Guidepost Solutions - Experts & Thought Leaders
Latest Guidepost Solutions news & announcements
ISC West 2024, the comprehensive and converged security trade event, hosted in collaboration with premier sponsor the Security Industry Association (SIA), delivered another year of successful programming and welcomed more than 29,000 security industry professionals to The Venetian Expo in Las Vegas. Improving customer experience ISC West elevated the customer experience by hosting both fan-favourite and brand-new offerings throughout the four-day event, which featured over 750 exhibitors, over 220 speakers, and over 110 education sessions covering the latest trends and solutions across the security industry. “This year, we were excited to continue to enhance the customer experience,” said Mary Beth Shaughnessy, ISC Event Vice President. ISC West Concert “From an additional 20,000 square feet on the show floor, approximately 100 more exhibiting brands, and events like the first-ever ISC West Concert featuring The Wallflowers, attendees had access to our most expansive lineup yet." "This year’s resounding success is the result of so many individuals – exhibitors, attendees, speakers, and partners. We’re already excited for 2025 and look forward to continuing to raise the level of engagement at future ISC Security events.” Innovations in safety and security Attendees had the opportunity to make impactful connections with their peers in the field ISC West welcomed a swarm of security professionals from around the world. Attendees and exhibitors alike were able to see, experience, and learn about the biggest innovations in safety and security. Just as importantly, attendees had the opportunity to make impactful connections with their peers in the field. The turnout continued to display year-over-year growth for general attendance, hosting over 19,000 attendees. SIA Education “ISC West 2024 was a resounding success, not just in the strong show attendance but also in the outstanding quality of SIA Education at ISC West programming, courses and offerings delivered,” said SIA CEO Don Erickson. “The strength of the security industry was richly evident in the innovations seen across the show floor and particularly visible in the SIA New Products + Solutions Awards entries." SIA meetings and special events "The many SIA meetings and special events that gathered the broader security industry together to connect on critical topics in artificial intelligence, cybersecurity, critical infrastructure protection, school security, technology standards, and more elevated the ISC and SIA member experience." "The 2024 show exemplified why our ISC West is the nation’s pioneering converged security event.” ISC West 2024 highlights All ISC West badge holders were granted complimentary admission where they could meet their peers First-ever ISC West Concert! - New in 2024, ISC West hosted its first-ever concert featuring the Grammy-winning rock band The Wallflowers as the headliner. It was an after-hours concert experience that took place on the Main Stage – just steps from the show floor. All ISC West badge holders were granted complimentary admission where they could meet their peers for a fun and memorable experience beyond exhibit hall hours. The ISC West Concert was presented by Headline Sponsor, Wavelynx. Showcasing latest advancements AI Discovery Zone - ISC West also debuted the AI Discovery Zone where attendees could experience the emerging power of AI firsthand. Those who stopped by the activation had the chance to engage with interactive displays and hands-on demonstrations showcasing the latest advancements in AI technology and how it is shaping the future of security. Keynote series - The dynamic trio of Keynote Speakers covered a range of the industry’s hottest topics. Attendees were able to walk away from these presentations with a greater understanding of how cutting-edge security innovations touch countless aspects of their lives from national security to professional sports leagues to workplace productivity and much more. Day 1 Keynote: Cybersecurity, the Big Picture for Industry Pioneers: Admiral Mike Rogers, Former Director, of the National Security Agency; Former Commander, of US Cyber Command; and Former Chief, of Central Security Service Day 2 Keynote: From the Front Lines to the Field: A Security Journey in Major League Soccer: Jeff Stonebreaker, Senior Vice President, Safety and Security for Major League Soccer Day 3 Keynote: Women in Security Forum Keynote Breakfast: Harness Generative AI Like ChatGPT for Enhanced Performance | Presented by SIA Women in Security Forum: Crystal Washington, Technology Trends Expert and one of Forbes’ 50 Pioneering Female Futurists Most innovative technologies SIA New Products + Solutions Awards - The SIA New Products + Solutions (NPS) Awards allowed attendees to discover the current most innovative technologies with winners from across the security field. Explore some of the top winners below and the full list of winners here. Best New Product Award: IronYun – IronYun Vaidio AI Vision Platform 8.0 Judges’ Choice Award: Swear – Swear Authenticity Engine SIA NPS Merit Award: Chris Grniet – Global Head of Global Security & Safety (GSS) Strategy at Visa Inc. ISC West 2025 With attendees eager to network, conduct business, and learn from experts, show organizers look forward to ISC East 2024 – the Northeast’s pioneering security and public safety trade event held November 19-21 at The Jacob K. Javits Convention Center in New York City, in collaboration with premier sponsor SIA and partnership with ASIS NYC. Already making plans for next year? Save the date for ISC West 2025, held from April 1-4 at The Venetian Convention and Expo Centre in Las Vegas where security professionals can continue to experience the largest and most dynamic industry trade event of the year.
Guidepost Solutions, a pioneer in domestic and international investigations, compliance solutions, monitoring, and security and technology consulting, announces the creation of ‘Centres of Excellence’ across the Security and Technology Consulting Division. The deployment of these ‘Centres of Excellence’ will enable an experienced global team to utilise resources and execute projects, regardless of geographic region. Technology consulting services In conjunction, Guidepost Solutions is pleased to announce the promotion of Edward Batchelor to Executive Vice President of the Security and Technology Consulting Division. With over 12 years of experience in physical, technical, and operational security design and consulting, Batchelor has developed results-oriented solutions tailored to meet the needs of clients and specific project requirements for the protection of assets in multiple vertical markets including higher education, corporate, institutional, and government. Batchelor has developed results-oriented solutions tailored to meet the needs of clients Guidepost Solutions’ security and technology consulting services, under the continued leadership of President John Torres, are operations-centric and supported by excellent technology design. The Security and Technology Consulting Division’s ‘Centres of Excellence’ will shift the practice group to a service-oriented structure while continuing to deploy a holistic planning approach and a comprehensive risk assessment methodology to address the unique security needs and challenges faced by any company. Elevate security programmes Guidepost Solutions delivers the analysis, information, design, and guidance needed to elevate security programmes to the next level and mitigate business risk. By bringing together similar subject matter experts into one unit, projects will be executed by a full team of resources, not to be limited by physical location. “The creation of ‘Centres of Excellence’ will further push our objective of one team working together towards common goals to enhance global recognition in our clients’ markets, while amplifying the quality of work and team development,” says Julie Myers Wood, CEO, of Guidepost Solutions. She adds, “The formation of these centres puts into action our distinctive approach of moving clients forward and we are excited to see how this restructuring of the Security and Technology Consulting Division can service our clients even more effectively.” Professional growth opportunities As the world becomes more interconnected, Guidepost Solutions knows it’s our job to evolve with it" “As the world becomes more interconnected, Guidepost Solutions knows it’s our job to evolve with it. Our experts will work together to serve clients across all of their locations to provide every project with unmatched experience and knowledge that is not found across other security firms,” said Batchelor. The ‘Centres of Excellence’ structure will enable enhanced professional growth opportunities, with diverse teams spanning all practice groups. Guidepost Solutions, in response to ever-evolving client needs, has grown in the last few years with the creation of the following solutions: Technology Design Physical Security Cybersecurity + Infrastructure Risk + Emergency Management Federal Protective Services Sports + Entertainment Security International Professional Engineering Services
There is a saying that ‘Everything is Bigger in Texas,’ and the Dallas police department fits the bill. The Dallas Police Department is the ninth-largest municipal police force in the U.S., with 3,099 sworn officers and 598 non-sworn staff. It is led by Chief of Police Edgardo (‘Eddie’) Garcia. In the last several years, the Jack Evans Police Headquarters building (named after the 53rd mayor of Dallas) has been upgrading its physical security using a layered approach to ensure the safety of officers and visitors 24/7. The most recent addition is a brand-new fence line fortified with vehicle gates and Boon Edam Turnlock full height turnstiles to control pedestrian access into secured parking areas. Isolating potential hazards The Jack Evans Police Headquarters building was built in 2003. The six-floor facility has 358,000 square feet and is spread over a three-acre site, with a separate 1,200 car parking garage and a two-acre, open parking lot for additional police and visitor parking. In an average month, there are 5,000 public visitors to the Jack Evans building The Headquarters building was under construction when 9/11 terrorists flew airplanes into the World Trade Buildings in New York. Therefore, security was a concern in its original design. Police officials worked with a Police Design Consultant – McClaren, Wilson, and Lawrie Architects of Phoenix, AZ – to help design the building to resist a terrorist attack and isolate potential hazards. The building also needed to control visitor traffic and access. In an average month, there are 5,000 public visitors to the Jack Evans building. Conducting security assessment After midnight on June 13, 2015, a 35-year-old male placed a duffle bag with a remote-controlled bomb to detonate later between cars in the parking lot of the headquarters building. The suspect then began shooting continuously at