SlideShare a Scribd company logo
1 of 19
Download to read offline
From the White House to Your Home:
Insights on Enhancing the Security of Your Family
Arnette Heintze, Chief Executive Officer
Hillard Heintze is one of the foremost investigation, security risk management
and law enforcement consulting firms in the United States. We help clients
protect their people, performance, interests and reputations by providing
services that provide insight, deliver assurance and instill confidence.
ABOUT HILLARD HEINTZE
HILLARD HEINTZE © 2015 | Protecting What Matters2
April 14, 1865: Prevention steps
onto the national stage
President Lincoln takes action to prevent
the destruction of our nation’s financial
infrastructure – and creates the
U.S. Secret Service.
Lincoln and his wife head off to the
Ford Theater to see the production of
“Our American Cousin.”
A DAY OF CRISIS AND CHANGE
HILLARD HEINTZE © 2015 | Protecting What Matters3
Lessons are learned but at high costs to
three senior executives – and the nation.
HILLARD HEINTZE © 2015 | Protecting What Matters4
WHEN PREVENTION STUMBLES
LINCOLN
April 14, 1865
GARFIELD
July 2, 1881
MCKINLEY
September 6, 1901
Exceptional Case Study Project
The U.S. Secret Service and National Institute of Justice
FIVE-YEAR STUDY
Examined the thinking and behavior of
83 attackers from 1949 to 1996.
74 ATTACKS
• 6 attacks were carried out by 16 individuals who were
members of a group.
• 68 attacks were carried out by individuals acting alone.
• 24 of the 83 attackers were interviewed.
HILLARD HEINTZE © 2015 | Protecting What Matters5
EARLY RESEARCH BRINGS A CRUCIAL BODY OF KNOWLEDGE
MYTH 1:
They fit a distinct profile.
MYTH 2:
They are mentally ill
MYTH 3:
They make a direct threat
FACT 1: FACT 2: FACT 3:
Attackers do not fit
one descriptive or
demographic profile.
Mental illness rarely
plays a key role
in attacker behavior.
Persons who pose an
actual threat most often
do not make a threat.
6
EARLY RESEARCH REVEALS A CRUCIAL BODY OF KNOWLEDGE
HILLARD HEINTZE © 2015 | Protecting What Matters
Prior to the Study, we had these prevailing beliefs about attackers:
Targeted Violence is any incident of violence
where a known or knowable attacker selects a
particular target prior to their violent attack.
HILLARD HEINTZE © 2015 | Protecting What Matters7
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
HILLARD HEINTZE © 2015 | Protecting What Matters
Attackers have motives.
• Achieve fame and notoriety.
• Law enforcement-assisted suicide.
• Bring national attention to a
perceived problem.
8
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
Attackers select targets.
• Based on their motives and the
accessibility of the target.
• Often consider more than
one target.
Attackers have common backgrounds.
• Despair. Depression. Suicidal thoughts.
• History of harassing or stalking.
• Major loss or change in life.
• Few arrests for violent crimes.
What was learned about the pre-attack process
leading to Targeted Violence?
• Is the result of an understandable and often
discernible process of thinking and behavior.
• Stems from an interaction among the potential attacker,
past stressful events, a current situation and the target.
• A potential attacker’s behavior is vital to identifying his or her
intentions. The attacker’s thinking, planning and logistical
preparations have to be detected and interrupted.
HILLARD HEINTZE © 2015 | Protecting What Matters9
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
Behavioral threat assessment – three key processes
HILLARD HEINTZE © 2015 | Protecting What Matters10
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
Manage
The threat the
individual poses
Assess
If the individual poses a risk –
gather information from
multiple sources
Identify
Individuals who have
the idea or intent
of attacking
Would-be attackers report being
frustrated and foiled by security
measures.
Remain alert to those who roam
outer perimeters seeking alternative
access points in order to avoid
security measures.
HILLARD HEINTZE © 2015 | Protecting What Matters11
OBSERVATIONS AND IMPLICATIONS OF ATTACK-RELATED BEHAVIORS
12
CASE STUDIES: THREE RECENT ENGAGEMENTS
HILLARD HEINTZE © 2015 | Protecting What Matters
Managing a Stalker Incident (#115)
Anonymous caller reported one of the
firm’s receptionists was slandering its
management team. The company
quickly learned the caller was known to
their employee, and had been stalking
her for over a year. Calls to local law
enforcement resulted in an initial flurry
of incident reports and administrative
filings. But progress in the case
quickly stalled.
A Former Employee’s
Potential for Violence (#116)
When a disgruntled former
employee began sending
inappropriate email
communications to current
employees, a healthcare
company asked Hillard Heintze to
assess the individual’s potential
for violence.
The Facebook Threat
(#131)
An employee in an East
Coast branch office
posted threatening
statements about
company personnel on
his Facebook wall along
with several pictures of
himself posing with
weapons.
Prevention for families
takes many forms
• Safeguarding the well-being of
adolescents and young adults.
• Defending the family in a technically
agile world.
• Protecting residences.
• Developing a family emergency plan.
HILLARD HEINTZE © 2015 | Protecting What Matters13
FOCUSING ON PREVENTION
HILLARD HEINTZE © 2015 | Protecting What Matters14
ENHANCING THE SECURITY OF YOUR FAMILY
Cyber Security
Think beyond ease of use and assumptions of data
protection and ask tough questions that will help
to identify the strengths and weaknesses of your
current information security strategies.
• Are we protected? Are we doing enough?
• What is the financial impact if we
incur a data breach?
• Do we have a data recovery plan in place?
Social Consciousness
Social networks are a great way to stay connected,
but you need to protect your personal information.
• Activate privacy and security settings on
your social networks.
• Once posted, always posted - protect your
reputation by posting with caution.
• Be cautious about how much personal information
you provide on social networking sites.
• Know and manage your friends.
15
ENHANCING THE SECURITY OF YOUR FAMILY
HILLARD HEINTZE © 2015 | Protecting What Matters
HILLARD HEINTZE © 2015 | Protecting What Matters
Protecting Residences
• Employ best-in-class systems to safeguard your home.
• Use landscaping and sightlines, lighting and physical
barriers to restrict access.
• Places duress alarms in strategic locations.
• Screen all personnel associated with the residence.
16
ENHANCING THE SECURITY OF YOUR FAMILY
Family Emergency Plan
• Plan out exactly how the family should
respond when a crisis unfolds.
• Establish a relocation point or “safe house.”
• Set a universal call-in number for emergencies.
• Secure shelter-in-place and emergency
medical capabilities.
• Addresses communication and transportation
capabilities and emergency egress routes.
• Conduct annual drills.
17
ENHANCING THE SECURITY OF YOUR FAMILY
HILLARD HEINTZE © 2015 | Protecting What Matters
HILLARD HEINTZE © 2015 | Protecting What Matters
Security Technology
A range of new smartphone apps to help you remotely
monitor your property.
• Most security systems will send alerts to your devices
and allow you to check on the status of your home
from any location.
• Some systems will call the police if there is a break-in.
• Do-it-yourself security system with motion sensors and
video cameras can be placed around the home and
watched remotely.
18
ENHANCING THE SECURITY OF YOUR FAMILY
Arnette Heintze, Chief Executive Officer
Arnette.Heintze@HillardHeintze.com
30 South Wacker Drive, Suite 1400
Chicago, Illinois 60606 312.869.8500
HILLARD HEINTZE © 2015 | Protecting What Matters19
QUESTIONS AND DISCUSSION

