Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

How Enterprise Situational Awareness Builds Metrics

It’s a common phrase in the security field: “There is no silver bullet to prevent incidents.”

Situational Awareness

Using analytics helps Director of Security and Surveillance Jessie Beaudoin at the Downtown Grand Hotel and Casino in Las Vegas better track and detect possible red flags throughout the enterprise. For example, by analyzing daily revenue reports, Beaudoin’s team can tell which blackjack tables lost a significant amount of money in one day, and by checking for large payouts (a $1,500 payout for a $2,300 daily loss, for example). If no large payouts are shown, they could open an investigation to review video of that table’s activity. Photos courtesy of the Downtown Grand

Situational Awareness

Using security systems to their full potential has helped Owen Key, the CSO and CISO for the City of Calgary, Alberta, Canada, to build metrics to help him sell security’s story to city executives and other departments, all while protecting key landmarks and infrastructure, such as the old City Hall, pictured here. Photo courtesy of the City of Calgary

Situational Awareness
Situational Awareness
September 1, 2014

It’s a common phrase in the security field: “There is no silver bullet to prevent incidents.” With risk landscapes expanding online and security executives taking on more responsibilities throughout the enterprise, however, the phrase doesn’t stop security leaders from looking for tools to help lessen the load of managing the enterprise’s risk. And, for many, this starts with enhancing enterprise awareness.

For Owen Key, the Chief Security Officer and Chief Information Security Officer for the City of Calgary in Alberta, Canada, managing the city’s mature security department (which includes information security, internal investigations, physical security and more) requires as much information as possible.

“We manage security for more than 350 sites and buildings,” says Key. “Most of our staff have not visited every one, so having a PSIM (physical security incident management) system gives our staff better insight into buildings and operations, so we can triage events more effectively.”

Their PSIM system includes an incident management program, Perspective by PPM, and more systems are being integrated every year. Key and his department have been working on this PSIM system for more than five years, and the next addition is a 3D mapping tool to help dispatchers in the city’s two fully integrated command centers better guide first responders through facilities. On the logical and information security side, Key has invested in a SIEM (security information and event management) system.

“Combined, these systems help us improve our security posture,” Key says.

“I’ve been in this role for 10 years, and we inherited PPM’s precursor system for incident management, IRIMS, but it was not being used to its fullest extent,” he says. “We were able to expand use of internal e-reporting for incidents, and in turn, glean more insight into our own operations, providing us with much needed metrics to sell security.” Key adds, “These metrics allowed us to obtain good capital to improve security as well as operations and expand our program.”

Now, Key continues to pull metrics with Perspective, complete with workflow and dispatching capabilities, allowing for the collection of even more security event data submitted by a variety of departments throughout the organization.

"Metrics help us drive where we want to put our scarce resources in play,” Key adds.  

Similarly, Jessie Beaudoin, Director of Security and Surveillance for the Downtown Grand Casino and Hotel in Las Vegas, uses both internal and external metrics to prove security’s value to the C-Suite.

By using law enforcement crime statistics, Beaudoin can be alerted when there is a rise in car thefts, and thus he would increase parking garage security and patrols. Or, an increase in push-door burglaries (when a thief prowls hotel hallways checking which doors are ajar and can be simply pushed open) could lead to key-checks at elevators to prevent anyone who is not a guest from entering hotel guest floors.  He can also use critical reach fliers, distributed by the Las Vegas Metropolitan Police, and network with other security and surveillance directors around town to stay one step ahead of criminals targeting casinos.

Beaudoin keeps in-house metrics as well; Key Business Indicators (KBIs) are a record of thefts, slip and falls, or other incidents on property, and he can disseminate this information to higher-level executives during daily security briefings.

“During these meetings, we want to explain crime trends and what we’re doing to curtail that activity,” says Beaudoin, who introduced the Downtown Grand’s surveillance program to Securitymagazine during a speech at the Security one2one Summer Summit by ISC. “It’s all about being aware of what your risks are, and having and sharing this knowledge helps to back up our budget requests, such as a request to boost staffing for more garage patrols or key-checks.”

For Key in Calgary, using metrics to show security’s value to enterprise leaders is an act of creativity. He works with a dedicated communications consultant to present security’s strategy and vision, often using two to three pages of infographics instead of lengthy written reports to show security’s current status.

“You can’t make the graphics without having all of the metrics and research to back them up, but this presents it in a way that’s easy to understand and fast to present,” Key says. “We want to avoid the ‘Fort Knox’ mentality and concentrate on protecting our critical assets. Having these metrics helps to better explain what those are to city executives.

“Be creative with it,” he suggests. “Within security, we have to sell the idea of our services and become a strategic business partner – enabling rather than just impacting.”

