Vicinity ‘left exposed’ to security threats after senior management shake-up (2024)

  • Exclusive
  • Business
  • Companies
  • Retail property
By Simon Johanson

,

register

or subscribe

to save articles for later.

Save articles for later

Add articles to your saved list and come back to them any time.

One of Australia’s largest shopping mall owners significantly downgraded security management at its 57 major centres around the country in the month before the deadly Westfield Bondi Junction attack, potentially compromising its ability to respond to major emergencies or crisis.

ASX-listed shopping centre behemoth Vicinity Centres retrenched its most senior manager of security and intelligence and let go other senior security staff in the weeks before the Bondi Junction attack, leaving it without key security leaders at the time of the murderous rampage at rival mall owner Scentre Group’s shopping mecca in Sydney.

Vicinity ‘left exposed’ to security threats after senior management shake-up (1)

Vicinity manages the Chadstone mega mall, Emporium Melbourne, Queen Victoria Building and Chatswood Chase in Sydney, the Myer Centre in Brisbane, and a number of Direct Factory Outlets (DFOs) around the country.

The stabbings at Westfield Bondi Junction two weeks ago, which left six people dead, rocked Sydney and the rest of Australia, prompting fears for the safety of shoppers.

Between them, Scentre Group – which manages Australia’s Westfield malls, including Bondi Junction where the attack unfolded – and Vicinity control about 80 per cent of the country’s biggest centres, where millions of Australians shop each day.

Shopping centres, like football stadiums and rock concert venues, are designated as mass gathering places and operators have a responsibility to protect their customers, said Neil Fergus, chief executive of international security consultancy firm Intelligent Risks.

In the weeks before the Bondi Junction atrocity, Vicinity retrenched its high-profile security chief Peter De Santo, a former counterterrorism intelligence head at Victoria Police and divisional commander in organised crime.

De Santo headed up the centre manager’s internal security team and was responsible for advising Vicinity’s executives and board on terrorist and other critical threats, liaising with the top echelons of Australia’s police forces and other security agencies, as well as overseeing security across Vicinity’s operations.

His departure precipitated a cascade of crucial staff changes at the $8.6 billion shopping centre giant.

Advertisem*nt

Another senior security manager – the firm’s national crisis and emergency manager – also left around the same time and De Santo’s replacement, recruited internally from NSW, resigned a day before the Bondi Junction attack, effectively leaving the company’s internal security team rudderless on the day of the rampage, a source with detailed knowledge of the company, who didn’t want to be identified to speak freely, said.

Loading

Vicinity would not confirm if it has since filled the security chief’s role.

A spokesperson said the company made the staff changes to “uplift capabilities” and ensure Vicinity was better placed to manage “all aspects of security and risk management, at both the operational [shopping centres] and corporate levels.”

An email from Vicinity’s chief legal, risk and ESG officer, Carolyn Reynolds, seen by this masthead, says the mall giant made major changes to its security and intelligence operations across multiple centres in March this year.

De Santo’s, and two other security roles, were replaced by a national security operations manager who now reports to the head of property management.

The reshuffle moved responsibility for security, crisis and emergency management to individual centres. “Relationships with local authorities and other relevant stakeholders will be maintained at the asset level through the centre management team,” Reynolds said.

“Security issues will be resolved through the centre management teams with input from the national security operations manager,” the internal email said.

Fergus said it was a “reasonable presumption” that the absence of key internal security staff had left Vicinity exposed. “They are absolutely critical, and I would suggest non-negotiable.”

“That person is there not only to protect the corporation’s reputation and financials, but to protect the life and safety of staff, visitors and customers into the precinct. I would think the board would have a major issue in terms of its governance,” Fergus said.

In another violent incident, a teenager was stabbed during an alleged knife fight between six men last Thursday at Highpoint shopping centre in Melbourne, further heightening safety concerns. The company said its security staff were at the scene immediately and police arrived within minutes.

Loading

Just days before the Westfield attack in Sydney, Scentre distributed a crucial safety pamphlet to tenants at some of its Sydney malls, telling them how to hide customers, lock doors and turn off lights if confronted by an armed offender.

Scentre’s national security and counterterrorism efforts are headed up by John Yates, a former assistant commissioner of London’s Metropolitan police.

De Santo declined to comment when approached by this masthead, as he is in dispute with Vicinity at the Fair Work Commission.

The Business Briefing newsletter delivers major stories, exclusive coverage and expert opinion. Sign up to get it every weekday morning.

,

register

or subscribe

to save articles for later.

