104th Edition - August 2013

Thank you for attending ASIS Europe 2013

An overview of the event:
Highlights from the 2013 ASIS European Security Conference & Exhibits
What the industry says
about ASIS Europe 2013:
2013 ASIS European Security Conference and Exhibits - Testimonials

Quick Links

 

 

Submit Your Abstract Now (Deadline: 8 September)

 

Sponsor/Exhibit 

 

Register Now

 

Sponsor/Exhibit 

 

 

Sponsor/Exhibit

 

In This Issue 

ASIS EUROPE 2014

 

Submit Your Abstract for ASIS Europe 2014 (Deadline: 8 September 2013) 

 

ASIS INTERNATIONAL NEWS

 

ASIS 2013: Forward-Thinking Education, New Technology, Peer-to-Peer Connections

 

Making Plans to Attend ASIS 2013? Add ASIS Foundation Events to Your Schedule

 

Be a Sponsor or Exhibitor at ASIS 2013, ASIS Asia-Pacific 2013, ASIS Middle East 2014 and ASIS Europe 2014

 

Mark Your Calendar for the CSO Roundtable's European Summit

 

CPPs, PCIs, and PSPs Sought for Security Management Profile

 

 CHAPTER NEWS

 

Chapter News: Inaugural Meeting of the ASIS Hungary Chapter

  

ASIS Europe Finalists in the Security Excellence Awards: 23 October 2013

 

Chapter News: International Conference on Security Management 2013 in Prague 

 

HEADLINES

 

EU Plans Independent Intelligence Agency: Report

 

Microsoft Security Boss: EU Should Harmonise Cybercrime Controls

  

Securing Public Events against Terrorist Attacks and Other Threats via the Innovative Integration of Diverse Technologies

 

New Mobile Payment Systems Pose Regulatory, Security Challenges  

 

Overbearing Data Protection Rules Threaten Cloud Computing

 

Protecting Taxpayers' Money against Fraud: Commission Proposes European Public Prosecutor's Office and Reinforces OLAF Procedural Guarantees

 

 Justice for Growth: Commission Fills Legal Gaps for Unitary Patent Protection

 

SOCA Chief Sir Ian Andrews Quits Over Undeclared Interest in Private Company

 

TeraSCREEN - Multi-Frequency Multi-Mode Terahertz Screening For Border Checks

 

Europe's Half-Way Ban On Hezbollah Won't Please Anybody

 

EDUCATION AND EVENTS

 

Resilience Lead Auditor Course to be Held 18-22 November 2013 in Madrid, Spain 

 

Global Agenda

 

Professional Development

Join Us on Facebook

ASIS 13th European Security Conference & Exhibition - The Hague, The Netherlands, 1-3 April 2014

Like us on Facebook


ASIS 59th Annual Seminar and Exhibits - Chicago, USA, 24-27 September 2013
 
Like us on Facebook
 
 
ASIS 7th Asia-Pacific Security Forum & Exhibition - Macau, China, 3-5 December 2013

Like us on Facebook


ASIS 5th Middle East Security Conference & Exhibition - Dubai, UAE, 16-18 February 2014

Like us on Facebook

Join Us on LinkedIn

Join the ASIS International Group

View our profile on LinkedIn 

 

Join the ASIS Europe Network

View our profile on LinkedIn 


Join the ASIS Asia-Pacific Network

View our profile on LinkedIn 

 

Join the ASIS Middle East Network

View our profile on LinkedIn 

Presidents Perspective

ASIS International President Geoff Craighead, CPP, shares his unique insights on a range of membership and industry issues in his President's Perspective column. Read the latest column.

El Manual del Investigador Profesional ya está disponible en español

 

La guÍ­a explora temas necesarios para ser un exitoso investigador y prepararse para el examen Certificado de Investigador Profesional.

Did you like this issue?

The EMEA Bureau of ASIS International strives to increase the editorial benefit of this publication for members. We invite you to contact the editor to contribute feedback, article submissions, or comments.

Updated links and resources

Take a look at our updated Links and Resources page. Feel free to contact the EMEA Bureau if you have additional items to contribute.

ASIS International EMEA Bureau

For any queries on ASIS European events, membership, benefits, resources, certification, or other topics, contact the EMEA Bureau at:


287 Avenue Louise, 4th Floor, 1050 Brussels, Belgium.


Tel: +32 2 645 26 74

Fax:+32 2 645 26 71 

contact@asisonline.eu 

www.asisonline.eu
www.asisonline.org 

European Links

Not yet a member?

Join ASIS2  
Ten reasons you benefit from becoming an ASIS International member:

- Unrivalled networking opportunities with more than 38,000 of your industry peers.

- Up-to-date information, including industry best practices, new technologies, and emerging trends. 

- Complimentary subscription to Security Management magazine, the leading security industry publication. 

- Opportunities to build a professional reputation and credentials.

- Tailored professional development programs to fit your specific career goals. 
- Advocacy of the security industry to the government and business communities.
- Board-certified, professional designations. 

