SlideShare une entreprise Scribd logo
1  sur  4
RESOURCE UTILIZATION - BUILDING AN EFFECTIVE
SECURITY PROGRAM OVERSEAS
By Scott M. Bernat
Effective security programs depend on a comprehensive working knowledge of available
resources, to include the identification and development of strategic security
relationships. This is especially important for companies operating in foreign countries,
where customs, culture and language barriers challenge even the most experienced
security professional. Resources include security personnel, websites and organizations
associated with diplomatic establishments, host country security services, private security
companies, expatriates as well as local citizens. The safety and security of company
personnel and operations depend on the knowledge and assistance gained through
interaction with and utilization of these resources.
DIPLOMATIC ASSISTANCE
One of the first and foremost sources of security related information of importance to
companies operating in a foreign country is the U.S. Department of State (DoS).
Through Overseas Security Advisory Council (OSAC) meetings, members can directly
interact and network with both private sector and U.S. Government security personnel.
U.S.-registered companies with an interest in security can join and attend these meetings,
usually alongside representatives from the U.S. Embassy or Consulate Regional Security
Office. Members have the added benefit of presenting and discussing security issues of
concern, as well as sharing lessons learned and solutions. The DoS OSAC internet
website can be found at http://www.osac.gov. Information available on this site includes
safety and security issues, public announcements, travel advisories, significant
anniversary dates, terrorist group profiles, country crime and safety reports, special topic
and foreign press reports. Many foreign diplomatic establishments also maintain internet
websites on which is posted travel advisories and safety/security related information.
BUSINESS ORGANIZATIONS
Chamber of Commerce organizations are an excellent networking resource and often
include a safety and security committee dedicated to ensuring its members receive timely
and accurate threat information. The U.S., Britain and Australia are the most common
Chambers of Commerce found overseas and allow associate membership for
organizations not directly affiliated with the Chamber country. Many countries also have
Rotary Clubs and business/organization specific associations, focusing on the in-country
interests of a particular industry. An example of this is the Bangkok Ship Owners and
Agents Association (BSAA), based in Thailand, wherein members join together to
promote their industry and share information of mutual interest. These types of groups
can also be valuable sources of safety and security information.
ASIS INTERNATIONAL
The American Society of Industrial Security (ASIS) International provides security
professionals the opportunity to network and share information of mutual security interest
among its members. Regional conferences highlight key interest items through
professional presentations and vendor exhibits, promoting innovative ideas in an effort to
solve shared security problems. The ASIS internet website is located at
http://www.asisonline.org. Membership is open to all security professionals, as well as
those interested in the security field.
HOST COUNTRY SECURITY SERVICES
Conducting business in a foreign country can be difficult without a well-rounded
knowledge of the operating environment. Key to this is the relationship you build with
your host country law enforcement and security services. It is in this arena that many
company security professionals fail to establish an effective relationship. The importance
of relationship building within the host country’s security services can never be
underestimated, as this can enhance mutual cooperation and increase understanding of
potential threats. Liaison efforts must go beyond dinner and drinks. Through the
presentation of security seminars and subject matter expert exchanges, companies can
establish their team as experts, gain mutual respect, heighten information sharing and
focus local security services on areas of industry interest. These activities can be cost
effective by drawing on staff knowledge and skills, as well as industry experts. One
example is where Company A, a major maritime shipping agent, is concerned about
recent thefts in and around a primary port area. Company A’s security department or
designate engages port security personnel and develops a seminar/subject matter expert
exchange focusing on port and supply chain security. Participants include not only port
and local security/law enforcement personnel, but also Company A’s designated security
personnel. End result is a sharing of information regarding safety and security concerns
and relative problem solving discussions, all leading to a safer and secure port. A “win-
win” situation for both the company and host nation.
PRIVATE SECURITY COMPANIES
Depending on your budget, private security companies can be an excellent source of
information and assistance in the establishment and operation of an effective program,
especially when your own security department is limited in personnel or specific
skills/expertise. Security companies are usually staffed by former military, law
enforcement and/or security service personnel with specific skills, country and regional
expertise. Private companies can provide a wide range of services, to include personnel
augmentation, consultations, security/vulnerability/threat assessments, due diligence and
other investigations, instruction and the presentation of seminars or subject matter expert
exchanges. Representatives of these companies can be found at the various OSAC,
Chamber of Commerce or industry-specific organizational meetings.
EXPATRIATES AND LOCAL CITIZENS
One of the most cost effective security resources are expatriates and local citizens within
your country or region. Developing and maintaining social relationships with these
individuals can lead to a wealth of “ground truth” information, depending on a person’s
local knowledge, access and status. If your industry is port or maritime related, it would
be a good idea to have friends or contacts in and around the port areas. Dependent on
your industry focus, areas of interest can also include airports, other transportation hubs,
factory districts, oil, gas and/or mining sites. The information you receive through casual
conversation can be of value when weighed against official information obtained through
private or governmental organizations. The old adage “Listen, you might hear
something” certainly holds true here for the security professional.
SECURITY SUCCESS
The integration and utilization of the above resources, strengthened by the resultant
development of mutual respect, understanding and information sharing, is the recipe for
security success. A proactive security professional will ensure that all available resources
are engaged, positive relationships are formed with counterparts and the company assets
are protected. This is the gold standard for security overseas.
-----------------------------------------------------------------------------------------------------------
-
Scott M. Bernat is a civilian Special Agent of the U.S. Naval Criminal Investigative
Service (NCIS), currently assigned to the U.S. Embassy Jakarta, Indonesia Force
Protection Detachment as the Resident Agent in Charge and Chief of U.S. Military
Security. He is directly responsible for the organization, implementation and
management of U.S. Department of Defense programs focusing on threat awareness and
mitigation, physical security, risk assessments and vulnerability studies, emergency
preparedness and crisis response, executive protection and investigations relative to
personnel and assets deployed to and/or transiting through Indonesia. During his 21-year
career, he has worked as a security professional throughout Asia, Australia/Oceania,
Central America, Europe, Middle East and the United States.
-----------------------------------------------------------------------------------------------------------
-
** This article is scheduled to be published in the upcoming edition of the American
Chamber of Commerce (AmCham) Indonesia magazine – “The Executive Exchange”.
Resource Utilization - Building An Effective Security Program Overseas - 2009

