europe

Global public safety and security market forecast to grow to $537 billion by 2024

In its latest Global Public Safety and Security Market report, NK Wood Research projects the market to grow from $234.57 billion in 2016 to $537.20 billion by 2024. The growth will occur at a compound annual growth rate (CAGR) of 10.91% between 2016 and 2024. According to the report s findings people and enterprises face continuous threats from cyber criminals, natural disasters, and terrorist attacks, which has boosted demand for public safety and security products and services globally.

Governments are contributing to the growth in demand for these goods and services. The global public safety and security market is segmented by products/solutions, services, verticals, and geographical regions. The solutions market is sub-segmented into critical communication networks, surveillance systems, biometric security, authentication systems, scanning and screening systems, C2/C4isr systems, emergency and disaster management, backup and recovery systems, public address and general alarms, and cyber security. Critical communication networks holds largest market share in the global public safety and security market and is expected to continue to be the biggest market over the forecast period. However the emergency and disaster management market is anticipated to grow at the fastest CAGR to 2024. The report splits the market regionally into North America, Europe, Asia-Pacific, and rest of world (ROW). North America was the highest revenue-generating region in 2016, due to spending on defence, compared with other countries. The report anticipates that the riot control equipment market will grow in the US, following the rise in the number of cases of violent related crimes in North America, especially US. This is partly due to availability of guns and rise in violence among street gangs.

Asia Pacific is expected to grow at the highest CAGR during the forecast period. Japan has been the site of some of the worst natural disasters of the 21st century, a phenomenon that has led to the growth of the public safety and security market in the region. Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now

Shocking levels of neglect and complacency among responsible persons reported by fire installers

More than a third of installers report that up to 80% of sites they visit don t comply with fire safety regulations, research from Hochiki Europe has revealed. Based on feedback from installers across Europe, the survey also found that more than 60% of respondents attended sites at least once a month where the responsible person for fire safety was unknown. Almost a third (32%) regularly encountered buildings with poorly positioned or outdated life safety equipment.

Asked about systems maintenance, 70% of installers got the impression their customers generally saw the upkeep of life safety systems as merely a tick-box exercise , with just 11% believing they recognised it as a potentially property- and life-saving process. Two in five (40%) installers say their customers are not even aware of their legal obligations regarding system maintenance. On average, 55% of fire detection logbooks and 64% of emergency lighting logbooks were not up to date, despite these being legal requirements. Top 5 maintenance and emergency lighting issues Asked what the most commonly encountered fire safety maintenance issues were, installers most frequently cited the following: Change of building/room use without correctly altering the fire system (50%) Inadequate logbook records (43%) Original installer didn t install the best system for the environment (40%) Detectors need cleaning (32%) Detectors need replacing (26%) The top five emergency lighting maintenance issues, meanwhile, were: Broken/faulty lamps (44%) Inadequate logbook records (42%) Inadequate emergency lighting signage (39%) Batteries not charged in emergency lighting units (35%) Inadequate lux levels (25%) Having a correctly designed safety system installed by a qualified engineer in a building is vital when it comes to protecting lives, said Tracy Kirk, general manager of sales and marketing for Hochiki Europe. This being said, a fire detection device or emergency lighting unit can only safeguard occupant safety if it is in working order. This year s installer study has resulted in some stark findings for the industry and sheds light on serious gaps in terms of our customers attitudes towards life safety in Europe. It s clear that there needs to be an increased focus on educating duty holders throughout our built environment on how important it is to look after life safety systems. Those with the responsibility of system upkeep should also ensure they are up to speed with the latest legislation and regulations to keep building occupants safe. Hochiki Europe offers training courses and technical information to support building owners and facilities managers in understanding their legal obligations and how to protect assets and building occupants.

Related Topics How to choose the right life safety system: Hochiki Europe reveals FIREX 2017 plans 95% of life safety installers say fire industry is falling short over training provision Hochiki Europe launches FIREscape lite mains-powered emergency lighting system with back-up power

How public CCTV operators can avoid eye-watering fines under the GDPR

The General Data Protection Regulation (GDPR) comes into force across the EU including the UK from 25 May 2018. With fines for non-compliance potentially being a staggering 79 times greater than under the existing data protection regime, the stakes for organisations in a range of sectors are enormous. As security practitioners are well aware, a CCTV image featuring people counts as personal data just like a date of birth or someone s marriage status or political views.