License this article

  • Retail property
  • Commercial real estate
  • Vicinity Centres
  • Scentre Group
  • Shopping
  • Retail
  • Bondi Junction attack

Most Viewed in Business

Loading

Vicinity ‘left exposed’ to security threats after senior management shake-up (2024)

FAQs

What are the security threats and give an example of each threat? ›

Types of security threats
ThreatMeaning/ExampleRelated Security Property
Tampering with dataThis includes e.g., modification of data. Either data at rest or data sent over a network.Integrity
RepudiationThis means that users can deny having performed an action, e.g., sending or receiving data.Non-repudiation
4 more rows

What are the solutions for cyber security threats? ›

Protect Your Organization From Cybersecurity Risks Today
  • Creating data backups and encrypting sensitive information.
  • Updating all security systems and software.
  • Conducting regular employee cybersecurity training.
  • Using strong and complex passwords.
  • Installing firewalls.
  • Reducing your attack surfaces.
Mar 5, 2024

What are the top 5 security threats? ›

Social engineering, third-party exposure, cloud vulnerabilities, ransomware, and IoT are the top threats that organizations should focus on to protect their data, systems, and reputations. These threats can cause organizations to incur significant damage or loss if not addressed properly.

What are the four types of threats? ›

Threats can be classified in four categories: direct, indirect, veiled, or conditional.

What are the three most common security threats? ›

Malware, including viruses, ransomware, and spyware, poses a significant threat to home users, capable of causing data loss, financial theft, and system damage.

What is the most common type of security threat? ›

Malware is the most common type of cyberattack, mostly because this term encompasses many subsets such as ransomware, trojans, spyware, viruses, worms, keyloggers, bots, cryptojacking, and any other type of malware attack that leverages software in a malicious way.

What is the strongest prevention against cyber threats? ›

  • Manage passwords wisely. ...
  • Monitor the activity of privileged and third-party users. ...
  • Manage supply chain risks. ...
  • Enhance your data protection and management. ...
  • Employ biometric security. ...
  • Use multi-factor authentication. ...
  • Conduct regular cybersecurity audits. ...
  • Simplify your technology infrastructure.
Feb 20, 2024

What are the three main ways to prevent security threats? ›

How to Prevent Network Attacks
  • Install antivirus software. One of the first lines of defense against malware and other viruses is to install antivirus software on all devices connected to a network (Roach & Watts, 2021). ...
  • Create strong passwords. ...
  • Enforce security policies. ...
  • Use firewalls. ...
  • Monitor activity.

What are three ways of managing cyber threats? ›

6 Best Practices in Cybersecurity Management
  • Understand your IT assets and environment. ...
  • Deploy a risk management strategy. ...
  • Make cybersecurity risk management an element of company culture. ...
  • Use continuous, adaptive, and actionable risk assessments. ...
  • Implement strict security protocols. ...
  • Enhance visibility into your network.

What is the most serious threat to security? ›

Top Cybersecurity Threats in 2023
  • Cybersecurity Threats and Trends for 2023.
  • Vulnerability in the Cloud.
  • Data Breaches.
  • Risky Hybrid or Remote Work Environments.
  • Mobile Attacks.
  • Phishing Gets More Sophisticated.
  • Ransomware Strategies Evolve.
  • Cryptojacking.

What is the #1 threat to information security? ›

The biggest threats to endpoint security identified in the survey were: Negligent or careless employees who do not follow security policies – 78% Personal devices connected to the network (BYOD) – 68% Employees' use of commercial cloud applications in the workplace – 66%

Which is most vulnerable to security threats? ›

The biggest security vulnerability in any organization is its own employees. Whether it's the result of intentional malfeasance or an accident, most data breaches can be traced back to a person within the organization that was breached.

What are the 8 warning behaviors? ›

They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors.

How to identify a threat? ›

Threat indicators are verbal or visual behaviors that an individual exhibits when they are being deceptive, threatening, trying to hide in plain sight, or carrying contraband or weapons.

What is considered a threat? ›

Threats: are words or actions intended, causing, or reasonably likely to cause fear, pain, harm, injury, or damage to any person or property.

What are the security threats? ›

Common security threats include phishing, malware, ransomware, distributed denial of service (DDoS) attacks, data breaches, and social engineering attacks. Organizations should have security measures in place to protect against these threats, such as firewalls, antivirus software, and other security protocols.

What is threat and example? ›

Most threats are meant to pressure someone to do something (or not do something) by indicating what the punishment will be if they don't comply. For example, telling your brother that you will tell your parents that he was out past curfew unless he gives you something is a threat (it's also blackmail).

What are the 7 threats to human security? ›

There are essentially seven issues associated human security. These are economic security, food security, health security environmental security, personal security, community security, and political security.

What are the 5 types of cyber security threats? ›

Common categories of cyber threats include malware, social engineering, man in the middle (MitM) attacks, denial of service (DoS), and injection attacks—we describe each of these categories in more detail below.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 6151

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.