ASIS UK Newsletter - Autumn 2012

Page 1

INTERNATIONAL

TM

Newsletter

UNITED KINGDOM CHAPTER 208

AUTUMN 2012

CPP Passes – CONGRATULATIONS Congratulations to: Eric Tettey, Isaac Ennin, Mike Thompson, Ben Murrell,Marius, Georgescu, Bhawesh Pandy, Kevin Brownel and Teeman Chilume all of who sat and passed their CPP exam in the UK in the last few weeks. Their successes, combined with those of their classmates yesterday, mean that all delegates attending the recent ARC Training Intensive Study Course for

CPP passed the examination on first attempt. Home countries of the delegates include Ghana, Botswana, Pakistan, Romania and the UK/Nigeria. A record over 50 security professionals have undertaken CPP certification preparation courses with ARC Training during 2012, and 20% of the UK membership of ASIS are now certified to this ultimate worldclass credential in security management competence. The 2013 preparation programmes begin in January. Please visit www.arc-tc.com for more information.

20th Anniversary ASIS has been present in the UK for many years and was originally part of Chapter 44, which incorporated a wider area with Europe. As a result of increasing membership numbers and activity on January 13th 1993 Chapter 208 was given it’s charter. This means that we are coming up to our 20th Anniversary. Despite the economic climate, Membership has been remarkable stable over the last few years and has grown over the last two years. At the start or our 21st year in January, numbers will be around 750. This figure includes over 100 UK Chapter 208 members who are currently working overseas., which shows not only the international nature of ASIS, but also of the UK Chapter. We are starting to make plans to celebrate this milestone

It was announced in the last edition that Allison Wylde was awarded the Association of Security Consultants Imbert Prize for her work on the ASIS Physical Security Standard. She was unable to attend the Awards Lunch but was presented with the award by former ASIS Chapter Chairman and Chapter Life Vice President Derek Webster at the Autumn Seminar in September.


CHAIRMAN’S NOTES | EDITORIAL TEAM

Chairman’s notes Your Chapter is forever developing new ideas and partnerships to improve the Chapter’s status as a leading professional organisation recognised here in the UK and overseas. My two very busy vice chairman; Graham and Mike H, continuously endeavour to reach out to other organisations and demonstrate we are not a threat to them and are always delighted to work with them to improve the standing of the security industry which has recently suffered a body blow from the bad press over the security resource failure associated with protecting the Olympics. The excellent work undertaken by the Worshipful Company and the Security Institute in achieving and rolling out Charter status has gone a long way to getting the security industry recognised as a professional career alongside Architects and Engineers etc. Combined with our own goal of achieving a greater level of academic achievement amongst our members through CPP, PSP now closely linked to degrees and Masters, we could see the status of all those working in the security industry being recognised as true professionals. All this has received a knock back but we as an industry need to brush aside this set back and get out there sell security to all those willing to listen and those that are not; as a worth while career and we welcome and encourage youngsters to give serious consideration to enter the security arena.

Going onto other initiatives, I am delighted Woman in Security (WIS) is attracting a great deal of interest and Alexandra Whyte and her immediate committee are to be congratulated in taking this new initiative forward. There have been two major moves into two arenas we have been attempting to penetrate for some time and could result in our membership increasing. Graham Le Mike Alexander Fevre has made in-roads into the armed forces resettlement organisation and Richard Stones has equally managed to do the same with Police resettlement. With the outcome of well published reduction in both the police and armed forces there will be thousands of potential new recruits entering the various security industries at all levels and we as a chapter can reach out and help these people settle into their new career. Finally can I request you support your Chapter and attend the Chapter meetings especially the AGM in December where I will be asking you for your approval to stand as your Chairman for a final year. As it too early to mention Christmas, I wish you and your families the very best and good health for the future. Mike Alexander Chairman ASIS International UK Chapter

Editorial Team Graham

Helene Carlsson – Assistant Editor Helene has been working in the security industry over 25 years, both as a corporate security manager and as a consultant. She has worked with many different clients specialising in non-IT security, Business Continuity and Crisis Management. Helene has been a member of ASIS since 1989 and on the ASIS 208 committee for over 15 years. She has been actively involved on the Media sub-committee for the same amount of time and is a strong supporter of the chapter and the international edge the ASIS membership provides. Helene is working on the group writing the standard for Asset Protection by Physical Security Measures

Mike Hurst – Editor Mike entered the security industry in 1998 and initially worked in Sales and General Management roles. In 1992 he joined HJA Fire and Security, Recruitment Consultants where he is a Director. He recruits at all levels across a range of security disciplines. He is a Fellow of the Institute of Recruitment Professionals (FRIP) and a Director of The Security Institute. He is a regular contributor to numerous security publications. Mike is Editor of the Newsletter, Webmaster and set up and administers the ASIS 208 Blog. Mike is Chapter 208 Vice Chairman Strategy.