Jean-Philippe Deby, business development director for Europe at Genetec, very kindly shared his thoughts on the implications for CCTV operators and the wider security industry with IFSEC Global. The conversation touched upon the importance of CCTV gap analyses, managing authorisations and privacy by design, as well as how the GDPR could accelerate adoption rates in the surveillance-as-a-service market. (How physical access systems will be affected by GDPR was also topic under discussion during IFSEC 2017.) IFSEC Global: What are the implications of the forthcoming GDPR on how organisations manage their CCTV systems? Jean-Philippe Deby: I ve heard that the UK was very vocal and implemented this regulation prior to Brexit. So even post-Brexit, from what I understand, the UK will still apply the regulation. Effectively, as this is a regulation and not a directive, all EU countries have agreed to apply it. A fundamental notion of the European Privacy Regulation is that you need to get explicit consent when you acquire people s data. On top of the way they collect information, there s now the notion of responsibility or accountability on how organisations hold this data. The regulation is telling them this is what you know you can or can t do . If they are irresponsible they will be fined.

If they are hacked and data is compromised, they have 72 hours to disclose it to the public authorities otherwise they will also be fined. Because of the lack of consent and the mass accumulation of data, public CCTV basically falls under the category of high-risk data As we speak, organisations as well as the industry as a whole, are reviewing the regulation to determine the steps that need to be taken in order to meet their obligations. How CCTV comes into play is especially interesting for public CCTV. As we know, it s impossible to get the explicit consent of people being filmed. You can obviously announce that you have CCTV in the train station or store, which is how it s done today, but the specific person being filmed can t say hey, I don t want you to record my images. As part of the regulation there s actually a notion that certain data constitutes a higher risk to a person s rights, where organisations need to make a data protection impact assessment test. Because of the lack of consent and the mass accumulation of data, public CCTV basically falls under high-risk data. GDPR Article 35 is where they mention the activities that make data high risk and the steps which an organisation needs to take. IG: What are the implications of being classified as high risk for CCTV operators?

JPD: As I mentioned earlier, it s a learning curve. There are so many different types of data that a lot of people are trying to understand how it s going to impact their organisations, but basically there are two things that come up. For high risk-data they will need what is called a DPO, a data protection officer, who will report directly to the CEO. It will be interesting to see how it impacts small and medium-sized businesses. The other big thing that comes out is that, de facto, they need to build a system which implements what is called privacy by design . For example, encryption is a recommended method of increasing privacy around the information that has been collected. Another area of focus should be the access to the information itself. Breaches don t necessarily come from hackers; they can be internal, either intentional or unintentional. So managing the process of identifying who is connecting to your system and who has access to the system is also key to privacy.

Who do you authorise, for example, to view live images or live recordings? IG: The fines sanctioned by the GDPR are pretty steep JPD : It s either a ‘ 20m fine or 4% of worldwide annual revenue whichever is higher. Many companies with retail branches have billions of dollars worth of revenue. I ve been talking recently to a company that has about $11bn in sales they could be fined $420m. Until now the argument for SaaS was around operational savings. With the GDPR it s really around helping people meet their compliance obligations There is a process in place which means companies will first be warned before being fined, but really, it s about good governance. Compare the cost of a breach or a company s reputation versus the cost of implementing a properly designed and executed solution. But I do believe that the EU will apply fines around data protection as they already apply large fines for other subjects. , Google was recently fined more than ‘ 2.7bn. If an organisation isn t careful about the way they handle data, I believe the EU will apply the full force of the regulation.

IG: It s not hard to imagine court cases where organisations dispute accusations that their cyber-defences were not robust enough JPD : That s true, but the onus will then be on the organisation to demonstrate the steps they have taken. Ultimately, it s all about responsibility. Under the GDPR, an organisation collecting personal information is the data controller and is responsible for handling the data. The GDPR also introduces another player called a data processor. These companies can help data controllers in managing the collection of information by providing adequate infrastructure or services. This is why companies like Microsoft are quite engaged with their cloud offering, because the data processor is almost synonymous with software as a service SaaS. Genetec has a solution called Stratocast, which is surveillance as a service. Small businesses can rely on our solution to encrypt their recorded CCTV, for example. It monitors their systems 24 hours a day to detect hacks or any unusual activity via our utilisation of Microsoft Azure.