- Members-only access to new career opportunities in security management. 

- Access to more than 300 peer-reviewed, security-related publications. 

- Discounts on program and Seminar registration, merchandise, and certification programs. 


 More Information... .

New Chapters: Call for Volunteers

ASIS International seeks volunteers to help form new chapters in Iceland, the Baltic States, the Western Balkans, and other European countries currently lacking them.

 

For more information, contact the

EMEA Bureau or click here to download the procedures on forming a new chapter.

Select ASIS published titles now available for purchase for

Amazon Kindle

Schedule Your Professional Development Now

A comprehensive calendar is  available 24/7. Register early and save by taking advantage of early bird rates. Realise additional savings by booking your hotel room before the deadline. Plan ahead to get ahead

Welcome to the 104th edition of EuroDynamics! The ASIS International EMEA Bureau would like to encourage members to submit updates or articles you wish to share with the ASIS International members in Europe.

The deadline for the next issue is 28 August.


Please add regionalnewsletters@asisonline.org to your personal address book or safe sender list to ensure correct delivery of your monthly newsletter. 

 

c2ASIS Europe 2014

  

a1Submit Your Abstract for ASIS Europe 2014 (Deadline: 8 September 2013)

 

There are many reasons to submit a proposal for a presentation at ASIS Europe 2014. What's yours?

  • To share your expertise and knowledge with your peers
  • To give something back to the security management profession
  • To help shape the programme of the main educational event for security professionals in Europe
  • To enhance your profile as a thought leader in your area of expertise

 

The deadline for submission for the ASIS 13th European Security Conference & Exhibition is 8 September 2013.

 

The event will take place in The Hague, Netherlands on 1-3 April 2014 and will provide high-quality educational sessions, networking opportunities, and valuable sector updates for security professionals. Our multiple track format of sessions, keynotes, interactive forums, and exhibits allows for a self-directed learning environment.

 

The educational sessions will focus on current and emerging issues, best practices, and the challenges facing security practitioners. Presentations are designed for those with experience from fundamental to advanced levels.

 

Abstracts on all security related topics are welcome. Particular topics of interest are: critical infrastructure protection, physical security, cyber security, supply-chain security, intellectual property, loss prevention, hotel security and soft targets protection, maritime piracy, terrorism, executive protection, internal theft and fraud, competitive intelligence, brand protection, investigations, due diligence, and global business issues.

 

The event is expected to gather about 500 senior security professionals, corporate executives, consultants, and government officials from throughout Europe. In addition, dedicated educational sessions for Chief Security Officers (CSOs) and their deputies will be organised by the CSO Roundtable of ASIS International.

 

General submission guidelines:

  • Commercial presentations will not be selected. However, 20-minute speaking slots in the exhibition area are available as part of the exhibitor package.
  • ASIS International does not pay per diems, honoraria, or expenses.
  • Presentation slots are 50 minutes including time for Q&A.
  • Proposals must be in English only.
  • Proposals should describe original work.
  • All submissions must be received no later than Sunday, 8 September 2013.

 

Please click here to submit an abstract or contact the ASIS International EMEA Bureau at: europe@asisonline.org for more information. 

  

 Like us on Facebook  View our profile on LinkedIn 

 

c3ASIS International News

  

a2ASIS 2013: Forward-Thinking Education, New Technology, Peer-to-Peer Connections

  


 
Security concerns continue to be a top priority for governments and industries in all regions of the world, and keeping up with the latest information, technology, and techniques for dealing with current and evolving threats is the primary goal of the ASIS 59th International Annual Seminar and Exhibits (ASIS 2013). ASIS 2013 is expected to draw more than 20,000 security professionals from more than 90 countries when it convenes 24-27 September in Chicago, Illinois, USA.

 

In addition to the opportunities afforded ASIS delegates and exhibitors by the colocation of the (ISC)² Security Congress, several other organisations are partnering with ASIS this year by presenting sessions of interest to the security industry: these organisations include BICSI (an IT organisation), the Electronic Security Association, the International Association for Healthcare Security and Safety, and Security Industry Association. And once again, PSA Security Network is supporting the Security Integrator track.

 

"The need for the sharing of information and ideas, successes failures, and outlooks for the future has never been greater," says ASIS President Geoff T. Craighead, CPP.  "The lines between departments and functional units, as well as between professions, are blurring as the emphasis on cyber security increases.  We must work as a team to deal with today's worldwide threats."

 

This year's educational programme offers more than 200 sessions in 24 tracks covering the breadth of issues of importance to security professionals. In addition to the wealth of innovative solutions found in the Exhibit Hall, a complement of free learning opportunities on the show floor will provide even more resources to attendees. Details on tech trends, poster sessions, and Solutions Theater vendor presentations will be available this month and an announcement on a brand-new feature will be made soon.