Graham Bassett – Advertising and Seminar Exhibitors Graham has worked in the security recruitment profession for 20 years and is the founding director of GBRUK a London based recruitment firm. He was the founder Chairman of the BSIA Code of Ethics and was also on the Executive Committee for the REC Association of Executive Recruiters, responsible for standards, member‘s benefits and marketing. Like Mike he is a Fellow of the Institute of Recruitment Professionals (FRIP) and a Member of the Security Institute (MSyI). Graham is an avid supporter of taking ASIS forward within the security profession and welcomes your commercial support of the Chapter. Graham is Chapter 208 Vice Chairman – Operations, responsible for Seminars, Advertising, Exhibitors and Sponsorship.

helene.carlsson@btinternet.com

mike@hja.co.uk

graham@gbruk.com

Helene

2

AUTUMN

2012

Mike

www.asis.org.uk


2012/2013 DIARY

Diary of Events 2012/2013

INSIDE THIS ISSUE:

October 9th 10th - 11th 10th

Committee members Diary Events Ex Police in Commerce Facewatch Spring Dance Cyber Twitter ASIS Collaboration European Conference Project Management Legal Update ASIS International

14th - 15th 18th November 14th - 15th 14th December 3rd - 5th 6th 13th February 17th - 19th March 13th April 14th - 16th 24th - 25th May 13th - 16th June 12th September 11th 24th - 27th December 11th

TINY London Conference Global Security Summit BRC Retail Crime & Loss Prevention Conference 2012 www.retailcrimeconference.com Transport Security Expo Security Institute Masterclass Transport Security Expo and Conference ASIS Heroes's Tribute Evening 6th ASIS Asia-Pacific Security Forum and Exhibition, Hong Kong ASIS UK Winter Chapter Meeting and AGM State Street Bank, Canary Wharf London Security Institute Curry Night, Victory Services Club 4th ASIS Middle East Security Conference and Exhibition, Dubai ASIS UK Spring Meeting (provisional) 12th ASIS European Security Conference and Exhibition, Gothenburg Counter Terror Expo IFSEC, Birmingham ASIS UK Summer Meeting (provisional) ASIS UK Autumn Meeting (provisional) 59th ASIS International Seminar and Exhibits, Chigao ASIS UK Winter Meeting and AGM (provisional)

If you know of an event that you feel should feature in our calendar, please contact the editor, Mike Hurst. Mike@hja.co.uk

www.asis.org.uk

2 3 4 5 6 7 8 10 11 12 13 14 15

ESSENTIAL INFORMATION JOINT EDITOR – Helene Carlsson (07802 864485). helene.carlsson@btinternet.com JOINT EDITOR – Mike Hurst (0845 644 6893) mike@hja.co.uk ADVERTISING – Graham Bassett (07961 123763); graham@gbruk.com Chapter Executive Officer – Jude Awdry, ASIS UK Chapter 208, PO Box 208, Princes Risborough, HP27 0YR. Tel: 01494 488599; Fax: 01494 488590; asis@awdry.demon.co.uk. MEMBERSHIP ENQUIRIES – Nigel Flower, CPP (01276 684709 nigelflower@msn.com) PUBLISHERS – The 208 Newsletter is published by Chapter 208 of ASIS International. FREQUENCY – The 208 Newsletter is published four times per year, Spring, Summer, Autumn & Winter – please contact the editorial team for deadlines. IN GENERAL – The 208 Newsletter welcomes articles & photographs, but while every care is taken, cannot be held responsible for any loss or damage incurred while in transit or in our possession. Please send all material to the editors. The Newsletter may publish articles in which the views expressed by the author(s) are not necessarily those of ASIS. ISSN N0 – 1350-4045

AUTUMN

2012

3


UPCOMING EVENTS

UPCOMING EVENTS ASIS are participating in the GSS Advice Centre and we need some more volunteers to spend an hour or two on the stand. CPE points can be claimed for this.

SUBJECTS COVERED ARE • Physical Security (the new standard) • Security Convergence • ASIS Women in Security programme • Military / Police transition into security profession • Overview of ASIS qualifications

Commissioner Bernard Hogan- Howe, Met. Police ACC Paul Broadbent ACPO Lead on Burglary Andrew Pope OBE, The Co-operative Group Mike Wyeth, Group Security Director March UK Phillip Hagon, Head of Security, Sainsbury’s Mike Marshall, Security Director, Shop Direct Group Alan Brown, Group Security Director, Tesco

ASIS have a stand at this event and, again, we need volunteers to man the stand and promote the work of ASIS International and the UK Chapter. CPE points can also be claimed for assisting on the ASIS stand. The winners will be announced at the Awards Dinner in October.