the lobby windows with a rifle. Officers responded to the scene, a vehicle chase began, and the incident ended outside the city. Fortunately, officers in the lobby took cover and were not injured. Following that incident, the Dallas Police Department conducted a security assessment of the building, and also at seven patrol stations throughout the city. The assessment included testing various construction materials for bullet resistance to various types of weapons. Gensler Architects and Guidepost Solutions, LLC developed the solutions and plans. Paul M. Schuster, Senior Corporal/Facilities Management, was responsible for managing the implementation of the security upgrades. Present outright attack The police officers and staff only want a place that is safe and where they can do their good work" “The police tend to be a symbol of government and some citizens see that as a visible target to lash out at,” says Schuster. Police officers are trained to expect the routine types of calls, such as domestic violence, traffic accidents, and other crimes. “Yet they must be flexible to anticipate the non-routine that can be dangerous and change in a heartbeat. Yesterday we were concerned about handguns, today we are worried about rifles, and the idea of terrorism is always present with outright attacks or bombs. The police officers and staff only want a place that is safe and where they can do their good work.” Public records service Layer 1 – Upgrading the Building’s Lobby Security with Detection and Prevention - In 2016, funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations to withstand rifle rounds, and $1.9 million to improve headquarters lobby security, and to upgrade an aging security system. In 2016, funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations Turner Construction Company and Convergint Technologies, LLC conducted the renovations and security technology integration. The headquarters’ lobby was initially built as a two-story glass-walled structure, with an information desk and public records service windows. Visitors could freely enter the lobby and were only screened in an open area to the side if going to the upper floors. Upgrading lobby security “The challenge in upgrading lobby security was the two-story lobby entrance glass. The glass was not bullet rated, due to budget constraints. Changing the front of the building to support ballistic rifle-rated glass would have caused extensive time, exposed the inside of the lobby to weather, and would not have solved all of the security issues. In addition, there were concerns about keeping an ‘open’ and friendly service concept in mind and ensuring that the lobby would not resemble a ‘fortress’,” Schuster said. The solution was to retain the original, two-story glass exterior but add a layer of security inside once a person enters the lobby – a new separate security screening room. A new interior wall with bullet-rated glass and solid bullet-resistant wall materials was constructed inside the lobby to channel visitors to the room. Security revolving door The door will reject both users and they must request permission from the guard Now, all visitors must pass through a metal detector and have their belongings x-rayed prior to entering the original lobby. The room itself also has bullet resistant walls to enable containment of any violent disruption or shooting inside. Once a visitor has been cleared, they exit the screening room into the main lobby via a Boon Edam Tourlock 180 security revolving door which is set to allow only one-way traffic into the lobby. The Tourlock is the most advanced security revolving door in the Boon Edam product range for its ability to prevent tailgating by unauthorised users. If more than one person tries to enter a compartment, the door will reject both users and they must request permission from the guard to pass through again, one at a time. Overhead police helicopter At the end of their visit, visitors will exit the building via the lobby through a separate Boon Edam Tourlock 180 that leads into the front vestibule where they first entered the building. The Tourlock is set to allow public visitors to exit only and will reject attempts at re-entry. The first layer of security was completed inside the Headquarters building However, any police officer or staff can present a credential and use the door to enter the lobby with a valid credential. In this manner, the first layer of security was completed inside the Headquarters building, while keeping the best aspects of the lobby design, including the antique police car, and the overhead police helicopter. Western access points Layer 2 – Upgrading the Headquarters’ Perimeter Security with Protection and Deterrence - In 2021, the Headquarters building implemented its next, planned security layer to deter crime and violence in the outer ten acres of the property complex, which consists of the three-acre building site, a two-acre, open parking lot, a five-acre garage and an access street between those. This phase was financed by a $1.2 million bond in 2017. Surrounding the north, south and western access points around the facility is a brand new, Impasse II heavy-duty steel palisade fence by Ameristar in a black powder coat finish. The