fifffflffiflffi ffifflfflffffffl ffiffl INDIA’S SECURITY STALWARTS Rajeev Sharma Country MD, G4S Corporate Services (India) Major Manjit Rajain Global Chairman, Tenon Group Powered by: Facility Management BW www.bwpoliceworld.com www.bwdefence.com Security worldfifffflffifl fifififffflfiffiflfiff Ffiffff fiff
#BWSecurity40Under40Awards AWARDS 2ND EDITION www.bwsecurityworld.com October 2024, New Delhi Recognising The Rising Stars Of The Industry For more information, write to us at [email protected] • Brand Exposure & Visibility • Networking Opportunity with Industry Experts • Exclusive New Technology Solutions • Showcase Innovative Products/Services • Collaboration Opportunity & more Why Participate? UPCOMING EVENT
Ensure Business Continuity With our converged security solutions Threats like physical breaches & unforeseen incidents can jeopardise business continuity by compromising critical assets. Our strong, tech-enhanced security systems backed by over 80,000 trained professionals, effectively minimises risks & safeguards business operations. Peregrine Guarding (+91) 124-6479800 [email protected] VIGILANT ON-GROUND MANNED GUARDING Well-trained, RPL certified security guards to protect your premises & take quick action against unauthorised access, trespassing or burglary. TECH-ENABLED THREAT DETECTION QUICK RESPONSE TEAM AT YOUR REACH Service Locations 11000+ Surveillance Cameras Installed 10000+ Satisfied Clients 3100 + Trained Professionals 80000+ Follow Us On: AI-assisted video feeds to detect suspicious activities like loitering, unauthorised access attempts, or potential break-ins. Our GPS-enabled QRTs backed by command center support delivers fast & effective emergency support, minimising damage to key assets & personnel.
2 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Where The Mind Is Without Fear Dr Annurag Batra, Editor-in-Chief, BW Businessworld & Founder, exchange4media A ccording to Charles Darwin, despite being the weakest creature on the planet, humans have ‘literally’ ruled it. Darwin sums this up in just two words: humans adapt. As humans, we have survived numerous challenges over generations. We have a fantastic history of evolution. We always found ourselves on the cusp of change. The emergence of AI and advanced technologies will undoubtedly bring about significant changes in humanity. Historian and author Yuval Noah Harari recently said, “As for the threat of AI, whereas 10 years ago it was still a science fiction scenario that interested only a very small community of experts, it is now already upending our economy, our culture and our politics. Within a few more years, AI could escape our control and either enslave or annihilate us.” However, what helps a generation grow or conquer all challenges? I think the right knowledge, awareness From The EDITOR and clear understanding of the change. And here we have a very important role to play: educate. As a magazine, we have always strived to provide our readers with informative content on financial security. However, as the world evolves, we recognise the importance of safety and security in the digital age. With the rise of technology, there is an ongoing debate about whether it has made us more vulnerable or secure. Ironically, the answer to these threats lies in technology itself. With the increasing number of online scams, cyber frauds, and fraudulent activities, it is our responsibility to educate and inform our readers about the ever-changing landscape of security. In this context, BW Security World could not have been launched at a more poignant moment. In this inaugural issue, we bring you insights on private security, ethical hacking, some bold, brave and beautiful stories from streets and the role of women in security, among various important topics. Happy reading! “IT’S NOT THE STRONGEST OR MOST INTELLIGENT OF THE SPECIES THAT SURVIVES, BUT THE ONE THAT’S MOST ADAPTABLE TO CHANGE.” Charles Darwin, On the Origin of the Species
Services C-250, Sector-63, Noida, UP [email protected] www.checkmateguards.com Call For More Info 9910391688 Industrial Security & Fire Safety Management Facility Management Services Electronic Security Systems Event Security Management Services Training Emergency Management Services Security Audits & Consultancy Corporate Intelligence Recruitment be safe, be secure, be relaxed we are on your side Risk Management Associates SECURITY & BEYOND
4 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Revolutionising Security: The Future Is Now Harsh Wardhan, CEO, BW Security World I am delighted to introduce you to the first issue of BW Security World. We are on a mission to explore the fascinating intersection of security, investigation, and artificial intelligence. And we would love for you to join us on this journey through the world of security. As the CEO of this brilliant initiative, I am thrilled to have you join me on this adventure, where we will explore the ever-changing landscape of security solutions enabled by innovative technologies. In today’s dynamic environment, strong security measures are essential. Organisations face a wide range of challenges, including protecting digital assets and ensuring physical safety. The combination of AI and investigative techniques provides a ground-breaking approach to addressing these issues, transforming how we mitigate threats and protect our assets. Artificial Intelligence (AI) has transformed the security industry, offering unparalleled capabilities in threat detection, predictive analytics and risk mitigation. AI’s advanced algorithms and machine learning capabilities allow us to analyse massive amounts of data in real time, detecting patterns and anomalies that would otherwise From The CEO go unnoticed. AI-driven solutions are transforming the security landscape, whether they are used to identify potential cyber threats or to improve surveillance systems. The combination of AI and investigative methodologies greatly improves our ability to detect hidden risks and unravel complex scenarios. By combining AI-powered tools with traditional investigative techniques, we can improve the efficiency and effectiveness of our security procedures. From forensic analysis to due diligence investigations, this collaboration enables us to respond to changing threats with agility and precision. In this inaugural issue, we look at the latest trends, technologies and best practices that are influencing the future of security and investigations. Our magazine contains in-depth articles, expert interviews and real-world case studies, making it an invaluable resource for professionals looking to gain insight into this rapidly evolving field. Join us on this exciting journey to discover the vast potential of AI, security and investigation. Together, we can navigate the complexities of today’s security landscape and shape a safer and more secure future. Thank you for embarking on this journey with us.
