As CEO of ISI Security, I truly understand the need of protecting the different sensitive sectors of the nation’s infrastructure. In my estimation, there is one facet of the nation’s critical infrastructure that stands above all the rest when it comes to potential for the most catastrophic damage to life as we know it as Americans. That sector is the financial and banking sector. The physical threats to this sector are diverse and ever changing and bank operators need to stay informed on all emerging trends in threats to their sector.
The security needs of healthcare facilities are unlike other types of sensitive facilities in that they are generally open to the public. They’re also located throughout all different types of communities. From government funded county hospitals, to gargantuan metropolitan medical centers, to suburban and rural clinics, healthcare facilities are found everywhere. Also, unlike many other types of sensitive facilities, such as food services, the government’s response to the physical security needs of healthcare facilities has been all but nonexistent.
As CEO of ISI Security, one of my jobs is keeping up with current security trends surrounding different industries and there is almost no other industry in which security impacts more people than the nation’s food supply. For the purposes of this discussion, food includes all commercially produced consumables (i.e. food, water, beverages, pharmaceuticals).
As 2013 comes to a close I think it’s important to look back and take stock in the major security related events that occurred throughout the year and assess what we, as an industry, can learn…
As the CEO of ISI Security, one of the most difficult and time-consuming aspects of my job is keeping up with the laws and regulations affecting my company. This is compounded by the fact that it’s also the job of my company to keep up with the evolutionary changes in the laws and emerging security trends affecting our clients.
Keeping up with changes in law and regulations is a multifaceted task that includes…
During my tenure as the CEO of ISI Security, I have seen a multitude of changes in not only the technology but also in the way risk mitigation and liability limitation were affected by those changes in technology. Prior to 2002, risk mitigation and liability limitation were only measured once an event took place and a civil action was filed by those affected by the event. All of that changed when congress passed the Support Anti-Terrorism by Fostering Effective Technologies Act of 2002 (SAFETY Act), as part of the wide ranging Homeland Security Act.
The SAFETY Act relates to risk mitigation and liability limitation of not only companies like ISI who market security-related equipment and services, but also to our customers who depend on our products and services.
For ISI the SAFETY Act provides previously unheard-of protections against litigation stemming from terrorist acts. It also provides a defensible standard when it comes to levels of insurance protection on the production and implementation of our products…
After September 11, 2001, when the country began to look at our nation’s critical infrastructure and the preparedness of various sectors, leading security experts quickly looked to the chemical sector.
It was an obvious place to start. This sector is both key to the economic security of our nation and a highly dangerous stockpile that terrorist organizations could use against us. I have followed the development of these issues since they began to enter the security stage in the early 2000s, and have read the many volumes of regulations governing the critical infrastructure security of the chemical industry.
I’ve also had the pleasure of getting to know a number of executives who’ve shared with me the challenges they face every day when it comes to the regulatory compliance of chemical security. Without exception, they understand the importance of compliance, and the need for both employees and customers to become stakeholders in the effective physical security of our facilities and related activities…
Detain, Secure and Protect
Document, Control and View
Control, Document and Oversight
View, Record and Identify
Detect, Verify and Respond
Detect, Signal and Evacuate
Alert, Notify and React