SlideShare a Scribd company logo
C-TPAT TRAINING
This is a sample PowerPoint on Security and general Threat Awareness.
All images and clip art were taken from open sources. We suggest you
consider using images of your employees within your faculty. This PowerPoint
is meant to be a guide and should be tailored and edited to suit your needs. It
is also suggested that you use your own slide background and colors scheme.
Security Training and Threat
Awareness Program
for
All Employees
We have recently joined with U.S. Customs and Border
Protection to help secure the international supply
chain. As a member of the Customs-Trade Partnership
Against Terrorism (C-TPAT) program, we have
committed ourselves to new and improved security
procedures throughout our operations. These new
procedures are designed to enhance the security of our
facilities, people, cargo shipping, cargo receiving and
cargo tracking processes. Our goal is to prevent cargo
loss and cargo tampering including the introduction of
illegal merchandise such as drugs and weapons of
mass destruction into our cargo boxes and containers.
As a part of our commitment to supply chain security,
we now require all of our employees to seriously
consider supply chain security as a significant risk to
our business.
Topics
Suspicious Persons
Suspicions Activities
Suspicious Objects or
Packages
Employee Identification
Visitor Controls
Computer Security
Document Security
Suspicious Persons

LOOK FOR…..
• Any person without
an employee
badge, visitor
badge or uniform.
•

These are stock photos, take and use actual photos
of your employees walking down a hallway. Or use
images from a surveillance camera
Suspicious Persons

…and ACT

• Determine if the person is an
employee or a visitor
– If an employee, remind them
always to display their ID
badge and uniform.
– If a visitor, escort them to the
reception area or to the
person with whom they are
visiting.
– Report the incident to your
immediate supervisor.
Suspicious Persons

LOOK FOR…..

Any person in
unauthorized/restricted areas
Suspicious Persons

AND ACT…..
 Get them out of the area
 If a visitor, escort them to the
reception area.
 Report the incident to your
immediate supervisor
Suspicious Persons

Cam 7

1:17:23AM

8/02/06

Look for ….

Any person:
 wearing an overcoat on a
95 degree day, or any kind
of inappropriate clothing
 waiting or loitering in an
area or hallway
 asking for an unknown
department, person or
employee
Suspicious Persons
LOOK FOR….

Any person:
 who seems not to belong
in the area
 going door to door, office
to office
 entering a private office
unescorted
 selling items
 who seems lost
Cam 7

1:17:23AM

8/02/06
Suspicious Persons

LOOK FOR …..

Any person:
 Tampering with somebody’s desk,
boxes, personal items, equipment,
vehicles, cameras, lights…
 running, especially if carrying
something
 hiding
behind doors, fences,
desks, …

Cam 7

1:17:23AM

8/02/06
Suspicious Persons

AND ACT………
 Immediately report the
incident to your
immediate supervisor
LOOK FOR …

Objects obstructing access points

Disconnected or obstructed
cameras

Broken locks or access control
systems

Unexplained clutter or debris

Objects thrown from a vehicle,
especially while traveling at a
high speed.
ACT …
 Immediately report any
suspicious activity to
your supervisor.
Suspicious Objects
or Packages

LOOK FOR….
• Unexplained objects or packages that look
strange or do not belong to the area
• Strange markings on boxes (unknown code,
color) or strange characteristics (weight,
number, odd shape)
• Strange leaking substance (powder, liquid,
etc…)
• Suspicious objects in the middle of an area
(e.g., hallway, lobby, etc.)
Suspicious Objects
or Packages
Suspicious Objects
or Packages

AND ACT………
 Immediately report any
suspicious packages or
objects to your
supervisor, security,
local police, 911 and/or
FBI.
Suspicious Objects
or Packages

•AND ACT…….
Employee Identification


Your Responsibilities
While on company property
 Your
company
identification badge must
be properly displayed and
worn at all times.
 Your company uniform (if
applicable) must be worn at
all times.
 Properly secure and protect
your ID badge, uniform,
keys and access control
card, etc.




