What just happened?

Issue 3 2022 Editor's Choice, Security Services & Risk Management, Retail (Industry)

On the 9th of July 2021, South Africans woke up to images that resembled something out of the apocalypse, not real life. During the eight days of rioting and looting, 354 people lost their lives, an estimated R16 billion in damages were caused and 45 000 businesses were affected.

As a company we were the hardest hit and the first to have a store burned out. At the end of the eight days, we had 283 stores looted and 39 completely destroyed, equating to almost 10% of our total trading space. By December, however, we had reopened 236 stores to serve our remarkable customers in time for Christmas and the ‘Back to School’ period.


Adriaan Bosch.

Not only did the efforts of our department help to enable the business to provide essential goods and services in record time to our customers, but also job security to over 4000 employees and profit growth to our shareholders. Acting early on information in the weeks leading up to July, we had prepared our logistic network for a situation taking place and our 20 distribution centres and hubs were left unscathed.

Being forewarned prevented management from being overwhelmed by the events taking place on the ground and the team could focus on getting the business ready to reopen by securing materials to secure and rebuild our stores.

Critical to our success was the ability to collect relevant data, analyse the data to create intelligence and communicate the intelligence in a way to stakeholders, for them to make decisions and take decisive actions. Information management for us, as it is for everyone, is the pivot of Crisis Management and Response.

Information exchange management

The single most important function of any crisis management operation and the single most common cause of failure, is the ability to manage the flow of information. Timely and actionable intelligence can quickly build a trust relationship between the Crisis Response Team and decision makers, but the opposite is also true. Delayed and inaccurate information quickly erodes the trust of stakeholders that can paralyse the crisis response effort. Anything that creates blockages, delays or confusion within this process is likely to have a major and significant impact on the final outcome.

The problem in a crisis is not that there is not enough information, but that there is an overload of information, much of which will be contradictory and all of which needs to be assessed and judged as to its veracity, its relevance and its place in the overall picture.


Liana Bosch.

A crisis by its very definition will fall outside standard response and planned scenarios. Crisis Management Teams need to function under immense time pressure in an environment with constant threat escalation and quite often a lack of verified information. On top of that there is a constant need to transfer complex information under pressure between multiple stakeholders who need to make decisions, the lack of which could lead to catastrophic consequences.

The best tools to use in a crisis situation are the systems that are already available and familiar to everyone in the process. For us as a team, free instant messaging apps were critical to the teams in collecting, verifying and distributing information. The information was then easily compiled in a dashboard in a spreadsheet for the team to use and stakeholders to have a live view of changing events. (A template of the dashboard can be found at https://www.securitysa.com/ex/Crisis_Management_Dashboard.xlsx, or via the short link www.securitysa.com/*dashboard).

Your dashboard ideally needs to consist of the following aspects

1. Fact pattern

All information should be captured as and when it becomes available, to be verified by an eyewitness where possible. The minimum information of What, Where, When an event happened and Who reported is a good baseline of information.

2. Decision making

Crisis decision making is emergent not planned. Once the information has been verified and the real facts or problem is known, an effort can be made to anticipate consequences and solutions. Having a dynamic live dashboard enables a large number of people to come up with varied solutions looking at the same problem. Participants should also be encouraged to not only look at potential risk, but also any potential opportunities. A positive frame of mind goes a long way when days get long and situations darker.

3. Priorities

Solutions then need to be prioritised and delegated to a responsible person who needs to take ownership of the problem. It also helps to have specific deadlines to work towards and keep track of tasks that have been delegated.

4. Implementation

In the midst of the crisis the Crisis Response Team needs to be responsive and support operational teams on the ground, not direct them. As the crisis progresses and the overall picture becomes clearer, the Crisis Response Team can take a more active role in managing the sum of all the parts. Once priorities have been identified, the remedial actions can be categorised as: Immediate Actions; Delayed; Deferred; Omitted and Completed. Particularly in the beginning of the crisis, small victories should be celebrated. Being able to see even the small steps has a big impact on the morale of the Crisis Response Team and stakeholders alike.

5. De-escalation/re-escalation

Ultimately the aim is not to manage the crisis, but manage the organisation through a crisis. As soon as the situation warrants it, the de-escalation of the response should start and be suitably managed. There is often a threat of re-escalation during the crisis and sufficient resources should be kept in place until the crisis has passed.

Good record-keeping also adds great value in the after-action review. (What was done well, what could have been done better). Should there be a need to testify to a committee or a court, the information is precise and readily available to show the workings of the organisation during the crisis.

Information is worthless if it doesn’t lead to actions

“Real crisis management does not start when a crisis is discovered, but is an embodied value intrinsic to every aspect of an effective organisation’s operations. Risk attitude and culture will have the greatest impact on the ability of the organisation to identify potential crises at the earliest opportunity, to respond in a timely and appropriate manner and to embody the concepts of organisational resilience.” - Dr David Rubens, 2020, Institute of Strategic Risk Management.

The real loss of the July unrest would be if we don’t take the opportunity to learn from the event and improve our preparation and response. In a world of uncertainty, we can be certain of one thing, that there is a crisis over the horizon waiting for us. Take action now. Build mutually beneficial relationships, get consensus on working methods, but above all, ensure that you have a strategy and a structure in place to manage the exchange of information.

Adriaan Bosch is a member of ASIS SA. For more information on ASIS, go to www.asissa.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.