SlideShare a Scribd company logo
This short white paper to analyze how a marketing model, could be an effective model for Security
Manager to audit their Security Procedures.
Starting from this approach, is possible creating a system useful to collect any information divided by
“specialty” or: P=political, E=economic, S=social, T=technological and.. plan adequate actions.
Before continuing in my explanation a brief overview for who’s never heard “PEST analysis”. Following
lines are available on Wikipedia:
Political factors are basically to what degree the government intervenes in the economy.
Specifically, political factors include areas such as tax policy, labor law,environmental law, trade
restrictions, tariffs, and political stability. Political factors may also include goods and services which
the government wants to provide or be provided (merit goods) and those that the government
does not want to be provided (demerit goods or merit bad). Furthermore, governments have great
influence on the health,education, and infrastructure of a nation.
Economic factors include economic growth, interest rates, exchange rates and the inflation rate.
These factors have major impacts on how businesses operate and make decisions. For example,
interest rates affect a firm's cost of capital and therefore to what extent a business grows and
expands. Exchange rates affect the costs of exporting goods and the supply and price of imported
goods in an economy
Social factors include the cultural aspects and include health consciousness, population growth
rate, age distribution, career attitudes and emphasis on safety. Trends in social factors affect the
demand for a company's products and how that company operates. For example, an aging
population may imply a smaller and less-willing workforce (thus increasing the cost of labor).
Furthermore, companies may change various management strategies to adapt to these social
trends (such as recruiting older workers).
Technological factors include technological aspects such as R&D activity, automation, technology
incentives and the rate of technological change. They can determinebarriers to entry, minimum
efficient production level and influence outsourcing decisions. Furthermore, technological shifts
can affect costs, quality, and lead to innovation.
Now, how could be useful this approach to manage security in a plant or a mall or a strategic
infrastructures? Well, let’s go
Political
What will happen if tomorrow your company has to change one or more labor agreements reducing or
change something? What will happen if your company won’t be able to make the whole production for
changes in local or national laws?
Economic
Have you considered that your workforce population’s salary could be not quite aligned with the cost of
life? What will happen if your company has to cancel benefits and bonus because it’s in for economic
situation?
Social
Temporary workers can create an unstable environment? A restrained generational change can modify in
habits and in not written rules inside at the workforce population?
Technological
May new and modern process introduce barriers or discrimination for somebody in workforce population?
Now how approach this method in a structured and measurable way?
We have to study every P.E.S.T. point through SWOT analysis (Strengths, Weaknesses, Opportunities, and
Threats) in order to understand what phenomena weight more than the others.
Just an example could be: my strength point is the access control, who manages every entry and every
person. But my weakness happens when I have a fire alarm because all emergency ways are opened and
uncontrolled so everybody can pick some goods hiding them in some part of the plant. So, when will I have
to be worried? When Threat starts. And When will threat start? Threat will start (PEST) when company
hires temporary people, when part of workforce population’s salary is not aligned with inflation, when
some part of workforce population won’t be able to work in to the plant because part of production has
been automated and so on. What’re our opportunities? Well, identified our threats for every point of PEST,
we have the opportunity to plan accurate reactions before threat starts or alternatively you can contain
damages during or after the event.
So, to conclude:
1. Make a SWOT analysis for every word of PEST
2. Correlate these information to collect every threat who influences the same weakness and how
every strength point can mitigate or eliminate several threats
3. Build a weekly questionnaire to monitor how PEST phenomena can become a threat
4. Finally the opportunity to plan investment and update procedures…beforehand

More Related Content

What's hot

Real Estate Investment Analysis PowerPoint Presentation Slides
Real Estate Investment Analysis PowerPoint Presentation SlidesReal Estate Investment Analysis PowerPoint Presentation Slides
Real Estate Investment Analysis PowerPoint Presentation Slides
SlideTeam
 
Sample PPT On Business Plan PowerPoint Presentation Slides
Sample PPT On Business Plan PowerPoint Presentation Slides Sample PPT On Business Plan PowerPoint Presentation Slides
Sample PPT On Business Plan PowerPoint Presentation Slides
SlideTeam
 
Strategy evaluation and control
Strategy evaluation and controlStrategy evaluation and control
Strategy evaluation and control
Pranav Kumar Ojha
 
