We find the needle in the haystack and fast

As well as enhancing safety and security, Qognify solutions distill mountains of data into meaningful intelligence to optimise business processes, cut costs and reduce the risk, and mitigate the impact, of shutdowns and service disruptions. The company sells solutions for airports, rail, traffic management, utilities, the financial sector and other environments where even minor setbacks can cost millions of pounds in lost revenue or cause major economic disruption. We spoke to Moti Shabtai, Qognify CEO and president, about the company s suite of big-data solutions, including Qblock, Suspect Search and Operational Intelligence Center.

IFSEC Global: Please tell us about your Operational Intelligence Center? Moti Shabtai: The Operational Intelligence Center (OIC) can be described as a big data machine that sits on top of our Qognify Situator PSIM solution and provides intelligence to the security team, the operational team, the executive suite as well as the wider organisation. It correlates huge amounts of data to give a snapshot overview, along with deep insight into how the organisation is performing. Using the OIC, an airport can run predictive analytics to assess what would happen if a runway were to be closed One sector where the OIC is proving very popular is airports. They are measured on how many connections airlines choose to have through their airport versus another. If they re not providing a good service, it costs airlines money and therefore they may choose to go with another airport. So, knowing your response times, whether you are meeting your service level agreements and being aware of the number and the root cause of flights being diverted, is vitally important. Using the OIC, an airport can run predictive analytics to assess what would happen if a runway is to be closed. How would it impact the capacity to contain landings?

When would planes need to be diverted because the airport can t absorb more landings? We have been working with one of the biggest airports in the world that is using the OIC to check how it is performing and how it is trending against its own KPIs as well as how to predict what may happen if the airport continues on a certain trend. IG: Where other than airports is the OIC useful? MS: The OIC is ideal for any mission-critical environments where the cost of business obstruction is very high. So airports, mass transit, seaports, financial institutions and utilities are key sectors for the solution. Also, smart cities initiatives around the world, where we are having conversations with governments and mayors, looking at how they can improve safety and security for their citizens, but also to optimise essential city infrastructure such as telecoms, water supply, sewer systems and traffic management. We take a sea of data which is getting bigger all the time and turn it into usable intelligence For example, we have a city that uses OIC and Situator to handle tickets for traffic violations. It has tripled the number of tickets by automating the process and making it much more efficient! So, Qognify Situator is the solution that enables operators or managers to manage situations and incidents, whereas the OIC focuses on operational intelligence and performance.

IG: Please tell us a bit about Qblock MS: Qblock is a converged IT solution for mass video storage. It s meant for those mission-critical organisations that cannot afford to lose anything and are seeking a zero-failure solution. They appreciate the benefits that network-attached storage is providing. IG: Do Qognify solutions deploy machine learning or deep learning? MS: Yes, our Suspect Search video analytics application is heavily based on both deep learning and neural networks, to analyse huge amounts of people and create a digital signature of whoever you are. IG: What kind of sectors or adjacent areas might you want to diversify into? MS: We are open to any opportunities to do with big data that complements our solution. We re a software company that specialises in finding the needle in the haystack and fast. We take a sea of data and that sea is getting bigger and bigger all the time and turn it into information and usable intelligence.

Free Download: Securing the UK s borders. Getting national security and Brexit right first time is crucial , we do not want to get this wrong. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now Related Topics Airport security market set for years of strong growth amid perpetual terror threat Can I take a knife-shaped banana on the flight?

The TSA s bizarre, brilliant Instagram account Deep-learning algorithms, biometric passports and anti-drone technology helping to drive airport revolution

Information Security Consultant jobs

Cyber Security Consultant GRC, Data Protection, Risk London Who wouldn t want to be a is a monster when it comes to advising in cyber security, and in 2017, strategic cyber Security consulting generates a whole list of complex challenges, so at this world-leading to some of the most potent and complex cyber security problems, within some of the world s

How to put your physical security systems into the cloud

PROCUREMENT We re in the midst of a revolution in the physical security world. The cloud era has the potential to change every aspect of physical security, offering alternative ways of doing things, opportunities to realise greater long-term value from legacy systems, and capabilities that have simply never existed before. Working together, smart devices and IP networks can realise remarkable benefits in diverse areas, including cost, installation, efficiency, integration, business automation, monitoring, situational awareness and ease of use.