Contenu connexe

En vedette

Marizul Que Somia
Marizul Que SomiaMarizul Que Somia
Marizul Que Somiaacasta2
 
Debunking The Myths About Online Learning
Debunking The Myths About Online LearningDebunking The Myths About Online Learning
Debunking The Myths About Online LearningRobert Letcher
 
Krkonoše
KrkonošeKrkonoše
Krkonošehonzam
 
AVO-LAO/Topnetti
AVO-LAO/TopnettiAVO-LAO/Topnetti
AVO-LAO/TopnettiLaooppimisy
 
Guia Nadal 2º E 3º Ciclo
Guia Nadal 2º E 3º CicloGuia Nadal 2º E 3º Ciclo
Guia Nadal 2º E 3º Cicloluis425
 
tecnologias
tecnologiastecnologias
tecnologiasanny7284
 
еви 73года, февраль 2009
еви 73года, февраль 2009еви 73года, февраль 2009
еви 73года, февраль 2009gtuni
 
Training Investment
Training InvestmentTraining Investment
Training InvestmentScotty Gecks
 
Foote Communications Overview Dec2008
Foote Communications Overview Dec2008Foote Communications Overview Dec2008
Foote Communications Overview Dec2008Neil Foote
 
Quijote[1]
Quijote[1]Quijote[1]
Quijote[1]aldonza
 
Joint juice-Relieving joint pains
Joint juice-Relieving joint painsJoint juice-Relieving joint pains
Joint juice-Relieving joint painsAustin Peters
 
CLARA
CLARACLARA
CLARAgunni
 
New Product Marketing Plan
New Product Marketing PlanNew Product Marketing Plan
New Product Marketing PlanTim Lu
 

En vedette (18)

Blood Of Eden
Blood Of EdenBlood Of Eden
Blood Of Eden
 
Marizul Que Somia
Marizul Que SomiaMarizul Que Somia
Marizul Que Somia
 
Debunking The Myths About Online Learning
Debunking The Myths About Online LearningDebunking The Myths About Online Learning
Debunking The Myths About Online Learning
 
Krkonoše
KrkonošeKrkonoše
Krkonoše
 
COB_20090130_1
COB_20090130_1COB_20090130_1
COB_20090130_1
 
Syd P.Point
Syd P.PointSyd P.Point
Syd P.Point
 
AVO-LAO/Topnetti
AVO-LAO/TopnettiAVO-LAO/Topnetti
AVO-LAO/Topnetti
 
抵學分
抵學分抵學分
抵學分
 
Guia Nadal 2º E 3º Ciclo
Guia Nadal 2º E 3º CicloGuia Nadal 2º E 3º Ciclo
Guia Nadal 2º E 3º Ciclo
 
tecnologias
tecnologiastecnologias
tecnologias
 
еви 73года, февраль 2009
еви 73года, февраль 2009еви 73года, февраль 2009
еви 73года, февраль 2009
 
Training Investment
Training InvestmentTraining Investment
Training Investment
 
Syd P.Point
Syd P.PointSyd P.Point
Syd P.Point
 
Foote Communications Overview Dec2008
Foote Communications Overview Dec2008Foote Communications Overview Dec2008
Foote Communications Overview Dec2008
 
Quijote[1]
Quijote[1]Quijote[1]
Quijote[1]
 
