Tuesday, 19 June 2018

UKRG Event: Security: Be Alarmed_William Brown, Security and GIS



Government Indemnity Scheme, Security requirements and how to meet them.


A write up of the talk given by William Brown, National Security Advisor, arts Council England.

Firstly we started by congratulating William on his 12th anniversary as the NSA, he is longest serving NSA and, from the queues of people around him at tea breaks he certainly seems to be very popular.

I’m sure many of us thought William worked alone, running around the country assessing a whopping 1400+ applications per year. But it turns out William has some colleagues - several of whom he introduced – who cover different areas of the country and have different security specialisms.

After a whistle stop tour of GIS security conditions, William ran through the three most likely risks to museum collections and loans: losses (theft or criminality), damage (deliberate or accidental including consequential), and natural forces (such as fire or flood).

He then discussed examples of the three using some of the most famous UK museum thefts and accidents, including some which had not been fully resolved. The examples covered a wide variety of museum objects, scenarios, personnel, and locations. William also used quite a few “What’s wrong with this photo?” games to get us thinking for ourselves and assessing hidden and obvious risks. William also discussed the ‘at risk' parts of museum buildings – such as copper and lead roofing - which really hit home the point that risk management is not just about the collections. The discussion then moved on to recognising and reporting suspicious activity in the galleries and the importance of this for early detection and deterrent.



At this point, when the audience was getting really paranoid, William talked about how positive actions and professional collaboration can mitigate both immediate and future risks. These simple steps of working together, sharing advice, developing professional skills, and ensuring information is accurate all enable us to work in confidence knowing that our collections and loans will remain safe and secure wherever they may be sent. 

Considering this can sometimes be a depressing subject, William did an excellent job of mediating the “doom and gloom” by focusing on how our everyday actions can have the most positive impact.



Joanne CS Smith, Registrar, Projects, National Trust.



2 comments:

  1. This comment has been removed by a blog administrator.

    ReplyDelete
  2. ◾PROTOCOL SHIELDERS◾
    HELLO,

    I am COREY RODRIGUEZ by name,
    the only GENERAL CEO of protocol-cyber-shield-hackers.
    In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organization works.

    Read it carefully!!
    Its reading will not take more than 10mins.

    We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

    ⚠️WARNING:

    MOST HACKERS YOU SEE HERE ARE FAKES
    AND SIMULTANEOUSLY INCONGRUOUS !!.
    It tears US up as we have received bitter emails of Jobs attempts proposals from most clients with hacking issues but never got it done and lost a lot in the process,
    EXAMPLES OF LOSSES ARE:
    ➡️BINARY FUNDS,
    ➡️INVESTMENTS,
    ➡️LARGE SCALE FUNDS,
    ➡️PROPERTIES,
    ➡️STONES(JEWELRIES) etc....

    all scammed by uncertified and fake hackers SIMPLY TERMED as "IMPERSONATION" like most you see here,
    which is disappointingly inadequate,
    leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

    SCAMMERS DON'T SHOW MERCY ON THEIR VICTIMS!
    BY THE TIME YOU KNOW IT,YOU'VE GONE TOO DEEP BEING RIPPED OFF THROUGH DIVERSE TRICKY MEANS,PLEASE BE WISE ENOUGH TO PAY ATTENTION TO THIS ARTICLE AS YOU READ THROUGH IT.
    HOW CAN YOU BE CAREFUL??

    You won't know until you fall Victim ,but can be attentive to potential danger, error or harm if you take note of these:

    1, you see uncertified email accounts carrying numberings like
    "iamhacklord1232@(gmail,yahoo or hotmailDOTcom"
    pls flee from them, BIG SCAMMERS.
    They take your money and never do your job!!

    2, you see posts like "do you need to spy on spouse?"
    All fake!
    just a way to lure you toward getting ripped OFF!.

    3, posting fake testimonies and comments to trick you into feeling save and secured.
    Pls endeavour to ignore!!

    🛑NOTE: beware as we urge you not to make respond to any "IVAN HONG,PETER SANTOS,MONICA HART...(impersonating with our post pretending to work for us)
    WE ONLY HAVE 2 EMAILS WHICH ARE LISTED BELOW THIS ARTICLE TO ATTEND TO YOU VARIOUS MANNER OF CYBER MISHAPS.

    ◾VERY IMPORTANT ◾

    For years now, We've helped organizations secure data base, so many sites USES US AS SECURITY BACK UP TEAM BECAUSE OF OUR METHODS OF HANDLING CYBER MISHAPS.
    🆗"CLEAR CRIMINAL RECORDS" 99%
    🆗"iPHONE HACK" 99%
    🆗"BINARY RETRIEVAL" 99% AND LOT MORE BEEN DONE IN SHORT TIMING!

    these are significant EXPERIENCES & RECORDS a good and effectively fully recognized organization must firmly ascertain.

    ◾OUR "AIMS" HERE ◾
    Are:
    1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

    2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given for Job contracts given to us.!!

    Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.
    write us on:
    ◾Protocolhacks@gmail.com or
    ◾Cybershieldnotch@gmail.com

    COREY ROD,
    SIGNED...!
    Thank you!!!

    ReplyDelete