fence is comprised of individual steel pales secured vertically to a framework of specially formed rails and I-beam posts. The pales bend outward at the top to deter climb-over attempts by intruders. Pedestrian entry option Close by is a Public Transit Light Rail station which some officers use to and from work At the north and south entrances located on an access road behind the Headquarters building, HySecurity and Lift Master motorised gates are positioned to allow only authorised police officers and staff to access the exterior secure areas by car. Adjacent to each of these vehicle gates are Boon Edam Turnlock 100 full height turnstiles to allow pedestrian police officers to enter the parking area and walk into the headquarters building. Close by is a Public Transit Light Rail station which some officers use to and from work; and some officers choose to park their personal vehicles outside the secure area; therefore, the Turnlock 100’s provide a discrete, pedestrian entry option that safeguards users who otherwise might walk through the vehicle gates and risk injury or allow unauthorised vehicles to enter. Outdoor weather conditions The Turnlock 100 turnstiles were selected for their ability to stop tailgating and also for their rugged construction that can withstand outdoor weather conditions. Their full height structure deters climb over attempts and a black powder coat finish was selected to match the adjacent fencing perfectly. The Turnlock 100 turnstiles were selected for their ability to stop tailgating On the west side of the property, adjacent to the quartermaster’s building, is a public parking lot for visitors. Another Impasse II fence separates this parking lot from a staff-only, side entrance into the Jack Evans headquarters building. The fence forces all public visitors to walk on the sidewalk to the front of the building to enter via the main entrance and screening room. Police fleet parking However, any police officers that are walking across the lot from the quartermaster’s building can use their badge to access the staff-only, side entrance to the Headquarters building by entering through a third, Boon Edam Turnlock 100 turnstile. The exterior fencing around police fleet parking and the Headquarters building improves the safety of officers, staff and the building itself by keeping potential threats out at a distance. Police facilities, and particularly police headquarters, are subject to incidents ranging from ‘random’ violence on individual officers to large protests related to local or national incidents. “While usually peaceful, we have noticed that as the groups disband or move to other protest sites, groups of individuals will test site security by pulling on exterior entrances to see if they can gain access and potentially be disruptive to operations,” stated Schuster. Police facility design Separation of the public from the movement of prisoners is at the core of good police facility design “A concern is if one person can open the entry, others will follow and outnumber responding officers. The one-at-a-time access granted by the Turnlock 100 turnstile allows police to better control and separate individuals that might be disruptive or who might follow officers accessing the secure area.” Police facilities are usually designed to provide enclosed areas to move arrested persons from vehicles to holding or processing-controlled environments. If these staging areas are overflowing, officers may park their vehicles in the fleet area and walk the prisoner into the building. Separation of the public from the movement of prisoners is at the core of good police facility design. Open parking lots “There have also been incidents nationally, where officers are beginning their shift and walk to their patrol vehicles to secure their work gear and are attacked by pedestrians walking through open parking lots. If you think of patrol vehicles as ‘mobile offices’, it is easy to see that officers can become distracted as they begin their shifts and not always aware of their surroundings until they leave the property. Securing these fleet areas should be the practice everywhere,” says Schuster. These areas are often directly adjacent to the building and are therefore a concern because of threats Every facility must also contend with deliveries, and medium to large facilities usually have loading docks and trash recycling. These areas are often directly adjacent to the building and are therefore a concern because of threats such as vehicle bombs or incendiary items in trash dumpsters; for the police headquarters it made sense to secure these areas from public access. Physical security plan “Securing the private access road to the Jack Evans Police Headquarters has always been a desire, and now the addition of the steel fencing, the vehicle gates and Boon Edam turnstiles has created a barrier of safety that protects all of our people and assets to the very edges of our property,” states Schuster. “This new deterrence layer makes our officers and staff feel safer and it protects our fleet of vehicles and the back sides of the building from random attacks, bombings or shootings. We are very glad to have this second phase of our long-term physical security plan completed.”