PESTEL analysis
PESTEL analysisPESTEL analysis
PESTEL analysis
Wisnu Dewobroto
 
Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...
Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...
Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...
SlideTeam
 
Business Environment analysis
Business Environment analysisBusiness Environment analysis
Business Environment analysis
Bharti Goyal
 
Strategic Planning And Budgeting Part 1: Business Model and Strategy
Strategic Planning And Budgeting Part 1: Business Model and StrategyStrategic Planning And Budgeting Part 1: Business Model and Strategy
Strategic Planning And Budgeting Part 1: Business Model and Strategy
Kenny Ong
 
Developing competitive advantage and strategic focus
Developing competitive advantage and strategic focusDeveloping competitive advantage and strategic focus
Developing competitive advantage and strategic focus
Ashraf Hlouh
 
Forecasting And Decision Making
Forecasting And Decision MakingForecasting And Decision Making
Forecasting And Decision Making
Vikash Rathour
 
Prsentation on space matrix
Prsentation on space matrixPrsentation on space matrix
Prsentation on space matrix
neha neharika sharma
 
Csr of walmart
Csr of walmartCsr of walmart
Csr of walmart
Joe
 
Strategic Management_Unit 1
Strategic Management_Unit 1Strategic Management_Unit 1
Strategic Management_Unit 1
Dr. Parveen Kaur Nagpal
 
External factor evaluation
External factor evaluationExternal factor evaluation
External factor evaluation
NARENDRA KUMAR
 
Strategic monitoring-system
Strategic monitoring-systemStrategic monitoring-system
Strategic monitoring-system
Anita Sharma
 
SWOT ANALYSIS
SWOT ANALYSISSWOT ANALYSIS
SWOT ANALYSIS
Soumya De
 
SWOT Analysis
SWOT AnalysisSWOT Analysis
SWOT Analysis
Atef Khayat, MD, MBA
 
Marketing strategy and Plan Template
Marketing strategy and Plan TemplateMarketing strategy and Plan Template
Marketing strategy and Plan Template
Aurelien Domont, MBA
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and Sustainability
Jeff B
 
Strategic Thinking Lenses
Strategic Thinking LensesStrategic Thinking Lenses
Strategic Thinking Lenses
Derek Winter
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
bwire sedrick
 

What's hot (20)

Real Estate Investment Analysis PowerPoint Presentation Slides
Real Estate Investment Analysis PowerPoint Presentation SlidesReal Estate Investment Analysis PowerPoint Presentation Slides
Real Estate Investment Analysis PowerPoint Presentation Slides
 
Sample PPT On Business Plan PowerPoint Presentation Slides
Sample PPT On Business Plan PowerPoint Presentation Slides Sample PPT On Business Plan PowerPoint Presentation Slides
Sample PPT On Business Plan PowerPoint Presentation Slides
 
Strategy evaluation and control
Strategy evaluation and controlStrategy evaluation and control
Strategy evaluation and control
 
PESTEL analysis
PESTEL analysisPESTEL analysis
PESTEL analysis
 
Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...
Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...
Corporate Social Responsibility Business Strategy PowerPoint Presentation Sli...
 
Business Environment analysis
Business Environment analysisBusiness Environment analysis
Business Environment analysis
 
Strategic Planning And Budgeting Part 1: Business Model and Strategy
Strategic Planning And Budgeting Part 1: Business Model and StrategyStrategic Planning And Budgeting Part 1: Business Model and Strategy
Strategic Planning And Budgeting Part 1: Business Model and Strategy
 
Developing competitive advantage and strategic focus
Developing competitive advantage and strategic focusDeveloping competitive advantage and strategic focus
Developing competitive advantage and strategic focus
 
Forecasting And Decision Making
Forecasting And Decision MakingForecasting And Decision Making
Forecasting And Decision Making
 
Prsentation on space matrix
Prsentation on space matrixPrsentation on space matrix
Prsentation on space matrix
 
Csr of walmart
Csr of walmartCsr of walmart
Csr of walmart
 
Strategic Management_Unit 1
Strategic Management_Unit 1Strategic Management_Unit 1
Strategic Management_Unit 1
 
External factor evaluation
External factor evaluationExternal factor evaluation
External factor evaluation
 
Strategic monitoring-system
Strategic monitoring-systemStrategic monitoring-system
Strategic monitoring-system
 