 

General sessions include an international policy roundtable, "From Victims to Vigilantes: Cyber Security Strategies Going on the Offensive," which will be presented by (ISC)2 on 27 September at 8:00 a.m., followed by "Counterfeiting: From Potions and Lotions to Tractors and Turbines" at 9:30 a.m. And at 11:00 a.m., "The Security Professional as a Trusted Advisor," will present diverse ways for security professionals to work with the C-suite and break down barriers among key stakeholders.

 

For the latest information on education, networking events, and the Exhibits, visit www.asis2013.org. Visit the International Visitors page for information and travel resources. Register at www.asis2013.org/registration

a3Making Plans to Attend ASIS 2013? Add ASIS Foundation Events to Your Schedule

The ASIS Foundation holds two fundraising events each year in conjunction with the Annual Seminar and Exhibits: a golf tournament and Foundation Night. Both events offer excellent opportunities for networking with peers from all sectors of the security industry. This year's golf tournament will be held on Monday, September 23, at Harborside International Golf Center. Register and be teamed up with colleagues or submit a foursome. Either way, it is a great day of fun and a wonderful way to begin your ASIS 2013 experience in Chicago.

 

Foundation Night will be held on Thursday, September 27 on the scenic 99th floor of the Willis Tower, which is the tallest building in the Western Hemisphere. Attendees can take in a 360-degree view of Chicago, including the city's lakefront and four states. The always festive evening will feature live music, delicious food and beverages, and an informal atmosphere in which to reconnect with old and new friends and colleagues. These events provide direct support for the Foundation, which is dedicated to providing high-quality and contemporary research and educational opportunities that serve to enhance the security profession. Be sure to include these events in your travel plans.

    

a4Be a Sponsor or Exhibitor at ASIS 2013, ASIS Asia-Pacific 2013, ASIS Middle East 2014, and ASIS Europe 2014

 

Does your organisation's strategic plan call for growth in the United States, Asia-Pacific, the Middle East, and Europe? If so, sponsorship of the ASIS 59th Annual Seminar and Exhibits, ASIS Asia-Pacific 2013, ASIS Middle East 2014, and ASIS Europe 2014 offers a great way to gain exposure and to raise the visibility of your brand, products, and services among key decision makers in these regions. 


Click these links to review and select from an extensive list of sponsorship and exhibit opportunities:


Identify the event that is most in line with your organisation's marketing strategy and budget, or contact ASIS to shape a tailored package that best suits your company's needs.

For further information on the ASIS 59th Annual Seminar and Exhibits, click here to contact ASIS headquarters.   

 

For further information on other ASIS global conferences, contact the ASIS EMEA/AP Bureau: Tel: +32 2 645 26 74; e-mail:

europe@asisonline.org or asiapacific@asisonline.org.  
a5Mark your Calendars for the CSO Roundtable's European Summit

The CSO Roundtable will hold its European Summit on 16 December 2013 in Paris, France. The programme is being developed in partnership with CDSE(Club des Directeurs de Sécurité des Entreprises). Attendees will learn more about the issues that affect companies throughout Europe and network with senior security executives from around the region at this annual event. More information on the full programme will be available soon at www.csoroundtable.org.

a6CPPs, PCIs, and PSPs Sought for Security Management Profile

Each issue of Security Management features an ASIS board-certified professional. The short, monthly column profiles a certificant and provides insight into his or her career, personal motivations to earn credential, and the benefits of achievement. Interested members or prospects can contact ASIS marketing manager Leigh A. McGuire for details.

    

 

c4Chapter News

  

a8Chapter News: Inaugural Meeting of the ASIS Hungary Chapter Held

  

Following the acceptance of the chapter's charter petition by the ASIS International Board of Directors on 15 May 2013, the ASIS Hungary Chapter was officially approved.

 

The inaugural meeting of the ASIS Hungary Chapter was held on 23rd July at the premises of Magyar Telekom's head-office and with the participation of Godfried Hendriks, CPP, Global SRVP Group, and Radek Havlis, CPP, RVP (Region 9F.)

 

During the meeting the Chapter's Board members were elected as follows:

Chair                   Péter Boda

Vice Chair           Peter Besenyei

Secretary            Csilla Virágos

Treasurer            Jenó Szalay 

 


 

From left to right: Péter Boda, chair; Csilla Virágos, secretary; Jenó Szalay, treasurer; Peter Besenyei, Vice Chair


After the election, Mr. Hendriks gave a short presentation on ASIS issues, and the event concluded with an open discussion on chapter operation and members' expectations. 

 

The ASIS Hungary Chapter has created its own discussion group on LinkedIn that all current and future members from Hungary are invited to join.

 

In other chapter news, Csilla Viragos has offered to organise a "Chapter recruitment business reception". The reception will be hosted by Robert Peaslee, senior commercial counsellor of the U.S. Embassy in Hungary, at his residence in September 2013. The exact date of the event will be announced soon.

