Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceAccess ManagementIdentity ManagementPhysical SecurityVideo Surveillance

The Key to Ensuring Employee Awareness with Business Travel

By Mark Deane
Business travel
March 6, 2020

The over-reliance of a large number of organizations on Travel Risk apps, SOS alert technology and 24/7 Global Security Operation Centers (GSOCs) foster a false sense of security among travelers. Even though they are a crucial part of a comprehensive risk management plan, the vast majority of SOS alert apps, traveler monitoring tools and travel risk management technologies are reactive in nature and therefore, when deployed as standalone solutions, detract from more pro-active means of avoiding dangers and mitigating risk.

The term “duty of care” is now an industry buzzword. There is also a certain amount of fear mongering and clever marketing around this term from the industry, and it seemingly has organizations rushing to initiate a Travel Risk Management Program, sometimes with little forethought or poor counsel. App-based services and GSOCs absolutely play a vital role in a travel risk management plan, but they are for the most-part, responsive in nature and therefore primarily most useful once something has gone wrong.

A vast amount of money and effort is spent on 24/7 GSOCs and intelligence monitoring to let people know within a few seconds that an incident has occurred, or to answer a call from anywhere in the world at any time to assist travelers. Enterprise security teams often operate them independently with little consideration to pro-active risk avoidance measures.

This reactive service focus poses a significant risk to the well-being of travelers and the efficacy of a travel risk management program due to the potential for travelers to either be misled as to their actual security, or by leaving a critical skills and awareness gap.

Two scenarios will be utilized as a backdrop to aid the discussion.

Scenario One

A C-Suite executive is conducting a business trip in Santiago, Chile. She is walking down a busy road from a meeting to her dinner rendezvous when suddenly, a moped with two assailants approach. The two assailants jump off and threaten her, trying to get her Rolex and other valuables. She resists, complicates the situation and is badly beaten. They take her watch, phone, wallet and folder. After regaining her composure, she stumbles back to her hotel, where the police are called. Once she gets into her room a few hours later, she emails her assistant. Her company’s GSOC is currently unaware of the incident.

Scenario Two

A business traveler is in Nairobi, Kenya shopping in a mall when he hears gunfire. He remembers he has an SOS app and was briefed to use it in an emergency, so pushes the SOS button and then hides in a corner and waits for assistance. The gunfire continues, and he is panicking but awaits his call. Security from his company’s GSOC calls him back to find out how they can assist. He explains the situation, and the call assistant (an intelligence analyst untrained in security response counsel) identifies that they will call the local police, and that he should try to remain calm.

Scenario one identifies that the C-Suite female executive could have all the technology and back-office GSOC support in the world, but if she walks through the city alone at night, rather than take secure transportation, and if she resists a mugging, rather than comply (because she has received no training), then her safety is compromised. As soon as she is separated from her phone, the response system fails. Without it she cannot summon assistance, and even if she could, it would not turn back time and prevent the injuries and psychological trauma of the attack.

Scenario two identifies that even with a cell-phone app and a GSOC with 24/7 Analysts on-call, an over-reliance, or false sense of security from an app can lead to either indecision, delay, or incorrect decision when an actual incident occurs. An analyst trained to assess geopolitical and social issues and report accordingly may not be trained or experienced to triage an emergency and offer subject matter advice in a timely and relevant fashion. How many GSOCS have trained security professional’s on-call, 24/7, who are able to provide diligent, timely and relevant advice during an incident? The majority of GSOCS have intelligence analysts, of course, or more likely call-center type personnel with flowchart response protocol.

In a serious incident, a traveler’s first focus is on the there and now, surviving and/or moving to safety, then likely establishing communication with family and loved ones. It is rarely their employer that springs to mind, and without training, the initial reaction may not be a measured and effective one. Once a traveler has established a safe place and ability to call or communicate and they need assistance; that is most likely when they do so.

A traveler must be prepared accordingly and be provided the training and resources to develop, and be responsible for, their own security because when a situation occurs they will likely be the only ones able to make informed decisions that better increase their chances of a favorable outcome.

The current emphasis in the corporate risk management world seems to be post-incident support services. Instead, it should be on training and development. And after that, on establishing protocol and process and emboldening the traveler to best utilize the support services to facilitate.

Time and time again the words echo among clients and service providers:

  • Travelers need to know if there is an incident where they are traveling.
  • Travelers need to check in when there is a problem.
  • Travelers need to be tracked.

Less so within corporates and organizations is the focus on how to better prepare travelers to take responsibility for their own safety, as well as be better trained to identify danger, avoid it and minimize risk. An organization should be asking:

  • Do my travelers have a sound understanding of the risks aligned with their itinerary and destination/s?
  • Are my travelers trained to the best of our realistic capability and budget to manage and mitigate risk?
  • Do my travelers have enough support on the ground?
  • Have pro-active emergency medical contingencies been put in place?

To complement this, there should be a robust support culture that acknowledges the need for on-the-ground support services such as secure transport. Travelers need to better understand the actual threats of their destination/s and their travel itinerary, and the risks to those threats. They must then be trained and supported with on-the-ground services to better mitigate and manage the risks to an acceptable level commensurate to risk and aligned with the clearly communicated and understood (by all stakeholders) risk tolerances of the organization.

What does this mean in actual, realistic and achievable terms?

  1. Provide a travel itinerary specific risk assessment or empower the traveler to carry one out pre-departure.
  2. Obtain timely and relevant ground truth of the locations to be visited, avoiding generic and 50,000 feet view country assessments.
  3. Provide the ability to liaise with subject matter experts with local knowledge to align in-country advice and support services.
  4. Provide travel security training to all travelers at least annually and ensure that it aligns with the risk of the travel destination/s and scope of work.
  5. Provide travelers secure transportation and security consultation services if commensurate with the risk.
  6.  Ensure emergency medical contingencies are in place.

The above six points are all pro-active threat avoidance and situational awareness related. If implemented correctly, they will significantly improve the security of travelers but also very likely reduce anxiety, improve mental wellness (associated with stresses of travel safety) of travelers and reduce the occurrence of minor incidents and the burden on GSOC services. The range of technical and post-incident services then align perfectly to deliver a holistic and comprehensive travel risk management program.

KEYWORDS: business travel coronavirus duty of care risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark deane

Mark Deane, the CEO of ETS Risk Management Inc. and founder of Explore Secure® is a risk management professional whose experience stems from his previous career as a Covert Operational Officer with the British Government. He has planned, managed and delivered numerous security and risk management operations at both a government and corporate level. He regularly delivers training to corporate and government agencies in a range of security, surveillance and intelligence services. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Carjacking after the 2017 Brazilian Grand Prix

    Business Travel to Brazil: Lessons from the Sao Paulo Grand Prix Armed Robbery

    See More
  • travel-enews

    5 Key Components of a Robust Travel Risk Management Program

    See More
  • danger-enews

    International Travel Training: How Employees Should Respond to a Mugging

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!