Software is always up to date without the need for on-site work and systems can be quickly and easily adapted to user requirements. One of the perhaps unexpected effects of cloud is that, for many organisations, and particularly those operating or moving towards smart environments, security systems are shifting from being grudge purchases made only when they absolutely must be to desirable investments that can secure specific, tangible, measurable business benefits. The security sector has been slow to adopt cloud technology, in part because of natural, but now somewhat out of date concerns over putting security services out there rather than keeping them safely in-house The extent of this shift and the speed with which it can take effect, though, are dependent on how effectively security providers address the challenges arising for organisations wishing to take advantage of the new capabilities and benefits offered by cloud. This is particularly the case when a move away from a traditional systems approach is being considered. Choose the right provider Many longstanding security providers are simply lack the necessary skills and knowledge to address the complexities inherent in the integration of diverse systems, particularly over IP networks. Conversely, new entrants to the market from the world of IP networks, while bringing networking expertise, often lack understanding of security systems. Furthermore, they often do not fully understand, or sometimes even perceive, the complex legal and technical issues that can arise. It is beyond question, though, that in the world of physical security, the cloud is here to stay, just as it is in the consumer world of smart watches, fitness trackers and satnavs. Earlier this year, Gartner predicted that in 2017 we would see 8.4 billion connected things an increase of over 30% on 2016.

It would be foolish indeed to ignore such growth and the immense benefits that the technologies driving it can deliver as they connect previously disparate devices and data sources. Nevertheless, the security sector has been slow to adopt cloud technology, in part because of natural, but now somewhat out of date concerns over putting security services out there rather than keeping them safely in-house. At Reliance High-Tech, where we ve been innovating in the security arena for more than 40 years, we can see the parallels between this technology shift and previous trends, including the ongoing migration to IP solutions (which was much slower than many expected). Cloud integration essentials Appropriate expertise and experience are essential when it comes to cloud integration. Decisions must be made as to which facilities, services and infrastructure to move to the cloud right away, which to move later, and which should stay on-premises for the foreseeable future. There will be pros and cons for each device and service, which need to be fully understood to make the right decisions. Often a hybrid or staged approach is the right choice for example, embracing secure hosted services now with a view to full cloud migration as part of a longer-term plan. When planning the implementation of new and migrated systems, a seamless transition is usually essential. Risks must be fully understood and mitigated, and users and others brought up to speed rapidly, and then supported effectively on the new facilities.

Such issues mean you need a security partner that can provide expert counsel on both technical and commercial matters from the very start of the engagement. Exploring the idea Often, the first major challenge with any new technology comes at the exploratory stage, before any actual migration is even planned. Exploring potential risks and benefits, and convincing key players within the organisation that a move towards cloud should be made, can be challenging indeed without specialist knowledge in a variety of arenas, including IP networking, cloud infrastructure, applications and services, legacy systems integration and, of course, the cloud-based solutions available. A capable, experienced security systems integrator (like Reliance High-Tech) will work closely with you to fully understand the detail of your existing infrastructure, and your aims and objectives, as well as budgetary, technical and other constraints. Working from that basis they can then advise on strategic options and help you communicate the benefits to interested parties across your organisation.

How prison authorities are grappling with the rise of drone-assisted smuggling

Anti-drone tech Prison services are grappling with a growing phenomenon that didn t even exist three years ago. Intrusion by unauthorised drones accounted for 33 incidents at prisons in England and Wales in 2015 a 1,550% jump on the two recorded in 2014. The year before that not a single incident was recorded.

In one particularly daring plot criminals used drones in a failed bid to flood prisons with contraband worth around 48,000. A specialist team of prison and police officers has been set up to combat the problem. Law enforcement agencies and HM Prison and Probation Service will inspect drones recovered from jails in order to identify, track down and prosecute those involved in drone-assisted smuggling. In footage obtained by the BBC below, surveillance cameras show a drone delivering drugs and mobile phones to inmates in a London prison in April 2016. An inmate grabs the goodies by reaching through the prison bars. embedded content It s a global problem. A recent report from USA Today revealed that drones have been used more than a dozen times to smuggle contraband into federal prisons over the last five years. In 2016, a recently released inmate and two accomplices were convicted of smuggling porn and drugs into Maryland s Western Correctional Institution using a drone. The perpetrators reportedly earned about $6,000 per drop.