 

By Radek Havlis CPP

RVP ASIS Region 9F

   

a10ASIS Europe Finalists in the Security Excellence Awards: 23 October 2013


ASIS International Europe has been selected as a finalist for the Enterprise Security Risk Management (ESRM) Project of the Year Award. The 2013 event features 18 categories, including seven new ones - among them Enterprise Security Risk Management Project of the Year and Systems Integrator of the Year.
The 15th Annual Security Excellence Awards ceremony takes place at the Hilton Hotel, Park Lane, London, on Wednesday, 23 October. These awards commend projects in which security risks have been identified and assessed in terms of their likelihood and potential impact, a response strategy has been determined, and progress monitored to generate the most value for the stakeholders involved.

 

The leaders of ASIS Europe recognised in 2011 that security risk is normally managed in a siloed way by organisations so that information security and physical security are not linked. One typically reports to IT or the CIO, the other to FM or H & S. However, it was agreed that there are increasingly blended threats that affect all areas of the business. The management of security risk also includes HR, legal, finance and FM, but often there is very little collaboration. It had been acknowledged that whilst the Alliance for Enterprise Security Risk Management (formed in 2005) between ASIS, ISACA and ISSA had achieved much, a solution was yet required.

 

In February 2011, the ASIS European Security Convergence/ESRM Committee was formed. Alessandro Lega, CPP, invited senior ASIS leaders from across Europe to represent their country and to promote the importance of a converged security strategy first in their individual chapters, and then build relations with other organisations such as ISC(2), ISACA, and ISSA. This was soon widened to include the European Association of People Management and EuroFM. ASIS Europe was delighted that Filippo Abramo, EAPM's president, spoke at ASIS Europe 2012 in London about the project and his clear support, emphasising the need for a cross-functional response to the cross-functional risks.

 

The main challenges for the committee were to show the importance of ESRM first to ASIS members, then to the other associations. This has been achieved by a series of magazine articles written by each member of the committee on convergence and by several meetings between EAPM, EuroFM and ASIS Europe. The articles were published in EuroDynamics and A & S Italy.

 

Since April 2012, a White Paper on Security Convergence published by Deutsche Telekom has been circulated to ASIS and the other associations. Volker Wagner, the author and new chair of the committee, has promoted this and it has also been shared with the UK Home Office. In May 2012, the ASIS ANSI PAP standard was published, which includes a holistic approach to security risk and includes a section on security convergence supported by and including contributions from the committee.

 

The committee has raised awareness of the converged security risks faced by organisations today and the ESRM solution to them. The articles written by the members have been widely distributed and the presentations, online blogs, and videos have been seen by significant numbers of security professionals across Europe.

 

Several members of the committee, including Chair Volker Wagner, Past Chair Alessandro Lega, Vice Chair James Willison, and Martin Smith will attend the awards ceremony in October and say they are delighted to represent this fantastic European project that we hope you will be pleased to support.
  
By James Willison
ASIS International
Vice Chair of the Convergence Subcommittee.

a9Chapter News: International Conference on Security Management 2013 in Prague

 

On 13 June 2013, the ASIS International Czech Republic Chapter hosted an international security conference in Prague. More than 160 participants from security companies, embassies, developers, regional authorities, and other areas gathered on the premises of the Czech Technical University. The conference was opened by Zdeněk Kalvach, Chair of the ASIS Czech Chapter and Radek Havlis, CPP, RVP (Region 9F.)

 

A panel discussion titled "Terrorism Today" took place first. Panel speakers included: Stevie Weinberg, director of operations at the International Institute for Counter-Terrorism, who presented his research on suicide attacks, and Uzi More, CEO of engineering company MIP Security, who made a presentation on methods of securing buildings against extreme threats.

 

A separate panel on behaviour detection addressed the various universally applicable and effective methods used for detecting suspicious behaviour.

 

A discussion on emergency planning and crisis management combined panellists from the public and commercial sectors who spoke about several Czech case studies.

 

A unique approach was introduced at a domestic violence panel that was hosted by police specialists. In that discussion, the cooperation between HR and security departments was stressed.

 

Finally, complex facility management project case studies were presented by several companies at a panel discussion.

 

Three competitions winners were announced during the subsequent conference after party:

  • Security Project of the Year 2012 - Winners: "Crime scene? Home!!" of the regional police headquarters of the Moravian-Silesian region Ostrava and M2C mobile application HELP of Mark2 Corporation a. s. Holding.
  •  Security Manager of the Year 2012 - Winner: Mr. Martin Bilek, security director of ČEPS.
  •  Final Thesis of the Year 2013, security management topic - Winner: Pavel Klučka of the Technical University of Ostrava, whose topic was: "Definition of Critical Infrastructure Primarily Threatened by Manifestations of the New Security Phenomena".

By Zdeněk Kalvach

Chapter Chair

ASIS Czech Republic Chapter

 

c5Headlines

  

a11EU Plans Independent Intelligence Agency: Report

Following the recent events of the NSA's PRISM scandal, the European Union launched a proposal "to own and operate spy drones, surveillance satellites and aircraft as part of a new intelligence and security agency under the control of [EU Foreign Policy Chief] Baroness Ashton" claims a report published by the British newspaper, The Telegraph, on July 26. This proposal is apparently part of a bigger plan in which the EU seeks to create an independent EU military body with its own equipment and operations.

