Happy Holidays from all of us here at Lotan Group

A little something from us to you for the holidays

Posted in Uncategorized | Leave a comment

Preparing for Active Shooter scenarios, Cyber Attacks and Natural Disasters

It’s been a busy month at BeST headquarters, with 4 war-Games and Tabletop exercises taking place.

More than 110 participants in 4 events dealt with a variety of dilemmas ranging fromdownload (1)active shooter scenarios, Crisis management for a large corporation following a cyber-attack and national disaster management following a natural disaster.

Quite a few lessons were learned from these games as can be seen in the following bullets:

  1. Dealing with the formal media outlets and social media while managing a crisis
  2. Information sharing during the crisis
  3. Situational analysis and understanding the threats

Many comments were repeated during the de-briefings and hot wash; mainly that the use of

an analytical tool to graphically reflect the decision making process presented a fresh and new way to enhance the organizations operational preparedness for their next crisis, while the turnaround time for preparation and summary report was short providing an additional benefit in ROI.

For more details on using BeST for your next War-game or Tabletop exercise; please contact us at creator@be-strategic.solutions

Posted in Strategic Wargaming | Tagged , , , , , , , , , , | Leave a comment

Test yourself – Are you really prepared to manage the next crisis?

In a time where terror attacks have become a frequent occurrence, we see that much is discussed on the ability of first responders to respond as quickly, effectively and efficiently as possible. The active shooter incident in Orlando earlier this month, the attack agaactiveshooter5inst a policeman and his family in Paris and finally the horrific attack in Ataturk Airport in Istanbul on the 28th of June are an example of these and a preview of what awaits us in the near future.

In this modern era we find ourselves in conflict between adding more layers of security and the fact that we have to also continue operations and keep the civil liberties which are the cornerstone of our existence.

While looking at many of my associates in the security consulting world, we see many recommendations on adding layers of security, from intelligence to physical hardening of infrastructure and adding layers of cognitive and behavior detection to existing deployments. To my surprise after 2 days of going through posts and newspaper articles I see little discussion on preparation for crisis management and disaster recovery.

Finishing a series of war-gaming and Table-Top exercises in the United States and Europe in the last three weeks on a range of different subjects, from active shooters and up to cyber-attacks against an airline we see that the ability to run through scenarios in a controlled environment enables the organization to fully examine its thought process on how to deal with rising issues. Procedures are evaluated and lessons learned, while enabling the participants to “feel” the event, so that when they encounter it in real life, it won’t be the first time they deal with the specific crisis.

One of the recurring elements we have seen in many of these War-Games and Table-Top exercises are the lack of clarity and information at the beginning of the event. This becomes critical in such events as every second counts and when the flow of information between entities is not smooth they cannot develop a real analysis of events which in real life will cost us human lives.

So, when planning your security deployment start with defining your threats, develop your http://www.dreamstime.com/royalty-free-stock-photography-big-city-big-ideas-business-conceptual-businessman-watching-image32765967concept and security layers, processes and procedures. Acquire the correct technologies to deal with your threats, recruit and train the correct people and text them and the chosen technology. Don’t forget to test yourselves as managers who may one day be in charge of managing such a crisis and who will be responsible for recovery and continuity.

In short – test yourself!!

Posted in Uncategorized | Leave a comment

Every Minute Counts…

“The hack at Hollywood Presbyterian forced doctors to use pen and paper in an age of computerization. News reports said its fax lines were jammed because normal e-mail communication was unavailable, and some emergency patients had to be diverted to other hospitals. Investigators said administrators were so alarmed that they may have paid ransom first and called police later”   http://www.reuters.com/article/us-california-hospital-cyberattack-idUSKCN0VS05M


In an age, where we rightfully spend huge amounts of resources in preventing attacks, organizations seldom examine their ability to deal with the consequences once the attack has taken place.

But the truth is that business continuity shouldn’t rely only on our ability to prevent the malicious intent from happening, but should also be based on the first few minutes or even hours of how our personnel will react to the threat.

As upper management plan for these events, they should ask themselves a few questions:

  1. Did we invest in reaction and not only prevention?
  2. Are our people prepared for these threats?
  3. Are we as upper management prepared? Do we know how we are going to react?

Unfortunately, in many cases the answer is no.

I agree with all those that are raising an eyebrow as they read this post saying that prevention is crucial and we should be investing in that domain, but let’s put it as it is. You are not going to prevent all the threats from happening, so you better start working on your contingency planning and understanding of how your organization is preparing for these…

You should start by:

  1. seeing your contingency plans are in place
  2. auditing
  3. testing all those involved
  4. practicing together
  5. war-gaming

I believe in all of these as preparation to events, because through them, you canlearn how your organization is prepared for predefined events, you canlearn how your organization “thinks” during crisis which in turn effects your decision making process and in many cases shows you how your organization deals with the unexpected.

So, I suggest that the next time you sit down with people from your organization, examine their reactions to different events and maybe even prepare a war-gaming program, because when the threat materializes, every minute counts towards saving lives, infrastructure and eventually money.

