Current affairs
subject, may prefer to look through the opening pages overviewing the issues and the UK security environment generally. With that as a background, the handbook guides the reader in areas of procurement and security management, including help with obtaining additional advice. A description of the principles and the
‘state of the art’ in the various sectors of security then follows – physical security, access control, electronic security, manned services and CCTV, including the essential topic of privacy legislation. However, the book recognises that there are security challenges for managers for which a purely technical solution may not be enough – namely robbery, cyber risk and the increasingly troubling threat of building occupation by groups of travellers, who wreak havoc and are not easily dislodged. There was a time in the ’60s and ’70s when acquisitive crime was rampant and our criminals were held to be the best in Western Europe, if not the world. However, at a point in the ’90s, technological development allowed security products to become more effective and respectable.
Experts hold that such technological
advancement, as well as the huge national rollout of security in our country over the years, lay behind the improvement in crime statistics following their peak in 1995. Now however, there is no room for complacency, since the trend appears to be reversing at a time when a lot of the security out there is now of the ‘legacy’ variety. Academic studies involving interviews with offenders leave no doubt that most crimes involve calculation and planning to one degree or another, and that criminals differentiate between outdated equipment and our present day technology. Therefore, there is all the more reason
to revisit the security exposure of the organisation, and to consider whether the action originally taken has stood the test of time. If not, I commend the pages of the Security Handbook as the place to start the remedial process
Mike Jay is convenor of the RISCAuthority security group and author of the Security Handbook. For more information, view page 5
FOCUS
Half page ad
template.indd 1
19/01/2018 16:34:14
www.frmjournal.com MARCH 2018 53
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60