Security is about technology blended with human intervention. This makes APS more than a traditional security company. Our Skilled Team ensures seamless integration of tailor made tech solutions. From Proactive monitoring to rapid response, we’re dedicated to keeping you and your assets safe. AP Securitas: Leading the Way in Integrated Security Solutions Since 1986 AP SECURITAS E-Surveillance Quick Response Team IT Enabled App Based Solutions Security Services Training [email protected] 9891295959 0114-49960000 www.apsgroupindia.com
6 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 BW Businessworld does not accept responsibility for returning unsolicited manuscripts and photographs. All unsolicited material should be accompanied by self-addressed envelopes and sufficient postage. Published and printed by Annurag Batra for and on behalf of the owners, BW Businessworld Media Private Limited. Published at 74-75, Scindia House, Connaught Place, New Delhi-110001, and printed at Infinity Advertising Services Private Limited. Editor : Annurag Batra. © Reproduction in whole or in part without written permission of the publisher is prohibited. All rights reserved. R.N.I.No. 39847/81 BW Businessworld Media Private Limited EDITORIAL OFFICES BW Businessworld Media Pvt. Ltd., 74-75, Scindia House, Connaught Place, New Delhi-110001 Phone: 9818063325 ADVERTISEMENT/CIRCULATION / SUBSCRIPTION ENQUIRIES BW Businessworld Media Pvt. Ltd., 74-75, Scindia House, Connaught Place, New Delhi-110001 Phone: 9818063325 SUBSCRIPTION SERVICE Vinod Kumar +91 9810961195, [email protected], [email protected] HUMAN RESOURCES: Namrata Tripathi ([email protected]) LEGAL ADVISOR: Sudhir Mishra (Trust Legal) GROUP CHAIRMAN & EDITOR-IN-CHIEF: Dr. ANNURAG BATRA CEO, BW COMMUNITIES Bhuvanesh Khanna CEO & CHIEF INNOVATION OFFICER Hoshie Ghaswalla (CEO-BW Engage) GROUP EDITORIAL DIRECTOR Noor Fathima Warsia BW SECURITY WORLD TEAM: Assistant Editor: Priyanka Singh Sr Manager-Community & Editorial: Shilpa Chandel Trainee Correspondent: Prabhat Shukla Art Director: Shiv Kumar Assistant Images Editor: Sanjay Jakhmola Social Media & Community Outreach Associate: Sailesh Pal EXECUTIVE EDITOR: Suman K. Jha EDITORIAL TEAM Sr. Associate Editors: Ashish Sinha, Jyotsna Sharma, Meha Mathur Assistant Editor:Tarannum Manjul Sr. Correspondents: Rohit Chintapali, Deep Majumdar Correspondents: Abhishek Sharma, Arjun Yadav DESK TEAM Deputy Editor: Mukul Rai Associate Editors: Madhumita Chakraborty; Smita Kulshreshth ART TEAM Art Directors: Dinesh Banduni, Shivaji Sengupta Assistant Art Director: Rajinder Kumar Infographics & Data Visualiser: Arun Kumar PHOTO TEAM Sr. Photo Researcher: Kamal Kumar BW ONLINE: Assistant Editor: Poonam Singh VIDEO EDITORIAL TEAM Video Team: Anurag Giri, Pappu Kumar Singh, Sunny Kumar Paswan Sr. Cameraperson: Ratneshwar Kumar Singh BW APPLAUSE & EVERYTHING EXPERIENTIAL: Ruhail Amin BW AUTO WORLD: Utkarsh Agarwal BW ESG & BW CFO WORLD: Urvi Shrivastav BW CIO WORLD: Ratnadeep Chaudhary BW DISRUPT: Resham Suhail BW HEALTHCARE WORLD: Smridhi Sharma, BW EDUCATION: Upasana BW HOTELIER: Editor: Saurabh Tankha Editorial Lead: Bulbul Dhawan Operations Controller: Ajith Kumar LR BW MARKETING WORLD: Soumya Sehgal, Reema Bhaduri BW PEOPLE: Sugandh Bahl, Krishnendra Joshi BW LEGAL WORLD: Kaustubh Mehta GROUP EDITORIAL HEAD: Vishal Thapar BW POLICE WORLD: Ujjawala Nayudu DIRECTOR: Prasar Sharma GROUP SR. VICE PRESIDENT - STRATEGY, OPERATIONS & MARKETING Tanvie Ahuja ([email protected]) CEO, BW HEALTHCARE WORLD & BW WELLBEING WORLD: Harbinder Narula DIRECTOR, ADVERTISING & REVENUE: Aparna Sengupta DIRECTOR, PROJECTS & COMMUNITIES: Talees Rizvi VICE PRESIDENT: Mohit Chopra MARKETING & DESIGN TEAM: AGM- Business Development & Marketing: Bilquis Naqvee Kartikay Koomar, Mohd. Salman Ali, Moksha Khimasiya, Shweta Boyal, Alka Rawat, Arti Chhipa, Mradul Dwivedi, Himanshu Khulbe Asst. Manager - Design: Kuldeep Kumar EVENTS TEAM: Tarun Ahuja, Devika Kundu Sengupta, Priyanshi Khandelwal, Preksha Jain, Akash Kumar Pandey, Mohd. Arshad Reza, Sneha Sinha, Ashish Kumar, Atul, Nandni Sharma, Mahek Surti, Reeti Gupta, Atul Joshi, Biren Singho, Neeraj Verma, Anupama Agrawal, Sushmita Kumari, Vaishali Vij, Anmol Kaur, Baani Chauhan, Shivam Popli, Prashant Kumar, Mayank Kumar SALES TEAM NORTH: Ravi Khatri, Anjeet Trivedi, Rajeev Chauhan, Amit Bhasin, Saurabh Jain, Somyajit Sengupta, Sajjad Mohammad, Agrata Nigam WEST: Kiran Dedhia, Nilesh Argekar SOUTH: C S Rajaraman BW COMMUNITIES BUSINESS LEADS Priya Saraf (BW Education), Gareema Ahuja (BW Legal World), Chetan Mehra (BW Disrupt), Shruti Arora (BW Marketing World) CIRCULATION TEAM General Manager - Circulation, Subscription & Sales: Vinod Kumar ([email protected]) NORTH-EAST: Vijay Kumar Mishra, Mukhtadir Malik, Kamlesh Prasad WEST: Gorakshanath Sanap SOUTH: Sarvothama Nayak K Production Manager: Shiv Singh FINANCE TEAM Ankit Kumar, Ishwar Sharma, Shrikant Sharma, Vijay Jangra IT SUPPORT: Brijender Wahal ADMIN SUPPORT: Assistant to Chairman & Editor-in-Chief: Aman Mishra ([email protected]) VOL. 1, ISSUE 1 APRIL-JUNE 2024 Security world
JURY CHAIR SANJEEV KUMAR BIJLI Executive Director PVR INOX SUMMIT & AWARDS 2024 www.bwmarketingworld.com fifffflffifl fflffiflffi TUSHAR MALHOTRA Director of Sales and Marketing Bisleri International AKUL NARULA Head - New Business (Sales & Partnerships) Paytm Insider RABINDRA NARAYAN Managing Director & President PTC SAIKOT DAS Marketing Director - South Asia, Middle East & Africa Levi Strauss India PRIYANKA (MALHOTRA) SETHI Director & Head - Marketing Haier Appliances India KUMAR TAURANI Managing Director Tips Industries SANJAY BHUTANI Managing Director - India & SAARC Bausch & Lomb India NAVEEN SONI President Lexus India DR ANNURAG BATRA Chairman & Editor-in-Chief, BW Businessworld and Founder, exchange4media Group HIMANSHU KHANNA Chief Marketing Offcer Raymond VIRAT KHULLAR Assistant Vice President & Vertical Head, Marketing Hyundai Motor India JURY PANEL ANIL SINGH Founder & Managing Director Procam International DHRUV DAVAR Chief Executive Offcer Inextis Events GOUR GUPTA Chairman and Managing Director Tribes Communication HARI KRISHNAN Managing Director and Head - Publicis Content Publicis Groupe India SABBAS JOSEPH Founder – Director Wizcraft International Entertainment NAVEEN KUNDU Managing Director Ebixcash Travel Services PRAMOD LUNAWAT Founder & CEO Millennium Event and Marriageuana SAMIT GARG Owner E-Factor SUSHMA GAIKWAD Co-founder Ice Global VIJAY SUBRAMANIAM Group CEO and Founder Collective Artists Network GITIKKA GANJU DHAR Anchor Ministry of Talk - Made in India INDUSTRY STALWARTS/DOMAIN EXPERTS/TECHNICAL PANEL FOR PARTNERSHIP OPPORTUNITIES, PLEASE CONTACT: FOR NOMINATIONS, PLEASE CONTACT: Shivam Popli: +91 88003 29489, [email protected] fflfflffi ffl Aparna Sengupta: +91 9958000128 [email protected]
8 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 In this Security world Free From Fear 34 64 For A Future 37 ‘Indian Security: Manpower Giant with a Mission’ Interview: Major Manjit Rajain, Global Chairman, Tenon Group 41 Today’s Complex Threats Demand More Interview: Rajeev Sharma, Country MD, G4S Corporate Services (India) 10 Veterans: Masters of Security Operations 14 Fortifying Homes: With Technologically Advanced Weapons 18 Urgent Need for Strengthening Security in Education 22 Saving The Seafarers Good Hacks Bad Hacks Even Hacking Has Got Ethics
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 9 issue VOLUME 1, ISSUE 1 APRIL-JUNE 2024 78 86 98 58 Building a Fortified Future 60 Any Woman in Security? Many 70 Why Infrastructure Security Matters? 74 The Untapped Power of Risk 94 Private Security Industry Bolsters Public Safety 104 Recognising The Leaders Of Tomorrow! 114 Celebrating Excellence 126 Crisis Management: From Panic to Plan 26 Navigating Changing Dynamics of Cybersecurity Marketing 30 How to Report Cybercrime in India? 47 How Secure Are Indian Airports? 52 Beyond the Badge: Career Options in Security Industry Drones Rethinking Security The Real Heroes The New Edge Weapon APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 9
10 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Veterans understand the importance of attention to detail, precision and consistency in executing security tasks Feature Corporate Security Veterans: Masters of Security Operations 10 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 11 One of the most valuable qualities veterans bring to the table is their exceptional leadership skills and unparalleled discipline. Veterans have extensive experience in managing highpressure situations and making critical decisions under stress. Through their military service, they have acquired the ability to think quickly, adapt to changing circumstances and effectively manage teams. These attributes enable veterans to excel in leadership roles within corporate security management. Leadership is fundamental in corporate security management as it sets the tone for the entire security operation. Veterans, with their background in military leadership, understand the importance of leading by example, communicating effectively, and fostering a culture of accountability within their teams. They have been trained to inspire confidence in their subordinates, delegate tasks efficiently and provide clear direction even in the most challenging situations. Discipline is another cornerstone of military training that veterans bring to corporate security management. In the military, adherence to protocols, regulations By Kunwar Vikram Singh Chairman, CAPSI APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 11