It is really to help any businesses where video surveillance is not their core business and they either don t want, or don t have the resources to dedicate one of their employees to monitor the state of their CCTV systems. embedded content IG: So the GDPR could really be a spur for the software as a service market? JPD : Absolutely. Until now the argument was around operational savings. Here it s really around helping people meet their compliance obligations on top of helping them with their operation. It s an even stronger argument as to why they should be looking into those solutions. IG: How does Genetec see its role in preparing the industry for the GDPR? JPD : The GDPR is an incredible framework for something we ve been pushing now for a few years: the security of security. You cannot have trust without security.

Cameras have become IoT devices that connect to IP networks like PCs or other IP devices. So we re making sure tools and processes are available for customers to build the security policy they want to put in place, like encrypting information. A CCTV gap analysis is especially important for end users filming public areas. They are exposing themselves to high risk With certain partners like Bosch for example we even have the ability to encrypt from the camera. So it s all about protecting access to data. It s also about protecting the integrity of that data. And with the GDPR we have the European Commission and the British Government putting in a legal framework, with financial penalties, that ties in very well with what we ve already been pushing. IG: Any tips for how businesses can strengthen their systems before the GDPR comes into force? JPD : I think it s important for companies to do gap analyses of their systems not just CCTV but also how they are collecting information on their website, their CRMs and so forth.

A CCTV gap analysis is especially important for end users who are filming public areas. They are exposing themselves to high risk. But depending on what they have in place and who they talk to, they don t necessarily have to do a full upgrade of their systems. There are ways to simply strengthen systems, but this is where one vendor will differentiate from the other. Another thing is there s a lot of requests for proposals and requests for information happening as we speak. If you were about to invest a large sum of money to upgrade your analogue system to IP, for example, all the people who are going to participate in your project starting with the consultant, but also integrators and manufacturers should explain their take around cyber security. This is part of our security of security message. Again, if your system is monitoring public areas, there should be a chapter within your RFP to have a well explained position and solution to meet your compliance. Even outside GDPR, it is good practice in any case to ensure you utilise the tools available.

Free Download: the CyberSecurity Crashcourse Are you even aware if you have been the victim of a cybersecurity breach?

This report will help you to find out and protect yourself, Eric Hansleman from 451 Research presents a rapid-fire overview of cybersecurity , because a firewall just won t do, you need multi-layered defences to truly protect your data.

Click here to download now

Help us lobby the EU to make our buildings safer: Fire Safe Europe

Fire Safe Europe is urging people to sign a petition imploring the EU to take concerted action to remedy shortcomings in building regulations, their enforcement and fire safety practices. Why is this important? Fire kills 11 people every day in the European Union (EU).

Apart from major tragedies, like the Grenfell Tower fire in London, we don t often hear about them. Yet there are 5,000 fire incidents each day in the EU, and they affect communities deeply. Lives are lost, people are injured, jobs, businesses, firefighters, and the environment are affected. We assume that new buildings are more fire safe, but they are increasingly highly insulated and airtight, with more combustibles, which makes fires grow faster than ever before and become more hazardous. Whereas in the 1950s, it took about 25 minutes for a room to be engulfed in flames, now it takes 3-5 minutes. Fires affect EU citizens, and you have an opportunity now to ask the EU to improve fire safety in buildings. Why do we need to act now? After the Grenfell Tower tragedy, the European Parliament has taken the initiative to start a debate on fire safety in buildings. This debate will happen on Wednesday 13 September 2017: This is your chance to ask for fire safety in buildings to be improved.

Sign today , and help us make our buildings safer for all. A little more information We are Fire Safe Europe, a European alliance which aims to raise the profile of fire safety in buildings and we are asking the European Institutions to: Make changes to ensure that tests to evaluate the performance of facades in a fire are based on real life situations where fires can be large scale. Introduce requirements to test the toxic smoke from construction products, and to label those products with their results so that builders and consumers can make informed choices. Develop a European Fire Safety Strategy: Many EU policies impact fire safety, a focussed strategy would enable the EU to have a coordinated approach to fire safety in buildings. Building fires affect people: there are at least 5,000 fire incidents each day in the EU. Each year in Europe, approximately 70,000 people are admitted to hospitals with severe fire related injuries. Worldwide, children make up 30% of injuries and fatalities caused by fire. Firefighters are especially heavily impacted. Building fires affect the environment: Fires cause massive amounts of air pollution.

