Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 24

Keeping Security

Professionals Ahead of the


Enterprise Relevance Curve

Robert Zhu
President, ADT Security Services, Asia Pacific

ASIS International Asia Pacific Conference


Sydney, 2 February 2010

COMPANY CONFIDENTIAL
Agenda

 Where We Are Today

 Exploiting Our Challenges

 Securing the Future

2
Agenda

  Where We Are Today

 Exploiting Our Challenges

 Securing the Future

3
Where We Are Today
Growth Slowed But Expected to Rebound

+10 200 200 2010


% 8 9

+5%
JP KO JP US
EU
CH IN VN KO AU CH IN VN AU CH IN VN KO AU JP
US EU US EU

-5%

IMF GDP Comparisons 2008-20101


- Forecast
1

10%

4
Where We Are Today
Managing Security in a Highly Diverse Region

 Diverse demographics

 Diverse development

5
Where We Are Today
Differences to Continue Across Our Region

• Different rates of economic


development
• Different rates of population growth
(or decline)
• Malaysia, from 25M to 43M (+72%)
• Phillippines, from 91M to 148M (+62%)
• Japan, from 127M to 94M (- 26%)
• S.Korea, from 49M to 45M (- 8%)

• Different median ages


• By 2025, China’s median age expected to
be 40 years while Japan’s, 50 years

6
Where We Are Today
Urbanisation: Densities to Soar

Source: United Nations


7
Where We Are Today
Urbanisation: Densities to Soar

Source: Human Rights Etc


Asis Pacific will have half of the world’s most populated cities by 2015
8
Where We Are Today
Building Up Builds Expectations

• Economic and infrastructure development,


QuickTimeª and a
decompressor
are needed to see this picture.
both are a key dynamic and an urban
magnet

• Provides jobs, creates a middle class and


raises hopes

• Increases security demands

9
Agenda

 Where We Are Today

  Exploiting Our Challenges

 Securing the Future

10
Exploiting Our Challenges
Complexity Drives Specialized Applications

 Economic development drives infrastructure


Airport pic and commerce, driving …
 Ever more complex security requirements, such as
airports, logistics/transportation, banking/finance
 Electronically networked security solutions
Logistics pic
that can supplement or replace man-guarding and
single-premise applications
 Need for greater systems integration with other
enterprise applications, such as HR, logistics,
Banking pic
operations and others

11
Exploiting Our Challenges
Retail Applications Beyond Loss Prevention

 Retail security requirements are growing with retail


Retail pic 1 expansions across Asia Pacific
(loss prevention)
 Out of 41 countries, India’s retailers have
the highest shrink rate at 3.2% of sales1

 Loss prevention will remain a foundational application,


Retail pic 2 but complemented by…
(RFID)
 Item-level intelligence via RFID, to avoid costly out-of-stocks
and improve customer satisfaction and loyalty
 Video analytics, to analyze traffic patterns and customer
Retail pic 3 attention for optimizing store layouts
(video analytics)
 Point-of-sale data mining and analytics, to improve operational
efficiency and profitability

1
Global Retail Theft Barometer 2009 12
Exploiting Our Challenges
Near-Term: Continue Investing & Advocating

• Investing in Solutions,
Driven by ROI
• Internal R&D
• Strategic acquisitions
• Process optimisation
• Advocating Standards
• EU and global
• To help integration
and drive costs down
13
Exploiting Our Challenges
Long-Term: Security Needs to Grow
Traditional Threats Technology
Near-Term Evolution

Continued
IT Convergence

Long-Term 14
Exploiting Our Challenges
Evolving Technologies Creating Demand
 Video analytics

 Long-range iris recognition

 Megapixel video

 Mass notification

 Mesh networks

 Data mining

 Service-oriented architectures

All Must Drive Operational Productivity, Efficiency & Intelligence


15
Exploiting Our Challenges
IT Convergence Continues
5 Business Process
Optimization Supported
by Physical Security

4 Physical Security
Increasing Complexity

& Business Application


Integration

3 Physical Security
& IT Infrastructure
Integration
2
Multiple Security
Products Integration

1 Same Security Products


Category Integration

0 Security Products
Installation

Levels of integration
16
Agenda

 Where We Are Today

 Exploiting Our Challenges

  Securing the Future

17
Securing the Future
Near-Term Application Integration

18
Securing the Future
Mid-Term Enterprise Convergence

Information

Manufacturing Human Resources

Supply Chain Operations

Communications

19
Securing the Future
Mid-Term Roles: Security & IT

Security?

Information
Technology?

20
Securing the Future
Long-Term: Security’s Elevated Status

“Risk Strategist”
Physical – Logical – Business Continuity – Intellectual Property
Brand Reputation – Pandemics – Counterfeiting – Partners

Manage Risk Interfaces


Across the Enterprise Ecosystem
Mobile Workers – Contractors – Partners
Source Material Origins – Output Genealogies & Tracing
21
Summary
Security’s Prospects Are Bright

 Current economic environment will


challenge everyone: fact-based
business cases and well-founded ROI
solutions now needed
 Maximizing enterprise value is key,
long-term growth prospects should
continue to be strong
 Security’s role will evolve, driven by
integration and convergence, and
security professionals must lead the
change to stay relevant
22
Summary
Security’s Prospects Are Bright

Thank you!

23
Keeping Security
Professionals Ahead of the
Enterprise Relevance Curve

Robert Zhu
President, ADT Security Services, Asia Pacific

ASIS International Asia Pacific Conference


Sydney, 2 February 2010

COMPANY CONFIDENTIAL

You might also like