Workplace violence is seldom the freak episode that the media portrays it to be. It rarely involves a mass shooting with a gun, and rarely does it result in a homicide or mass casualty.
Over lunch recently, a former Secretary of the Department of Homeland Security asked me, “How long do you think it will be until mobile credentials fully replace plastic badges and cards?”
Agencies and authorities that provide water, wastewater and dam services don’t face the same regulatory hurdles as power utilities, but they’re also often smaller and have fewer resources, housed as they generally are within municipal governments or other smaller entities.
After receiving the funding to develop several security projects to update or replace systems and components, including upgrading more than 3,000 cameras to IP, across more than 100 facilities that Security Director Kirk Simmons is responsible for securing in Hennepin County, MN, Simmons and his team found themselves in a predicament: navigating the county’s IT department processes for project development, as most systems depend on the IT network and servers for which the Hennepin County IT team has responsibility.
How can you measure your risk of unauthorized entry? Until now, it’s been virtually impossible. When it comes to security entrances, new analytics technologies (e.g. PSIM, IoT, etc.) are emerging, and it’s becoming possible to use technology, combined with people, to tap into security entrance metrics as part of an overall physical security strategy.
One of the major issues organizations face in building security operations centers (SOCs) is finding the qualified personnel needed to properly run the operation.