Visitor Pre-meeting
Requirements
 Inform your visitor of the
company’s visitor policies
including
photo
identification, check in with
receptionist prior to their
visit.
Visitor Entrance Requirements
 Ensure that your visitor has
logged in and has been
issued a visitor badge




Visitor Escort Requirements
 You must escort your visitors
at ALL times
 Do not leave your visitor
unattended
Visitor Exit Requirements
 Ensure that your visitor has
logged out and has returned
the visitor badge to the
guard or receptionist
Visitor Entrance

Notify
hosting
employee

Document
arrival on
Visitor Log

Check
photo
identification

Issue
visitor
badge

Visitor Exit
Collect
visitor
badge

Document
departure
on Visitor
Log

Use colors and shapes of
you choosing.
Computer Security


Do not share access to your
computer with strangers



Log-off when you leave your
computer



Passwords should be changed
every 60 to 90 days



Do not share your password
with anyone



Do not write down your
password.
Selecting a Password


Use hard-to-guess passwords



Do not use the same password in
more than one place



A password should have a mix of
letters, numbers and symbols


I Love to be Secure

iL2bs@



Always on time to work !
AoT2wx



My Password is Very Secure
MyP1VS#



Yo Quiero Taco Bell

yqtb!10
Electronic Mail Restrictions
• Do not use company e-mail for
private business activities,
amusement or entertainment.
• Do not send e-mail containing racist,
sexist, threatening or other
objectionable language.
• Do not join mailing lists.
• Do not open unknown or
unexpected
e-mail
attachments.
Let’s review…

Suspicious persons
Suspicious activity
Suspicious objects or packages
Employee identification
Visitor controls
Computer security
Document security
Information technology security
Security is not out
of reach if you
practice it every
day.
QUESTIONS?
Refer to Customs & Border Protection Website:
http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/

or www.cbp.gov

More Related Content

What's hot

training near miss program
training near miss programtraining near miss program
training near miss programoscar anell
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
EHS induction Presentation slides
EHS induction Presentation slidesEHS induction Presentation slides
EHS induction Presentation slidesMaffino
 
Health And Safety Induction Training
Health And Safety Induction TrainingHealth And Safety Induction Training
Health And Safety Induction Trainingedale07
 
Working at heights training powerpoint
Working at heights training powerpointWorking at heights training powerpoint
Working at heights training powerpointJomish John
 
Health & Safety Induction Training
Health & Safety Induction TrainingHealth & Safety Induction Training
Health & Safety Induction TrainingThe Pathway Group
 
Monthly Safety Report Feb 2012
Monthly Safety Report Feb 2012Monthly Safety Report Feb 2012
Monthly Safety Report Feb 2012ChinaHarbour
 
Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor pptAccord Group
 
Basic Safety Induction .pptx
Basic Safety Induction .pptxBasic Safety Induction .pptx
Basic Safety Induction .pptxssuser1f86f6
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Overhead crane risk assessment
Overhead crane risk assessmentOverhead crane risk assessment
Overhead crane risk assessmentSimba Zhao
 
HSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.pptHSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.pptssuser0ebdc3
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?Perk Security Ltd
 
New Employee Safety Orientation by Houghton
New Employee Safety Orientation by HoughtonNew Employee Safety Orientation by Houghton
New Employee Safety Orientation by HoughtonAtlantic Training, LLC.
 
HSE-BMS-007 Security Management.ppt
HSE-BMS-007 Security Management.pptHSE-BMS-007 Security Management.ppt
HSE-BMS-007 Security Management.pptAsifHussain654789
 

What's hot (20)

Bomb threat presnt
Bomb threat presntBomb threat presnt
Bomb threat presnt
 
training near miss program
training near miss programtraining near miss program
training near miss program
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
EHS induction Presentation slides
EHS induction Presentation slidesEHS induction Presentation slides
EHS induction Presentation slides
 
Health And Safety Induction Training
Health And Safety Induction TrainingHealth And Safety Induction Training
Health And Safety Induction Training
 