 

The use of these assets will be for internal and external security policies, which will include police intelligence, the Internet, protection of external borders and maritime surveillance, according to The Telegraph. "The Edward Snowden scandal shows us that Europe needs its own autonomous security capabilities, this proposal is one step further towards European defence integration," said a senior EU official. The EU proposal says that "the Commission will work with the European External Action Service (EEAS) on a joint assessment of dual-use capability needs for EU security and defence policies... The basis of this assessment, it will come up with a proposal for which capability needs, if any, could best be fulfilled by assets directly purchased, owned and operated by the Union."

 

According to the report, Geoffrey Van Orden MEP, member of the Subcommittee on Security and Defence, said that "it would be alarming if the EU - opaque, unaccountable, bureaucratic and desperately trying to turn itself into a federal state - were to try and create an intelligence gathering capability of its own. This is something that we need to stop in its tracks before it is too late."

 

European Union sources reveal that Baroness Ashton, the European Commission and France, Germany, Italy, Spain, and Poland all support the plans, but that the UK is firmly against such a proposal.

 

Source: Press TV

 

Please click here for more.

a12Microsoft Security Boss: EU Should Harmonise Cybercrime Controls

In a brief interview the senior director in Microsoft's Trustworthy Computing group, Paul Nicholas, spoke to Euractiv on the European Commission's proposed cyber security strategy regarding companies reporting incidents of cyber attacks.

 

The biggest challenge that will be faced, Mr. Nicholas points out, is that there needs to be a common understanding between the EU and the United States on how the information gathered from the mandatory reporting of cyber attacks is going to be used. At the moment, he points out, it is unclear as to what companies are reporting for: "Are we reporting information for situational awareness, or to assist governments, to make statistical information more refined? How significant must the events be that trigger reporting? If we had a common understanding of what is significant, that would help," he states.

 

Increasingly the origins of cyber attacks are becoming more difficult to identify, and this in itself is a valid concern as it is impossible to tell who is acting, where from, and how. So, to combat this there needs to be more work done at an international level to ensure that countries are properly equipped with cybersecurity capabilities. However, Mr. Nicholas points out that this is where the lack of knowledge as to the origins of the attack comes into play as if the source can't be identified then "you cannot build boundaries that will prevent an attack."

 

All in all with regards to the EU's cybersecurity proposals the Microsoft senior director "would like to see greater harmonisation between governments about what are acceptable norms at nation state level would be a good aim in the long term."

 

Source: Euractiv

 

Please click here for more.

   

a13Securing Public Events against Terrorist Attacks and Other Threats Via the Innovative Integration of Diverse Technologies

Back in March 2009 a research project funded by the EU, and known as the "Integrated Mobile Security Kit" (IMSK), began its research into designing a system to integrate different sensor information feeds in order to produce a common operational picture during large-scale events. The research ended in February of this year, and the result of this has been "the optimal way to combine technologies for area surveillance, checkpoint control and the detection of CBRNE (chemical, biological, radiological, nuclear, explosive) threats" reports the Commission.

 

Apparently, "Sensor data was fed into a single information platform via a secure communication module and then fused to create a common picture," the Commission states. Coupled with this is the "IMSK's command and control sub-system (C2), which allows authorities in charge of an event's security to monitor the site and its activity. The "position" of any threats can be continuously updated as well as the location of security forces."

 

IMSK also developed various security modules such as CBRNE detection, 3D face recognition and security scanners to work with the C2 system, which it believes can be used to identify potential risks and monitor developing security situations.

 

Source: European Commission - Directorate-General for Enterprise and Industry

 

Please click here for more

a15New Mobile Payment Systems Pose Regulatory, and Security Challenges

Last month, the European Commission adopted an updated legislative package in the field of the EU payments framework, which proposed a revised Payments Services Directive (PSDII). However, Euractiv believes that the Directive will struggle to cover regulatory and security challenges posed by a range of new mobile payments services expected to explode onto the European scene over the next two years.

 

This package has come about as part of the Commission's attempt to help the current payments framework to better serve the needs of an effective European payments market, and as the same time create a more competitive payments card market in light of the increased use of online and mobile payments. Though this is not without its areas of concern, as flagged by the EU Executive "The legal vacuum for certain newly emerged Internet service providers, such as third-party service providers offering online banking-based payment initiation." Such a legal vacuum risks impeding innovation and appropriate market access conditions.

 

These mobile payments methods appear, simplistically, to come as a result of increased use of digital wallets. According to Euractiv, a key difference distinguishing between the types of these wallets are those that act as a software platform to the consumers' existing banking cards and facilities, and those that offer a distinct payments service. But a problem with the use of these new wallets lies on the security issues associated with their increased use. Hackers now pose a serious risk due to the fact that "it's a simple formula for crime: no password plus instant access to online accounts equals fraud, identity theft and privacy loss," states the chief executive of the security Website IDTheftSecurity.com, Robert Siciliano.