More Related Content

What's hot (8)

Understanding hs ch 01
Understanding hs ch 01Understanding hs ch 01
Understanding hs ch 01
 
Understanding hs ch 03
Understanding hs ch 03Understanding hs ch 03
Understanding hs ch 03
 
Terrorism In India.
Terrorism In India.Terrorism In India.
Terrorism In India.
 
What is terrorism
What is terrorismWhat is terrorism
What is terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on Terrorism
 
Primary
PrimaryPrimary
Primary
 
Instruments counter terrorism
Instruments counter terrorismInstruments counter terrorism
Instruments counter terrorism
 

Similar to Insights on Enhancing the Security of Your Family

Copyright © 2015. F.A. Davis CompanyPromoting a Healthy.docx
Copyright ©  2015. F.A. Davis CompanyPromoting a Healthy.docxCopyright ©  2015. F.A. Davis CompanyPromoting a Healthy.docx
Copyright © 2015. F.A. Davis CompanyPromoting a Healthy.docx
vanesaburnand
 
Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
wilcockiris
 
Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
jasoninnes20
 
Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2
EstelaJeffery653
 
murali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.docmurali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.doc
Radhika Murali
 

Similar to Insights on Enhancing the Security of Your Family (20)

Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active ShooterHillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active Shooter
 
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1
 
Radicalization in the Workplace
Radicalization in the WorkplaceRadicalization in the Workplace
Radicalization in the Workplace
 
Protecting the Family Office
Protecting the Family OfficeProtecting the Family Office
Protecting the Family Office
 
