Articles by Michael Fickes

ASIS International Inaugurates Security Week To Give Back To Orlando Community

Security Week is designed to give something back to the Seminar’s host city in exchange for its hospitality The 62nd ASIS International Seminar and Exhibits will run from September 12 to September 15 in Orlando, Florida. ASIS estimates that the Seminar may attract more than 20,000 security professionals to the Orlando Convention Center, where the event is being held. Giving Back To The Host Community The Seminar always has a major economic effect on the host community...

Rio 2016 Security: The Role Of Technology And Personnel

A force of 85,000 police and military will patrol the Olympic grounds and environs to provide security A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the various Olympic venues located around Rio De Janeiro. The security plan called for 3,400 screeners. The security firm had only found 500. What happened? Today, prospective security officers must undergo background checks that do...

Shooting Incidents Highlight Importance Of Hospital Security

Hospital security always counts. Patients may arrive from a crime scene and someone has to make sure they weren’t followed by trouble. Doctors, nurses and other medical personnel may come under blame for the death of a loved one and need protection. Heightened Security Needs Think for a minute, though, about the elevated need for security when the victims of a massacre — such as the Orlando massacre — arrive at the hospital. On the heels of the shooting at the Pulse Nightclu...

How Can Software Identify Active Shooter Risks Before They Become Threats?

As a society, we have been studying crime for years, with an eye to prevention. Now that mass shootings have seized our attention, experts have begun studying this particularly violent crime, again with an eye to prevention.   “Our view is that inside a large enterprise — a corporation or government agency — anyone can be the risk you may face someday,” says Bryan Ware, CEO of McLean, Virginia-based Haystax Technology, a business that identifies risks b...

Non-Invasive Security Strategies For Soft Targets Such As Theaters And Other Public Facilities

A public facility with too much security or the wrong kind of security can discourage the public from visiting (Photo credit: Steve Williams Photography) The lethal November 2015 terrorist attacks against several soft targets in Paris have inspired changes in security at facilities considered soft targets across the United States and around the world. Today’s security directors well understand that “it can happen here.” To be clear, it probably won’t....

New Capabilities To Drone Technology Reflect Expanding Range Of Commercial Security Applications

Drones can satisfy five commercial needs, today: surveillance, patrolling,incident response, mapping and site assessment The military uses drones. So do the police. Drones serve as weapons and surveillance tools.Today, businesses and institutions are applying drone technology to a variety of private security surveillance challenges. Private uses include patrolling facilities and installations such as pipelines from the sky. To be sure, private contractors sometimes weaponize d...

ISE Emphasize Need For Improved Hospital Security Program To Avoid Attacks On Specific Targets

ISE’s research shows that healthcare facilities & hospitals security programsto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security program can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see a w...

Access Control Challenges In A Changing World - From Managing Nurse Servers In Hospitals To Securing Sterile Facilities

ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...

Run, Hide Or Fight – Law Enforcement Veteran’s Tips For Surviving An Active Shooting Incident

Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally known public safety consultant, studies this premise in his 2013 book: Mass Shootings: Six Steps to Survival. “To survive, you have to be mentally prepared,” Matthews says. “You have to know what to do the minute the first shots ring out.” For his book, Matthews researched 60 mass shootings that occurred between 1980 and...

Justifying Corporate Security Costs With Benefits To Business Continuity

Security is becoming increasingly business-like, with corporate security departments having to justify their budgets and support business operations Persistent crime — both physical and logical — and the rise of terrorism around the world have led more and more corporations to expand their focus on security. In that effort, C-suite executives have added significantly to the responsibilities of corporate security departments. Security functions have grown far beyon...

5 Basics For Implementing Effective Physical Security

Deadly terrorist attacks on buildings have highlighted the need of a well-designedand well implemented physical security program What constitutes a well-designed physical security program? Deadly terrorist attacks on buildings such as the San Bernardino Administrative Center, Riverside Countyin California., have highlight the need of a well-designed and well implemented physical security program. S.Steven Oplinger, Chair of the ASIS Physical Security Council, outlines 5 basic...

