The Indian Institute of Technology Delhi (IIT Delhi) recently migrated their physical security solution to one that includes artificial intelligence (AI)-powered video surveillance. Find out more about the solution in this case study.
After a lifetime in the protection business, the one constant in Washington that I’ve learned is that it takes tragedy to force change. The January 6 Capitol riot is not an enigma. This was a clear protective intelligence failure. The key finding of Retired Army LTG. Russel Honore’s report reviewing how the pillar of U.S. democracy could have been so easily infiltrated is that the U.S. Capitol Police (USCP) must better integrate intelligence into its operations through improved awareness, assessment, sharing, and response capabilities. We can look at effective protective intelligence as a three-part story: Act I is identifying threats; Act II is building those threats into a cohesive profile; Act III is sharing and acting on that information in order to make nothing happen. Applying this framework to January 6 helps us understand how we can and must do better and provides important takeaways for corporations.
The COVID-19 Oxford Vaccine Trial run by the University of Oxford's Jenner Institute and the Oxford Vaccine Group clinical teams needed tight security surrounding the facility to mitigate risk and ensure the safety of staff and assets.
The Georgia Emergency Management and Homeland Security Agency started a new program to help schools identify physical security vulnerabilities at their facilities and improve safety and threat response protocols.
When we do a risk assessment, we evaluate the facility’s needs and identify any gaps in their physical security barriers and policies and procedures. Why should you integrate security early in the design process?
Chief Security Officers (CSOs) are charged with protecting an organization’s assets and people. Like all corporate functions, the design of this department will vary greatly depending upon the organization. However, the process by which a program is designed, measured and evaluated has some consistent principles across different industries. This series explores how to make your physical security program more strategic, and how to secure funding for this objective.