12 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 and standard operating procedures is paramount. Veterans understand the importance of attention to detail, precision and consistency in executing security tasks. They instill a sense of discipline within their teams, ensuring that security procedures are followed rigorously and vulnerabilities are addressed promptly. Risk Assessment and Strategic Planning Veterans possess a unique perspective when it comes to risk assessment and strategic planning. Their understanding of potential threats, coupled with a disciplined approach to evaluating vulnerabilities, allows them to create comprehensive security strategies. By leveraging their military training, veterans can identify potential risks, analyse them effectively and develop proactive measures to ensure the safety of people and assets. In corporate security management, risk assessment is crucial for identifying potential vulnerabilities and implementing measures to mitigate them. Veterans are adept at conducting thorough risk assessments, considering factors such as physical security, cybersecurity, insider threats, and external risks. They leverage their experience in threat analysis and scenario planning to develop strategic security plans tailored to the specific needs of the organisation. Operational Expertise With their extensive operational experience, veterans bring invaluable expertise to corporate security management. They have been trained in various security protocols and possess practical knowledge of implementing security measures in complex and diverse environments. Veterans can effectively implement access control systems, surveillance technology, emergency response plans and other security procedures to safeguard an organisation’s interests. Veterans understand the importance of integrating technology, manpower and procedures to enhance security operations. They leverage their operational expertise to optimise security resources, streamline processes and ensure maximum effectiveness in protecting assets and personnel. Additionally, veterans excel in contingency VETERANS EXCEL IN CRISIS MANAGEMENT BY ESTABLISHING CLEAR CHAINS OF COMMAND, DELEGATING RESPONSIBILITIES, AND MOBILISING RESOURCES EFFECTIVELY
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 13 Feature / Corporate Security planning, developing response protocols for various security scenarios and conducting exercises to test the organisation’s readiness to handle threats. Crisis Management Handling crisis situations is an area where veterans excel. Their ability to remain calm, make quick decisions and act decisively in chaotic situations helps organisations effectively manage emergencies. Veterans are trained to evaluate threats, coordinate resources and execute emergency response plans efficiently. Their experience in handling crisis situations during their service allows them to bring a level-headed and structured approach to corporate security management. In a crisis situation, effective communication, decisive action and coordination are essential for minimising damage and ensuring the safety of personnel. Veterans excel in crisis management by establishing clear chains of command, delegating responsibilities, and mobilising resources effectively. They leverage their experience in dealing with high-stakes situations to develop robust crisis response plans, conduct training drills, and continuously refine procedures to enhance organisational resilience. Mentoring and Training Veterans also play a pivotal role in mentoring and training the existing security personnel within an organisation. Their leadership abilities and experience enable them to impart valuable knowledge, expertise, and best practices to the security team. Veterans understand the importance of continuous training, and they can cultivate a culture of learning and improvement within the security department. Through mentorship programmes, veterans transfer their skills and experiences to the next generation of security professionals, ensuring continuity and succession planning within the ganisation. They provide guidance on security protocols, share insights on emerging threats and trends, and empower their team members to develop critical thinking skills and problem-solving abilities. Additionally, veterans leverage their networks within the military and security community to provide access to training resources, certifications, and professional development opportunities for their team members. The impactful role veterans play in corporate security management cannot be overstated. Their leadership skills, discipline, risk assessment abilities, operational expertise, crisis management and mentoring capabilities contribute to creating a secure corporate environment. Organisations benefit from the diverse skill sets and experiences veterans bring from their military service. By recognising the immense contributions of veterans, businesses empower themselves to enhance their security measures and mitigate risks effectively. Embracing the expertise and leadership of veterans within the realm of corporate security management sets the foundation for a stronger and safer future. THROUGH MENTORSHIP PROGRAMMES, VETERANS TRANSFER THEIR SKILLS AND EXPERIENCES TO THE NEXT GENERATION OF SECURITY PROFESSIONALS, ENSURING CONTINUITY AND SUCCESSION PLANNING WITHIN THE ORGANISATION
14 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Fortifying Homes With Technologically Advanced Weapons By BW Security World Team 14 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 15 Feature / Residential Security Looking globally, the home security systems market is poised for substantial growth, projected to expand from $56.9 billion in 2022 to $84.4 billion by 2027 I n India, whether you reside in a standalone house or a towering high-rise, your home security is a paramount concern. The conventional methods of safeguarding your home, such as sturdy doors and watchmen, are no longer adequate in the face of increasingly sophisticated criminal techniques. The changing landscape of family structures, with more nuclear families, and the rising income levels in urban areas have intensified the demand for robust home security systems. Consumer research underscores the need to transition to more technologically advanced security solutions, minimising human errors. A well-rounded electronic security system for residential use comprises three main components: n Access Control: This includes door controllers and readers. It regulates who can enter your premises. n Intrusion Detection: This involves burglary and fire alarms to alert you in case of unauthorised entry or emergencies. n Video Surveillance Systems: Advanced CCTV systems and video door phones offer real-time monitoring. APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 15
16 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 The advantages of integrated systems are evident. They reduce initial investment costs, centralise training, and minimise ongoing administrative and maintenance expenses. Notably, video surveillance systems have seen remarkable progress in recent years. Modern CCTV systems can transmit real-time video feeds over IP networks to devices like smartphones and tablets. Developers have cleverly started offering these integrated security solutions as part of their home automation packages, allowing them to command premium prices for these services. This trend is especially noticeable in the luxury real estate sector, where cutting-edge security technologies are becoming an integral part of home automation in residential projects. The market for home automation systems within housing societies is currently valued at around Rs 150 crores (excluding standalone properties), and it is anticipated to grow at a rate of 15 per cent. As affluence increases and security concerns multiply, this growth is expected to gain momentum. Looking globally, the home security systems market is poised for substantial growth, projected to expand from $56.9 billion in 2022 to $84.4 billion by 2027, reflecting a THE CHANGING LANDSCAPE OF FAMILY STRUCTURES, WITH MORE NUCLEAR FAMILIES AND THE RISING INCOME LEVELS IN URBAN AREAS HAVE INTENSIFIED THE DEMAND FOR ROBUST HOME SECURITY SYSTEMS robust CAGR of 8.2 per cent. The Future of Connected Home Security The future of connected home security systems is bright, as advancements in technology, such as machine learning and artificial intelligence, are increasingly being integrated into security devices. These innovations improve threat detection and minimise false alarms while enhancing access control through more accurate facial recognition technology. The Internet of Things (IoT) has significantly transformed the security landscape, shifting from traditional deterrence-based methods to a more proactive “intervention and prevention” approach. IoT networks enable continuous security system operation, gathering real-time data for professional monitoring and cross-referencing. By analysing extensive data sets, these interconnected devices can identify potential security vulnerabilities based on patterns and anomalies, allowing homeowners and business Feature / Residential Security
