Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Enterprise Services

How to Address International Incidents and Investigations

By Shawn Clark
Shawn C. Clark
February 1, 2013

In a fiercely competitive international business landscape, corporations race to increase profits by taking advantage of lower labor, manufacturing and distribution costs that only emerging markets can offer.  Unfortunately, many of these low-cost markets – where fraud, corruption, government instability and public unrest are the norm – pose an increased safety and security risk to employees, corporate assets and operations.  Successful security leaders routinely and proactively assess these risks and enhance their security posture by placing assets in high-risk locations to minimize these risks, maximize brand protection and increase international investigative consistency.

 

What’s the Best Coverage?

Global companies with worldwide operations deal daily with security incidents and international investigations.  Having the right coverage to manage these incidents consistently is critical. Most security departments rely on either a centralized model with staff primarily based at headquarters or a decentralized one with assets regionalized throughout the world.

As a security leader, having a centralized staff is great for communication, training, collaboration, camaraderie and trust. This model works great if global companies conducted business in a utopian world market where risks are low and security incidents never occur. Unfortunately many markets are volatile and loaded with an unlimited amount of capricious threats and risks.

When conducting business in high-risk locations, security programs require oversight, as incidents and investigations are complex and common. A decentralized model will maximize protection, minimize risks and increase investigative consistency.

 

Understanding Culture and Defining Roles is Good for Both Business and Security

Dedicated security staff in high-risk international locations, particularly those born and raised in the region, understand the language, culture and local customs – all of which can affect business, security operations and investigative strategy. They understand regional and national politics, allies, enemies and how gender and title may culturally affect business dealings and strategic relationships.

When security assets are onsite and focused on security issues, productivity increases with local managers free to focus on the business without distraction. Litigation risk also decreases as the need for local business managers to perform security functions is eliminated. To realize these benefits, international security assets and management must clearly understand security’s role in the operation.

 

Trust Local Security Eyes for Intel

International security assets use their local, corporate security and law enforcement contacts to provide critical intelligence regarding incidents affecting other corporations conducting business in the region. This intelligence is difficult to obtain unless you are a local, you speak the language and live and work in country. Knowing who’s who or if your suspect is related or ‘connected’ to a government official, judge or local law enforcement is a must, particularly in countries where corruption is commonplace and due process and probable cause do not exist.

 

International Investigations

Consistency when conducting investigations is critical. Prior to conducting investigations abroad, spend some quality time with international corporate counsel, HR representatives and local security assets to identify any country-specific labor laws, contract covenants or exceptions to corporate policies that may affect the investigative process.

In many countries, law enforcement and judicial bodies are corrupt and are not likely to support a foreign company in a civil or criminal proceeding. International labor laws and union agreements are complex and must be studied in depth before launching an investigation. Depending on the country, you may be required to notify the employee they’re being investigated; assess discipline only one time – ruling out suspending the suspect employees pending the outcome of the investigation – or conclude the investigation and assess discipline within 30 days. Failing to incorporate local and international policies can be very costly.

 

Leveraging Local Benefits

In addition to acting as an onsite deterrent, international security team members will add value and improve consistency throughout all phases of the investigative process. Security assets in-country can tactfully and discreetly collect local preliminary evidence and observe suspects. They command the local language and slang, which is critical when questioning witnesses, obtaining quality witness statements, interviewing suspects and crafting the final report.

Overseeing security operations in high-risk, emerging markets is a challenging endeavor. Whatever the issue of the day, security teams and companies only get one chance to respond. On the international stage, companies with security staff onsite are poised to manage daily operational security incidents and investigations consistently, effectively and efficiently.  

This article was originally published in the print magazine as "Managing International Incidents with Decentralized Security Departments."

KEYWORDS: decentralized security internal investigations international investigations international security litigation risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Shawn C. Clark is President of Clark Consulting Grp., LLC. Clark’s experience stems from more than 20 years in the airline industry working in various capacities before serving as Director of Asset Protection and Global Security Operations at Continental and United Airlines. His deep understanding of enterprise business processes, award-winning security strategies and crisis management experience helps companies maximize value and minimize risk.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • funding feat

    Become a Profit Center, Not A Cost Center

    See More
  • enterprise responsive default

    HR Professionals Struggle to Address Workplace Violence Incidents, Marijuana Policies

    See More
  • Employees at a conference table

    Learning How to Manage Investigations

    See More

Related Products

See More Products
  • security book.jpg

    Security Investigations: A Professional’s Guide

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing