Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalSecurity Talk ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Security Talk

Identifying solutions to enhance security

By Maggie Shein
train on tracks

Image courtesy of Sydney Trains

security talk
train on tracks
security talk
February 4, 2022

Intelligence is a risk mitigation differentiator for organizations around the world. Tailored intelligence can help security teams proactively manage risk, respond to potential incidents quicker and in a more informed manner, avoid human errors, and even help combat the challenge of hiring and retaining qualified employees. 

But the increase of analytics, platforms and solutions available to enterprises today presents the challenge of security leaders sorting through the noise to find technologies and solutions that will work for them and provide data that’s not only meaningful, but perhaps just as importantly, manageable. 

“The trick is to integrate new opportunities and technologies into a sustainable business model and try to keep platform proliferation to a minimum. That’s of the key challenges for technology — there are a lot of new platforms and tech, but the same number (or less) people to operate them,” says Mark Edmonds, Manager of Security Capability at Sydney Trains.

Sydney Trains is the largest public transport operator in Australia, carrying more than one million passengers per day pre-COVID-19. The company provides heavy rail services across the greater Sydney area and also maintains and provides rail services for NSW TrainLink, which services intercity and regional locations throughout New South Wales, Australia’s largest state. Sydney Trains operates 170 stations, about 240 trains, six maintenance centers and 15 stabling yards, in addition to supporting NSW TrainLink’s more than 150 stations. And the security team at Sydney Trains is responsible for risk mitigation efforts, emergency communications, asset protection and security and safety across both Sydney Trains and NSW TrainLink. 

With such a large footprint, Sydney Trains is always on the lookout for new solutions and technologies to help with security, safety and efficiency. The organization isn’t afraid to spend money on new technologies to mitigate risk or improve operations and efficiencies. “That ‘room to fail’ is critical because it encourages us to keep identifying new opportunities and technology. More often than not, this pays off,” Edmonds says.

Over the past several years, Sydney Trains has implemented a number of technologies and solutions to aid the security team in doing its job. The main security tool for Sydney Trains, Edmonds says, is its video surveillance platform. The organization recently completed an AUD $90 million upgrade to its camera system, converting more than 13,000 cameras to 100% IP. The most important part of the new system, Edmonds says, are the new business-enabling opportunities. From a security perspective, that means using video analytics.

“We can use video analytics to detect trespassing, fare evasion, crowding, fighting and anti-social behavior. We are on a journey here, having deployed a few of these types of capabilities, and we are still playing around with other capabilities,” he says. “The main objective is to extract better value from our cameras, all with the same number of staff.” 


Security Capability

Mark Edmonds, Manager of Security Capability, Sydney Trains. Image courtesy of Edmonds


This means quicker incident response and better situational awareness to make informed decisions. The possibilities are numerous, but Edmonds says the key is to keep it manageable and on as few central platforms as possible because the new technology does not come with more team members. 

One of the ways Sydney Trains is using artificial intelligence is for people counting at unstaffed/ungated stations to compare patronage numbers against ticketing system numbers and identify potential fare evasion. They are also employing analytics for identifying trespassers in the train tunnels. The organization started marketing its technology publicly in the hopes that it will also serve as a deterrent. “It is meant to be a deterrent, but that being said, we have detected a number of offenders, so it’s proving effective in detecting people,” Edmonds says. The organization is also using covert cameras placed throughout rail corridors to protect against vandalism.

“Vandalism costs us AUD $34 million per annum. The people committing these offenses are taking risks on the railway. It affects our customer experience, our service delivery, even our environmental impacts of cleaning graffiti paint off of trains, for example. The covert camera solution has led to a number of arrests, including custodial sentences for offenders, which is a great outcome for not a lot of money,” Edmonds explains. In addition to investigating incidents after the fact, Edmonds says the solution allows security officers to detect and respond to potential vandals before they have committed any offenses.

In addition to surveillance, Sydney Trains recently implemented personal safety technology for employees using their mobile phones, which has helped the organization retire its obsolete dialer-based portable duress alarm pendants. With the application, frontline staff can quickly identify incidents, and central operations can also track staff movements and identify which employees are in the area to potentially help with response. Incident Response Commanders can use their mobile phones as cameras on the organization’s surveillance platform, essentially becoming “mobile video cameras” to help the security operations center better understand an incident. 


sydney trains

The Sydney Trains security team is always on the lookout for new security technologies that can help the group tackle risk proactively. Image courtesy of Sydney Trains


Staying on the cutting edge of security technology is a challenge for any organization, but Edmonds says, in Australia, the rail security community is close knit and, together, they regularly exchange lessons, insights and ideas into who is doing what and what’s working. He also says working closely with the organization’s CCTV vendor to ensure the analytics and technologies they are implementing will work seamlessly and on the same platform as their current video management system is critical.

Looking into the future, Sydney Trains’ security team is always looking at new technologies and solutions to help them continue to operate and respond efficiently. One of the current pilots is looking at drones for situational awareness. “Drones are useful for our large, remote stabling yards often located on the outskirts of cities. While security officers can be a deterrent and we will always need them to be able to respond, in practice, drones can vastly improve surveillance capabilities, as they can see way out past the perimeter, even detecting vehicles with residual heat signatures, which can be indicative of unwanted visitors,” he says. Edmonds adds that they hope the drones can play a vital role in deterrence by hovering over potential offenders. “We haven’t proven this yet, but we are cautiously optimistic that the drone, by increasing the risk of apprehension of an offender, may actually prove more of a deterrent than a security officer.”

KEYWORDS: enterprise security risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Brain artwork

    The nonlinear path to a sustainable security culture

    See More
  • Mayo Clinic’s Global Security team

    Mayo Clinic’s Global Security team works together to mitigate risk

    See More
  • SEC0521-Multicare_Feat-slide1_900px

    Case Study: MultiCare Health System takes security to the next level

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×
Image courtesy of Sydney Trains

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!