Seasoned Protection Professional with the business acumen and breadth of experience in multiple disciplines to successfully merge security oversight, emergency preparedness, crisis management, and business continuity into a holistic corporate protection program that is both practical and profitable. Unique approach consolidates efforts, reduces costs, ensures harmony, manages risks, and is simpler to implement than traditional stovepiped protection programs. ASIS Certified in Executive Protection.
Patric K. Toler has over 23 years of experience in executive-level corporate and military security roles. He currently serves as the Director of Security for BAE Systems, where he oversees security programs and a staff of 9 professionals. Prior to this role, he held security management positions at BAE Systems and United States Strategic Command, where he developed and implemented comprehensive security programs. He has a Master's degree in Security Management and Bachelor's degrees in Criminal Justice.
The document defines key risk management terminology such as risk register, risk, risk management, risk appetite, risk owner, risk matrix, and risk vulnerability. It also outlines the risk management process recommended by PRINCE2 and lists common risk categories and responses to risks. Finally, it provides guidance on developing an ICT risk register, including understanding objectives, identifying risks, documenting the risk register, and getting approval.
The document discusses physical security systems and security management systems. It provides information on the goals of physical security systems, which are to employ security in depth through deterrence, detection, assessment, delay, and response. It then describes key aspects of a security management system, including identifying assets and risks, analyzing vulnerabilities, evaluating risk, analyzing improvements, and making recommendations. The document argues that a security management system provides benefits like reducing losses and costs while protecting reputation, and that senior management commitment is important for sustainability.
This document summarizes a presentation on risk management 101. It defines key terms like threat, vulnerability, risk, and types of risk. It outlines the components of risk management frameworks including identifying threats, assessing risk, evaluating options, and taking action. It discusses different risk management standards and frameworks. Finally, it provides an overview of information risk management practices at the Minnesota Department of Human Services.
This document provides an overview of security risk management. It discusses reactive versus proactive approaches, and quantitative versus qualitative risk prioritization. The key steps of the security risk management process include assessing risks, conducting decision support, implementing controls, and measuring effectiveness. When assessing risks, organizations should plan the assessment, gather data through facilitated discussions, and prioritize risks. Both quantitative and qualitative approaches have benefits and drawbacks.
Risk management is important for construction projects. It involves identifying potential risks, assessing their likelihood and consequences, and developing responses to manage risks. The risk management process includes four steps: identifying hazards, assessing risks, controlling risks, and monitoring control measures. It aims to reduce the probability or impact of negative events. Key risks in construction relate to costs, time, and quality going over budget or being delayed. Risk management benefits projects by improving decision making and providing clear understanding of risks.
Seasoned Protection Professional with the business acumen and breadth of experience in multiple disciplines to successfully merge security oversight, emergency preparedness, crisis management, and business continuity into a holistic corporate protection program that is both practical and profitable. Unique approach consolidates efforts, reduces costs, ensures harmony, manages risks, and is simpler to implement than traditional stovepiped protection programs. ASIS Certified in Executive Protection.
Patric K. Toler has over 23 years of experience in executive-level corporate and military security roles. He currently serves as the Director of Security for BAE Systems, where he oversees security programs and a staff of 9 professionals. Prior to this role, he held security management positions at BAE Systems and United States Strategic Command, where he developed and implemented comprehensive security programs. He has a Master's degree in Security Management and Bachelor's degrees in Criminal Justice.
The document defines key risk management terminology such as risk register, risk, risk management, risk appetite, risk owner, risk matrix, and risk vulnerability. It also outlines the risk management process recommended by PRINCE2 and lists common risk categories and responses to risks. Finally, it provides guidance on developing an ICT risk register, including understanding objectives, identifying risks, documenting the risk register, and getting approval.
The document discusses physical security systems and security management systems. It provides information on the goals of physical security systems, which are to employ security in depth through deterrence, detection, assessment, delay, and response. It then describes key aspects of a security management system, including identifying assets and risks, analyzing vulnerabilities, evaluating risk, analyzing improvements, and making recommendations. The document argues that a security management system provides benefits like reducing losses and costs while protecting reputation, and that senior management commitment is important for sustainability.
This document summarizes a presentation on risk management 101. It defines key terms like threat, vulnerability, risk, and types of risk. It outlines the components of risk management frameworks including identifying threats, assessing risk, evaluating options, and taking action. It discusses different risk management standards and frameworks. Finally, it provides an overview of information risk management practices at the Minnesota Department of Human Services.
This document provides an overview of security risk management. It discusses reactive versus proactive approaches, and quantitative versus qualitative risk prioritization. The key steps of the security risk management process include assessing risks, conducting decision support, implementing controls, and measuring effectiveness. When assessing risks, organizations should plan the assessment, gather data through facilitated discussions, and prioritize risks. Both quantitative and qualitative approaches have benefits and drawbacks.
Risk management is important for construction projects. It involves identifying potential risks, assessing their likelihood and consequences, and developing responses to manage risks. The risk management process includes four steps: identifying hazards, assessing risks, controlling risks, and monitoring control measures. It aims to reduce the probability or impact of negative events. Key risks in construction relate to costs, time, and quality going over budget or being delayed. Risk management benefits projects by improving decision making and providing clear understanding of risks.
This document discusses disaster recovery planning for healthcare organizations. It provides an overview of key disaster recovery planning concepts and terms. It also outlines considerations for developing a disaster recovery plan, including evaluating risks, defining risk tolerance, developing roles and responsibilities, scenario planning, data backup and recovery, and documentation. The document discusses how disaster recovery planning fits within broader business continuity planning and presents a methodology for a full business continuity program that incorporates disaster recovery. It also covers current trends and standards related to disaster recovery planning.