 

The new Regulation hopes to encompass all of the new payment innovations to allow for them to be properly monitored and regulated, but there are doubts as to how much they can accomplish.

 

Source: Euractiv

 

Please click here for more.

  

a16Overbearing Data Protection Rules Threaten Cloud Computing

With the recent boom in cloud computing technology and services there is currently an on-going policy debate in Europe as to how strict the regulation of this new technology should be. It is widely accepted that the cloud offers vast benefits for both established companies and new start-ups alike. "The cloud" allows them to "avoid the cost of buying and maintaining some of the IT hardware and software they need to run their operations. Instead, they can have their computing resources delivered over the internet, as infinitely scalable services" explains Thomas Boué, director of government relations for Europe, the Middle East, and Africa at the Business Software Alliance (BSA).

 

However, the divide comes about between those that wish to use this new technology to expand the European Union's ability to trade in digital services globally, and those who wish to keep it limited to the EU and its sphere of influence. The decision will ultimately come down to what sort of data protection rules are enforced on cloud computing as to how much enterprises can take advantage of its full potential. The Spanish MEP Pilar Del Castillo makes the point that the biggest growth opportunities for European firms are likely to reside outside the EU in her report on the Commission's cloud strategy, "Unleashing the Potential of Cloud Computing."

 

It is essential that the draft General Data Protection Regulation protects sensitive user data online, but they must also be flexible enough to allow for the seamless processing of data in the cloud environment. In Mr. Boué's opinion, "A practical improvement to the text on the table today would be to recognise context and risk in the definition of personal data. Different types of data, and different uses of data, carry different levels of risk and sensitivity. A context and risk-based approach would ensure the safe processing of data vital to businesses online and offline while still guaranteeing data subjects a high degree of anonymity." In doing so policy makers would allow Europeans companies to access and make the best use of this latest innovation in digital technology.

 

The BSA Director states, "There is great potential in the cloud, but for Europe to fully seize the major economic opportunity, policymakers must steer away from highly prescriptive, Europe-centric rules that could ultimately sideline the EU from the global cloud market."

 

Source: Euractiv

 

Please click here for more.

a17Protecting Taxpayers' Money Against Fraud: Commission Proposes European Public Prosecutor's Office and Reinforces OLAF Procedural Guarantees

On 17 July, the president of the European Commission, José Manuel Barroso, fulfilled part of his 2012 address on the State of the Union with his proposal for the establishment of a European Public Prosecutor's Office. He stated that this "initiative confirms the Commission's commitment to upholding the rule of law; it will decisively enhance the protection of taxpayers' money and the effective tackling of fraud involving EU funds. The Commission has also delivered on its commitments to reinforce and strengthening EU Anti-Fraud Office (OLAF) procedures applied to procedural guarantees, in line with the guarantees that the European Public Prosecutor Office will apply."

 

Both Vice-President Viviane Reding, the EU's Justice Commissioner, and Algirdas Semeta, the EU's Anti-Fraud Commissioner, expressed their appreciation for the proposal of the Prosecutor's Office and the reinforcement of OLAF. The idea behind the proposal is that as there is a federal budget funded by Member States, then there should also be a federal instrument in place to protect said budget. On the back of this, there is currently a discrepancy on successfully tackling fraud throughout the EU, and so it is the hope that the Prosecutor's office will be able to tackle suspected fraud against the EU budget, while at the same time OLAF will continue to do important anti-fraud work in areas not covered by the new Office.

 

"The European Public Prosecutor's Office will have a decentralised structure, integrated into national judicial systems. Delegated European Prosecutors will carry out the investigations and prosecutions in the respective Member State, using national staff and applying national law. Their actions will be coordinated by the European Public Prosecutor to ensure a uniform approach throughout the EU, which is vital particularly in cross-border cases...National courts will be entrusted with the judicial review, meaning questions on the European Public Prosecutors' acts could be challenged before them" informs the European Commission website.

 

The proposal is currently awaiting the consent of the European Parliament, and subsequent unanimous adoption by Member States in Council. If it is then ratified under the current EU treaties Denmark will not be subject to participation, and neither will the UK nor Ireland unless they decide to opt in.

 

Source: European Commission - Directorate-General for Justice

 

Please click here for more.

a18Justice for Growth: Commission Fills Legal Gaps for Unitary Patent Protection

On Monday 29 July, the European Commission proposed to update the "Brussels I Regulation" to complete the legal framework for Europe-wide patent protection. This comes about as the Commission tries to make it easier for companies and inventors to protect their patents throughout the EU with the establishment of a specialised European patent court, the Unified Patent Court. The Court will have specialised jurisdiction in patent disputes, which will help to avoid multiple litigation cases in up to 28 different national courts concerning the same patent, and should also cut legal costs and speed up decisions in patent infringement cases.

