SlideShare a Scribd company logo
Crime Prevention & Security Management
Advanced Security Management
Presented By Tony Ridley
M001- What is most
important in
corporate/commercial
security management?
What are your roles and
responsibilities within a
commercial and
corporate setting?
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is M002 - Tools
and systems for effective security
managers
• Next on the program is M002 -
Tools and systems for effective
security managers
Advanced Security Management
Presented By Tony Ridley
M002 - Tools and systems
for effective security
managers
Advanced and
enhanced management
tools and resources for
the conduct your role
2-Step Verification settings page
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is M003 -
Security Best Known Practices
and Methods
• Next on the program is CRM001
Crime: Major types and
composition
Advanced Security Management
Presented By Tony Ridley
CRM001 - Crime: Major
types and composition
Baseline examples and
foundation planning for
preventing crimes
Advanced Security Management
Presented By Tony Ridley
Exploitive
Crimes
Predatory crimes in which offenders injure or kill a
person and/or seize or damage another's property
Such as:
• murder,
• rape,
• robbery,
• aggravated assault,
• burglary,
• theft,
• arson
Advanced Security Management
Presented By Tony Ridley
Mutualistic Crimes
Two people or groups engaged in complementary crimes such as
Such as:
Advanced Security Management
Presented By Tony Ridley
• Organized crime,
• drug transactions,
• prostitution,
• gambling
Competitive
Crimes
Include those in which two people or groups act in
the same capacity and usually involve physical
conflicts against each other
Such as:
Advanced Security Management
Presented By Tony Ridley
• gang crimes,
• corporate espionage
Individualistic Crimes
Illegal acts committed by an individual
Such as:
Advanced Security Management
Presented By Tony Ridley
• suicide,
• drug use
Next
• Next related topic is CRM002 -
Opportunity and Crime: Principles
• Next on the program is coffee
break then SB01 - Suspicious
Behavioural Assessment –
Profiling
Advanced Security Management
Presented By Tony Ridley
CRM002 &
CRM003 -
Opportunity
and Crime:
Principles
• Most crime requires specific opportunity and key factors in
order to exist or pursue
• Opportunities play a role in causing all crime
• Crime opportunities are highly specific
• Crime opportunities are concentrated in time and space
• Crime opportunities depend on everyday movements
• One crime produces opportunities for another
• Some products offer more tempting crime opportunities
• Social and technological changes produce new crime
opportunities
• Opportunities for crime can be reduced
• Reducing opportunities does not usually displace crime
• Focused opportunity reduction can produce wider declines
in crime
Advanced Security Management
Presented By Tony Ridley
M001- What is most
important in
corporate/commercial
security management?
What are your roles and
responsibilities within a
commercial and
corporate setting?
Advanced Security Management
Presented By Tony Ridley
Routine Choice
Theory
• Offenders will select targets and define means to
achieve their goals in a manner that can be
explained
• Adversaries act rationally when planning a crime by
weighing the risks, rewards, and effort needed to
commit their crimes
Advanced Security Management
Presented By Tony Ridley
Security decision
making:
• Select crime countermeasures for the facility
which cause offenders to decide that risks
are too high and the rewards too low for
them to commit the crime at the facility
Advanced Security Management
Presented By Tony Ridley
Routine Activity
Theory
• criminals, like everyone else, move among routine, daily
activities that may include home, school, work, shopping,
and recreation. During these routine activities, a crime
may occur if certain components come together at one
point in time. These components are a motivated
offender, a target, and a place without an effective
guardian
• The offender must be motivated and will likely have
performed the hedonistic calculus of weighing the risks
and rewards. There must be a suitable target that
provides the reward, and there must be a lack of guarded
space that pose little or no risk to the adversary.
Advanced Security Management
Presented By Tony Ridley
Security decision
making:
To ensure that the place [facility] has an
effective guardian
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is CRM004 -
Crime Displacement
• Next on the program is coffee
break then CPTED01 - Crime
Prevention Through
Environmental Design (CPTED)
Advanced Security Management
Presented By Tony Ridley
CPTED03 -
CPTED: Primary
Elements
Essential factors
required in the
development,
application and
management of a
CPTED strategy
Advanced Security Management
Presented By Tony Ridley
Increasing perceived
effort
• Target hardening
• Access control
• Deflecting offenders
• Controlling facilities
Advanced Security Management
Presented By Tony Ridley
Increasing
perceived risk
• Entry and exit screening
• Formal surveillance
• Surveillance by employees
• Natural surveillance
Advanced Security Management
Presented By Tony Ridley
Reducing
anticipated
rewards
• Target removal
• Identify property
• Reducing temptation
• Denying benefits
Advanced Security Management
Presented By Tony Ridley