Posted in Strategic Wargaming, Uncategorized | Tagged , , , , , , , , , , , , , , | Leave a comment

Happy Chinese New Year of The Monkey


Posted in Uncategorized | Leave a comment

War Gaming Simulation together with GIMI

Lotan Group is proud to announce the completion of another Strategic Decision Making Simulation using our computerized “BeST” system (Be-Strategic.solutions).Simulating For Perfection

The simulation was held by the Galilee International management institute in the North of Israel as part of the annual courses in national Security and Mass Crisis Management.

The simulation dealing with the management of a National Disaster Crisis included 30 students from the National Security and Crisis and Mass Disaster Management courses been held at the time.

The full day simulation was considered a great success by all participants  as can be seen in the following testimonials

  • “Excellent learning experience because it taught us how to make a decision in uncertain situation in stressful time”
  • ” the war gaming was replicating real pressure on individual and understanding that during emergence there are a lot of agencies involves and stakeholder need to interact with each other”
  • ” Brilliant way of understanding the reality of managing a conflict through a war gaming”
Posted in Strategic Wargaming, Uncategorized | Tagged , , , , , , , , , , , | Leave a comment

War Gaming Simulation in Europe

We are proud to say that we have concluded another Strategic Gaming simulation in Europe. The war-gaming simulation using our computerized platform BeST (see the movie) was considered a great success with participants from the Aviation and Banking sector dealing Simulating For Perfectionwith several dilemmas in the Cyber domain.

BeST – (http://be-strategic.solutions) presents a unique opportunity for organizations to enhance their decision making processes and evaluate preparedness.  Participants in the gaming process operate in a virtual surrounding, which simulates future challenges. The game reflects prevailing operational procedures designed to confront critical strategic dilemmas. The participating players represent competitors, suppliers, rivals, experts, government authorities, media outfits etc. The unique interactive nature of the strategic gaming simulation creates a dynamic learning experience, accessible from multiple locations, providing a cost effective and modular solution

Posted in Strategic Wargaming | Tagged , , , , , , , , | Leave a comment

Lotan Announces Partnership with IVRI from Italy

Lotan Group is proud to announce its partnership with IVRI, Istituti di Vigilanza Riuniti d’Italia (http://www.ivri.it/ ), who are a leader in the security field throughout Italy, with specific expertise in the design of integrated services of surveillance, transport of ivrivaluables, and the operation of alarm systems.

IVRI specialize in the design of exclusive services for the protection of homes, individuals, companies and public places such as airports, ports, banks and retail outlets.

The partnership with IVRI is an important factor for growth and development for our company as we continue to expand our services in Europe.

Posted in Aviation Security, Critical Infrastructure, Hospitality Sector, Safe City, security Philosophy, Sports events, Strategic Wargaming, training, War Games | Tagged , , , , , , , , , , , , , | Leave a comment

Happy Holidays from all of us at LOTAN Group

Posted in Uncategorized | Leave a comment

Surprising the Attacker – Proactive Security

Every age has its own kind of war


 “Water has no constant shape, war has no constant dynamic

(Sun Tzu)

The million dollar question every security officer asks himself on a daily basis is “who is

Russian plane crash

Russian plane crash

the attacker” And even more importantly, how can we identify and stop them?

As for the “Who?” there are many answers to these questions; extreme jihadist, political derived movements and even drug cartels,

And as to the “How?” the most effective system is to focus our efforts on High Potential Risk persons.

The fact is that the modern adversary adopts guerilla tactics based on elements of surprise to overcome the security deployment.

Surprise is achieved by employing a stratagem that is in effect the essence of the operational goal of attack. The stratagem always includes risk taking  and its objective is to act on the opponent’s state of mind, in other words to strike at the point that will instill fear not only as a result of the attack outcome itself but from the position of inferiority in which it finds itself. The object of the stratagem is therefore to put the defender off balance and strike it in this position of inferiority.

The question is what is the most effective course of action the defender/security provider can take against an attacker trying to surprise?

The answer is easy to say but extremely difficult to achieve:

The defender must surprise the attacker.

Surprise can only be achieved if the defender takes a proactive approach, aimed at disrupting the attacker’s first moves in order to foil his plans, to undermine his state of mind, or even to change it.

This defensive proactive approach has been used by several entities in the aviation sector in the past years enabling them to create an effective security deployment. The ability to screen large numbers of the public such as passengers in airports, while at the same time enhancing screening abilities to be able to detect the adversary has become the epicenter of Aviation Security.

We assume that looking for a single element is impossible or at least it will take a tremendous amount of effort so we select a bigger group we define as “High Potential Threat”. This also allows the security deployment to enhance its deterrence by selecting several passengers and not a singular person while at the same time avoiding pitfalls such as claims for discrimination.

The asymmetrical alignment between terrorist attacker and security systems creates an equation that can only be evened establishing a proactive approach. Only a proactive system allows for effective alongside efficient security.

The use of proactive approach requires professionalism and professionalism means constant appropriate recruitment-education-training-maintaining capabilities and innovation.

Posted in Uncategorized | Leave a comment