Sepura's CEO, Steve Barber Elected To The TCCA Board | Security News – SecurityInformed

exacqVision 21.09 Software Release
Software House Web-based Client
Illustra Edge Cameras With Onboard exacqVision Recording Software Delivers A Complete IP Solution
HID Signo Access Control Readers
Leonardo Brings ELSAG Fixed Plate Hunter LPR Systems To Keep Buildings And Perimeters Secure
Delta Provides Crash Rated Gates To Enhance Security At The Los Angeles International Airport
Vanderbilt's ACT365 Integration Helps Protect Marina Facilities In Danish City
Schools Navigate Emergency Response With Milestone XProtect Integrations
Providing Frictionless Cloud Video Storage as a Service (VSaaS)
Achieving True Situational Awareness In Operation Centers With Computer Vision & AI
exacqVision 21.09 Webinar
How Are AI And Analytics Changing Physical Security, And What Should We Expect Next?
The Rise of Ethical Facial Recognition
Connected Video Technology for Safe Cities
Protecting Dormitory Residents and Assets
Protecting Critical Infrastructure Through Facial Recognition
19 Nov 2021
Sepura’s CEO Steve Barber has been elected to the TETRA and Critical Communications Association (TCCA) Board, adding considerable experience to the leadership team of the industry body.
Steve Barber brings to the TCCA Board, a thorough understanding of global critical communications’ user requirements, as well as extensive experience in supplying and manufacturing fit for purpose devices, and managing technology evolution.
His election pledge to commit to the development of open critical communications standards and interoperability is reinforced by Sepura’s long standing commitment to driving mission critical technology standardization and innovation.
Steve Barber stated, “As a network agnostic company, focused on our customers’ needs, we have led multi-vendor interoperability for many years. This has been of significant benefit to users, giving them choice and flexibility, when selecting their communications solution and minimizing proprietary implementations that restrict the market, and slow down innovation.
Steve Barber plans to focus on supporting the ongoing development of both narrowband and broadband solutions
Alongside his support for open standards, Steve Barber plans to focus on supporting the ongoing development of both narrowband and broadband solutions, and the evolution of 3GPP standards for mission critical markets.
TCCA is an industry-wide body and I am committed to representing all association members, rather than the interests of an individual organization,” said Steve Barber, adding “I look forward to working within TCCA and with the wider critical communications community, in the coming years.
Steve Barber’s election to the TCCA Board opens a space on the TETRA Industry Working Group, which will be taken by Sepura’s Chief Technology Officer (CTO), Peter Hudson. This ensures that both current and future mission critical users have a trusted supplier voice, representing their views across the TCCA.
TCCA Members who wish to discuss relevant issues with Steve Barber can contact him via the Sepura website, on LinkedIn or at the Sepura stand at major trade shows.
Aiphone’s Security Communication Solutions – Configurable IP Video Intercoms
Dahua Provides Surveillance Cameras, NVR And Ethernet Switches To Enhance Security At Pets Corner
Access Control: 5 Minutes With Genea's Mike Maxsenti
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward? 
More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organization, are posing a major security problem for businesses. This is partially due to the widespread use of social media, encrypted communication platforms, and other tools. Now more than ever insider threats need to be identified, thwarted, and prevented. Social distancing policies When social distancing policies and mandates began keeping people apart, many turned to social media to stay connected. While social networking tools have provided a positive outlet and a way for people to feel more connected, these platforms have also become a hotspot for insider targeting because they provide a way to propagate disinformation and target individuals likely to be receptive to it. The ideal mark for an insider threat is someone who is active on social media Even more so, they have provided a means to develop relationships with organizational insiders and socialize with them. The ideal mark for an insider threat is someone who is active on social media, has sufficient access to sensitive information, lacks supervision in their day-to-day work, and works remotely. As the relationship develops, through the process of grooming, an employee can become more likely to disregard company policies and commitments. Disregarding company policies One reason insiders might act against their own organization involves monetary gain. The pressures of the pandemic have led to record levels of unemployment and financial strain for millions of Americans. Financial issues can include struggling to pay for childcare, supporting family obligations, paying rent and more. Those who find themselves in a financial bind might not just act against their own company but could also more easily fall victim to a threat. Another reason that insiders act is that they may be disgruntled. Insiders may hold a grudge because they were passed over for promotion, were given an unsatisfactory performance rating, or they may be facing termination. While just one of these factors may not be a trigger to involve the company’s security team, any combination of these factors along with a change in the employee’s demeanor or behavior should serve as a red flag to pay closer attention to the situation. Potentially malicious insiders Sending confidential information to an unsecured location in the cloud exposes the organization to risk Another challenge employers face directly relates to the somewhat limited supervision of employees who work remotely. In this situation, identifying potentially malicious insiders