removing
excuses
• Rule setting
• Stimulating conscience
• Controlling disinhibitiors
• Facilitating compliance
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is SRA01 - Security Audits
& Assessments
• Next on the program is PRAC01 - Applications
of the fundamentals of crime prevention
Advanced Security Management
Presented By Tony Ridley
PRAC01-PRAC02 -
Applications of the
fundamentals of
crime prevention
Practically apply
education, tactics
and techniques
covered in the
first day of this
course
Advanced Security Management
Presented By Tony Ridley
Practical
Application
• Break into groups of 3-5
• Using this facility/location, identify the following:
• Likely types of crimes
• Suspicious behaviour to monitor
• Identify opportunities for crime
• How you might apply CPTED
• What primary elements have you applied?
• What is MOST important?
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is SRA01 -
Security Audits & Assessments
• Next on the program is SLQA01 -
Student Lead Question and
Answer
Advanced Security Management
Presented By Tony Ridley
RM001 - Risk Mitigation
Options
Examine choices
available when it comes
to risk mitigation
Advanced Security Management
Presented By Tony Ridley
Choices
• Risk assumption/acceptance
• Risk Avoidance
• Risk limitation
• Risk Planning
• Research and Acknowledgement
• Risk Transference
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is M003 -
Security Best Known Practices and
Methods
• Next on the program is CRM004 -
Crime Displacement
Advanced Security Management
Presented By Tony Ridley
CRM004 -
Crime
Displacement
• Explore options for the displacement of crime and
the benefits/disadvantages associated with
plausible options
• Occurs when security measures are effective in
preventing crime where the security measures are
in place and forces the criminal to go elsewhere
with less security to commit their crimes
Advanced Security Management
Presented By Tony Ridley
Temporal
• Entails a shift in the timing of a crime to different
hours of the day or days of the week when
apprehension is less risky.
• One of the key reasons that random security
patrols are more effective than scheduled patrols.
• The randomness keeps adversary elements on their
toes by not providing them with a set time to
commit a crime
Advanced Security Management
Presented By Tony Ridley
Target
• Displacement occurs when a criminal, given two
equally valuable targets, will select the less risky
one. Females are typically perceived as weaker or
more vulnerable than males in the criminal mind,
and thus the criminal will likely select the female to
victimise.
Advanced Security Management
Presented By Tony Ridley
Spatial
• Similar to large crime displacement with the
exception that the displacement is caused not by
the actual target but by the facility/location itself.
• A crime that may have occurred at the more secure
location is displaced elsewhere, even nearby.
Advanced Security Management
Presented By Tony Ridley
Tactical
• Involves the adversary changing his tactics to
commit the crime owing to the security measures
that are in place.
• For example, a perpetrator who finds that windows
have been secured after previous attacks at a
particular facility may shift tactics and find another
entry point into the facility.
Advanced Security Management
Presented By Tony Ridley
Perpetrator
• Specific offenders are deterred or apprehended
and other offenders take their place.
• An example of this type of crime displacement is
law enforcement’s capture of a drug dealer who
works a certain corner in a neighborhood and
whose place is taken by another dealer
Advanced Security Management
Presented By Tony Ridley
Offender
• Is rare but involves an offender who changes the
type of crime he commits because of increased
security designed to prevent the previous crime
type.
• For example, a facility that has fortified itself
against burglary may experience an increase in
aggravated robbery against particular assets.
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is SRA04 - Asset
classification
• Next on the program is lunch then
SRA04 - Asset classification
SRA04 - Asset
classification
Understand the
various assets
and that which is
of value to an
organisation
Advanced Security Management
Presented By Tony Ridley
Categories
• People
• Activities / Processes
• Information
• Facilities
• Equipment
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is SRA05 -
Adversary analysis
• Next on the program is SRA05 -
Adversary analysis
SRA05 -
Adversary
analysis
• Qualify those individuals and groups that present a
threat and how to rank them according to threat
• Any individual, group, organisation, or government
that conducts activities, or has the intention and
capability to conduct activities detrimental to the
entity or its assets
Advanced Security Management
Presented By Tony Ridley
Intent
• wants
• needs
• indicators
• interest
Advanced Security Management
Presented By Tony Ridley
Capability
• human intelligence
• signals intelligence
• trash intelligence
• image intelligence
• data intelligence
• manpower
• influence
Advanced Security Management
Presented By Tony Ridley
History
• suspected
• attempted
• successful
Advanced Security Management
Presented By Tony Ridley
Next
• Next related topic is TER01 -
Terrorism
• Next on the program is coffee then
TER01 - Terrorism

