Overseas and Secure Column / Security Enterprise Services / Columns

How to Address International Incidents and Investigations

In a fiercely competitive international business landscape, corporations race to increase profits by taking advantage of lower labor, manufacturing and distribution costs that only emerging markets can offer.  Unfortunately, many of these low-cost markets – where fraud, corruption, government instability and public unrest are the norm – pose an increased safety and security risk to employees, corporate assets and operations.  Successful security leaders routinely and proactively assess these risks and enhance their security posture by placing assets in high-risk locations to minimize these risks, maximize brand protection and increase international investigative consistency.

 

What’s the Best Coverage?

Global companies with worldwide operations deal daily with security incidents and international investigations.  Having the right coverage to manage these incidents consistently is critical. Most security departments rely on either a centralized model with staff primarily based at headquarters or a decentralized one with assets regionalized throughout the world.

As a security leader, having a centralized staff is great for communication, training, collaboration, camaraderie and trust. This model works great if global companies conducted business in a utopian world market where risks are low and security incidents never occur. Unfortunately many markets are volatile and loaded with an unlimited amount of capricious threats and risks.

When conducting business in high-risk locations, security programs require oversight, as incidents and investigations are complex and common. A decentralized model will maximize protection, minimize risks and increase investigative consistency.

 

Understanding Culture and Defining Roles is Good for Both Business and Security

Dedicated security staff in high-risk international locations, particularly those born and raised in the region, understand the language, culture and local customs – all of which can affect business, security operations and investigative strategy. They understand regional and national politics, allies, enemies and how gender and title may culturally affect business dealings and strategic relationships.

When security assets are onsite and focused on security issues, productivity increases with local managers free to focus on the business without distraction. Litigation risk also decreases as the need for local business managers to perform security functions is eliminated. To realize these benefits, international security assets and management must clearly understand security’s role in the operation.

 

Trust Local Security Eyes for Intel

International security assets use their local, corporate security and law enforcement contacts to provide critical intelligence regarding incidents affecting other corporations conducting business in the region. This intelligence is difficult to obtain unless you are a local, you speak the language and live and work in country. Knowing who’s who or if your suspect is related or ‘connected’ to a government official, judge or local law enforcement is a must, particularly in countries where corruption is commonplace and due process and probable cause do not exist.

 

International Investigations

Consistency when conducting investigations is critical. Prior to conducting investigations abroad, spend some quality time with international corporate counsel, HR representatives and local security assets to identify any country-specific labor laws, contract covenants or exceptions to corporate policies that may affect the investigative process.

In many countries, law enforcement and judicial bodies are corrupt and are not likely to support a foreign company in a civil or criminal proceeding. International labor laws and union agreements are complex and must be studied in depth before launching an investigation. Depending on the country, you may be required to notify the employee they’re being investigated; assess discipline only one time – ruling out suspending the suspect employees pending the outcome of the investigation – or conclude the investigation and assess discipline within 30 days. Failing to incorporate local and international policies can be very costly.

 

Leveraging Local Benefits

In addition to acting as an onsite deterrent, international security team members will add value and improve consistency throughout all phases of the investigative process. Security assets in-country can tactfully and discreetly collect local preliminary evidence and observe suspects. They command the local language and slang, which is critical when questioning witnesses, obtaining quality witness statements, interviewing suspects and crafting the final report.

Overseeing security operations in high-risk, emerging markets is a challenging endeavor. Whatever the issue of the day, security teams and companies only get one chance to respond. On the international stage, companies with security staff onsite are poised to manage daily operational security incidents and investigations consistently, effectively and efficiently.  

This article was originally published in the print magazine as "Managing International Incidents with Decentralized Security Departments."

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Shawn Clark

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+