is more difficult, largely because face-to-face interactions are limited. When the pandemic began, many companies shifted their primary areas of focus to keeping the business viable, which is understandable. However, with this shift of focus, less attention may have been paid to security issues. The proactive company will have ensured their employees are aware of the following: Steps they should take to ensure their devices — both company-issued and personal — are secured at all times. Sending confidential information to an unsecured location in the cloud exposes the organization to risk. Breaking security policies to simplify tasks is prohibited. Ensuring their devices are updated with the latest security patches. A failure in any of these areas can produce an environment ripe for malicious insider activity. Cyber security teams This multidisciplinary group can lead the initiatives that are paramount to keeping the company secure The insider threat is an organizational threat and so it is most effectively addressed from a holistic perspective. Stakeholders from different parts of the organization need to be at the table to understand and address such threats. An effective team includes personnel from the legal, human resources, communications, and physical and cyber security teams. This multidisciplinary group can lead the initiatives that are paramount to keeping the company and its employees secure. Conduct a risk assessment of the company’s security processes or a threat assessment to the company’s people or assets. No organization is without some level of vulnerability, so identify the most critical assets, information, and systems; identify those who have access to these critical assets; and build controls around them to provide extra security. Delivering refresher training Build a training program to help employees and management identify concerning behaviors. Educate staff about insider threat indicators and provide instructions for how to report concerns. Require employees to complete training and deliver refresher training and updates throughout the year. Training on this matter is not a one-and-done situation. Ensure there is an impartial and confidential process in place for employees to report possible insider threats. Employees need to trust that if they report concerns about behaviors or actions on the part of a fellow employee, their information will be handled discreetly and if warranted, acted upon. Write a communications strategy clearly defining the process for relaying insider threat incidents. An effective plan lays out what information and when this information should be shared with specific individuals and to the broader community, who has authority to communicate sensitive information, and how the information should be disseminated. Remote working challenges Establish a check-in process for managers and their direct reports to enable a means for employees to share concerns and for managers to identify challenges or opportunities to assist employees working in the virtual environment. Make an EAP (employee assistance program) readily available to employees. Ensure they understand how to access their EAP and assure them that contacting the EAP will not have a negative impact on their career or growth potential. Providing venues for employees to share their concerns and talk with trained staff can greatly help organizations navigate insider threats and general remote working challenges. Security risk environment The virtual workplace has created a serious security risk environment for companies in which employees who would not normally engage in insider threats become more vulnerable to them. Through new technologies and possibly due to new financial hardships, those looking to harm an organization are out there, searching for opportunities to strike. It is leadership’s responsibility to take proactive action to ensure their employees are aware of the possibility of insider threats, the seriousness with which management views them, and the resources available should someone fall victim. It is everyone’s responsibility to remain vigilant.
The user may know that fixed license plate reader technology (LPR) is one of the most powerful security tools available for protecting buildings and perimeters of geographical areas. Best practices for ELSAG® Fixed Plate Hunter LPR systems include: College, university, and school campuses Airports Casinos Manufacturing facilities Houses of worship Transportation depots Utility infrastructure Municipal buildings Military campuses Ports and border stations Fixed plate readers are also proving to be fundamental components of public safety missions designed to protect people in high-pedestrian areas, or those targeted by traffickers and predators. This case study offers three real-life instances of fixed or semi-fixed deployments that not only keep buildings and perimeters secure, but also people. Identifying suspect vehicle The ELSAG Fixed Plate Hunter ALPR in action fixed ELSAG ALPR cameras are attached to infrastructure like a utility pole or sign gantry. Fixed cameras scan plates of passing vehicles, capturing license plate numbers, date/time stamps and GPS locations. The infrared camera captures b/w images of each plate and a color camera captures overview images of each vehicle. A computer reads the plate characters and compares them with a hot list. Plates that match a white or hot list trigger instant alerts to security officials. ELSAG Fixed Plate Hunter ALPR Performance: Cameras read license plates, day or night, in any weather. Plates are processed at up to 150 mph (241 kph) passing speeds, from over 100 feet away. Plates are recognized using specially designed protocols for each jurisdiction in which the systems are deployed ELSAG Fixed Plate Hunter ALPR Performance. Alerts are sent to officials, command centers and other patrol cars instantaneously, upon identifying a suspect vehicle. Captured data includes date/time stamps, GPS coordinates and photo of the license