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 17 solutions is emerging, including auto-lock cabinets, pressure sensors, and keycard readers. These devices can be activated in real-time to counter potential intrusions, ensuring comprehensive home and business security. The Power Of Connectivity When predictive analytics, remote surveillance, and interconnected ecosystems combine with professional insights and monitoring, IoT-based security systems are poised to set a new standard. They empower homeowners and business owners to anticipate and prevent potential threats with a level of confidence previously unseen. Enhanced Convenience and Peace of Mind One of the key benefits of connected homes is the convenience they offer. Homeowners can remotely access and control their security systems via smartphones or other connected devices. Real-time notifications and alerts keep them informed about any suspicious activities or emergencies. Whether it’s checking the live feed from a security camera or granting access to a trusted visitor via a smart lock, connected home security systems provide peace of mind and flexibility. Integration and Customisation The home security systems market is evolving to provide seamless integration with other smart home appliances. Homeowners can create automation rules that connect security systems with other smart home elements, tailoring them to their specific needs and preferences. For example, security cameras can be linked to voice assistants for easy access to live feeds, while motion sensors can trigger lights when someone enters a room. Video Surveillance Systems Leading the Way In the home security systems market, video surveillance systems will hold the largest share in 2022. Hardware products, such as cameras, monitors, servers, storage units, and other accessories, are central to video surveillance systems. The future of home security is connected, smart, and highly adaptable to individual needs. owners to address threats before they materialise. IoT-based security solutions offer substantial benefits for both professional and DIY systems. Wider connectivity options in DIY solutions enhance system robustness, while networks like LTE-M provide low power consumption, enabling devices to function during Wi-Fi lapses and maintain operation during emergencies. These networks also facilitate remote real-time monitoring via smartphones or tablets, aligning DIY systems with professional counterparts’ capabilities. An array of IoT-based security
18 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Security in Education Urgent Need for Strengthening The education system should Incorporate comprehensive security, including physical, cybersecurity, crisis management, and cutting-edge technology, into regular education curriculum Security Column Education I n today’s digital world, cybersecurity plays an important role in the day-to-day activities of human life as well as in organisations and institutions. There are a number of examples of data breaches or hacking in the recent past, including social media platforms Yahoo, LinkedIn, and Facebook, as well as the All-India Institute of Medical Sciences (AIIMS) servers, airports and many more. All the educational institutions have very vital and important data, information and documents related to academics, education, training, research and extensional activities, and they have to be safeguarded and protected from any kind of cyber threat. Especially, after Covid-19, By Narendra Singh Sirola Visiting Faculty & Ex-Centre Head CCPSS, Rashtriya Raksha University 18 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BW APRIL-JUNE 2024 | BWSECURITYWORLD SECURITYWORLD.COM | 19
20 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 the dependency on digital aids has increased by many folds and technology use, especially online, remote learning, virtual conferences, etc., is extensively used and has become a lucrative target for cybercriminals or hackers for data breaches. The increasing trends of data theft, breaches and fake identities are also becoming a matter of great concern for any educational institution these days. Hence, appropriate and updated cyber security measures, such as backup and disaster recovery plans, ensure operational continuity, which is the need of the hour in all educational institutions or organisations. Security In Education System Security is all about protecting individuals, human resources, property, assets, information and the brand of any institution or organisation from any kind of threat by putting protective security measures in place. Security in terms of national security, internal security, industrial security, corporate security or institutional security is very important in any education system and has to be taught to the students as a special subject in the educational curriculum of the educational institutions. Hence, security in the education system should be inculcated in such a manner that it creates a safe and conducive learning ecosystem where the learners or students can thrive academically and in their day-to-day lives. The education system should include all aspects of security, like physical security, cyber security, crisis management and an integrated T he security of any educational institution or system is very important. Every educational institution has plenty of data and information that needs to be well protected and safeguarded by putting different kinds of measures, like physical and cyber security measures, in place. In the present scenario, educational institutions are prone to various cyber threats and attacks, and the valuable data of the organisation or institution can be lost if the systems are not robust. The intellectual property of the faculty members and institution has to be safeguarded from any kind of threat, whether it is plagiarism, a data privacy threat, a cyberattack, data theft, or an insider threat. Hence, the combination of physical and cyber security plays an important role in protecting and maintaining a conducive ecosystem or environment for the organisation or institution. So far as the future of security in system development is concerned, it is very important and sensitive. There are various areas where system development is the need of the hour with the latest technology like AI, machine learning, endpoint security, block chain technology and user-friendly security solutions to overcome the threat so that mechanism is in place to continuously counter the threats. Future Of Security In Education security system involving the latest technology, in the regular curriculum. Benef its Of EndUser CyberSecurity Education The end-user cyber security education is very important. It may empower the students, faculty, or any citizen with adequate knowledge and skills so that they themselves will be in a position to protect their digital assets and data from any kind of cyberattack or threat. This kind of education can include various aspects like risk reduction, awareness of various possible threats, protection of sensitive information, etc., which will empower every individual with
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 21 EDUCATIONAL INSTITUTIONS POSSESS DATA CONSIDERED TO BE OF CRITICAL IMPORTANCE, INCLUDING ACADEMIC, RESEARCH AND OTHER INFORMATION. IT IS ESSENTIAL TO PROTECT THIS DATA FROM A VARIETY OF CYBER THREATS the confidence to protect not only their own information and digital data but also that of their family members, community and organisations. Concepts Of Private Security The moment we talk about the private security concept, it goes back to the history when urbanisation began in our societies and the state (government) police were not sufficient to protect non-state organisations and their assets from various kinds of continuously increasing threats; hence, the private security concept evolved. The development of private security has increased the protection and safeguarding of individuals, human resources, property, assets, information, and the brand of any organisation or individual. Private security in the present world plays an important role in safeguarding individuals’ and organisations’ property and assets. If we talk about the status of private security within our country, more than 10 million private security personnel are safeguarding the assets and properties of individuals, private, corporate, and industrial houses, institutions, societies, and communities. The role of private security during and after Covid-19 was marvellous. Due to its importance for societies and organisations, the central and state governments in our Security Column / Education country declared private security services essential services. In the coming days, private security is going to play an important role as a private security player in the Private Public Partnership (PPP) concept. This sector is going to be the most employment-generating sector for the youth and students of India, not only within our country but also outside countries as well. Purpose Of Security Industry The prime objective of industrial or corporate security is safeguarding individuals, human resources, assets, properties, information, and the brand of any organisation or business from various kinds of threats like intrusion, violence, terrorism, organised crimes, industrial espionage, sabotage, IPR issues, piracy, cybercrime, man-made or natural disasters, etc.