Joint juice-Relieving joint pains
Joint juice-Relieving joint painsJoint juice-Relieving joint pains
Joint juice-Relieving joint pains
 
CLARA
CLARACLARA
CLARA
 
New Product Marketing Plan
New Product Marketing PlanNew Product Marketing Plan
New Product Marketing Plan
 

Similaire à Resource Utilization - Building An Effective Security Program Overseas - 2009

Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureJeff Ezell
 
Dhs Private Sector Resource Catalog
Dhs Private Sector Resource CatalogDhs Private Sector Resource Catalog
Dhs Private Sector Resource CatalogCliff Veale
 
Bja cyber fusioncenters
Bja cyber fusioncentersBja cyber fusioncenters
Bja cyber fusioncentersAnonDownload
 
Bureau of justice assistance guide cyber integration for fusion centers
Bureau of justice assistance guide  cyber integration for fusion centersBureau of justice assistance guide  cyber integration for fusion centers
Bureau of justice assistance guide cyber integration for fusion centersAnonDownload
 
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceCyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceDavid Sweigert
 
Acsc threat report_2016
Acsc threat report_2016Acsc threat report_2016
Acsc threat report_2016Stefanie Vogt
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0theonassiokas
 
101 102 Seminar Brochure
101 102 Seminar Brochure101 102 Seminar Brochure
101 102 Seminar Brochurecliff_rudolph
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxoreo10
 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)Barry Newman
 

Similaire à Resource Utilization - Building An Effective Security Program Overseas - 2009 (20)

cssc bookletv2
cssc bookletv2cssc bookletv2
cssc bookletv2
 
76960 Trident Manor Brochure UK WEB
76960 Trident Manor Brochure UK WEB76960 Trident Manor Brochure UK WEB
76960 Trident Manor Brochure UK WEB
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
CIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions BrochureCIS Security Risk Mgmt Solutions Brochure
CIS Security Risk Mgmt Solutions Brochure
 
Dhs Private Sector Resource Catalog
Dhs Private Sector Resource CatalogDhs Private Sector Resource Catalog
Dhs Private Sector Resource Catalog
 
GTSC 2019 Annual Report
GTSC 2019 Annual ReportGTSC 2019 Annual Report
GTSC 2019 Annual Report
 
GTSC Annual Report 2019
GTSC Annual Report 2019GTSC Annual Report 2019
GTSC Annual Report 2019
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
 
lr_MondaySN1_2016-1
lr_MondaySN1_2016-1lr_MondaySN1_2016-1
lr_MondaySN1_2016-1
 
Bja cyber fusioncenters
Bja cyber fusioncentersBja cyber fusioncenters
Bja cyber fusioncenters
 
Bureau of justice assistance guide cyber integration for fusion centers
Bureau of justice assistance guide  cyber integration for fusion centersBureau of justice assistance guide  cyber integration for fusion centers
Bureau of justice assistance guide cyber integration for fusion centers
 
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceCyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
 
Acsc threat report_2016
Acsc threat report_2016Acsc threat report_2016
Acsc threat report_2016
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0
 
101 102 Seminar Brochure
101 102 Seminar Brochure101 102 Seminar Brochure
101 102 Seminar Brochure
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017
 
The Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docxThe Port Security Plan - Management of Tasks and Responsibilities.docx
The Port Security Plan - Management of Tasks and Responsibilities.docx
 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)
 
Rose Partners Brochure (final)
Rose Partners Brochure (final)Rose Partners Brochure (final)
Rose Partners Brochure (final)
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Resource Utilization - Building An Effective Security Program Overseas - 2009

