SlideShare a Scribd company logo
My Background
26 years in the security, safety and risk
field across the entire gamut of the
industry.
Certified Protection Professional (CPP).
Former Chairman ASIS NSW Chapter.
Former Member NSW Police SLED
Advisory Council.
My Background
Provided over 100 expert reports in
various cases for courts & tribunals.
Lectured and consulted in USA and the
Middle East on Security & Risk.
Hospitality, Entertainment and Tourism
Security Council & Supply Chain Risk
Management Security Council.
#Tip 1- Do Industry Assessment
Conduct overall industry assessment for
identification of trends & opportunities.
Assess through networking, industry
associations, publications & research.
Place focus on your areas of interest,
not just areas of current skills.
Make a Venn Diagram.
Don’t rush the journey.
#Tip 2- Expand your network
Extremely important to establish a good
community of people inside and outside
your company.
Professional associations – like minded
people passionate about industry.
Social Media – Linkedin.
Comment and contribute. Share
knowledge – question & validate.
Broadens your service offerings.
#Tip 3- Being Professional
BE ORGANISED & ACCOUNTABLE!
As a Security Professional you need to
have demonstrable knowledge and
experience in your field of expertise.
 You need to ensure you are groomed
and attired in a way that is reflective of
being in this Position of Trust.
Understand the “Moment of Truth”
Principle. Consistency!
Lawyer’s and Doctor’s have “Client’s not
Customers” – So do Security
Professionals.
#Tip 4- Personal Gap Analysis
Map out ideal “A.S.K” Elements for your
goal position or area of speciality and
prioritise the list.
Attitude, Skills & Knowledge.
Include physical and mental wellbeing.
In each area, perform some critical self
analysis to identify any potential
knowledge or skills gaps.
Industry Certifications, Qualifications,
Webinars and Accreditations.
#Tip 5- Client & Peer Feedback
Liaise with Industry peers on their
development journeys. We all have a
certain amount of “Mental Currency”.
Client feedback and office 360 degree
feedback to identify “development
opportunities”
Benchmark against Best Practise. Where
do you go to find standards?
#Tip 6- Find/Be a Mentor
Great way to give back to industry.
Increase self worth.
Improves interpersonal and coaching
skills.
Helps expand your network.
Rewarding/Re-energising.
Keeps you researching/validating.
#Tip 7- Positioning Yourself
Share industry updates and news.
Share security, safety and risk tips.
Publish white papers & articles.
Perform activities that reinforces to your
client base that you are their “Security
Expert”.
Keep learning to keep sharing.
#Tip 8- Sell to their needs &
not your interests
We get caught up in new trends and
initiatives.
Identify true client needs.
Classic example is technology vs training
& people.
When consulting, be aware of their
mission and values – alignment.
Validate as you progress to ensure on
the same path.
#Tip 9- Longer term vision
”You can shear a sheep many times but
can only barbecue it once”.
Client budget and lifecycle.
Lighting, CCTV & access control –
controlled spending roadmap.
Today’s solutions cant remove/reduce
tomorrows options.
#Tip 10- Immerse in their world
Understand a clients business through
their eyes then let them see through
yours.
Part of the service is to educate as to
why they need your services.
“you don’t know what you don’t know”
Any recommendations/solutions need to
be underpinned by operational
effectiveness and value alignment.
Summary
Keep top of mind that the Security
Industry is a key position of trust and
act accordingly.
Continue to self analyse and update
your self development plan.
Take ownership of your journey.
Track and monitor the industry trends.
ISO/IEC 27001
Training Courses
• ISO/IEC 27001 Introduction
1 Day Course
• ISO/IEC 27001 Foundation
2 Days Course
• ISO/IEC 27001 Lead Implementer
5 Days Course
• ISO/IEC 27001 Lead Auditor
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/en/education-and-certification-for-individuals/iso-
iec-27001
www.pecb.com/events
THANK YOU
?
scott.t@riskprotectiongroup.com.au
www.scgroup.global
https://www.linkedin.com/in/scotttaylorcpp/

More Related Content

Similar to 10 Tips on How to Become a Successful Security Professional in 2019

Online customer acquisition 2014, via web marketing
Online customer acquisition 2014, via web marketingOnline customer acquisition 2014, via web marketing
Online customer acquisition 2014, via web marketing
Chris Leonard
 
Update on Marketing, Branding & PR
Update on Marketing, Branding & PR  Update on Marketing, Branding & PR
Update on Marketing, Branding & PR
Jackie Bayer Shervington
 
Working smarter, not harder for interlex on linked in
Working smarter, not harder for interlex on linked inWorking smarter, not harder for interlex on linked in
Working smarter, not harder for interlex on linked inInterlexGroup
 
Field to Fork - Marketing Your Efforts
Field to Fork - Marketing Your EffortsField to Fork - Marketing Your Efforts
Field to Fork - Marketing Your Efforts
Glenn Muske
 
AuraTalk Issue 3
AuraTalk Issue 3AuraTalk Issue 3
Content Marketing: Best practices for creating meaningful content
Content Marketing: Best practices for creating meaningful contentContent Marketing: Best practices for creating meaningful content
Content Marketing: Best practices for creating meaningful content
GoodmanMarketingPartners
 
