Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Snapshot of services provided

186 views

Published on

A few slides from the various decks used for security best practice

  • Be the first to comment

  • Be the first to like this

Snapshot of services provided

  1. 1. Our approach to personal protection is grounded in the belief that the best protective assistance is an effective blend of facilitation and security.Good protection makes life easier for the executive. Travel runs more smoothly, unwanted interruptions are reduced at work and at home, and security worries and transportation hassles are reduced or eliminated.Our services that range from threat assessments to complete executive protection details. Paul Armstrong CEODDO Consulting<br />Executive Protection <br />Our approach to personal protection is grounded in the belief that the best protective assistance is an effective blend of facilitation and security.<br />Good protection makes life easier for the executive. Travel runs more smoothly, unwanted interruptions are reduced at work and at home, and security worries and transportation hassles are reduced or eliminated. Our services range from threat assessments to complete executive protection details. <br />Paul Armstrong CEO<br />DDO Consulting<br />
  2. 2. A System of Security<br /> Transportation<br />Home <br /> &<br />Office<br />Hoe <br /> &<br />Office<br />Home<br />&<br />Office<br />Domestic <br />Travel<br />Security <br />Posture<br />Home <br /> &<br />Office<br />International <br />Travel<br />Technology<br />Intelligence<br />
  3. 3. Working the Principal<br />Working the Principal<br />Overall Mission<br />Prevent injury, embarrassment, kidnapping, assignation and safe guard the principals schedule<br />Brief the principal<br />Make sure the principal knows how the protective detail works<br />The primary function of the detail is security and is not a matter or convenience to the principal <br />He/She will follow all orders given by Shift leader in the event of an emergency<br />
  4. 4. Formations<br />5 Man Diamond Formation<br />1<br />1<br />2<br />P<br />3<br />SL<br />2<br />3<br />SL<br />P<br />4<br />
  5. 5.
  6. 6. IDS BENEFITS <br />Reduction in <br />‘Total Cost Of Risk’<br />
  7. 7. The various classifications of sensor technology<br />
  8. 8. Performance Measurement of an IDS <br />
  9. 9. Your Security Vulnerability<br />Risks/Threats<br />Assets<br />Probability<br />Criticality<br />Threat Analysis<br />Countermeasures<br />Cost Benefit Analysis<br />Measurement<br />
  10. 10. Threat Analysis<br />Threat Model:<br />Theft of finished goods<br />Manufacturing<br />Floor<br />Quality Control<br />Room<br />Warehouse<br />and Dock<br />OR<br />OR<br />AND<br />Gain<br />Access<br />During<br />Production<br />Network Design: Threats and vulnerabilities are analyzed to find common inter-relationships, therefore addressing multiple risks with single countermeasures.<br />Countermeasures should be developed at junction points or leverage points in the threat model.<br />AND<br />Enter<br />Area<br />Remain<br />Unobserved<br />
  11. 11. The Selection/Negotiation Model<br />In the RFP process, there are two interrelated events: <br />Vendor Selection and Negotiation<br />
  12. 12. Measuring the Value of the Performance<br />The value of the business relationship.<br />

×