They deplete materials and increase carbon emissions, a major challenge for sustainable resource management. Building fires have a cost: ‘ 126 billion is eaten up by fire damage each year. For European countries, it is 1% of their GDP. Fire can lead to major infrastructure, data and stock loss, less productivity, staff unemployment, and even bankruptcy. About Fire Safe Europe Fire Safe Europe (FSEU) is a broad and unique cross-sectorial alliance of fire experts, fire fighters, European associations, and international companies, including construction manufacturers and material suppliers of insulation, cable, concrete, ceiling, and fire protection equipment. FSEU s mission is to improve fire safety in buildings for European citizens. Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now

EU Construction Products Regulation has failed to boost competitiveness of European fire industry, says Euralarm

Products standardisation The EU s Construction Products Regulation (CPR) should be reviewed, according to Euralarm. The trade association representing European electronic fire safety and security manufacturers believes the CPR has not boosted the competitiveness of the electronic fire safety industry as hoped. The CPR, it says, is at odds with the industry s need for standardised product performance requirements and standardised behaviour.

For example, alarm buttons that activate a fire alarm system across Europe and the world are always red. However, under the CPR, this is not seen as performance criteria , so the colour can change depending on national solutions. This could confuse building occupants jeopardise lives, Euralarm argues. The CPR s stated objective is to help standardise test methods and foster Europe-wide acceptance of test results in order to facilitate cross-border movement of construction products. However, it also covers a very wide range of products with very divergent characteristics and less reliance on performance criteria. This adversely affects standardisation of fire detection and alarm products, Euralarm believes. Based on initial consultations, Euralarm members favour revising the CPR (Option II of the Inception Impact Assessment) with the aim of facilitating standardisation and boosting the export prospects of European manufactuers.

Euralarm is working with the European Commission and DG GROWTH formerly the Directorate-General for Internal Market, Industry, Entrepreneurship and SMEs to define and implement the optimum solution to these challenges.

Founded in 1970, Euralarm represents more than 5,000 companies and organisations within the European fire safety and security industry, lobbying for greater cross-border standardisation for the benefit of both the industry and safety of citizens.

For connected home and residential service providers, smart locks open doors to new opportunities

The internet of things is here, it s growing fast and the smart home sits right at its heart. With trusted global brands such as Yale, Mul-T-Lock, TESA, FAB, Vachette and KESO, ASSA ABLOY has the largest and most advanced range of residential smart locks on the market. Innovative locks including the ENTR , Doorman and Conexis L1 have been integrated successfully with multiple smart-home systems and diverse platforms which transform domestic security and residential services.

Service providers all over Europe telecom companies, utilities, smart-home specialists, home care providers, holiday rental agencies and more have already integrated smart door locks to build better services for their customers. For this new generation of service provider, a smart home starts with a smart door. Opening doors to connected living In Sweden, customers of a PostNord pilot no longer need to wait at home for a postal delivery. They can have parcels delivered inside their front door, if it is equipped with a Yale smart door lock. This integrated, opt-in service works via a single-use PIN code digital key issued automatically to an authorised PostNord driver. In Italy, Home at Hotel holiday rental apartments in Rome and Milan are secured with an ENTR smart door lock. These integrate with the SCLAK smartphone-managed access system, making it possible for guests to enjoy their stay without key hassles. Home by Hotel can now easily deliver value-added services, including grocery shopping and extra cleaning on demand. In Turkey, around 1,700 smart door locks are being installed at Future Park, a new Istanbul development with apartments built around a home automation concept.

Residential technology specialists Aypro designed a custom app-powered system for residents and integrated our lock. In the words of Alper Uludag, Project Manager at Hiper Gayrimenkul, Future Park s developer: Making the decision to work with a trusted global supplier of smart home security like ASSA ABLOY was the best choice. In the UK s smart-home residential market, Yale locks seamless integration with Samsung SmartThings enables door control via the Amazon Echo speaker. Say, Alexa, lock my lock and your wishes are carried out. Can t remember if you locked up at night? Ask, Alexa, is my lock locked? A smart home starts with a smart door lock Doors are as individual as the people who live behind them. To select the right door lock for any system or service, you need to consider door complexity, including multiple geographical standards and norms, door materials and profiles, as well as lock types. ASSA ABLOY offers smart lock solutions for all markets.

