Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Burning Need to Protect Enterprises from Wildfires

By Bill Zalud
December 1, 2007
Wildfires in Southern California threatened numerous corporate headquarters and the homes of their employees. A key security effort: a pre-tested disaster plan and diverse means of communicating with employees and government officials.


A handful of big-name corporations evacuated their facilities while others concentrated on informing employees about the status of the recent California wildfires that struck Southern California. The bottom line: Security operations with a disaster plan and strong, diverse communications did a better job of handling the wildfires than those without.

Qualcomm, for example, was affected, not so much that its headquarters was in imminent danger but because many of its 11,000 people in San Diego live in areas hit or threatened by the fires. Sony Electronics closed its Rancho Bernardo U.S. headquarters for days. Other security departments impacted work for Acer/Gateway, EMC, Intel and Microsoft.

Toshiba’s top management and security executives used a systematic approach to data collection, authentication and decision-making that assisted the team in their response to crisis situations through an interactive progression matrix.

Communications Counts

County security officials found that so-called Reverse 911 played an essential role in getting evacuation messages out to residents.

But it was at colleges and universities where notification through myriad means played a role in saving lives during the California wildfires.

Pepperdine University received a lot of media coverage during the late October natural disaster. In response to the Malibu Canyon fire that began a devastating rampage, the university actively used its newly deployed mass notification system provided by 3n (National Notification Network) to help relocate faculty and staff to designated shelter-in-place locations on the Malibu campus and to coordinate efforts to prevent the loss of life and property.

According to students on campus, Pepperdine security and administrative executives sent out five notifications during the first day of the fires. Two of the messages included instructions to students and faculty to relocate from dorms and classrooms and proceed to safe areas on campus. Faculty, staff and students not on campus were urged, at the recommendation of Los Angeles County Fire officials, not to return to campus until the roads leading to the Malibu campus were opened and deemed safe for travel. Pepperdine officials sent out two more messages providing status updates of the fires, urging the population to remain in designated safe areas and asking them to stay calm. A final message was sent out to officially close classes the next day.

The alert system communicates with students, staff and faculty in minutes via a number of contact methods -- including native SMS text messaging, almost any voice-enabled device such as cell phones and landlines, instant messaging, pagers, faxes and more -- greatly increasing the likelihood that messages will be delivered and received in a timely manner.

When Brig. Gen. Steven Bliss decided to evacuate the Army and Navy Academy in Carlsbad, Calif., he used IRIS -- Immediate Response Information System -- from TechRadium. Bliss was able to send the message to more than 1,500 students, parents, faculty and staff. The system also allowed officials to determine simultaneously just who received or did not receive the notification, allowing all recipients to be accounted for.

Crisis Management

Crisis management plans were also put to the test.

During the recent devastating Southern California wildfires, Toshiba America Electronic Components, Inc., (TAEC) came out unscathed, but during the firestorm had an opportunity to test and prove a “beta” version of an online crisis management system that is a new aspect of that firm’s disaster recovery/business continuity planning systems.

The new Internet-based crisis management system, developed for TAEC by Newport Beach-based security consulting firm Direct Measures International applies a systematic approach to data collection, authentication and decision-making that assists the management team in their response to crisis situations through an interactive progression matrix. It is designed to mitigate risk and help the crisis team determine the best course of action for a wide range of potential crisis scenarios, both to maintain business continuity and to provide information or support for employees.

Federal and state agencies also used new technology in the wildfire events.

The use of three-dimensional geospatial data provided value in the firefighting efforts. The National Geospatial-Intelligence Agency licensed data from Intermap for California and other regions of the nation. The agency along with other agencies within the Department of Defense use Intermap’s NEXTMap USA radar imagery and high resolution terrain data to support efforts to fight the wildfires in Southern California.

Included in the high-resolution datasets are digital surface models depicting the earth’s surface (including cultural features such as vegetation, buildings and roads), digital terrain models displaying the bare earth (with all cultural features digitally removed), and orthorectified radar images (grayscale images that accentuate topographic features).

Insurance giant Chubb has solid advice for enterprise security executives. Does your plan have provisions for:
  • Conducting and documenting salvage operations?

  • Conducting employee briefings?

  • Developing and documenting a list of procedures for quick procurement of machinery, equipment and software?

  • Documenting building permit and facility certification procedures?

  • Documenting specialized production facilities and reconstruction plans?

  • Documenting the decisions made, the damage costs, and the repairs?

  • Ensuring adequate financing for restoration activities?

  • Identifying and documenting new building codes that may increase the cost of reconstruction?

  • Identifying and preparing potential relocation sites?

  • Identifying critical machinery, software, materials and vendors?

  • Implementing established recovery team responsibilities and priorities?

  • Implementing strategies to reach pre-disaster operational capacity as quickly as possible?

  • Launching plans to return to pre-disaster sales and revenues?

  • Notifying all employees, vendors, customers and governmental agencies regarding the restoration plans?

  • Obtaining building permits or zoning changes before restoration is needed?

  • Reviewing considerations that may increase construction time?

  • Taking inventory of all damages?

  • Verifying that facility and equipment designs, drawings and blueprints are part of the vital records storage program and duplicated off-site?

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • migrating feat

    Migrating from Keys: It’s All in the Journey

    See More
  • cards feat

    Adding Value by Adding Functions to Cards and Badges

    See More
  • Guardhouse Feature image

    Sentries to Officers: Guardhouses Diversify

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!