ASIS International and the UK chapter in particular are finalists in this year in two categories. Firstly in the category Contribution to Standards in the Security Sector for the work in preparing the ASIS

4

AUTUMN

2012

Physical Security Standard. ASIS is also a finalist in the International Achievement Award category for the outstanding success of the ASIS European Conference that was held in London in April.

Both ASIS UK Vice Chairmen, Mike Hurst of HJA Fire and Security and Graham Bassett of GBR UK are nominated in the Security Recruitment Consultancy Category as are Security Management Resources and SSR Personnel, both run by ASIS members. If other ASIS members are nominated please let us know and apologies for the omission. Good luck everyone!

www.asis.org.uk


EPIC

Ex Police in Commerce and Industry (EPIC) public sector resources and economic uncertainty, it is important to develop strategies that will help business to make a contribution towards reducing crime and assist police and others to work more closely with businesses.

David Ryan Chairman EPIC ( Integrity Assured) Ltd considers :The Role and Importance of the National Business Crime Forum The National Business Crime Forum (NBCF) is a key crime reduction group and is the first time representatives from crossbusiness sector organisations have been brought together to work with Police and the Home Office to develop a strategic business crime reduction strategy The prime task is to develop a coherent operational strategy that all business sectors can contribute to and help reduce the burden of crime. In an era of constraints on

www.asis.org.uk

The Forum, which held it’s first full meeting in March this year is growing continually with representation in addition to the Home Office including the Action Against Business Crime Partnerships, the Association of Convenience Stores, the British Retail Consortium, the CBI, the Fashion Forum, the National Farmers Union, the National Fraud Agency, a number of Regional Business Crime Partnerships and now my own organisation EPIC (Ex Police in Industry & Commerce). EPIC’s decision to become involved was an easy one. In existence for 35 years with a membership of professionals in corporate environments or self employed whose background has enabled them to develop and provide services , processes and products across the whole commercial security environment, it was felt to be the right time for such experience to be used to contribute to the aims of the NBCF. Four working groups have been

established chaired by business leaders whose aim is to co-ordinate the network of national and local bodies who are addressing their sector or geographic area. The groups objectives seek to foster better cooperation and collaboration between the various bodies to ensure that business receives the best support that it can, and crucially is able to take issues forward to national decision makers. Intelligence working group is chaired by Amanda Oliver, managing director of the Business Crime Intelligence Bureau. Enforcement is chaired by Phil Collins, Head of Security for Bernard Matthews. The Prevent group is chaired by Brett Lovegrove of CSARN ( City Security and Resilience Network) and Susannah Hancock of Victim Support is to chair the Reassurance group. At a time of austerity and difficult trading conditions for all businesses, NBCF is an organisation whose time has come and is long overdue. EPIC (www.epic-uk.com) can be contacted on 0845 519 8609 during UK business hours The only business networking association dedicated to ex police officers.

AUTUMN

2012

5


FACEWATCH

Dramatically improve security effectiveness through online collaboration: How Facewatch links public and private sectors in the fight against crime, creating the biggest opportunity for effective online collaboration that has ever existed. With police budget reductions causing more than 16,000 police officer jobs to be cut from the forces, it is now more important than ever to improve efficiency in the fight against crime. Simon Gordon (Gordon’s Wine Bar) has developed Facewatch, an online crime reporting system which allows businesses to immediately report an incident to the police. Victims can report a theft to the police and receive a full crime reference, legitimate for insurance purposes, within minutes of the incident occurring without even leaving the premises. Through an online collaboration between Facewatch and the police, businesses are able to provide police forces with a complete evidential package consisting of a statement from the victim, CCTV footage of the crime and an image of the suspect, before the suspect has even got to the end of the road. Victims are able to immediately cancel their credit cards using Facewatch’s association with Card Protection Plan (CPP), and receive regular updates by email on the progress of their case. This online system means that businesses have a direct

