Whistleblowers And The Risk To Reputation

by Tony Jaques Whistleblowers are a well-recognised possibility in most organisations. But how the organisation responds to a whistleblower can help determine whether the problem exposed becomes a reputational crisis. The important lesson from such cases is that how a whistleblower is handled can sometimes trigger reputational damage even greater than the original issue. Management experts advise that whistleblowers … [Read more...]

Confronting an ISIS Emir: ICSVE’s Breaking the ISIS Brand Counter-Narrative Videos​

Most experts agree that the most successful counter-messaging campaigns against ISIS are the ones that utilize the voices of insiders: the voices of ISIS victims and ISIS cadres themselves who have first-hand knowledge of the group’s brutality, corruption, religious manipulation, and deception. In this regard, we at the International Center for the Study of Violent Extremism (ICSVE) have spent the last two years … [Read more...]

Expectations In An Emergency

When the theme of this edition, After the Atrocity, was proposed, my first thought was that I have done a few similar articles recently, but then I considered my involvement in the responses to a number of atrocities and the issues they had in common. Firstly, exercises and training are rarely accurate. That is not because they are not developed from real experience, or that they are not done with the best of … [Read more...]

Houston: We Have A Problem!

The recent film Hidden Figures tells the story of the impact three African-American women had on the National Aeronautics and Space Administration (NASA) space program in the 1950s and 60s. The movie highlights the struggle these women experienced working in a male-dominated industry. Fast forward to 2017 and women are still vastly underrepresented in the science and technology industries. I recently met a young woman … [Read more...]

Health Preparedness And Australian Counterterrorism Strategy

Killings carried out by terrorists are becoming worse and more gruesome to achieve the shock factor. While there is no suggestion of any new specific terrorist threat to Australia, the Australian Government is looking again at security for public events following last year’s Bastille Day attack to make sure that all necessary arrangements are in place. The Nice attack, where Mohamed Lahouaiej Bouhlel ploughed a truck … [Read more...]

Hikvision and Cisco Hold Joint Meeting on Cybersecurity Collaboration in Hangzhou

Cisco recognizes Hikvision’s dedication to safe R&D management Hikvision, the world’s leading supplier of innovative video surveillance products and solutions, together with Cisco, the worldwide leader in IT and networking, held a joint meeting on cybersecurity collaboration on April 26, 2017 in Hangzhou, China. This meeting marked the successful completion of the first phase of a collaboration that began in … [Read more...]

Steven Seagal banned from Ukraine as he’s deemed a ‘security threat’.

According to a recent report by UK news service The Sun, action star Steven Seagul has been banned from entering the Ukraine for five years after the security services (SBU) labelled him a security threat. The ban comes in the wake of Seagul receiving a Russian passport from Russian President Vladimir Putin during a visit with American actor Steven Seagal in the Kremlin late last year. According to the report, a … [Read more...]

Employee Theft Consequences: Risk vs. Gain Theory

Herman Laskey, Jr., LPQ, CFI from losspreventionmedia.com When associates properly understand employee theft consequences, they may not ever take the risk of being dishonest in the first place. I have found that discussing with associates the risks of theft and comparing them with the potential gains greatly reduces their potential to steal from their employers. Most associates do not consider the punishments and … [Read more...]

Security Research Projects – call for input

The Australian Security Association Limited (ASIAL) recently announced that it was seeking volunteers for two separate research projects into the security industry. The first project, titled Understanding capacity for violence risk assessment in private security workers, focuses on the role of private security staff working crowd control and conducting the regular assessment of patrons for signs of intoxication, risk, … [Read more...]

Crisis or disaster? IT has helped blur the language

By Dr Tony Jaques It’s time business stopped misusing the word disaster, and the IT industry needs to take a good share of the blame. This language is genuinely unhelpful and distracts attention from serious matters of real concern. Consider by contrast the United Nations definition of a disaster as: “A serious disruption of the functioning of a society, causing widespread human, material or environmental losses and … [Read more...]

Cyberespionage and ransomware attacks are on the increase warns the 2017 Data Breach Investigations Report

Cyberespionage hits manufacturing, public sector and education hard: 21 percent of cases analysed Ransomware attacks gain greater popularity: now fifth most common specific malware variety Tenth anniversary edition: includes data from 65 contributing organisations; 42,068 incidents; 1,935 breaches from 84 countries Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and … [Read more...]

How To Manage An Experienced Manager

The key to managing an experienced manager in your operation is to monitor their results. If they are getting the results that you expect of them, stay out of their way. If they are not getting the results, you had better take over – at least until you sort out what is stopping production. When you hire a manager to look after a section of your business, it is a waste of time for you to continue doing the job you hired … [Read more...]

ICSVE’s New “Breaking the ISIS Brand” Video Clip – The Promises of ad-Dawlah to Women

By Anne Speckhard, Ph.D. Laura Passoni left Belgium with her young son to join ISIS in Syria in June 2014 after being jilted by her partner. Newly married to man who also wanted to join ISIS, the two took a cruise boat from Venice to Izmir and crossed Turkey by taxi and made their way (unimpeded by Turkish authorities) into Syria. None of the promises of her Belgian recruiter turned out true and Laura ended up a … [Read more...]

STid wins the Award for Best Access Control Mobile App at ISC West, Las Vegas

The Security Industry Association (SIA) awarded STid with its Mobile Apps trophy for its secure and intuitive access control solution, STid Mobile ID®. The SIA awards are a key moment for the security industry, introducing over 30,000 professionals from the sector to the most secure and innovative solutions on the market. On April 5th STid, a leader and a pioneer in the design of high-security solutions, won the Gold … [Read more...]

Protecting Sensitive Sites In A Changing World

In the wake of various terrorist attacks that have been carried out around the world in recent years, sensitive sites are facing a broader range of potential threats than ever before. These atrocities have been characterised by their unexpectedness and the difficulties involved in protecting against them. As a result, businesses are re-evaluating their defence systems in search of a complete security solution, but it is … [Read more...]

Risk Management After the Atrocity

For this issue, I was asked to write about risk management as it would apply in the aftermath of a terrorist attack. It is an interesting subject because if risk management strategies had been effective then arguably, the atrocity would not have occurred. However, disturbing surprises and risk management failures do happen. I want to look at risk management from the point of view of both sides - those on the receiving end … [Read more...]