Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceAccess ManagementFire & Life SafetyPhysical Security

Addressing Terrorism and Crime in Your City: Why the Public and Private Sectors Need to Work Together

By Giovanni Gaccione
The Los Angeles Airport police have a full-time emergency services unit armed with rifles and a tactical team that provides protection in those areas along with patrol officers
May 26, 2020

In a resilient city, the average person doesn’t think about crime or terrorism. They feel safest going about their daily activities knowing that their municipalities are ready to respond to major incidents. From a security perspective, we know that the most effective responses are those that take a coordinated approach. We also know that, for a variety of reasons, many municipal stakeholders continue to work in silos.

All too often, business leaders, city planners, fire departments and law enforcement focus on their mandates to the exclusion of others. It makes sense: all of them are tending to important needs. But, unfortunately, this approach can lead to a breakdown in communication and missed opportunities. In the worst cases, it can create a lapse in security that could make their city and its citizens vulnerable to criminal activity.

But, by eliminating these silos and fostering strong communication, stakeholders can share information that allows them to quickly address evolving situations. They can also come together to develop proactive strategies that maintain safety and foster economic growth. By bringing together stakeholders from the public and private sectors, a city can leverage what each has to offer.

 

What Happens if Stakeholders Don’t Work Together?

Without coordination, response times can lag. In 2013, the city of Boston, Mass. was attacked during its annual marathon. It took four days from the time of the initial explosions to apprehend the two suspects. The response could have been faster if the city had pre-arranged relationships with more stakeholders from the private sector.

While it is easy to identify short-comings after the fact, we can be relatively confident that, if the city had been able to quickly access more private video, they would have been able to identify and track the suspects faster. Additionally, this type of access could have helped reduce public panic. As it was, the city itself was in a heightened state of emergency for four days while the suspects remained at large.

 

Coordinated Access is Key

From an organizational side, most cities have both the desire and infrastructure to aggregate data. This can allow them to develop strategies that address crime and improve the lives of their citizens. Many of these same cities, however, lack the data streams, particularly from video surveillance, necessary for developing a clear picture. This is where private businesses come in.

Private businesses are already collecting vast amounts of data in their security systems. They frequently have cameras both in and around their facilities and are monitoring for everything from criminal activity to patterns of behavior. Many are already using their physical security systems for their own after-incident investigations. But most don’t have the necessary reach to make larger connections with the surrounding environments.

Developing partnerships between stakeholders in the public and private sectors is essential for utilizing the data on a larger scale. But this isn’t always easy. One of the main challenges to creating these partnerships is establishing trust.

A cornerstone of trust is transparency. But it is difficult, if not impossible, to be transparent when you don’t know what you need. Cities can struggle in articulating what they want from businesses in terms of data because they can’t know in advance what will be required. This makes it hard to get buy-in from the private sector.

 

How Technology can Help Sustain Trust

The initial stages of trust-building often come down to everyone’s willingness to participate.

Once an initial foundation is established, technology can play an important role in sustaining and supporting its growth. The right platform and tools can ensure the continued effective collaboration between a city’s public and private sectors.

Technology allows business owners to share their video feeds securely. Knowing that only authorized personnel can access the data being collected by their physical security systems gives businesses peace of mind. And, at the same time, through encryption, authentication, authorization and auditing systems, both cities and businesses can be confident that no one can read their sensitive data.

Similarly, this type of technology can also enable schools to safely share their private video. This can be done in two ways. First, schools can allow law enforcement to access their video under specific circumstances, like an intrusion. Second, schools can anonymize individuals in video streams and then allow authorized personnel to view the unredacted footage. In addition to enabling collaboration, these solutions also help schools protect the privacy of their population, including and especially video images of young children.

Working in partnership, cities are better able to aggregate a wide variety of data to gain greater insights into their many environments.  Municipal governments can use these insights to develop proactive policing, counter-terrorism and emergency management strategies to better serve and protect their citizens.

They can also push insights back to private businesses to help them improve profitability. For example, with the right technology, a city can analyze the flow of pedestrians and vehicles to get a clear picture of traffic on its street at different hours during the day. Businesses can then use these insights to develop sales strategies that take advantage of increased traffic in front of their stores during peak periods.

Ultimately, when the private and public sectors break down silos and develop trust-based partnerships, they can work together to improve safety and create opportunities for businesses to thrive. The result is a city where people want to work, play and live. Often unaware of the important relationships that allow this to happen securely.

KEYWORDS: crime public and private security public private partnerships Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Giovanni gaccione

Giovanni Gaccione is responsible for the law enforcement practice at Genetec, including market insight and development, product initiation, and application portfolio development. Since joining Genetec in 2012, he has been assisting customers in system design, training and pilot project setup. As a Sales Engineering Manager, Giovanni manages an all-star team of highly motivated engineers that comprise of Channel Sales Engineers, Sales Engineers, and Enterprise Application Architects. Giovanni has extensive experience in both physical and cybersecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Worker

    Strategic Decision Support Centers Increase Public Safety and Responsiveness to Community Needs

    See More
  • Mandalay Bay

    Closer Ties: Private Security and Public Safety Need Interoperable Communications

    See More
  • cctv-geefac66e5_1920.jpg

    Why AI CCTV is the future of security and surveillance in public spaces

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!