How to become an entrepreneur.pdf
How to become an entrepreneur.pdfHow to become an entrepreneur.pdf
How to become an entrepreneur.pdf
SmartSkill97
 
Secrets of powerful B2B communications| Ed Field - Maverick Marketing
Secrets of powerful B2B communications| Ed Field - Maverick MarketingSecrets of powerful B2B communications| Ed Field - Maverick Marketing
Secrets of powerful B2B communications| Ed Field - Maverick Marketing
Enterprise Ireland
 
Social Media And Networking 2009
Social Media And Networking 2009Social Media And Networking 2009
Social Media And Networking 2009rebeccamartin
 
Building A Solid Social Media Strategy
Building A Solid Social Media StrategyBuilding A Solid Social Media Strategy
Building A Solid Social Media Strategy
VOCO Creative
 
Effective Presentation Skills
Effective Presentation SkillsEffective Presentation Skills
Effective Presentation Skills
ltux-jhb
 
11 rules of engagement for B2B Social Media Adoption (Supporting Notes)
11 rules of engagement for B2B Social Media Adoption (Supporting Notes)11 rules of engagement for B2B Social Media Adoption (Supporting Notes)
11 rules of engagement for B2B Social Media Adoption (Supporting Notes)Si Cox
 
Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...
Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...
Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...
Salma Karina Hayat
 
10 Tips For Effective Lead Generation The Partner Marketing Group
10 Tips For Effective Lead Generation   The Partner Marketing Group10 Tips For Effective Lead Generation   The Partner Marketing Group
10 Tips For Effective Lead Generation The Partner Marketing Group
cstrege
 
30 Entrepreneurs Share How They are Being Disruptive
30 Entrepreneurs Share How They are Being Disruptive30 Entrepreneurs Share How They are Being Disruptive
30 Entrepreneurs Share How They are Being Disruptive
CEO Blog Nation
 
LinkedIn Profile & Social Best Practices
LinkedIn Profile & Social Best PracticesLinkedIn Profile & Social Best Practices
LinkedIn Profile & Social Best PracticesCraig Canton
 
Linkedinfool proofguidetosocialselling-final-soharddbwarez
Linkedinfool proofguidetosocialselling-final-soharddbwarezLinkedinfool proofguidetosocialselling-final-soharddbwarez
Linkedinfool proofguidetosocialselling-final-soharddbwarez
SoHarD_dB_wAREz
 
Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...
Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...
Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...
AnnArborSPARK
 

Similar to 10 Tips on How to Become a Successful Security Professional in 2019 (20)

Online customer acquisition 2014, via web marketing
Online customer acquisition 2014, via web marketingOnline customer acquisition 2014, via web marketing
Online customer acquisition 2014, via web marketing
 
Update on Marketing, Branding & PR
Update on Marketing, Branding & PR  Update on Marketing, Branding & PR
Update on Marketing, Branding & PR
 
Working smarter, not harder for interlex on linked in
Working smarter, not harder for interlex on linked inWorking smarter, not harder for interlex on linked in
Working smarter, not harder for interlex on linked in
 
Field to Fork - Marketing Your Efforts
Field to Fork - Marketing Your EffortsField to Fork - Marketing Your Efforts
Field to Fork - Marketing Your Efforts
 
AuraTalk Issue 3
AuraTalk Issue 3AuraTalk Issue 3
AuraTalk Issue 3
 
Content Marketing: Best practices for creating meaningful content
Content Marketing: Best practices for creating meaningful contentContent Marketing: Best practices for creating meaningful content
Content Marketing: Best practices for creating meaningful content
 
How to become an entrepreneur.pdf
How to become an entrepreneur.pdfHow to become an entrepreneur.pdf
How to become an entrepreneur.pdf
 
5 - Marketing Magic
5 - Marketing Magic5 - Marketing Magic
5 - Marketing Magic
 
Secrets of powerful B2B communications| Ed Field - Maverick Marketing
Secrets of powerful B2B communications| Ed Field - Maverick MarketingSecrets of powerful B2B communications| Ed Field - Maverick Marketing
Secrets of powerful B2B communications| Ed Field - Maverick Marketing
 
Social Media And Networking 2009
Social Media And Networking 2009Social Media And Networking 2009
Social Media And Networking 2009
 
Building A Solid Social Media Strategy
Building A Solid Social Media StrategyBuilding A Solid Social Media Strategy
Building A Solid Social Media Strategy
 
Effective Presentation Skills
Effective Presentation SkillsEffective Presentation Skills
Effective Presentation Skills
 
11 rules of engagement for B2B Social Media Adoption (Supporting Notes)
11 rules of engagement for B2B Social Media Adoption (Supporting Notes)11 rules of engagement for B2B Social Media Adoption (Supporting Notes)
11 rules of engagement for B2B Social Media Adoption (Supporting Notes)
 
Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...
Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...
Salma Karina Hayat - The Ultimate Guide to Becoming a Successful Business Adv...
 
