Actionable Business Security ­Intelligence

March 2016 Conferences & Events, Security Services & Risk Management

The economic downturn in recent years is but one factor contributing to increasing crime rates, particularly business crimes. Increases in systematic and violent organised crime have led to an unprecedented demand on police and protective security resources and highlighted a requirement for a SMART (Simple, Measurable, Achievable, Realistic and Time Bound) approach to the collection, collation and analysis of Business Security Intelligence to develop a security posture that is predictive, with a view to being preventative.

Crest Advisory Africa and Hi-Tech Security Solutions are providing a new training course in 2016 specifically to address Business Security Intelligence. The purpose of this course is to develop an understanding of the holistic Business Security Intelligence landscape, including the collection, collation and interpretation of all applicable and relevant business intelligence, through to its analysis to deliver actionable information to reduce or eliminate the incidence of crime or unacceptable incidents. This approach will ensure that the provision of protective security supports key business objectives by being intelligence-led and effective, economic, responsive and resilient.

The programme will include the following elements:

• What is Business Intelligence?

• How does Business Intelligence relate to risk management?

• Business Security Intelligence and its contribution to the achievement of strategic business objectives.

• Potential sources of information and intelligence.

• Legal requirements and responsibilities.

• Information sharing protocols, policies and procedures.

• Recording of information and intelligence reports.

• Analysis and interpretation of data.

• Refining information into actionable intelligence.

• Intelligence derived from investigations.

• Layered approach to intelligence utilisation.

On completion of this course, participants will be able to:

• Establish a framework for the development and implementation of Business Security.

• Intelligence processes within an identified business environment.

• Research and design a cost-effective Business Security Intelligence programme within an identified business environment.

• Develop a well-structured intelligence driven Operational Implementation Plan.

• Ensure that the resources committed to Business Security Intelligence are:

- Appropriate to the needs of the business and complement business operations.

- Support business objectives.

- Effective, economic, responsive and resilient.

• Limit the impact of crime on business operations by reducing the likelihood and consequences of occurrences.

• Reduce the financial losses incurred as the result of a crime by the development of Business Security Intelligence processes.

• Support business objectives by the integration of the Business Security Intelligence with other related business systems, such as competitive intelligence and environmental analysis processes.

Who should attend?

• Operations managers.

• Facility managers.

• Facilities managers.

• Safety and security managers and supervisors.

• Safety and security investigators.

• Support management.

• Risk managers.

• Procurement and due diligence investigators.

For more information contact Crest Advisory Africa, (011) 534 8454, http://www.crestadvisoryafrica.com/training-courses/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
What you can expect from digital identity in 2024
Access Control & Identity Management Security Services & Risk Management
As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur.

Read more...