22 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 SECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 23 Feature / Maritime Security Saving The Seafarers India’s maritime security emerges as a critical national imperative given its extensive coastline and strategic reliance on sea routes T he maritime environment is constantly changing, and India faces various challenges requiring a sophisticated and nuanced response. Asymmetrical tactics and grey-zone warfare create security dilemmas, while emerging threats such as combat drones and land-attack missiles at sea challenge traditional maritime security concepts. Non-traditional security threats also pose complex challenges. Illegal fishing depletes marine resources and harms coastal communities’ livelihoods. Frequent and intense natural disasters, such as cyclones and tsunamis, challenge maritime security and emergency response efforts. Human and drug trafficking through maritime routes contribute to maritime insecurity. INITIATIVES FOR ROBUST MARITIME SECURITY To tackle the diverse maritime security challenges, India has launched several strong initiatives to strengthen its maritime security apparatus. This includes modernising maritime security agencies like the Indian Navy, Coast Guard and Marine Police, focusing on both capacity building and acquiring cutting-edge platforms, systems and equipment. Key acquisitions include aircraft carriers, submarines, frigates, helicopters, radars and satellites, which significantly enhance surveillance and patrol capabilities in India’s maritime zones. This holistic approach plays a crucial role in improving the nation’s maritime security. A crucial aspect of India’s maritime security strategy is the improved technical monitoring of coastal and offshore regions. Implementing projects like the Coastal Surveillance Network, the National Command Control Communication and Intelligence Network, the National Automatic Identification System and the National Maritime Domain Awareness Project offers a comprehensive and integrated understanding of the maritime domain. These initiatives facilitate early detection and response to threats or incidents, promoting a proactive approach to maritime security. Effective inter-agency coordination is a cornerstone of India’s maritime security framework. By setting up organisations and committees such as the National Committee for Strengthening Maritime and Coastal Security, the National Maritime Security By BW Security World Team
24 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Coordinator, the Joint Operations Centres and the Coastal Security Operations Centres, India fosters efficient collaboration and information exchange among relevant maritime security stakeholders. This cooperative approach engages key entities, including the Navy, Coast Guard, Customs, Intelligence, Fisheries and Ports, ensuring a unified and integrated response to maritime threats. India’s maritime security efforts go beyond institutional frameworks and engage fishing and coastal communities. Initiatives like biometric identity cards, transponder installation, distress alert transmitters, community awareness programmes and livelihood support schemes aim to involve these communities actively. By fostering their participation, India strengthens grassroots maritime security, recognising the link between coastal communities and the broader security paradigm. GLOBAL ENGAGEMENT AND PARTNERSHIPS India acknowledges the interconnectedness of maritime security and actively participates in global initiatives and partnerships. The Security and Growth for All in the Region (SAGAR) initiative promotes regional collaboration, economic growth and a secure maritime environment. Platforms like the Indian Ocean Naval Symposium (IONS) and the Indian Ocean Rim Association (IORA) facilitate dialogue, cooperation, and coordinated responses to shared maritime challenges. India’s engagement in global A CRUCIAL ASPECT OF INDIA’S MARITIME SECURITY STRATEGY IS THE IMPROVED TECHNICAL MONITORING OF COASTAL AND OFFSHORE REGIONS forums like the ASEAN Regional Forum (ARF) and the Quadrilateral Security Dialogue (Quad) demonstrates its commitment to strengthening maritime security cooperation. By participating in these platforms, India works with partner nations to exchange intelligence, conduct joint exercises, enhance capacity, and synchronise responses to shared threats. This collaborative strategy contributes significantly to fostering regional stability and security. FUTURE STRATEGIES AND VISION Facing evolving maritime challenges such as combat drones, land-attack missiles, and geopolitical tensions, India focuses on reinforcing resilience and adaptability. The maritime security vision, centred on secure seas, drives the nation towards a future marked by regional stability, economic growth and cooperative security initiatives. India’s approach to future maritime security consists of
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 25 Feature / Maritime Security anticipating emerging threats, embracing advanced technologies, and strengthening global collaborations. With a focus on adaptability and readiness, the nation’s maritime security strategy reflects the evolving nature of the maritime domain. India’s experience in ensuring its maritime security involves a delicate balance of addressing challenges, implementing strategies, and engaging globally. Its dedication to navigating these waters with insight and collaboration makes it a significant player in shaping the future of maritime security. As maritime threats evolve, India is well-positioned to promote not only its own security but also the overall stability of the global maritime domain. The vision for secure seas drives India towards a future defined by security, prosperity and cooperation at sea.
26 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Cybersecurity Marketing Navigating Changing Dynamics of Column Cybersecurity Marketing 26 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 27 Column / Cybersecurity Marketing Cybersecurity regulations are stringent. Given that the average cost of a data breach is $4.45 million, it’s understandable why this is taken so seriously T he unknown future rolls towards us.” Sarah Connor spoke these words in the classic sci-fi action movie Terminator 2: Judgement Day. In the epic sci-fi action movie, humanity finds itself in a race against the very technology it created, with Hamilton’s character battling against AI-powered machines to save the world. One element from the film rings true today: better technology equals more sophisticated cyber threats, with threat actors utilising AI-powered tech to iterate code rapidly and massproduce threats. A cybersecurity company’s responsibility is to empower customers to stay ahead of those threats by keeping their finger on the pulse of emerging trends. It’s essential to be proactive not just on one front but on multiple fronts. It’s not enough to just have great products; you must excel at communicating how they solve customer challenges. Evolution of Cyber Threats Gone are the days when antivirus software could check all your IT security boxes. Today, threats range from ransomware attacks to social engineering that exploits good oldfashioned human error. Cybersecurity marketing has had to adapt. The changing landscape requires marketing to emphasise the strength of core defences and the importance of new, proactive solutions. For example, HSMs have always been the most reliable way to protect sensitive data, but that doesn’t mean there aren’t more efficient, innovative, and user-friendly ways of deploying HSMs. Current marketing initiatives often focus on combining threat intelligence, AI-driven analytics, and advanced endpoint protection. Rise of cloud computing Cloud services are, almost universally, on the rise. The cloud offers flexibility and scalability that the previous generation of system architects could only dream of. As companies embraced digital transformation and moved their applications to the cloud, technology vendors had to embrace new ways of marketing their cybersecurity solutions. For example, the cloud has brought enterprise-grade security solutions to a broader user base. High availability and scalability became affordable to the midmarket as platform providers expanded their service offerings. As a result, cybersecurity marketing focuses on what makes the cloud unique. These include rapid deployment, OpEx financial models, extensive use cases, and easy, native integration with public cloud platforms. Regulatory Landscape Cybersecurity regulations tend to be strict. Considering the average data breach cost is around $4.45 million, it’s clear why this is taken so seriously. Compliance requirements like GDPR or PCI DSS push organisations to harden their cybersecurity infrastructure. The regulatory landscape has had a profound impact on cybersecurity marketing. Customers need to trust that compliance can be easily achieved without impacting business operations. Cybersecurity providers must convey the effectiveness of their solutions and the relevant compliance requirements they fulfill. Marketing efforts must explain how a provider’s solutions aid in regulatory compliance, whether storing encryption keys in hardware, defining user access controls, or creating audit trails. By Michael Krutikov VP – Global Marketing, Futurex
