British Standard for BCM
A holistic management
process that identifies
potential threats to an
organisation and the impacts
to business operations that
those threats, if realised, might
cause and which provides a
framework for building
organisational resilience with
the capability for an effective
response that safeguards the
interests of its key
stakeholders reputation, brand
and value creating activities.
Contingency Planning
and Resilience
Contingency Planning
and Resilience
Continuity of
Operations
Business
Continuity
Crisis
Communications
Disaster
Recovery
Cyber Incident
Response
Information
Systems Contingency
Occupant
Emergency
Critical Infrastructure
Protection
Stakeholders Frame Components Intended Outcome
Board Policy Procedures Understanding of Appetite
Executive & Senior Management Supporting Documents Proactive Assessment
Operational Management Plans & Training Understanding of Impact
Other Considerations
Impact on Capital Impact on Change Insurance
Synergies between the two
National Intelligence Centre
Connecting Sites & the Supply Chain
Remote:
1. Management
2. Monitoring
3. Access Control
1. Contingency Planning
2. Crisis & Vital Service Response
3. Disaster Recovery
4. Business Continuity
Data & Risk Analysis
Identify risks, scenarios
on site & in the chain
The Intelligence Centre is the hub for Plans:
Emergency services & local teams
Crisis Management Centre
Why Remote?
Central resource & control of multiple sites, teams,
disciplines & systems
Integration: alarms, CCTV, Facial Recognition, audio,
access control, man-down, EPOS, Detectives, vehicle
tracking
Away from danger, contamination, crime scene,
influence & tampering
Communication: deployment by multiple comms
links – RF, data over IP, SMS, email
Restore services to new, disabled or temporary site
Cost savings: outsource to share resources;
back-up; redundancy; extra expertise
Timeline
Pre-empt
and Prevent Disaster Strikes
Reduce
Within Minutes
or Hours
Respond
Within Hours
or Days
Recover
Resume
Within Weeks
to Months
Restore
Return
Disaster Strikes
Remote Monitoring
& Access Control
Lights On CCTV Unlock Doors Audio Link Man Down
Tested with out of hours delivery for major retailers
Vehicle in transit – GPS monitoring and 2-way comms
Control evacuation & emergency services entry & egress
Services control: power supply, lighting, Lifts, HVAC, fire control
Deploy local emergency & service teams (e.g. lift repairs)
Access Control:
Target Protection
Scenarios
Data
Risks
Plan
Deploy
Test
Consider traffic & spaces: staff, deliveries, suppliers, public access & out of hours
Analysts: assess statistics, incidents, response
time, costed alternatives
Evidence: coordination of technology,
detectives, investigation
Testing: rehearsals, detectives, ‘secret
shopper’ - training
• staff interviews & checks
• store detectives, ‘secret shopper’
External v Internal threats:
Technology & Systems
IP
Review range of technology platforms and compatible devices
Systems
RF radio, internet telephony, alarms, CCTV, audio, access
control, man-down, EPOS, Building Services
1. Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard Receivers
2. CCTV connections are supported via Immix, Sureview International, others
Lodge Service Accrington centre
Outsource to share resources; back-up; redundancy; extra expertise
Operational Risk Components
Purpose /
Vision
Strategy
External Events
Eg Weather/Terrorism
Core Processes Critical Systems Colleagues Facilities
Suppliers & Outsource
Partners
Change Agenda
1-3 Year
Strategic Plan
Control Self Assessment Operational Risk Business Continuity Insurance Programme
Operational Risk Strategy & Plan
Key Controls
End-to-end
Process View
Top-down Operational
Risk Profile
Bottom-up Operational
Risk Profile
Incident & Near
Miss Reporting
Resilience
Work-Area Recovery
Disaster Recovery
Policies
Claims
Incident &
Crisis Management
Operational
Risk Appetite
Operational
Risk Capital
Reporting
Scenarios
Finally…
Embedding the Culture
Define overall risk appetite at Board level. Holistic buy-in paramount
Aligned to business processes, including suppliers
Practical considerations – need policies & procedures
Integration: Risk Department, Business Continuity, Incident Management,
Security, Facilities Management. Keep things simple – common language
Reviews: data analysis, risk assessment, scenarios, TESTING
Potential to drive efficiencies and cost-savings: set KPIs and ROI
Lodge Service Presents at Counter Terror Expo, Olympia

