SlideShare a Scribd company logo
About the Presenter...
For over 15 years David ( @DavidSecurity ) has empowered
expats, travelers, and adventuresfrom all walks of life.
David's passion for security began when he was posted in Tunis,
Tunisia as a United States Marine Security Guard (2001).
He went on to serve as the Security Director for the American
Cooperative School of Tunis (2007-2016). During this time he
begin teaching security awareness to the local expat
community and continues providing security leadership
through his blog, presentations, and workshops.
Module Overview
★ Understanding the Principles of Assets Protection
★ Examples of Asset Protection in:
● Health Care
● Education
● Fast Food Sector
● Telecom sector
● Aero-space sector
★ Mitigating Risk through timely information
Physical Asset Protection
Protecting the assets of any organization – public,
private or not-for-profit – is a critical task for the
viability, profitability, reputation, and sustainability
of the organization.
What does it take?
Protecting assets requires a combination of strategic
thinking, process management, and the ability to
implement programs and initiatives in increasingly
shorter periods of time to match the rapid pace of
today’s global business environment.
The Goal:
The goal is the protection of assets by removing
or reducing the exposure of assets to threats and
hazards by developing appropriate protective
measures.
ASIS-Physical Asset Protection
Provides an approach to identify,
apply, and manage physical security
measures to safeguard an
organization's assets – people,
property, information, and intangibles
that are based in facilities (not during
transit).
Stanadrds Matter!
Important to NOTE: That Asset Management/
Protection is only one compent of a company’s
Enterprise Security Risk Management
Framwork:
Function of Physical Asset Protection
● Considering Assets
● Understanding the Threat
● Looking at Vulnerabilities
● Analyzing the Risk
● Protective Measures
● Application of Four D’s → (Deter, Detect, Deny, Delay and DEFEND)
Examples of Asset Protection in
Various Industries…
Health Care
Depending on the type of care and treatment provided, a
hospital’s critical assets invariably include patients, medical
professionals, support personnel, medical records, equipment,
supplies, and pharmaceuticals.
● Lost and stolen equipment costs the healthcare industry
millions each year
● To stem the problem, some hospitals are turning to new
technologies that track equipment throughout the hospital and
beyond in real time..
● Wireless tracking tools like real-time location
systems (RTLS) and radio-frequency identification
(RFID) not only help prevent loss and theft but also
help inform asset management.
Education-Asset Management
Challenge: A women-only university wanted to secure its premises for
its female students by digitizing people and asset tracking and
monitoring across its premises. The client also wanted to control the
movement of male personnel within the restricted zones, while also
check the entry of public into any unauthorized area.
Education-Asset Management
Solution: An End-to-end asset tracking and monitoring solution enabled
them to track the IT/non-IT assets in the campus and made the
university campus more secure for students.
Fast Food/ Restruant Sector
• Fast-food restaurants usually focus on Risk Assessments
and rely heavily on their insurance coverages.
• At a minimum they require some sort of general risk
coverage.
• General risk coverage is important for protecting assets
such as the physical building, equipment and different
items contained in the common areas of the restaurant.
The Challenge: Most organizations struggle to keep an updated accounting of
all data, devices, assets and physical locations of equipment.
Solution: More and more in the Telecom Sector are using Telecom Expense
Management (TEM) solutions designed to TRACK, UPDATE, AUDIT TELECOM
ASSETS.
Telecom Sector
Aero-Space Sector
Aircraft hangars house tens of millions of dollars
in assets and are host to some of the most
complex (and dangerous) mechanical operations
in the mechanized world.
Aero-Space Sector
Aircraft hangars are incorporating access control
systems to ensure complete control on who
accesses entry into the hanger.
Mitigating Risk through timely
Information
Security Fact #1
In a predicable world Asset Protection is
a straightforward process…
Security Fact #2
We don’t live in a Predictable World!
Need for Tactical Intelligence…
In today’s world, political upheaval, social unrest, even a viral
video can result in unforeseen security challenges &
consequences for organizations regardless of where they operate.
.
1st Hand Experience
In 2012, following attacks on the nearby US Embassy, protesters
attacked our school building. Thankfully, because we had access
to Tactical Information we were able to conduct a safe &
successful early evacuation of the campus.
Mitigating risk through timely information…
• Tactical Security Reports enable you to stay a step ahead.
• To assess RISK and take the PROACTIVE steps that will keep
your business operation GOING.
Stay Ready!
I hope you learned more about Asset Protection.
For more information or a to try a FREE DEMO of our
Tactical Security Reports:
Email: contact@davidsecurity.net
@DavidSecurity

