Tuesday, July 22, 2008

Earn an MSc - Forthcoming University-Accredited Security Management Training in India

The ARC Training International Academy for Security Management will be conducting two university-accredited Security Management Stage 1 courses in India in the coming months. The first will take place 28 August – 5 September, and the second 22 September – 3 October. Both courses will take place in Gurgaon, near New Dehli.

Slightly modified for the oil and gas sector, the programmes are nevertheless suitable for delegates from a wide range of sectors and are designed to provide a thorough grounding in the essentials of corporate security management.

This is a unique opportunity to attend this world-renowned programme in India with the option of embarking upon a programme of study towards a MSs Work-Based Learning Studies (Corporate Security Management) with Middlesex University, London.

For further details or to reserve a place, please contact Janet Ward.

Security Metrics - Are You Doing It?

“Across the industry, there are CSOs and security programme managers who still don't get it, who think security-related metrics are a waste of time or who don't have a clue where to look to build a metrics program. Every business manager to develop and deliver programs and services that demonstrate measurable results, whether good or bad, positive or negative - and that includes security”, writes George Campbell in Security Technology and Design.

“How many CEOs can you count who have been sacked for having bad performance metrics? If you are a security manager looking across the table at your information security counterpart, he or she can drown you in measures and metrics to assess the effectiveness of his or her safeguards. These are all metrics-rich functions led by managers who understand and depend on specific measures and associated metrics”.

For the full article, see

http://articles.directorym.net/Its_Time_to_Get_Security_Metrics_Savvy-a879674.html

The Most Popular Course in Security Management in the World

ARC Training’s two-week Security Management Stage 1 Course has become the most popular university-accredited security management course in the world, having been attended by hundreds of delegates from literally all over the world. The programme is highly interactive and covers the core essential subjects of security management in a corporate setting.

The next course takes place 4-15 August. Details of the syllabus can be found at

http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1.

For further information please contact Janet.

Next year will see the Security Management Stage 1 Course being held in Bahrain in January and South Africa in March, in addition to the regular UK dates. Contact Janet for further information.

Well-Designed Access Control Badges Help Prevent Loss

Robert Pearson writing in Security Technology and Design says that the security badge indicates a great deal about the security department. It reflects the quality of the security program and the level of support the security department receives from upper management. If the badge is not well designed, it is apparent that it is more an instrument of necessity than a part of an orchestrated security program, and this may make the company a target for criminals. A poorly designed badge may also be easy to counterfeit.

Read on at:

http://www.allbusiness.com/management/risk-management/10573577-1.html

Laboratory Security

A recent request from a delegate asked for detailed information on Laboratory Security. With current concerns about theft of precursor chemicals (for IEDs and chemical attack devices) it makes sense to share the findings. Therefore, a new section on the ARC Training weblinks page has been added. Go to



and navigate down the page to Laboratory Security.

How to Specify Technical Security Systems

ARC’s new Specifying Security Technology Course began on Monday, with delegates from Switzerland, the UK, Singapore and the Yemen. On Day 1 David Cresswell spoke about trends in convergence and the benefits - and obstacles to be overcome - when putting physical security technology onto the IT network. Delegates related stories in which IP-based physical security systems had been procured only to be met with a refusal on the part of IT to attach them to the corporate IT backbone. As well as addressing some of the technical issues, the session looked at how to bring in IT administrators into the project from the outset, and how to avoid being seduced by often exaggerated vendor claims of integrateability.

Following this, Derick Burton MSc CISSP, who contracts in IT security for one of the UK’s largest multinationals, briefed participants on the basics of IT network infrastructure and IT network security – an essential knowledge prerequisite when planning to put physical security systems onto an IT network.

Peter Horsburgh CPP PSP will lead Day 2 with an interactive session on systems specification and project management, drawing on his many years of experience in this field. For much of this year Peter has been on site, consulting in this field.
Phil Wood MBE CPP PSP will join the programme on Wednesday and Thursday to deliver sessions on automated access control systems, asset tracking technologies and intrusion detection systems, culminating in a an all-day module on Friday on CCTV, delivered by acknowledged CCTV guru Jon Laws B.Sc. C.Eng. M.I.E.T. F.ConsE.

There are plans to repeat this course in Dubai in the near future. Contact Janet for further information.

Do You Trust Your Partner?

Source: Information Age

External threats from partner organisations pose the greatest risk to corporate data security, according to a report detailing 500 forensic data investigations by Verizon Business.
The Verizon report analysed hundreds of corporate data breaches, including three of the five largest ever reported, and found that while insider threats were the most devastating in terms of impact, the higher number of data breaches attributable to partners made them a greater risk factor. Read on at:

http://www.information-age.com/home/information-age-today/443066/business-partners-pose-the-greatest-security-threat-report.thtml