  • 1. RESOURCE UTILIZATION - BUILDING AN EFFECTIVE SECURITY PROGRAM OVERSEAS By Scott M. Bernat Effective security programs depend on a comprehensive working knowledge of available resources, to include the identification and development of strategic security relationships. This is especially important for companies operating in foreign countries, where customs, culture and language barriers challenge even the most experienced security professional. Resources include security personnel, websites and organizations associated with diplomatic establishments, host country security services, private security companies, expatriates as well as local citizens. The safety and security of company personnel and operations depend on the knowledge and assistance gained through interaction with and utilization of these resources. DIPLOMATIC ASSISTANCE One of the first and foremost sources of security related information of importance to companies operating in a foreign country is the U.S. Department of State (DoS). Through Overseas Security Advisory Council (OSAC) meetings, members can directly interact and network with both private sector and U.S. Government security personnel. U.S.-registered companies with an interest in security can join and attend these meetings, usually alongside representatives from the U.S. Embassy or Consulate Regional Security Office. Members have the added benefit of presenting and discussing security issues of concern, as well as sharing lessons learned and solutions. The DoS OSAC internet website can be found at http://www.osac.gov. Information available on this site includes safety and security issues, public announcements, travel advisories, significant anniversary dates, terrorist group profiles, country crime and safety reports, special topic and foreign press reports. Many foreign diplomatic establishments also maintain internet websites on which is posted travel advisories and safety/security related information. BUSINESS ORGANIZATIONS Chamber of Commerce organizations are an excellent networking resource and often include a safety and security committee dedicated to ensuring its members receive timely and accurate threat information. The U.S., Britain and Australia are the most common Chambers of Commerce found overseas and allow associate membership for organizations not directly affiliated with the Chamber country. Many countries also have Rotary Clubs and business/organization specific associations, focusing on the in-country interests of a particular industry. An example of this is the Bangkok Ship Owners and Agents Association (BSAA), based in Thailand, wherein members join together to promote their industry and share information of mutual interest. These types of groups can also be valuable sources of safety and security information.
  • 2. ASIS INTERNATIONAL The American Society of Industrial Security (ASIS) International provides security professionals the opportunity to network and share information of mutual security interest among its members. Regional conferences highlight key interest items through professional presentations and vendor exhibits, promoting innovative ideas in an effort to solve shared security problems. The ASIS internet website is located at http://www.asisonline.org. Membership is open to all security professionals, as well as those interested in the security field. HOST COUNTRY SECURITY SERVICES Conducting business in a foreign country can be difficult without a well-rounded knowledge of the operating environment. Key to this is the relationship you build with your host country law enforcement and security services. It is in this arena that many company security professionals fail to establish an effective relationship. The importance of relationship building within the host country’s security services can never be underestimated, as this can enhance mutual cooperation and increase understanding of potential threats. Liaison efforts must go beyond dinner and drinks. Through the presentation of security seminars and subject matter expert exchanges, companies can establish their team as experts, gain mutual respect, heighten information sharing and focus local security services on areas of industry interest. These activities can be cost effective by drawing on staff knowledge and skills, as well as industry experts. One example is where Company A, a major maritime shipping agent, is concerned about recent thefts in and around a primary port area. Company A’s security department or designate engages port security personnel and develops a seminar/subject matter expert exchange focusing on port and supply chain security. Participants include not only port and local security/law enforcement personnel, but also Company A’s designated security personnel. End result is a sharing of information regarding safety and security concerns and relative problem solving discussions, all leading to a safer and secure port. A “win- win” situation for both the company and host nation. PRIVATE SECURITY COMPANIES Depending on your budget, private security companies can be an excellent source of information and assistance in the establishment and operation of an effective program, especially when your own security department is limited in personnel or specific skills/expertise. Security companies are usually staffed by former military, law enforcement and/or security service personnel with specific skills, country and regional expertise. Private companies can provide a wide range of services, to include personnel augmentation, consultations, security/vulnerability/threat assessments, due diligence and other investigations, instruction and the presentation of seminars or subject matter expert exchanges. Representatives of these companies can be found at the various OSAC, Chamber of Commerce or industry-specific organizational meetings.
  • 3. EXPATRIATES AND LOCAL CITIZENS One of the most cost effective security resources are expatriates and local citizens within your country or region. Developing and maintaining social relationships with these individuals can lead to a wealth of “ground truth” information, depending on a person’s local knowledge, access and status. If your industry is port or maritime related, it would be a good idea to have friends or contacts in and around the port areas. Dependent on your industry focus, areas of interest can also include airports, other transportation hubs, factory districts, oil, gas and/or mining sites. The information you receive through casual conversation can be of value when weighed against official information obtained through private or governmental organizations. The old adage “Listen, you might hear something” certainly holds true here for the security professional. SECURITY SUCCESS The integration and utilization of the above resources, strengthened by the resultant development of mutual respect, understanding and information sharing, is the recipe for security success. A proactive security professional will ensure that all available resources are engaged, positive relationships are formed with counterparts and the company assets are protected. This is the gold standard for security overseas. ----------------------------------------------------------------------------------------------------------- - Scott M. Bernat is a civilian Special Agent of the U.S. Naval Criminal Investigative Service (NCIS), currently assigned to the U.S. Embassy Jakarta, Indonesia Force Protection Detachment as the Resident Agent in Charge and Chief of U.S. Military Security. He is directly responsible for the organization, implementation and management of U.S. Department of Defense programs focusing on threat awareness and mitigation, physical security, risk assessments and vulnerability studies, emergency preparedness and crisis response, executive protection and investigations relative to personnel and assets deployed to and/or transiting through Indonesia. During his 21-year career, he has worked as a security professional throughout Asia, Australia/Oceania, Central America, Europe, Middle East and the United States. ----------------------------------------------------------------------------------------------------------- - ** This article is scheduled to be published in the upcoming edition of the American Chamber of Commerce (AmCham) Indonesia magazine – “The Executive Exchange”.