Actionable Business Security ­Intelligence

March 2016 Conferences & Events, Security Services & Risk Management

The economic downturn in recent years is but one factor contributing to increasing crime rates, particularly business crimes. Increases in systematic and violent organised crime have led to an unprecedented demand on police and protective security resources and highlighted a requirement for a SMART (Simple, Measurable, Achievable, Realistic and Time Bound) approach to the collection, collation and analysis of Business Security Intelligence to develop a security posture that is predictive, with a view to being preventative.

Crest Advisory Africa and Hi-Tech Security Solutions are providing a new training course in 2016 specifically to address Business Security Intelligence. The purpose of this course is to develop an understanding of the holistic Business Security Intelligence landscape, including the collection, collation and interpretation of all applicable and relevant business intelligence, through to its analysis to deliver actionable information to reduce or eliminate the incidence of crime or unacceptable incidents. This approach will ensure that the provision of protective security supports key business objectives by being intelligence-led and effective, economic, responsive and resilient.

The programme will include the following elements:

• What is Business Intelligence?

• How does Business Intelligence relate to risk management?

• Business Security Intelligence and its contribution to the achievement of strategic business objectives.

• Potential sources of information and intelligence.

• Legal requirements and responsibilities.

• Information sharing protocols, policies and procedures.

• Recording of information and intelligence reports.

• Analysis and interpretation of data.

• Refining information into actionable intelligence.

• Intelligence derived from investigations.

• Layered approach to intelligence utilisation.

On completion of this course, participants will be able to:

• Establish a framework for the development and implementation of Business Security.

• Intelligence processes within an identified business environment.

• Research and design a cost-effective Business Security Intelligence programme within an identified business environment.

• Develop a well-structured intelligence driven Operational Implementation Plan.

• Ensure that the resources committed to Business Security Intelligence are:

- Appropriate to the needs of the business and complement business operations.

- Support business objectives.

- Effective, economic, responsive and resilient.

• Limit the impact of crime on business operations by reducing the likelihood and consequences of occurrences.

• Reduce the financial losses incurred as the result of a crime by the development of Business Security Intelligence processes.

• Support business objectives by the integration of the Business Security Intelligence with other related business systems, such as competitive intelligence and environmental analysis processes.

Who should attend?

• Operations managers.

• Facility managers.

• Facilities managers.

• Safety and security managers and supervisors.

• Safety and security investigators.

• Support management.

• Risk managers.

• Procurement and due diligence investigators.

For more information contact Crest Advisory Africa, (011) 534 8454, http://www.crestadvisoryafrica.com/training-courses/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Look before you leap into a back-up power solution
Editor's Choice Security Services & Risk Management
Before you rush into purchasing a back-up power solution, you need to take a considered and long-term view of how to get yourself as close to grid independence as possible.

Read more...
All-mobile people management solution with facial recognition
Editor's Choice Integrated Solutions Security Services & Risk Management Products
The new mobile Incident Desk People Management platform with facial recognition combines identification data on suppliers, staff, sub-contractors and even people on watch lists, for less than the cost of traditional service management tools.

Read more...
Passion, drive and hard work
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
Colleen Glaeser is a leader in the security market, having made her mark in the male-dominated security industry through determination and hard work, along with a vision of making the world a safer place.

Read more...
Are you your insider threat?
Technews Publishing Editor's Choice Security Services & Risk Management Commercial (Industry)
Insider threats are a critical aspect of risk management today, but what happens when it is the owner of the company acting fraudulently and making sure none of his staff can catch him?

Read more...
Trackforce Valiant acquires TrackTik Software
News Integrated Solutions Security Services & Risk Management
Trackforce Valiant, a provider of security workforce management solutions, announced the acquisition of TrackTik Software, a cloud-based security workforce management provider.

Read more...
Securex back with a bang
Technews Publishing Editor's Choice News Conferences & Events
After a long absence, Securex 2022, the 29th edition of the event, went ahead without a hitch and received positive reviews from visitors and exhibitors.

Read more...
Significant increase in fraud in a risk-heavy environment
News Security Services & Risk Management
The Southern African Fraud Prevention Service reports a significantly increased risk of becoming a victim of fraud as compared to 2021.

Read more...
The components of and need for cyber resilience
Cyber Security Security Services & Risk Management
Organisations need to implement a comprehensive cyber resilience solution with data protection, backup, disaster recovery and business continuity to protect against ever-more complex and rising cyberthreats.

Read more...
Is the smoke beginning to clear for password security?
Access Control & Identity Management Security Services & Risk Management
The password problem is the result of bad habits, and they can be hard to break. But ask anyone that has done it and they will not tire of telling you the benefits.

Read more...
The benefits of investing in whole-house surge protection
Smart Home Automation Security Services & Risk Management Residential Estate (Industry)
When you consider that the potential for equipment damage can run well into the hundreds of thousands of rands, whole-house surge protection is a worthwhile expense.

Read more...