 

Creating a single court to deal with patents makes economic sense as back in 2011 only 62,000 European patents were delivered in comparison to 224,000 patents granted in the United States, and 172,000 in China. The biggest reasons for this difference of 100,000 plus in submitted patents is firstly the cost associated with doing so, and secondly the complexity of having to validate any European patent individually in each of the 28 Member States.

 

When speaking about the proposal Vice-President Viviane Reding, the EU's Justice Commissioner, said that "by making changes to the rules on recognition of judgements, we are paving the way for the new Unified Patent Court to begin its work. In the event of a dispute, companies will no longer have to launch actions before a number of courts in different countries...Removing bureaucratic obstacles, extra costs and the legal uncertainty of having 28 different and often contradictory systems makes the single market more attractive. This is a very good example of how justice policies can stimulate growth."

 

With regards to next steps the proposal will need to be agreed by Member States and by the European Parliament before becoming law.

 

Source: European Commission - Directorate-General for Justice

 

Please click here for more.

   

a19SOCA Chief Sir Ian Andrews Quits Over Undeclared Interest in Private Company

On 1 August, the chairman of the UK's Serious Organised Crime Agency (SOCA), Sir Ian Andrews, handed in his resignation to the Home Secretary, Theresa May. His resignation comes about after his failure to declare a personal interest in a private company. It has been indeed revealed that his wife was the head lawyer at Good Governance Group (G3), a major global company involved in security and investigations.

 

In a letter to the Home Affairs Select Committee Chairman, Keith Vaz, he wrote that he had "no explanation for this [decision] other than it was both a genuine and unintentional oversight but it is nonetheless inexcusable: and the responsibility is mine alone." Continuing he went on to say that "given the above, and the fact that I have failed to maintain the standard of integrity to be expected of the head of a public body, let alone one charged with law enforcement, I believe that I had no alternative but to offer the Home Secretary my resignation as the Chairman of SOCA."

 

Sir Ian was behind the decision of SOCA to hand over of a list of blue-chip companies who hired corrupt private detectives that hack sensitive information to the Home Affairs Select Committee under the condition that those companies names not be disclosed. His reasoning was that in their names were made public then that could damage their commercial interests and breach individuals' human rights. However, with his wife working for the Good Governance Group, and Sir Ian part owning the management consultants Abis Partnership Ltd this is a blatant conflict of interests with his government appointed position.

 

Following Sir Ian's resignation, Mr. Vaz stated that "Sir Ian was part of the decision making process that required that the Home Affairs Select Committee kept the lists that SOCA sent us confidential. I shall be writing to his successor to ask if he or she will now review this decision."

 

Source: The Independent

 

Please click here for more.

a20TeraSCREEN - Multi-Frequency Multi-Mode Terahertz Screening For Border Checks

A €4.8M project, called TeraSCREEN to develop security screening technology that will significantly improve the security, privacy, efficiency and experience at security checkpoints is currently in the works as part of the EU Seventh Framework Programme Security Theme. It is being led by the Spanish SME Alfa Imaging and worked on by a consortium of twelve research institutes, component and equipment developers and manufacturers, and security and ethical specialists from six countries across Europe.

 

The aim of this security screening project for the next three-and-a-half years is to develop a new type of scanner that integrates the two available technologies of: automatic detection of a concealed object, and the analysis and classification via an operator to identify specific threats.

 

The European Commission website states that "TeraSCREEN aims to develop passive and active operation at several millimetre-wave and Terahertz frequencies. The resulting multi-frequency multi-mode images will be processed automatically in real-time to reveal the location of potentially harmful objects concealed on a person...Terahertz radiation is non-ionizing, and reliable studies have shown that active operation in this frequency band is harmless to humans."

 

A prototype system will be installed at a live checkpoint to gather feedback and to identify any potential areas of improvement.

 

Source: European Commission - Directorate-General for Enterprise and Industry

 

Please click here for more.

a21Europe's Half-Way Ban On Hezbollah Won't Please Anybody

After more than a decade of intense debate, the European Union has finally agreed to include Hezbollah on its list of terrorist organisations. This came about after the Bulgarian authorities revealed that Hezbollah was behind the Burgas bus bombing in July 2012, which killed six and injured 32. The fact that Hezbollah soldiers have been active in the Syrian conflict alongside Bashar al Assad's Syrian army put additional pressure on the EU to act.

 

The European Union agreed on Monday 25 July to place the military wing of Hezbollah on its list of banned terrorist organisations; a move Canadian diplomats had lobbied for to contain the violent Lebanese group and its Iranian backers.

 

Although Canada outlawed Hezbollah as long ago as 2002, the EU had resisted. But the radical Shi'ite group's involvement in Syria and evidence it had bombed a tourist bus in Bulgaria last summer appear to have prompted it to act.

 

The decision, which the British and Dutch governments had advocated, means Hezbollah's assets will be frozen in 28 European nations, depriving the group of the ability to raise funds on the continent.