Marketing on a Shoestring Budget - October 2013
Marketing on a Shoestring Budget - October 2013Marketing on a Shoestring Budget - October 2013
Marketing on a Shoestring Budget - October 2013
 
10 Tips For Effective Lead Generation The Partner Marketing Group
10 Tips For Effective Lead Generation   The Partner Marketing Group10 Tips For Effective Lead Generation   The Partner Marketing Group
10 Tips For Effective Lead Generation The Partner Marketing Group
 
30 Entrepreneurs Share How They are Being Disruptive
30 Entrepreneurs Share How They are Being Disruptive30 Entrepreneurs Share How They are Being Disruptive
30 Entrepreneurs Share How They are Being Disruptive
 
LinkedIn Profile & Social Best Practices
LinkedIn Profile & Social Best PracticesLinkedIn Profile & Social Best Practices
LinkedIn Profile & Social Best Practices
 
Linkedinfool proofguidetosocialselling-final-soharddbwarez
Linkedinfool proofguidetosocialselling-final-soharddbwarezLinkedinfool proofguidetosocialselling-final-soharddbwarez
Linkedinfool proofguidetosocialselling-final-soharddbwarez
 
Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...
Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...
Michigan Marketing Minds - September 9, 2014 - Expressing Thought Leadership:...
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

10 Tips on How to Become a Successful Security Professional in 2019

  • 1.
  • 2. My Background 26 years in the security, safety and risk field across the entire gamut of the industry. Certified Protection Professional (CPP). Former Chairman ASIS NSW Chapter. Former Member NSW Police SLED Advisory Council.
  • 3. My Background Provided over 100 expert reports in various cases for courts & tribunals. Lectured and consulted in USA and the Middle East on Security & Risk. Hospitality, Entertainment and Tourism Security Council & Supply Chain Risk Management Security Council.
  • 4. #Tip 1- Do Industry Assessment Conduct overall industry assessment for identification of trends & opportunities. Assess through networking, industry associations, publications & research. Place focus on your areas of interest, not just areas of current skills. Make a Venn Diagram. Don’t rush the journey.
  • 5. #Tip 2- Expand your network Extremely important to establish a good community of people inside and outside your company. Professional associations – like minded people passionate about industry. Social Media – Linkedin. Comment and contribute. Share knowledge – question & validate. Broadens your service offerings.
  • 6. #Tip 3- Being Professional BE ORGANISED & ACCOUNTABLE! As a Security Professional you need to have demonstrable knowledge and experience in your field of expertise.  You need to ensure you are groomed and attired in a way that is reflective of being in this Position of Trust. Understand the “Moment of Truth” Principle. Consistency! Lawyer’s and Doctor’s have “Client’s not Customers” – So do Security Professionals.
  • 7. #Tip 4- Personal Gap Analysis Map out ideal “A.S.K” Elements for your goal position or area of speciality and prioritise the list. Attitude, Skills & Knowledge. Include physical and mental wellbeing. In each area, perform some critical self analysis to identify any potential knowledge or skills gaps. Industry Certifications, Qualifications, Webinars and Accreditations.
  • 8. #Tip 5- Client & Peer Feedback Liaise with Industry peers on their development journeys. We all have a certain amount of “Mental Currency”. Client feedback and office 360 degree feedback to identify “development opportunities” Benchmark against Best Practise. Where do you go to find standards?
  • 9. #Tip 6- Find/Be a Mentor Great way to give back to industry. Increase self worth. Improves interpersonal and coaching skills. Helps expand your network. Rewarding/Re-energising. Keeps you researching/validating.
  • 10. #Tip 7- Positioning Yourself Share industry updates and news. Share security, safety and risk tips. Publish white papers & articles. Perform activities that reinforces to your client base that you are their “Security Expert”. Keep learning to keep sharing.
  • 11. #Tip 8- Sell to their needs & not your interests We get caught up in new trends and initiatives. Identify true client needs. Classic example is technology vs training & people. When consulting, be aware of their mission and values – alignment. Validate as you progress to ensure on the same path.
  • 12. #Tip 9- Longer term vision ”You can shear a sheep many times but can only barbecue it once”. Client budget and lifecycle. Lighting, CCTV & access control – controlled spending roadmap. Today’s solutions cant remove/reduce tomorrows options.
  • 13. #Tip 10- Immerse in their world Understand a clients business through their eyes then let them see through yours. Part of the service is to educate as to why they need your services. “you don’t know what you don’t know” Any recommendations/solutions need to be underpinned by operational effectiveness and value alignment.
  • 14. Summary Keep top of mind that the Security Industry is a key position of trust and act accordingly. Continue to self analyse and update your self development plan. Take ownership of your journey. Track and monitor the industry trends.
  • 15. ISO/IEC 27001 Training Courses • ISO/IEC 27001 Introduction 1 Day Course • ISO/IEC 27001 Foundation 2 Days Course • ISO/IEC 27001 Lead Implementer 5 Days Course • ISO/IEC 27001 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/en/education-and-certification-for-individuals/iso- iec-27001 www.pecb.com/events