28 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Emphasis on user awareness and education Unfortunately, the weakest link in the security chain is often human error. Phishing attacks, social engineering, and other tactics exploit human vulnerabilities. In response, cybersecurity marketing has emphasised the importance of user awareness and education. Marketing campaigns now include educational content, webinars, and training modules designed to arm users with the knowledge to avoid potential threats. This shift reflects an understanding that effective cybersecurity relies on educated and vigilant users. Additionally, system administrators must be trained and enabled to configure and maintain their environment effectively. Interoperability is the vendor’s responsibility; communicating what and how that integration will work in a customer’s environment is up to marketing. Collaboration and integration Speaking of interoperability, there is a growing emphasis on collaboration and integration in cybersecurity. When the average enterprise has 50–60 different cybersecurity products in-house, it takes all of them working together to secure the infrastructure. Customers look for solutions that easily integrate with their applications, platforms, and security tools. When an organisation’s security products and solutions work together and eliminate gaps, it creates a strategy of holistic defence, which, beyond any individual product or solution, is a critical goal within IT security. Personalisation and targeted marketing To stand out in a crowded marketplace, you need personalised and targeted marketing. Different industries face different cybersecurity challenges; marketing campaigns should be tailored to these specific concerns. For example, a global payment processor’s compliance and computing requirements tend to differ from those of a healthcare provider. Personalised content, industryspecific case studies, and targeted advertising help cybersecurity companies connect with customers more effectively. When marketers demonstrate their company’s understanding of specific threats and challenges a particular vertical faces, it establishes credibility and trust. As technology and cyber threats evolve, we anticipate that consumers will shift their attention to solutions that jointly address core business problems and compliance requirements. As the cybersecurity landscape develops, marketing efforts will play a pivotal role in equipping businesses with the knowledge and tools to stay ahead of ever-advancing cyber threats. IT’S NOT ENOUGH TO JUST HAVE GREAT PRODUCTS; YOU MUST EXCEL AT COMMUNICATING HOW THEY SOLVE CUSTOMER CHALLENGES
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 29 ‘Security Redefined: We Are Raising the Bar for Excellence’ A s CEO of A P Securitas Pvt. Ltd., I am excited to reflect on a year of tremendous development and achievement. Last year was quite an eventful year for us, wherein we were able to win multiple awards and recognition from our various clients and industries. To name a few: JLL & CBRE awarded A P Securitas as the Best Security Company for compliance and response; CAPSI Certified Company, OSPA has crowned us with a double bonanza of awards as Outstanding Security Company and Lifetime Achievement Award to our Group CMD, Anil Puri. Under Puri’s guidance, APS Group has cultivated a culture of excellence where employees are motivated to go above and beyond in their roles. Through various initiatives and incentives, he has instilled a sense of pride and ownership among the workforce, driving them to deliver outstanding results consistently. As a business, we have taken on many challenges and delivered outstanding solutions and operational results by offering services in difficult terrain and surroundings. In the face of adversity, we took a proactive approach, quickly adjusting our plans to meet our clients’ evolving expectations. This strategic pivot not only allowed us to give crucial support to our clients, but it also established us as leaders in our domain. We have made contributions to our clients’ operations by reducing their carbon footprints and converting their data into digital format. This success has led to a demand for our assistance in extending these services globally. A P Securitas values and promotes diversity and inclusion. We demonstrate this commitment by offering equal job opportunities and respecting all genders in the workplace. By fostering a diverse and inclusive environment, we enrich our team and enhance our ability to serve our clients effectively and responsively. As we celebrate our accomplishments and look to the future, innovation and raising the bar for excellence in the security sector are our “go-to formula”. Our endeavour will be to redefine excellence and service in the security industry. By Vikas Chadha Group CEO, A P Securitas BW; BUSINESSWORLD Feature Presentation APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 29
30 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Report Cybercrime How to in India? If you believe you have fallen prey to an online scam and want to report it, you can follow these steps to do so using the National Cyber Crime Reporting Portal By Prabhat Shukla
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 31 Spotlight / Cybercrime I n today’s digital era, online scams have emerged as a major global concern and India is certainly no exception. With the increasing prevalence of online transactions and digital communication, the risk of falling victim to cyber fraud has surged significantly. Over the past few months, India has witnessed a notable increase in cases of online fraud, with individuals losing money to scams like part-time job offers, fake YouTube video promotions and Crime Reporting Portal, an online platform specifically designed to streamline the reporting process for cybercrimes. Ideally, incidents should be reported within 24 hours to enable law enforcement to track transactions promptly, but it’s essential to report them as soon as possible. If you find yourself a victim of an online scam and wish to report it, a step-by-step guide given in the box on how to do so using the National Cyber Crime Reporting Portal. When reporting cyber fraud various other deceptive schemes. These crimes can have devastating financial and emotional consequences for victims, underscoring the importance of promptly reporting such incidents. Reporting online scams is crucial, and there are specific steps individuals can take to do so effectively. Victims have two primary options for reporting cybercrimes: they can either visit their local police station in person to file a complaint or make use of the National Cyber THE NATIONAL CYBER CRIME REPORTING PORTAL IS A GOVERNMENT INITIATIVE AIMED AT ASSISTING CYBERCRIME VICTIMS IN FILING COMPLAINTS ONLINE
32 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 cases related to online transactions, lottery scams, ATM transactions, fake calls, or internet banking fraud, it’s crucial to attach proof of the fraudulent transactions. Additionally, include any supporting evidence you may have, such as bank statements, address and ID proof, and any suspicious messages or emails you have received. By following these steps and promptly reporting cybercrimes, individuals can play a crucial role in safeguarding themselves and others from falling victim to online scams and fraud. T he National Cyber Crime Reporting Portal is a government initiative aimed at assisting cybercrime victims in filing complaints online. This portal accepts all types of cybercrime complaints, with a particular focus on crimes against women and children. It operates 24/7 and offers a dedicated helpline number (1930) for assistance. To report an online scam on this portal, follow these steps: 1Access the Portal Open your web browser and go to the portal’s official webpage: [National Cyber Crime Reporting Portal] (https:// cybercrime.gov.in). 2File a Complaint On the homepage, click on the ‘File a complaint’ option. 3Accept Terms and Conditions Read and accept the terms and conditions presented on the following page. 4Report Other Cybercrime Click on the ‘Report other cybercrime’ button. 5Citizen Login Choose the ‘citizen login’ option and provide your details, including your name, email, and phone number. 6Verification Enter the OTP (one-time password) sent to your registered phone number, complete the captcha and then click ‘submit’. 7Report Cybercrime Details On the next page, you’ll be asked to provide comprehensive details about the cybercrime you wish to report. This information is typically divided into four sections: general information, victim information, cybercrime information, and a preview. Ensure that you fill in all pertinent details in each section. 8Submit The Complaint After reviewing the information, click the ‘Submit’ button. 9Incident Details You will be redirected to an incident details page. Here, you can provide additional details and supporting evidence related to the crime, such as screenshots or files. Once you have entered the necessary information, click ‘Save and Next’. 10Suspect Information The subsequent page allows you to provide information about the alleged suspect if you have any relevant details. 11Final Verification and Submission Verify all the information you have provided and click ‘Submit’. 12Confirmation You will receive a confirmation message indicating that your complaint has been successfully registered. Additionally, you will receive an email containing your complaint ID and other pertinent details. How to report online using the Portal “India is rapidly digitising, but the digital literacy rate is extremely low. This provides an advantage to attacks aimed at defrauding innocent Indians through various methods.” Krish, Anuj, Co-founders, Cyber Detectives
fifffifflffiflfifffi ffiflfi fifffifflffiflfi fifffflffiffflfflfflfi fi fflfiffifflfl fi flfiffi flfififfifififl fiffffflfflfflfiffl ffffffl ffi ffi fflfifflffifi ffiffflfflfflfi ff fifflffifl fiffffflfflfflffl FOR NOMINATIONS Saloni Jain | +91 98738 45195 [email protected] CELEBRATING EXCEPTIONAL ENTREPRENEURS/ INTRAPRENEUR fi flffiffiffi 8th Edition
34 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 With each technological advance and every strategic partnership forged on the global stage, we inch closer to a future where safety and security are not merely aspirations but realities Cover Story Insight
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 35 Free From Fear For A Future By Shilpa Chandel Cover Story / Insight I n the dynamic landscape of contemporary India, concerns surrounding safety and security have surged to the forefront of public consciousness. As the nation evolves, so too do the challenges it faces, necessitating a sophisticated response from security businesses. In recent years, the imperative for heightened security measures has grown exponentially, catalysed by a confluence of factors ranging from private security tensions to the omnipresence of digital threats. This shifting paradigm has compelled security businesses to undergo a transformative process of upscaling, aligning their strategies with the evolving needs of a nation navigating an increasingly complex security landscape. At the vanguard of this transformation stand industry stalwarts such as Tenon and G4S, recognised as the leading players in India’s security ecosystem. Armed with a wealth of experience and a commitment to innovation, it has emerged as a beacon of reliability and
