Security Technology Executive

MAY-JUN 2018

Issue link:

Contents of this Issue


Page 35 of 79

36 SECURIT Y TECHNOLOGY E XECUTIVE • May/June 2018 • www. of scale and "learned" best practices (i.e., recruiting , screening, training, management, post-orders, sched- uling , payroll and operations). An advantage of maintaining security operations within an organization is that contracted officers may be perceived as "outsiders" who face challenges of being accepted into the company culture. How- ever, an outsider perception can be negated with team-building activities and employment tenure. Ongoing Monitoring Metrics "Use of strong key performance metrics (KPM) and service level agreements (SLA) are paramount to the overall success of a security program," says a secu- rity executive at a major aeronautical manufacturer. "KPMs are important for the ongoing evaluation of the agreed upon service delivery elements. The met- ric should include quantitative measures of respon- siveness, completeness, and professionalism." The security program should be developed with key members of the manufacturing staff and secu- rity contractor who are familiar with the mission, goals and strategy of the company in relation to its overall security posture. The capability of the service provider to adapt program delivery and scale and support both short and long-term requirements is vital to a successful program. Training Your Protection Force "I look at specialized training in security as analo- gous to selecting your major in college," says O'Bryan. " While all security officers benefit from 'core' classes, such as Basic Security Officer Training and Master Security Officer (MSO) training , they also need to select a 'major ' in manufacturing or petrochemi- cal, for example, where they will learn the specific nuances and requirements of their sector." Chemical / Petrochemical Security training demands that officers are educated in all aspects of Maritime security, OSHA, HazMat and general safety guidelines as well as comprehensive training in fire safety, emergency preparedness, patrol and search techniques, evacuation procedures and ter- rorism awareness—which prepare security officers to respond to emergencies with particular attention to the new threats that have arisen in today's society. The best security training begins with a solid foundation. Once that core is in place, it becomes the educational framework upon which specialized training, or the 'major,' can be built. Each market seg- ment has its own examples that support the need for customized training. " With critical security positions, it is best to deliver as much training as possible to them before allowing them to work a post on their own," says O'Bryan. "The biggest rate of onboarding failures is when organi- zations allow new employees to staff posts on their own with little training which leaves the employee frustrated and eager to leave that organization." Providing security when worker safety is on the line is clearly different than security in other envi- ronments. Security personnel without the appro- priate sector certifications will require training in areas including fire safety officer (FS), emergency preparedness, evacuation procedures, customer ser- vice, OSHA and HazMat, terrorism awareness and patrol techniques. Continuous Operations Any organization should review the processes and procedures in place for sharing pertinent knowledge and information. Is there an extranet or other tech- nology to stay on top of risk management issues? A method needs to exist to precisely measure whether or not the security team is able to enhance its brand, provide a peace of mind, help lower costs and assist in efficient reporting means. Also, consider if the secu- rity team uses wireless technology to support ever- changing business needs with a platform that pro- motes sustainability and reduces paper waste. Make sure to review the procedures in place for trending reports and customized incident reports and ensure they are turned around in a timely manner. Technology changes rapidly. And equipment and operating procedures are evolving along with it. Even minor changes in how machinery is connected to computers can create safety issues. For example, a loose connection left unchecked could create an electrocution hazard. As manufacturers increasingly adapt mobile solu- tions to manage processes, communicate or seek approvals, it is vitally important that security per- sonnel understand the importance of being aware of their surroundings and that they do not multi-task while walking on the shop floor. There are simply too many potential safety issues that could wipe out any productivity enhancements from technol- ogy investments. Security supervisors are tasked to continually observe all employees. If a staff member is not work- ing safely, it is vitally important to find out why. The answers could help an organization shore up its safety goals—critical for a successful daily operation. Technology Innovation Critical in Industrial Sector Technological development makes industrial and manufacturing plants safer, but it also presents new safety hazards. Consider the hand-held radio was once the gold standard in communications among About the authors: Kenneth Bukowski is V ice President for Vertical Markets for A llied Universal, the largest prov ider of securit y ser v ices in North A merica. He can be reached at Kenneth. Guy J. Hassfield is V ice President for National Accounts for A llied Universal. He can be reached at Guy. SECURIT Y MANAGEMENT

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018