Beaudoin is working to better enable the Downtown Grand to succeed by making the most of surveillance assets and video analytics. By combining video surveillance and big data gathered throughout the enterprise, he and his team can look for red flags, such as one particular bartender who has low revenue, a high number of voids and no-sales. This could be a sign of theft or sweethearting (giving free product or services to friends). Checking employee card use throughout a shift could help lead the security investigations team to a case of time fraud.

“We’re using data to lead us to the crime,” Beaudoin says. “Analytics completely make our job of surveillance different than it was 10 years ago.”

Notifications are one of his first lines of defense when it comes to addressing the inevitable business risks of insider theft and loss prevention. Employees must call in to the central command center before they escort money around the casino, and table games have low notification thresholds so that surveillance employees can be aware of which games have large stockpiles of funds and monitor them more closely.

Another tool Beaudoin uses to keep aware of potential problems on the casino floor is auditing: “For two to three days, for 24 hours, on every shift, we will monitor one single area,” he says. “If we’re auditing the main cage, for example, we’ll review the procedure manual and watch every transaction, every count, every employee for cellphone use, proper conduct, uniforms, everything. The benefits to this are two-fold: we can identify anything suspicious in that department, and we can identify good behavior. In both cases, we send a report to the area manager.”

To minimize risks of collusion, surveillance employees are not allowed to socialize with any other casino or hotel staff, barring HR, without risking their job. They are only allowed to speak with executives when they are inside the surveillance room.

Beaudoin also works with the public relations department to investigate any negative statements posted to social media accounts about the casino and hotel, an area which has seen much more activity in the past five years.

John Slattery, Senior Vice President at investigations firm AOOC II, LLC, is working with social media monitoring as well, to provide as much information as possible to his high-profile sports franchise clients about potential draft picks or scholarship recipients.

“Most professional franchises do some form of due diligence, and they can tap local resources for basic investigations,” he says. “Risks can be mitigated further, however, if you go through the trouble to vet your individuals on a behavioral level. Social media is a person’s social life in public, and it can augment existing insight into a potential investment.”

Working with CES PRISM Social Media Investigation reports, Slattery investigates a subject’s entire Internet footprint, including public source information, public records, social media and the person’s network and connections to either confirm or refute issues.

For example, he says, investigating a potential player for a pro-baseball franchise, the subject popped up in multiple arrests in multiple states while enrolled in college. A local investigation at one of the player’s colleges showed that he was asked to leave due to marijuana and alcohol abuse.

In another case, an investigation into a potential draft choice revealed that, which the player himself had no suspicious content on his record, his close associates on social media had posted content featuring guns, alcohol and drug innuendo involving this particular player. So, Slattery referred the case, with the new information, back to the franchise for further decision-making.

“While looking for anomalies or bad behaviors, you also find good behaviors, such as charity work, positive moments, and we report back to franchises on those notes as well,” he says.

There is a four-part approach to these due diligence investigations, he says, and it hinges on understanding all of the data that reports can uncover:

  1. Deploy your research tool
  2. Add analyses from trained experts
  3. Evaluate, vet and validate your information, adding context
  4. Ensure proper legal research has been added to address privacy and civil liberties

“There is still some reticence in investing in a front-end investigation,” says Slattery. “However, the cost of doing your due diligence and making the most of available data is decimal dust compared to what the enterprise would invest in the player.”

Similarly, the investment in enterprise situational awareness, whether from PSIM, video surveillance or analytics, is a valuable one both in terms of creating value and proving value to the C-Suite.  

Want to LearnMore?

Check out the following service providers for enterprise situational awareness tools:

•CES PRISM Social Media Investigations 

•PPM 

KEYWORDS: casino security security investigations security metrics Situational Awareness surveillance analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security key pad

    How to Converge PSIM and PIAM for Total Situational Awareness

    See More
  • Web Exclusive Logo

    How Situational Awareness and Location Systems Ensure Safety on America’s College Campuses

    See More
  • citysecurity

    Taking Situational Awareness to a New Level: Innovation, Technology and Citizen Stakeholders

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×
Using analytics helps Director of Security and Surveillance Jessie Beaudoin at the Downtown Grand Hotel and Casino in Las Vegas better track and detect possible red flags throughout the enterprise. For example, by analyzing daily revenue reports, Beaudoin’s team can tell which blackjack tables lost a significant amount of money in one day, and by checking for large payouts (a $1,500 payout for a $2,300 daily loss, for example). If no large payouts are shown, they could open an investigation to review video of that table’s activity. Photos courtesy of the Downtown Grand
Using security systems to their full potential has helped Owen Key, the CSO and CISO for the City of Calgary, Alberta, Canada, to build metrics to help him sell security’s story to city executives and other departments, all while protecting key landmarks and infrastructure, such as the old City Hall, pictured here. Photo courtesy of the City of Calgary

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!