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2
 
Using Risk Communications in a Crisis - Federal Communicators Network Februar...
Using Risk Communications in a Crisis - Federal Communicators Network Februar...Using Risk Communications in a Crisis - Federal Communicators Network Februar...
Using Risk Communications in a Crisis - Federal Communicators Network Februar...
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
 
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
Copyright © 2015. F.A. Davis CompanyPromoting a Healthy.docx
Copyright ©  2015. F.A. Davis CompanyPromoting a Healthy.docxCopyright ©  2015. F.A. Davis CompanyPromoting a Healthy.docx
Copyright © 2015. F.A. Davis CompanyPromoting a Healthy.docx
 
Littler Global Employer Latin America Conference 2015 Health and Safety Ris...
Littler Global Employer Latin America Conference 2015   Health and Safety Ris...Littler Global Employer Latin America Conference 2015   Health and Safety Ris...
Littler Global Employer Latin America Conference 2015 Health and Safety Ris...
 
Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
 
Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
 
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
 
When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)
 
Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2
 
murali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.docmurali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.doc
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Emotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data NarrativeEmotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data Narrative
 
Schmall crim today8e_ppt_ch13
Schmall crim today8e_ppt_ch13Schmall crim today8e_ppt_ch13
Schmall crim today8e_ppt_ch13
 

Recently uploaded

💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (8)

Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRLHosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
Hosur ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Hosur ESCORT SERVICE❤CALL GIRL
 
Prince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral servicePrince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral service
 
BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...
BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...
BHUBANESWAR CALL GIRL IN SEIRVEC ODIA ❣️72051SIYA37929❣️ CASH PAYMENT ONLY CA...
 
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
 
9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos
9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos
9565589233 Whatsapp Free Nude Video Call Service Porn Girls Porn Videos
 
KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...
KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...
KHORDHA ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO HA...
 
BERHAMPUR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...
BERHAMPUR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...BERHAMPUR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...
BERHAMPUR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND TO ...
 
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRLNamakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
Namakkal ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Namakkal ESCORT SERVICE❤CALL GIRL
 

