Home' Australian Govlink : Issue 1 2015 Contents INTEGRATED SECURITY
Southern Cross Protection has been providing
security to People, Business and Communities
for almost 90 years. The company is Australian
owned and currently delivers a range of diverse
security services to over 50 Local Governments
and State and federal Authorities from a network
of 30 branches across the country.
The company has earned the trust of its
customers due to its transparency and
commitment to improvement. The transparency
reassures government buyers and stakeholders
they made the right choice plus the companies
continual introduction of new technologies has
ensured customers are never left wondering
about the future. Southern Cross Protection
(“SXP”) is committed to working with its
customers to ensure that all elements of security
expenditure deliver a safer and more secure
environment for constituents.
The Managing Director of SXP, Patrick Bourke is
a strong advocate of an integrated approach. “I
like to think of a security management system as
a five finger model.
Just as 5 fingers are part of a hand, the security
management system needs the following:
2. A rigorous risk assessment process
3. Updating the programme regularly –
at least annually
4. Engagement of community stakeholders
5. Benchmark your programme against the
published standards and a measurement
That will ensure you have the right internal
processes and areas of attention. That is the
single biggest determinant in avoiding what
Patrick describes as the “advertisers dilemma”.
“Marketing and Advertising executives laugh
about the fact that they know 50% of their
budget is wasted – they just don’t know which
half” says Patrick, “well security can fall into
the same problem unless you take an organised
approach. We don’t think that is funny – its
constituents money and peoples safety and well
being. It can’t be laughed about”
The next significant issue for buyers is to choose
what to do in house and what to outsource.
Hiring a security contractor should not be the
automatic default in all circumstances. When
appropriate however, make sure you select a
Things have changed in our world and in our
communities. The security landscape has been
shifted as a consequence.
“The analogy I like to use to help explain this
is it’s more like AFL than Rugby League – the
defensive line isn’t clear. “
In the past security was like rugby – you had
a clear defensive line (a perimeter) that you
defended with fences, access control and security
officers (physical security) and firewalls (cyber)
As technology rapidly advances many things
from pace makers and power stations are
being connected to the Internet and governed
by software that is vulnerable to crooks and
terrorists. The defensive line – the perimeter
is now more like an interconnected web –
everyone is a perimeter!
As people, businesses and communities become
more dependent on technology, the risks will
rise. “Converged” crime is the phrase that’s
been widely used to describe exploitation of web
(cyber) vulnerabilities to commit physical crimes.
Indeed we are also seeing examples where
physical crimes are being committed to enable a
large-scale cyber crime – it cuts both ways.
Handing IT (information technology) and OT
(Operational Technology) / Physical Security
separately is like two teams building a bridge
from both sides hoping that they will meet in the
middle. All tiers of Governments, Departments,
agencies and service providers end up living
with the failure and are exposed to huge
operational and security risks. In the picture the
problem is obvious – in real life however these
vulnerabilities (the gap) are often harder to spot.
Criminals, activists and even terrorists deploy
resources – on a large scale – looking for these
gaps in organisation’s security. They look for
ways to use cyber to penetrate - a really simple
example could be hacking into a computer
system to turn off the alarm system or disable
the CCTV so they can then commit a burglary.
Southern Cross Protection is the expert in
Australia and New Zealand in helping customers
identify and close this gap – closing the
vulnerability that exists where physical and cyber
security systems are not locked in harmony.
• SCALE • SCOPE • EXPERTISE
GOVLINK » ISSUE 1 2015
Links Archive 19-May-2015 10:54 Issue 2 2015 Navigation Previous Page Next Page