Lethal items US prison management consultant Donald Leach told US Today that traditionally some inmates would bribe the staff or visitors to bring drugs and other small items into jail illegally by hiding them in body cavities etc. But drones have opened up the possibility of transporting much bigger and much more lethal items like guns into the facilities. Correctional Service Canada, the federal agency responsible for management of Canadian prison facilities, recorded 41 drone-related incidents at federal prisons between July 2013 and December 2016. In four of those cases, the authority believes that contraband was successfully smuggled into the facility. Would it not be more effective to spread nets over the prisons and obscure sensitive areas from view? Martin Grigg, director, CHQ There are myriad ways of deterring, repelling, disabling or seizing drones. However, the problem is still so new that prisons around the world are very much in a trial and error phase regarding deciding on the best solution. A prison in Guernsey recently became the first in the world to use an invisible shield to foil repel drones. The shield uses sensors to jam radio frequencies that return the drone to its sender.

Martin Grigg, founder and director of security consultancy CHQ, told IFSEC Global that: Drones are an area of increased concern in that they present a new threat to prisons for both remote reconnaissance and delivery of contraband. Disabling a drone in a pre-defined area is relatively straightforward. A high-power directional microwave pulse will fry its electronics and will kill it in mid-air. But he outlines two legal problems associated with combating the problem, including the law around damaging other people s property and, more fundamentally, safety concerns. What do you do with 5kg of metal falling out of the sky? There are many health and safety risks associated with disabling drones. A falling drone could kill an innocent person. The technology that returns a drone to its last way-point is a good solution but it is not hard to imagine a drone that is not using standard aviation navigation techniques. Lateral thinking may well be an approach to practical solutions.

The basic starting point should be to keep it simple. For example, in the case of drones, would it not be more effective to spread nets over the prisons and obscure sensitive areas from view? Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now

Cyber-attack could cost global economy more than costliest natural disaster in US history, says Lloyds

Cyber insurance Hurricane Katrina at peak intensity in the Gulf of Mexico on 28 August 2005 Lloyd s of London has warned that a major cyber-attack could cause problems that cost as much as $120bn ( 92bn) to rectify. To put that into some sort of context, Hurricane Katrina the costliest natural disaster in US history, no less caused $108bn worth of property damage. Lloyds of London, the world s oldest insurer, has published a 56-page report that reveals how the potential cost of cyber-attacks has spiralled in recent years.

A malicious hack that takes down a cloud service provider is cited the most likely scenario, with estimated losses ranging from $15bn to $121bn, with the average being $53bn. This report gives a real sense of the scale of damage a cyber-attack could cause the global economy, said Lloyds CEO Inga Beale. Just like some of the worst natural catastrophes, cyber events can cause a severe impact on businesses and economies, trigger multiple claims and dramatically increase insurers claims costs. Underwriters need to consider cyber cover in this way and ensure that premium calculations keep pace with the cyber-threat reality. With average potential losses of $28.7bn, the next-most likely attack, according to Lloyds research, is the breach of computer operating systems run by a huge number of organisations around the globe. Uninsured gap Many such losses would not be insured. Lloyds has identified an uninsured gap of $45bn in the cloud services setting and $26bn for the latter scenario that makes the prospect of such attacks more alarming still. As for the most vulnerable sectors, financial services tops the rankings in terms of vulnerability, followed by software and technology, hospitality and retail. After that comes healthcare, in which the consequences could be especially grave.

The NHS was hit by a ransomware attack recently. A recent white paper from the US-based Institute for Critical Infrastructure Technology (ICIT) concluded that the healthcare sector is the most vulnerable and least equipped to defend against hackers. Last year we published an infographic detailing the rise of healthcare hacks and advice on how to secure data in the healthcare industry. Saudi Aramco, which supplies 10% of the world s oil, suffered what CNN Tech described as the world s worst hack in 2012. Although the total costs attributable to the ensuing chaos and salvage operation have not been estimated indeed, the hack was not reported widely it apparently destroyed 35,000 computers and sent the entire business into near-meltdown. It was only the bottomless oil wealth of the owners that staved off bankruptcy. A recent survey of 257 benchmarked organizations conducted by the Ponemon Institute revealed that the average annual cost in damages from cyberattacks amounted to $7.6m. Cyber insurance is a relatively new form of insurance and is trickier to model than cover for natural catastrophes. However, if cyber-attacks are seen by Lloyds as potentially comparable with natural disasters when it comes to costs, it nevertheless believes that climactic problems pose the biggest long-term risk.

