Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Securing Operations in the Middle East and West Africa

By Chris Mackmurdo
overseas and secure column
September 1, 2015

There is a wealth of business opportunities for companies seeking to meet growing demands for capital in frontier and emerging markets. The Middle East and West Africa are no exceptions. 

Security and geopolitical developments in these regions underscore the importance of understanding the operational, strategic and reputational risks involved in operating in complex and difficult environments. Risk management and resilience should be the cornerstones of best practices for companies looking to pursue opportunities in these markets.

 

Growing Risks

The last four years have been exceptionally turbulent in the Middle East and West Africa. The ripple effects of the Arab Spring and other geopolitical developments have led to an increased threat from transnational terrorist networks and reduced governmental capacity to deal with it.

The expansion of operating spaces for violent extremists has combined with unprecedented flows of foreign fighters to present high threat/high vulnerability risks that are difficult to detect, disrupt and protect against. Governments and corporations are exposed to security and geopolitical challenges that are growing in scale and complexity.

In the Middle East, the emergence of the Islamic State in Iraq and the Levant (ISIL) is driving a new wave of international terrorism threats, exacerbating sectarian tensions, destabilizing the region and mobilizing a new generation of global jihadists with connections to more than 70 countries around the world.

In West Africa, the rise of Boko Haram has devastated communities in northeast Nigeria, increased terrorism risks across the wider Lake Chad region and presented serious challenges to Nigeria’s security forces and political leadership. Recently endorsed by ISIL, Boko Haram has made significant progress in establishing an Islamic caliphate and is driving revenge attacks, conflict and instability that is spiraling out of the government’s control. 

 

Strong Business Opportunities

As these regions struggle, their economic indicators remain strong. The International Monetary Fund forecasts the Middle East and North Africa is set to be the third fastest-growing region in the world over the next five years, fueled by one of the youngest consumer markets on the planet.

Meanwhile, West Africa’s vast mineral wealth continues to attract international investors. In 2014, Nigeria overtook South Africa to become Africa’s largest economy and the continent’s largest foreign direct investments beneficiary, with the non-oil sector growing faster than the oil sector as Nigeria’s consumer society grows.

However, the increasingly complex and large-scale security and geopolitical risks confronting companies operating in these markets must not be ignored. Since risks are presented by a combination of threats and vulnerabilities, anyone seeking to pursue opportunities should take two aspects of their operation very seriously: risk management and resilience.

 

Risk Management

There are several competing models of crisis management that espouse best practice. As with many things in life, the KISS (Keep It Simple, Stupid) rule is the best guide when dealing with complexity and uncertainty. It’s important to remember a dramatic event is not, inherently, a crisis; it is the inability to respond effectively to a drama that creates it. Keeping things simple maximizes the chance of people understanding what to do and doing it effectively.

Companies operating in difficult and potentially hostile environments must, therefore, be able to:

  • Identify and analyze threats and uncertainties that have the actual or potential capability (and intent) to cause harm, in the form of a grid that can be prioritized and disseminated on a weekly basis. Access to high-quality intelligence with source descriptions and assessment bases is essential; otherwise it will be hard to reach actionable intelligence judgements.
  • Assess levels of risk by either identifying vulnerabilities against threats, or calculating the probability of threats vs. the impact they will have on the operational, strategic and reputational health of the company. The choice of method depends on requirements.
  • Plan specific responses that will mitigate the effects of or, ideally, eliminate the source of, threats that present risks. These plans should cover what actions will be taken but also who will take them, and should be disseminated accordingly. A variation of a Gold, Silver, Bronze command structure helps to assign responsibilities and actions, which is critical.
  • Practice, practice, practice!
  • Implement and monitor risk management plans at appropriate moments, strictly adhering to specific actions, wider handling and command structures.

Communicate clearly with internal and external stakeholders throughout the crisis management process to maximize collaboration and minimize confusion.

 

Resilience

Sometimes bad things happen, and the growing complexity and scale of high threat/high vulnerability risks have increased the chances of businesses getting caught by surprise. The need to maximize resilience by building capacity to maintain acceptable levels of operational, strategic and reputational health in the event that something goes wrong has never been greater. Risk management is necessary but no longer sufficient; the ability to absorb setbacks and recover is critical in gaining the competitive edge in hostile environments, both physical and cyber.

Resilience should be viewed as part of a company’s overall risk management capability. While risk management seeks to build structures that can implement risk management processes, resilience seeks to create processes that can make structures resilient. Best practice in this area follows the fundamental aspects of risk management above, but with a few more considerations. Resilient companies must be able to:

  • Protect against identified threats that have the potential to cause stress, shock and sustained change to critical infrastructure and working practices.
  • Diversify functions across the organization to ensure critical decision-making, access to assets and the implementation of action plans can happen in the event of transformative disruption.
  • Connect with other well-placed individuals and organizations outside the company to provide operational, strategic and reputational support.
  • Build redundancy in systems to avoid a single critical point of failure if things go wrong.

The role of risk management and resilience, and the way these functions are perceived within the wider company, is of fundamental importance. While risk managers and resilience officers need a solid understanding of their company’s business and be in a position to demonstrate their positive contribution to the bottom line, they should be perceived and treated as part of the executive team, not as a drag factor on the company’s ability to generate revenue. Handled well, risk management and resilience empower companies to identify and pursue opportunities in an increasingly complex but no less rewarding world.

KEYWORDS: counterterrorism international security Islamic State middle east security Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0915 overseas slide2 900px

Dr. Chris Mackmurdo is an Intelligence Expert with the Hostile Environment Liability Protection program and founder of Contest Global, a strategic intelligence consultancy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Newswire

    Survey Says Latin America and Middle East are Riskiest Regions for Business Travel

    See More
  • SEC blog w/ OSAC thumb

    On the Track of OSAC:Houston - Mexico Conference: Security Challenges Impacting Private Sector Operations

    See More
  • barrier-enews

    Top 3 Considerations for Selecting the Right Perimeter Security Solution

    See More

Events

View AllSubmit An Event
  • September 19, 2012

    Oil & Gas Critical Infrastructure & Asset Security Forum 2012

    The Forum will cover security issues related to both offshore and onshore oil and gas arising out of civil unrest, terrorist activities, and a competitive global market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!