link to the police, allowing them to report crime and review the progress of the cases, whilst giving them the opportunity to talk to the case officer during the process using a built in messaging service. By creating this more efficient system, police time can be saved and their resources can be focused on identifying offenders, making arrests and putting suspects before the courts. Facewatch’s unique screen capture software means that CCTV and still images can be uploaded onto the website in seconds and are immediately available to the police. Simultaneously, the still images can be accessed by other local businesses allowing them to protect themselves against the same perpetrators, by spotting potential suspects as they enter the premises and thereby prevent the crime before it happens. This completely online system means that monitoring stations will be able to remotely report crime on behalf of businesses and, using separately available facial recognition system Face Alert it is even possible to automatically send out security alerts notifying them of any potential suspects as they approach the premises. Using this more effective method of reporting crimes and capturing CCTV footage, police are better able to link multiple crimes against a single suspect. And

what’s more - Facewatch is the only online crime reporting system that is officially supported and accredited by the Association of Chief Police Officers (ACPO) as an official police security initiative, as well as being personally endorsed by the most senior police in the UK and the head of the CPS in London. In addition to the web-based system, and downloadable from all App stores, Facewatch id allows users to identify suspects in their local area using their mobile phone. Currently only available to areas within London and now Surrey, the App gives the general public the opportunity to confidentially assist the police in their search for criminals by identifying still images taken from the CCTV footage. With this system in use, more suspects are being identified and more criminals are being prosecuted. Facewatch’s fundamental target is to link businesses both with each other and the police through an online system, in order to create a “crime fighting” network. By creating this network between the private and public sectors they have made a more efficient system for tackling crime, saving the time and reputations of businesses and police forces alike. As well as reducing the amount of crime, Facewatch enables users to review statistics and assess the success rates in solving reported crimes, much improving on the accuracy and accountability/feedback process we have now. The unique relationship between Facewatch and the police means that they have created the biggest opportunity for effective online collaboration

6

SUMMER

2012

www.asis.org.uk


FACEWATCH | SPRING DANCE

between private and public sectors that has ever existed. The prospects for expansion and development of this system into monitoring centres who could act as the intermediary for all businesses using networked CCTV is one that all professionals in security should be looking to leverage. It will not be long before most businesses simply outsource the monitoring their CCTV to ARCs who would then have access to millions of cameras – imagine the power of this if there were to be a terrorist incident, everyone working together online rather

than having all the data sitting on individual DVR’s in each premises. How can you get involved and how does Facewatch survive commercially if it is free to everyone? Facewatch is an open source platform that can be linked to any other system which is allowed to have access to it, including Apps for professional use. If you link to Facewatch they ask for a small proportion of your revenues arising from the added value that this generates for you and your clients. Everyone wins.

Contact: Simon Gordon for more information – simon@facewatch.co.uk www.facewatch.co.uk

The Worshipful Company of Security Professionals PROUDLY PRESENTS

A Black Tie Spring Dance AT THE

Rembrandt Hotel Knightsbridge SW7 With Elwood & Jake - The Blues Brothers keeping you entertained all night

Saturday 2nd March 2013 Reception 6.45pm for 7.15pm Tickets are £108.00 incl VAT Entertainment throughout the evening • Charity Raffle & Auction Carriages at 12.30 am Enquiries to Peter French – pfrench@ssr-personnel.com Registered Charity No. 1088658

www.asis.org.uk

AUTUMN

2012

7


CYBER

Cyber – Back to Basics – Definitions Cyber is a word we use frequently today and think nothing of it, but, how much do the general public really understand about the word cyber? This guide is intended to help the security professional explain some of the basics to the uninitiated. What is Cyber? Cyber is a relatively new word in our everyday language, so what does it mean? Well the Dictionary definition of cyber is: ‘Relating to or characteristics of the culture of computers, information technology, and virtual reality.’ The word cyber originates from the Greek word kybernetes meaning ‘steersman’ or ‘governor’, and came into common use vocabulary around 1991; however Norbert Wiener first used the word ‘cybernetics’ in a 1948 publication ‘cybernetics or control and communication in the Animal and the Machine’. THE DANGERS Hacking Hacking is the ability to find a weakness in a computer or a network of computers. Normally this is undertaken by someone with advanced knowledge of information technology. There are two types of hackers: ethical hackers (White hats), those employed to find and close the networks weakness and those who are motivated to exploit the computers weakness for

8

AUTUMN

2012

personal or criminal (Black hats). Currently used as a form of protest against large organizations, namely the anonymous and LulzSec groups, who have successfully infiltrated: Amazon, PayPal, MasterCard and Visa to name just a few. The hacktivists (hackers who use technology to state publicly a social, ideological, religious or political statement) as they are known published the documents and data it stole to embarrass these organizations’, however the real victims are the customers of these organizations just as much as the organizations themselves. Cracking A cracker is someone, who breaks into a computer/network by discovering and recovering your password or by-passing it altogether. Passwords are your first line of defence so they are very important to employ good password practices. Do not make your passwords obvious or simple (see Julie Lorraine the importance of passwords, winter edition 2011). Malicious Software Malicious software or malware is a piece of software that can aide a hacker to gain unauthorized access to your computer/network, enabling them to acquire/track information and data held on your system which may be sensitive. It is also the general term for any program installed with the intention to do damage. Malware come is various forms: computer viruses, Trojans, worms, spyware, adware, keylogger, rootkits and crimeware etc... A computer virus in simple terms, and let’s face it, it’s more understandable to the majority of us in simple terms is a program that can replicate itself and spread from one machine to another with potentially devastating result.