SWOT ANALYSIS
SWOT ANALYSISSWOT ANALYSIS
SWOT ANALYSIS
 
SWOT Analysis
SWOT AnalysisSWOT Analysis
SWOT Analysis
 
Marketing strategy and Plan Template
Marketing strategy and Plan TemplateMarketing strategy and Plan Template
Marketing strategy and Plan Template
 
Enterprise Risk Management and Sustainability
Enterprise Risk Management and SustainabilityEnterprise Risk Management and Sustainability
Enterprise Risk Management and Sustainability
 
Strategic Thinking Lenses
Strategic Thinking LensesStrategic Thinking Lenses
Strategic Thinking Lenses
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 

Viewers also liked

Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Richard Peter Ong
 
Latest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growthLatest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growth
Aneesh Suresh
 
Business Model For Information Security
Business Model For Information SecurityBusiness Model For Information Security
Business Model For Information Security
Marco Raposo
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
jpubal
 
Affin Bank Berhad Analysis
Affin Bank Berhad AnalysisAffin Bank Berhad Analysis
Affin Bank Berhad Analysis
Mior Azwan
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
Andrey Apuhtin
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
STEEPLE Analysis (used with SWOT)
STEEPLE Analysis (used with SWOT)STEEPLE Analysis (used with SWOT)
STEEPLE Analysis (used with SWOT)
LouAnn Conner
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
Export and import india
Export and import indiaExport and import india
Export and import india
zachmeloottu
 
Pestel analysis of south africa
Pestel analysis of south africaPestel analysis of south africa
Pestel analysis of south africa
Grishma Rane
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 
Security analysis and portfolio management
Security analysis and portfolio managementSecurity analysis and portfolio management
Security analysis and portfolio management
Indian Institute of Management, Calcutta
 
Opportunity and Threat of External Environment
Opportunity and Threat of External EnvironmentOpportunity and Threat of External Environment
Opportunity and Threat of External Environment
Noonamsom
 
Apple - PESTLE Analysis
Apple - PESTLE AnalysisApple - PESTLE Analysis
Apple - PESTLE Analysis
Guru Nanak Institute of Management
 
Impact of Culture on Consumer Behaviour
Impact of Culture on Consumer BehaviourImpact of Culture on Consumer Behaviour
Impact of Culture on Consumer Behaviour
charindu sanjeeva
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
6 SWOT Analysis Examples to Help You Write Your Own
6 SWOT Analysis Examples to Help You Write Your Own6 SWOT Analysis Examples to Help You Write Your Own
6 SWOT Analysis Examples to Help You Write Your Own
Palo Alto Software
 

Viewers also liked (20)

Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Latest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growthLatest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growth
 
Business Model For Information Security
Business Model For Information SecurityBusiness Model For Information Security
Business Model For Information Security
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
 
Affin Bank Berhad Analysis
Affin Bank Berhad AnalysisAffin Bank Berhad Analysis
Affin Bank Berhad Analysis
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
STEEPLE Analysis (used with SWOT)
STEEPLE Analysis (used with SWOT)STEEPLE Analysis (used with SWOT)
STEEPLE Analysis (used with SWOT)
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Export and import india
Export and import indiaExport and import india
Export and import india
 
Pestel analysis of south africa
Pestel analysis of south africaPestel analysis of south africa
Pestel analysis of south africa
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Security analysis and portfolio management
Security analysis and portfolio managementSecurity analysis and portfolio management
Security analysis and portfolio management
 
Opportunity and Threat of External Environment
Opportunity and Threat of External EnvironmentOpportunity and Threat of External Environment
Opportunity and Threat of External Environment
 
Apple - PESTLE Analysis
Apple - PESTLE AnalysisApple - PESTLE Analysis
Apple - PESTLE Analysis
 
Impact of Culture on Consumer Behaviour
Impact of Culture on Consumer BehaviourImpact of Culture on Consumer Behaviour
Impact of Culture on Consumer Behaviour
 
Cyber security
Cyber securityCyber security
Cyber security
 
6 SWOT Analysis Examples to Help You Write Your Own
6 SWOT Analysis Examples to Help You Write Your Own6 SWOT Analysis Examples to Help You Write Your Own
6 SWOT Analysis Examples to Help You Write Your Own
 

