SlideShare a Scribd company logo
1 of 16
Executive Protection Training for Law Enforcement Personnel John Sexton PPS, CST, CII Jerry MacCauley PPS,CST Sexton Executive Security Trainer
 Executive Protection Training How is it different than any other security function? Code of Conduct/Confidentiality Personnel Characteristics LEO and EP Differences
Police Escort
How Some See It “Please Michael, just try to stay quiet today!” “Da Boss is busy, get it?”
EP Specialists?
Executive? “Where exactly is this boardroom?”
Low Profile?
Professional? What is your job description?
Who is the Personal protection specialist here? If you’re not sure, that’s the point.
Personal Characteristics Military or LEO Background Assets Discipline  Used to long hours Loyalty Strong sense of “duty”
Personal Characteristics
Training Site Surveys Route Selection Physical Security (building/vehicle) High Profile Low Profile Formations and “sounding off.” Concentric Circles of Protection
Reagan Assassination Attempt
Training ,[object Object]
Emergency Responses
First Aid/CPR/AED

More Related Content

What's hot

Elevator Entrapment Training Slides for 444 Brickell
Elevator Entrapment Training Slides for 444 BrickellElevator Entrapment Training Slides for 444 Brickell
Elevator Entrapment Training Slides for 444 BrickellEric Levels
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It MattersJeffrey Malone
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism trainingjturner67
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Active shooter updated
Active shooter   updatedActive shooter   updated
Active shooter updatedJim Bane
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Active shooter response plan.ppt (1)
Active shooter response plan.ppt (1)Active shooter response plan.ppt (1)
Active shooter response plan.ppt (1)Lewis Stroud, M.A.Ed.
 
How to Respond to an Active Shooter
How to Respond to an Active ShooterHow to Respond to an Active Shooter
How to Respond to an Active ShooterCase IQ
 
Bomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionBomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionSunjib Anwar
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersDeborah Osborne
 
Personal Security Expo
Personal Security ExpoPersonal Security Expo
Personal Security Expojdspider
 

What's hot (20)

Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
VIP security
VIP security VIP security
VIP security
 
PERSONAL SECURITY
PERSONAL SECURITYPERSONAL SECURITY
PERSONAL SECURITY
 
Elevator Entrapment Training Slides for 444 Brickell
Elevator Entrapment Training Slides for 444 BrickellElevator Entrapment Training Slides for 444 Brickell
Elevator Entrapment Training Slides for 444 Brickell
 
Espionage
EspionageEspionage
Espionage
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It Matters
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Anti-terrorism training
Anti-terrorism trainingAnti-terrorism training
Anti-terrorism training
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Carjacking
CarjackingCarjacking
Carjacking
 
Active shooter updated
Active shooter   updatedActive shooter   updated
Active shooter updated
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Active shooter response plan.ppt (1)
Active shooter response plan.ppt (1)Active shooter response plan.ppt (1)
Active shooter response plan.ppt (1)
 
How to Respond to an Active Shooter
How to Respond to an Active ShooterHow to Respond to an Active Shooter
How to Respond to an Active Shooter
 
Bomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionBomb Threat Its Detection & Prevention
Bomb Threat Its Detection & Prevention
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Personal Security Expo
Personal Security ExpoPersonal Security Expo
Personal Security Expo
 
Social engineering
Social engineering Social engineering
Social engineering
 

Viewers also liked

Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protectionriskis
 
Presentation of vvip & vip carcade
Presentation of vvip & vip carcadePresentation of vvip & vip carcade
Presentation of vvip & vip carcadeBipin Gautam
 
Security of important peoples
Security of important peoplesSecurity of important peoples
Security of important peoplesTrupesh Upadhyay
 
International Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityInternational Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityCASS Global Security
 
GIS in National Security
GIS in National SecurityGIS in National Security
GIS in National SecurityEsri
 