Insights & Opinions from thought leaders at Guidepost Solutions
Clean, safe mass transit systems benefit everyone. Today’s transit operators face tremendous challenges, including declining revenue due to work-from-home policies, concerns about disease prevention, and high crime environments. Among these concerns, difficulty recruiting and retaining police resources has been exacerbated by the ongoing mental health crisis that disproportionately impacts public transportation networks. Mass transit systems Safe cities require an operational environment where people feel comfortable on mass transit. Sustainable cities are built upon the growth of mass transit systems. Safe cities and mass transit go hand-in-hand. The safety of an urban city is intrinsically linked to the safety of its mass transit systems. Safe cities require an operational environment where people feel comfortable on mass transit For additional insights into the security of transit systems, we spoke with Angela Osborne, Associate Vice President of Risk and Emergency Management Solutions at Guidepost Solutions, who specialises in emergency management planning, security risk assessments, and physical security assessments. Q: How did the COVID pandemic impact the security of transit systems? Angela Osborne: The pandemic had a profound impact on transit system security. Transit systems are already highly susceptible to crime prevention through environmental design (CTPED) issues. Facilities with poor maintenance, lack of active monitoring or incidence response, and low foot traffic all contribute to CTPED issues, and the pandemic only aggravated this. Many regular commuters began remote work, thus leading to less use of transit facilities. Transit centres experienced an uptick in individuals engaging in drug activity, encampments, encounters with mentally disturbed persons, and opportunistic crime. As a result, individuals who maintained their commute became fearful due to safety and public health concerns. Q: How do millions of employees returning to work (after working at home, for example) change the transit security challenges? This has become a reason why individuals are resistant to returning to working onsite Osborne: While employees returning to work has increased foot traffic and the use of transit has provided positive CPTED elements in terms of having additional eyes and ears around, many individuals are stepping back into a risk environment that has significantly changed since these systems were last widely used. Due to the increase of illegal behaviour in transit facilities, criminality has surged across numerous urban areas. Many returning transit users were not prepared to face these changes. This has become a reason why individuals are resistant to returning to working onsite. Q: What role can employers play in keeping commuters safe as they return to the office? Osborne: Organisations need to provide security awareness training focused on transit. At a minimum, they should share safety resources provided by transit authorities. In addition, harassment on transit systems is a persistent issue that should not be overlooked. Organisations need to provide security awareness training focused on transit Organisations cannot assume that everyone is familiar with these elements, taking into consideration that some individuals began employment at the organisation during the pandemic or are recent graduates. Others may not have had to navigate transportation to the office in years. If an organisation is requiring staff to come to an office, the organisation should fulfil its duty by providing training and resources. Q: What other current trends are impacting transit security -- for better or for worse? Osborne: Transit systems are impacted by many serious trends. Transit is a target for terrorists and saboteurs due to the trends of cybersecurity attacks and active assailant targeting. We recently saw how a cyber sabotage event crippled train operations in Germany. Whether the threat actor is a nation-state or non-state actor, many systems have significant cybersecurity vulnerabilities. As more individuals return to the office, more opportunities for targeting arise. In terms of physical threats, most transit systems are simply not equipped to conduct weapons screenings and have difficulty deterring weapons due to legal regulations. Q: What is the biggest missed opportunity when it comes to transit security? By incorporating AI features, systems can leverage an exceptions-based alerting system Osborne: The biggest missed opportunity is leveraging artificial intelligence (AI) advancements for video surveillance. We tend to find that transit systems have a lot of cameras, but systems are rarely monitoring all cameras in real-time due to the high number of cameras present. By incorporating AI features, systems can leverage an exceptions-based alerting system. Many existing cameras have some form of analytics present that can be leveraged to indicate a line cross and alert on motion; however, AI allows for a greater range of options to alert operators to issues. Q: What is the role of technology to ensure a secure transit system? How well does technology, in general, address the need? Osborne: Technology is an important element in securing a transit system. The current challenge is that the use of technology systems is used reactively rather than proactively. For instance, a video surveillance system is usually leveraged after an incident has taken place. Integrating access control systems, intrusion detection and alarms, and video surveillance can provide a much more proactive approach leading to faster detection or system alerts, enabling a safer and more accessible response. Technology can only accomplish this when paired with a response mechanism. Q: How will the practice and impact of transit security change in the next 10 years? One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement Osborne: Most transit systems will need to adapt to a hybrid work approach to right-size their operations and consider greater consolidation to make security resources more sustainable. One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement. This is a challenge for many urban departments and could continue to have ripple effects for mass transit. As more individuals use mass transit and return to some level of pre-pandemic life, people are likely to feel more comfortable on mass transit (pending no follow-on pandemics) with these safeguards in place. Q: What else do transit security professionals need to know? Osborne: I encourage all transit security systems to conduct a threat, risk, and vulnerability assessment to better understand the risk environment. Data is generated across these systems; however, it is often not being collected and leveraged to its fullest capacity to enable informed security and safety decisions. I would also recommend that new transit systems consider full barriers to prevent individuals from deliberately jumping or accidentally falling onto tracks. Although retrofitting stations to include this is difficult, new build stations offer a good opportunity to incorporate safe and secure design from the start.