Mais conteúdo relacionado

Mais procurados

Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureEnergySec
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
 
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedCMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedIgnyte Assurance Platform
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software DevelopmentHernan Huwyler, MBA CPA
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramWilliam McBorrough
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPHuntsman Security
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security ManagementChristophe Briguet
 
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Power System Operation
 
Limitless Tech 2
Limitless Tech 2Limitless Tech 2
Limitless Tech 2gconroy
 
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterBuilding a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterPriyanka Aash
 
The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?Unanet
 
Educause+V4
Educause+V4Educause+V4
Educause+V4ecarrow
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationMurray Security Services
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 
德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2俠客科技
 

Mais procurados (20)

Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
 
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance ExplainedCMMC 2.0 I L1 & L2 Scoping Guidance Explained
CMMC 2.0 I L1 & L2 Scoping Guidance Explained
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software Development
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance Program
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
 
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
Next Generation Scada Developing Advanced Security Monitoring & Threat Detect...
 
Limitless Tech 2
Limitless Tech 2Limitless Tech 2
Limitless Tech 2
 
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterBuilding a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
 
The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
Educause+V4
Educause+V4Educause+V4
Educause+V4
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Soc
SocSoc
Soc
 
德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
 

Destaque

Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Denis kisina
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv camerasMritunjay Kumar
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentationguestaec424
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera PresentationBasith JM
 

Destaque (6)

Netcast overview
Netcast overviewNetcast overview
Netcast overview
 
Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera Proposal to supply, installation and testing of CCTV Camera
Proposal to supply, installation and testing of CCTV Camera
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 

Semelhante a Lodge Service Presents at Counter Terror Expo, Olympia

Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013SitexOrbis
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfLongJidin1
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxMarcelPitelli1
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani Technologies
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxketurahhazelhurst
 
Anticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security SurveillanceAnticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security Surveillancecgiprotects
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...cgiprotects
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915IBMITServicesUS
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...Dale Butler
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada securityYulia Rotar
 
Extronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseExtronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseSusie Marriott
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...Valentijn de Leeuw
 

Semelhante a Lodge Service Presents at Counter Terror Expo, Olympia (20)

Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
 
Access Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptxAccess Control Segment in Madrid 2022.pptx
Access Control Segment in Madrid 2022.pptx
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentation
 
Chapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docxChapter 18 vital records recoveryVital assetsIn.docx
Chapter 18 vital records recoveryVital assetsIn.docx
 
Anticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security SurveillanceAnticipate Versus React To Security Threats with Security Surveillance
Anticipate Versus React To Security Threats with Security Surveillance
 
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
Anticipate Versus React To Security Threats with Surveillance Behavioral Anal...
 
MIservices
MIservicesMIservices
MIservices
 
Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915Security ibm fv3 for ss 012915
Security ibm fv3 for ss 012915
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
Extronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use caseExtronics Advance AeroScout Real Time Worker Location use case
Extronics Advance AeroScout Real Time Worker Location use case
 
Deimos building control suite eng
Deimos building control suite engDeimos building control suite eng
Deimos building control suite eng
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Stanley Security Solutions
Stanley Security SolutionsStanley Security Solutions
Stanley Security Solutions
 
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
WIB March 2016 de Leeuw Focus on basics: simple, robust and safe automation a...
 