Reactive To Proactive - Central Command Centers Transform Security Capabilities For Organizations

Command centers allow physical and IT security to collaborate for greatersituational awareness and responsiveness Conventional command centers focus on video and access control system monitoring. When something happens at a door, the video system reports the event to one monitor in the command center, while the access control system reports to another monitor. It is up to the operator to imagine the possibilities, draw the right conclusions, decide on a response and, if necess...

Paris Attacks Shift Focus On Securing Soft Targets Against External Threats

Soft targets are civilian-centric places suchas churches and retail centres, where securityis not as fortified The terror attack on Paris on Nov. 13 lasted just 23 minutes. The bombers and gunmen split up and attacked seven sites: the soccer stadium where it all began, four restaurants, a bar and a concert venue. All told, they killed 130 people and injured 368 in the time it takes for a coffee break. This situation has raised questions about the security management for conce...

How To Protect The Internet Of Things' Vulnerabilities From Hackers

Hackers probably take more interest in your home computer and information about your identity stored there As the Internet of Things (IoT) grows, so does the hackable universe. Equipment designers need to start thinking about security in the first steps of manufacturing products, and companies and individuals need to start implementing secure coding practices to avoid hacking incidents. Last July, for instance, two security researchers hacked the computer in a Chrysler Jeep a...

Enterprise Security And Risk Management (ESRM) Requires More Comprehensive Skill Sets From Security Staff

(Click to see larger image) The ASIS Foundation & the University of Phoenix College of Security and Justice's Enterprise Security Competency model Are you competent in your security job or profession? How do you know? According to research carried out by the ASIS Foundation, security has begun to evolve beyond guarding doors, checking IDs and screening briefcases and purses. Today, something called Enterprise Security Risk Management (ESRM) is subsuming the tra...

How Public And Private Security Operations Protect Celebrities, Big-Name Executives And Dignitaries

For high value individuals such as the Pope,agencies have access to unlimited publicresources in terms of money and people  The Pope’s visit to the United States reminds us that protecting big-name executives, celebrities and dignitaries is a highly specialized security function. Public and private executive protection groups begin preparing for the visit of major world figures months ahead of time. “It is a task of massive proportions,” says Tom M. Con...

Enterprise Security And Risk Management: The Next Big Thing In Corporate Security

Enterprise security strategies identifyliabilities & ways to mitigate risks, showinghow the cost of mitigation prevents largerliabillity costs  The security profession continues to take on new risk management responsibilities. The big thing now is called Enterprise Security and Risk Management (ESRM). ASIS International has issued a standard on the subject: ANSI/ASIS/RIMS RA. 1-2015, and a couple of booths at the recent ASIS International 2015...

ASIS International 2015 Brings Together Security Services, Disruptive Technologies And Technological Innovations

The pre-seminar will also offer educational sessions on cutting-edge subjects It is that time of the year again, when security industry stalwarts gather together at ASIS to showcase the latest in physical security systems and other technological innovations. The event will focus on domestic threats as well as intelligence gathering tools to protect organizations against social media threats. The organizers of the ASIS International 61st Annual Seminar and Exhibits — ASI...

The Conley Group - Building Corporate Security Relationships With Law Enforcement Through Shared Police Intelligence

Police intelligence can help security directorsto understand the criminal trends across theirarea or city  Corporate security has changed dramatically over the last few years. Traditionally, security has always been associated with physical protection and installation of security systems. In this article, Tom M. Conley, president and CEO of The Conley Group, discusses the importance of information received from law enforcement. A good rapport with law enforcement can help...

Executive Protection Boosts Corporate Security, Productivity; Secures People & Property

Executive protection can be costly, but it isa fraction of the loss that protecting a topexecutive could prevent  Corporate security departments work hard to protect people and property. Executive protection is one of the key components of corporate security services. In fact, many corporate security departments are now taking on this new responsibility. “We are seeing more companies adopting executive protection as a normal part of corporate security,” says B...