Similar to PEST Analysis for Security

External_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdf
External_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdfExternal_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdf
External_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdf
ramsetl
 
Pest
PestPest
PESTEL-ANALYSIS.pdf
PESTEL-ANALYSIS.pdfPESTEL-ANALYSIS.pdf
PESTEL-ANALYSIS.pdf
Kiran Dubb
 
pestel analysis ppt for classwork .pptx
pestel analysis ppt for classwork  .pptxpestel analysis ppt for classwork  .pptx
pestel analysis ppt for classwork .pptx
aryanmalik33047
 
ENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSIS
ENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSISENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSIS
ENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSIS
Libcorpio
 
Pestel analysis
Pestel analysisPestel analysis
Pestel analysis
Guwan Lankapura
 
Pest Analysis
Pest AnalysisPest Analysis
Pest Analysis
Siddhartha Damle
 
Assignment 1 elements
Assignment 1 elementsAssignment 1 elements
Assignment 1 elements
Kirti Khade
 
Business environment
Business environmentBusiness environment
Business environment
sameer sheikh
 
Business environment and ethics2
Business environment and ethics2Business environment and ethics2
Business environment and ethics2
vibuchandran
 
P E S T E L ANALYSIS
P E S T E L            ANALYSISP E S T E L            ANALYSIS
P E S T E L ANALYSIS
Rahul Singh
 
BUSI.ENV UNIT 1 (1).pptx
BUSI.ENV UNIT 1 (1).pptxBUSI.ENV UNIT 1 (1).pptx
BUSI.ENV UNIT 1 (1).pptx
NamrataBhatnagar5
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction
Samos2019Summit
 
External environmental analysis
External environmental analysis External environmental analysis
External environmental analysis
Shri Shankaracharya College, Bhilai,Junwani
 
International marketing slept analysis
International marketing slept analysisInternational marketing slept analysis
International marketing slept analysis
TechXpla
 
Bm 1.5 External Environment
Bm 1.5 External EnvironmentBm 1.5 External Environment
Bm 1.5 External Environment
Mr. D. .
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Marc S. Sokol
 
environmental-forecasting.pptx
environmental-forecasting.pptxenvironmental-forecasting.pptx
environmental-forecasting.pptx
PapuKumarNaik1
 
environmental-forecasting.pptx
environmental-forecasting.pptxenvironmental-forecasting.pptx
environmental-forecasting.pptx
PapuKumarNaik1
 
Politics Has an Impact on the Business Environment.pdf
Politics Has an Impact on the Business Environment.pdfPolitics Has an Impact on the Business Environment.pdf
Politics Has an Impact on the Business Environment.pdf
Wajid Khan MP
 

Similar to PEST Analysis for Security (20)

External_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdf
External_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdfExternal_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdf
External_and_Internal_Analysis_Guide_-_TOTAL_REWARDS.pdf
 
Pest
PestPest
Pest
 
PESTEL-ANALYSIS.pdf
PESTEL-ANALYSIS.pdfPESTEL-ANALYSIS.pdf
PESTEL-ANALYSIS.pdf
 
pestel analysis ppt for classwork .pptx
pestel analysis ppt for classwork  .pptxpestel analysis ppt for classwork  .pptx
pestel analysis ppt for classwork .pptx
 
ENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSIS
ENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSISENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSIS
ENVIRONMENTAL ‎ANALYSIS & SWOT ‎ANALYSIS
 
Pestel analysis
Pestel analysisPestel analysis
Pestel analysis
 
Pest Analysis
Pest AnalysisPest Analysis
Pest Analysis
 
Assignment 1 elements
Assignment 1 elementsAssignment 1 elements
Assignment 1 elements
 
Business environment
Business environmentBusiness environment
Business environment
 
Business environment and ethics2
Business environment and ethics2Business environment and ethics2
Business environment and ethics2
 
P E S T E L ANALYSIS
P E S T E L            ANALYSISP E S T E L            ANALYSIS
P E S T E L ANALYSIS
 
BUSI.ENV UNIT 1 (1).pptx
BUSI.ENV UNIT 1 (1).pptxBUSI.ENV UNIT 1 (1).pptx
BUSI.ENV UNIT 1 (1).pptx
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction
 
External environmental analysis
External environmental analysis External environmental analysis
External environmental analysis
 