More Related Content

Similar to Crime Prevention Through Environmental Design - Advanced Security Management

Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Core Security
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBAlan Greggo
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
MarcoTechnologies
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
Kevin Duffey
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of InstructionCaleb Lin, MBA
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
Resilient Systems
 
Top-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfTop-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdf
private security
 
Lecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptxLecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptx
moushalivindi
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
Chinatu Uzuegbu
 
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyySeccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
chaudhryzunair4
 
Undertake the Risk Analysis Policy
Undertake the Risk Analysis PolicyUndertake the Risk Analysis Policy
Undertake the Risk Analysis PolicyKomal Zahra
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
Quarles & Brady
 
OH&S Risk Management: Due Diligence in the Workplace
OH&S Risk Management: Due Diligence in the WorkplaceOH&S Risk Management: Due Diligence in the Workplace
OH&S Risk Management: Due Diligence in the Workplace
Drake International
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
Hinne Hettema
 
Security-Invest Where it Matters Most
Security-Invest Where it Matters MostSecurity-Invest Where it Matters Most
Security-Invest Where it Matters Most
InnoTech
 
My_notes_part1.pdf
My_notes_part1.pdfMy_notes_part1.pdf
My_notes_part1.pdf
PhilLopez4
 
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with SalesforceDell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
Dreamforce
 
Web Security
Web SecurityWeb Security
Web Security
Randy Connolly
 

Similar to Crime Prevention Through Environmental Design - Advanced Security Management (20)

Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of Instruction
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
Top-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfTop-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdf
 
Lecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptxLecture 2 Threats and Strategy.pptx
Lecture 2 Threats and Strategy.pptx
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyySeccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
 
Undertake the Risk Analysis Policy
Undertake the Risk Analysis PolicyUndertake the Risk Analysis Policy
Undertake the Risk Analysis Policy
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
OH&S Risk Management: Due Diligence in the Workplace
OH&S Risk Management: Due Diligence in the WorkplaceOH&S Risk Management: Due Diligence in the Workplace
OH&S Risk Management: Due Diligence in the Workplace
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
Security-Invest Where it Matters Most
Security-Invest Where it Matters MostSecurity-Invest Where it Matters Most
Security-Invest Where it Matters Most
 
My_notes_part1.pdf
My_notes_part1.pdfMy_notes_part1.pdf
My_notes_part1.pdf
 
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with SalesforceDell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
 
Web Security
Web SecurityWeb Security
Web Security
 

More from Enterprise Security Risk Management

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
Enterprise Security Risk Management
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
Enterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Enterprise Security Risk Management
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
EUS+ Management & Consulting Excellence
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
rivaraj2711
 

Recently uploaded (16)