The document outlines an agenda for a risk management workshop being conducted by PT. Berau Coal, including introducing risk management terms and methodologies, providing an understanding of the need for risk management, and introducing a Risk Assessment Methodology to be adopted. Objectives of the workshop are to familiarize key personnel with risk assessment principles and ensure they can perform risk assessments for operations. The workshop will cover topics such as hazard identification, risk assessment methodologies, and PT. Berau Coal's specific risk assessment procedure.
The document discusses risk management and risk transfer. It defines key terms like risk, risk management, and risk transfer. It outlines different risk categories and techniques for managing risk, including risk retention, insurance, and other methods. It emphasizes that a multi-pronged approach to risk management is most effective, using techniques like risk identification, analysis, control, and monitoring. The presentation aims to explain why risk management is important and how integrating different risk transfer and control strategies can benefit organizations.
This document describes the risk assessment and risk treatment process used by Riesgo Risk Management's ISO27001 compliance tool. It involves projects submitting initial surveys that are scored as low, medium, or high risk. Medium and high risk projects undergo further assessment by an information security team. They identify project risks and information assets, conduct business impact assessments, and update risk registers with mitigation actions. Dashboards provide visibility into projects, assets, policies, and overall risk management. The tool aims to facilitate remote risk assessment and compliance for organizations.
Don’t wait for Disaster to Strike! Be Prepared with Business Continuity Plans SRIIA Technologies, Inc.
The document provides information on developing business continuity plans (BCPs). It discusses that a BCP includes planning for non-IT aspects of a business to continue operating during and after a disaster, including facilities, personnel and communications. The presentation covers the components of an effective BCP, such as identifying critical business processes and resources, creating recovery teams and procedures, and testing the plan annually. It emphasizes the importance of having alternative sites, backup systems and preventative measures in place to ensure business operations can continue despite disruptions.
This document discusses crisis management and disaster recovery. It outlines the importance of being prepared for disasters through business continuity planning and management. This includes performing risk analysis, developing recovery strategies, and testing plans through exercises. The presentation emphasizes establishing command and control centers to facilitate coordinated response efforts and communication across various safety and security functions during incidents. It also highlights the value of a unified approach and integrated solutions for comprehensive crisis management response.
What do we really need to protect a business from risk?
The COVID-19 pandemic has put risk management in a spotlight. Looking at leading risk indicators, incidences and reproduction figures have become commonplace among the general population.
Even though the success of the selected risk strategies can only be assessed in a few years, it has already become clear that risk management must take a holistic approach.
To effectively manage risk, companies need to be able to not only monitor risks but also respond.
To learn more, visit: https://bit.ly/3ypENF0
The presentation about Project Risk Management conducted by Mr. Mohamad Boukhari for the project management community in Lebanon during PMI Lebanon Chapter monthly lecture.
Risk management is important for public sector organizations to address uncertainties and help achieve objectives. There are challenges like balancing priorities across different services with increased public involvement. A successful risk management program looks at operational, strategic, corporate and performance aspects holistically. It is important to distinguish between operational risks affecting short term goals and strategic risks impacting long term objectives.
It is widely accepted that risk is calculated by multiplying the impact of an event by its probability of occurrence. Here, Hernan Huwyler has a look at some alternatives for measuring risk and how they fit into the day-to-day risk management framework. This article is aimed at clarifying common definitions and specific benefits of additional dimensions for measuring risks. It allows customization of risk methodology and registry to accommodate wider stakeholders’ needs.
Risk velocity refers to the time elapsed from the event occurrence until the performance is impacted by a gain or a loss. It assesses how fast the chain of events will actually affect the business, in other words, the speed of onset. For instance, a high-risk velocity is a situation in which the consequences are immediately reflected into the business objectives such as a fire, an earthquake and many other natural hazards.
Risk vulnerability refers to the tendency of assets to be affected by risks. It assesses how well the assets of a company are prepared to react to risks, including the mitigation plans and the crisis management skills. This variable is highly popular in information security, health and disaster risk assessments.
Risk control effectiveness refers to how effectively the underlying processes and assets are controlled by the company. For instance, a robust control and compliance environment helps in the effectiveness of risk management plans. High effectiveness reduces the probability
Risk preparedness refers to how effectively the company reacts once an event occurs, for instance by having implemented contingency plans, cost and schedule reserves or incident management tools. This dimension assesses the capacity to respond to and recover from a risk event. It measures the ex-ante investments in implementing early warnings, emergency and contingency measures and business continuity plans. High preparedness reduces the impact of a risk, particularly for high-velocity risks.
Risk volatility refers to the stability of a risk over time, which makes its measurement difficult. The nature of emerging risks and unfamiliarity with new and undefined risk factors increases volatility. For instance, ever-changing compliance regulations increase the risk of receiving sanctions and litigation. Risks cannot be properly modelled and measured when the volatility in their factors is high to extreme.
Risk programs adapt expeditiously in a more uncertain and volatile world. In this context, enterprise risk management should improve the continuous process to predict how the reputational and financial performance will be impacted by different variables. Risk managers should be pragmatic when deciding what dimensions are cost-effective to support the decision-making process of their companies
This document outlines a presentation on risk management fundamentals given by the Federal Aviation Administration. It introduces the topic of risk management and defines key terms like hazard, risk, risk assessment, and risk control. It explains the importance of identifying hazards and assessing risk using a risk matrix to determine risk levels. Finally, it details the five steps of the risk management process: identify hazards, assess risk, make risk decisions, implement controls, and monitor the effectiveness of controls. The overall goal is to provide a framework for integrating risk management into an organization to make safer decisions.