Because of its unique global reach, the group has a wide portfolio of advanced smart door locks for Euro, Scandinavian and other relevant door profiles. If your customer wants a smart door lock, chances are ASSA ABLOY has one to fit. Easy integration ASSA ABLOY also makes integration easy. The radio modules on our locks use multiple wireless technology platforms to connect devices. ASSA ABLOY open connectivity includes Z-Wave, ZigBee, Wi-Fi, Bluetooth, Seos , Thread and more. In addition, an expert team of ASSA ABLOY smart security specialists provides free installation training. Partners also have access to our unique global knowledge base in residential security, part of which was published in the 2016 Smart Home Security Report * . Juniper Research recently forecasted a 1000 percent increase in the installed base of smart-home products by 2020. They identified partnerships as a key adoption driver.

Already we work with smart-home companies across Europe, providing devices to secure homes with the latest smart technology, explains Omer Sagi, EMEA Smart Door Lock Business Development Director at ASSA ABLOY. Our smart door locks are from high-profile brands that Europe s homeowners already trust. We are always on the look-out for opportunities to form innovative partnerships, so we can continue to grow this business together with new and existing partners.

Recap: why partner with the ASSA ABLOY smart door lock range?

A smart home starts with a smart door Smart door locks create new revenue sources and increase customer satisfaction A smart door lock makes innovative domestic services possible Our locks are built using open standards for easy integration with your devices or service ASSA ABLOY brands include Yale, Mul-T-Lock, TESA, FAB, Vachette and KESO, which have established decades of customer recognition, trust and loyalty We offer expert sales and installation training, plus an expert ASSA ABLOY installer network if you need You can share the most up-to-date market intelligence from a global leader

How evolving terror tactics have driven advances in perimeter security

Many urban threats used to be seen, at least in the eyes of the public, as things that happened on other shores. However, an increase in urban attacks of late has put pressure on security services to come up with innovative solutions that allow business to continue as normal and the public to enjoy some peace of mind. Amid these new threats, coupled with geopolitical fears and the ongoing refugee crisis in Europe, governments are attempting to make borders more secure and event venues and stewards of high-risk public areas are following suit.

With terrorists now using vehicles as weapons, many existing security solutions need reassessing as they are inadequate at preventing vehicular attack. This month marks the anniversary of the Nice attack and similar incidents have occurred since in Berlin, Stockholm and London. The change in tactics has rendered current security provisions outdated. A proactive, preventative approach is now required if security personnel are to put a stop to such incidents. Mitigating risk While no guarantee can be made about the safety of those attending events or conducting their daily lives in high-risk, crowded public areas, perimeter security does provide an increased level of protection and has seen advancements designed to mitigate the risk and impact associated with today s urban threats. Previously seen on military bases, oil and gas fields and other important infrastructure, perimeter security products have become popular for those looking to secure their event and put public safety firmly back on the agenda. Threats are, of course, unpredictable. However, providing a readily-available solution for areas deemed high-risk due to large volumes of the public passing through, including stadiums or other event spaces, can help deter or reduce the impact of vehicular and some other attacks. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany While video cameras and security guards are two of the most common security measures that organisations have in place, they aren t always the most effective.

With hostile events increasing in frequency, there has been a reliance on video surveillance to identify perpetrators and ensure that every angle is covered. However, surveillance cameras are mostly effective when the attack has already happened. There s no doubt that the increased threat level has meant that event organisers and those managing security in high-risk areas have had to look at alternative ways in which they can prevent attacks or reduce their impact. Protecting civilian areas has become a higher priority, with perimeter security generating much interest and innovation. In reaction to the London attacks, Metropolitan Police Commissioner Cressida Dick announced that vehicle barriers were to be installed across London in some form or other. Yet while such reactive measures are of course welcomed, it s imperative that everyone involved in public security should take action in the threat against urban terror. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany, who found that they would be unable to prevent similar attacks. These revelations have prompted the development of barriers that are crash-resistant up to speeds of 50mph and use an anti-climb mesh to prevent further intrusions. As the solutions are flat-packed and can be earth-filled, they are an effective option for event security, minimising installation time and the impact on the surrounding environment.

Units can also be branded, so they remain inconspicuous and in line with an organisation s existing branding. New threats are presenting themselves every day. Organisations and urban spaces are aware they can no longer be just reactive in the wake of a hostile event. Precautionary measures are becoming increasingly advanced and accessible, and where public safety is concerned, you truly cannot put a price on it. Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

Converged security management: The key to mitigating cybersecurity risks

Converged Security Management: The Key To Mitigating Cybersecurity Risks

The IoT revolution has come about thanks to falling component prices, global mobile device adoption, improvements in telecoms infrastructure and the rise of application programming interfaces (APIs). Unsecured and therefore vulnerable devices are now easily searchable through online vulnerability search engine Shodan, among many other means. A series of cyber-attacks targeting such devices as conduits to wider corporate networks has exposed the complacency of some manufacturers over cybersecurity.

