Your SlideShare is downloading. ×
Security Training and Threat Awareness by Pedraza
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Security Training and Threat Awareness by Pedraza

2,815
views

Published on

Published in: Business, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,815
On Slideshare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • In the event you identify an employee or visitor that is not wearing an identification badge or uniform:
    If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situation
    If its a visitor, escort them to the reception area or to the person with whom they are visiting.
  • If you identify an individual in an area he/she is prohibited from entering,
  • If its an employee, approach them and ask them if they need assistance or contact management
    If it’s a visitor, escort them to the reception area or security guard
    Report suspicious activity to your immediate supervisor.
  • Look for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here.
  • Look for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost.
  • Immediately report suspicious activity to your immediate supervisor.
  • Security personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges.
    All visitors must be escorted and visibly display their visitor badge.
  • Transcript

    • 1. C-TPAT TRAINING This is a sample PowerPoint on Security and general Threat Awareness. All images and clip art were taken from open sources. We suggest you consider using images of your employees within your faculty. This PowerPoint is meant to be a guide and should be tailored and edited to suit your needs. It is also suggested that you use your own slide background and colors scheme.
    • 2. Security Training and Threat Awareness Program for All Employees
    • 3. We have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.
    • 4. Topics Suspicious Persons Suspicions Activities Suspicious Objects or Packages Employee Identification Visitor Controls Computer Security Document Security
    • 5. Suspicious Persons LOOK FOR….. • Any person without an employee badge, visitor badge or uniform. • These are stock photos, take and use actual photos of your employees walking down a hallway. Or use images from a surveillance camera
    • 6. Suspicious Persons …and ACT • Determine if the person is an employee or a visitor – If an employee, remind them always to display their ID badge and uniform. – If a visitor, escort them to the reception area or to the person with whom they are visiting. – Report the incident to your immediate supervisor.
    • 7. Suspicious Persons LOOK FOR…..  Any person in unauthorized/restricted areas
    • 8. Suspicious Persons AND ACT…..  Get them out of the area  If a visitor, escort them to the reception area.  Report the incident to your immediate supervisor
    • 9. Suspicious Persons Cam 7 1:17:23AM 8/02/06 Look for ….  Any person:  wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing  waiting or loitering in an area or hallway  asking for an unknown department, person or employee
    • 10. Suspicious Persons LOOK FOR….  Any person:  who seems not to belong in the area  going door to door, office to office  entering a private office unescorted  selling items  who seems lost Cam 7 1:17:23AM 8/02/06
    • 11. Suspicious Persons LOOK FOR …..  Any person:  Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights…  running, especially if carrying something  hiding behind doors, fences, desks, … Cam 7 1:17:23AM 8/02/06
    • 12. Suspicious Persons AND ACT………  Immediately report the incident to your immediate supervisor
    • 13. LOOK FOR …  Objects obstructing access points  Disconnected or obstructed cameras  Broken locks or access control systems  Unexplained clutter or debris  Objects thrown from a vehicle, especially while traveling at a high speed.
    • 14. ACT …  Immediately report any suspicious activity to your supervisor.
    • 15. Suspicious Objects or Packages LOOK FOR…. • Unexplained objects or packages that look strange or do not belong to the area • Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) • Strange leaking substance (powder, liquid, etc…) • Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)
    • 16. Suspicious Objects or Packages
    • 17. Suspicious Objects or Packages AND ACT………  Immediately report any suspicious packages or objects to your supervisor, security, local police, 911 and/or FBI.
    • 18. Suspicious Objects or Packages •AND ACT…….
    • 19. Employee Identification  Your Responsibilities While on company property  Your company identification badge must be properly displayed and worn at all times.  Your company uniform (if applicable) must be worn at all times.  Properly secure and protect your ID badge, uniform, keys and access control card, etc.
    • 20.   Visitor Pre-meeting Requirements  Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements  Ensure that your visitor has logged in and has been issued a visitor badge
    • 21.   Visitor Escort Requirements  You must escort your visitors at ALL times  Do not leave your visitor unattended Visitor Exit Requirements  Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist
    • 22. Visitor Entrance Notify hosting employee Document arrival on Visitor Log Check photo identification Issue visitor badge Visitor Exit Collect visitor badge Document departure on Visitor Log Use colors and shapes of you choosing.
    • 23. Computer Security  Do not share access to your computer with strangers  Log-off when you leave your computer  Passwords should be changed every 60 to 90 days  Do not share your password with anyone  Do not write down your password.
    • 24. Selecting a Password  Use hard-to-guess passwords  Do not use the same password in more than one place  A password should have a mix of letters, numbers and symbols  I Love to be Secure iL2bs@  Always on time to work ! AoT2wx  My Password is Very Secure MyP1VS#  Yo Quiero Taco Bell yqtb!10
    • 25. Electronic Mail Restrictions • Do not use company e-mail for private business activities, amusement or entertainment. • Do not send e-mail containing racist, sexist, threatening or other objectionable language. • Do not join mailing lists. • Do not open unknown or unexpected e-mail attachments.
    • 26. Let’s review… Suspicious persons Suspicious activity Suspicious objects or packages Employee identification Visitor controls Computer security Document security Information technology security
    • 27. Security is not out of reach if you practice it every day.
    • 28. QUESTIONS? Refer to Customs & Border Protection Website: http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/ or www.cbp.gov