Engr. Insaf Ali has worked as a project engineer on several projects. Risk management is defined as systematically identifying, analyzing, and responding to project risks to maximize positive events and minimize negative events. There are two views on how to define risk - as either encompassing both opportunities and threats, or defining risk exclusively as a threat while seeing opportunities as distinct. Effective risk management involves identifying risks, assessing their probability and impact, developing responses, implementing those responses, and providing feedback.
Risk management is a key to success, it is about escaping threats and maximising opportunities. M_o_R framework includes principles, approach, process, embedding and reviewing M_o_R. This is a very brief introduction to M_o_R risk management.
This document provides an overview of risk management. It discusses the role of employees in risk management as the "first line of defense" and "eyes and ears" of the organization. It describes unusual occurrences and critical incidents as methods to capture risks, with the goal of reporting and learning. The risk management framework involves risk assessment, profiling organizational risks, and mitigating risks. Effective risk management is a shared responsibility requiring engagement from all levels of an organization through communication in a risk network.
This document discusses project risk management. It defines risk management as actively managing risks on a project with the goal of being proactive rather than reactive. The key aspects of risk management covered are identifying risks, performing qualitative and quantitative risk analysis to rank risks, and planning risk responses to deal with risks if they occur. Tools for risk management include risk breakdown structures to organize risks, risk profiling to assess common risk areas, and maintaining a risk register to track identified risks and responses. Stakeholder involvement and clear documentation are important parts of establishing an effective risk management plan.
Risk Based Security Management (RBSM) is defined as applying rigorous analytical techniques to evaluate risks impacting an organization's information assets and infrastructure. RBSM involves identifying important assets and risks, collecting relevant data, performing risk assessments to analyze probabilities and impacts, presenting results to the organization, identifying control objectives to minimize risks, selecting and implementing controls, monitoring controls, and repeating the process as the environment changes. Glintt's RBSM managed services approach creates an environment for informed choices by analyzing threat frequencies and vulnerabilities cyclically with feedback to continuously learn and challenge assumptions.
This document provides a risk management plan for the construction of a shopping mall project. It identifies major risks such as political, economic, natural disaster risks. It describes the risk management process from risk identification to completion. Key risks identified include cost overruns, staff unavailability, and stakeholder responses. The plan outlines risk monitoring and management approaches, including using a building management system to monitor technical systems and focus on risk points. It will be revised monthly. The goal is to identify and reduce risks that could negatively impact the project.
This document provides an overview of project risk management processes. It discusses the six key processes: plan risk management, identify risks, perform qualitative risk analysis, perform quantitative risk analysis, plan risk responses, and control risks. For each process, it provides a brief explanation of why the process is performed and how it is conducted. The document also includes diagrams illustrating the flow and interactions between the different risk management processes.
Risk identification provides the foundation for risk management. There are various methods to identify risks such as preparing checklists, conducting on-site inspections, analyzing financial statements, creating flow charts, and interacting with employees. Sources of risk can be internal or external and come from a company's environments. Risk exposures include physical asset exposures, financial asset exposures, liability exposures, and human asset exposures. Traditional risk identification observes past losses while modern approaches identify risks before losses occur using tools like risk analysis questionnaires, financial statement analysis, flow charts, on-site inspections, interactions with other departments, contract analysis, and statistical records.
Provided litigation support for personal injury and
workers’ compensation cases. Assisted with case
development, discovery, depositions, mediations and trials.
My "graphic CV" is a .pdf document that contains some basic resume-like biographical information, but also highlights some speaking engagements, etc aligning with the work I do in the behavioral threat assessment and management space.
This document provides a summary of John J. Steiner's background and experience. It outlines his current Secret security clearance and past clearances. It then lists his 23+ years of experience in program analysis, management, force protection, security, emergency management, and leadership development for the military and private sector. Finally, it provides details of his employment history, highlighting roles in training development, program management, physical security, health and safety coordination, and communications support for the Navy.
This document discusses disaster recovery planning for healthcare organizations. It provides an overview of key disaster recovery planning concepts and terms. It also outlines considerations for developing a disaster recovery plan, including evaluating risks, defining risk tolerance, developing roles and responsibilities, scenario planning, data backup and recovery, and documentation. The document discusses how disaster recovery planning fits within broader business continuity planning and presents a methodology for a full business continuity program that incorporates disaster recovery. It also covers current trends and standards related to disaster recovery planning.
The document outlines an agenda for a risk management workshop being conducted by PT. Berau Coal, including introducing risk management terms and methodologies, providing an understanding of the need for risk management, and introducing a Risk Assessment Methodology to be adopted. Objectives of the workshop are to familiarize key personnel with risk assessment principles and ensure they can perform risk assessments for operations. The workshop will cover topics such as hazard identification, risk assessment methodologies, and PT. Berau Coal's specific risk assessment procedure.
The document discusses risk management and risk transfer. It defines key terms like risk, risk management, and risk transfer. It outlines different risk categories and techniques for managing risk, including risk retention, insurance, and other methods. It emphasizes that a multi-pronged approach to risk management is most effective, using techniques like risk identification, analysis, control, and monitoring. The presentation aims to explain why risk management is important and how integrating different risk transfer and control strategies can benefit organizations.
This document describes the risk assessment and risk treatment process used by Riesgo Risk Management's ISO27001 compliance tool. It involves projects submitting initial surveys that are scored as low, medium, or high risk. Medium and high risk projects undergo further assessment by an information security team. They identify project risks and information assets, conduct business impact assessments, and update risk registers with mitigation actions. Dashboards provide visibility into projects, assets, policies, and overall risk management. The tool aims to facilitate remote risk assessment and compliance for organizations.
Don’t wait for Disaster to Strike! Be Prepared with Business Continuity Plans SRIIA Technologies, Inc.
