One of the topics under discussion at this week’s Security Management Stage 3 Course, in Kuala Lumpur, Malaysia, has been how to protect sensitive company information against exfiltration (or theft by 3rd parties, including contractors.
The US Government has long recognised that groups such as cn-site contract workers pose a significant threat to information such as that relating to processes and R&D.
The UK’s Centre for the Protection of National Infrastructure has useful guidance at the following link on how to manage this problem, including how to tread a “safe” course through the legal minefield. This can be found at:
http://www.cpni.gov.uk/WhatsNew/3692.aspx
Designed to help you formulate security management policy at regional or corporate level,the next Security Management Stage 3 Course will be held in the UK during the period 11-22 May 2009; details can be found at:
http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3
Offering the CSMP - Certified Security Management Professional distance-learning award www.ismi.org.uk
Saturday, February 14, 2009
Thursday, February 12, 2009
Security Professionals Storm Ahead
Wednesday, February 11, 2009
Asian Security Managers Develop their Strategic Skills
The postgraduate university-accredited Security Management Stage 3 Course, currently taking place in the centre of cosmopolitan Kuala Lumpur, Malaysia, is a two-week advanced security management programme looking at how security management integrates with business management at strategic level, and examines ways in which the security manager can increase his/her overall contribution to the organisation.
One of the sessions on day 2 of the course addressed the issue of Corporate Social Responsibility (CSR), and the proactive effect that this can have on security risk mitigation, especially in the extractive sector. CSR is about creating sustainability and improvement to the local environment (social, economic, healthcare and sanitation, education, etc), especially in areas where the corporate footprint is significant and where government-funded infrastructure may be very basic. In such environments, companies that don’t take account of their local footprint, and which don’t become a driver for local improvement, often suffer increased security incidents.
In community engagement in particular, it is often the security manager who is the best-known community local company point of contact, so an understanding of CSR is essential. In fact, a CEO of a major oil and gas national company, addressing an ARC course last year, declared that CSR and security management were “two sides of the same coin”.
One delegate’s company has a simple rule when it comes to CSR: “energy received, energy returned; aspiring people everywhere.” Not surprisingly, the company is a rapidly globally expanding standard bearer in the energy sector.
The course includes security managers from Africa and Asia, from a wide range of sectors including security systems integration, manufacturing, solar power and a multinational cement company. Three of the security managers are CPP certified, and are using the course to earn their full term of recertification credits! Others are using the course as a part of their MSc studies.
The next Security Management Stage 3 Course takes place in the UK, 11-22 May 2009. Click here for details.
Thursday, February 5, 2009
State Intrusion - Too Much Security?

Wednesday, February 4, 2009
Emerging Risks – Are You Prepared?

1. Economic
2. Geopolitical
3. Environmental
4. Societal
5. Technological
Whilst you may think that you have assessed all of the risks to your organisation, this report may give you some food for thought about those which you may have missed. You can download a copy here http://www.arc-tc.com/pages/documents/2009.pdf
ARC’s Security Management Courses and Risk workshops cover risks in terms of the holistic threats to business rather than simply in terms of criminolgy and asset protection and there is no doubt, as the WEF Report indicates – that the range and types of global risks are difficult to predict. If you want to learn more – contact Janet
Maritime Security - Piracy Focus

Tuesday, February 3, 2009
Employees File Sharing? You Could Be Held Responsible!

Subscribe to:
Posts (Atom)