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
 

Crime Prevention Through Environmental Design - Advanced Security Management

  • 1. Crime Prevention & Security Management Advanced Security Management Presented By Tony Ridley
  • 2. M001- What is most important in corporate/commercial security management? What are your roles and responsibilities within a commercial and corporate setting? Advanced Security Management Presented By Tony Ridley
  • 3. Next • Next related topic is M002 - Tools and systems for effective security managers • Next on the program is M002 - Tools and systems for effective security managers Advanced Security Management Presented By Tony Ridley
  • 4. M002 - Tools and systems for effective security managers Advanced and enhanced management tools and resources for the conduct your role 2-Step Verification settings page Advanced Security Management Presented By Tony Ridley
  • 5. Next • Next related topic is M003 - Security Best Known Practices and Methods • Next on the program is CRM001 Crime: Major types and composition Advanced Security Management Presented By Tony Ridley
  • 6. CRM001 - Crime: Major types and composition Baseline examples and foundation planning for preventing crimes Advanced Security Management Presented By Tony Ridley
  • 7. Exploitive Crimes Predatory crimes in which offenders injure or kill a person and/or seize or damage another's property Such as: • murder, • rape, • robbery, • aggravated assault, • burglary, • theft, • arson Advanced Security Management Presented By Tony Ridley
  • 8. Mutualistic Crimes Two people or groups engaged in complementary crimes such as Such as: Advanced Security Management Presented By Tony Ridley • Organized crime, • drug transactions, • prostitution, • gambling
  • 9. Competitive Crimes Include those in which two people or groups act in the same capacity and usually involve physical conflicts against each other Such as: Advanced Security Management Presented By Tony Ridley • gang crimes, • corporate espionage
  • 10. Individualistic Crimes Illegal acts committed by an individual Such as: Advanced Security Management Presented By Tony Ridley • suicide, • drug use
  • 11. Next • Next related topic is CRM002 - Opportunity and Crime: Principles • Next on the program is coffee break then SB01 - Suspicious Behavioural Assessment – Profiling Advanced Security Management Presented By Tony Ridley
  • 12. CRM002 & CRM003 - Opportunity and Crime: Principles • Most crime requires specific opportunity and key factors in order to exist or pursue • Opportunities play a role in causing all crime • Crime opportunities are highly specific • Crime opportunities are concentrated in time and space • Crime opportunities depend on everyday movements • One crime produces opportunities for another • Some products offer more tempting crime opportunities • Social and technological changes produce new crime opportunities • Opportunities for crime can be reduced • Reducing opportunities does not usually displace crime • Focused opportunity reduction can produce wider declines in crime Advanced Security Management Presented By Tony Ridley
  • 13. M001- What is most important in corporate/commercial security management? What are your roles and responsibilities within a commercial and corporate setting? Advanced Security Management Presented By Tony Ridley
  • 14. Routine Choice Theory • Offenders will select targets and define means to achieve their goals in a manner that can be explained • Adversaries act rationally when planning a crime by weighing the risks, rewards, and effort needed to commit their crimes Advanced Security Management Presented By Tony Ridley
  • 15. Security decision making: • Select crime countermeasures for the facility which cause offenders to decide that risks are too high and the rewards too low for them to commit the crime at the facility Advanced Security Management Presented By Tony Ridley
  • 16. Routine Activity Theory • criminals, like everyone else, move among routine, daily activities that may include home, school, work, shopping, and recreation. During these routine activities, a crime may occur if certain components come together at one point in time. These components are a motivated offender, a target, and a place without an effective guardian • The offender must be motivated and will likely have performed the hedonistic calculus of weighing the risks and rewards. There must be a suitable target that provides the reward, and there must be a lack of guarded space that pose little or no risk to the adversary. Advanced Security Management Presented By Tony Ridley
  • 17. Security decision making: To ensure that the place [facility] has an effective guardian Advanced Security Management Presented By Tony Ridley
  • 18. Next • Next related topic is CRM004 - Crime Displacement • Next on the program is coffee break then CPTED01 - Crime Prevention Through Environmental Design (CPTED) Advanced Security Management Presented By Tony Ridley
  • 19. CPTED03 - CPTED: Primary Elements Essential factors required in the development, application and management of a CPTED strategy Advanced Security Management Presented By Tony Ridley
  • 20. Increasing perceived effort • Target hardening • Access control • Deflecting offenders • Controlling facilities Advanced Security Management Presented By Tony Ridley
  • 21. Increasing perceived risk • Entry and exit screening • Formal surveillance • Surveillance by employees • Natural surveillance Advanced Security Management Presented By Tony Ridley
  • 22. Reducing anticipated rewards • Target removal • Identify property • Reducing temptation • Denying benefits Advanced Security Management Presented By Tony Ridley