The document provides information on developing business continuity plans (BCPs). It discusses that a BCP includes planning for non-IT aspects of a business to continue operating during and after a disaster, including facilities, personnel and communications. The presentation covers the components of an effective BCP, such as identifying critical business processes and resources, creating recovery teams and procedures, and testing the plan annually. It emphasizes the importance of having alternative sites, backup systems and preventative measures in place to ensure business operations can continue despite disruptions.
This document discusses crisis management and disaster recovery. It outlines the importance of being prepared for disasters through business continuity planning and management. This includes performing risk analysis, developing recovery strategies, and testing plans through exercises. The presentation emphasizes establishing command and control centers to facilitate coordinated response efforts and communication across various safety and security functions during incidents. It also highlights the value of a unified approach and integrated solutions for comprehensive crisis management response.
What do we really need to protect a business from risk?
The COVID-19 pandemic has put risk management in a spotlight. Looking at leading risk indicators, incidences and reproduction figures have become commonplace among the general population.
Even though the success of the selected risk strategies can only be assessed in a few years, it has already become clear that risk management must take a holistic approach.
To effectively manage risk, companies need to be able to not only monitor risks but also respond.
To learn more, visit: https://bit.ly/3ypENF0
The presentation about Project Risk Management conducted by Mr. Mohamad Boukhari for the project management community in Lebanon during PMI Lebanon Chapter monthly lecture.
Risk management is important for public sector organizations to address uncertainties and help achieve objectives. There are challenges like balancing priorities across different services with increased public involvement. A successful risk management program looks at operational, strategic, corporate and performance aspects holistically. It is important to distinguish between operational risks affecting short term goals and strategic risks impacting long term objectives.
It is widely accepted that risk is calculated by multiplying the impact of an event by its probability of occurrence. Here, Hernan Huwyler has a look at some alternatives for measuring risk and how they fit into the day-to-day risk management framework. This article is aimed at clarifying common definitions and specific benefits of additional dimensions for measuring risks. It allows customization of risk methodology and registry to accommodate wider stakeholders’ needs.
Risk velocity refers to the time elapsed from the event occurrence until the performance is impacted by a gain or a loss. It assesses how fast the chain of events will actually affect the business, in other words, the speed of onset. For instance, a high-risk velocity is a situation in which the consequences are immediately reflected into the business objectives such as a fire, an earthquake and many other natural hazards.
Risk vulnerability refers to the tendency of assets to be affected by risks. It assesses how well the assets of a company are prepared to react to risks, including the mitigation plans and the crisis management skills. This variable is highly popular in information security, health and disaster risk assessments.
Risk control effectiveness refers to how effectively the underlying processes and assets are controlled by the company. For instance, a robust control and compliance environment helps in the effectiveness of risk management plans. High effectiveness reduces the probability
Risk preparedness refers to how effectively the company reacts once an event occurs, for instance by having implemented contingency plans, cost and schedule reserves or incident management tools. This dimension assesses the capacity to respond to and recover from a risk event. It measures the ex-ante investments in implementing early warnings, emergency and contingency measures and business continuity plans. High preparedness reduces the impact of a risk, particularly for high-velocity risks.
Risk volatility refers to the stability of a risk over time, which makes its measurement difficult. The nature of emerging risks and unfamiliarity with new and undefined risk factors increases volatility. For instance, ever-changing compliance regulations increase the risk of receiving sanctions and litigation. Risks cannot be properly modelled and measured when the volatility in their factors is high to extreme.
Risk programs adapt expeditiously in a more uncertain and volatile world. In this context, enterprise risk management should improve the continuous process to predict how the reputational and financial performance will be impacted by different variables. Risk managers should be pragmatic when deciding what dimensions are cost-effective to support the decision-making process of their companies
This document outlines a presentation on risk management fundamentals given by the Federal Aviation Administration. It introduces the topic of risk management and defines key terms like hazard, risk, risk assessment, and risk control. It explains the importance of identifying hazards and assessing risk using a risk matrix to determine risk levels. Finally, it details the five steps of the risk management process: identify hazards, assess risk, make risk decisions, implement controls, and monitor the effectiveness of controls. The overall goal is to provide a framework for integrating risk management into an organization to make safer decisions.
Engr. Insaf Ali has worked as a project engineer on several projects. Risk management is defined as systematically identifying, analyzing, and responding to project risks to maximize positive events and minimize negative events. There are two views on how to define risk - as either encompassing both opportunities and threats, or defining risk exclusively as a threat while seeing opportunities as distinct. Effective risk management involves identifying risks, assessing their probability and impact, developing responses, implementing those responses, and providing feedback.
Risk management is a key to success, it is about escaping threats and maximising opportunities. M_o_R framework includes principles, approach, process, embedding and reviewing M_o_R. This is a very brief introduction to M_o_R risk management.
This document provides an overview of risk management. It discusses the role of employees in risk management as the "first line of defense" and "eyes and ears" of the organization. It describes unusual occurrences and critical incidents as methods to capture risks, with the goal of reporting and learning. The risk management framework involves risk assessment, profiling organizational risks, and mitigating risks. Effective risk management is a shared responsibility requiring engagement from all levels of an organization through communication in a risk network.
This document discusses project risk management. It defines risk management as actively managing risks on a project with the goal of being proactive rather than reactive. The key aspects of risk management covered are identifying risks, performing qualitative and quantitative risk analysis to rank risks, and planning risk responses to deal with risks if they occur. Tools for risk management include risk breakdown structures to organize risks, risk profiling to assess common risk areas, and maintaining a risk register to track identified risks and responses. Stakeholder involvement and clear documentation are important parts of establishing an effective risk management plan.
