Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Security Management Software
Updated July 31, 2023
In the face of an unpredictable virus, business leaders are managing operations as best they can, with snap lockdowns, ad hoc remote working arrangements, and staff shortages making it difficult to ensure business continuity.
Often overlooked in this calculus, however, is the role of corporate security. After all, the function has been completely upended by the public health crisis, which has sent employees scrambling to newly fashioned home offices.
Has it made corporate security simpler?
It hasn’t. Even with fewer workers in brick-and-mortar offices than in 2019, many of the top threats to corporate security from that year not only persist but have also intensified.
What’s more, the COVID crisis itself has introduced new threats to the landscape, e.g., intensification of cyberattacks, civil unrest, increasing numbers of at-risk lone workers and absent personnel. The result has been a sharp increase in security risk.
Facing these threats are corporate security teams. Long considered a cost centre to the organisations, corporate security has its work cut out to manage all aspects of security operations proactively in deteriorating conditions.
What can the function do?
Senior leadership must step in, here, empowering the transformation of corporate security into a value-add, data-driven operation – one that can support the organisation’s strategic goals and objectives.
But how will you know once the transformation is complete? That’s where we come in. We’ve created a handy checklist, in which corporate security teams and their sponsors in senior leadership can assess the operation’s level of maturity – up to most advanced.
Here it is.
Corporate security management has entered the digital age. Yet, many corporate security outfits have not.
Guards track security incidents with pen, paper, and notepads. Those incidents get manually recorded in sprawling Excel spreadsheets. In the process, near misses get ignored; visibility into all incidents and an accessible audit trail get sacrificed. Sound familiar?
That’s because it is. And as a result, teams will have to start their transformation somewhere.
Why would it matter for smaller organisations in low-density facilities? These organisations likely only experience few, high-severity incidents. They do, however, experience some.
Their lower-maturity corporate security teams, as such, should have the functionality to track those incidents, even if the incidents themselves don’t require full-fledged investigations.
Arriving at this level of maturity entails access to digital solutions that enable the capturing and documenting of all aspects of a given corporate security incident.
What’s more, there should also be a consolidated, streamlined process in place, whereby those incidents are reported – preferably via mobile-optimised software applications that empower all security personnel to report incidents (including near misses) as often as possible.
Other functionality to look out for include:
What’s the thinking, here?
The more incidents captured and reported serves to increase visibility and line of sight to senior leadership – the latter preferably facilitated via seamless notification processes.
That way higher ups will begin to appreciate the ROI of the corporate security operation. Personnel decisions can then be more easily justified, with clear data that shows where, when, and how incidents are happening and how teams are responding to and investigating those incidents thoroughly – however rare.
Digitising security incident data is one thing. Leveraging that data once in a digitised format to quantify the impact of incidents, particularly when multiple, related investigations are happening simultaneously, is quite another level of corporate security maturity.
Why does it matter? As the security threat grows, organisations, particularly those in higher-density facilities, are likely to see larger number of incidents. Responding to these threats effectively is also likely to involve third parties.
Further, increased security caseloads mean triaging those that do come in via centralised reporting. That way teams can track and manage action items that emerge from analysis. Chain of custody might also need to be secured to show proper collection and handling.
This level of corporate security maturity entails effective digital case management, so that data users can more efficiently interact with the wider environment of information, resources, and services to make quicker, data-driven decisions throughout the life cycle of an investigation.
The result: detailed investigations, which better track losses and recoveries as well as provide more information to law enforcements, mitigating the severity of future incidents.
How do teams know that they are at this level of corporate security maturity? Well, for investigative work, access to digital technologies with configurable workflows is key. Those workflows automate key facets of unpredictable work to increase visibility into complex operations, improve collaboration, and facilitate better stakeholder engagement.
Intuitive user interface and experience (UI and UX) also cater to the varying demographics and technology skill levels of investigators and their supervisors. Access to these other digital case management platform capabilities is also important:
At this level of corporate security maturity, the following operational processes should be supported by digital workflows:
Beyond digital case management for corporate security operations, some of the most mature teams take rootcause data to highlight areas of improvement and improve emergency response times. They also use that data to implement proactive measures in alignment with larger organisational objectives – objectives that go beyond mere compliance goals
This level of maturity can be witnessed in digitally advanced law enforcement environments but can also be obtained by private enterprises in high-risk sectors and geographies.
What does it look like? Characteristic of the digital environment at this stage are in-system dashboards designed to suit diverse types of law enforcement/ investigative work. All system users get easy access to the information most relevant to their responsibilities in a single-source-of truth platform where they can efficiently complete their tasks.
For law enforcement investigations, specifically, potential use cases serviced include:
Corporate security doesn’t exist in a vacuum, though – even the best-trained and equipped programs are only as good as the teams working around them. That’s why the most mature corporate security operations can efficiently manage incidents that cross domains, i.e., events that fall under the remit of Work Safety, but also the Emergency Operations Centre (EOC), as well.
Such alignment tends to improve early warning detection capabilities. And then, when the event does take place, tight integration with Work Safety helps with conducting varied activities in a uniform, consistent manner.
Why isn’t that possible with a siloed approach to corporate security?
Well, that approach typically involves standalone systems. However powerful, these systems are likely to have been implemented at different times, by different teams following different directives. As such, they don’t communicate well with each other – if at all.
This lack of interoperability is likeliest to exist between safety and security, where disparate safety and security management systems (often locked apart from each other) aren’t set up to share relevant information, despite the demonstrated fact that security threats cascade into safety incidents (and vice versa).
One effect is specific to organisations who’ve built security operations centres (SOCs). During critical security incidents (impacting safety), SOC practitioners receive a surfeit of data from different sources, including Safety.
That wouldn’t be bad in and of itself. However, the noninteroperable technologies that security practitioners use don’t provide a cohesive means of viewing all relevant incident information, let alone making sense of it. And so, despite the upfront investment in proactive protective security strategies and structures, such an organisation will still run the risk of duplications and redundancies. Those slow down incident response, even when the SOC itself was developed to address that very issue.
What is done by more mature programs?
In these outfits, integrated platforms cut down on the overhead (cost and personnel-wise) of ensuring that separate point solutions keep communicating with each other. In addition to improved collaboration with Safety to neutralise common threats, these teams also get seamless access to operational, non-incident data, so often crucial in predicting future security incidents.
Too often, that data, e.g., intelligence on non-obvious threats or other incident causes that not apparent to human analysts, isn’t in the traditional bailiwick of corporate security.
However, the most mature programs have the capabilities to synthesise cross-domain data from multiple sources, including from the public. They often have the following tools at their disposal:
Over the last few years, the corporate security threat has increased exponentially. Meanwhile, after years of cutsi, corporate security teams are finally getting their funding restored.
What should they do? Well, investments must be made to ramp up to the level of security maturity necessary to mitigate risk, ensure compliance, and implement a proactive security culture.
Digital technology investments, such as in Noggin for Operational Security, should help in this process, expediting the ramp up process, closing the digital divide, and ensuring your team is able to scale to meet all challenges.
So, what are you waiting for? In this new normal of escalating threats, the most mature teams follow best practice, facilitated by their integrated software solutions, to collect information from across the organisation and the public, so they can deploy resources effectively, validate risks, and drive better understanding of where resources are best invested.
i. Madeline Lauver, Security Magazine: Security budgets may double or triple in 2022. Available at https://www.securitymagazine.com/articles/96802-security-budgets-may-double-or-triple-in-2022.