A Trojan is a program that claims to be something that it isn’t like a game. It in fact a Trojan has the potential to erase your hard drive. A worm is a self-replicating virus that uses parts of the operating systems that are automatic ad usually invisible to the end user. They don’t normally cause harm as such to the network, and are normally noticed when uncontrolled replication becomes sluggish or stop the progress of other tasks. Spyware is hidden software secretly installed onto your system to collect information about an individual’s activity or an organization and is by definition hard to detect. However data collecting programs that have been installed with the users’ prior knowledge are not technically spyware providing the user understands what information is being collected and who is collecting the information. Adware or advertising supported software automatically downloads and displays adverts like banners or pop-ups when a user is online. Its purpose is to generate income for the creator. Adware itself is harmless; it’s when spyware or keyloggers are attached that it becomes harmful. Keylogger is a program installed unbeknown to the end user onto the computer system and records every keystroke made by the user. This is normally done in order to fraudulent access to passwords or other sensitive or confidential information. Rootkits are a set of programs which provide unauthorized access at administrator-level to a computer/network. They are generally installed by a hacker/cracker once they have gained access at user-level by exploiting vulnerabilities within the infrastructure or by cracking a user’s password. A toolkit once installed enables the

www.asis.org.uk


CYBER

attacker to install other malware and go undetected. Crimeware is malware specifically designed to facilitate criminal activities online, and represents an increasing problem in network security. Identity theft is one use to gain access to various sources of personal or company financial information. Cyber Crime We tend these days to think of cybercrime as the headline grabbing cases involving high profile corporations and agencies, we don’t even think anymore about banking and shopping online as a threat anymore as they are no longer given press coverage, but this type of crime still takes place. Not only does it still take place but it’s easier than ever to gain illegal access to your bank account, especially if you bank online or use an app for your smart phone. Cyber Bullying ‘The use of electronic communication to bully a person, typically sending messages of an intimidating or treating nature.’ First used by Bill Belsey a Canadian anti-bullying activist, relating to the use of information and communication technologies to deliberately and repeatedly use hostile anti-social behaviour towards an individual or group with the intention of victimization and humiliations of the individual or group. However, this type of behaviour can now continue even outside of the main environment as the bully will seek out the individual or group and text or post remarks to various online websites or to a cell phone. Making in vitally important to monitor and eliminate rapidly. Social Networks Since the early 90s there has been a plethora of online websites that enable us to communicate quite often in real

www.asis.org.uk www.asis.org.uk

time with people all over the world. We can post photos of friends and family; add your ‘status’ this is normally what you are doing, where you are going and when, who you are with or how you are feeling. Great! Or maybe not so great. Why is it not so great? Well we quite often forget all out inhibitions’ forget personal safety and security. Maybe we should ask the question ‘how many of your ‘friends’ have you ever met in person? More than those you have probably. In itself it’s not a problem but, it’s a great source for a criminal to gather personal information that can be used for illegal activities. Criminals aren’t the only people who use social networking sites to gather information about an individual it’s a great source of information to a potential employer too. So maybe that ‘can’t wait we’re off on holiday/vacation in x number of days’. Now anyone who knows where you live knows your house is unoccupied and for how long. Or the ‘my boss is an idiot and I hate my job’ status wasn’t such a great idea. Not to mention the drunken half naked photo you posted or worse a ‘friend’ posted, highlighting the problem that you don’t always have complete control on a social networking site. It’s also a great way for crackers to identify likely passwords.

coin a phrase. It’s important to remember that we are all potential targets for the hackers, crackers and criminals, and we can all catch a bug! Organizations can now take advantage of cyber security test ranges which are specially designed to emulate your network infrastructure in a safe controlled environment. Thus enabling them to evaluate the resilience to cyber attacks, and fix any issues without jeopardizing sensitive data. Once this has been undertaken there should be (but currently isn’t) a trade mark badge provided that states when the network was tested and a retest due date, so that customers can be more confident during periods of validity and well as extra vigilant towards expiry of the trade badge test mark. Cloud Computing This is the practice of using a network of remote servers hosted on the internet to store, manage and process data, rather than a local server or personal computer.