Risk Based Security Management (RBSM) is defined as applying rigorous analytical techniques to evaluate risks impacting an organization's information assets and infrastructure. RBSM involves identifying important assets and risks, collecting relevant data, performing risk assessments to analyze probabilities and impacts, presenting results to the organization, identifying control objectives to minimize risks, selecting and implementing controls, monitoring controls, and repeating the process as the environment changes. Glintt's RBSM managed services approach creates an environment for informed choices by analyzing threat frequencies and vulnerabilities cyclically with feedback to continuously learn and challenge assumptions.
This document provides a risk management plan for the construction of a shopping mall project. It identifies major risks such as political, economic, natural disaster risks. It describes the risk management process from risk identification to completion. Key risks identified include cost overruns, staff unavailability, and stakeholder responses. The plan outlines risk monitoring and management approaches, including using a building management system to monitor technical systems and focus on risk points. It will be revised monthly. The goal is to identify and reduce risks that could negatively impact the project.
This document provides an overview of project risk management processes. It discusses the six key processes: plan risk management, identify risks, perform qualitative risk analysis, perform quantitative risk analysis, plan risk responses, and control risks. For each process, it provides a brief explanation of why the process is performed and how it is conducted. The document also includes diagrams illustrating the flow and interactions between the different risk management processes.
Risk identification provides the foundation for risk management. There are various methods to identify risks such as preparing checklists, conducting on-site inspections, analyzing financial statements, creating flow charts, and interacting with employees. Sources of risk can be internal or external and come from a company's environments. Risk exposures include physical asset exposures, financial asset exposures, liability exposures, and human asset exposures. Traditional risk identification observes past losses while modern approaches identify risks before losses occur using tools like risk analysis questionnaires, financial statement analysis, flow charts, on-site inspections, interactions with other departments, contract analysis, and statistical records.
Provided litigation support for personal injury and
workers’ compensation cases. Assisted with case
development, discovery, depositions, mediations and trials.
My "graphic CV" is a .pdf document that contains some basic resume-like biographical information, but also highlights some speaking engagements, etc aligning with the work I do in the behavioral threat assessment and management space.
This document provides a summary of John J. Steiner's background and experience. It outlines his current Secret security clearance and past clearances. It then lists his 23+ years of experience in program analysis, management, force protection, security, emergency management, and leadership development for the military and private sector. Finally, it provides details of his employment history, highlighting roles in training development, program management, physical security, health and safety coordination, and communications support for the Navy.
Jeff Daily - Professional Security Resume 2015Jeff Daily
Jeffrey Daily is a security operations professional with over 15 years of experience in criminal investigations, counterterrorism operations, and security management domestically and internationally. He has held roles such as Investigations Manager, Security Officer for the US Air Force and Department of State, Deputy Chief of Security for the CIA in Africa, and Special Agent for the CIA. Daily has a Master's degree in Criminal Justice and multiple security and investigative certifications. He possesses strong leadership, critical thinking, and problem-solving skills and has received numerous performance awards.
Weston Sterling has over 12 years of experience in security management and leadership roles in healthcare facilities. He has expertise in standardizing security processes, staff training, and implementing new programs. As Interim Security Manager, he oversaw security operations at four healthcare facilities, ensuring regulatory compliance and collaborating with law enforcement on investigations. Sterling strives to create a proactive security culture through effective collaboration and continuous improvement of procedures.
Frank C. Dupuy is a global loss prevention executive with over 20 years of experience managing security programs around the world. He has implemented strategies to improve risk management and loss prevention for companies in North America and Latin America. His areas of expertise include corporate security, employee protection, investigations, and strategic planning. He currently works as the President of Agincourt International Security Management, where he provides executive consulting services to multinational companies.
Michelle Ogan has over 15 years of experience in security consulting, personnel security, and federal investigations. She has a Top Secret security clearance and is certified in facility security management. Currently, she works as a security consultant providing expertise on security programs. Previously, she served for 6 years as the Facility Security Officer for a government contractor, where she managed all security operations according to federal requirements. She also has experience adjudicating security clearances and supervising background investigation teams.
Nathan Peterson has over 15 years of experience in industrial safety in a variety of sectors such as oil and gas, construction, and manufacturing. He holds a Certificate in Occupational Health and Safety from the University of New Brunswick and is a National Construction Safety Officer. Peterson has experience managing safety for turnarounds and shutdowns, developing and implementing safety programs, conducting inspections and investigations, and ensuring compliance with regulations. He is proficient in Microsoft Office and safety software programs.
Keith D. Ford is a highly skilled intelligence analyst and security specialist with over 15 years of experience in investigations, protective services, and intelligence analysis. He currently works as an intelligence analyst for STOPSO, where he assesses intelligence and produces reports. Previously he managed security programs for Securitas and planned protective operations as a special agent for the U.S. Army. He has extensive experience supervising teams, conducting investigations and assessments, and advising leadership. Ford has a track record of successfully protecting high-level officials and plans complex security operations.
This document is a resume for James J. Smith. It summarizes his experience working in security management roles over 20 years, including for JP Morgan Chase, Securitas Security Services, Canon USA, and CA Inc. He has managed security operations with budgets up to $12 million and teams with over 100 employees. His expertise includes security management, crisis management, investigations, and executive protection. He is seeking new opportunities in the security field.
This document is a resume for David Shisk, a security manager and military veteran with over 20 years of experience in security management, training, and community engagement. He has led teams of up to 120 people and managed security departments protecting assets valued at over $1.5 billion. His experience includes directing security for strategic nuclear assets and overseeing training and inspection of security teams. He also has extensive experience in security planning, operations management, and advising executive leadership on security issues.
