Security Systems News

AUG 2018

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link:

Contents of this Issue


Page 32 of 44 August 2018 s EC u RI t Y s Y st EM s NEW s news 28 Asked about the typical usage for monitoring from on demand cus- tomers, Matlock and Brown esti- mated about 10 days. Nakatani mentioned that ADT is a little dif- ferent in its model, offering one month at a time. Don Yaeger, former associate editor for Sports Illustrated, NY Times best seller, presented the Thursday general session titled, "Great Teams Understand 'Why.'" When Yaeger started looking at what makes great teams great, he said he looked at two types of teams: those that make up excep- tional sports teams, and those that make up outstanding companies. One of the things Yaeger noted on in his presentation was that companies should look for the signs and clues of success from successes in the industry. "The truly great ones are always study- ing each other," he said. He also addressed culture, spe- cifically that a team's culture will form either through design or default, Yaeger said. And a key part of a culture is understanding why the team is there, who it is that they working for—whether that is friends, family or a certain cause or group of people. According to Yaeger, culture can influence behavior, behavior brings about habits, and habits can lead to success. Getting the right people is important for every organization, and several speakers that I've heard in the past few years have addressed the challenge with dif- ferent approaches. For the last session of the day, I attended "The Perfect Fit: New Strategies for Attracting and Retaining the Right Operators." This session featured Michelle Lindus, central station manager for Vivint Smart Home, Steve Crist, director of monitor- ing, ADS Security, and Bill Kasko, president and CEO, Frontline Source Group. There are now more job open- ings than people looking to work, Kasko pointed out, which means that companies are going to have to find individuals in new and ingenious ways. While before companies looked at college recruiting, now some are getting involved at the high school level, to get their brand out to potential employees even earlier, he said. Lindus brought up that Vivint has programs that even engage parents and children in elemen- tary school. Crist stressed that job applicants of all ages ask about possibilities for advancement or developing their careers. Friday, June 22 There have been several natural disasters in the past year, includ- ing Hurricanes Harvey and Maria. Companies need to know what to do in the event of a natural or manmade disaster. In "Monitoring Center Down! How to Improve Recovery Time when Natural Disasters Strike," a group of speak- ers discussed how disaster recov- ery works in the security industry and more specifically within moni- toring centers. Steve Butkovich, CTO at CPI Security, led the conversation, with Matt Narowski, VP of operations at Bold Technologies, Cliff Dice, president and CEO of DICE, and Roberto Morales, CFO and COO of Genesis Security Services. Instead of focusing on recov- ering after a disaster, companies should look at business continu- ity, how to keep a business moving forward in the event of a disaster, Narowski said, and that involves having a plan. Narowski outlined the soft and hard costs in setting up a business continuity plan; soft costs are the research and information gather- ing to set up the plan, yards costs include items like back up facili- ties and networking equipment. Dice talked about his company's capabilities for disaster recovery. He discussed that the set up can look right, but other factors can impede roll over to the DR site, like errors in accounting or the company trying to utilize numbers that were no longer connected. Drawing on recent experience, Morales discussed what it was like to operate a monitoring center in Puerto Rico during Hurricane Maria. Maintaining power was one challenge, he said; Genesis utilized a diesel generator 24/7 for about 4 months, which meant procuring that much fuel. During the emergency, the company kept a stock of food, water and beds for its workers. Morales also pointed out some of the measures Genesis has built in post-hurricane, such as a 1,300 gallon diesel tank for its genera- tor and a contract with a main fuel provider, implementing solar panels for additional energy and increasing internet redundancies. As I've seen throughout the industry in recent years, cyberse- curity is certainly a growing con- cern. The session I next went to handled how this threat applies to monitoring centers. "HACKED! Important Steps to Protect your Company (and Yourself) AFTER a Cyberattack," featured the mod- erator Sascha Kylau, vice president of central station solutions and services for OneTel Security, and panelists Jay Grant, senior systems engineer with Symantec, and Josh- ua Grecko, senior vice president of engineering. Grecko opened the session with a brief overview of UL 2900, the new cyber standard from UL, and some of its iterations. He also cov- ered coming changes to UL 827, such as the inclusion of more NIST standards. Grant asked the audience: What do you do after you've been hacked? At that point it's too late. "Grab a coworker and have a good cry," because it's going to be a bad day, he said. Companies should focus on what they have in place for detection, instead of waiting until you've been hacked, and recognize the most valuable assets in their company—the ones that absolutely need to be protected. There are a variety of tactics and technologies that can help with false alarms, and the session "Plagued by False Alarms? Audio/ Video Alarm Verification Best Practices" brought up quite a few of them. Steve Walker, VP of Stan- ley Convergent Security Solutions, Mike Tupy, director of monitoring technology for Vivint, David Sny- der, VP of security operations for Eyewitness Surveillance, and Tom Nakatani, IT VP—customer moni- toring technology and product for ADT Security, were on the panel, with Larry Folsom, president of I-View Now, as the session's mod- erator. Ninety-eight percent of alarms are false, Folsom said, citing the number from the Texas Police Chiefs Association. False alarms are expensive, and they take up law enforcement resources. "I believe the answer is better infor- mation," Folsom said. Each of the panelists presented on one technology that they were familiar with. First, Walker pre- sented on video verification. While this technology results in a better decision on alarms, it takes time to review video clips. Verification also requires operators to judge the intent of people on cameras at a location; all in all, while it's ben- eficial, the technology can be tax- ing for the operators, Walker said. Tupy took on two-way audio verification. Being able to reach people—who might not be on the alarm's call list—as soon as an alarm is triggered helps reduces false alarm dispatches, he said. Though, you miss what you can't hear, Tupy said, as sometimes the people on site can be too far from the system to hear or there can be ambient sounds. Snyder addressed interactive monitoring. This is where analyt- ics in a camera trigger alarm clips to be reviewed, independent of an intrusion alarm. It works well out- side, he mentioned. Nakatani spoke about the future of verification. For video verification, he noted on inex- pensive devices getting better and the increase in popularity of out- door cameras. He also connected the trend of two-way audio and more smart speakers throughout a home. The closing keynote luncheon featured a conversation about school security, moderated by Lou- isiana State Fire Marshal. "Butch" Browning, with Guy Grace, direc- tor of security and emergency planning for Littleton Public Schools and director of the Part- ner Alliance for Safer Schools, and Ryan Petty, SVP of business solu- tions with Liberty Latin America's Cable & Wireless subsidiary and founder of The WalkUp Founda- tion. This presentation is also person- al for Petty, as he lost his daughter Alaina in the school shooting at Marjory Stoneman Douglas High School that occurred in February in Parkland, Fla. A key theme that the speak- ers highlighted was that there is often information about potential threats—among students, teach- ers, parents or other authorities— that isn't being shared. "There are signs along the way," Petty said, and that information needs to be shared. From a security standpoint, one thing that can be done is to get a better idea of who should and shouldn't be on the school cam- pus, and reducing entry points into the school can help with that, Petty said. Grace highlighted one new technology that has helped, an app that lets school children report suspicious behavior anonymously. Ryan encouraged people to be engaged, and look into how their district deals with security issues and threats. SSN For ESX 2018's final main stage presentation, a panel addressed the topic of school safety and security. Continued from page 7 ESX 2018

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - AUG 2018