Don’t get it wrong they really are a great way of keeping in touch with friends and family; just be mindful of what information you or your friends are posting about you. Cyber Security Cyber security is a vitally important defence against data loss; identity theft and unauthorized access of your computer/network. There are various measures that can be applied: a good firewall or antivirus program installed on the computer/network. These defences need to be regularly updated and checked. A good offence is the best defence to

Julie Lorraine worked in transport logistics in the oil industry, before graduating from University of Portsmouth with a BSc in Criminology and Sociology degree. She became interested in investigating Cyber Crime and Cyber Security whilst working for a US defence company.

AUTUMN

2012

9 9


TWITTER

TWITTER.COM

@PoliceFedChair - The Police Federation

Some Twitter users you may want to follow.

@ChatbackSy

If you have other suggestions please send the to mike@hja.co.uk

@GetSafeOnline

ASIS Tweets

@foreignoffice Foreign & Commonwealth Office

@ASIS_Intl

@1stsecuritynews

@eduardemde – ASIS President Eduard Emde

@SIAuk The Security Industry Authority

@ASIStweets

@securityspeak

@CSORoundtable – Head of CSO Roundtable

@TheSecurityLion - Brian Sims, UBM

@_MikeHurst ASIS UK Vice Chairman Others @ISC2 @CEOPUK Child Expolitation and Online Protection @Cyberchallenge Cyber Security Challenge @bbw1984 Big Brother Watch @libertyhq Liberty @ngargan_npia Chief Executive National Policing Improvement Agency @policesupers The Police Superintendents’ Association @CSARN_Updates City Security and Resilience Networks @TheSecurityCo @BBCNews @metpoliceuk @Profsecman Professional Security Magazine @FrankRGardner BBC Security Correspondent

10

AUTUMN

2012

www.asis.org.uk


CHAPTER COLLABORATION

ASIS International UK Chapter collaboration with (ISC)² London Chapter (ISC)² London Chapter was launched in July 2012 to provide the (ISC)² members in London with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create opportunities for members to earn CPEs. ASIS International UK Chapter has been supportive of the (ISC)² London Chapter since the beginning and both the chapters are consistently exploring the opportunities of mutual interests to its members. One of the key initiatives taking shape at the moment is collaboration on the Women in Security subgroup of the (ISC)² London Chapter. The Women in Security (WiS) group is an exciting initiative from the (ISC)² London Chapter to promote networking, education and career opportunities for the women in information security.

The key objectives of this group areOrganise networking events to discuss the topics of interest Organise knowledge sharing or training sessions Provide coaching or mentoring to the new or junior members Create a common platform for members from different professional organisations to collaborate or network The first social event of the group recently took place at

ASIS International and the International Information Systems Security Certification Consortium (ISC)², signed a Memorandum of Understanding at the ASIS International 50th Annual Seminar and Exhibits, held in Dallas in 2004. The purpose of this MoU was to CrossEndorse Certifications To Advance Security Profession. At that time ASIS had 33,000 members as opposed to 38,000 today. In recent years the ASIS International Annual Seminar and Exhibits and the (ISC)² Congress have been collocated: this year it was in Philadelphia.

Central London where the members were able to meet each other in person and exchange ideas on the focus and activities of the WiS group. The Women in Security group of ASIS and WiS are currently working together to organise a conference in October. If you are interested to know more details on the activities of WiS of (ISC)² London Chapter and the planned conference please contact us at the email address wis@isc2chapterlondon.co.uk

its 35th anniversary this year. Vice Chairmen Mike Hurst, Graham Bassett have met with Sandip Wadje and Obine Adoh of (ISC)² and Mike also took part in the recent meeting of the London Committee. There are many potential areas of mutual benefit and hopefully the relationship can grow and extend to other IK Chapters as they get established. As mentioned previously, the first joint event will be a Women in Security meeting, in October, but it is expected that there will be other events in 2013. Which as mentioned previously id the 20th Anniversary of ASIS Chapter 209 being granted its Charter.