36 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 efficacy, pioneering the deployment of cutting-edge tools and technologies to counter emergent threats. From state-of-the-art surveillance systems to advanced access control solutions, the arsenal of modern security providers is as diverse as it is formidable. Yet, beyond the mere adoption of technology lies a deeper commitment to safeguarding the well-being of communities and institutions across the nation. It is this ethos of service and vigilance that underpins the mission of every private security enterprise featured within our pages. As we embark on this journey together, the private security sector seeks to serve as a conduit for dialogue, exploration, and empowerment within the realm of security. By amplifying the voices of industry leaders, analysts, and practitioners, we aim to illuminate the path forward, fostering a safer, more secure tomorrow for all. We stand at the precipice of a promising new era in security discourse. Propelled by the momentum of technological innovation and guided by the steadfast commitment of industry leaders, India’s security landscape is poised for a transformative evolution. The strides taken by companies like Tenon and G4S under illuminating leadership underscore not only the resilience of our nation’s security infrastructure but also its capacity for continual adaptation and growth. Looking ahead, the horizon brims with possibility. With each technological advance, with every strategic partnership forged on the global stage, we inch closer to a future where safety and security are not merely aspirations but tangible realities. The journey towards this ‘BY AMPLIFYING THE VOICES OF INDUSTRY LEADERS, ANALYSTS AND PRACTITIONERS, WE AIM TO ILLUMINATE THE PATH FORWARD, FOSTERING A SAFER, MORE SECURE TOMORROW FOR ALL’ destination is sure to be fraught with challenges, yet it is imbued with the spirit of steadfast progress and possibility. As India’s security apparatus extends its reach beyond borders, engaging with global partners and embracing best practices from around the world, the vision of a safer, more secure world comes into sharper focus. In the crucible of innovation, amidst the crucible of change, we find the promise of a better worldworld where the security barriers are dismantled, and where the forces of good prevail over adversity. As we venture forth into this brave new frontier, let us do so with unwavering resolve and boundless optimism, knowing that together, we have the power to shape a future defined not by fear, but by freedom and fortitude.
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 37 Cover Story / Interview ‘Indian Security: Manpower Giant with a Mission’ APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 37 Major Manjit Rajain, Founder & Global Chairman of Tenon Group while talking to BW Securityworld says that private security companies need to continually adapt to new security technologies
38 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Q How does the security sector traditionally differ from other industries in terms of innovation, and what challenges do you face when trying to foster an entrepreneurial culture within it? A As a manpower-driven industry, India’s security services sector has one of the largest employment bases, second only to the Indian Railways. The industry employs over 1 crore security personnel, which makes us more accountable as employers, particularly in terms of job creation. An entrepreneur’s success is much defined by how quickly one adapts to change. While ushering in such changes, a considerable amount of long-term capital and human investment is required to train the guards, supervisors and other technical and nontechnical personnel. Developing technology solutions, establishing command and data centres and establishing comprehensive training programmes are some of the catalyst operations that require a lot of patience and effort, but they provide long-term benefits with respect to technology adaptation. Q What strategies or methods can security professionals use to encourage creative thinking and risk-taking while maintaining the highest standards of security and safety? A I believe scenario-based training is something that can help security professionals think creatively. The training departments should conduct scenario-based training exercises that simulate realworld security challenges, i.e., mock fire drills, disaster management trainings and emergency preparedness training modules. Moreover, supervisors should foster a culture of critical thinking where security professionals are encouraged to question assumptions, explore alternative solutions or suggest desirable actions. Constant technological adaptation will always leverage them towards creativity to enhance both safety and innovation. Q What are your comments on the ethical and legal considerations that private security professionals need to be mindful of in their line of work? A Balancing innovation and risk with security requires a thoughtful approach that combines creativity with a commitment to maintaining the highest standards of safety. It’s crucial to create an environment that supports experimentation within the boundaries of ethical and legal considerations. Security guards must respect the rights and dignity of individuals, treating them with fairness and impartiality. For example, the use of force or other
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 39 Cover Story / Interview physical interventions should be proportionate to the situation. They must also be aware of property rights and legal boundaries related to trespassing at the respective locations or sites. Q What are the key challenges private security companies face in maintaining the security of their clients, especially in today’s rapidly changing landscape? A Private security companies face several challenges in maintaining the security of their clients, particularly in the dynamic and rapidly changing landscape of today. Some key challenges include: Technological Advancements: Rapid advancements in technology bring both opportunities and challenges. Private security companies need to continually adapt to new security technologies, including surveillance systems, access control and cybersecurity measures. Globalisation: Clients with international operations require security companies to navigate the complexities of global security risks. Understanding diverse cultural, legal and geopolitical environments is essential for effective security planning. Training and Skill Development: Ensuring that security personnel are well-trained and possess the necessary skills to respond to diverse security challenges is an ongoing challenge. Regular training programmes are crucial to keeping staff prepared. Regulatory Compliance: Compliance with local, national and international regulations is a constant challenge. Private security companies in India are governed by the PSARA Act, where implementation lies with every state and the service providers must stay abreast of changes in laws and regulations that impact their operations and the security measures they employ. Wage Inflation and Budget Constraints: Over the last decade, ‘Soteria, our state-of-the-art command centre, currently monitors nearly 3,500 locations, with over 75,000 sensors and CCTVs, seamlessly connected and communicating in real time’ APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 39
40 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 wages in the security sector have doubled, significantly increasing the budgetary burden on clients. This has led to a greater demand for standardisation and resource optimisation through processes like Business Process Reengineering and Operations. Q Technological advancements have become imperative for all organisations, let alone security agencies. How does the Tenon model guarantee substantial growth that aligns with these technological transformations? A Moving with the shift, we at Tenon Group have considered the importance of technology and have adopted technology integration in our security operations, thus making us a human-IT-enabled security services provider. Soteria, our state-of-theart command centre, currently monitors nearly 3,500 locations, with over 75,000 sensors and CCTVs, seamlessly connected and communicating in real time. This technological advancement has significantly alleviated the workload of our on-site security team, resulting in a remarkable 20 per cent reduction in direct manpower-related costs at the site. Tenon Group has developed an in-house workforce management platform named Tenon Connect, which seamlessly integrates our entire workforce, comprising 80,000 employees, along with an additional unbilled workforce of over 1,000 personnel. This innovative solution has empowered our business to effectively monitor both workforce movements and their adherence to service level agreements (SLAs). Whether it’s addressing shortages, conducting performance reviews or ensuring compliance with mandatory training, Tenon Connect provides business leaders with clear visibility into activities and account health statuses. This capability has proven invaluable for a large-scale integrated facility management (IFM) company like ours, resulting in a remarkable increase in individual productivity of over 25 per cent. Furthermore, these enhancements have reflected positively on our customer scorecards. The average score, which previously stood at 95 per cent, has now surged to an impressive 98 per cent on average—an impressive 3 per cent improvement. In fact, some customers have even achieved a perfect 100% score in certain months. ‘Tenon Connect seamlessly integrates our entire workforce, comprising 80,000 employees, along with an additional unbilled workforce of over 1,000 personnel’ Rajeev Sharma, Country MD, G4S Corporate Services (India), believes that advanced surveillance, sophisticated access control and intelligent data analysis are essential armouries in our security arsenal
