CSO Special News Security Technology

Strategic Approach To Industrial Security

The role of traditional manpower is not diminishing; it’s evolving, says expert

In the complex and demanding world of industrial security, few have the breadth of experience held by Avanish Kr. Dubey, Head Security & Admin -Birla Corporation Ltd. With a career forged in the field, he has honed his skills in everything from crafting comprehensive security policies to leading high-stakes investigations. He is a hands-on expert in merging technology with human intelligence, managing large-scale workforces, and designing robust contingency plans for some of the most challenging environments.

Today, we sit down with Mr. Dubey to discuss his strategic approach to security management, his insights into balancing manpower with technology, and his proven methods for protecting assets and people in a constantly evolving threat landscape.

Mr. Dubey, thank you for joining us today. You have extensive experience in creating and enforcing security policies. Could you share an example where your policy implementation significantly improved security outcomes in an industrial setup?

Thank you. I recall a specific instance at a large manufacturing plant where pilferage of raw materials was a recurring issue. The existing policy was very reactive—focused on investigating losses after they occurred. My team and I revamped this approach completely. We implemented a new, proactive policy focused on access control and material movement. This included mandatory electronic tagging of all high-value raw materials, a multi-stage verification process at entry and exit points, and a zero-tolerance policy for unrecorded material movement. We also integrated the security data with the inventory management system. Within six months, pilferage incidents dropped by over 70%, not just due to a stricter policy, but because the new system made it virtually impossible for unauthorized materials to leave the facility unnoticed.

Industrial environments face both physical and information security challenges. How do you align and integrate these two aspects while keeping costs under control?

The key is to see them as two sides of the same coin, not separate departments. I advocate for a “unified security framework.” For example, the same access control system used for physical entry points can be integrated with the IT network to manage user authentication. An employee’s access card for the server room is also their login credential. This creates a single point of data for auditing and incident response. To manage costs, we prioritize solutions that offer this dual functionality and deploy them in phases, targeting the highest-risk areas first. We also look for vendors who can provide a holistic package, which often results in better pricing and reduced overhead for maintenance.

You have managed physical security infrastructure and manpower. What do you believe is the biggest challenge in balancing technology with human resource deployment?

The biggest challenge is the “over-reliance trap.” There’s a temptation to believe that advanced technology can replace human security. However, technology is a tool, not a solution in itself. A camera can see an incident, but a trained security officer can assess the context, de-escalate a situation, or provide immediate first aid. The challenge is balancing the capital cost of technology with the operational cost of manpower. My approach is to use technology to enhance human capability. For instance, instead of having guards manually patrol a long perimeter, we use AI-enabled surveillance to flag anomalies, allowing a smaller team of guards to respond rapidly to a verified threat. This shifts the role of the guard from a passive observer to an active first responder.

Could you walk us through your approach to conducting a risk analysis and building a contingency plan for disaster management in a large facility?

My approach is a five-step process. First, we conduct a vulnerability assessment to identify all potential threats, from natural disasters like floods to man-made incidents like fire or sabotage. Second, a criticality analysis determines which assets are most vital for business continuity. Third, a risk quantification phase assigns a monetary value to potential losses and calculates the probability of each event.

From there, we move to contingency planning. This involves creating a detailed, step-by-step plan for each identified disaster scenario. It covers everything from emergency evacuation procedures and communication protocols to a business continuity plan for restoring critical operations. Finally, we conduct regular drills and audits to test the plan’s effectiveness and train the workforce. This ensures that the plan remains relevant and that everyone knows their role when a real disaster strikes.

You have led investigations into corruption, fraud, theft, and pilferage. What is your methodology for conducting such investigations while ensuring confidentiality and compliance with the law?

The methodology is built on three pillars: confidentiality, compliance, and evidence. First, confidentiality is paramount. The investigation team is kept small and operates with a strict need-to-know basis to prevent information leaks that could compromise the case. Second, compliance with the law is non-negotiable. All evidence gathering, from surveillance footage to witness interviews, is conducted in full accordance with legal standards to ensure it is admissible in court. We liaise closely with law enforcement and legal teams. Third, the focus is on meticulous evidence gathering. We use a combination of physical surveillance, electronic data analysis, and forensic auditing to build a robust case based on irrefutable facts, rather than assumptions. This rigorous approach ensures we not only uncover the truth but do so ethically and legally.

Finally, with the rise of AI-enabled surveillance, how do you see the role of traditional manpower evolving in the next five years?

The role of traditional manpower is not diminishing; it’s evolving. The old-school guard whose primary job was to sit and watch a monitor will become obsolete. In the next five years, security personnel will transition into highly skilled “security analysts” and “first responders.” Their new responsibilities will include monitoring real-time AI alerts, interpreting complex data patterns, and quickly responding to verified threats. They will need to be trained in electronic systems, forensic analysis, and rapid crisis intervention. The focus will shift from passive observation to proactive, intelligent response. The future of industrial security is a hybrid model where technology provides the “eyes and ears,” and well-trained, highly skilled manpower provides the critical human intelligence and physical presence needed to keep our industries safe.

Disclaimer: Views expressed are in individual capacity and must not be treated as employer’s views.

Leave a Reply

Your email address will not be published. Required fields are marked *