Education is at the heart of both organisations with the ASIS CPP, PSP and PCI certifications and the (ISC)² SSCP, CAP, CSSLP and CISSP being world leaders in their respective areas. CPP is celebrating

www.asis.org.uk

AUTUMN

2012

11


EUROPEAN CONFERENCE

ASIS International 12th European SecurityConference & Exhibition Join colleagues from around the world in Sweden! ASIS International will host the 12th European Security Conference & Exhibition in 2013 in Gothenburg, Sweden. Set for April 14-16, 2013, this unique conference event will address a full spectrum of topics in security management such as: supply chain security, loss prevention, hotel security, intellectual property, maritime piracy, terrorism, executive protection, internal theft and fraud, competitive intelligence, brand protection, physical security, cyber security, investigations, due diligence and global business issues. Horizontal learning - use examples, lessons learned, and case studies presented by security professionals who work in diverse sectors and geographies and apply them to your own situation. Connect with peers in security management from around the world. Share experiences and exchange ideas. Gain valuable new insights and perspectives on security challenges faced regionally in Europe, as well as those that extend globally.

IMMERSE YOURSELF IN THREE DAYS OF: • Educational sessions (Keynotes, case studies and panel discussions) • Networking events (President's Reception, lunches, coffee breaks) AND • Update yourself on the latest in security services and technology in our enlarged trade exhibition Early Rate on/until 15 Mar 2013

Regular Rate after 15 Mar 2013

€850

€970

€1,050

€1,170

Single Day

€515

€630

Partner Organisations

€895

€995

Group Rateincludes receptions

€800

€900

Partner Association Rateincludes receptions

€915

€1015

President's Reception(included in full delegate rate)

€130

€130

€ 30

€30

ASIS Member Non Member

Exhibition Only (rate per day)

www.asisonline.org/gothenburg

12

AUTUMN

2012

www.asis.org.uk


PROJECT MANAGEMENT

MSc – Project Management (APM/ IPMA accredited) Designed in partnership with security professionals for security professionals the LMBS MSc in Project Management offers experienced security practitioners with ASIS International CPP/PSP or professional qualifications fast-track entry through accreditation of priorexperience. Project Management is a recognised management tool to enhance security practice through a defined set of measurable and auditable processes. Fast track credit is available for a maximum of 3-modules which enables direct entry at PostGraduate Certificate level, candidates study 3-modules for the Post-Graduate Diploma and final successful completion of the dissertation (20,000-words) achieves the MSc in Project Management (APM/ IPMA accredited). Quality Assurance The LMBS MSc has been quality assured and accredited by the Association for Project Management and International Association for Project Management (AMP-IPMA). APM is an accredited Information Assurance certification provider to UK Government. London Metropolitan University is accredited through Professional, Statutory and Regulatory Body (PSRB): including, the US Middle States Commission on

www.asis.org.uk

Higher Education, MSCHE, the British Computer Society, the Law Society and the Royal Institute for British Architects, RIBA. PSRB requires the University to satisfy that the learning and achievement by students meets PSRB professional benchmarks: award of an accredited degree may allow a graduate to qualify for a particular type of employment and/ or gain exemption from PSRB examinations. Fees (2012) (2013 tbc) UK / EU full-time £8,100, parttime £900 per-module, International full-time £13,500 Prior-experience maximum 3modules credit London based, classroom teaching, Block teaching/ distance learning option available in the near future Teaching team Security, business experts and Visiting Professors, including, Professor Mike Alexander MSc FSyI BEM, ASIS UK Chairman and global head of security and safety at Henderson Global Investors, Quandom Professor Lester Hillman former head of safeguarding Channel Tunnel Rail Link Project, Professor Charles Hampden-Turner (Cambridge Judge Business School), Professor Michael Jefferson (Royal Dutch Shell chief economist) and a team of experienced academics and

researchers with teaching and learning qualifications for higher education. LMBS aims to produce London’s most business-ready graduates and we will encourage and help you to get involved with London’s expert project management, risk and security communities. MSc Project Management Modules • Project Management Foundations • Project Management Systems and Practice [MS® Project] • Project Management Risk and Finance • Project Management Organisation and Behaviour • Research Methods • Free Module: IT Security, Crisis and Disaster Management, Advanced Financial Reporting, Psychology, International Crime, Marketing and Communications, workplacement module available • Dissertation, candidates’ choice of project management in security (prerequisite Research Methods) Includes PRINCE2® training and study-support / coaching to help returners get back to study. For more information please email MSc Course Leader Allison Wylde a.wylde@londonmet.ac.uk

AUTUMN

2012

13


LEGAL UPDATE | ASIS INTERNATIONAL

Legal Update — Claudia Gerrard The Transfer of Undertakings (Protection of Employment) Regulations 2006, usually known as TUPE, are particularly important to the security industry. Traditionally, work is allocated on the basis of fixed term contracts. So, what happens when the contract comes to an end?

And staff are entitled to retain all existing rights and benefits. Often, though, companies are unaware of their obligations until it is too late. And that is often when an employment claim is made by staff whose contracts should have been transferred and not terminated.