From year to year, risk varies relatively little but climate change in the end will be far larger as a risk, said Trevor Maynard, Lloyd s head of innovation and co-author of the report with cybersecurity firm Cyence. It affects the global economic structure, food, water. It s like trying to turn a supertanker around we can t start in 30 years when things are going bad, we have to start now. Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself. Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

2000ft drone-busting invisible fence erected by Guernsey prison

Anti-drone tech Les Nicolles prison on Guernsey in the Channel Islands has become the first in the world to use an invisible shield to foil drones programmed to smuggle in drugs, weapons and mobile phones. The fence s technology works by jamming electronic transmissions that return the drone to its sender preventing its delivery of contraband. Sensors act as disruptors to jam the drone by blocking radio frequencies.

Sky Fence has been developed by Nottingham-based firm Drone Defence and Eclipse Digital Solutions with installation costs upwards of 100,000. Drone Defence founder and CEO Richard Gill said: It disrupts the control network between the flyer and the drone. The drone then activates return to home mode and it will then fly back to the position where it had signal with its flyer. Someone described it as the final piece in a prison s security puzzle. I think it could have a significant worldwide impact. Gill said the technology neither hacks nor damages the drones. The technology can combat the increasing number of unmanned aerial vehicles that are being dispatched to jails to drop off illicit goods that are fuelling growing violence and disorder among inmates. Les Nicolles prison is a mixed category jail with 139 inmates. Prison governor David Matthews said: This is the first time this technology has been used in any prison anywhere in the world.

I would like to see it adopted in other UK prisons because it has become a significant problem there. Drones can carry weapons, contraband, mobile phones and drugs. This is about prevention. The Drone Zone one again returns to IFSEC International in June for its 2017 edition. Brought to you in partnership with The UK Drone Show, the Drone Zone will feature demonstrations of drone and anti-drone technology from Yuneec, Dedrone, Hitachi and Magos. The Drone Zone will form part of Borders & Infrastructure Expo, a brand new show within IFSEC dedicated to the protection of borders and critical national infrastructure. Get your free badge for IFSEC 2017 now. Join other high-end security professionals at the launch of Borders & Infrastructure Expo In conjunction with Europe s most renowned security event , IFSEC International, B&I is addressing your critical needs for large scale security projects affecting national security, integrated systems, border protection and much more. You will have access to test the latest security innovations in; Physical & perimeter, Barriers & bollards, Command & control, Emergency response, Cyber solutions, Drones & UAVs, Transport security and much more.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

CornerStone Corporate Independent Security Consultants

CornerStone is an award winning, independent security consultancy firm providing a range of Security Design, Engineering and Risk Management Services. We help organisations protect their people, premises, intellectual property and profits by identifying security threats and minimising the risks that today’s global businesses face. We provide some of the largest and most successful companies in the world with expert guidance, unbiased advice and support across our specialist areas of activity.

Learn More1


  1. ^ Learn More (

Genetec announced as sponsor for Borders & Infrastructure Expo

IFSEC International 2017 Genetec, the company behind unified security platform Security Center, has been confirmed as sponsor for IFSEC International s brand new show within a show , Borders & Infrastructure Expo (20-22 June 2017). Genetec is a good fit for Borders & Infrastructure Expo, which is pitched at critical national infrastructure. The company s security systems are popular in the enterprise space, with many customers in high end retail, train stations, airports Genetec systems are installed in 70% of airports in the Middle East and the the city surveillance space.