plate. Fixed systems can capture the speed of passing vehicles. Hot list updates are wirelessly received and transmitted. Keeping people safer Duck, NC is a coastal community located in Dare County on the Outer Banks of North Carolina There are flexible LPR technologies available that allows the user to address any law enforcement and security mission or challenge that involves vehicles with license plates. Here are three examples of LPR programs using Leonardo systems that were started for routine purposes, then expanded to help keep people safer and more secure. Duck, NC is a coastal community located in Dare County on the Outer Banks of North Carolina. It hosts about 20,000 people during the summer months. In 2015 The Chief of Police began an LPR program with two fixed cameras to help manage ‘burglary season’ on the island. Cameras read plates as vehicles enter and leave town. Almost immediately two arrests were made in separate cases of burglars who had been stealing from area homes for over a decade. Identifying stolen vehicles The Duck, NC program also identified stolen vehicles, located missing persons, and exposed narcotic activities, leading to the expansion of their LPR network. Additional fixed cameras protect the 30 miles from Manns Harbor to the Wright Memorial Bridge. Additional fixed cameras protect the 30 miles from Manns Harbor to the Wright Memorial Bridge The Dare County LPR program is now instrumental in keeping track of residents who adhere to hurricane evacuations and any who choose to stay on the island. LPR traffic tallies and license plate numbers give officials an estimate of people who may need help during the crisis, and an address. “Our LPR systems provided us a starting point to begin and end any type of situation or investigation.” John Cueto, Retired Chief of Police, Duck, NC. Pedestrian-heavy area In 2015, BA Tránsito, the road traffic authority in Buenos Aires, used a network of fixed LPR cameras to support an initiative designed to protect the pedestrian-heavy area of the oldest part of the capital city known as the Autonomous City of Buenos Aires. Only taxi cabs, government officials and other select vehicles are allowed to use the streets there. If any LPR camera reads the license plate of a vehicle without a permit, they are mailed a ticket. The success of the original LPR program led to a 2017 expansion to relieve traffic congestion in the area immediately surrounding the Autonomous City. This busy metropolitan area, the ‘center city ring,’ has multi-lane roads in several directions, dangerously busy with vehicle activity. Cutting down daily traffic To encourage compliance, every license plate number read is prominently displayed on digital signs BA Tránsito cut down daily traffic by half using fixed LPR systems. License plates ending with odd numbers can enter the centre city ring on Mondays, Wednesdays, and Fridays. Plates ending with even numbers have access on Tuesdays, Thursdays and Fridays. Police wait nearby to stop unauthorized vehicles. To encourage compliance, every license plate number read is prominently displayed on digital signs for all other drivers to see. The NTSCIU covers eight counties, looking for criminals who use interstates and highways to smuggle illicit contraband. In 2017 they started an LPR program with two mobile LPR units to read plates as officers patrolled. They expanded their LPR network in 2018 with the addition of a LPR radar trailer housing two fixed cameras to serve as a semi-fixed system that could be easily moved to different places along highways, as needed. LPR radar trailers In 2018, they purchased an additional trailer to use along strategic routes and support requests from other agencies within the NTSCIU to help curtail crimes such as burglaries. While there are countless headlines about NTSCIU’s removal of illicit drugs from Texas highways and seizures of drug money and other contraband, aided by LPR technology, one of their most important cases was the recovery of a child abducted in California. As described by an NTSCIU supervisor, that case alone paid for their entire investment in LPR technology As described by an NTSCIU supervisor, that case alone paid for their entire investment in LPR technology. In 2018, the NTSCIU learned of an Outlaw Motorcycle Gang rally in their jurisdiction. They deployed LPR radar trailers around the event site to gather data (license plate number, photos of each plate on a bike or vehicle, date and time stamps, and trailer identifier). Fixed LPR technology Should events occur during the rally that would require investigating, law enforcement could analyze the data for information to help resolve the issue. Agencies of every size will benefit from deploying fixed LPR technology—to aid security of places and people. There are lease options and grants available to help with funding, and Leonardo even has a lower-cost video camera LPR solution available now. So, get your agency outfitted with this 21st-century technology that is changing law enforcement best practices by increasing capacity, productivity and facilitating creative ways to address any issue that involves a license plate.
The Rise of Ethical Facial Recognition
Connected Video Technology for Safe Cities
10 Top Insights In Access, Cloud And More
Providing Frictionless Cloud Video Storage as a Service (VSaaS)
Video Surveillance
IDEMIA’s Facial Recognition Device VisionPass Gets Best Results From IBeta Antispoofing Evaluation
HID Global Offers Its European Customers PKI-As-A-Service With Full Local Data Residency
Traka Receives Factory Certification For Its Key And Asset Management Solution Under The LenelS2 OpenAccess Alliance Program (OAAP)
HID Signo Access Control Readers
Innovative C•CURE Go Reader Mobile App
HID Aero™ Controllers
Follow us
DMA
SecurityInformed.com – Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 – 2021, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com
Ensuring accurate and appropriate use of the technology

source

Book an appointment