Último

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 

Último (20)

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 

Lodge Service Presents at Counter Terror Expo, Olympia

  • 1. Contingency Planning Remote Surveillance & Facilities Management By Steve Goodwin MBE MSyI Compliance and Risk Director
  • 2. This Session We will explore: Contingency Planning & Business Continuity Management (BCM) The role of the National Intelligence Centre: Remote location via IP network Monitoring, Control, Management of multiple sites and supply chain, 24-7 Protecting potential targets in the City of London and other locations The systems and technologies available: Security & Facilities Management Access control post- evacuation: audio-visual, emergency services
  • 3. Contingency Planning Business Continuity Management ISO 22301 / BS25999 - British Standard for BCM A holistic management process that identifies potential threats to an organisation and the impacts to business operations that those threats, if realised, might cause and which provides a framework for building organisational resilience with the capability for an effective response that safeguards the interests of its key stakeholders reputation, brand and value creating activities.
  • 4. Contingency Planning and Resilience Contingency Planning and Resilience Continuity of Operations Business Continuity Crisis Communications Disaster Recovery Cyber Incident Response Information Systems Contingency Occupant Emergency Critical Infrastructure Protection
  • 5. Stakeholders Frame Components Intended Outcome Board Policy Procedures Understanding of Appetite Executive & Senior Management Supporting Documents Proactive Assessment Operational Management Plans & Training Understanding of Impact Other Considerations Impact on Capital Impact on Change Insurance Synergies between the two
  • 6. National Intelligence Centre Connecting Sites & the Supply Chain Remote: 1. Management 2. Monitoring 3. Access Control 1. Contingency Planning 2. Crisis & Vital Service Response 3. Disaster Recovery 4. Business Continuity Data & Risk Analysis Identify risks, scenarios on site & in the chain The Intelligence Centre is the hub for Plans: Emergency services & local teams Crisis Management Centre
  • 7. Why Remote? Central resource & control of multiple sites, teams, disciplines & systems Integration: alarms, CCTV, Facial Recognition, audio, access control, man-down, EPOS, Detectives, vehicle tracking Away from danger, contamination, crime scene, influence & tampering Communication: deployment by multiple comms links – RF, data over IP, SMS, email Restore services to new, disabled or temporary site Cost savings: outsource to share resources; back-up; redundancy; extra expertise
  • 8. Timeline Pre-empt and Prevent Disaster Strikes Reduce Within Minutes or Hours Respond Within Hours or Days Recover Resume Within Weeks to Months Restore Return Disaster Strikes
  • 9. Remote Monitoring & Access Control Lights On CCTV Unlock Doors Audio Link Man Down Tested with out of hours delivery for major retailers Vehicle in transit – GPS monitoring and 2-way comms Control evacuation & emergency services entry & egress Services control: power supply, lighting, Lifts, HVAC, fire control Deploy local emergency & service teams (e.g. lift repairs) Access Control:
  • 10. Target Protection Scenarios Data Risks Plan Deploy Test Consider traffic & spaces: staff, deliveries, suppliers, public access & out of hours Analysts: assess statistics, incidents, response time, costed alternatives Evidence: coordination of technology, detectives, investigation Testing: rehearsals, detectives, ‘secret shopper’ - training • staff interviews & checks • store detectives, ‘secret shopper’ External v Internal threats:
  • 11. Technology & Systems IP Review range of technology platforms and compatible devices Systems RF radio, internet telephony, alarms, CCTV, audio, access control, man-down, EPOS, Building Services 1. Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard Receivers 2. CCTV connections are supported via Immix, Sureview International, others Lodge Service Accrington centre Outsource to share resources; back-up; redundancy; extra expertise
  • 12. Operational Risk Components Purpose / Vision Strategy External Events Eg Weather/Terrorism Core Processes Critical Systems Colleagues Facilities Suppliers & Outsource Partners Change Agenda 1-3 Year Strategic Plan Control Self Assessment Operational Risk Business Continuity Insurance Programme Operational Risk Strategy & Plan Key Controls End-to-end Process View Top-down Operational Risk Profile Bottom-up Operational Risk Profile Incident & Near Miss Reporting Resilience Work-Area Recovery Disaster Recovery Policies Claims Incident & Crisis Management Operational Risk Appetite Operational Risk Capital Reporting Scenarios
  • 13. Finally… Embedding the Culture Define overall risk appetite at Board level. Holistic buy-in paramount Aligned to business processes, including suppliers Practical considerations – need policies & procedures Integration: Risk Department, Business Continuity, Incident Management, Security, Facilities Management. Keep things simple – common language Reviews: data analysis, risk assessment, scenarios, TESTING Potential to drive efficiencies and cost-savings: set KPIs and ROI

