30 Oct 2019

Security Managers budget for 2020. What to consider

T

The problem is that the accountants consider security an expense and the budgets are more than likely are not sufficient, unless, the accountant experienced a life impacting crime or terror act.

There is no security manager that can predict exactly what new threats or evolved copycat crime and terror may occur. Furthermore, there may be security managers that have no idea of what is truly happening on the ground under their own nose.

Consider that, because of the speed of technology and social issues could impact the security and risk, the plan demands a contingency to purchase equipment or invest in specific training to limit or mitigate an unexpected issue that will result in the collateral damage.

Subsequently, not all of the budget must be earmarked and keeping a small contingency would be a good idea.

Reading the above and paying attention to criteria, let us consider designing the plan or any action by understanding what has to be done.

Objective: Security, Investigation and Protection success depends on the level of situational awareness of the people on the ground (decision-makers) and their reaction speed.

Using technology for situational awareness:

Technology is used to heighten situational awareness to detect theft of products or time, infiltration, and information leakage. So to, is technology used to limit the level or mitigate such. [Global Suppliers are invited to contact ISIO to present their unique technology for consideration by using the ISIO website]

Analytical Software

There is a difference when using analytical software to find a crime and to uncover a crime. Crime investigators are called in after the fact and security investigators are also summoned after the fact, but they need to do more. They are aware that their may be issues happening on the ground that they are unaware of, and therefore must identify and uncover new crime or discover evolving copycat crime. Subsequently, it is the intelligence of the user and the skill in using the instrument that dictates successful conclusions.

Perhaps analytical software is being budgeted for, however, the success to comprehend the results depends on the information contained therein. There have been companies purchasing analytical software, paid a lot of money and not using the software. One must comprehend that any instrument is only as good as the user. There may be nothing wrong with the software however there may be by the people that instruct what data needs to be loaded and who should collect the data. The information analysed to identify the formation and pattern of crime or to comprehend the full-picture requires critical thinking situational awareness by the analyst.

Subsequently, it is the analyst that draws up the questioning profile. Consequently, it is the people on the ground that must have the knowledge of what to look for and the skills to uncover new crime or identify evolving copycat crime besides the analyst. [Analytical Software companies are invited to contact ISIO to obtain Tools that should be provided alongside their software for clients]

The issue above all issues to budget for

It is not the weapon that causes the mayhem it is people! No Security Manager can successfully secure any project by working alone in a silo. There is crime in all departments and in all sectors of society. Corruption, fraud, bullying, blackmail, extortion, sexual misconduct and information leakage that could be in theater not only happening in the security department but in all other departments. Let us not forget the incidents that xenophobia, radicalization, besides the mentally challenged that have caused havoc in the lives of others. There are methods to obtain a collective collaboration by managers of other departments if they are trusted and respected. This can only be achieved with knowledge and skills.

The Security Manager must consider drawing up a budget and planning using the investigation management approach

Consider

Proper investigation must be undertaken to consider what techno, software, equipment or skill training is required for the year. Keep in mind that it is the person on the ground that make decisions and base their decisions on their knowledge and skills.

Consequently, when the practitioner is unable to read the situation or a person of interest to determine if they are working in concert with others – then there is a major issue.

It is the person that causes havoc, so if the practitioner is unable to read if others are lying, hiding something or why they are volunteering information – then they should not be in the field. – Practitioners cannot afford to be misled!

When an investigator believes that they have seen it all and sees no need to be kept in the loop of new ideas, then they have no idea of new crime uncovered or damning issues discovered

ting crime or terror act.

There is no security manager that can predict exactly what new threats or evolved copycat crime and terror may occur. Furthermore, there may be security managers that have no idea of what is truly happening on the ground under their own nose.

Consider that, because of the speed of technology and social issues could impact the security and risk, the plan demands a contingency to purchase equipment or invest in specific training to limit or mitigate an unexpected issue that will result in the collateral damage. Subsequently, not all of the budget must be earmarked and keeping a small contingency would be a good idea.

Reading the above and paying attention to criteria, let us consider designing the plan or any action by understanding what has to be done.

Objective: Security, Investigation and Protection success depends on the level of situational awareness of the people on the ground (decision-makers) and their reaction speed.

Using technology for situational awareness:

Technology is used to heighten situational awareness to detect theft, infiltration, and information leakage. So to, is technology used to limit the level or mitigate such. [Global Suppliers are invited to contact ISIO to present their unique technology for consideration by using the ISIO website]

Analytical Software

Perhaps analytical software is being budgeted for, however, the success to comprehend the results depends on the information contained therein. When information is gathered from uneducated or naive people then one must consider that it could be misinformation or insufficient and inaccurate information because, people do lie, hide information or volunteer information for their own agenda.

Furthermore, the information analysed to identify the formation and pattern of crime or to comprehend the full-picture requires critical thinking situational awareness by the analyst.

Subsequently, it is the analyst that draws up the questioning profile. Consequently, it is the people on the ground that must have the knowledge of what to look for and the skills to uncover new crime or identify evolving copycat crime besides the analyst. [Analytical Software companies are invited to contact ISIO to obtain Tools that should be provided alongside their software for clients]

The issue above all issues to budget for

It is not the weapon that causes the mayhem it is people! No Security Manager can successfully secure any project by working alone in a silo. There is crime in all departments and in all sectors of society. Corruption, fraud, bullying, blackmail, extortion and sexual misconduct, could be in theater but the managers of other departments could be totally unaware of what is truly happening on the ground in their field of interest. Let us not forget the incidents that xenophobia, radicalization, besides the mentally challenged that have caused havoc in the lives of others.

The Security Manager must consider drawing up a budget and planning using the investigation management approach

Consider

When there is no investigation and plans are based on thumb-sucking when people’s life are at stake is somewhat frightening.

When an investigator believes that they have seen it all and sees no need to be kept in the loop of new ideas, then they have no idea of new crime uncovered or damning issues discovered

No alt text provided for this image

Reviews

This manuscript (MI) is a great resource for sure!

The concept you arrived at Master Investigator is direct to the point and strikes the heart of every investigator that they must have. Critical thinking and situational awareness are the cores of the concept, which I believe to be the best foundation of strategic thinkers in solving crime problems.By Prof. Rommel K Manwong, PhD, CST, CSP 

An important addition to this field

I think this paper is excellent and is an important addition to the field. I really like the conceptualization of the Intelligent Investigator as it illustrates the crucial role of “critical thinking” by being proactive and by expanding systematic knowledge and learning entity.

Similar to reflexive security that alleviates the security skills shortage paradox by promoting the idea of “hybrid domain-security experts”, HIM e-connect tools, workshops and virtual group meetings are enhancing the Critical Thinking qualities to pro-active experts and investigators who breaking silos, are highly conscious, familiar with the technology of today and being aware of consequent management.By Dr Katerina Poustourli PhD Pre-normative Security Research, Standardization and Innovation Expert, PhD Robust and Resilience Engineering

No alt text provided for this image

Reviews

By Lawrence J. Fennelly

To all security managers I say, “it’s a must read”

By Orlando ‘’Andy’’ Wilson

With the spread of international organized crime this book is relevant whether you are working in Beijing, Bogota or Birmingham!

By Errol Peace

This is an exciting new approach to the investigation of crime, and very importantly to discovery of criminal activities.

Available through ISIO and HIM Human Investigation Management