The consequences of successful breaches the loss of sensitive data and potentially multi-million pound fines levied for breaches of the forthcoming Global Data Protection Regulation (GDPR) mean the issue is finally getting the attention it warrants. The arguably lower standards of security for consumer devices is a problem, as is the use of third-party suppliers who may not take security as seriously as they should. According to the Department of Homeland Security, this inter-connectedness of devices introduces cyber-physical technologies that connect cyber systems to physical systems, thereby removing the barrier between the cyber and physical worlds but the greater connectivity also expands the potential attack surface for malicious actors. Author bios James Willison BA MA MSyI James is founder of Unified Security Ltd and vice chair of the ASIS European Convergence/ESRM committee. James was awarded the Imbert Prize for an outstanding contribution to the Security Industry in 2011 for his work on convergence with ASIS Europe and the Information Security Awareness Forum. He has worked with BP, Loughborough University, Mitie TSM, the EU and AXIS Communications on convergence. He is an ISACA Academic Advocate and a member of the draft ASIS/ISACA/ISC(2) Security Awareness Standard Working Group. Unified Security Ltd provide consultancy to organisations on how to align their physical and information security functions. This encompasses security policy, common reporting processes, converged security risk assessment, training courses and white papers.

Sarb Sembhi CISM Sarb is CTO and CISO at Virtually Informed, and has previously been a CTO and CISO for the Noord Group. A former consultant in risk and security, Sarb has also worked with the London Chamber of Commerce and Industry Defence and Security Committee and its cybersecurity working group. Other roles have included president of the ISACA London Chapter, chair of ISACA International GRA Region 3 Sub-Committee, chair of ISACA International GRA Committee, ISSA UK Advisory Group member and InfoSecurity Magazine Editorial Group member. Sarb has also served on several security standards groups and speaks at risk and security events around the world. Sarb was shortlisted in IFSEC Global s Top 50 influencers in security & fire 2017: Cybersecurity.

l

FIA officially launches new fire engineering qualifications

FIREX 2017 The Fire Industry Association (FIA) officially launched their new qualifications in fire detection and alarms at FIREX 2017. FIA general manager Martin Duggan delivered three presentations about the new qualifications, one on each day of the three-day exhibition. The seminars were very well attended and it was a great opportunity to answer questions directly from visitors at the show, he said.

These qualifications have taken years of development and we are really excited to share with the industry exactly what shape the qualifications will take. We ve taken on new staff and had a small shake-up of the FIA team in preparation for the launch of the qualifications in order to answer all those initial questions and to ensure that the booking process goes smoothly. The FIA said the new courses met with a positive response from attendees working in all areas of the supply chain, as well as interest from beyond the UK. There are four new qualifications: designer, installer, maintainer, and commissioner, explained Duggan. They are equivalent to a level 3 in the UK, so that is the same as an A-Level, but in Europe it is the same as a level 4 qualification on the European qualifications framework. FIA general manager Martin Duggan delivers FIREX 2017 seminar The FIA handed out course prospectuses as well as snacks and drinks on its stand the FIA Lounge which was designed to resemble a pub. The FIA Lounge was very successful, said Kat Schabowska, marketing communications executive at the FIA. We had back-to-back enquiries at the information desk and the bar area was full every day of the expo. We are delighted to be able to say that this year s footfall on our stand was even better than last year.

Martin Duggan says the new courses introduce elements not hitherto available in existing FIA courses. We did a gap analysis of our current training and the new qualifications to discover how much more the new qualifications would offer. The results show us that the courses will at least double in size, explained Martin Duggan during his presentation. We ve developed some units that are completely new, plus we added extra sections that industry stakeholders and employers have asked for. Our members have very much guided us in this direction towards including more content and making the courses longer and more extensive, in order to stretch the learners knowledge further than before. Said Kat Schabowska: We recommend that if you re interested in our new qualifications or courses that you sign up to our email newsletter to find out when our booking system will go live. The new qualifications prospectus is available to download for free from the FIA website, or a hard copy can be requested by emailing [email protected]

Petya/GoldenEye: Cybersecurity experts respond to ransomware attack

The latest ransomware virus to sweep the globe started in Ukraine after users there downloaded a popular tax accounting package or visited a local news site, according to Ukrainian police and cyber experts. Called GoldenEye or Petya, the virus has affected thousands of computers, disrupting organisations in a wide range of sectors, from shipping to manufacturing. US shipping company FedEx, Danish shipping giant AP Moller-Maersk and Russian oil giant Rosneft are among those hit by the attack.