This document is a resume for Robert Moore, who has over 15 years of experience in environmental, health and safety management roles. His background includes developing safety programs, conducting inspections and audits, accident investigations, emergency response coordination, and ensuring regulatory compliance. He has held safety leadership positions at various energy and chemical companies, overseeing teams of up to 8 direct reports and 360 contractors. Moore has extensive training and certifications in areas such as fire safety, hazardous materials handling, emergency medical response, and Six Sigma.
Jason Rozacky has over 20 years of experience in emergency operations, engineering, law enforcement, safety, and security administration. He can create, implement, and maintain a global, world-class safety and security program to protect employees and customers. Rozacky possesses extensive knowledge in areas such as hazard communication, fall protection, and security training. He has experience developing and implementing global security policies, standards, and procedures to ensure safety and compliance.
- Chris Hedge is seeking a cybersecurity position leveraging 20+ years of IT experience including cyber operations, continuous monitoring, cloud integration, and federal cybersecurity policy experience.
- He has a diverse educational background including multiple associate's, bachelor's and master's degrees. He also has a Top Secret security clearance and retired as a Chief Master Sergeant from the Air Force.
- His career highlights include leadership positions at the Department of Transportation and Department of Homeland Security where he improved cybersecurity postures and compliance with FISMA and oversaw budgets, personnel and critical infrastructure.
This document is a resume for Marco Germain summarizing his professional experience. He has over 10 years of experience in crisis management, corporate security, credit risk analysis, and staff management. Currently he is a Senior Analyst at Deutsche Bank managing crisis incidents that pose physical security threats. Previously he held roles managing credit underwriting departments and was a policy and procedure writer. He is seeking a leadership role in crisis management.
Tom Mardis has over 20 years of experience in safety roles across diverse industries including aerospace, oil and gas, utilities, and construction. As Pipeline Safety Enhancement Plan Safety Manager at Southern California Gas Company, he developed and implemented a comprehensive contractor safety program to support a pipeline replacement project. He has also held safety leadership roles developing programs and training, performing audits and investigations, and maintaining regulatory compliance. Mardis has a construction health and safety technician certification and experience developing and managing occupational health and safety systems.
This document is a resume for James Barner. It summarizes his experience in project management, security, compliance, and investigations over 33 years working for Huntington Ingalls Industries-Newport News Shipbuilding and Northrop Grumman Newport News. He has held several leadership roles, including Classified Information Control Officer and managing over 150 security investigations annually. Barner also has experience in criminal investigations, safety coordination, nonprofit work, and has obtained several certifications in relevant fields. He holds a Bachelor's degree from James Madison University.
M.I.P. Security is a leading security consulting firm that offers strategic security assessments, physical security projects, risk assessment and mitigation, and security training. They have extensive experience working with governments and major corporations around the world. Their team of experts can analyze threats, identify vulnerabilities, and design cost-effective security solutions to meet any organization's protection needs.
Bonita Shanahan has nearly eight years of experience as a Facility Security Officer developing highly effective security programs. She oversees security, asset management, and office staff as FSO and Security Department Manager for Creative Information Technology. Previously, she served as FSO for Jacobs Strategic Solutions Group, establishing security programs based on the National Industrial Security Program Operating Manual for 300 cleared employees. Shanahan maintains Top Secret security clearance and has expertise in security training, document control, vehicle management, and national security requirements.
Ganpati Kumar Choudhary Indian Ethos PPT.pptx, The Dilemma of Green Energy Corporation
Green Energy Corporation, a leading renewable energy company, faces a dilemma: balancing profitability and sustainability. Pressure to scale rapidly has led to ethical concerns, as the company's commitment to sustainable practices is tested by the need to satisfy shareholders and maintain a competitive edge.
Comparing Stability and Sustainability in Agile SystemsRob Healy
Copy of the presentation given at XP2024 based on a research paper.
In this paper we explain wat overwork is and the physical and mental health risks associated with it.
We then explore how overwork relates to system stability and inventory.
Finally there is a call to action for Team Leads / Scrum Masters / Managers to measure and monitor excess work for individual teams.
Specific ServPoints should be tailored for restaurants in all food service segments. Your ServPoints should be the centerpiece of brand delivery training (guest service) and align with your brand position and marketing initiatives, especially in high-labor-cost conditions.
408-784-7371
Foodservice Consulting + Design
Employment PracticesRegulation and Multinational CorporationsRoopaTemkar
Employment PracticesRegulation and Multinational Corporations
Strategic decision making within MNCs constrained or determined by the implementation of laws and codes of practice and by pressure from political actors. Managers in MNCs have to make choices that are shaped by gvmt. intervention and the local economy.
Sethurathnam Ravi: A Legacy in Finance and LeadershipAnjana Josie
Sethurathnam Ravi, also known as S Ravi, is a distinguished Chartered Accountant and former Chairman of the Bombay Stock Exchange (BSE). As the Founder and Managing Partner of Ravi Rajan & Co. LLP, he has made significant contributions to the fields of finance, banking, and corporate governance. His extensive career includes directorships in over 45 major organizations, including LIC, BHEL, and ONGC. With a passion for financial consulting and social issues, S Ravi continues to influence the industry and inspire future leaders.
Make it or Break it - Insights for achieving Product-market fit .pdfResonate Digital
This presentation was used in talks in various startup and SMB events, focusing on achieving product-market fit by prioritizing customer needs over your solution. It stresses the importance of engaging with your target audience directly. It also provides techniques for interviewing customers, leveraging Jobs To Be Done for insights, and refining product positioning and features to drive customer adoption.
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...dsnow9802
Colby Hobson stands out as a dynamic leader in the residential construction industry. With a solid reputation built on his exceptional communication and presentation skills, Colby has proven himself to be an excellent team player, fostering a collaborative and efficient work environment.
Org Design is a core skill to be mastered by management for any successful org change.
