Tuesday, 19 June 2018

UKRG Event: Security: Be Alarmed_William Brown, Security and GIS

Government Indemnity Scheme, Security requirements and how to meet them.

A write up of the talk given by William Brown, National Security Advisor, arts Council England.

Firstly we started by congratulating William on his 12th anniversary as the NSA, he is longest serving NSA and, from the queues of people around him at tea breaks he certainly seems to be very popular.

I’m sure many of us thought William worked alone, running around the country assessing a whopping 1400+ applications per year. But it turns out William has some colleagues - several of whom he introduced – who cover different areas of the country and have different security specialisms.

After a whistle stop tour of GIS security conditions, William ran through the three most likely risks to museum collections and loans: losses (theft or criminality), damage (deliberate or accidental including consequential), and natural forces (such as fire or flood).

He then discussed examples of the three using some of the most famous UK museum thefts and accidents, including some which had not been fully resolved. The examples covered a wide variety of museum objects, scenarios, personnel, and locations. William also used quite a few “What’s wrong with this photo?” games to get us thinking for ourselves and assessing hidden and obvious risks. William also discussed the ‘at risk' parts of museum buildings – such as copper and lead roofing - which really hit home the point that risk management is not just about the collections. The discussion then moved on to recognising and reporting suspicious activity in the galleries and the importance of this for early detection and deterrent.

At this point, when the audience was getting really paranoid, William talked about how positive actions and professional collaboration can mitigate both immediate and future risks. These simple steps of working together, sharing advice, developing professional skills, and ensuring information is accurate all enable us to work in confidence knowing that our collections and loans will remain safe and secure wherever they may be sent. 

Considering this can sometimes be a depressing subject, William did an excellent job of mediating the “doom and gloom” by focusing on how our everyday actions can have the most positive impact.

Joanne CS Smith, Registrar, Projects, National Trust.

1 comment:


    •• Are you Seeking for the Best Legit Professional Hackers online?
    Congratulations Your search ends right here with us. •• ⚡️⚡️

    ✅✅ For Years Now We have Been helping companies secure there Infrastructures against malicious Attacks, however private individuals have been making use of our services to provide Optimum solutions to their cyber and Hacking related Issues, such as providing them unlimited Access to their desired informations from their Target. πŸ“²

    ✅✅ COMPOSITE HACKS is a vibrant squad of dedicated online hackers maintaining the highest standards and unparalleled professionalism in every aspect.
    We Are One Of The Leading Hack Teams In The United States With So Much Accolades From The Deep Web And IT Companies. ••
    ••We Offer Varieties Of LEGIT Hacking Services With the Help Of Our Root HackTools, Special HackTools and Our Technical Hacking Strategies Which Surpasses All Other Hackers.
    Our Major Services Includes:
    - PenTesting ⚡️
    - JailBreaking πŸš€
    - Website & Blog Hacking πŸ’»
    - PHONE HACK (which allows you to gain unnoticeable access to everything that is happening on your Target’s Phone such as Calls, Text Messages, Chats, Social Media Apps etc)πŸ“²πŸ“²
    - Retrieval Of Lost Files and Datas.πŸ’»πŸ“²
    - CREDIT CARD MISHAPS πŸ’³ πŸ’³ πŸ”₯

    ✅ We have a team of seasoned PROFESSIONALS under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record Called “HackerOne” and have cracked even the toughest of barriers to intrude and capture or recapture all relevant data needed by our Clients. Some Of These Specialist Includes ⭐️ PETER YAWORSKI ⭐️FRANS ROSEN⭐️ JACK CABLE ⭐️JOBERT ABMA⭐️ ARNE SWINNEN ⭐️And More. All you Need To do is To Write us a Mail Then We’ll Assign any of These Hackers To You Instantly.

    ✅✅ COMPOSITE HACKS is available for customer care 24/7. Feel Free to Place your Requests.

    * Email:
    •• compositehacks@cyberservices.com
    •• Wickr >> compositehacks

    * Hire a Hacker!
    * Want faster service? Contact us!
    * HackerOne©️LLC 2018.
    * All Rights Reserved ®️