5
Aug2016
Protocols: The Lifeblood of Security Operations
A formal system of security involves protocols typically categorised as policies and procedures. A policy is defined as a formal record of an organisation’s intentions and directions. Policies are typically developed at the highest levels of the organisation.
Read more1
Aug2016
Security System Decay: An Issue to be Considered
Entropic security decay is recognised as a risk that needs to be addressed across all security systems. Security system decay due to internal or external factors is inevitable however can be managed by the prudent security leader.
Read more27
Jul2016
The Australian Intelligence Community
The Australian Intelligence Community, or AIC, is an informal term used to describe the six Australian security and intelligence agencies. These agencies perform specific tasks as outlined below
Read more19
Jul2016
VSIAC Concept of Nominated Person
The Chair and Deputy Chair of ASIS Victoria Executive Committee are members of the Victorian Minister for Justice industry advisory committee. A sub-committee has proposed appointment of a nominated person as a condition of business licensing.
Read more19
Jul2016
Commonly misspelled words!
Does reading reports or scrolling through social media highlight commonly misspelled words? Check out our quick security list
Read more15
Jul2016
People Management in Security Risk Minimisation
It is argued all crime related security incidents originate from human sources of threat. This means effective security risk management must strongly focus on people.
Read more10
Jul2016
Security Risk Management – Back to the Basics!
According to the Australian Government, adopting a risk based approach allows agencies to prioritise activities based upon the likelihood and consequence of a risk being realised.
Read more6
Jul2016
Cyber Security – An Ongoing Need
Cyber security is estimated to drive $7.6 trillion of digital value over the next decade. This means cyber security needs to be considered relative to business operations and growth through digitisation.
Read more28
Jun2016
Voice Recognition Software
Security leaders know only too well the time taken to provide quality reports. Whether preparing an audit, risk, concept or progress document using Voice Recognition Software (VRS) can substantially increase productivity.
Read more22
Jun2016
Another Successful Event – Retail Theft & the Global Retail Theft Barometer
This week another successful event was conducted by the Chapter at the University of Melbourne’s Law Building. Entitled “Retail Loss Prevention and the Global Retail Theft Barometer” the event was attended by 55 members and guests.
Read more