More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organisation, are posing a major security problem for businesses. This is partially due to the widespread use of social media, encrypted communication platforms, and other tools. Now more than ever insider threats need to be identified, thwarted, and prevented. Social distancing policies When social distancing policies and mandates began keeping people apart, many turned to social media to stay connected. While social networking tools have provided a positive outlet and a way for people to feel more connected, these platforms have also become a hotspot for insider targeting because they provide a way to propagate disinformation and target individuals likely to be receptive to it. The ideal mark for an insider threat is someone who is active on social media Even more so, they have provided a means to develop relationships with organisational insiders and socialise with them. The ideal mark for an insider threat is someone who is active on social media, has sufficient access to sensitive information, lacks supervision in their day-to-day work, and works remotely. As the relationship develops, through the process of grooming, an employee can become more likely to disregard company policies and commitments. Disregarding company policies One reason insiders might act against their own organisation involves monetary gain. The pressures of the pandemic have led to record levels of unemployment and financial strain for millions of Americans. Financial issues can include struggling to pay for childcare, supporting family obligations, paying rent and more. Those who find themselves in a financial bind might not just act against their own company but could also more easily fall victim to a threat. Another reason that insiders act is that they may be disgruntled. Insiders may hold a grudge because they were passed over for promotion, were given an unsatisfactory performance rating, or they may be facing termination. While just one of these factors may not be a trigger to involve the company’s security team, any combination of these factors along with a change in the employee’s demeanour or behaviour should serve as a red flag to pay closer attention to the situation. Potentially malicious insiders Sending confidential information to an unsecured location in the cloud exposes the organisation to risk Another challenge employers face directly relates to the somewhat limited supervision of employees who work remotely. In this situation, identifying potentially malicious insiders is more difficult, largely because face-to-face interactions are limited. When the pandemic began, many companies shifted their primary areas of focus to keeping the business viable, which is understandable. However, with this shift of focus, less attention may have been paid to security issues. The proactive company will have ensured their employees are aware of the following: Steps they should take to ensure their devices -- both company-issued and personal -- are secured at all times. Sending confidential information to an unsecured location in the cloud exposes the organisation to risk. Breaking security policies to simplify tasks is prohibited. Ensuring their devices are updated with the latest security patches. A failure in any of these areas can produce an environment ripe for malicious insider activity. Cyber security teams This multidisciplinary group can lead the initiatives that are paramount to keeping the company secure The insider threat is an organisational threat and so it is most effectively addressed from a holistic perspective. Stakeholders from different parts of the organisation need to be at the table to understand and address such threats. An effective team includes personnel from the legal, human resources, communications, and physical and cyber security teams. This multidisciplinary group can lead the initiatives that are paramount to keeping the company and its employees secure. Conduct a risk assessment of the company’s security processes or a threat assessment to the company’s people or assets. No organisation is without some level of vulnerability, so identify the most critical assets, information, and systems; identify those who have access to these critical assets; and build controls around them to provide extra security. Delivering refresher training Build a training program to help employees and management identify concerning behaviours. Educate staff about insider threat indicators and provide instructions for how to report concerns. Require employees to complete training and deliver refresher training and updates throughout the year. Training on this matter is not a one-and-done situation. Ensure there is an impartial and confidential process in place for employees to report possible insider threats. Employees need to trust that if they report concerns about behaviours or actions on the part of a fellow employee, their information will be handled discreetly and if warranted, acted upon. Write a communications strategy clearly defining the process for relaying insider threat incidents. An effective plan lays out what information and when this information should be shared with specific individuals and to the broader community, who has authority to communicate sensitive information, and how the information should be disseminated. Remote working challenges Establish a check-in process for managers and their direct reports to enable a means for employees to share concerns and for managers to identify challenges or opportunities to assist employees working in the virtual environment. Make an EAP (employee assistance program) readily available to employees. Ensure they understand how to access their EAP and assure them that contacting the EAP will not have a negative impact on their career or growth potential. Providing venues for employees to share their concerns and talk with trained staff can greatly help organisations navigate insider threats and general remote working challenges. Security risk environment The virtual workplace has created a serious security risk environment for companies in which employees who would not normally engage in insider threats become more vulnerable to them. Through new technologies and possibly due to new financial hardships, those looking to harm an organisation are out there, searching for opportunities to strike. It is leadership’s responsibility to take proactive action to ensure their employees are aware of the possibility of insider threats, the seriousness with which management views them, and the resources available should someone fall victim. It is everyone’s responsibility to remain vigilant.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behaviour. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behaviour analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioural Analysis. Q: What are the elements of behaviour analysis? Torres: They include things like changes in appearance and behaviour, including social media behaviour, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training is critical regarding emergency situations in schoolsTraining should hold people responsible and set standards for acceptable behaviour. There should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioural change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioural indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviours or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organisation’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download