Its most prominent platforms are Security Center, which unifies access control, surveillance and ANPR systems; the Omnicast IP video management system (VMS); the Synergis TM IP access control system; and AutoVu automatic license plate recognition system. Cybersecurity is now a major focus. We recently spoke to Simon Cook, sales engineering manager EMEA and APAC, about the company s defining mantra: the security of security. embedded content Speaking at the show s launch event in October, IFSEC brand director Gerry Dunphy outlined the vision for a new show within a show which will meet the need for Britain s and the World s response to the growing terror and security threat. Borders & Infrastructure, which will take place between 20-22 June 2017 as part of IFSEC International and the wider Protection & Management Series, will feature products, solutions and visionary content aimed at central and local government, transport and utilities, sports stadia and events, logistics, border security and law enforcement, and offers a significant addition to the usual array of products and services that you can usually see at what is already Europe s largest security show. In view of the existing broad horizon of security products on offer at IFSEC, it will richly enhance IFSEC s position as the UK and Europe s industry-defining event in the security sector. IFSEC brand director Gerry Dunphy Dunphy outlined the reasoning s behind this welcome addition to the IFSEC lineup: The heightened terror threat, unprecedented migration levels and the growing cyber threat mean that demand is huge for a show like Borders & Infrastructure. Cyber security, counter-terror, border security and protecting critical infrastructure are near the top of the priorities list of governments in Europe and around the world. Attended by a wide range of manufacturers and customers including representatives from the Home Office s Security Industry Engagement Team, last night s guests heard keynote speaker Sir David Veness CBE, ex-Metropolitan Police and former UN Under-Secretary-General for Safety and Security, preview the findings of a London First report into the potential impact of Brexit on the security and resilience industries.

The event also included an address from the BSIA s Director of People, Trevor Elliott, who welcomed the addition of IFSEC s new event. Dunphy also added: In view of the existing broad horizon of security products on offer at IFSEC, it will richly enhance IFSEC s position as the UK and Europe s industry-defining event in the security sector. Borders & Infrastructure will take IFSEC to an even higher level, providing deeply enriching and strategic security solutions for major customers. With its own, distinctive branding, can sign up to an exclusive VIP 1-2-1 meetings service free of charge which matches them with potential suppliers, partners or customers. The event will serve as a hub for senior decision-makers from key verticals, government and law enforcement to strike major deals in procurement and supply contracts. The new event will feature everything from airport security tech to physical perimeter protection and even drones (the new area will incorporate the Drone Zone, which returns for a second year). UBM Group Director Simon Mills, who introduced last night s speakers, said: The strategic addition of Borders & Infrastructure to IFSEC is a historic moment in the 30-year-plus development of the IFSEC brand. It should be viewed as something very different to the show s more traditional elements. IFSEC International is proud to announce that Borders & Infrastructure has the support of the BSIA, ASIS, BRE Global and the Security Institute.

Visit Europe s leading security event in June 2017 Register here to attend IFSEC International where you will be able to take advantage of our meetings service, allowing you to select and meet with the manufacturers you want to see and with 600 companies exhibiting you are not short on choice. There are also discounts of up to 20% across a large range of products at the show, helping you to get the best value for your money. Click here to register your place now to join us at London Excel on 20 22 June 2017.

A brief history of the transformative effect of innovation on the physical security industry

Photo: Closed circuit TV monitoring at the Central Police Control Station, Munich, Germany, in 1973 When considering the role of technology in security, it s easy for those outside the industry to think about the cyber side of things. Of course, more traditional and physical security services have changed profoundly through technological innovation over the decades too. Keeping buildings and personnel secure historically depended on the use of eyes and ears, people looking and listening for intruders and potential threats.

However, technology has now evolved to a point where they don t work alone. CCTV CCTV is perhaps the prime example of this. A staple of physical security, it catches things that may be missed by patrolling eyes. It s come a long way since its inception too. Initially developed during the Second World War, closed-circuit television became commercially available in 1949 and a domestic version was granted patent in 1969. There was one big problem, though: there was no functionality for recording so constant monitoring of the playback screen was required to render the system useable. CCTV 1980s style Things got easier in the 70s with the emergence of the VCR. Video surveillance and security were boosted dramatically. Monitors could be left unattended, safe in the knowledge that nothing would be missed.

Concrete proof of anything happening could be attained and criminals caught on the back of captured video. Further advancements in technology allowed CCTV to further tighten security. The VCR, which wasn t exactly renowned for its image and video quality, was supplanted by superior digital technologies throughout the 90s and noughties. Better resolution, more efficient storage and easier retrieval made for the basis of new innovations. In modern times, high-definition display and cloud-based systems have made for further improvements including an ability to monitor larger areas and provide clearer views of perpetrators if required. Walkie-Talkies Affectionately known as walkie-talkies, handheld transceivers play a pivotal role in many security setups, particularly larger ones. Offering instant communication, they are used by the likes of the police forces and military units around the world. They have helped to secure some of the toughest climates it the world and continue to do so. The initial eyes and ears model of physical security is toughened up with findings being able to be reported immediately.