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 41 Cover Story / Interview Q Can you outline your strategic vision for enhancing physical security services in G4S India? How do you plan to align security strategies with the evolving needs of clients and industry standards? A The security landscape is transforming, shifting from traditional man-guarding to a data-driven approach for accurate threat prediction and effective countermeasures. In the security landscape, the future belongs to those who adapt and evolve. While technology and intelligence will play a crucial role in the evolution of security, the importance of physical security services will continue to be the bedrock on which these solutions will be built. Emphasising the vital role of guard quality, G4S “Today’s Complex Threats Demand More” APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 41
42 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 continuously focuses on the right hiring. From the intense screening of applicants and their documentation to antecedent verification and their health at the time of onboarding a new guard, the journey continues. Once deployed, our focus on continuous training, multi-skilling, upskilling, active engagement and ensuring the well-being of our guards are some of our continuous efforts for enhanced physical security. G4S sets industry standards in security management with a commitment to employee well-being, including online benefits, timely salary payments, providing adequate and quality PPE and a strong safety focus. G4S leverages technology to train and upskill the physical security workforce to effectively utilise advancements in security measures, ensuring a forwardthinking approach to security challenges. Q Given the advancements in security technology, how do you envision integrating cuttingedge technologies within the physical security framework of G4S India? How can technology enhance the efficiency and effectiveness of security operations? A G4S prioritises technological innovation, investing in cutting-edge solutions and embracing “InTech” (intelligence in technology) to develop comprehensive security strategies. We believe in harnessing technology and best practices to constantly evolve our services and stay ahead of threats. Our dedicated teams, both global and local, push boundaries to develop cutting-edge security solutions for our clients. While traditional manned guarding played a crucial role in the past, today’s complex threats demand G4S leverages technology to train and upskill the physical security workforce to effectively utilise advancements in security measures, ensuring a forwardthinking approach to security challenges. more. Physical asset protection requires a multi-layered approach. Advanced surveillance, sophisticated access control and intelligent data analysis are essential armouries in our security arsenal. This integrated world brings both immense potential and new challenges. Enter InTech or “Intelligence in Technology”. It’s not just about deploying the latest gadgets; it is about harnessing data, leveraging expert insights and crafting a dynamic security strategy
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 43 Cover Story / Interview that adapts to constantly evolving threats. The flood of information is pointless unless we know how to translate it into actionable intelligence. Our experts analyse threats, interpret data and develop AI-powered solutions that go beyond the limitations of traditional ManTech. While setting up SROC, we took our learnings from our operations in Denmark, where 70 per cent of the security solutions we offered were based on technology. We believe this integrated approach is the key to securing your assets, your people and your future in today’s interconnected world. Q Security risks are dynamic. How do you approach risk assessment and what strategies would you employ to proactively identify and mitigate potential security threats? A In a world where threats emerge faster than ever, a static approach to security is a tragedy waiting to happen. At G4S, we embrace the dynamism of risk with a multi-layered and proactive strategy. Our risk assessment is not a one-time event but a continuous cycle of data-driven analysis, threat intelligence gathering and human expertise. We analyse the information, incorporating internal vulnerabilities, external threat landscapes and even emerging trends to anticipate the possible situation. A dedicated response team, equipped with a well-prepared plan, ensures swift and effective actions in response to security situations. But foresight is not enough. We believe in robust mitigation strategies. We tailor security protocols to each threat, leveraging advanced technology like access control systems, automated incident response platforms and even physical barriers. Operational excellence is demonstrated through the proactive addressing of security threats. Be it handling Covid challenges, mitigating adverse weather conditions, or protest reports, we at G4S combine datadriven insights with human expertise and cutting-edge technology to identify and mitigate potential security threats to safeguard your business, assets and employees. We embrace the dynamic nature of risk and constantly evolve our strategies to stay ahead of the curve. Q Managing control rooms requires seamless coordination. How would you ensure operational excellence within G4S India’s control rooms? Can you provide examples of successful control room management strategies you have implemented in the past? A Ensuring operational excellence in control rooms
44 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 is crucial for us. We work with our customers to bring value to them by recommending innovative and cost-effective solutions. We rely on technology as an enabler to bring multiple efficiencies. Implementing advanced technologies like video analytics, AI-powered monitoring systems and real-time response tools enhances our control rooms. With G4S SROC, we implement a real-time incident tracking system integrated with CCTV cameras, access control systems and alarm monitoring. This allows control room operators to receive instant alerts, assess situations accurately and dispatch the response team promptly. The system also generates comprehensive incident reports for analysis, leading to continuous improvement in response times and incident resolution. Beyond SROC, we have the iCONNECT app, which ensures transparency and control. The app helps optimise cost, better SLA adherence and ease of use. The app covers four main categories: safety, visibility, attendance and efficiency. All the data is accessible at the Operations Excellence Centre and is monitored at the control room (Pulse) to handle any onsite emergencies in realtime. This solution is scalable and customisable to the changing needs of any business. This comprehensive approach enhances transparency, operational control and efficiency across various aspects of G4S operations. Q How do you plan to ensure that G4S India’s physical security solutions are customised to meet the unique requirements of diverse clients? 44 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 45 A Customisation plays a crucial role in driving customer satisfaction and meeting the diverse needs of the industry, including compliance, state/terrain, security threats, adoption of technology, and sensitive or critical data centers. At G4S, we understand the importance of adapting to these unique requirements, which is why we focus on both technological advancements and customer interactions. Transparency and seamlessness of information, along with a strong emphasis on compliance and safety, are the strategies we follow to enhance customer relationships and satisfaction. For example, our technology-driven approach includes coding each customer unit to ensure compliance with applicable regulations. Each assignment is digitally captured with a unique code, enabling us to deploy the right personnel based on specific compliance and customer requirements. Our employees are carefully mapped against these codes, ensuring adequate safety requirements are fulfilled. With process automation tools like iCONNECT and PULSE, we can intelligently manage the fulfilment of service delivery. Our goal is to deliver customised solutions that meet the unique needs of each client while maintaining the highest standards of compliance, safety, and efficiency. G4S India’s customercentric approach prioritises achieving customer delight through innovative solutions and service delivery. We also calculate the net promoter score every month to ensure that we are continuously focused on delivering the highest standards of customer service. Q How would you approach the training and development of security personnel within G4S India? A In a vast organisation like ours, seamless information exchange is crucial for success. That is why we empower our 1,35,000+ ground staff with smartphonebased tools for instant connection, interaction and updates. We believe in the power of both physical and digital training, ensuring efficient knowledge dissemination and skill development. G4S prioritises systematic employee development through its Learning and Development wing, training all our staff annually with a focus on security competence, emerging security solutions, soft skills, health and safety and mental wellness. The ‘SpeakOut’ initiative enables anonymous employee concerns so that they are not taken advantage of in any way by anyone. Cover Story / Interview “OUR GOAL IS TO DELIVER CUSTOMISED SOLUTIONS THAT MEET THE UNIQUE NEEDS OF EACH CLIENT WHILE MAINTAINING THE HIGHEST STANDARDS OF COMPLIANCE, SAFETY, AND EFFICIENCY.”
46 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Authorities aim to enhance security measures, balancing passenger experience and evolving aviation industry needs, through expanded security coverage and advanced screening technologies