Notas do Editor

  1. Contingency Planning   Remote Surveillance and Facilities Management Advances   By Steve Goodwin MBE MSyI Compliance and Risk Director Lodge Service
  2. This Session – Target - we will explore:-   Contingency Planning & Business Continuity Management (BCM)   The role of the National Intelligence Centre: remote location via IP network   Monitoring, Control, Management of multiple sites and supply chain, 24-7   Access control post-evacuation: audio-visual, emergency services   The systems and technologies available: Security & Facilities Management   Protecting potential targets in the City of London and other locations
  3. Contingency Planning - Business Continuity Management   “ A holistic management process that identifies potential threats to an organisation and the impacts to business operations that those threats, if realised, might cause and which provides a framework for building organisational resilience with the capability for an effective response that safeguards the interests of its key stakeholders reputation, brand and value creating activities.” (ISO 22301 / BS25999 – British Standard for BCM (24 month transition 30th May 2014)
  4. National Intelligence Centre: Connecting Sites & the Supply Chain   Remote 1) Management 2) Monitoring 3) Access Control.   Data & Risk analysis – identify risks, scenarios on site & in the chain   The Intelligence Centre is the hub for Plans: Contingency Planning Crisis & Vital Service Response Disaster Recovery Business Continuity   Crisis Management Centre – emergency services & local teams
  5. Why Remote?   Central resource & control of multiple sites, teams, disciplines and systems   Integration: alarms, CCTV, Facial Recognition, audio, access control, man-down, EPOS, Detectives, vehicle tracking   Away from danger, contamination, crime scene, influence & tampering   Communication: deployment by multiple comms links – RF, data over IP, SMS, email   Restore services to new, disabled or temporary site   Cost savings. Outsource to share resources; back-up; redundancy; extra expertise
  6. Remote Monitoring & Access Control   Tested with out of hours delivery for major retailers   Vehicle in transit – GPS monitoring and 2-way comms   Access control: lights on > CCTV > unlock doors > audio link > man-down   Control evacuation & emergency services entry & egress   Services control: power supply, lighting, Lifts, HVAC, fire control   Deploy local emergency & service teams (e.g. lift repairs)
  7. Target Protection   Loop: Data – Scenarios – Risks – Plan – Deploy - Test   Consider traffic & spaces: staff, deliveries, suppliers, public access + out of hours   External v Internal threats: staff interviews & checks store detectives, ‘secret shopper’   Analysts: assess statistics, incidents, response time, costed alternatives   Evidence: coordination of technology, detectives, investigation   Testing: rehearsals, detectives, ‘secret shopper’ - training
  8. Technology & systems   IP – review range of technology platforms and compatible devices   Systems - RF radio, internet telephony, alarms, CCTV, audio, access control, man-down, EPOS, Building Services   Lodge Service Accrington centre– Alarms: WebWayOne, BT Redcare, CSL Dualcom and Sur-gard Receivers CCTV connections are supported via Immix, Sureview International, others   Outsource to share resources; back-up; redundancy; extra expertise
  9. Finally: Embedding the Culture   Define overall risk appetite at Board level. Holistic buy-in paramount   Aligned to business processes, including suppliers   Practical considerations – need policies & procedures   Integration: Risk Department, Business Continuity, Incident Management, Security, Facilities Management. Keep things simple – common language   Reviews: data analysis, risk assessment, scenarios, TESTING   Potential to drive efficiencies and cost-savings: set KPIs and ROI