Insights on Enhancing the Security of Your Family

  • 1. From the White House to Your Home: Insights on Enhancing the Security of Your Family Arnette Heintze, Chief Executive Officer
  • 2. Hillard Heintze is one of the foremost investigation, security risk management and law enforcement consulting firms in the United States. We help clients protect their people, performance, interests and reputations by providing services that provide insight, deliver assurance and instill confidence. ABOUT HILLARD HEINTZE HILLARD HEINTZE © 2015 | Protecting What Matters2
  • 3. April 14, 1865: Prevention steps onto the national stage President Lincoln takes action to prevent the destruction of our nation’s financial infrastructure – and creates the U.S. Secret Service. Lincoln and his wife head off to the Ford Theater to see the production of “Our American Cousin.” A DAY OF CRISIS AND CHANGE HILLARD HEINTZE © 2015 | Protecting What Matters3
  • 4. Lessons are learned but at high costs to three senior executives – and the nation. HILLARD HEINTZE © 2015 | Protecting What Matters4 WHEN PREVENTION STUMBLES LINCOLN April 14, 1865 GARFIELD July 2, 1881 MCKINLEY September 6, 1901
  • 5. Exceptional Case Study Project The U.S. Secret Service and National Institute of Justice FIVE-YEAR STUDY Examined the thinking and behavior of 83 attackers from 1949 to 1996. 74 ATTACKS • 6 attacks were carried out by 16 individuals who were members of a group. • 68 attacks were carried out by individuals acting alone. • 24 of the 83 attackers were interviewed. HILLARD HEINTZE © 2015 | Protecting What Matters5 EARLY RESEARCH BRINGS A CRUCIAL BODY OF KNOWLEDGE
  • 6. MYTH 1: They fit a distinct profile. MYTH 2: They are mentally ill MYTH 3: They make a direct threat FACT 1: FACT 2: FACT 3: Attackers do not fit one descriptive or demographic profile. Mental illness rarely plays a key role in attacker behavior. Persons who pose an actual threat most often do not make a threat. 6 EARLY RESEARCH REVEALS A CRUCIAL BODY OF KNOWLEDGE HILLARD HEINTZE © 2015 | Protecting What Matters Prior to the Study, we had these prevailing beliefs about attackers:
  • 7. Targeted Violence is any incident of violence where a known or knowable attacker selects a particular target prior to their violent attack. HILLARD HEINTZE © 2015 | Protecting What Matters7 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
  • 8. HILLARD HEINTZE © 2015 | Protecting What Matters Attackers have motives. • Achieve fame and notoriety. • Law enforcement-assisted suicide. • Bring national attention to a perceived problem. 8 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE Attackers select targets. • Based on their motives and the accessibility of the target. • Often consider more than one target. Attackers have common backgrounds. • Despair. Depression. Suicidal thoughts. • History of harassing or stalking. • Major loss or change in life. • Few arrests for violent crimes.
  • 9. What was learned about the pre-attack process leading to Targeted Violence? • Is the result of an understandable and often discernible process of thinking and behavior. • Stems from an interaction among the potential attacker, past stressful events, a current situation and the target. • A potential attacker’s behavior is vital to identifying his or her intentions. The attacker’s thinking, planning and logistical preparations have to be detected and interrupted. HILLARD HEINTZE © 2015 | Protecting What Matters9 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
  • 10. Behavioral threat assessment – three key processes HILLARD HEINTZE © 2015 | Protecting What Matters10 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE Manage The threat the individual poses Assess If the individual poses a risk – gather information from multiple sources Identify Individuals who have the idea or intent of attacking
  • 11. Would-be attackers report being frustrated and foiled by security measures. Remain alert to those who roam outer perimeters seeking alternative access points in order to avoid security measures. HILLARD HEINTZE © 2015 | Protecting What Matters11 OBSERVATIONS AND IMPLICATIONS OF ATTACK-RELATED BEHAVIORS
  • 12. 12 CASE STUDIES: THREE RECENT ENGAGEMENTS HILLARD HEINTZE © 2015 | Protecting What Matters Managing a Stalker Incident (#115) Anonymous caller reported one of the firm’s receptionists was slandering its management team. The company quickly learned the caller was known to their employee, and had been stalking her for over a year. Calls to local law enforcement resulted in an initial flurry of incident reports and administrative filings. But progress in the case quickly stalled. A Former Employee’s Potential for Violence (#116) When a disgruntled former employee began sending inappropriate email communications to current employees, a healthcare company asked Hillard Heintze to assess the individual’s potential for violence. The Facebook Threat (#131) An employee in an East Coast branch office posted threatening statements about company personnel on his Facebook wall along with several pictures of himself posing with weapons.
  • 13. Prevention for families takes many forms • Safeguarding the well-being of adolescents and young adults. • Defending the family in a technically agile world. • Protecting residences. • Developing a family emergency plan. HILLARD HEINTZE © 2015 | Protecting What Matters13 FOCUSING ON PREVENTION
  • 14. HILLARD HEINTZE © 2015 | Protecting What Matters14 ENHANCING THE SECURITY OF YOUR FAMILY Cyber Security Think beyond ease of use and assumptions of data protection and ask tough questions that will help to identify the strengths and weaknesses of your current information security strategies. • Are we protected? Are we doing enough? • What is the financial impact if we incur a data breach? • Do we have a data recovery plan in place?
  • 15. Social Consciousness Social networks are a great way to stay connected, but you need to protect your personal information. • Activate privacy and security settings on your social networks. • Once posted, always posted - protect your reputation by posting with caution. • Be cautious about how much personal information you provide on social networking sites. • Know and manage your friends. 15 ENHANCING THE SECURITY OF YOUR FAMILY HILLARD HEINTZE © 2015 | Protecting What Matters
  • 16. HILLARD HEINTZE © 2015 | Protecting What Matters Protecting Residences • Employ best-in-class systems to safeguard your home. • Use landscaping and sightlines, lighting and physical barriers to restrict access. • Places duress alarms in strategic locations. • Screen all personnel associated with the residence. 16 ENHANCING THE SECURITY OF YOUR FAMILY
  • 17. Family Emergency Plan • Plan out exactly how the family should respond when a crisis unfolds. • Establish a relocation point or “safe house.” • Set a universal call-in number for emergencies. • Secure shelter-in-place and emergency medical capabilities. • Addresses communication and transportation capabilities and emergency egress routes. • Conduct annual drills. 17 ENHANCING THE SECURITY OF YOUR FAMILY HILLARD HEINTZE © 2015 | Protecting What Matters
  • 18. HILLARD HEINTZE © 2015 | Protecting What Matters Security Technology A range of new smartphone apps to help you remotely monitor your property. • Most security systems will send alerts to your devices and allow you to check on the status of your home from any location. • Some systems will call the police if there is a break-in. • Do-it-yourself security system with motion sensors and video cameras can be placed around the home and watched remotely. 18 ENHANCING THE SECURITY OF YOUR FAMILY
  • 19. Arnette Heintze, Chief Executive Officer Arnette.Heintze@HillardHeintze.com 30 South Wacker Drive, Suite 1400 Chicago, Illinois 60606 312.869.8500 HILLARD HEINTZE © 2015 | Protecting What Matters19 QUESTIONS AND DISCUSSION