Org Topologies™ in its essence is a two-dimensional space with 16 distinctive boxes - atomic organizational archetypes. That space helps you to plot your current operating model by positioning individuals, departments, and teams on the map. This will give a profound understanding of the performance of your value-creating organizational ecosystem.
Addiction to Winning Across Diverse Populations.pdf
Riggan resume july 2016
1. ROBERT DANIEL RIGGAN, CEP
Fredericksburg, VA 22407 — Robert.Riggan@verizon.net — 540.226.6208
Target Position: SECURITY DIRECTOR
SECURITY OVERSIGHT, EMERGENCY PREPAREDNESS, CRISIS MANAGEMENT, BUSINESS CONTINUITY
Seasoned Protection Professional with the business acumen and breadth of experience in multiple disciplines to
successfully merge security oversight, emergency preparedness, crisis management, and business continuity into a
holistic corporate protection program that is both practical and profitable. Unique approach consolidates efforts, reduces
costs, ensures harmony, manages risks, and is simpler to implement than traditional stovepiped protection programs.
ASIS Certified in Executive Protection.
Engineer enterprise-wide, risk-based approach to strategically plan, direct, and coordinate holistic programs in the
protection of executives, employees, customers, guests, facilities, assets, and information
Leverage cross-functional collaboration and employee buy-in to optimize preparedness efforts and foster a safe,
secure, and productive working environment
Spearhead crisis response actions and provide liaison function to law enforcement, emergency response, local
government, and other agencies and entities as applicable
Pioneer collaborative development of viable business continuity and operational contingency plans by line of business
stakeholders and mission essential function leaders
AREAS OF EXPERTISE
Executive Protection Policies, Plans, & Procedures Security Operations
Audits, Evaluations, & Surveys Risk Management Loss Prevention
Efficiency & Quality Control Information Safeguarding Internal Investigations
Education & Training Emergency Management Contingency Planning
Security & Crisis External Liaison Regulatory Compliance Fiscal Budgets & Reports
PROFESSIONAL EXPERIENCE
U.S. DEPARTMENT OF HOMELAND SECURITY, Washington, D.C., November 2010–April 2015
PROGRAM SECURITY OFFICER / SELECTIVE ACQUISITIONS SECURITY MANAGER (GS-14), December 2013–April 2015
SENIOR SPECIAL SECURITY OFFICER (SSO) AND FEDERAL EMERGENCY RESPONSE OFFICIAL (FERO) - all concurrent
positions
Provided Special Access Program security operations support services directly to the Secretary of the Department of
Homeland Security (DHS) and to the Under Secretary for Intelligence & Analysis. Concurrently defined security
parameters, regulatory requirements, and information safeguarding aspects on acquisition requests for proposal and their
subsequent award contracts for the DHS Office of Selective Acquisitions.
Served as security liaison between the White House National Security Committee and the Secretary of DHS
Aided the Special Access Program Chief in review and revision of 3 policy and 2 procedures documents
Directed security and regulatory compliance for 46 contracts; portfolio valuation: $275 million
Audited program files and created corrective action plans for 53 contracts; portfolio valuation: $300 million
Safeguarded highly sensitive information as the Information System Security Manager for 1 closed network
Conducted security education & training for 2 executives and 4 managers on 1 secure communications system
Surpassed 4 peer security managers; selected as #1 performer; awarded monetary and time-off bonuses
PROGRAM MANAGER / SECURITY SPECIALISt (GS-14), July 2012–November 2013
SENIOR SPECIAL SECURITY OFFICER AND FEDERAL EMERGENCY RESPONSE OFFICIAL - all concurrent positions
2. ROBERT DANIEL RIGGAN PAGE 2
Pioneered Sensitive Compartmented Information Facility (SCIF) compliance program for the 3rd
largest Federal
Department. Examined all applicable regulatory guidance including Executive Orders, U.S. Code, Federal Regulations,
Departmental Policies and Instructions, and Technical Standards in the creation of a comprehensive compliance program
including checklists, schedules, corrective action plans, and travel budget projections.
Co-authored the majority of DHS Instruction 121-01-012, the DHS SCI Security Program
Critiqued and edited the DHS HQ SCI Compliance Manual
Organized and launched over 300 regulatory compliance reviews
Trained and mentored 2 Compliance Inspectors
Awarded monetary bonus; sought out to join the Special Access Program Control Office staff
BRANCH CHIEF / SUPERVISORY SECURITY SPECIALIST (GS-14), November 2010–July 2012
SENIOR SPECIAL SECURITY OFFICER AND FEDERAL EMERGENCY RESPONSE OFFICIAL - all concurrent positions
Administered security operations support to DHS’s most critical and active directorate and its associated 24/7/365
National Operations Center. Applied analytical risk management to refocus security efforts. Standardized internal
investigations. Updated plans and procedures. Upgraded security training. Aligned 4 direct reports / subordinate SSOs in
boosting efficiency of response and advancing quality control in their respective security support roles.
Flipped a directorate level, holistic security program from marginal to outstanding in less than 90 days
Established uniform security processes and procedures for 9 classified and 24 sensitive controlled areas
Integrated contingency planning and emergency management into security protocols for 33 areas of responsibility
Delivered initial and annual security training to over 400 operations employees
Strengthened information safeguarding and expedited the investigation and resolution of security incidents
Recognized for accomplishments 7 times with letters of appreciation and with 1 service commendation award
Selected to establish a department-wide sensitive compliance program; laterally moved to facilitate
ALLIED BARTON SECURITY SERVICES
CONTRACTED TO THE FEDERAL DEPOSIT INSURANCE CORPORATION (FDIC)
SENIOR EMERGENCY PREPAREDNESS OFFICER, Arlington, VA, March 2009–November 2010
Officiated as Special Assistant to, and on behalf of, FDIC’s Assistant Director of Security and Emergency Preparedness.