More Related Content

What's hot

Lecture1 intro to cs
Lecture1 intro to csLecture1 intro to cs
Lecture1 intro to cs
Doneisha McKenzie
 
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
SITA
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
Robin Patras
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4
Robin Patras
 
Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2
Robin Patras
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
Koen Maris
 
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
SITA
 
An introduction to physical security
An introduction to physical security An introduction to physical security
An introduction to physical security
Robin Patras
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
Andy Kim
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Md Shaifullar Rabbi
 
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto
 
CISO PPT
CISO PPTCISO PPT
CISO PPT
Bhumika Kaushal
 
Tough Target: Awareness for Application Developers
Tough Target: Awareness for Application DevelopersTough Target: Awareness for Application Developers
Tough Target: Awareness for Application Developers
digitallibrary
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguis
samis
 
3 Ira Winkler
3  Ira Winkler3  Ira Winkler
3 Ira Winkler
mloginov
 
EACT STRATEGIC OVERVIEW
EACT STRATEGIC OVERVIEWEACT STRATEGIC OVERVIEW
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
NAFSA Tech MIG
 
IBM X-Force Research
IBM X-Force ResearchIBM X-Force Research
IBM X-Force Research
Susanna Harper
 
Cyber security
Cyber securityCyber security
Duty of care and travel risk management: Occupational Security
Duty of care and travel risk management: Occupational SecurityDuty of care and travel risk management: Occupational Security
Duty of care and travel risk management: Occupational Security
Enterprise Security Risk Management
 

What's hot (20)

Lecture1 intro to cs
Lecture1 intro to csLecture1 intro to cs
Lecture1 intro to cs
 
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
Cybersecurity - Thomas Gourgeon, Head of International Operations, Orange Cyb...
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4
 
Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
 
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
Cybersecurity - Tackling the treat with Dr. Simon Moores, Security Futurist a...
 
An introduction to physical security
An introduction to physical security An introduction to physical security
An introduction to physical security
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...Chapter 3  Orientation with Security Equipment's and Functionality and Fire F...
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
 
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...Thiago Pinto - Forming a Safety Features  Personal Security Briefing Version ...
Thiago Pinto - Forming a Safety Features Personal Security Briefing Version ...
 
CISO PPT
CISO PPTCISO PPT
CISO PPT
 
Tough Target: Awareness for Application Developers
Tough Target: Awareness for Application DevelopersTough Target: Awareness for Application Developers
Tough Target: Awareness for Application Developers
 
Multimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguisMultimedia content security in file based environments - sami guirguis
Multimedia content security in file based environments - sami guirguis
 
3 Ira Winkler
3  Ira Winkler3  Ira Winkler
3 Ira Winkler
 
EACT STRATEGIC OVERVIEW
EACT STRATEGIC OVERVIEWEACT STRATEGIC OVERVIEW
EACT STRATEGIC OVERVIEW
 
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
Using Technology to Enhance Your Health, Safety and Crisis Management Plannin...
 
IBM X-Force Research
IBM X-Force ResearchIBM X-Force Research
IBM X-Force Research
 
Cyber security
Cyber securityCyber security
Cyber security
 
Duty of care and travel risk management: Occupational Security
Duty of care and travel risk management: Occupational SecurityDuty of care and travel risk management: Occupational Security
Duty of care and travel risk management: Occupational Security
 

Similar to Assets protection and The Need for Timely Information

Navigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security OfficerNavigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security Officer
williamshakes1
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
David Shipley
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
greendigital
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
eugeniadean34240
 
It and safety
It and safetyIt and safety
It and safety
Aman Verma
 
Security Guard Service.pdf
Security Guard Service.pdfSecurity Guard Service.pdf
Security Guard Service.pdf
cabomer365
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
Landmark Security Services
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
Landmark Security Services
 
Security The Essential Guidance & Classifications
Security The Essential Guidance & ClassificationsSecurity The Essential Guidance & Classifications
Security The Essential Guidance & Classifications
Finn Hunter
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
Chris Keane
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
Southern Cross Group Services
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
cyberprosocial
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
Matthew Rosenquist
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
NovoQuad
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
NovoQuad
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
 
