search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Global risks reshaping


urban security I


A challenging and evolving market


For most of the past three decades, security planning in cities could treat geopolitics as context rather than cause; it set the background tone but rarely wrote the score. That assumption no longer holds. The strategic environment is shifting in ways that are not just visible to specialists but tangible to operators on the ground. Global alliances are less predictable, supply chains are more fragile, grey zone competition is now a permanent feature of statecraft, and technology has collapsed the distance between global intent and local impact.


In this “always on” world, risk takes less time to travel and more effort to contain. You can see it in markets that swing on diplomatic signals. You can see it in the way disinformation can amplify an otherwise routine incident into a reputational crisis by the end of a single news cycle. And you can see it in the vulnerability of digital infrastructure, where the boundary between public service and private platform is increasingly porous, and failure in one domain cascades into the other.


Cities sit at the centre of these dynamics because they concentrate what geopolitics seeks to influence: people, capital, infrastructure, and visibility. A city


n this thought‑provoking article, Charles Anderson of Pilgrims Risk Management Group examines how shifting global dynamics are reshaping the foundations of urban security. He explores how today’s volatile alliances, fragile supply chains, and rapid technological change are transforming what it means to manage risk in the modern city.


is not simply a geography, it is a system of systems. Transport, energy, water, healthcare, finance, data – each node within those systems now has geopolitical relevance. An adversary does not just need to breach a perimeter to change conditions anymore; they can exert pressure through supply chains, regulatory levers, cyber intrusions, or information operations, all of which are more accessible, deniable, and scalable. The consequential attacks in this environment are often incremental rather than spectacular, a series of probing incidents that together degrade confidence, create friction, and absorb capacity.


Much has been written about the “blurring line” between war and peace, but the most practical consequence for the security industry is more mundane: ambiguity has become operationally expensive. When activity is deliberately designed to remain below thresholds that trigger formal escalation or emergency powers, responsibility drifts downward to those who manage everyday services. The security operator must decide whether a software anomaly is an engineering fault or a hostile reconnaissance step. The local authority must weigh the risks of a contentious protest that is simultaneously a civic right and a potential information operation. The security director of a data


5 © CITY SECURITY MAGAZINE – SPRING 2026 www.citysecuritymagazine.com


centre must treat a sudden change in power quality not only as a maintenance issue but as a possible attempt to test resilience. In each case, geopolitics is not the subject line, it is the subtext that changes the risk calculus.


If this sounds complex, it is. Yet it is also an invitation to reframe what “good security” looks like. In a volatile strategic landscape, the most valuable security asset is not a single technology or a single plan, but a posture or culture. Anticipatory, collaborative, and grounded in a candid understanding of dependencies. The posture begins with intelligence. Properly defined, this is not merely reporting or threat feeds, but the systematic conversion of information into decisions. It is horizon scanning that is actually tied to operational playbooks. It is geopolitical monitoring that translates into procurement choices, staffing plans, and vendor risk assessments. It is “red teaming” that tests narratives as well as networks, recognising that reputational disruption can be as damaging to a client’s functioning as a technical failure.


The second component of posture is integration. Security has always required partnership between public authorities and private operators, but the collaboration needed now is qualitatively different. It must move from just incident coordination to shared situational awareness, from information sharing as an aspiration to information sharing as an operational dependency. When a cyber intrusion targets a municipal system, the most valuable insights may sit with private sector telemetry. When a supply chain


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36