  • 23. removing excuses • Rule setting • Stimulating conscience • Controlling disinhibitiors • Facilitating compliance Advanced Security Management Presented By Tony Ridley
  • 24. Next • Next related topic is SRA01 - Security Audits & Assessments • Next on the program is PRAC01 - Applications of the fundamentals of crime prevention Advanced Security Management Presented By Tony Ridley
  • 25. PRAC01-PRAC02 - Applications of the fundamentals of crime prevention Practically apply education, tactics and techniques covered in the first day of this course Advanced Security Management Presented By Tony Ridley
  • 26. Practical Application • Break into groups of 3-5 • Using this facility/location, identify the following: • Likely types of crimes • Suspicious behaviour to monitor • Identify opportunities for crime • How you might apply CPTED • What primary elements have you applied? • What is MOST important? Advanced Security Management Presented By Tony Ridley
  • 27. Next • Next related topic is SRA01 - Security Audits & Assessments • Next on the program is SLQA01 - Student Lead Question and Answer Advanced Security Management Presented By Tony Ridley
  • 28. RM001 - Risk Mitigation Options Examine choices available when it comes to risk mitigation Advanced Security Management Presented By Tony Ridley
  • 29. Choices • Risk assumption/acceptance • Risk Avoidance • Risk limitation • Risk Planning • Research and Acknowledgement • Risk Transference Advanced Security Management Presented By Tony Ridley
  • 30. Next • Next related topic is M003 - Security Best Known Practices and Methods • Next on the program is CRM004 - Crime Displacement Advanced Security Management Presented By Tony Ridley
  • 31. CRM004 - Crime Displacement • Explore options for the displacement of crime and the benefits/disadvantages associated with plausible options • Occurs when security measures are effective in preventing crime where the security measures are in place and forces the criminal to go elsewhere with less security to commit their crimes Advanced Security Management Presented By Tony Ridley
  • 32. Temporal • Entails a shift in the timing of a crime to different hours of the day or days of the week when apprehension is less risky. • One of the key reasons that random security patrols are more effective than scheduled patrols. • The randomness keeps adversary elements on their toes by not providing them with a set time to commit a crime Advanced Security Management Presented By Tony Ridley
  • 33. Target • Displacement occurs when a criminal, given two equally valuable targets, will select the less risky one. Females are typically perceived as weaker or more vulnerable than males in the criminal mind, and thus the criminal will likely select the female to victimise. Advanced Security Management Presented By Tony Ridley
  • 34. Spatial • Similar to large crime displacement with the exception that the displacement is caused not by the actual target but by the facility/location itself. • A crime that may have occurred at the more secure location is displaced elsewhere, even nearby. Advanced Security Management Presented By Tony Ridley
  • 35. Tactical • Involves the adversary changing his tactics to commit the crime owing to the security measures that are in place. • For example, a perpetrator who finds that windows have been secured after previous attacks at a particular facility may shift tactics and find another entry point into the facility. Advanced Security Management Presented By Tony Ridley
  • 36. Perpetrator • Specific offenders are deterred or apprehended and other offenders take their place. • An example of this type of crime displacement is law enforcement’s capture of a drug dealer who works a certain corner in a neighborhood and whose place is taken by another dealer Advanced Security Management Presented By Tony Ridley
  • 37. Offender • Is rare but involves an offender who changes the type of crime he commits because of increased security designed to prevent the previous crime type. • For example, a facility that has fortified itself against burglary may experience an increase in aggravated robbery against particular assets. Advanced Security Management Presented By Tony Ridley
  • 38. Next • Next related topic is SRA04 - Asset classification • Next on the program is lunch then SRA04 - Asset classification
  • 39. SRA04 - Asset classification Understand the various assets and that which is of value to an organisation Advanced Security Management Presented By Tony Ridley
  • 40. Categories • People • Activities / Processes • Information • Facilities • Equipment Advanced Security Management Presented By Tony Ridley
  • 41. Next • Next related topic is SRA05 - Adversary analysis • Next on the program is SRA05 - Adversary analysis
  • 42. SRA05 - Adversary analysis • Qualify those individuals and groups that present a threat and how to rank them according to threat • Any individual, group, organisation, or government that conducts activities, or has the intention and capability to conduct activities detrimental to the entity or its assets Advanced Security Management Presented By Tony Ridley
  • 43. Intent • wants • needs • indicators • interest Advanced Security Management Presented By Tony Ridley
  • 44. Capability • human intelligence • signals intelligence • trash intelligence • image intelligence • data intelligence • manpower • influence Advanced Security Management Presented By Tony Ridley
  • 45. History • suspected • attempted • successful Advanced Security Management Presented By Tony Ridley
  • 46. Next • Next related topic is TER01 - Terrorism • Next on the program is coffee then TER01 - Terrorism