International marketing slept analysis
International marketing slept analysisInternational marketing slept analysis
International marketing slept analysis
 
Bm 1.5 External Environment
Bm 1.5 External EnvironmentBm 1.5 External Environment
Bm 1.5 External Environment
 
Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...Convergence-based Approach for Managing Operational Risk and Security In Toda...
Convergence-based Approach for Managing Operational Risk and Security In Toda...
 
environmental-forecasting.pptx
environmental-forecasting.pptxenvironmental-forecasting.pptx
environmental-forecasting.pptx
 
environmental-forecasting.pptx
environmental-forecasting.pptxenvironmental-forecasting.pptx
environmental-forecasting.pptx
 
Politics Has an Impact on the Business Environment.pdf
Politics Has an Impact on the Business Environment.pdfPolitics Has an Impact on the Business Environment.pdf
Politics Has an Impact on the Business Environment.pdf
 

More from Davide De Bella

Four level teaching approach in Security market
Four level teaching approach in Security marketFour level teaching approach in Security market
Four level teaching approach in Security market
Davide De Bella
 
Vicon net centralizzazione tvcc per i blocchi penitenziari
Vicon net   centralizzazione tvcc per i blocchi penitenziariVicon net   centralizzazione tvcc per i blocchi penitenziari
Vicon net centralizzazione tvcc per i blocchi penitenziari
Davide De Bella
 
Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...
Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...
Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...
Davide De Bella
 
Sistemi di sicurezza integrati
Sistemi di sicurezza integratiSistemi di sicurezza integrati
Sistemi di sicurezza integratiDavide De Bella
 
REATIL: Libertà in sicurezza
REATIL: Libertà in sicurezzaREATIL: Libertà in sicurezza
REATIL: Libertà in sicurezza
Davide De Bella
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settings
Davide De Bella
 
Scout Speed: Rilevamento dinamico a supporto della sicurezza stradale
Scout Speed: Rilevamento dinamico a supporto della sicurezza stradaleScout Speed: Rilevamento dinamico a supporto della sicurezza stradale
Scout Speed: Rilevamento dinamico a supporto della sicurezza stradale
Davide De Bella
 
Guida pratica alla scelta delle apparecchiature video
Guida pratica alla scelta delle apparecchiature videoGuida pratica alla scelta delle apparecchiature video
Guida pratica alla scelta delle apparecchiature video
Davide De Bella
 
Mart per Vicon
Mart per ViconMart per Vicon
Mart per Vicon
Davide De Bella
 
Access control abroad company for italian market
Access control abroad company for italian marketAccess control abroad company for italian market
Access control abroad company for italian market
Davide De Bella
 
SMART: Servizio Monitoraggio Aree a Rischio del Territorio
SMART: Servizio Monitoraggio Aree a Rischio del TerritorioSMART: Servizio Monitoraggio Aree a Rischio del Territorio
SMART: Servizio Monitoraggio Aree a Rischio del Territorio
Davide De Bella
 
Life Cycle Costings
Life Cycle CostingsLife Cycle Costings
Life Cycle Costings
Davide De Bella
 

More from Davide De Bella (13)

Four level teaching approach in Security market
Four level teaching approach in Security marketFour level teaching approach in Security market
Four level teaching approach in Security market
 
Tips and tricks
Tips and tricksTips and tricks
Tips and tricks
 
Vicon net centralizzazione tvcc per i blocchi penitenziari
Vicon net   centralizzazione tvcc per i blocchi penitenziariVicon net   centralizzazione tvcc per i blocchi penitenziari
Vicon net centralizzazione tvcc per i blocchi penitenziari
 
Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...
Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...
Evoluzione dei sistemi TVCC analogici verso l’architettura IP: roll-out, time...
 
