Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Presentation

215 views

Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Presentation

  1. 1. Introduction Abdullah Belal has around10 years of experience in security management. He has been managing many projects such as Alghad daily newspaper, ATV. He started his career in working as a Security consultant; providing security solutions to other organizations such as Capital Bank. He holds a College diploma / Accounting from A.C.C, and BA in Security Management from BIU. He is a member of ASIS ( American Society for Industrial Security)/ 2005. He delegated Middle East security conference 2006 / Bahrain. He delegated Asia-Pacific Security Conference 2008 / Singapore
  2. 2. Why do we need security <ul><li>The events of September 11 th 2001, have changed the face of security operations worldwide, security has become a common theme that is considered by almost every organization. </li></ul><ul><li>The Security function is to protect your organization’s assets ( buildings, devices, employees and clients). </li></ul><ul><li>The Security function is to allow your employees to work in a safe and secure environment. </li></ul>
  3. 3. What do we do? <ul><li>Physical Protection System (PPS): A Physical protection System integrates equipment, people, and procedures. </li></ul><ul><li>S. Equipment S. Team Procedures </li></ul>
  4. 4. Equipment <ul><li>Security Design </li></ul><ul><li>1- start with determining objectives. </li></ul><ul><li>2- Designing a system to meet the objectives. </li></ul><ul><li>3- Evaluation of how the system performs compared to the objectives. </li></ul><ul><li>After the security design is finished we will consider the following: </li></ul><ul><li>Security Tools Specifications. </li></ul><ul><li>Security tools Locations. </li></ul><ul><li>Security Tools Quantity. </li></ul><ul><li>- Recommendation. </li></ul>
  5. 5. Security Team <ul><li>We should keep in mind that the security is more than equipment, the men and women who are responsible for it are infinitely more so we do the following: </li></ul><ul><li>1- facilitate the organization to create security department. </li></ul><ul><li>2- facilitate the organization to Choose the security team. </li></ul><ul><li>3- Train the security officers. </li></ul>
  6. 6. Security Training <ul><li>CCTV. </li></ul><ul><li>Radio Procedures. </li></ul><ul><li>Telephone Procedures. </li></ul><ul><li>Keys Management. </li></ul><ul><li>Patrol Instruction. </li></ul><ul><li>Bomb Threat Procedures. </li></ul><ul><li>Reporting System. </li></ul><ul><li>Access control System. </li></ul><ul><li>Vehicle Inspection. </li></ul><ul><li>Package passes. </li></ul><ul><li>Terrorism Contingency Plan. </li></ul>
  7. 7. Safety Training <ul><li>Alarm System. </li></ul><ul><li>Evacuation Drill. </li></ul><ul><li>Emergency Response Team. </li></ul><ul><li>Incident Investigation. </li></ul><ul><li>First Aid Training and CPR (in cooperation with Civil Defense). </li></ul><ul><li>Fire Fighting (in cooperation with Civil Defense). </li></ul><ul><li>Safety Responsibility. </li></ul>
  8. 8. Procedures <ul><li>The detailed steps management requires its employees to follow to achieve desired results. </li></ul><ul><li>( How management wants it done). </li></ul><ul><li>- For the security officers it means what to do if that happens… </li></ul>
  9. 9. Other Services <ul><li>Security risk analysis. </li></ul><ul><li>Security survey. </li></ul><ul><li>Crises and disaster management. </li></ul>

×