This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Building AppSec in Enterprises
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Fighting Natural Disasters With AI
Security Enterprise ServicesManagementSecurity Leadership and ManagementPhysicalSecurity & Business ResilienceSecurity Talk ColumnPhysical SecurityColumns
Security Talk

Fighting Natural Disasters With AI

SEC1219-talk-Feat-slide1_900px
SEC1219-talk-slide2_900px
SEC1219-talk-Feat-slide1_900px
SEC1219-talk-slide2_900px
December 1, 2019
Diane Ritchey
KEYWORDS Artificial Intelligence (AI) / first responders / machine learning / natural disasters / security operations
Reprints
No Comments

To date, the 2019 California wildfire season has resulted in 6,402 fires and an estimated 250,349 acres of burned land. In October, the Kincade Fire became the largest fire of the year, burning 77,758 acres in Sonoma County.

Adding to the pain of many California residents, PG&E and other power utilities preemptively shut off power to many residents due to risk of wildfires starting in high winds due to high-voltage power lines.

The California wildfires have challenged enterprise security professionals as well, who are responsible for protecting their respective constituents, including managing emergency evacuations. For example, Cal Maritime Academy in Northern California ordered an emergency evacuation when fires spread quickly toward its campus.

How can security professionals tasked with protecting large, sprawling venues leverage their existing security hardware and software investments to better prepare for emergencies? The answer may be spatial intelligence, which is how security can take all the data their security equipment and IoT devices are producing and convert it into actionable information. That’s only possible with AI.

For example, thanks to machine learning and AI algorithms, software can automate the creation of heat maps of people flow, created during fire drills to better track people flows so managers can address bottlenecks for faster evacuations in the future.

Kevin Davis, Chief Security Officer at Armored Things, has deployed space utilization technology at a variety of facilities, including the University of Tennessee.

 

How have the recent California wildfires challenged security professionals?

Kevin Davis: The California wildfires have been devastating to urban areas in a way that normally only affects more rural and remote parts of the country. Which is what makes them all the more challenging. Dealing with a fast-moving, difficult-to-control disaster is difficult enough in a rural area. An urban area, especially a densely populated area like California, presents an even more high-stakes and dangerous challenge. Developing a coordinated, organized relief and evacuation effort across police, fire and other emergency services in dozens of jurisdictions is a huge challenge, especially when the lives of millions are potentially at risk. And communicating those plans and efforts to citizens is even harder. I think we greatly underestimate truly how difficult it is to manage and execute disaster plans, and I am grateful for the efforts of all the emergency responders in California.

 

How can security professionals leverage existing security hardware and software investments to prepare for emergencies?

Kevin Davis: Experienced security personnel generally have an advanced understanding of their venue or campus, but many of them still rely on manual processes to do their jobs. By harnessing data collected from their existing security solutions, operators can make more evidence-based decisions to prevent or manage an incident. Rather than relying solely on intuition, better use of existing systems can provide a detailed and accurate understanding of hot spots and operations. For instance, operators of college campuses or stadiums can use real-time occupancy and flow data collected from existing security devices to detect risks like overcrowding and bottlenecks that can have a major impact on operations and get ahead of those risks before they become unmanageable. AI can provide predictions on how a venue will look based on previous patterns and allow security operators to more dynamically understand when and where to put their people and make necessary changes in real-time.

 

How can spatial intelligence benefit security operations?

Kevin Davis: Primarily, spatial intelligence provides a different level of support to security operators by giving them data-driven insights about their venue that they may intuitively know, but have not been validated by data. Spatial intelligence solutions are helping operators make data-driven decisions and adjust their operations in a way that is backed by a more spatially aware understanding of their space. Once security teams are given the power to gather and analyze their data, the opportunities to improve operations are endless. Using spatial intelligence provides daily value for staffing, managing crowds and responding to incidents in a smarter, faster and more effective way.

 

What advice do you have for colleagues who may be considering implementing the technology?

Kevin Davis: Consider spatial intelligence platforms to improve situational awareness without purchasing new systems of sensors by optimizing existing IT and security infrastructure. Whether you’re investing in wi-fi or new security cameras, the data from those devices, when combined into a unified platform, can lead to the discovery of powerful organizational-wide insights that increase ROI department-wide.

Subscribe to Security Magazine

Recent Articles by Diane Ritchey

Security’s Choice: Our Favorite Articles From 2019

Jerry D. Loghry: The Road to Security

Vaping and Students: Enterprise Security Needs to Lead the Charge

Managing Risk and Threats at the Exelon Corporation

Diane-2016-200

Diane Ritchey has been Editor, Communications and Content for Security magazine since 2009. She has an experienced background in publishing, public relations, online content and communications. Within her role at Security, Ritchey authors the annual Security 500 Report, exclusive cover stories and the monthly Security Talk column.

Related Articles

In a Day’s Work: The Fight to End Workplace Violence

Public-Private Partnerships and The Fight Against Terrorism

Saving Lives with a Test: Active Shooter Response Training for Employees

Purdue University Develops App to Help First Responders During Natural Disasters

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

Mark Hargraves

Security Industry Mourns Passing of Mark Hargraves

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

SEC1219-Cover-Feat-slide1_900px

Contracted vs. In-House Guarding: No Universal Right Answer

360x184customcontent_1.23Everbridge

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe. Organizations need to be prepared through a unified and rapid response to these events.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing