Issue 139 August

Page 1


FACE OFF

Achieving balance between security and privacy with facial recognition tech

TOURISM REDEFINED

Red Sea Global is pioneering a new approach to tourism security

GUARDIANS OF THE GULF

Progress Security System’s CEO, Joseph Faraj, shares strategic insights on data centre security and development in KSA

Integrate Video Anywhere

Altronix has the solutions you need to integrate critical infrastructure and provide power for all your surveillance and security applications.

And our powerful LINQTM network management platform lets you remotely monitor and control all your devices from a single-pane platform.

We’ve got it all covered.

CONTACT

US

EDITORIAL

Publisher

Barry Bebbington

+44 1708 229354

barry@pubint.co.uk

Editor

Cora Lydon +44 7834 244613

cora.lydon@securitymiddleeastonline.com

ADVERTISING

Worldwide

Mike Dingle

+44 1752 267330

mike@securitymiddleeastonline.com

Ryan Bickerton

+44 1752 265802

ryan@securitymiddleeastonline.com

Gareth Driscoll

+44 1752 260603

gareth@securitymiddleeastonline.com

Rahul Vara

+44 1752 604352

rahul@securitymiddleeastonline.com

Marketing Manager

Paul Riglar +44 7496 377630

paul@securitymiddleeastonline.com

Digital Editor

Britt Jones

britt@securitymiddleeastonline.com

PUBLISHED BY

Publications International Ltd

+44 1708 229354

166 Front Lane, Upminster, Essex, RM14 1LN, UK

This publication may not be reproduced or transmitted in any form in whole or in part without the written consent of the publishers.

©Publications International Ltd. 2024

For subscriptions and advertising enquires, or for further information on the magazine visit our website at: securitymiddleeastmagazine.com

UP FRONT

No doubt as a security professional, the job is never far from your mind even when you’re on your holidays. And within the sector, tourism and hospitality –and the need for proactive yet discrete security – are hot topics. This issue, Tawfeeq Alsadoon, Group Head of Security at Red Sea Global shares with us the company’s approach to ensuring the safety and security of guests and staff within its destinations on page 16. In a similar vein, we also have Daniel Norman, Regional Director, EMEA, ISF, scrutinise the challenges that Saudi Arabia’s tourism sector is facing through the cybersecurity lens (page 34).

Mr Alsadoon was one of our speakers at the Security Middle East Conference in May and on page 14 you hear from some of the delegates, as they share their own experience of joining us for this premier industry event. We also reveal how we hope to evolve the event to be even bigger and better.

We were also lucky enough to have another speaker from the event put pen to paper for us this issue. Turn to page 24 to read how Farah Ghanem, Head of Climate Change and Policies, Alpin Ltd, thinks security professionals need to address sustainability in the built environment sector.

We’re looking forward to heading to Intersec Saudi Arabia in October and hope to see as many of you there as possible.

Cora

CONTENTS

MONITOR

03 Up front

Foreword from the Editor

06 News Monitor

The latest regional and international security news

08 Market Monitor

A roundup of the latest security products and solutions

FEATURES

14 Security Middle East Conference 2024

We take a look back at this year’s event and find out from our delegates what they gained from the day. We also reveal some of the changes we’re looking to implement for the 2025 Security Middle East Conference

16 Hospitality and security in the new era of tourism

12

12 Cover story: Progress Security

We speak with Mr Faraj, CEO of Progress Security Systems, to learn more about the company’s journey and its vision for the future of Middle East security

Farah Ghanem, Head of Climate Change and Policies at Alpin Limited, explores the role that security professionals in the built environment sector have in addressing sustainability at urban and project level 14

We learn more about how Red Sea Global is pioneering a new approach to hospitality and tourism security, from Tawfeeq Alsadoon, Group Head of Security at the organisation

20 Elevating Middle East security

Bosch Video Systems and Solutions is expanding in the region, with a new office in Saudi Arabia. We find out about the company’s plans from Daniel Fernàndez, VP Sales & Marketing META

24 Secure and sustainable

28 Face off: Security Vs privacy

Talal Shaikh, Associate Professor, Mathematical and Computer Sciences, Heriot-Watt University Dubai, looks at striking a balance between security and privacy in public spaces with the use of facial recognition technology

32 Beyond the buzzer

Today’s video intercoms door entry technology is more flexible, powerful and useful, writes Dennis Choi, General Manager IDIS MENA. We learn more about this valuable technology

THIS ISSUE’S PARTNERS & CONTRIBUTORS

STRATEGIC PARTNER

CYBERSECURITY

34 Securing the tourism industry in Saudi Arabia

Daniel Norman, Regional Director, EMEA, of the ISF puts Saudi Arabia’s tourism sector and the challenges it faces under the spotlight

CONTRIBUTORS

SAFE

SAFE — The National Security Services Company is owned by The Public Investment Fund and was established in 2019. Its mission is to lead the transformation of the security services ecosystem and to promote and transform the security services sector through a consultative approach and by offering best-in-class security solutions. Its vision is to be the ultimate security partner leading the transformation of the security ecosystem. SAFE joined the Security Middle East Conference as Strategic Partner.

Joseph Faraj

CEO of Progress Security Systems

Mr Faraj is the CEO of Progress Security Systems, driving innovation and excellence in security solutions across the Middle East

Daniel Norman

Regional Director, EMEA, Information Security Forum (ISF)

Daniel Norman’s role at the ISF is to help organisations manage their current and emerging cyber risks.

Farah Ghanem

Head of Climate Change and Policies, Alpin Limited

Farah Ghanem is a passionate leader in sustainability with a proven track record in climate action.

36 AI’s dark spear

Nicolai Solling, Chief Technology Officer, Help AG, explores how organisations can guard against spear fishing in the age of generative AI

38 Data fortress: security’s new frontline

Haider Aziz , Managing Director of Middle East, Turkey & Africa, VAST Data, takes a closer look at deploying a data pillar approach and how it can move security closer to the data

INDUSTRY MONITOR

41 Interview: Hospitality

Meshal Aljohani, CPP, PSP, PCI, Security Group Supervisor, Armaco, finds out more about Andrew Long, Principal Consultant — Security Risk Management at WSP, KSA, and his career in the sector

42 Diary Diary dates for forthcoming security exhibitions, conferences and events

TREND MICRO PARTNERS WITH NVIDIA FOR SECURE PRIVATE DATA

Trend Micro Incorporated has announced its partnership with NVIDIA to secure AI-enabled private data centres in the region and globally.

This collaboration integrates NVIDIA NIM and NVIDIA Morpheus with Trend Vision One™ – Sovereign and Private Cloud (SPC) solutions, enhancing security for businesses adopting generative AI. By using NVIDIA NIM’s optimised AI inferencing microservices to locally serve Trend Micro’s Cyber Security Large Language Model (LLM), Trend Vision One – SPC boosts the strength of

security solutions by improving data privacy, real-time analysis and rapid threat mitigation.

This integration addresses the complexities of next-generation AI-driven data centres and delivers highly efficient threat detection and response capabilities.

Dr Moataz Bin Ali, Regional Vice President and Managing Director, MMEA, Trend Micro said: “This partnership is critical as the AI sector in our region is set to grow annually by 20% to 34%, reflecting a vibrant and rapidly expanding ecosystem.

“In this transformative era, our mission is to enable businesses to unlock the full

potential of AI while maintaining top-tier security and data protection. Our latest initiative is dedicated to protecting these vital AI-driven infrastructures with state-of-the-art security solutions.”

“Leading companies recognise the importance of deploying generative AI in diverse environments, including sovereign private clouds, and are developing strategies for integrating security into their AI applications,” said Pat Lee, VP of Strategic Enterprise Partnerships at NVIDIA. “Trend Micro’s NVIDIA NIM integration highlights how companies can use generative AI to enhance the security of their customers’ environments across a broad range of enterprise infrastructure.” trendmicro.com

MATRIX JOINS MAGTECH SECURITY SYSTEMS TO ENHANCE PHYSICAL SECURITY

Matrix has joined forces with Magtech Security Systems (P) Ltd, a security system company in India, to deliver state-of-theart physical security solutions. This strategic collaboration aims to enhance security infrastructure and provide unparalleled safety measures for businesses and enterprises.

Through this integration, Matrix leverages its expertise

in advanced security solutions to seamlessly integrate with Magtech’s entrance access security systems, offering a comprehensive solution for robust physical security.

By combining Matrix’s innovative technologies with Magtech’s renowned entrance automation products, this partnership ensures superior security management and operational

Fortinet’s latest study highlights a global cybersecurity skills gap, with large organisations in the UAE particularly affected despite offering attractive salaries and boosting cybersecurity budgets by 35% to combat AI-powered ransomware attacks.

The 2024 Global Cybersecurity Skills Gap Report, which surveyed over 1,850 IT and cybersecurity decision-makers from 29 countries including the UAE, serves as a crucial wake-up call for organisations worldwide. Despite the UAE’s appeal due to higher salaries and lower taxes, the findings reveal that 58% of IT decisionmakers in the region struggle with a lack of training and upskilling opportunities.

efficiency. “Matrix is dedicated to providing innovative solutions that cater to the evolving security needs of our clients,” said Kaushal Kadakia, Marketing Manager at Matrix.

“Our partnership with Magtech Security Systems enables us to offer a robust integration with their entrance access systems, ensuring enhanced security and peace

“The findings from our 2024 Cybersecurity Skills Gap Report highlight a critical issue facing organisations in the United Arab Emirates,” says Alain Penel, VP – Middle East, Turkey and CIS, at Fortinet.

The report revealed nearly 90% of organisations experienced a breach last year partly due to a lack of cyber skills, up from 84% in 2023. This shortage is creating additional risks, with over 50% of respondents indicating that breaches cost their organisations more than $1 million in lost revenue and fines last year. Despite the ongoing staff shortages, the industry is making efforts to address the issue. The report revealed that 72% of respondents said their boards were more focused on security in 2023, with 97% viewing cybersecurity as a business priority. However, 90% of respondents still prefer hiring candidates with certifications, and 70% find it challenging to locate certified professionals.

of mind for our customers.”

“By integrating our advanced entrance automation products with Matrix’s cutting-edge security technologies, we aim to provide our clients with unparalleled safety and operational efficiency,” said Anilkumar Kumar, Associate Director – Sales, Magtech Security Systems. matrixcomsec.com

Diversity in hiring is also a focus, with 83% of respondents setting diversity hiring goals, though the proportion of female hires has dropped to 85% from 89% in 2022. As cyber threats evolve, closing the skills gap will be essential for organisational survival. fortinet.com

58

ARAMCO DIGITAL AND WORLD WIDE TECHNOLOGY ANNOUNCE PARTNERSHIP

Aramco Digital and World Wide Technology have forged a partnership aimed at spearheading the development of an AI-powered Digital Innovation Economy in Saudi Arabia.

The partnership is seeking to transform the Saudi economy, including key industrial sectors such as energy and healthcare, by integrating advanced artificial intelligence (AI) solutions, unlocking new opportunities for the country and localising cutting-edge technologies with skills and know-how in the Kingdom.

By partnering with Aramco Digital, WWT is further solidifying its ambitions to drive technological growth and become the transformational innovation enabler of the region.

Omar Mir, an International Board Member at World Wide Technology, said: “Last year we announced our ambitious plans to expand into the Middle East

The partnership between Aramco Digital and World Wide Technology will transform the Saudi economy

region with the goal of establishing a US-centric technology innovation hub.

“Today’s partnership with Aramco Digital marks a significant chapter in our mission to provide cutting-edge technology solutions in the region.

“With our substantial one-of-a-kind Lab and AI Proving Ground R&D environment, we enhance our capability to help the Kingdom’s economy experiment with and implement AI solutions tailored to their specific needs. Aligned with Saudi Vision 2030, it highlights our commitment to drive enterprise AI adoption at a global scale, further cementing our role as a key player in the Middle East’s burgeoning technology landscape.”

Aramco Digital’s CEO, Tareq Amin, noted that the partnership reflects the Saudi Vision 2030’s goals of digital transformation and economic diversification: “It is a significant step marking an important milestone towards positioning the Kingdom at the forefront of digital innovation.

“Together, Aramco Digital and WWT are pushing the boundaries of AI to enhance capabilities and create new opportunities by offering technology platforms and solutions that foster creativity, unlock value and promote sustainability.” aramco.com

AJAX SYSTEMS EXPANDS TO MOROCCO

Ajax Systems is expanding its presence in the Maghreb by officially debuting in Morocco.

“The Moroccan security market is in a build-up process, and we are proud to have identified two expert partners to participate in Ajax’s growth in the region: Hiteckland and Euromar Digital. The Préventica International exhibition allowed us to meet a wonderful community of intrusion solutions specialists attracted by our

innovative technology”, said Diego Di Giuseppe, Cluster Director South Europe, LATAM, and Maghreb, Ajax Systems.

“We at Hiteckland are excited about the partnership with Ajax. It allows our company to further develop its portfolio and team up with a premium brand known for its advanced technology, outstanding design and high-quality materials,” added Anass Taarji, General Director, Hiteckland. ajax.systems

IN BRIEF

GOOGLE CLOUD OPENS OFFICE IN KUWAIT

Google Cloud announced the opening of its new offices in Kuwait licensed by the Kuwait Direct Investment Promotion Authority (KDIPA).

This expansion further signifies Google Cloud’s commitment to supporting Kuwait’s national digital transformation journey, including the modernisation of government services and the advancement of economic development.

BAHRAIN IMPOSES VISAS ON QATARIS

The Bahraini Ministry of Interior has announced that based on national security requirements, visas are to be imposed on Qatari citizens and residents.

Bahrain stated that it had taken these measures to maintain its security and stability after Doha’s breach of Gulf security policies.

$16.7BN POTENTIAL DEALS AT INTERSEC

Intersec was held in Dubai earlier this year, and it led to more than $16.7bn for the industry, according to Messe Frankfurt Middle East, organisers of the exhibition.

IRAQ AND KUWAIT REVIEW SECURITY COOPERATION

Abdul Amir Al-Shammari, the Iraqi Minister of Interior, has visited Kuwait.

Al-Shammari’s visit was successful, and he discussed various topics such as residency, entry visas for Iraqis and Kuwaitis, border security, drug trafficking and collaboration in combating organised crime.

During his visit, Al-Shammari also reviewed border security and the 2016 memorandum of understanding with Kuwaiti officials.

KUWAIT’S ‘DETECTOR’ TELECOMS SERVICE

In Kuwait, the Communications and Information Technology Regulatory Authority (CITRA) is boosting transparency in telecommunications with its newly launched ‘detector’ service. It reveals the name and number of callers to recipients. The service was developed in collaboration with local telecom providers and relevant government agencies, and is aimed at legal entities within Kuwait.

MONITOR MARKET

BLACKLINE SAFETY CORP LAUNCHES NEW ALERTLINK FEATURE

Blackline Safety Corp. has released the new AlertLink feature for its award-winning EXO and G7 devices.

AlertLink’s proximity-based warning alerts increase employee safety via advance warning of potentially dangerous conditions, expediting evacuations and incident response.

The company developed the feature after receiving feedback through its customer advisory panel that proximity-based warnings will enhance industrial safety.

Blackline Safety Channel partners are already seeing the benefits of the new feature. “We were excited to implement the AlertLink upgrade into our gas detection suite from Blackline, and it has impressed us. AlertLink has

TRASSIR ANNOUNCES NEW LINE OF CAMERAS

TRASSIR has announced the release of its new camera line, the Ultra 5MP\2MP series.

significantly improved the notification process for on-site personnel during high gas events, resulting in faster response times,” said Shawn Todd, American Safety Services General Manager.

“We have a number of wellsites monitored by EXO devices, and having any incidents immediately communicated to nearby workers means we can address issues such as falls and gas exposures faster, while also keeping our people safer than ever before,” said another company representative. “We know this tool will be incredibly valuable for our teams, and we’re pleased Blackline invited our feedback.”

AlertLink is available for any Blackline G7 and EXO devices on monitored and

In total, the line features seven cameras designed for large-scale systems with optimal performance.

The cameras are designed to function in difficult lighting and environmental conditions and feature advanced P-Iris technology, which ensures optimal performance of the network camera in any lighting condition.

It allows for clear, high-resolution video with sufficient depth of field by automatically minimising diffraction and image aberrations.

The new models are suited for high-security facilities and city surveillance. Key Features of TRASSIR 5MP/ 2MP new Ultra Cameras include neural network analytics; AUTO P-Iris function; high-sensitivity sensor; audio capabilities; extensive peripherals; edge storage and a 5-year warranty.

The cameras are ideal for businesses managing critical infrastructure, where the reliability of facial and license plate recognition is crucial. They will also be ideal for large-scale and high-security applications. trassir.com

self-monitored plans. Unlike competitor products, Blackline’s cloud-based system means G7 and EXO devices will automatically receive the AlertLink firmware update with no action required from the device user. Customers will simply need to log in to Blackline Live, the company’s cloud-based software platform, and set up their AlertLink profile to start using the new feature.

blacklinesafety.com

HID LAUNCHES MECHANICAL KEYPAD READER FOR ROBUST SECURITY

HID has launched its new HID® Signo™ Mechanical Keypad Reader 40T, engineered to offer high performance in harsh and challenging environments where the weather is wet or cold and visibility is low.

“As a high-performance reader with reliable features for harsh environments, it’s a great offering for customers who have a preference or specification for a traditional mechanical device,” said Spencer Marshall, HID’s Head of Europe.

“It also comes with all the security and mobile-ready features you’d expect from our signature range of Signo readers, providing customers with utmost flexibility. Whether using the keypad, smartphones, fobs, or cards, users can gain fast and easy entry into buildings.”

The new Signo 40T Reader has a number of key features:

■ Support for a wide range of credential technologies, including HID Mobile Access® via native Bluetooth® and near field communication (NFC) capability, the new reader supports credentials in Apple Wallet and Google Wallet.

■ Highly secure storage of cryptographic keys on certified secure element hardware, plus a new surface detection feature that enables the reader to automatically recalibrate and optimise read range performance.

■ Out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bidirectional communication. The new Signo 40T Reader is designed to easily integrate and fit without requiring considerable time or unnecessary extra cost from installation engineers. hidglobal.com

The new Trassir cameras are designed for outdoor use year-round

3DIVI AND CORPSOFT24 TO LAUNCH ADVANCED SECURITY PRODUCTS

CorpSoft24 and 3DiVi are set to introduce their software solutions to the Middle East this year, marking a significant step in their global growth ambitions.

The offering is a sophisticated biometric security system designed to safeguard workstations and applications from unauthorised access.

The biometric system operates by continuously monitoring the user via the camera and verifying their identity against the account holder’s registered face.

In the event of a security incident, CorpSoft24’s Biometric Protection Service

ARMATURA RELEASES ONE SECURITY PLATFORM

Armatura One is an all-in-one web-based security platform, and has recently been launched to the market.

The solution contains multiple integrated modules: Personnel, Access Control, Time & Attendance, Elevator, Visitor, Parking Management, Video Management System, Office, Fire Alarm, Entrance Control, FaceKiosk, Temperature Detection, Defence, Data Monitor, Building Automation and Intrusion.

Designed for high-security applications, it ensures that all communications are encrypted with Advanced Encryption Standard and Transport Layer Security (TLS) cryptographic protocols.

With the help of the Armatura Protocol Gateway, it supports up to 268+ industrial-grade protocols including BACnet, OPC, Modbus, etc., which makes Armatura One easily integrable with Building Management Systems (BMS) or Property Management Systems (PMS).

The business created the solution with over 200 linkage conditions which cover most access control application

triggers actions such as locking the screen or workstation and capturing a photo of the potential intruder.

Scheduled for release in North African and Middle Eastern markets, this initiative aims to broaden the companies’ market reach and foster new partnerships, paving the way for future projects.

Konstantin Renzyaev, CEO of CorpSoft24, said: “The past year and a half has seen a streamlined process for IT companies entering Asian and African markets, bolstered by government support. We foresee substantial growth and development opportunities for our company internationally and believe our innovative biometric solutions will secure a strong presence on the global stage.”

3divi.ai

scenarios. In addition, it supports high-level linkages with 3rd party industrial-grade devices via industrial-grade communication protocols.

Armatura One supports advanced access control functions such as anti-passback, multi-level authentication, cross panel linkage (global linkage) and offers higher flexibility to the user supporting up to 256-bit card lengths that almost cover all needs and supports up to 15-time segments in a single time zone to offer flexible scheduling. armatura.us

INFOBLOX THREAT INTEL INTO INCREASING RISK OF CYBER ATTACKS

Infoblox Threat Intel has published research showing how registered domain generation algorithms (RDGAs) were used in malware, malicious link shorteners (Prolific Puma), and in traffic distribution systems (VexTrio Viper/ Savvy Seahorse).

The company developed multiple algorithms to discover and track RDGAs in the wild, including patent pending detection of emerging clusters of RDGA domains.

With these detectors, Infoblox discovered tens of thousands of new domains every day, capturing them into clusters of actor-controlled assets. Most of these domains go unnoticed by the security industry.

In the new study of the RDGA threat landscape,

the use of RDGAs has grown over the past few years and shows how domains created with them are used, including numerous examples from scams to malware.

The landscape study shows that RDGAs are an underestimated threat and that actors can easily scale their spam, malware and scam operations often without fear of detection by the security industry.

It also highlighted that automation in the domain registration services makes it easy for cybercriminals to use an RDGA. The intent of the study is to raise awareness and shed light on the growing trend in malicious domain registrations. infoblox.com/threat-intel

THE GUARDIANS OF THE GULF

Security Middle East magazine spoke with Mr Faraj, CEO of Progress Security Systems, to learn

journey and its vision for

more about the company’s
the future of Middle East

The security landscape in the Middle East is constantly evolving. From sprawling metropolises to vital energy infrastructure, the need for comprehensive and innovative security solutions is paramount.

Progress Security Systems, a name synonymous with high-end security solutions in the region, has been at the forefront of this evolution for over 14 years.

Progress Security Systems boasts a remarkable track record, serving a diverse clientele across various industries. Strategically located across five cities, the company offers a truly nationwide presence. Its commitment to quality and service excellence has earned it the trust of businesses large and small, solidifying its position as a leading security provider in the region.

Its emphasis on fostering strong communication and collaboration with clients allows it to develop customised security plans tailored to address specific threats and vulnerabilities. This personalised approach ensures that each client receives a solution that perfectly integrates with their existing infrastructure and operational needs.

The company doesn’t shy away from embracing cutting-edge technology either. Its pledge for constant improvement is evident in its utilisation of advanced security systems, including those for infrastructure, detection, safety and audiovisual applications.

As new technologies emerge and the threat landscape evolves rapidly, how do you see security needs changing?

In the next decade, we anticipate a significant shift in security requirements driven by technological advancements. With the proliferation of edge computing and 5G technologies, security perimeters are becoming increasingly fluid, blurring the traditional boundaries between network and physical security. Moreover, adopting hybrid cloud and multi-cloud solutions will necessitate a unified approach to securing workloads across diverse environments, including data centres where critical infrastructure and sensitive data are housed. At Progress Security Systems we are committed to developing innovative solutions that cater to

security

these evolving security challenges, particularly focusing on data centre protection through advanced security camera systems, access controls and robust monitoring capabilities.

Furthermore, we are actively engaging with our partners to adopt AI technologies and innovations. By collaborating with industry leaders and leveraging AI advancements, we aim to enhance detection capabilities, automate threat response, and fortify our security solutions to meet the dynamic needs of the future security landscape.

Security is evolving rapidly — how is Progress innovating to stay ahead of the curve and meet customer needs?

Progress Security Systems focuses on continuous innovation across our portfolio to remain at the forefront of the evolving security landscape. We are enhancing our physical security systems solutions with advanced technologies and proactive strategies to address emerging threats and ensure comprehensive protection for our clients.

Specifically, we are collaborating with our partners to enhance the data centre security solutions with analytics functionalities that empower automated threat detection and prevention. Our strategic investments in managed detection and response services ensure round-the-clock protection for hybrid infrastructures, including comprehensive coverage for security cameras, access controls and other essential components in safeguarding data centre operations.

We aim to meet and exceed customer expectations in an ever-changing security environment by leveraging innovative approaches and staying abreast of industry trends.

What role do partnerships play in Progress’ success and vision for the future?

Partnerships are essential to Progress Security Systems’ success and future vision. Collaborating closely with industry-leading partners allows us to integrate innovative technologies and solutions into our offerings, providing our customers with tailored

security solutions. This collaborative approach will enable us to offer comprehensive, future-proof security solutions tailored to the unique challenges faced within data centres and other environments.

Progress recently expanded operations in KSA — what opportunities do you see in the Saudi and Middle Eastern markets?

Expanding our operations in KSA and the broader Middle Eastern markets presents significant growth opportunities for Progress Security Systems. As digital transformation accelerates in the region, there is a growing demand for advanced security solutions that adapt to evolving threats and challenges.

We aim to position ourselves as a trusted security provider by establishing a strong presence in these markets. We offer advanced security solutions and expertise to support organisations in their security initiatives.

With evolutions in technology and business models, what will the security landscape look like in 10 years, and how is Progress preparing for this future?

Looking ahead to the next decade, the security landscape is expected to undergo profound changes influenced by technological advancements and evolving business models. Progress Security Systems is proactively preparing for this future by investing in research and development in collaboration with our partners, harnessing emerging technologies, and refining our security solutions to meet the demands of tomorrow.

Our commitment to innovation and continuous improvement positions us to adapt to the evolving security landscape and deliver solutions that address the complex security needs of businesses and individuals.

progress-security.com

PAVING THE WAY FOR INNOVATION AND INDUSTRY DIALOGUE

The dust has settled on the 2024 Security Middle East Conference, and the echoes of thoughtprovoking discussions and cutting-edge product demonstrations still resonate

Held at the InterContinental Riyadh Hotel on May 14th, the second iteration of the event brought together over 300 C-suite security professionals for a day of intense learning, networking and exploration of the region’s ever-evolving security landscape.

This year’s conference boasted impressive participation from leading international and local security companies. In addition, we had a number of organisations showcase their latest innovations to our audience during break-out sessions. From access control solutions to advanced cybersecurity measures, the event provided a comprehensive platform for attendees to stay abreast of the industry’s most recent advancements.

But Security Middle East Conference 2024 wasn’t just about showcasing

products. The conference’s strength lay in fostering dialogue and knowledge exchange. Interactive panel discussions led by renowned security experts tackled critical topics like the impact of Saudi Vision 2030 on security infrastructure and navigating the evolving cyber threat landscape. Feedback from attendees has been overwhelmingly positive, with many praising the high calibre of speakers and the in-depth discussions that sparked valuable insights.

This year’s Security Middle East Conference successfully cemented its position as a premier event for security professionals in the Middle East. By fostering collaboration and knowledge sharing, it serves as a crucial catalyst for driving innovation and shaping the future of security in the region. We’re already looking forward to the 2025 event.

Elevating the experience

Building on the success of Security Middle East 2024, the 2025 edition promises an even more enriching and targeted experience for delegates and vendors alike. Here’s a glimpse into the exciting improvements we’re making:

■ Exclusive access for invited members: We understand that C-suite executives have unique needs and time constraints. We plan to create an exclusive space for them, affording them a dedicated area for networking with industry leaders, facilitated deal-making opportunities and private access to pre-arranged meetings.

■ Content tailored for decision-makers: Gone are the days of one-size-fits-all content. Security Middle East 2025 will recognise the diverse needs of attendees at different levels. We’re curating dedicated sessions targeted at key audiences, addressing strategic security challenges and industry trends. These sessions will foster focused discussions and support connections with peers.

SENIOR PERSONNEL IN ATTENDANCE FROM:

WHAT DID THE 2024 DELEGATES HAVE TO SAY?

97% of delegates rated their experience of the conference as good or very good 80% of delegates met with five or more sponsors during the event

Congratulations on an excellent conference with an amazing programme and great speakers. Thank you very much for organising this interesting and beneficial conference.

Meshal Aljohani ASIS Connects Ambassador

It was not just a conference, a combination of professional relationships, increased knowledge and knowledge of security developments, worth every minute.

Abdullah Alzaid NEOM Security Trainer, SAFE

Thank you to the organisers, speakers, panellists, and attendees of the Middle East Security Conference for making it an inspiring event. Your dedication and knowledge have made a difference. Looking forward to continuing this journey together!

Nasser Aldawsari Safety and Security Project Manager

92% of delegates said the conference was relevant and informative

An impressive line-up of speakers, including Fahad Alghamdi, Nadeem Iqbal, Bader Alsubaey, Ian Keller, Craig Ross and others, to analyse the fast-changing landscape of security in the region, share thoughts, and propose innovative ideas and solutions.

Massimo Cugusi CEO, Touche Consulting

82% of delegates confirmed they plan to work with the sponsors they met at the conference

I had the privilege of attending the Security Middle East Conference last week, and it was an exceptional experience. Being surrounded by industry experts and engaging in enlightening discussions was truly inspiring.

Khalid Aldossary

Security Operations Analyst at KAFD

We value your efforts in organising this engaging and insightful conference. It’s truly fantastic to see such a remarkable lineup of speakers.

Faisal Algashaam

Leading Smart City & Innovation Projects at TAHAKOM

This gathering transcended the typical conference format, bringing together a diverse array of experienced professionals from across the region. Interacting with esteemed senior security leaders was a privilege, affording me valuable insights and knowledge. Our discussion centred on the evolving challenges within the security sector and effective mitigation strategies. Participating in such a distinguished and enlightening conference was truly an honour.

Nikhil Sharma Security Supervisor Airport Operations, Emirates

The Security Middle East Conference was a complete success.

Hashim Salah

Physical Security Specialist, Central Bank of Sudan

I thoroughly enjoyed attending the Security Middle East Conference. The discussion sessions provided valuable insights into enhancing security services in the Kingdom of Saudi Arabia by sharing diverse experiences within the sector.

Abdullah Alghamdi

Security operations supervisor, Securitas Group

■ A one-stop shop for security solutions: Our commitment to be a comprehensive resource remains paramount. The expo area will showcase the latest advancements from leading security vendors.

Complimenting this, we’re expanding our workshop offerings, providing practical insights and best practices tailored for installers, integrators and mid-tier buyers.

■ Solving your security pain points: We understand that security professionals face diverse challenges. Extensive pre-event research is underway to identify the pain points keeping C-suite executives, installers and mid-tier buyers up at night. By understanding these specific challenges, we’ll curate content and opportunities that address them directly, ensuring you leave the conference with actionable solutions.