Sistemi di sicurezza integrati
Sistemi di sicurezza integratiSistemi di sicurezza integrati
Sistemi di sicurezza integrati
 
REATIL: Libertà in sicurezza
REATIL: Libertà in sicurezzaREATIL: Libertà in sicurezza
REATIL: Libertà in sicurezza
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settings
 
Scout Speed: Rilevamento dinamico a supporto della sicurezza stradale
Scout Speed: Rilevamento dinamico a supporto della sicurezza stradaleScout Speed: Rilevamento dinamico a supporto della sicurezza stradale
Scout Speed: Rilevamento dinamico a supporto della sicurezza stradale
 
Guida pratica alla scelta delle apparecchiature video
Guida pratica alla scelta delle apparecchiature videoGuida pratica alla scelta delle apparecchiature video
Guida pratica alla scelta delle apparecchiature video
 
Mart per Vicon
Mart per ViconMart per Vicon
Mart per Vicon
 
Access control abroad company for italian market
Access control abroad company for italian marketAccess control abroad company for italian market
Access control abroad company for italian market
 
SMART: Servizio Monitoraggio Aree a Rischio del Territorio
SMART: Servizio Monitoraggio Aree a Rischio del TerritorioSMART: Servizio Monitoraggio Aree a Rischio del Territorio
SMART: Servizio Monitoraggio Aree a Rischio del Territorio
 
Life Cycle Costings
Life Cycle CostingsLife Cycle Costings
Life Cycle Costings
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 

PEST Analysis for Security

  • 1. This short white paper to analyze how a marketing model, could be an effective model for Security Manager to audit their Security Procedures. Starting from this approach, is possible creating a system useful to collect any information divided by “specialty” or: P=political, E=economic, S=social, T=technological and.. plan adequate actions. Before continuing in my explanation a brief overview for who’s never heard “PEST analysis”. Following lines are available on Wikipedia: Political factors are basically to what degree the government intervenes in the economy. Specifically, political factors include areas such as tax policy, labor law,environmental law, trade restrictions, tariffs, and political stability. Political factors may also include goods and services which the government wants to provide or be provided (merit goods) and those that the government does not want to be provided (demerit goods or merit bad). Furthermore, governments have great influence on the health,education, and infrastructure of a nation. Economic factors include economic growth, interest rates, exchange rates and the inflation rate. These factors have major impacts on how businesses operate and make decisions. For example, interest rates affect a firm's cost of capital and therefore to what extent a business grows and expands. Exchange rates affect the costs of exporting goods and the supply and price of imported goods in an economy Social factors include the cultural aspects and include health consciousness, population growth rate, age distribution, career attitudes and emphasis on safety. Trends in social factors affect the demand for a company's products and how that company operates. For example, an aging population may imply a smaller and less-willing workforce (thus increasing the cost of labor). Furthermore, companies may change various management strategies to adapt to these social trends (such as recruiting older workers). Technological factors include technological aspects such as R&D activity, automation, technology incentives and the rate of technological change. They can determinebarriers to entry, minimum efficient production level and influence outsourcing decisions. Furthermore, technological shifts can affect costs, quality, and lead to innovation. Now, how could be useful this approach to manage security in a plant or a mall or a strategic infrastructures? Well, let’s go Political What will happen if tomorrow your company has to change one or more labor agreements reducing or change something? What will happen if your company won’t be able to make the whole production for changes in local or national laws? Economic Have you considered that your workforce population’s salary could be not quite aligned with the cost of life? What will happen if your company has to cancel benefits and bonus because it’s in for economic situation?
  • 2. Social Temporary workers can create an unstable environment? A restrained generational change can modify in habits and in not written rules inside at the workforce population? Technological May new and modern process introduce barriers or discrimination for somebody in workforce population? Now how approach this method in a structured and measurable way? We have to study every P.E.S.T. point through SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats) in order to understand what phenomena weight more than the others. Just an example could be: my strength point is the access control, who manages every entry and every person. But my weakness happens when I have a fire alarm because all emergency ways are opened and uncontrolled so everybody can pick some goods hiding them in some part of the plant. So, when will I have to be worried? When Threat starts. And When will threat start? Threat will start (PEST) when company hires temporary people, when part of workforce population’s salary is not aligned with inflation, when some part of workforce population won’t be able to work in to the plant because part of production has been automated and so on. What’re our opportunities? Well, identified our threats for every point of PEST, we have the opportunity to plan accurate reactions before threat starts or alternatively you can contain damages during or after the event. So, to conclude: 1. Make a SWOT analysis for every word of PEST 2. Correlate these information to collect every threat who influences the same weakness and how every strength point can mitigate or eliminate several threats 3. Build a weekly questionnaire to monitor how PEST phenomena can become a threat 4. Finally the opportunity to plan investment and update procedures…beforehand