Take a recent client query. The client wanted to terminate the employment of a security officer. That seemed simple enough. But then the client mentioned that they had lost a security guarding contract and a new contractor had been appointed. In that instance, TUPE applies and staff will automatically transfer to the new contractor. The new contractor cannot refuse to employ existing staff or change their terms and conditions. There is no discretion to terminate staff.

Claudia specialises in commercial and employment law, particularly in relation to the security industry. This includes all aspects of commercial law, contractual matters, TUPE, Data Protection, tenders, franchising, web agreements and some aspects of IT and IPR. She has also given legal talks recently at events hosted by ASIS, IFSEC and EPIC. She is a member of ASIS UK and ACS Pacesetters. As part of her work, Claudia also writes a monthly legal column in Professional Security magazine and ad hoc articles for other journals.

Claudia Gerrard Legal Consultant, Excello Law

Claudia is offering fellow ASIS members the first half hour’s consultation free and, thereafter, a reduced hourly charge.

cgerrard@excellolaw.co.uk

ASIS International EU Liaison Sub Committee (ELSC) It is estimated that between 60% and 80% of the legislation that currently affects professionals and businesses throughout Europe is decided in Brussels: industry standards, pharmaceuticals, competition, trade, funding of scientific research, environment, professional qualifications, health & safety rules, consumer protection and food safety regulations, etc. For this reason, almost every business sector and many professions are represented in Brussels through a trade or professional association, including hundreds of non-EU interest groups. The European commission frequently calls on external specialists to sit on expert groups or advise as external consultants. The type of expertise may be scientific knowledge and/or knowledge derived from practical experience. This opens up opportunities for associations. By

14

AUTUMN

2012

positioning their people in these roles, they can exert influence through the expertise of its members. Similar opportunities exist with EU funded projects and thematic networks for which vast funding opportunities are available through programmes such as Framework Programme 7 (FP7) to be renamed Horizon 2020 starting 2014.

at both national and European level,

For these and other reasons a working group of ASIS Europe voluntary leaders have studied the ways and means for ASIS Europe to gain an adequate and appropriate profile within Europe and move towards being part of the decision making process.

It also intends creating an Advisory

Roger Warwick, CPP, RVP Region 27A, has also been tasked to chair the EU Liaison Sub Committee (ELSC). Roger is in the process of putting together a group of ASIS Europe members with appropriate experience and contacts,

with public sector decision makers. The intention is that the ELSC shall have a balanced composition of nationalities, corporate security managers, consultants and practitioners. The Committee will promote and coordinate actions, such as the participation in EU events, to be taken at national and EU level.

Council. All European based members of the CSO Round Table are invited to join. This project has the full backing of our President Eduard Emde, CPP and is supported by the ASIS International EMEA Bureau. Any members who are interested in joining the ELSC or simply in lending a hand are invited to contact Roger Warwick at warwick@pyramid.it.

www.asis.org.uk


ASIS INTERNATIONAL

It’s called ASIS International for a reason Sometimes it’s worth remembering that ASIS has 38,000 members in over 200 chapters across the world. Even where there is no chapter, there may be members: 100+ UK members work overseas.

Council topics range from Educational Institutions to Crisis Management and Business Continuity, and from Crime and Loss Prevention to Global Terrorism, Political Instability and International Crime.

There are 31 Council s which serve the membership through identification of information regarding security issues in specific concentrations.

So if you do travel or have international responsibilities, there are resources and people that are there to make your work life easier and better.

In July the Worshipful Company of Security Professionals hosted their first Young Members Group, networking event at The Water Poet, London E1.

It was well attended and good to see many new young faces that have joined the security profession – there was a great buzz and many new friends and contacts were made.

ASIS was represented by Vice Chairman— Operations Graham Bassett.

It was a successful evening and special thanks to CIS Security for sponsoring the venue and refreshments.

L-R Justin Morgan- Spitalfields Estate Security Manager Amanda McCloskey- CIS Security Business Relationships Manager Graham Bassett – ASIS Vice Chairman Henry Millard – Kings College Department of War Studies Neill Catton- CIS Security Operations Director We are looking for someone to lead our ASIS Young Professionals programme: interested? Contact Mike Hurst: mike@hja.co.uk

www.asis.org.uk

AUTUMN

2012

15


ASIS in the UK is pleased to work with and/or support a number of security organisations and charities. Some of these are associations are long standing other are new and will hopefully become long standing. If you are involved with an organisation would like to discuss a mutually beneficial relationship, please contact ASIS Vice Chairman —Strategy, Mike Hurst (mike@hja.co.uk)


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.