Research highlights in safety and security
Research highlights in safety and securityResearch highlights in safety and security
Research highlights in safety and security
VTT Technical Research Centre of Finland Ltd
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Trilateral Research
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ Research
GQ Research
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the team
trevorshaff
 

Similar to Assets protection and The Need for Timely Information (20)

Navigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security OfficerNavigating the Evolving Role of the Chief Security Officer
Navigating the Evolving Role of the Chief Security Officer
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
It and safety
It and safetyIt and safety
It and safety
 
Security Guard Service.pdf
Security Guard Service.pdfSecurity Guard Service.pdf
Security Guard Service.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
The Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdfThe Role That Security Guards Serve in the Modern Era.pdf
The Role That Security Guards Serve in the Modern Era.pdf
 
Security The Essential Guidance & Classifications
Security The Essential Guidance & ClassificationsSecurity The Essential Guidance & Classifications
Security The Essential Guidance & Classifications
 
CriticalArc - Business without boundaries emea
CriticalArc   - Business without boundaries emeaCriticalArc   - Business without boundaries emea
CriticalArc - Business without boundaries emea
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Research highlights in safety and security
Research highlights in safety and securityResearch highlights in safety and security
Research highlights in safety and security
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ Research
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the team
 

More from David Santiago

Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
David Santiago
 
EXPATOUS: Hotel security in tunisia
EXPATOUS:  Hotel security in tunisiaEXPATOUS:  Hotel security in tunisia
EXPATOUS: Hotel security in tunisia
David Santiago
 
Analysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxAnalysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptx
David Santiago
 
Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015
David Santiago
 
Tunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityTunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen security
David Santiago
 
TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)
David Santiago
 
OSAC-April 23rd meeting
OSAC-April 23rd meetingOSAC-April 23rd meeting
OSAC-April 23rd meeting
David Santiago
 
Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015
David Santiago
 
Bardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisBardo Museum Attack-Analysis
Bardo Museum Attack-Analysis
David Santiago
 
Expat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationExpat Personal Security Workshop Presentation
Expat Personal Security Workshop Presentation
David Santiago
 
Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review
David Santiago
 
Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014
David Santiago
 
Mais presentation
Mais presentation Mais presentation
Mais presentation
David Santiago
 

More from David Santiago (13)

Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
EXPATOUS: Hotel security in tunisia
EXPATOUS:  Hotel security in tunisiaEXPATOUS:  Hotel security in tunisia
EXPATOUS: Hotel security in tunisia
 
Analysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptxAnalysis of Fitch's Report on Tunisia.pptx
Analysis of Fitch's Report on Tunisia.pptx
 
Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015Tunisia Crime & Safety 2015
Tunisia Crime & Safety 2015
 
Tunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen securityTunisia 7-actions taken to strengthen security
Tunisia 7-actions taken to strengthen security
 
TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)TSU-After Sousse (Security Brief)
TSU-After Sousse (Security Brief)
 
OSAC-April 23rd meeting
OSAC-April 23rd meetingOSAC-April 23rd meeting
OSAC-April 23rd meeting
 
Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015Traveling to Tunisia-Spring 2015
Traveling to Tunisia-Spring 2015
 
Bardo Museum Attack-Analysis
Bardo Museum Attack-AnalysisBardo Museum Attack-Analysis
Bardo Museum Attack-Analysis
 
Expat Personal Security Workshop Presentation
Expat Personal Security Workshop PresentationExpat Personal Security Workshop Presentation
Expat Personal Security Workshop Presentation
 
Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review Tunisia 2014 Crime & Safety Review
Tunisia 2014 Crime & Safety Review
 
Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014Tunisia Security Brief-Feb 2014
Tunisia Security Brief-Feb 2014
 
Mais presentation
Mais presentation Mais presentation
Mais presentation
 

Recently uploaded

Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 

Recently uploaded (20)

Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 

Assets protection and The Need for Timely Information

  • 1.
  • 2. About the Presenter... For over 15 years David ( @DavidSecurity ) has empowered expats, travelers, and adventuresfrom all walks of life. David's passion for security began when he was posted in Tunis, Tunisia as a United States Marine Security Guard (2001). He went on to serve as the Security Director for the American Cooperative School of Tunis (2007-2016). During this time he begin teaching security awareness to the local expat community and continues providing security leadership through his blog, presentations, and workshops.
  • 3. Module Overview ★ Understanding the Principles of Assets Protection ★ Examples of Asset Protection in: ● Health Care ● Education ● Fast Food Sector ● Telecom sector ● Aero-space sector ★ Mitigating Risk through timely information
  • 4. Physical Asset Protection Protecting the assets of any organization – public, private or not-for-profit – is a critical task for the viability, profitability, reputation, and sustainability of the organization.
  • 5. What does it take? Protecting assets requires a combination of strategic thinking, process management, and the ability to implement programs and initiatives in increasingly shorter periods of time to match the rapid pace of today’s global business environment.
  • 6. The Goal: The goal is the protection of assets by removing or reducing the exposure of assets to threats and hazards by developing appropriate protective measures.
  • 7. ASIS-Physical Asset Protection Provides an approach to identify, apply, and manage physical security measures to safeguard an organization's assets – people, property, information, and intangibles that are based in facilities (not during transit). Stanadrds Matter!
  • 8. Important to NOTE: That Asset Management/ Protection is only one compent of a company’s Enterprise Security Risk Management Framwork:
  • 9. Function of Physical Asset Protection ● Considering Assets ● Understanding the Threat ● Looking at Vulnerabilities ● Analyzing the Risk ● Protective Measures ● Application of Four D’s → (Deter, Detect, Deny, Delay and DEFEND)
  • 10. Examples of Asset Protection in Various Industries…
  • 11. Health Care Depending on the type of care and treatment provided, a hospital’s critical assets invariably include patients, medical professionals, support personnel, medical records, equipment, supplies, and pharmaceuticals.
  • 12. ● Lost and stolen equipment costs the healthcare industry millions each year ● To stem the problem, some hospitals are turning to new technologies that track equipment throughout the hospital and beyond in real time..
  • 13. ● Wireless tracking tools like real-time location systems (RTLS) and radio-frequency identification (RFID) not only help prevent loss and theft but also help inform asset management.
  • 14. Education-Asset Management Challenge: A women-only university wanted to secure its premises for its female students by digitizing people and asset tracking and monitoring across its premises. The client also wanted to control the movement of male personnel within the restricted zones, while also check the entry of public into any unauthorized area.
  • 15. Education-Asset Management Solution: An End-to-end asset tracking and monitoring solution enabled them to track the IT/non-IT assets in the campus and made the university campus more secure for students.
  • 16. Fast Food/ Restruant Sector • Fast-food restaurants usually focus on Risk Assessments and rely heavily on their insurance coverages. • At a minimum they require some sort of general risk coverage. • General risk coverage is important for protecting assets such as the physical building, equipment and different items contained in the common areas of the restaurant.
  • 17. The Challenge: Most organizations struggle to keep an updated accounting of all data, devices, assets and physical locations of equipment. Solution: More and more in the Telecom Sector are using Telecom Expense Management (TEM) solutions designed to TRACK, UPDATE, AUDIT TELECOM ASSETS. Telecom Sector
  • 18. Aero-Space Sector Aircraft hangars house tens of millions of dollars in assets and are host to some of the most complex (and dangerous) mechanical operations in the mechanized world.
  • 19. Aero-Space Sector Aircraft hangars are incorporating access control systems to ensure complete control on who accesses entry into the hanger.
  • 20. Mitigating Risk through timely Information
  • 21. Security Fact #1 In a predicable world Asset Protection is a straightforward process…
  • 22. Security Fact #2 We don’t live in a Predictable World!
  • 23. Need for Tactical Intelligence… In today’s world, political upheaval, social unrest, even a viral video can result in unforeseen security challenges & consequences for organizations regardless of where they operate. .
  • 24. 1st Hand Experience In 2012, following attacks on the nearby US Embassy, protesters attacked our school building. Thankfully, because we had access to Tactical Information we were able to conduct a safe & successful early evacuation of the campus.
  • 25. Mitigating risk through timely information… • Tactical Security Reports enable you to stay a step ahead. • To assess RISK and take the PROACTIVE steps that will keep your business operation GOING.
  • 26. Stay Ready! I hope you learned more about Asset Protection. For more information or a to try a FREE DEMO of our Tactical Security Reports: Email: contact@davidsecurity.net @DavidSecurity