In short, Security Middle East 2025 will be a one-stop shop for all your security needs. From high-level strategic discussions for C-suite leaders to practical, hands-on workshops for installers, the conference offers something valuable for everyone in the security ecosystem. Join us and discover a world of opportunities for learning, networking and securing your future securitymiddleeastconference.com

Above top, Bader Alsubaey, Director of Northern Area Industrial Security Operations, Aramco addresses the audience. Above bottom, Betania Allo, Cyber Law and Policy Consultant, leads the panel discussion on diversity

HOSPITALITY AND SECURITY IN THE NEW ERA OF TOURISM

Group Head of Security at Red Sea Global, Tawfeeq Alsadoon, explains more about how the company is pioneering a new approach to hospitality and tourism security

The Middle East tourism industry is undergoing an unprecedented metamorphosis. Travellers around the world are no longer content with just opulent experiences; they increasingly seek destinations that prioritise responsible development and environmental sustainability.

Hospitality

and security: a symphony of success

Hospitality and security share a common goal: The guest’s emotional wellbeing, the deeper feeling of safety and being free from worry, which allows for genuine relaxation and a truly memorable experience.

Traditional security approaches historically rely on draconian measures and processes, creating a sense of unease and contradicting the desired atmosphere of relaxation and immersion. This is in direct contrast to the achievement of the common goal and requires a change from the existing planning and design methodologies to a new paradigm of innovative solutions that balance optimal guest experience with the security operational need.

A holistic approach: security beyond visibility

Red Sea Global (RSG) is at the forefront of this transformation, crafting a collection of world-class destinations that seamlessly integrate exceptional guest experiences with unwavering security. This is achieved through a holistic security strategy built on five core pillars:

■ Collaboration: Strong partnerships with local law enforcement, communities and leading international security experts to share best practices and stay ahead of emerging threats.

■ Cultural awareness: Working diligently towards ensuring an optimal experience through understanding and respecting the cultural traditions of our guests, visitors and staff.

■ Invest in guest experience: Security can and should enhance, not detract from the guest experience. Security solutions designed to be invisible yet effective, ensure an optimal and relaxing guest experience.

■ Sustainable security: Environmentallyfriendly security solutions that minimise our environmental footprint and align with the goals of Vision 2030. This includes utilising energy-efficient technology, exploring renewable energy sources for powering security systems and minimising waste generation during security operations.

■ Empower your staff: Train all staff members in security awareness to create a collaborative security environment. Empower them to identify and communicate potential security issues while maintaining a focus on exceptional guest service.

Innovative solutions for a secure and sustainable future

Recognising that ensuring the optimal guest experience starts at the strategic and planning level, RSG adopts a holistic approach to security planning and design, tailoring security solutions to the bespoke needs of each location, meticulously integrating security measures into the environment and user group journeys, ensuring optimal protection without unnecessary intrusion.

■ Risk-based, asset-specific security solutions: There is no ‘one-size-fits-all’ approach to security. Instead, the way forward is through conducting thorough risk assessments and tailoring security solutions bespoke to the specific needs of each location. This ensures a high level of protection without unnecessary intrusion. High-risk areas will receive more robust security measures, while low-risk areas will utilise more subtle approaches.

■ Security-infused design: Each destination or resort incorporates security considerations throughout the full life cycle of the project. Utilising innovative design techniques such as master planning, architecture, landscaping and lighting. Creating a layered security

approach where the bespoke environments invisibly influence behaviour and are inherently secure without the need for imposing structures.

■ Integrated security systems: Security systems are seamlessly integrated into the architecture and landscaping, minimising the visual impact while maintaining optimal functionality. Electronic access control systems ensure secure access to buildings and facilities, while advanced surveillance solutions discretely provide real-time situational awareness without disrupting the aesthetics of the surrounding environment.

Leading the operational charge

To achieve the all-encompassing, ambitious security vision, RSG has established a dedicated, operational subsidiary. This subsidiary operates as the leading tourism security company within the region, setting a new standard for excellence in this critical domain, by leveraging cuttingedge security solutions and a team of highly trained professionals to ensure the safety and well-being of our guests, visitors, staff and assets.

■ Tourism security personnel: Security personnel, meticulously selected and trained, diligently ensure the well-being of guests, visitors and staff through a security-aware, tourism-orientated methodology. Possessing strong emotional intelligence, advanced body language and communication skills, de-escalation techniques and conflict resolution, their ability to subtly address security concerns discreetly and professionally while ensuring a warm and welcoming demeanour strengthens the overall guest experience.

■ Security-aware guest service staff: All staff, whether security orientated or not, undergo security awareness training, empowering them to identify potential security issues during their daily duties. Staff, who are more familiar with their specific operating environment are trained to be more observant of unusual behaviour or potential threats in those areas while remaining discreet and ensuring a seamless guest experience. This collaborative approach to the wider familiarisation with security needs truly integrates security at an operational level and allows us to maintain an enhanced security awareness across the resorts and destinations without requiring a large, visible, security-specific presence.

Left image, St Regis Red Sea Resort

Investing in the future: the hospitality security programme

Recognising the importance of human capital development, RSG has additionally established, in partnership with King Abdulaziz University, the Hospitality Security Programme. This initiative empowers Saudi youth by equipping them with the necessary skills to excel in the security field. Programme graduates contribute to the Kingdom’s human capital development goals outlined in Vision 2030, while simultaneously strengthening organisational security expertise with a local perspective. The programme equips participants with knowledge in security management, risk assessment, emergency response procedures, and cultural sensitivity to name just a few. Fostering a new generation of security professionals who understand the needs of the tourism industry.

‘Prioritising sustainability, collaboration, cultural sensitivity, and guest experience, crafting seamless and invisible, secure environments and experiences’

Collaboration for a secure tourism landscape

Tourism is a national aspiration, the successes and negative impacts on one have a residual effect on all, so security within the tourism sector must be approached collaboratively on the wider spectrum. Actively engaging with leading security experts, international partners, relevant government agencies, industry forums, sharing best practices with other tourism destinations, and collaborating on regional security initiatives all support the exchange of knowledge. Best practices allow RSG to stay ahead of emerging threats and contribute to a more secure tourism landscape for the entire region. This collective effort strengthens the overall security posture of the Middle East

and positions it as a more attractive destination for international travellers.

A new chapter in tourism security

Led by internal expertise and embracing a holistic approach to security, RSG is pioneering a new chapter in tourism security. Prioritising sustainability, collaboration, cultural sensitivity and guest experience, crafting seamless and invisible, secure environments and experiences where one can truly immerse themselves in the wonders of the region with peace of mind. This innovative approach aligns perfectly with the ambitious goals of Vision 2030, paving the way for a thriving and sustainable tourism sector in the Middle East.

redseaglobal.com

Below image, Nujuma, a Ritz Carlton Reserve

Manufactured, Tested, Specified, Certified

Sunray is the specifiers choice for Steel Security, Fire and Blast Doors, Louvre Panels/Facades and Steel/GRP Platforms and Walkways. Our comprehensive Steel Door Range and associated products provides Fire Ratings for up to 4 Hours plus overrun and Security Ratings from SR1-SR6.

We lead the industry with our Door Size Ratios, which enables the Architect, Designer or Specifier to maximise infill without overpanel and creating clean sight lines, as well as practical ease of access for plant, machinery, and general use. With an extensive list of hardware and locking options, electro-mechanical access, vision panels, finishes etc. we tailor your criteria to deliver the required performance and practical solution.

● UTILITY

● TRANSPORT

● POLICE

● EMBASSY & CONSULATE

● PETROCHEM

● RETAIL

- sub-stations, transformer chambers, plant & pump rooms.

- rail, including underground, airport & ferry terminals.

- government & military, armouries, ranges, sensitive & secure buildings.

- UK & abroad.

- UK & abroad.

- staff / safe & stock rooms & financial institutions.

ELEVATING MIDDLE EAST SECURITY

Daniel Fernàndez, VP Sales & Marketing
META, Bosch Video Systems and Solutions, explains how the company is expanding in the Middle East with a new office in Saudi Arabia, focusing on tailored security solutions, AI-driven analytics and a customer-first approach in critical industries

The Middle East presents unique challenges and opportunities in the constantly changing global security landscape. Bosch Video Systems & Solutions recognises this and is making strategic investments to expand within this dynamic region, making an impact through innovation, expertise and a solid commitment to its customers and their future.

Local support and expertise

Bosch will unveil a new office in Saudi Arabia later this year, solidifying its ability to offer local support and expertise. Establishing this presence is central to tackling the challenges unique to the Middle East, including diverse climates, architectural styles, and cultural intricacies that impact security requirements. Customers can expect video security

solutions that can help them to anticipate potential incidents, enabling a quick and appropriate response or leveraging business intelligence beyond security.

AI-driven video analytics solutions

Artificial intelligence (AI) is reshaping the role of video surveillance by creating what is now known as ‘visual intelligence’. Bosch has been investing in AI-driven solutions since 2016 and taking customers on a journey from reactive to predictive environments ever since.

Cameras have advanced into highly adaptable tools within the industry, surpassing their original purpose as mere recording devices. Bosch’s entire camera portfolio is equipped with edge-based AI. They offer advanced capabilities for detecting threats, improving operational efficiency, and deriving insights from

data, meeting the increasing demand in a region rapidly modernising and embracing cutting-edge technology.

The hot, arid climate in the Middle East and other extreme conditions pose various challenges for video security systems to perform, let alone integrate video analytics for highly accurate detection. The MIC camera family, for example, is designed to perform in any environment, withstanding high winds, 100% humidity,

Above image, Daniel Fernandez and his dedicated team of local experts at the Bosch Power to Predict event in Riyadh, June 2024

and temperatures from 40 to 65 degrees celsius. Despite the most extreme conditions, video data can be interpreted directly at the source to improve the security level further and enable video data to do more than security alone.

We believe it is essential to prioritise helping its customers transition from simply reacting to security incidents to being able to predict and prevent them ensuring their world remains uninterrupted by safety and security concerns.

Focus on key industries

The company’s strategic focus is on delivering value to specific customer groups within various industries.

It is committed to investing in AI at the edge and in the cloud, as well as cyber security to enhance video system resilience. It also prioritises product build quality, ensuring high performance and ease of use. These capabilities are crucial for securing long-term projects in cities, government facilities, energy and utilities, transportation, and buildings and contributing to the overall safety and development of the region.

Set for success

Bosch is committed to a people-first business culture, as emphasised by motivational speaker Simon Sinek’s quote, “Our customers will never love

our company until our employees love it first.” I have always been a firm believer that our people are the real differentiator in our business. Our teams’ passion and commitment are stronger than ever, as we continue to make significant investments in the Middle East and build robust partnerships. Together with our business partners and customers, we’re shaping the change and creating a smarter, safer future. Scan the QR code to learn more about the power of

The Role of Intelligent Traffic Systems in Modernizing Urban Infrastructure

How modern cities can overcome security, safety, and traffic challenges with Automatic Number Plate Recognition (ANPR) and advanced surveillance systems.

Fact: the world of today is a lot more urbanised than it was just a few decades ago. The United Nations Human Settlements Programme predicts that the number of urban residents will increase globally from 56% in 2021 to 68% in 2050.

Unfortunately, such increasing urbanisation creates numerous traffic and security challenges that affect citizens’ quality of (urban) life. And the complexities of these unprecedented challenges will only grow in the coming years.

Fortunately, city planners, municipal authorities, law enforcement agencies, and other decision-makers can overcome - or at least mitigate these challenges. The key is to leverage cutting-edge technologies like Automated Number Plate Recognition (ANPR) and Artificial Intelligence - powered surveillance. This brief article explores how cities can leverage these technologies to elevate urban infrastructure. It also highlights the benefits of partnering with expert technology providers and systems integrators like MVP Tech - Convergint.

What Makes ANPR a Game Changer in Intelligent Traffic Solutions?

Many modern cities are characterised by large human populations and heavy vehicular traffic. It’s not easy to manage the latter or ensure the safety of the former using traditional, human-dependent measures. Similarly, challenges related to level crossing monitoring, toll collection, vehicle fingerprinting, bus lane enforcement, speed limit enforcement, and parking management also require modern, intelligent technologies and solutions.

Intelligent, automated, data-powered ANPR systems help to mitigate these challenges. They automatically detect, read, process, and return various vehicle attributes, including number plates, models, year of make, dimensions, colours, and even speeds and journey times. More importantly, they intelligently and accurately translate this wealth of information into usable, actionable data that can be used by urban security teams, law enforcement agencies, transportation and infrastructure managers, and other stakeholders to enhance the efficiency and safety of their roads and cities.

The foundation of an effective, city-wide ANPR system is a network of high-res ANPR cameras placed in strategic locations throughout the city. These cameras swiftly and continuously capture images of vehicles and their number plates. Every camera includes a robust and powerful processor that processes the incoming input - often at the “edge” to reduce processing latency and quickly return accurate, comprehensive, human-readable insights to a centralised location, such as a command-and-control (C&C) centre or data server. These insights are displayed on a user-friendly dashboard, where they support decision-making for a wide range of applications for modern-day cities.

Engineering-driven technology providers like MVP Tech - Convergint design intelligent, non-intrusive ANPR solutions with on-board video analytics that help build a smart, data-driven system for cities. Moreover, they ensure that each component can be easily integrated into a city’s existing IT environment to create a cohesive, high-performance, and costeffective system. These multi-faceted installations and integrations ensure cost-effective installations and deployments, simplify operations, data management, maintenance, and upgrades, and effortlessly support a smart city’s evolving needs.

Applications of ANPR and Intelligent Surveillance Systems

Different authorities across the Middle East and Africa (MEA) adopted the smart city solutions designed and deployed by MVP Tech - Convergint for traffic management. These integrated, secure, and agile systems combine ANPR and AI-powered surveillance to enable city traffic teams to monitor and manage traffic flows. Every deployment incorporates data analytics and AI capabilities to provide real-time and actionable insights that help them to identify traffic bottlenecks, reduce congestion, and enforce speed control measures to reduce the probability of accidents. Furthermore, our custom software integrations and centralised dashboards improve the efficiency of traffic management while simplifying its operations.

Parking is another useful application of ANPR. A modern smart traffic solution that combines ANPR with intelligent surveillance strengthens access control in cark park spaces. By automatically reading and processing number plates, it ensures that only approved vehicles can move in and out of an area. It can also identify and flag unauthorized or potentially suspicious vehicles for further investigation or action.

Advanced vehicle detection systems go beyond recognising number plates. They can also identify vehicle types and colours, monitor driver behaviours, and flag inappropriate or risky behaviours. All of this information helps to further optimise parking and security in urban areas.

ANPR and intelligent surveillance solutions are also a powerful tool in the arsenal of enforcement teams and public safety officials. By combining smart cameras, AI, and advanced hardware and software, a smart traffic solution can automate traffic control and law enforcement.

Further, real-time information and alerts empower security personnel to identify stolen vehicles or vehicles involved in criminal activities, monitor public spaces, and quickly detect and respond to incidents. They can also view events on a graphical display and easily coordinate response activities. Such proactive, often predictive, and always data-driven surveillance improves response speeds and effectiveness. The intelligent systems also seamlessly integrate with emergency response systems to facilitate easy collaboration between various city departments, allowing for rapid response to and recovery from emergencies and disasters.

MVP Tech: Building Smarter, Safer Cities with Integrated Surveillance Solutions and ANPR

MVP Tech - Convergint specialises in designing hightech, customised solutions that help build smarter, safer cities throughout MEA. Each deployment is carefully engineered and tailored to meet the specific needs and challenges of a city.

Ready to transform your city with Advanced traffic solutions? Contact the experts @ MVP TechConvergint to get started!

Ready to transform your city with ANPR and intelligent surveillance? Contact the experts @ MVP Tech - Convergint to get started!

SECURE AND SUSTAINABLE

Farah Ghanem, Head of Climate Change and Policies at Alpin Limited, explores the role that security professionals in the built environment sector have in addressing sustainability at urban and project level

“Net Zero and sustainability is everyone’s business” is a phrase I like to use often. Climate action, especially in the built-environment sector, demands the participation of all industries to achieve the desired sustainability targets –and this includes the security sector.

Starting with sustainability in the general understanding of the term, the security industry occupies a considerable space in addressing sustainable development criteria such as integrated development, health and safety, and even energy and environmental performance measures. Furthermore, as a necessary piece within the overall supply chain, the industry can participate in the reduction of Greenhouse Gas (GHG) emissions, otherwise known as carbon emissions within the supply chain.

The implementation of sustainable best practices whether at a masterplan or project level requires an integrated approach in which all stakeholders participate in the adoption of the defined sustainability strategies. When teams on a project work in silos, it is inevitable that time and resources will be wasted to address incompatibilities, and mismatches in design or activities. The security industry can play an integral role in the collaborative approach towards sustainable development, by collaborating with the overall project team to align designs, requirements and targets. The primary contribution of the industry is providing safety and security.

Understanding security’s role

When it comes to health and safety, I doubt that there is much need to emphasise the role the security industry plays in this cornerstone criteria of sustainable development. Applying the different technologies for monitoring,

surveillance, alerts and access controls offered by the security industry bolsters the safety of the development and provides its occupants with a strong sense of security. These systems also play an indirect role by securing the development’s assets from vandalism, theft and damage which could otherwise lead to waste, need for replacements and additional costs, and potentially jeopardise the wellbeing of the occupants. In addition, the security systems deployed at masterplan or even city-wide level reduces the need for security patrols and vehicles which contribute to reducing transportation emissions. Furthermore innovative applications of systems aimed at security can contribute to enhanced energy and environmental performance.

The security industry can integrate well with overall management systems and provide dual benefits of applied IoTs and sensors to both address safety and security as well as provide control signals for different applications within the development. Several Building Automation Systems (BAS) and Interactive Security Systems rely on occupancy and motion sensors, which integrate well with other systems such as lighting control systems and HVAC systems to optimise their operations. By using security technology to also provide energy management controls a development can significantly reduce duplicity in control systems, IoTs and sensors.

Many home security systems used in either single homes or multi-residential complexes include by extension a home automation system which utilises smart home features and technology to automate energy conservation measures such as increasing set points, switching lights off and killing phantom power (power consumed by appliances and plug loads

even when they’re switched off) when residents are away. In addition to providing remote control features for the homeowner to control systems remotely.

“The industry can positively contribute to global sustainability ambitions and climate action initiatives.”

Evolution of sustainable design

As a component within any development that must be operated around the clock, most security systems have now evolved to be energy efficient utilising LED lighting and trending towards less energy use as technology progresses. Latest advances in security systems, particularly those located outdoors such as cameras, and sensors work on the integration of renewable energy and operate based on solar power with an energy storage mechanism that supports night-time operations. This mitigates a significant portion of the overall energy consumption of these systems.

Zooming out and looking at the built-environment supply chain, security systems are an indispensable component of a development’s life cycle. Granted that other areas such as construction materials and activities, overall operational emissions and end of life emissions constitute most of the carbon footprint, speciality industries like the security industry can and should participate in the decarbonisation of the supply chain. There are different roles the industry can undertake. For example, by providing security systems during the construction process that can also be utilised to optimise construction activities, monitor and quantify waste generation, and enhance worker safety and well-being the industry positively contributes to the management of construction emissions and site health and safety. Also, and from a wider perspective, the industry’s own products and services can be decarbonised. Use of recycled materials as components within the manufacturing process of the hardware technology deployed by security specialists would contribute to reducing the associated emissions of the devices used. This could be in the form of using recycled plastics

and metal which typically have a carbon intensive manufacturing process. In addition, selection of materials that have lower environmental impact, such as biodegradable plastics can further reduce the carbon emissions at the end of life.

Decarbonisation discussions

Going a few steps higher, decarbonising the manufacturing facilities themselves would contribute to reducing carbon emissions globally. By integrating green energy to power manufacturing facilities, introducing energy conservation measures and utilising efficient machinery the industry’s energy emissions would be effectively addressed.

Within the supply chain of the industry are many intersections with other industries and sectors such as transportation and logistics. By optimising the sourcing of materials, distribution networks and consolidating shipping routes and frequencies, the industry can tackle their transportation emissions.

The discussion on decarbonising the supply chain could go on, but in short, the industry can positively contribute to global sustainability ambitions and climate action initiatives.

It’s worth noting that I’ve only touched on one type of security, physical security, but there is also the cybersecurity arm of the industry that is an entirely different dimension to consider. To give a brief glimpse on that, consider the pros and cons of virtualisation and cloud computing when it comes to reducing emissions due to replacing paper, physical storage, waste and so on while on the flip side also increasing emissions due to the need to power the databases. Cybersecurity sits at the heart of cloud computing and is a key element that is also accountable for both the emission reductions and the emittances.

To conclude, the security industry is an integral part of the built-environment and our digital world. And while the industry’s contribution to the carbon emissions of a development may not be as significant as other participants, by decarbonising their own supply chain, the security industry can play an active role in the necessary climate action to safeguard the environment. In effect, participating in the dynamo effect of each segment doing their part for the collective to achieve a Net Zero future. alpinme.com

FACE OFF : SECURITY VERSUS PRIVACY

Talal Shaikh,

and Computer

University Dubai, looks at striking a balance between security and privacy in public spaces with the use of facial recognition technology

Facial recognition technology (FRT) has emerged as a powerful tool, promising enhanced security and streamlined identification processes. From unlocking smartphones to expediting airport security checks, FRT is rapidly transforming various aspects of our lives. Nevertheless, its increased usage in public places poses significant concerns for privacy and potential abuse. Talal Shaikh explores the intricacies surrounding facial recognition technology, highlighting its advantages and

risks. He also suggests how security can be enhanced without infringing on an individual’s right to privacy, especially in the Middle East, where there are unique challenges and opportunities for implementing FRT.

The emergence of facial recognition technology

FRT uses algorithms that analyse and match images or video footage against a database of known faces. It can recognise individuals

in real-time, thereby making it an efficient tool for enhancing security. A study by Juniper Research states that by 2025, more than 1.4 billion users will utilise software-based facial recognition technology to secure payments globally, compared to just 671 million users in 2020.

FRT adoption is becoming widespread within various sectors across the Middle East. For example, FRT has been used at airports in the UAE to expedite passenger processing. At the same time, Saudi Arabia relies on it for public space surveillance to enhance safety and security within the country. Recent data shows that this market will grow significantly due to rising government expenditure on security and surveillance activities in the Arab world. The market size is expected to increase with a compound annual growth rate (CAGR) of 9.35% between 2024-2030, leading to a market volume of US$97.94m

by 2030, according to Statista. This expansion underscores the region’s commitment to leveraging modern technologies as solutions for their security challenges, thereby enhancing safety and security for all.

Benefits of FRT

■ Security Enhancement and Crime Prevention: FRT’s primary advantage is its capability to enhance security within public spaces. By quickly identifying individuals, law enforcement agencies can prevent crimes before they happen or apprehend suspects more efficiently. For instance, during the Hajj pilgrimage in Mecca, Saudi Arabia uses facial recognition to monitor and manage millions of pilgrims, ensuring their safety.

■ Simplified Processes and Convenience: FRT also offers convenience in various applications besides security. Facial

recognition is already being used in Dubai International Airport, among other airports in the United Arab Emirates, which has helped to reduce queues and make travelling less stressful for passengers. Similarly, banks and financial institutions now use FRT for safe and frictionless customer onboarding, enhancing user experience and curbing fraud.

■ Public Safety and Health Monitoring: During the covid-19 pandemic, FRT played an integral part in monitoring public health. Middle Eastern governments employed this technology to enforce quarantine rules and track those who had contracted the virus. For instance, thermal cameras with facial recognition were installed at public places in Abu Dhabi to identify people with high body temperatures, thus aiding in detecting potential covid-19 cases.

Privacy issues and risks

Despite its many advantages, the extensive use of FRT raises substantial privacy concerns. The major problem is the possibility of mass surveillance and the erosion of individual rights. In some cases, this may lead to a society where people are under 24-hour watch, infringing on their freedom and independence.

Deployment of FRT in public places results in a situation where all individual actions and movements are under constant supervision. This raises the alarm on the possible misuse of this technology by authorities or law enforcement agencies to quell opposition or target particular communities. Governments have been accused of using FRT to track and monitor activists and political opponents, leading to apprehensions about authoritarianism.

Another critical issue is the security concerns around data stored by FRT

systems and the potential for data security breaches. If breached, subjects’ biometric information contained in facial recognition databases can lead to identity thefts, including other cybercrimes. Protecting this data is pivotal for preventing misuse and upholding the general public’s trust in technology.

The issue of bias and discrimination is also key. For instance, some studies have shown that there are biases within FRT systems against minority groups. Wrongful arrests and discriminatory practices are usually outcomes of inaccurate identification or misidentification.

The National Institute of Standards and Technology (NIST) found out during one such study that some facial recognition algorithms had higher error rates for those of African descent compared to those whose origin was European. At the same time, Eastern Asians were put somewhere between these races, complicating matters further. Therefore, these biases will need to be addressed to ensure fair play.

Balancing security and privacy

Achieving this balance between increasing security and preserving privacy requires a multi-faceted approach, such as regulatory frameworks, improvement in technological approach and engagement with wider society.

■ Regulatory Frameworks And Policies:

The government needs clear regulations and policies governing FRT usage within public spaces. These legislations should describe what the technology is capable of and how it should be used properly. For example, the European Union’s General Data Protection Regulation (GDPR) has provisions that protect individuals’ biometric data, which can offer a guideline for other regions to follow.

■ Technological Innovations: Some technological advancements may alleviate some privacy concerns linked to FRT. Techniques such as differential privacy and federated learning help secure information by minimising the access or storage of personal details. At the same time, the accuracy and fairness of face recognition algorithms need to be improved to eliminate biases and ensure the ethical use of this technology.

■ Public Engagement And Awareness: It is crucial to involve the public in discussions concerning the use of FRT so that trust can be built when using it responsibly. Governments and organisations must make clear how they use this technology and provide channels where people can give their opinions on matters related to it. Letting citizens know their rights and putting safeguards

in place could help mitigate these fears, leading to informed support.

Towards equilibrium

Facial recognition technology is a valuable tool for enhancing security and convenience within public spaces, especially in regions like the Middle East, where it is a primary concern. However, this does not rule out its potential threats to privacy and civil liberties. Striking an equilibrium between safety and confidentiality necessitates inclusive regulations and technological advancements coupled with active community engagement. We can safeguard our fundamental human rights by addressing these challenges while harnessing the power of facial recognition technology. hw.ac.uk/dubai

CURRENT INNOVATION AND TECHNIQUES

DECENTRALISATION OF SENSITIVE DATA: Currently if the data is compromised, the whole system is affected. By using decentralised machine learning techniques we can improve FRT models without centralising sensitive data.

REVOCABLE BIOMETRICS: Developing FRT that uses transformable templates. Under these circumstances, biometric data would be able to be ‘revoked’ if they were compromised.

PRIVACY-PRESERVING PROTOCOLS:

Creating special cryptographic protocols that enable face matching or identification without revealing the underlying biometric data. ON EDGE PROCESSING: Processing the data on the device itself, without sending the sensitive biometric data over to the cloud for processing.

Beyond the buzzer

Today’s video intercoms door entry technology is more flexible, powerful and useful, writes Denis Choi, General Manager IDIS

In the past it was easy to overlook the value of video intercom door-entry systems, but in many settings now they are playing a crucial role in the day-to-day protection and smooth running of facilities.

Yes, they are a mature technology –or at least they are often seen as such –but a new generation of devices has been developed which means that users can expect significantly more benefits and better performance.

We are seeing improvements as a result of more robust design and construction of the devices themselves, and in superior image and audio capture

performance. As a result of integration with video surveillance and wider security solutions, users are also benefiting from enhancements with AI analytics, more secure storage and improved usability.

Changing attitudes

Attitudes towards traditional door entry systems changed noticeably during the pandemic. It suddenly became a priority to ensure easier – that is, frictionless and touchless – entry to premises. For larger organisations, 2020-21 saw new thinking about the way staff and visitors accessed buildings, with keys

and ID cards being replaced by biometric and smartphone credentials.

Due to the cost and complexity involved in upgrading access control software, these solutions were mainly restricted to large enterprise users. But now new video intercoms solutions are proving attractive for smaller commercial, residential and mixed-use applications as well.

Fresh thinking

In many ways, we were overdue fresh thinking around door entry, because there is a clear need for solutions that are more flexible and affordable, with appeal to the wider market. It’s not just smaller and mid-size applications that stand to benefit – there is a need for both new-fit and upgrade solutions in larger premises such as healthcare settings, campuses and offices, where secure door entry is important for priority areas within buildings as well as at main entrances.

The new generation of video intercoms offer compelling benefits in comparison to enterprise solutions, making them an increasingly popular choice not just

Image right: The new 2MP video intercom from IDIS. DC-I6212WRX and Flush Mount. Featuring; SIP (VoIP) Supports, clear voice communication with echo cancellation, IR LED, IK10 / IP66 / NEMA4X support

for small applications but for these larger sites too; and that also makes them an attractive proposition for systems integrators, who can offer them for both new projects and upgrades. For what are sometimes seen as small system add ons, they offer surprisingly big benefits.

Enhanced security

Top among these is enhanced security. By allowing reception staff to visually identify visitors before granting access, they provide a way of screening potential threats and preventing intrusion.

There’s nothing new in this, but today the need is greater than ever. With the rise of e-commerce, takeout apps and more frequent deliveries, it’s important to strengthen security around entrances, most obviously in settings such as apartment complexes, gated communities and multi-tenant business premises. In these locations, the new video intercoms provide an important extra layer of protection.

The visible presence of robust video intercoms is also a deterrent to potential intrusion, criminal activity, or anti-social behaviour. The latest intercoms come with high definition and wide lens cameras designed to capture both the foreground and background scene more clearly, and to simultaneously record video along with noise-cancelled audio. This means users have a full audit trail of events at the door, which can be easily reviewed and exported as evidence in the event of an incident or dispute.

New levels of convenience

Benefits also include new levels of convenience and operational efficiency, with new solutions now making it easy to grant or deny access to visitors from any location. This reflects the reality of many corporate premises, where staff and managers aren’t always available at reception desks or entrances. In domestic settings, individuals may not be able to open doors quickly, especially if they have mobility challenges. Now, video intercoms with mobile apps solve these challenges, allowing users to check and communicate with visitors, delivery drivers and other callers, making it easy to direct them accordingly.

Anyone who has experienced the frustration of pushing a buzzer, waiting for

a response, and eventually being allowed access to a building – doubly annoying if you are trying to get to a pre-scheduled meeting or are in a hurry – knows that first impressions count.

The latest video intercoms provide clear two-way noise cancellation audio and video communication via client software or via mobile apps, enabling users to have eye-level and face-to-face conversations with visitors. For businesses, this ensures stress-free communication with customers and vendors. It allows visitors to be invited into reception areas remotely, perhaps to take a seat. The result is that interactions are more professional and seamless, and that’s particularly important for creating good first impressions with clients.

Simple integration

The latest generation video intercoms can also be easily integrated into wider video surveillance solutions, access control systems and electronic magnetic door locks, allowing for remote management of entry points along with monitoring and recording of both video and audio simultaneously.

These features are particularly valuable for businesses, schools and larger campuses such as universities and hospitals which have a duty of care for everyone on their estates. Video intercoms provide an added layer of security and control over who enters the premises, particularly useful where there are multiple entry points.

Rather than relying on a single layer of security at the perimeter, a strategy which is impractical at locations with open public access – healthcare settings and campuses for example – they enable multi-layered and distributed protection throughout the site, helping to keep premises secure and people safe.

Easy installation and scalability

The best of today’s video intercom systems are designed for easy installation and can be quickly surface-mounted without the need for complicated configuration. They are a flexible alternative to relying on traditional front desk receptions and can help to keep entrances clutter-free.

The latest models come with pollution and weatherproof ratings making them ideal for a wide range of settings, with resilience against increasingly common severe weather events, extreme high and low temperatures, dust, and the kinds of hazardous liquids found in industrial and manufacturing applications.

One final point: video intercoms are of course scalable, making it easy to add more devices as needed. And take note – with the right VMS that doesn’t mean additional license fees or device connection costs.

This makes them an affordable and flexible solution for growing businesses, hospitals with multiple wards, university campuses with dispersed buildings or expanding residential communities.

More relevant than ever

There are many other, site-specific benefits and applications of course. Video intercoms may be well-established mature technology, but today they are more relevant than ever. New features and benefits are making them both a useful upgrade option and a key element of new systems, giving users improved security, convenience and accessibility.

The fact that today’s enhanced products are a more compelling option for residential and commercial applications makes them a useful new offering for systems integrators too.

idisglobal.com

SECURING THE TOURISM INDUSTRY IN SAUDI ARABIA

Daniel Norman

, Regional Director, EMEA,

of the ISF puts Saudi Arabia’s tourism sector and the challenges it faces under the spotlight

Tourism in Saudi Arabia is set to increase significantly as the nation edges closer to completing its Vision 2030. One of the core pillars of the Kingdom’s growth strategy is to pivot away from its dependence on oil and gas towards the entertainment, hospitality and tourism industries, with the government building a variety of ambitious projects, including NEOM, The Red Sea Project, Amaala, Diriyah and expanding major cities such as Jeddah and Riyadh. The overarching strategy is to establish a variety of futuristic cities, hotels, urban areas, airports, marinas and experiences that rival the leading tourism destinations. With the UAE being a close regional rival for Saudi Arabia, Dubai has set an incredibly high standard the nation wants to meet and even beat long-term… however, there will be a variety of challenges that need to be managed and overcome to get there.

To accelerate growth in the tourism sector, the Saudi government has six core business units working together to increase the number of tourists visiting the Kingdom and making their visits a world-class experience. The entire development ecosystem is a complex blend of government departments, public and private partnerships, councils, authorities and funds, with an ever-growing domestic and international supply chain – international best practice must be at the heart of the continued development. Industry leaders are recognising that as each project progresses, no stone can be left unturned – many of these projects are critically dependent on technology and subsequently cyber risks can manifest

across all parts of the ecosystem. Protecting the Saudi Arabian tourism brand, as well as existing and future physical and digital assets, data and suppliers effectively are fundamentally important to the implementation of each project. Providing security and assurance is, and will continue to be, a mission-critical factor in the success of the entire tourism industry in the Kingdom of Saudi Arabia.

Brand recognition and reputation

If there is one thing that successful tourism destinations do well, it is managing their brand. However, the elusive and fragile feature of brand reputation is that it can be taken away in an instant. Natural disasters, terrorist attacks and wider social or geopolitical instability can all push tourists away from a destination to elsewhere – and in the age of social media, the incident does not even have to be real… misinformation and disinformation can cause the same level of impact to a brand reputation as the real thing. Additionally, most consumers cement their opinions of a destination before travelling on social media, e.g. Tik Tok, Instagram and X. Nation state actors and criminal gangs will aim to warp public opinion, not only to destabilise regions for political reasons, but to economically impact share prices for financial gain. As AI-generated content, such as deepfakes, make it incredibly difficult to tell real content from fake, it will present a very problematic risk for the hospitality sector. The cybersecurity team must take a proactive approach alongside marketing and communications to raise awareness and put strategies

in place to mitigate the risk to brand reputation, on social media and beyond.

Physical and digital asset protection

In 2023 17 million tourists visited the Kingdom. According to The Ministry of Tourism, the reasons for visiting vary, with seven million tourists attending due to religious tourism, six million due to visiting friends and family, leisure travel for three million and 1.7 million visiting for business reasons. The traditional physical security disciplines such as crowd management, access management, CCTV and monitoring, will continue to play an important role. However, assets in scope for security will certainly change: Saudi Arabia has invested significantly in immersive and futuristic tourist environments in all areas of the country – from high-end yacht clubs near the Red Sea, to concert halls in the desert and even ski resorts in the mountains. Such environments cannot naturally host these types of entertainment activities, so dependency on the efficacy of the technology underpinning them becomes critical. The availability and integrity of systems will be central to any security strategy.

Cyber attacks, specifically, can cause a tremendous amount of disruption to the hospitality sector – especially when considering some targets are now critically dependent on technology to operate. The availability of cooling systems, for example, in a ski resort become mission critical. The challenge for cybersecurity leaders goes far further than, for example, preventing DDoS attacks on a particular server underpinning a theme park ride, or ransomware stopping guests from accessing their rooms – the digital assets in scope, from applications, to web-based portals, industrial control systems and even drone-based delivery systems, present an incredibly complex challenge for cybersecurity practitioners to scale and homogenise cybersecurity approaches across an entire enterprise.

Securing the supply chain

As previously mentioned, the tourism, hospitality and entertainment industries are a complex network of private and public companies, heavily regulated industries such as the food and beverage sector, and loosely regulated industries. There are emerging technologies being implemented such as IoT devices, drones, automated vehicles, etc. There are many

regional and international companies investing in the region, and a plethora of tourists from all over the world. Securing the supply chain will present a major risk to organisations operating in the region –traditional hotels have an incredibly diverse supply chain – couple this with a focus on taking a technology-centric approach to entertainment, hospitality, etc, and the cybersecurity implications are muti-faceted. For example, all organisations must consider the security controls and risks associated with cloud providers that provide third-party services or applications; backups for critical services; the data

protection requirements for different citizens, etc. Organisations must meet a broad spectrum of cybersecurity regulations, legislations, directives and requirements. For example, US-based suppliers may require more NIST-centric evidence of cybersecurity controls. EU-based suppliers may require more ISO controls. There are regional Saudi Data Protection regulations to consider and sector-specific standards in aviation, engineering, manufacturing and food industries. Having a central framework, with dynamic security controls that are frequently updated and improved will

keep organisations on a good course. Whilst Saudi Arabia is powering ahead with its investment and development in tourism and the secondary and even tertiary-related industries, cybersecurity leaders and practitioners must be cautious. They must have oversight and a security strategy in place that provides a safety net for operations. They need to be aware of the cyber risks that may disrupt critical systems and distort public opinion, and build security controls that support a seamless transition to becoming a tourism icon. securityforum.org

AI’s Dark Spear

Nicolai Solling, Chief Technology Officer, Help AG, explores how organisations can guard against spear phishing in the age of generative AI

Artificial intelligence (AI) today is an exciting aspect of our everyday lives, with its fast-paced adoption driven by dramatic breakthroughs in machine learning, advanced computational capabilities and sophisticated applications of natural language processing.

The thrilling progress of AI has profound implications for both industries and individuals, and as with any major breakthrough in technology, the rapid adoption of this technology can also make it susceptible to security threats and vulnerabilities. Indeed, as is being demonstrated in recent times through spear phishing attacks, generative AI can be subverted by cybercriminals, leading to significant challenges for organisations and individuals.

The way forward therefore lies in understanding how such subversion can happen and then taking adequate protective measures to continue enjoying the many benefits offered by AI.

As the evil twin of normal phishing, spear phishing carries a highly targeted potency to adapt to the person that it is trying to attack, wherein attackers aim to acquire as much information and metadata about their target as possible. That’s where things can get complicated, as spear phishing usually takes the shape of an attacker building trust to be able to pry on personal information or install malicious software to access sensitive content or financial data.

Implications of genAI for spear phishing

The deployment of generative AI in increasingly advanced iterations is not only helping society leverage its exceptional benefits but also leading to more sophisticated and frequent phishing attacks.

According to a report by Vade, 2023 was an exceptional year for phishing –with hackers sending more than 1.76 billion phishing emails globally. The key drivers were scams impersonating globally known brands, where attackers developed highly convincing threats spoofing these companies.

In the region, Proofpoint’s 2024 State of the Phish report, published earlier this year found that incidences of successful phishing attacks were on the rise in the United Arab Emirates, with 92% of surveyed organisations experiencing at least one successful attack in 2023 versus 86% the previous year – leading to a 44% increase in reports of financial penalties, such as regulatory fines, and a 300% increase in reports of reputational damage.

Indeed, one of the reasons behind this surge in phishing attacks is that leveraging the large language processing capabilities of chatbot systems has made it easier and more cost-effective to launch these attacks with increasing sophistication. In the case of spear phishing, AI capabilities allow the attacker to harvest all the specific information and content a user might

have already posted on social media platforms, and use it to create tailormade, near-genuine content that lulls the victim into trusting the hacker. Today, attackers can create compelling and convincing phishing emails that are difficult to identify through a simple prompt to a chatbot, with barely any effort on their part.

The rise of generative AI not only gives spear phishing an extra twist, but also dramatically transforms the economy of cybersecurity. State-of-the-art automation and large language model capabilities are a catalyst for hackers to deploy attacks with increasing frequency and lower rates of detection. For example, to combat traditional models of phishing, users were trained to look out for typos and grammatical mistakes. Powered by AI, today’s spear phishing attackers can create emails at scales that are flawless from a language perspective. In an age of deepfakes and voice modulation, machine learning is helping sharpen the spear.

What can be done?

Solutions to these challenges must look at being strategic and careful around the applications of generative AI. That is why the industry is abuzz with conversations around more secure and ethical ways of training language models. Moreover, there are ongoing conversations on how to utilise generative AI models and capabilities offered by automation and machine learning to create a more robust

and efficient response to spear phishing and other types of cyber attacks.

And the promising part is that the cyber defenders of today have access to the same advanced technologies that attackers have. Therefore, even as the tactics behind phishing and other attacks evolve, so does

the arsenal of cybersecurity professionals to detect and ward off emerging threats and stay ahead of the curve.

At the same time, users certainly need to follow essential security measures such as adding spam filters to emails, never emailing personal or financial

information without proper security protocols, and verifying the identity of the sender. In an age of widespread proliferation of technology, we need to make more concerted efforts so that the public can adapt to this environment and become aware of exactly how the latest advancements are being weaponised by attackers.

In addition, implementing advanced security solutions is equally essential to detect and block malicious emails, texts and phone calls before they reach a vulnerable target. This includes not only conducting regular security audits and assessments to evaluate the effectiveness of security controls, but also updating technology policies and procedures regularly to mitigate spear phishing threats. Ultimately, innovation, adaptation and remaining vigilant are the keys to success when it comes to thwarting phishing attacks and staying cyber secure. helpag.com

ICT offers a unified solution for access control, intrusion detection, and building automation - from small business to large-scale enterprise projects with complex requirements.

With native support for mobile credentials, and integrations with VMS, lifts, wireless locks, PSIM, and more, Protege platforms provide your customers with a flexible and secure solution that will also help grow your business.

DATA FORTRESS: SECURITY’S NEW FRONTLINE

Haider

Aziz, Managing Director of Middle East, Turkey & Africa, VAST

Data, takes a closer look at deploying a data pillar approach and how it can move security closer to the data

As organisations across the Gulf Cooperation Council (GCC) rapidly adopt cloud solutions, drawn by the benefits of agility, scalability and cost efficiency, concerns about robust data security infrastructure have also escalated. The question then becomes: How can organisations secure their move to the cloud by making security a priority.

Security first!

Cyber Magazine’s recent report The Future of Cloud Security in the Middle East revealed a unique trend – 56% of cloud security professionals in the Middle East prioritise zero-trust strategies over data privacy and compliance.

In the ever-evolving cybersecurity landscape, the Zero Trust Architecture (ZTA) framework stands out as a beacon of modern defence strategy, particularly as traditional network boundaries blur and IT environments embrace disruptive technologies like containers, serverless computing and mobile-everything. These advancements, while powerful, challenge legacy security models. ZTA offers a strategic approach, going beyond a single line of defence. At the heart of this framework is the Data Pillar, a critical component of the Zero Trust Maturity Model (ZTMM) as outlined by the Cybersecurity and Infrastructure Security Agency (CISA). This pillar goes beyond a set of guidelines; it embodies a strategic approach to data security, designed to safeguard and manage all structured and unstructured data across an organisation.

Locking down data

The Data Pillar within ZTA emphasises secure handling and access of data, regardless of its location or format. It highlights the importance of identifying

and classifying data enterprise-wide to apply suitable security measures against unauthorised access and breaches. A core principle is least privilege access, granting users and systems only essential access levels, thereby minimising the risk of data exposure. Additionally, the pillar advocates for cross-pillar interoperability, enabling continuous monitoring and centralised visibility.

Data Pillar essentials

The Data Pillar in ZTA acts like your organisation’s personal Fort Knox for data security. First, data categorisation helps identify your most valuable assets, like the crown jewels. Think of it as sorting your data by importance, with the most sensitive receiving the highest level of protection. Authorisation then controls who gets access, similar to a high-tech keycard system that grants access only to authorised users. Segmentation further strengthens security by creating mini vaults within the main one, ensuring users can only access their designated areas. Data protection adds another layer of defence by encrypting data at rest and in transit, like a super secure lockbox for your digital valuables. FIPS-approved encryption algorithms act as the unbreakable code, safeguarding your data from unauthorised access. Data access management keeps a watchful eye, similar to security cameras, ensuring only authorised users access the data they need based on their roles. Finally, audits and monitoring act like a guard on constant patrol, tracking activity and identifying any suspicious behaviour to allow for swift response to potential threats. Data availability rounds out the pillar by guaranteeing authorised users can always access their data,

even during an attack – like having a backup generator for your vault, ensuring access even when the lights go out. The Data Pillar ensures your data is secure, accessible and always protected.

Addressing challenges in Zero Trust Adoption

ZTA along with the Data Pillar offers robust security, but adoption has hurdles. Legacy systems, complex integration and organisational inertia pose challenges, especially for large enterprises or the Federal sector. Overcoming them requires strategic planning, executive buy-in, and phased deployments.

Modern data platforms, designed with Zero Trust principles in mind, can simplify adoption. For example, The VAST Data Platform offers features like automated data labelling, granular access control and encryption – all key components of a strong ZTA strategy.

Implementing ZTA entails significant investment beyond technology. New policies, procedures and a cultural shift across the organisation are crucial. Clear goals and desired outcomes are essential for a successful ZTA adoption plan.

In the end, it comes down to zeroing in on

data

Zero Trust security revolves around placing security controls close to the data itself. This involves understanding various aspects of the data: where it is stored, how it is categorised (tagged), its retention period, and who can access, modify, delete or own it. The Data Pillar First approach is crucial because it establishes a foundation for trust scoring. Think of this trust score as a way to determine what actions users can (or cannot) perform within the system. To assign accurate trust scores, you need to know what data you’re protecting. Data Pillar First approach provides this vital information upfront, allowing other Zero Trust controls to function effectively. For instance, understanding the data environment helps define the right access levels for users based on their roles and needs. Ultimately, a strong data security foundation enhances all Zero Trust capabilities.

A combination of security-first strategy and innovative solutions create the strongest possible foundation for transformation and allow organisations to gain the maximum possible benefits from the cloud. vastdata.com

Venue:

Venue:

Time: 11am to 8pm

Industry Interview

Meshal Aljohani, CPP, PSP, PCI, Security Group Supervisor, Aramco, finds out more about Andrew Long, Principal Consultant – Security Risk Management at WSP, KSA, and his career in the sector

Can you tell us about your journey in security and what interested you in working in this field?

I served for six years in the British Army from 2000. I then joined a company that carried out Technical Surveillance Counter Measures (TSCM) and this is where my interest in security thrived. In the UK, I carried out TSCM operations worldwide and at the end of 2015 this brought me to The Kingdom of Saudi Arabia. I have held positions as Security Consultant at Princess Nourah University and Security Manager at The Embassy of Australia, Riyadh. In 2023 I joined WSP in Riyadh as a Principal Consultant Security Risk Manager. WSP is working on many projects across the Kingdom in planning and design, business continuity and crisis management, and existing site security surveys and maturity assessments.

I have a BSC (Hons) in Security and Risk Management from the University of Portsmouth, am ASIS certified, a member of the Security Institute and the Institute of Strategic Risk Management.

How is security being addressed in Saudi Arabia’s giga projects, like Neom, Diriyah, Red Sea and Qiddiya?

WSP is working on the development of giga projects across the Kingdom particularly in the hospitality sector. Us as security designers, along with architects, are being encouraged to deliver futuristic developments, allowing us to think outside the box. Security Consultants are tasked with designing security solutions and strategies from the outset that are unobtrusive and provide a secure and inviting environment for the user. We are fully embracing the challenge of bringing together traditional physical security measures and the focus placed on security technology and CPTED measures, as well as coordination with architects, landscape designers and Fire Life Safety to name a few.

What are your opinions on Saudi Arabia’s current hospitality security, areas for improvement and security challenges affecting its hospitality industry?

Improvement is required at a manned guarding level in customer service and at an overarching level to create a more unified and effective framework. Some entities are already training their security officers in internationally recognised courses; this requires rolling out across all entities that provide a security guarding or steward/usher function. I think the Kingdom will advance in resolving issues, however, it requires a thoughtful approach that addresses gaps in expertise and standards and an authority that regulates the sector.

From a security planning and design standpoint, the challenges faced are the lack of a defined code for security, in fact there is an abundance of conflicting worldwide standards and guidelines.

At present the Kingdom has a lack of national requirements and standards, which initially led to a confusing number of international guidelines for security consultants and designers to follow. However, as the developers mature then the regulations and standards will become more refined.

How do you anticipate the development of hospitality security in Saudi Arabia within the coming years?

I see rapid development due to the efforts carried out by the Kingdom. Specifically, the hospitality and entertainment industry will provide an authority to regulate and specify minimum

requirements of training and qualifications for security companies to comply with. We have already seen in the events industry the abundance of high-quality Crowd Safety Management courses being provided to companies involved in securing the Kingdom’s events.

Development will also continue to push the boundaries of security technology, specifically in integrated command and control centres to enable, establish and maintain a common operating picture to inform decision-making from day to day and major global events within the hospitality industry.

SEPTEMBER

14 August

Secutech Vietnam SECC, Ho Chi Minh City

secutechvietnam.tw. messefrankfurt.com

2–5 September

Special Operations Forces Exhibition and Conference (SOFEX)

Aqaba International Exhibition & Convention Center, Jordan sofexjordan.com

17–18 September

MENA Information Security Conference Riyadh, Saudi Arabia

menaisc.com 24–25 September

International Security Expo Olympia, London internationalsecurityexpo.com

1–3 October

Intersec Saudi Arabia Riyadh International Convention and Exhibition Center

intersec-ksa.ae. messefrankfurt.com

22–26 October

SAHA Expo Istanbul Fair Central, Türkiye

sahaexpo.com

29–31 October

Milipol Qatar

Doha Exhibition and Convention Center

milipolqatar.com

30 Oct–1 Nov

Secutech Thailand BITEC, Bangkok

secutechthailand.tw. messefrankfurt.com

DECEMBER

Please check the event websites for the most up-to-date details as dates can change all the time.

2–4 December

Security & Fire Excellence Awards JW Marriott Grosvenor House, London securityandfireawards.com

14–16 January

Intersec Dubai World Trade Centre

intersec.ae. messefrankfurt.com

MAY

13 May

Security Middle East Conference Riyadh, Saudi Arabia

securitymiddleeast conference.com

Managing modern networks is time-intensive and costly, and while cloud computing and converged infrastructures deliver a great deal of business value, they also add complexity. Allied Telesis has solved these issues with full visibility, easy security, and automated administration of wired and wireless devices across all your business locations.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.