All Blog Posts

West Africa: the surge in piracy continues. Are you prepared?

West Africa is becoming well known as the new hot spot for piracy. Unlike Somalian hijackings where a ship and crew can be held for up to twelve months or beyond for ransom, West African pirates pose an elevated threat as they are well trained and equipped, highly motivated and can take a ship within minutes. They engage in a ship-to-ship transfer of the cargo to a waiting vessel, and the targeted cargo is usually petrochemical. The hijacking operations can bring in extremely high financial returns, at great loss and expense to the ship owner and operator. The operations are well organised and the cargo can be pre-sold and transferred within a 48 hour window.
Posted: 9 April 2013 by Optimal Risk Administrator | with 0 comments

Mines: how they work, and equipping and training issues

There are many definitions of mines but to get an idea of what it means to people in the demining industry then the following sums it up quite well: “A mine is an explosive munition designed to be placed under, on or near the ground or other surface area and to be actuated by the presence, proximity or contact of a person, land vehicle, aircraft or boat including landing craft.”
Posted: 9 April 2013 by Optimal Risk Administrator | with 0 comments

Differences between the civilian and military methods and training.

When we talk about demining and battlefield area clearance there are two main practitioners, the military and the civilians. The civilians are either locals that live in a post- conflict area or NGOs, journalists, tourists or others working or travelling through such an area. In most cases, the local populace know where the hazardous areas are and avoid them. Whether military or civilian personnel, there are some similarities as well as differences in techniques and equipment used in demining.
Posted: 5 April 2013 by Optimal Risk Administrator | with 0 comments

CYBER War gaming

The emerging concept in cyber defence is war gaming, which is still in its infancy in the realm of critical infrastructure, and sectors where IT infrastructure is critical or fundamental to an operation. The increasing realisation that penetration testing does not address the holistic weaknesses in an organisation’s ability to detect, and respond to a sophisticate attack, as well as its ability to manage a cyber crisis and take the timely decisions to enact continuity plans, is driving the need for more sophisticated exercises.
Posted: 5 April 2013 by Optimal Risk Administrator | with 0 comments

Challenges in Working with Converged Scenarios

Few companies work effectively with risk registers, either as a process or as tool. The common failure of registers is that they become nothing more than a register, in which risks are recorded and then not acted upon, particularly in regard to cyber threats.
Posted: 4 April 2013 by Optimal Risk Administrator | with 0 comments

Counter- Improvised Explosive Devices (C-IED).

Whether military, police forces or intelligence agency and whether you are on expeditionary operations or working in the homeland, a C-IED approach is now even more necessary since the Improvised Explosive Device (IED) is an expected feature of future conflict and security operations and countering them, is a major feature of the stabilisation and counter-insurgency (COIN) operations that currently occupy police, intelligence and military forces worldwide
Posted: 2 April 2013 by Optimal Risk Administrator | with 0 comments

The Problem with Security Planning

Companies need to plan for the wide variety of potential security threats and the majority of firms struggle with resources, intelligence, or expertise to deal with a full range of scenarios, and consequently cannot consider the full spectrum of converged security risks and their cyber dimensions. In most cases, companies lack the awareness of the complete threat landscape and their vulnerabilities. Hence there is a lack of urgency to upgrading their security risk agenda. The absence of such drivers tends to limit the budgets for security investment in intelligence and capabilities, and so the cycle continues to undermine the efficacy of security strategies.
Posted: 29 March 2013 by Optimal Risk Administrator | with 0 comments
Displaying results 22-28 (of 30)
 |<  <  1 2 3 4 5  >  >|