This is of particular use when findings are time sensitive, for example, a thief running from the scene of a crime. A very able deterrent, walkie-talkies provide the link between seeing and doing that is so often need when it comes to security. Lighting So simple yet powerfully effective, security lighting illuminates an area making it easier for potential wrongdoers to be seen. Whilst it may seem pretty straightforward on the surface, many elements of lighting have had to change over the years to make them it as competent as it is today. Whilst bright lights have always been used, lighting that is overbearing can actually make it harder to see from the outside. On top of this, mismanaged lighting setups can result in glare, which again has an impact on the ability to see what is going on. There are also considerations needed for the processes for monitoring the illuminated area human eye or CCTV. With this in mind, lighting has been crafted to stand in line and not potentially be obstructive to security. Illuminated glows that highlight areas are likely to deter criminals, boosting surveillance.

Alarms Visual and audible deterrents in equal measures, security alarms are incredible at their job. The usual sensors used in these systems are PIR sensors will trigger an alarm when a person walks past. They ve stood the test of time for sure but more advanced technology is making for a new level in alarm security. There are a whole host of alarm triggers and actions that can be used to further strengthen and safeguard premises. Modern triggers may include: Glass or windows breaking Vibrations, such as those in building attacks Increased soundwaves, sometimes ultrasonic Photo-electric beams, laser alarms In most cases, security is strengthened thanks to the high-pitched sound that is made when one of these is triggered. More modern approaches can use a number of alternative actions based on a specific environment. Doors can be slammed shut, CCTV can begin rolling and services halted to protect anything of value. Biometric Recognition Technology Limiting access to certain areas can sometimes be tricky. Recognition software, however, takes all of the difficulty away whilst simultaneously improving security.

There are three main types facial, iris and fingerprint. All three provide stronger protection than a key. Without pre-cleared fingerprints, iris patterns or facial features, entry is impossible. These systems generally work very well. Fingerprint identification is impossible to clone or fool so is mightily secure. Early versions of facial and iris recognition software came in for criticism as they were sometimes able to be manipulated by using photos of somebody with authorisation. Later and more modern versions have been developed with a view to eliminating such problems. Advanced technology means that it is much harder to crack these systems, tightening security significantly. Shut Down Rooms In a similar way to light sensors detecting no movement and turning lights off, some people have implemented whole rooms based on such technology.

The benefits of this from a security viewpoint are huge. Where rooms are keeping sensitive information and valuable possessions, it is often imperative that strong security measures are in place. Timers can be set to manage closing and locking windows, powering down electronics (which may require a password to turn on again) and locking doors. Rooms can also be shut down manually or remotely offering controlled security for any situation. An Evolving World Although physical security still has somewhat of a dependence on eyes and ears, technology has played a huge role in its advancements over the years. There are literally thousands of ways in which security has benefitted from advancements made in tech and will surely find even more further on in the future. Chris Perry of NVC Security works to make more secure environments a reality. From outdoors to indoors and commercial to domestic, he believes tech can help in all areas of security. Visit Europe s leading security event in June 2017 Be the first to see the very latest in security tech for 17/18 at IFSEC International, where around 600 manufacturers will be attending, including this year s new additions to the show; OSI Electronics, Redvision, L3, ABLOY, Cisco and Meraki to name just a few.

Not only that, in a constant strive to offer our visitors the best ROI possible, IFSEC this year is launching a brand new discounts programme. We are able to offer discounts averaging 20% across a large range of products at the show. Click here to register your place now to join us at London Excel on 20 22 June 2017.

Keeping the lights on: 3 steps to protecting UK energy assets

Critical infrastructure around the world is under pressure. Reports of cyber and physical threats facing electricity substations, in particular, are becoming more common. In the UK, the Centre for the Protection of National Infrastructure (CPNI) takes the lead in advising critical infrastructure companies on how to protect their assets, with a particular focus on cybersecurity.