Insider Threat – Overcoming Internal Security Risks

The worst insider threats are existential, dangerous enough to literally destroy an organization The key to maintaining an effective security system is timely detection of security breaches. Widespread use of technology has resulted in massive amounts of data transfer which in turn makes organizations vulnerable to both internal and external threats. Mass shootings, data thefts and other internal breaches of security have cast a spotlight on the issue of insider threats. Accor...

Aviation Security And Counter Terrorism Since 9-11 Terrorist Attacks

Preventive security measures and security training of personnel in the line of fire have improved dramatically Aviation security has significantly intensified since 9-11, and we’re making it more and more difficult for terrorists to get to us on the ground and in the air. In February the FBI arrested three men in Brooklyn plotting to hijack an airliner, and in the 14 years since the terrorist attacks of 9-11, officials have foiled dozens of plots against airlines, buildi...

Security as an integrated enterprise-wide operation in the wake of 9-11 World Trade Center terrorist attacks

9-11 caused a sharp refocus of attention on security assessment and risk management Fifteen to 20 years ago, security was a relatively sleepy, small-time business. Companies typically hired a guard or two to walk around the property, usually at night, sometimes during the day. If a guard spotted someone who wasn’t supposed to be there, he (it was usually a he) ran the person off. Larger companies had more sophisticated video and access control systems, but those systems...

What Can Colleges Do To Control Acquaintance Rape?

Educational institutions and security firms must work together to develop preventive programs College and university campuses provide a perfect cauldron for non-stranger rape — also known as acquaintance rape and date rape. A U.S. Department of Justice (USDOJ) study looked at reported rapes from 1995 to 2013. In that study, females ages 18 to 24 had the highest rate of rape and sexual assault victimizations of any other age group. A significant proportion of women 18 to...

Tyco Lawsuit Pending; Warehouse Security Systems' Loopholes Allegedly Exploited

National Union Fire Insurance Company claims that Tyco failed to protect confidential details of the warehouse security systems A civil trial against Tyco Integrated Security was adjourned by a federal judge on July 14 and is now rescheduled for October 19. The lawsuit arose out of the burglary of a pharmaceutical warehouse in Enfield, Conn., owned by Eli Lilly. Eli Lilly’s insurance company, National Union Fire Insurance Company claims that Tyco failed to protect confid...

Physical Security Industry Adopts Social Media Monitoring

Private security professionals and law enforcement personnel are leveraging social media as a physical security tool to identify security threats and prevent crime. “Knowledge is power, and we’re all learning to cyber-sleuth to keep up with the bad guys,” says Wendy Patrick, JD, PhD, Deputy District Attorney, special operations division, San Diego District Attorney’s office and president of the Association of Threat Assessment Professionals San Diego...

Biometric Security: Growth And Challenges In Fingerprint Technology And New Devices

Biometrics is most useful as an additional level of authentication — determining that you are who you say you are Over the years, the growth of biometric security technology has faced challenges of cost and pushback from users. Prices have been higher than more traditional technologies. In addition, users did not advocate storage of their personal biometric data by employers or the government. “I believe this is changing,” says Rueben Orr, CPP, vice preside...

Securing Los Angeles From Criminal Activity Through Public-private Partnership

Today, the once crime-ridden area of Los Angeles is a flourishing shopping and tourist mecca Los Angeles struggled with a rising crime rate. Constant crime plagued the historic area with its well-known tourist attractions, which include TCL Chinese Theater and the Walk of Fame. Criminal activity ranged from major to minor, from felonies to prostitution, public drunkenness, trespassing, vandalism, theft and on and on. Time and budget constraints had forced local police officer...

Assessing Cyber Security Risks And Vulnerabilities

Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...

PVF Official Highlights Importance Of Active Shooter Drills

Today, a number of school districts are saying no to these kinds of realistic active shooter drills In the wake of the shootings at Columbine High School in 1999 — 16 years ago — and the school shootings that have followed, we have struggled to figure out how to keep students and teachers safe during such an attack. Protective Measures An approach to the problem that has grown controversial is armed assailant or active shooter drills. Six states including Arkansa...