 

While the decision constitutes a significant diplomatic achievement - having 28 countries agree unanimously on applying the T-word to Hezbollah - the move may turn out to be merely symbolic: The EU has banned only the military wing of Hezbollah rather than the whole organisation.

 

While some terror groups differentiate their military wing from their political activities, by operating under two different names, Hezbollah does not even bother with that. Its political and military aspects are really two sides of the same coin. Hassan Nasrallah, Hezbollah's supreme leader, is as much the "Commander in Chief" of Hezbollah as its "President."

 

In fact, it is foreigners, not Hezbollah, who often insist on making the distinction. In May 2004, for example, the French Ambassador to the United States, Jean-David Levitte, declared that Hezbollah served mostly as a "social" organisation. France insisted that since Hezbollah is a political party, declaring it a terrorist organisation could destabilise Lebanon.

 

Hezbollah fundraising in Europe likely will go on unabated because the group can always hide behind its political wing. For instance, in Berlin's Neukoeln district, where one sometimes sees the green Hezbollah flag flying outside homes, people within the Shia community could still give money to Hezbollah with little fear of consequences. They can simply claim the donations are made in regard to Hezbollah's political and social activities.

 

With this half-baked decision, the EU won't really please anyone: It did not truly clamp down on Hezbollah, and at the same time it may have angered the Shia terror group and some within the Lebanese political class. Hezbollah might even retaliate by attacking UNIFIL soldiers in Southern Lebanon or target European interests around the world.

 

Gerard Araud, the current French Ambassador to the United Nations, once said that putting Hezbollah on Europe's terrorism list would be seen by some in the Arab world as "an American-Zionist plot," and France "does not want to give them that pleasure." Yet the European Union may actually have done just that, with little benefit in return. 

 

By Olivier Guitta

Director of Research, Henry Jackson Society

 

c6Education and Events

  

a7Resilience Lead Auditor Certification Course to be Held 18-22 November 2013 in Madrid, Spain

Managing the risks of disruptive events is critical to the survival and competitiveness of any organisation. The ASIS International Resilience Lead Auditor certification will help you assess organisational and supply chain risks, maintain and improve resilience management systems, and successfully conduct resilience management system audits. The RABQSA-certified training programme supports standards that address the management of risk related to events that may disrupt an organisation's operations. The RABQSA-RES Competency Unit covers the requirements of resilience standards (e.g., ANSI/ASIS.SPC.1: 2009; ISO 28002:2011; DS 3001:2009; or NEN 7131:2010), as well as discipline specific standards in business continuity management (e.g. ANSI/ASIS/BSI BCM.1:2010; BSI 25999:2007; or ISO/FDIS 22301), and security management (e.g. ISO 28000:2007, ASIS/WD.PAP.1). The course seamlessly integrates with the ISO 31000 Risk Management standard to allow organisations to develop a cost-effective, holistic approach to managing risk.

Date: 18-22 November 2013

Location: Hotel Petit Palace Embassy, Serrano 46, Madrid, Spain 

Instructor: Dr. Marc Siegel, global standards commissioner, ASIS International

Fees:      2,500 USD ASIS members

3,000 USD non members

650 EUR for 5 nights (VAT included. Single room + breakfast. Dinner not included)

  

Please
click here for more information.
a22Global Agenda

8 September 2013 - Submission Deadline for the ASIS 13th European Security Confernece & Exhibition

 

24-27 September 2013 - ASIS 59th Annual Seminar & Exhibits, Chicago, IL, USA

 

18-22 November 2013 - Resilience Lead Auditor Course, Madrid, Spain

 

3-5 December 2013 - ASIS 7th Asia-Pacific Security Forum & Exhibition, Macau, China

Registration is now open!

 

16 December 2013 - CSO Roundtable - European Security Summit, Paris, France

16-18 February 2014 -
ASIS 5th Middle East Security Conference & Exhibition, Dubai, UAE 


1-3 April 2014 - ASIS 13th European Security Conference & Exhibition, The Hague, The Netherlands

Submit your abstract before 8 September!
a23Professional Development

Webinars

21 August: FREE: Effects Based Security: Optimise Manpower and Budget

 

4 September: Shaping Your Company's Future with the Safety Act

10 September: FREE: West Texas Fertiliser Explosion, Error or Terror: Implications for CFATS and Other Federal Programmes

16 October: Intimate Partner: Violence in the Workplace

23 October: Workplace Violence in Healthcare

 

30 October: Stop Issuing Secure Credentials to Imposters!

 

Webinar Archive  


This month highlighting: Social Media & Cloud Computing Threats to Privacy, Security & Liberty

Full list of titles.


e-Learning 

 
This month highlighting: Basic Electricity and Biometric Technology.  

 

Full list of programmes.

 

Classroom Programmes

 

2013-2014 at a glance.

a24Chapter and Certification Events
Please click here to access the European agenda.

ASIS EUROPE. ADVANCING SECURITY WORLDWIDE. © 2013
To unsubscribe please contact the editor
.