The malicious code locks machines and demands that victims pay a ransom of $300 in bitcoins or lose their data. The hackers motives are still unclear, with some experts speculating that, given the modest sums demanded, a motive other than financial gain might be driving them. A number of cybersecurity experts offered their analyses to IFSEC Global, which you can read below. Eldon Sprickerhoff, founder and chief security strategist, eSentire Attacks are becoming more widespread, are moving faster, and are harder to kill The eSentire threat intelligence team has confirmed one variant associated with this attack, however broadly there are more than 50 different flavours of ransomware variants in the wild. Of those flavours, behaviors prompt the rapid deletion of files and exfiltration of data. Recently we ve tracked a new variant which works to lock down passwords before encryption, making backup restoration particularly tricky. This attack amplifies the rapid evolution of ransomware; attacks are becoming more widespread, are moving faster, and are harder to kill. While this attack is hitting Europe harder than other countries (at the moment), it is moving quickly and businesses worldwide should treat this as the warning siren. Take this as an opportunity to ensure that offline backups and system patches are up-to-date, and tested.

Dr Jamie Graves, CEO, ZoneFox It s not just computer systems shutting down; it s energy grids losing power, ships stopping in their tracks and people not being able to access their money This is further confirmation that we now live in a world where nation-state sponsored cyber-attacks are becoming as routine as real-world incidents. This latest attack reminds us of two crucial facts regarding the current state of cyber security: that attackers now have access regardless of whether they are state-sponsored or independent to military-grade cyber weaponry, hence the fact that the attacks are so successful. Secondly, that digital data is directly linked to physical assets; it s not just computer systems shutting down, it s energy grids losing power, ships stopping in their tracks and people not being able to access their money. Despite the headlines it will create, especially in the wake of the recent WannaCry incident, this is old news. The origin of this attack looks to be a phishing email that delivers a rebranded piece of ransomware, with the only addition being the NSA EnternalBlue exploits that WannaCry used. If you don t have adequate security in place and a seriously security-conscious culture, you re going to get a free penetration test to show just how vulnerable your organisation really is. Marty P Kamden, CMO, NordVPN One way to protect yourself is to disrupt a system before it boots, as the ransomware runs on boot The latest ransomware assault seems to be particularly dangerous. One of the best protection mechanisms are patches, but they might not always work with this new version of Petya. Another way to protect yourself is to disrupt a system before it boots, as the ransomware runs on boot.

After the device gets infected with a ransomware, it will wait for about an hour until reboot. Reboot is required for a malware to encrypt the system, so in certain cases, if the device gets terminated in the encryption process, it gets disrupted and information can be saved. Generally, system administrators are still not well-prepared to protect their networks, and these attacks will only keep getting worse. Matt Kingswood, UK head, IT Specialists The best way to prepare for an attack is to back up data regularly to the cloud The news story on the new variant of the Petya ransomware dubbed PetrWrap exposes just how complex and well evolved cyber threats have become. Researchers from Kaspersky have documented that the group behind PetrWrap created a special module that patches the original Petya ransomware on the fly . While Kaspersky has a signature for this ransomware already, other AV providers are sure to follow soon. Although there are a range of best practices to reduce the risk of a ransomware infection (such as installing an antivirus scanner, utilising intrusion detection services, applying updates as soon as possible and avoiding unsolicited email attachments), there is no failsafe method for preventing ransomware. The best way to prepare for an attack is to back up data regularly to the cloud. Secure cloud-to-cloud backup solutions create another, encrypted version of your data and maintain prior versions ‘ in the case of a ransomware attack, the versions before the attack.

And, of course, this second copy has the added benefit of preventing data loss via accidental deletion. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Further topics covered include: The network cameras hijack during the 2017 presidential inauguration, updates on the forthcoming EU data protection law (the GDPR), ultra-low light cameras versus thermal cameras and much more.

Click here to Download now