Administered emergency preparedness training and compliance for FDIC’s 2 Headquarters facilities in Washington, D.C.,
1 campus in Arlington, VA, 8 Regional Offices across the U.S., 2 major Field Offices, and 10 alternate sites. Introduced
risk-based approach in contingency planning, emergency management, and incident response protocols.
Reviewed and revised Continuity of Operations, Emergency Action, Devolution, and Pandemic Plans
Created workplace violence awareness and prevention programs instituted in 23 facilities across the country
Built virtual exercises and delivered training to executive leadership at 8 regional and 2 area offices
Overhauled the Emergency Preparedness and Business Continuity programs in less than 6 months
Conducted 19 emergency evacuation and/or fire drills at 3 FDIC facilities within the DC Metro area
USIS, Falls Church, VA, November 2005–February 2008
Security company providing investigative services and cleared personnel to work on classified government contracts
CHIEF SECURITY OFFICER April 2006–February 2008
DIVISION SECURITY DIRECTOR, SENIOR FACILITY SECURITY OFFICER (FSO), AND VIRGINIA DEPARTMENT OF CRIMINAL JUSTICE
SERVICES (DCJS) COMPLIANCE AGENT - all concurrent positions
Directed security operations, emergency preparedness, crisis management, and business continuity for an $850 million
security services corporation comprised of 3 business divisions, 7,500 full-time employees, 2,500 as-needed contractors,
and 43 facilities worldwide. Engineered enterprise-wide, risk-based approach to strategically plan, direct, and coordinate
holistic protection programs in the safeguarding of executives, employees, customers, guests, facilities, assets, and
information. Defined program scope, resources, and funding requirements to carry out the corporate security program.
Ingrained security in day-to-day business, demonstrating its ROI in growing business footprint and in loss prevention.
3. ROBERT DANIEL RIGGAN PAGE 3
Authored USIS’s corporate security policies, plans, and procedures
Collaborated in-depth with Business Development Team; awarded a $300 million, 10 year federal contract
Outsourced up to 6,000 security personnel who served in more than 120 locations across the globe
Shared P&L responsibility with Business Development and Program Managers for 100+ classified contracts
Spearheaded renovation of and accreditation for 3 classified and 1 highly sensitive secure areas
Responded to threats, gathered intelligence, oversaw investigations, and determined corrective actions
Supervised 2 Security Directors, 1 Security Manager, and 6 other direct reports
SECURITY DIRECTOR, PHYSICAL SECURITY DIVISION, November 2005–April 2006
DIVISION FACILITY SECURITY OFFICER AND INFORMATION SYSTEM SECURITY MANAGER - all concurrent positions.
Directed security operations, emergency preparedness, crisis management, and business continuity for the 2nd
largest of
USIS’s 3 business divisions. Engineered enterprise-wide, risk-based approach to strategically plan, direct, and coordinate
holistic protection programs in the protection of executives, employees, customers, guests, facilities, assets, and
information. Defined program scope, resources, and funding requirements to carry out the division security program.
Ingrained security in day-to-day business, demonstrating its ROI in growing business footprint and loss prevention.
Increased number of viable candidates for cleared contractor positions; reduced overall security processing time by
30%
Shared P&L responsibility with Business Development and Program Managers for 100+ classified contracts
Administered security programs for 1 SCIF, 1 SAP, 2 Secure Suites, and multiple controlled areas
Mentored 6 direct reports and 2 mentor/protégé companies in National Industrial Security Program implementation
Passed bi-annual security audits from 3 oversight Agencies
Elevated to first ever Chief Security Officer for USIS
Previous Positions Held: Contractor Positions
USIS, INTELLIGENCE PROGRAM MANAGER, Falls Church, VA, September 2004–November 2005
USIS, INTELLIGENCE WATCH OFFICER, Falls Church, VA, May 2004–September 2004
BETA ANALYTICS INTERNATIONAL, INC, SENIOR PROGRAM PROTECTION ANALYST, Arlington, VA, August 2003–March 2004
EDUCATION
American Military University | Charles Town, WV | Major: Security Management | GPA: 4.0/4.0
More than 50% college coursework completed | Credits Earned: 67 semester hours
SELECTED CONTINUING EDUCATION
Executive Protection, ASIS – July 2015
Security Policies, Principles, and Programs, DSS – April 2014
Alarm and Surveillance System Design and Circumvention Training, DoD – January 2014
Active Shooter: What You Can Do (IS 907), DHS – April 2011
Emergency and Disaster Preparedness, FEMA – March 2011
Continuity of Operations, FEMA – March 2011
Security Architecture and Engineering, Parts 1, 2, and 3, ASIS – September 2007
How to Survive the First 48 Hours of a Disaster, ASIS – September 2007
Realizing the Return on Security Investment, ASIS – September 2007
Suicide Bomber Training, Prince William County Criminal Justice Academy – June 2005
PROFESSIONAL AFFILIATIONS
American Society for Industrial Security, International (ASIS)
Member of: Business Resiliency Consultants USA
Security Industry Professionals
Active Shooter Intervention
4. ROBERT DANIEL RIGGAN PAGE 4
Golden Key International Honor Society
OF NOTE
Passport current; enjoy international and/or domestic travel; possess understanding of multi-national corporations.
Experienced with Microsoft Office products: Excel, Word, Access, PowerPoint, and Microsoft Project.
Seasoned instructor in self-defense including the safe and effective use of firearms and edged weapons.
Former career Marine: Awarded Navy Commendation Medal, 3 Navy Achievement Medals, and 21 lesser awards.
Willing to travel and/or relocate.