Actionable Business Security ­Intelligence

March 2016 Conferences & Events, Security Services & Risk Management

The economic downturn in recent years is but one factor contributing to increasing crime rates, particularly business crimes. Increases in systematic and violent organised crime have led to an unprecedented demand on police and protective security resources and highlighted a requirement for a SMART (Simple, Measurable, Achievable, Realistic and Time Bound) approach to the collection, collation and analysis of Business Security Intelligence to develop a security posture that is predictive, with a view to being preventative.

Crest Advisory Africa and Hi-Tech Security Solutions are providing a new training course in 2016 specifically to address Business Security Intelligence. The purpose of this course is to develop an understanding of the holistic Business Security Intelligence landscape, including the collection, collation and interpretation of all applicable and relevant business intelligence, through to its analysis to deliver actionable information to reduce or eliminate the incidence of crime or unacceptable incidents. This approach will ensure that the provision of protective security supports key business objectives by being intelligence-led and effective, economic, responsive and resilient.

The programme will include the following elements:

• What is Business Intelligence?

• How does Business Intelligence relate to risk management?

• Business Security Intelligence and its contribution to the achievement of strategic business objectives.

• Potential sources of information and intelligence.

• Legal requirements and responsibilities.

• Information sharing protocols, policies and procedures.

• Recording of information and intelligence reports.

• Analysis and interpretation of data.

• Refining information into actionable intelligence.

• Intelligence derived from investigations.

• Layered approach to intelligence utilisation.

On completion of this course, participants will be able to:

• Establish a framework for the development and implementation of Business Security.

• Intelligence processes within an identified business environment.

• Research and design a cost-effective Business Security Intelligence programme within an identified business environment.

• Develop a well-structured intelligence driven Operational Implementation Plan.

• Ensure that the resources committed to Business Security Intelligence are:

- Appropriate to the needs of the business and complement business operations.

- Support business objectives.

- Effective, economic, responsive and resilient.

• Limit the impact of crime on business operations by reducing the likelihood and consequences of occurrences.

• Reduce the financial losses incurred as the result of a crime by the development of Business Security Intelligence processes.

• Support business objectives by the integration of the Business Security Intelligence with other related business systems, such as competitive intelligence and environmental analysis processes.

Who should attend?

• Operations managers.

• Facility managers.

• Facilities managers.

• Safety and security managers and supervisors.

• Safety and security investigators.

• Support management.

• Risk managers.

• Procurement and due diligence investigators.

For more information contact Crest Advisory Africa, (011) 534 8454,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The components of and need for cyber resilience
Cyber Security Security Services & Risk Management
Organisations need to implement a comprehensive cyber resilience solution with data protection, backup, disaster recovery and business continuity to protect against ever-more complex and rising cyberthreats.

Is the smoke beginning to clear for password security?
Access Control & Identity Management Security Services & Risk Management
The password problem is the result of bad habits, and they can be hard to break. But ask anyone that has done it and they will not tire of telling you the benefits.

The benefits of investing in whole-house surge protection
Smart Home Automation Security Services & Risk Management Residential Estate (Industry)
When you consider that the potential for equipment damage can run well into the hundreds of thousands of rands, whole-house surge protection is a worthwhile expense.

Are you your insider threat?
Technews Publishing Editor's Choice Security Services & Risk Management Commercial (Industry)
Insider threats are a critical aspect of risk management today, but what happens when it is the owner of the company acting fraudulently and making sure none of his staff can catch him?

Passion, drive and hard work
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
Colleen Glaeser is a leader in the security market, having made her mark in the male-dominated security industry through determination and hard work, along with a vision of making the world a safer place.

Manage reckless driving while speed cameras are offline
Transport (Industry) Security Services & Risk Management
Motorists in Johannesburg have not been fined for infringing the law for almost a year, because the city hasn’t had any functioning speed cameras since May 2021.

Understanding the benefits of connectivity management
IT infrastructure Security Services & Risk Management
As companies embrace digital, more of their services require connectivity to keep the business running; effectively managing the increasing complexity of this environment becomes a critical enabler for success.

Hytera showcases security communications at Securex
News Conferences & Events Products
Hytera will be at Securex South Africa 2022 in Hall 2, Stand A07, where it will showcase a variety of security communications solutions, including its latest DMR communications solution, body-worn cameras and Push-to-Talk over cellular.

What just happened?
Editor's Choice Security Services & Risk Management Retail (Industry)
Adriaan Bosch, head of Loss Prevention, Corporate Security at PEP Stores, talks about how intelligence, preparation and ensuring the flow of accurate information helped PEP Stores recover quickly from attacks on 283 stores.

Zero Trust in financial services
Editor's Choice Security Services & Risk Management
Hila Meller, BT vice president, Security, Americas, EMEA and APAC, highlights the eight guiding principles for Zero Trust in banking and financial services today.