presentation private, personal and corporate security

25
Micro-Specialist Recruitment Group of 8 Specialist Recruitment Brands PHAIDON INTERNATIONAL

Upload: nicolalathom

Post on 09-May-2015

292 views

Category:

Engineering


1 download

DESCRIPTION

The recent ISIS insurgency in Mosul/ North Iraq has once again shown how vulnerable employees/ sub contractors are in emerging markets. As a result we asked 2 specialist speakers to share their experience and knowledge in protecting clients and personnel.

TRANSCRIPT

Page 1: Presentation   Private, Personal and Corporate security

Micro-Specialist Recruitment Group of 8 Specialist Recruitment Brands

PHAIDON INTERNATIONAL

Page 2: Presentation   Private, Personal and Corporate security

Assisting you to achieve your objectives safely and securely

Adam Brown

Page 3: Presentation   Private, Personal and Corporate security
Page 4: Presentation   Private, Personal and Corporate security

The Route

Page 5: Presentation   Private, Personal and Corporate security

Content• About us• Understanding threat and duty of care– What your company should give / could give

• Mitigating the threats and risk– Planning, training, awareness, oversight

• Preparedness– What to do if – the ‘actions on’ to be taken in

various situations

Page 6: Presentation   Private, Personal and Corporate security

About us• Former UKSF• Global experience, commercial and military,

tactical – strategic• Supporting Companies, NGOs and HNWI

achieve their specialist security solutions• The team (physical, technical and cyber)• The Anuera approach (integrated)

Page 7: Presentation   Private, Personal and Corporate security

We understand organisations like yours have to operate effectively in what are complex,

challenging and at times hostile environments.

Traditionally security companies offer standard solutions that are not necessarily tailored to

the your specific needs, operational profile or risk tolerance.

This is not how we do business.

Page 8: Presentation   Private, Personal and Corporate security

“Private-sector preparedness is not a luxury; it is a cost of doing business in the post-9/11

world. It is ignored at a tremendous potential cost in lives, money and security.”

The 9/11 Commission Report

Page 9: Presentation   Private, Personal and Corporate security

Understanding the threat• Determining the risks• Why do it• The level of threat – capability and intent• The types of threat– Terrorism (international and national)– Activists– Disgruntled employees– Crime– Wrong place wrong time

Page 10: Presentation   Private, Personal and Corporate security

Countering the threat• Protecting your most critical assets – your

personnel • Representative critical impacts• Security Master Plan• Case Study

Page 11: Presentation   Private, Personal and Corporate security

Operational Risk Management

Page 12: Presentation   Private, Personal and Corporate security

Examples• Linked into past performance we will

look at the following:– Loss of governance (coup d’etat)–War–Kidnap

Page 13: Presentation   Private, Personal and Corporate security

Loss of governance - Mali• Visiting Bamako on a BD trip• During the night you hear gunfire in the street• You think nothing of it and go back to sleep• In the morning you look out of the hotel window and see this!

Page 14: Presentation   Private, Personal and Corporate security

Situation change….• You turn on France24, it doesn’t work• The only available news channel is showing you this:

Page 15: Presentation   Private, Personal and Corporate security

What do you do next?• Try to phone the office in London?• Try to speak to the companies that you are

visiting?• Ask the hotel staff what’s going on?• Contact the British in country representation?• Stay in the hotel?• Try to get a taxi to the airport?• Take a train to Senegal?• Self drive to Burkina Faso?

Page 16: Presentation   Private, Personal and Corporate security

War - Lebanon 2006

Page 17: Presentation   Private, Personal and Corporate security

Lebanon 2012

Page 18: Presentation   Private, Personal and Corporate security

Lebanon• 2006 Israeli Military moved fast• Hezbollah locked down city within 45mins• Airport attacked• Pressure on foreign government to evacuation

expats

• Syria war “overspill”• Chemical weapons worries• Concern that Hezbollah would mount attacks

from Lebanon

• How much risk do you tolerate?

Page 19: Presentation   Private, Personal and Corporate security
Page 20: Presentation   Private, Personal and Corporate security

Who gets kidnapped?• Diplomats• Business people (foreign / domestic)• Manual workers (engineers / construction)• Oil & Gas Workers• NGO’s• PSD members• Journalists• Members of the public

Page 21: Presentation   Private, Personal and Corporate security

Key mitigation measures• Good journey management• Understand threat (FCO advice / intelligence)• Use of PSD in country (visible deterrent)• Secure communications• Retain situational awareness• Don’t take unnecessary risks• Have specialist insurance policy in place• TREAT – TRANSFER – TERMINATE - TOLERATE

Page 22: Presentation   Private, Personal and Corporate security

Organisational Challenges • How do we calculate risk?• How do we predict key risk events?• How do we improve our organisations resilience to cope with unforeseen

risk events?• What is our risk appetite i.e. what level of risk are we prepared to tolerate

before terminating operations?• How do we identify and manage threats against our enterprise?• What are the financial impacts of getting it wrong?• What are we legally bound to do in order to satisfy duty of care to

employees and contractors?• How do we communicate risk across our organization?• How much time and energy do we spend on ERM?• What assurances can we expect that our embedded Consultants have

sufficient security measures in place?• How do we manage risk across a joint venture?• How are we going to evacuate our staff if it all goes wrong?

Page 23: Presentation   Private, Personal and Corporate security

It’s all about the Risk…

Page 24: Presentation   Private, Personal and Corporate security

Operational Risk Management Asset Identification (Tangible / non-tangible)

Risk Review

Threat Identification / Assessment

Select and implement response

Vulnerability Identification / Assessment

Assess Risk

Identify Counter-measure Options

Reassess Risk

Page 25: Presentation   Private, Personal and Corporate security

Questions / Discussion

Contact us:[email protected]@anuera.comwww.anuera.com