SlideShare a Scribd company logo
1 of 26
About the Presenter...
For over 15 years David ( @DavidSecurity ) has empowered
expats, travelers, and adventuresfrom all walks of life.
David's passion for security began when he was posted in Tunis,
Tunisia as a United States Marine Security Guard (2001).
He went on to serve as the Security Director for the American
Cooperative School of Tunis (2007-2016). During this time he
begin teaching security awareness to the local expat
community and continues providing security leadership
through his blog, presentations, and workshops.
Module Overview
★ Understanding the Principles of Assets Protection
★ Examples of Asset Protection in:
● Health Care
● Education
● Fast Food Sector
● Telecom sector
● Aero-space sector
★ Mitigating Risk through timely information
Physical Asset Protection
Protecting the assets of any organization – public,
private or not-for-profit – is a critical task for the
viability, profitability, reputation, and sustainability
of the organization.
What does it take?
Protecting assets requires a combination of strategic
thinking, process management, and the ability to
implement programs and initiatives in increasingly
shorter periods of time to match the rapid pace of
today’s global business environment.
The Goal:
The goal is the protection of assets by removing
or reducing the exposure of assets to threats and
hazards by developing appropriate protective
measures.
ASIS-Physical Asset Protection
Provides an approach to identify,
apply, and manage physical security
measures to safeguard an
organization's assets – people,
property, information, and intangibles
that are based in facilities (not during
transit).
Stanadrds Matter!
Important to NOTE: That Asset Management/
Protection is only one compent of a company’s
Enterprise Security Risk Management
Framwork:
Function of Physical Asset Protection
● Considering Assets
● Understanding the Threat
● Looking at Vulnerabilities
● Analyzing the Risk
● Protective Measures
● Application of Four D’s → (Deter, Detect, Deny, Delay and DEFEND)
Examples of Asset Protection in
Various Industries…
Health Care
Depending on the type of care and treatment provided, a
hospital’s critical assets invariably include patients, medical
professionals, support personnel, medical records, equipment,
supplies, and pharmaceuticals.
● Lost and stolen equipment costs the healthcare industry
millions each year
● To stem the problem, some hospitals are turning to new
technologies that track equipment throughout the hospital and
beyond in real time..
● Wireless tracking tools like real-time location
systems (RTLS) and radio-frequency identification
(RFID) not only help prevent loss and theft but also
help inform asset management.
Education-Asset Management
Challenge: A women-only university wanted to secure its premises for
its female students by digitizing people and asset tracking and
monitoring across its premises. The client also wanted to control the
movement of male personnel within the restricted zones, while also
check the entry of public into any unauthorized area.
Education-Asset Management
Solution: An End-to-end asset tracking and monitoring solution enabled
them to track the IT/non-IT assets in the campus and made the
university campus more secure for students.
Fast Food/ Restruant Sector
• Fast-food restaurants usually focus on Risk Assessments
and rely heavily on their insurance coverages.
• At a minimum they require some sort of general risk
coverage.
• General risk coverage is important for protecting assets
such as the physical building, equipment and different
items contained in the common areas of the restaurant.
The Challenge: Most organizations struggle to keep an updated accounting of
all data, devices, assets and physical locations of equipment.
Solution: More and more in the Telecom Sector are using Telecom Expense
Management (TEM) solutions designed to TRACK, UPDATE, AUDIT TELECOM
ASSETS.
Telecom Sector
Aero-Space Sector
Aircraft hangars house tens of millions of dollars
in assets and are host to some of the most
complex (and dangerous) mechanical operations
in the mechanized world.
Aero-Space Sector
Aircraft hangars are incorporating access control
systems to ensure complete control on who
accesses entry into the hanger.
Mitigating Risk through timely
Information
Security Fact #1
In a predicable world Asset Protection is
a straightforward process…
Security Fact #2
We don’t live in a Predictable World!
Need for Tactical Intelligence…
In today’s world, political upheaval, social unrest, even a viral
video can result in unforeseen security challenges &
consequences for organizations regardless of where they operate.
.
1st Hand Experience
In 2012, following attacks on the nearby US Embassy, protesters
attacked our school building. Thankfully, because we had access
to Tactical Information we were able to conduct a safe &
successful early evacuation of the campus.
Mitigating risk through timely information…
• Tactical Security Reports enable you to stay a step ahead.
• To assess RISK and take the PROACTIVE steps that will keep
your business operation GOING.
Stay Ready!
I hope you learned more about Asset Protection.
For more information or a to try a FREE DEMO of our
Tactical Security Reports:
Email: contact@davidsecurity.net
@DavidSecurity

More Related Content

What's hot

Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...SITA
 
Risk based approach
Risk based approach Risk based approach
Risk based approach Robin Patras
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4Robin Patras
 
Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2Robin Patras
 
Sensible defence
Sensible defenceSensible defence
Sensible defenceKoen Maris
 
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...SITA
 
An introduction to physical security
An introduction to physical security An introduction to physical security
An introduction to physical security Robin Patras
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochureAndy Kim
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...Md Shaifullar Rabbi
 
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...Thiago Pinto
 
Tough Target: Awareness for Application Developers
Tough Target: Awareness for Application DevelopersTough Target: Awareness for Application Developers
Tough Target: Awareness for Application Developersdigitallibrary
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguissamis
 
3 Ira Winkler
3  Ira Winkler3  Ira Winkler
3 Ira Winklermloginov
 
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...NAFSA Tech MIG
 

What's hot (20)

Lecture1 intro to cs
Lecture1 intro to csLecture1 intro to cs
Lecture1 intro to cs
 
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4
 
Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
 
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
 
An introduction to physical security
An introduction to physical security An introduction to physical security
An introduction to physical security
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
 
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
 
CISO PPT
CISO PPTCISO PPT
CISO PPT
 
Tough Target: Awareness for Application Developers
Tough Target: Awareness for Application DevelopersTough Target: Awareness for Application Developers
Tough Target: Awareness for Application Developers
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguis
 
3 Ira Winkler
3  Ira Winkler3  Ira Winkler
3 Ira Winkler
 
EACT STRATEGIC OVERVIEW
EACT STRATEGIC OVERVIEWEACT STRATEGIC OVERVIEW
EACT STRATEGIC OVERVIEW
 
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
 
IBM X-Force Research
IBM X-Force ResearchIBM X-Force Research
IBM X-Force Research
 
Cyber security
Cyber securityCyber security
Cyber security
 
Duty of care and travel risk management: Occupational Security
Duty of care and travel risk management: Occupational SecurityDuty of care and travel risk management: Occupational Security
Duty of care and travel risk management: Occupational Security
 

Similar to Assets protection and The Need for Timely Information

Navigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security OfficerNavigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security Officerwilliamshakes1
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBDavid Shipley
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscapegreendigital
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docxeugeniadean34240
 
Security Guard Service.pdf
Security Guard Service.pdfSecurity Guard Service.pdf
Security Guard Service.pdfcabomer365
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfLandmark Security Services
 
Security The Essential Guidance & Classifications
Security The Essential Guidance & ClassificationsSecurity The Essential Guidance & Classifications
Security The Essential Guidance & ClassificationsFinn Hunter
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emeaChris Keane
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfNovoQuad
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfNovoQuad
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the teamtrevorshaff
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 

Similar to Assets protection and The Need for Timely Information (20)

Navigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security OfficerNavigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security Officer
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
It and safety
It and safetyIt and safety
It and safety
 
Security Guard Service.pdf
Security Guard Service.pdfSecurity Guard Service.pdf
Security Guard Service.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
Security The Essential Guidance & Classifications
Security The Essential Guidance & ClassificationsSecurity The Essential Guidance & Classifications
Security The Essential Guidance & Classifications
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Research highlights in safety and security
Research highlights in safety and securityResearch highlights in safety and security
Research highlights in safety and security
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the team
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 

More from David Santiago

AI Tools for Security Marketing
AI Tools for Security MarketingAI Tools for Security Marketing
AI Tools for Security MarketingDavid Santiago
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
EXPATOUS: Hotel security in tunisia
EXPATOUS:  Hotel security in tunisiaEXPATOUS:  Hotel security in tunisia
EXPATOUS: Hotel security in tunisiaDavid Santiago
 
Analysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxAnalysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxDavid Santiago
 
Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015David Santiago
 
Tunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityTunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityDavid Santiago
 
TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)David Santiago
 
OSAC-April 23rd meeting
OSAC-April 23rd meetingOSAC-April 23rd meeting
OSAC-April 23rd meetingDavid Santiago
 
Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015David Santiago
 
Bardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisBardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisDavid Santiago
 
Expat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationExpat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationDavid Santiago
 
Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review David Santiago
 
Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014David Santiago
 

More from David Santiago (14)

AI Tools for Security Marketing
AI Tools for Security MarketingAI Tools for Security Marketing
AI Tools for Security Marketing
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
EXPATOUS: Hotel security in tunisia
EXPATOUS:  Hotel security in tunisiaEXPATOUS:  Hotel security in tunisia
EXPATOUS: Hotel security in tunisia
 
Analysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxAnalysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptx
 
Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015
 
Tunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityTunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen security
 
TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)
 
OSAC-April 23rd meeting
OSAC-April 23rd meetingOSAC-April 23rd meeting
OSAC-April 23rd meeting
 
Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015
 
Bardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisBardo Museum Attack-Analysis
Bardo Museum Attack-Analysis
 
Expat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationExpat Personal Security Workshop Presentation
Expat Personal Security Workshop Presentation
 
Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review
 
Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014
 
Mais presentation
Mais presentation Mais presentation
Mais presentation
 

Recently uploaded

Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 

Recently uploaded (20)

Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 

Assets protection and The Need for Timely Information

  • 1.
  • 2. About the Presenter... For over 15 years David ( @DavidSecurity ) has empowered expats, travelers, and adventuresfrom all walks of life. David's passion for security began when he was posted in Tunis, Tunisia as a United States Marine Security Guard (2001). He went on to serve as the Security Director for the American Cooperative School of Tunis (2007-2016). During this time he begin teaching security awareness to the local expat community and continues providing security leadership through his blog, presentations, and workshops.
  • 3. Module Overview ★ Understanding the Principles of Assets Protection ★ Examples of Asset Protection in: ● Health Care ● Education ● Fast Food Sector ● Telecom sector ● Aero-space sector ★ Mitigating Risk through timely information
  • 4. Physical Asset Protection Protecting the assets of any organization – public, private or not-for-profit – is a critical task for the viability, profitability, reputation, and sustainability of the organization.
  • 5. What does it take? Protecting assets requires a combination of strategic thinking, process management, and the ability to implement programs and initiatives in increasingly shorter periods of time to match the rapid pace of today’s global business environment.
  • 6. The Goal: The goal is the protection of assets by removing or reducing the exposure of assets to threats and hazards by developing appropriate protective measures.
  • 7. ASIS-Physical Asset Protection Provides an approach to identify, apply, and manage physical security measures to safeguard an organization's assets – people, property, information, and intangibles that are based in facilities (not during transit). Stanadrds Matter!
  • 8. Important to NOTE: That Asset Management/ Protection is only one compent of a company’s Enterprise Security Risk Management Framwork:
  • 9. Function of Physical Asset Protection ● Considering Assets ● Understanding the Threat ● Looking at Vulnerabilities ● Analyzing the Risk ● Protective Measures ● Application of Four D’s → (Deter, Detect, Deny, Delay and DEFEND)
  • 10. Examples of Asset Protection in Various Industries…
  • 11. Health Care Depending on the type of care and treatment provided, a hospital’s critical assets invariably include patients, medical professionals, support personnel, medical records, equipment, supplies, and pharmaceuticals.
  • 12. ● Lost and stolen equipment costs the healthcare industry millions each year ● To stem the problem, some hospitals are turning to new technologies that track equipment throughout the hospital and beyond in real time..
  • 13. ● Wireless tracking tools like real-time location systems (RTLS) and radio-frequency identification (RFID) not only help prevent loss and theft but also help inform asset management.
  • 14. Education-Asset Management Challenge: A women-only university wanted to secure its premises for its female students by digitizing people and asset tracking and monitoring across its premises. The client also wanted to control the movement of male personnel within the restricted zones, while also check the entry of public into any unauthorized area.
  • 15. Education-Asset Management Solution: An End-to-end asset tracking and monitoring solution enabled them to track the IT/non-IT assets in the campus and made the university campus more secure for students.
  • 16. Fast Food/ Restruant Sector • Fast-food restaurants usually focus on Risk Assessments and rely heavily on their insurance coverages. • At a minimum they require some sort of general risk coverage. • General risk coverage is important for protecting assets such as the physical building, equipment and different items contained in the common areas of the restaurant.
  • 17. The Challenge: Most organizations struggle to keep an updated accounting of all data, devices, assets and physical locations of equipment. Solution: More and more in the Telecom Sector are using Telecom Expense Management (TEM) solutions designed to TRACK, UPDATE, AUDIT TELECOM ASSETS. Telecom Sector
  • 18. Aero-Space Sector Aircraft hangars house tens of millions of dollars in assets and are host to some of the most complex (and dangerous) mechanical operations in the mechanized world.
  • 19. Aero-Space Sector Aircraft hangars are incorporating access control systems to ensure complete control on who accesses entry into the hanger.
  • 20. Mitigating Risk through timely Information
  • 21. Security Fact #1 In a predicable world Asset Protection is a straightforward process…
  • 22. Security Fact #2 We don’t live in a Predictable World!
  • 23. Need for Tactical Intelligence… In today’s world, political upheaval, social unrest, even a viral video can result in unforeseen security challenges & consequences for organizations regardless of where they operate. .
  • 24. 1st Hand Experience In 2012, following attacks on the nearby US Embassy, protesters attacked our school building. Thankfully, because we had access to Tactical Information we were able to conduct a safe & successful early evacuation of the campus.
  • 25. Mitigating risk through timely information… • Tactical Security Reports enable you to stay a step ahead. • To assess RISK and take the PROACTIVE steps that will keep your business operation GOING.
  • 26. Stay Ready! I hope you learned more about Asset Protection. For more information or a to try a FREE DEMO of our Tactical Security Reports: Email: contact@davidsecurity.net @DavidSecurity