GIS Platform for National Security
GIS Platform for National SecurityGIS Platform for National Security
GIS Platform for National SecurityEsri
 
OCHRONA I OBSŁUGA VIP NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...
OCHRONA I OBSŁUGA VIP  NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...OCHRONA I OBSŁUGA VIP  NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...
OCHRONA I OBSŁUGA VIP NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...dr Sławomir Ozdyk
 
Adaptacja w miejscu pracy
Adaptacja w miejscu pracyAdaptacja w miejscu pracy
Adaptacja w miejscu pracyZielona Linia
 
Small Team Operations-Knowing Your Client
Small Team Operations-Knowing Your ClientSmall Team Operations-Knowing Your Client
Small Team Operations-Knowing Your ClientDon Moe
 
Selection of tactical team members
Selection of tactical team membersSelection of tactical team members
Selection of tactical team memberszheendro_18
 
Rekrutacja, Selekcja, Adaptacja
Rekrutacja, Selekcja, AdaptacjaRekrutacja, Selekcja, Adaptacja
Rekrutacja, Selekcja, Adaptacjaguest653b0f
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessmentbradburns
 
Close quarters battle (cqb ).ppt
Close quarters battle (cqb ).pptClose quarters battle (cqb ).ppt
Close quarters battle (cqb ).pptjosecoco1
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profilingchaletlines
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 

Viewers also liked (20)

Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protection
 
Presentation of vvip & vip carcade
Presentation of vvip & vip carcadePresentation of vvip & vip carcade
Presentation of vvip & vip carcade
 
Security of important peoples
Security of important peoplesSecurity of important peoples
Security of important peoples
 
International Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityInternational Executive Protection Services | Protective Security
International Executive Protection Services | Protective Security
 
Vip Ppt
Vip PptVip Ppt
Vip Ppt
 
GIS in National Security
GIS in National SecurityGIS in National Security
GIS in National Security
 
GIS Platform for National Security
GIS Platform for National SecurityGIS Platform for National Security
GIS Platform for National Security
 
OCHRONA I OBSŁUGA VIP NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...
OCHRONA I OBSŁUGA VIP  NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...OCHRONA I OBSŁUGA VIP  NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...
OCHRONA I OBSŁUGA VIP NA BAZIE „SZTUKI WOJNY“ SUN TZU I „METOD WOJSKOWY...
 
Sztuka wojenna w biznesie
Sztuka wojenna w biznesieSztuka wojenna w biznesie
Sztuka wojenna w biznesie
 
Adaptacja w miejscu pracy
Adaptacja w miejscu pracyAdaptacja w miejscu pracy
Adaptacja w miejscu pracy
 
Small Team Operations-Knowing Your Client
Small Team Operations-Knowing Your ClientSmall Team Operations-Knowing Your Client
Small Team Operations-Knowing Your Client
 
Selection of tactical team members
Selection of tactical team membersSelection of tactical team members
Selection of tactical team members
 
Rekrutacja, Selekcja, Adaptacja
Rekrutacja, Selekcja, AdaptacjaRekrutacja, Selekcja, Adaptacja
Rekrutacja, Selekcja, Adaptacja
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessment
 
Travel Safety.ppt
Travel Safety.pptTravel Safety.ppt
Travel Safety.ppt
 
Bezpieczeństwo informacyjne
Bezpieczeństwo informacyjneBezpieczeństwo informacyjne
Bezpieczeństwo informacyjne
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profiling
 
Close quarters battle (cqb ).ppt
Close quarters battle (cqb ).pptClose quarters battle (cqb ).ppt
Close quarters battle (cqb ).ppt
 
Criminal profiling
Criminal profilingCriminal profiling
Criminal profiling
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 

Executive Protection Training For Security Personnel and LE

Editor's Notes

  1. Popes guards
  2. Where are the cops focused?
  3. Keep moving, don’t react and it won’t make news! Protection from embarrassment.