But does this advice go far enough? In the US, a recent update in regulation from the North American Reliability Corporation (NERC) has reiterated the importance of physical grid protection. The new regulations, announced last September, required updated physical security plans from certain US electric substations to ensure they effectively deter, detect, delay, assess, communicate and respond to physical threats. The ambitious new set of federal security standards (called Critical Infrastructure Protection 014, or CIP 014) has been debated by the U.S industry for some time, but is now being rolled out nationwide. Substations had until the end of 2016 to get their plans approved, with the goal of ensuring all were prepared by 2017 to act quickly in the event of a physical attack. NERC CIP 014 represents a step in the right direction towards a more-robust grid, and one that the UK s critical infrastructure could stand to learn from. The power grid is a complex and sensitive network that lights our homes, fuels our mobile devices, and keeps our food fresh. IFSEC International is launching Borders and Infrastructure for its 2017 edition. Find out more about this new show within a show dedicated to the protection of utilities and other critical national infrastructure, counter terror and border security Not even the most isolated rural communities, let alone utility companies, could afford power outages in the event of an attack.

While cybersecurity rightfully dominates the headlines, it s still important for each substation, regardless of its importance to the network, to protect itself from physical threat. The key is implementing a sustainable early warning system that can reduce risk, while maintaining compliance with UK regulation. This can be achieved with a three-pronged strategy that operators can manage through a single user interface. Step one: Make the perimeter smart For many substations, the first line of defense is still very basic. Just a simple chain-link fence and padlocks is not enough to adequately protect these sites. In reality, advanced sensors should be considered the bare minimum of a perimeter defense system. By building a network of advanced sensors and radar equipment, coupled with video, substations not only keep unauthorized persons off the property, but are also notified before an incident occurs. Awareness of an approaching threat, even if its just minutes in advance, can give authorities the opportunity to react quickly and pre-empt any risk to the site. The most successful security solution is one that can integrate a perimeter with video management and access control, using one central management system.

This means the perimeter solution itself can combine visitor management, access control, video management and intrusion into one platform. All of these parts should integrate to enable security staff monitoring the substation remotely to make quick, informed assessments of alarm conditions for the most accurate and efficient response possible. Step two: Choose video analytics over fancy cameras Although quality of image is important, just investing in the most expensive cameras available is not the answer for adequately protecting a substation. Today, the true benefit of video surveillance is in its intelligence and analytics capabilities. Video should work seamlessly with the motion detection systems on a site to capture multiple images offering different views, site navigation and event verification which are then sent to the alarm receiving centre for assessment. There, the first responder can confirm a threat, make a judgment and, in cooperation with physical security systems, select the appropriate next course of action in real-time, arming or locking areas as needed. Smart video capabilities not only provide live detailed insight, but they deliver the proof necessary for alarm verifications and third party evaluations. The ability to assess alerts in real time reduces unwanted activations and allows staff to take action swiftly and remotely at a moment s notice. Step Three: Better access control Physical security has evolved to reach beyond simply securing a physical structure.

Today, access control combines managing human activity and electronic alarms by requiring operators to regulate which specific individuals can enter specific areas during pre-determined times, as well as monitoring for unauthorised access to a site. This is essential for substations undergoing maintenance, for example, where vendors may need to access to sensitive areas. Establishing a comprehensive and effective access control system, which authorises who can go where with items such as key control and entry logging, can also help reporting run smoothly and make sure the facility is protected from internal threats. The time to comply is now The utility industry is one of the most regulated industries in the world. Substations have a responsibility to be more secure than the links on a padlock chain, and many of them still need assistance and resources to get there. For a security solution to be successful, every element including the technology, logistics planning, implementation and life cycle planning must be thoughtfully considered and managed. There s no better time to power up as the regulations will only continue to tighten. It s in everyone s best interest to talk about updating utility security plans now, to avoid being left in the dark in the future. IFSEC International is launching Borders and Infrastructure for its 2017 edition.

Find out more about this new show within a show dedicated to the protection of utilities and other critical national infrastructure, counter terror and border security Join other high-end security professionals at the launch of Borders & Infrastructure Expo In conjunction with Europe s most renowned security event , IFSEC International, B&I is addressing your critical needs for large scale security projects affecting national security, integrated systems, border protection and much more. You will have access to test the latest security innovations in; Physical & perimeter, Barriers & bollards, Command & control, Emergency response, Cyber solutions, Drones & UAVs, Transport security and much more. Click here to register your place now to join us at London Excel on 20 22 June 2017.