Working at heights training powerpoint
Working at heights training powerpointWorking at heights training powerpoint
Working at heights training powerpoint
 
Workplace Security practices
Workplace Security practicesWorkplace Security practices
Workplace Security practices
 
Health & Safety Induction Training
Health & Safety Induction TrainingHealth & Safety Induction Training
Health & Safety Induction Training
 
Access control at gates
Access control at gatesAccess control at gates
Access control at gates
 
Monthly Safety Report Feb 2012
Monthly Safety Report Feb 2012Monthly Safety Report Feb 2012
Monthly Safety Report Feb 2012
 
Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor ppt
 
Basic Safety Induction .pptx
Basic Safety Induction .pptxBasic Safety Induction .pptx
Basic Safety Induction .pptx
 
2.5 security officers
2.5 security officers2.5 security officers
2.5 security officers
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Overhead crane risk assessment
Overhead crane risk assessmentOverhead crane risk assessment
Overhead crane risk assessment
 
HSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.pptHSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.ppt
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?
 
New Employee Safety Orientation by Houghton
New Employee Safety Orientation by HoughtonNew Employee Safety Orientation by Houghton
New Employee Safety Orientation by Houghton
 
HSE-BMS-007 Security Management.ppt
HSE-BMS-007 Security Management.pptHSE-BMS-007 Security Management.ppt
HSE-BMS-007 Security Management.ppt
 
Near Miss Reporting
Near Miss ReportingNear Miss Reporting
Near Miss Reporting
 

Viewers also liked

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communicationSnapComms
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guidehuynhloan
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationSunjib Anwar
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 

Viewers also liked (20)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 
C-TPAT
C-TPATC-TPAT
C-TPAT
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guide
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_Presentation
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security Awareness
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 

Similar to Security Training and Threat Awareness by Pedraza

3e International brochure
3e International brochure3e International brochure
3e International brochureDaniel Dilks
 
3e International Brochure
3e International Brochure3e International Brochure
3e International BrochureDaniel Dilks
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-finalSheikh Shawkat
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in HotelsPurvi tiwari
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptelijahj01012
 
Security Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesSecurity Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesIndiaMART InterMESH Limited
 
Get Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonGet Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonTara Christianson
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions
 
Security Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSecurity Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSlideTeam
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service ProfileMolefi Majoang
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security ProtocolIMAN
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Businesskassimjabar1
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............Muhammad Saqib
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service PresentationHelen de Klerk
 
Security Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptxSecurity Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptxmdbashir12
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Trainingworksteadc
 

Similar to Security Training and Threat Awareness by Pedraza (20)

3e International brochure
3e International brochure3e International brochure
3e International brochure
 
3e International Brochure
3e International Brochure3e International Brochure
3e International Brochure
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-final
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in Hotels
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Security Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesSecurity Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security Services
 
Get Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonGet Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. Christianson
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Security Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSecurity Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation Slides
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service Profile
 
Nrs security profile
Nrs security profileNrs security profile
Nrs security profile
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security Protocol
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Business
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service Presentation
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
Security Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptxSecurity Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptx
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 

More from Atlantic Training, LLC.

Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAPAtlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUAtlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IAtlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsAtlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerAtlantic Training, LLC.
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityAtlantic Training, LLC.
 

More from Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Recently uploaded

Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfhostl9518
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfsuperbizness1227
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateRedSeer
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxSymbio Agency Ltd
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsSlidesAI
 
Vendors of country report usefull datass
Vendors of country report usefull datassVendors of country report usefull datass
Vendors of country report usefull datassDilipParmar63
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiaFalcon Invoice Discounting
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridHolger Mueller
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfinsightssuccess2
 
The Leading Cyber Security Entrepreneur of India in 2024.pdf
The Leading Cyber Security Entrepreneur of India in 2024.pdfThe Leading Cyber Security Entrepreneur of India in 2024.pdf
The Leading Cyber Security Entrepreneur of India in 2024.pdfinsightssuccess2
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowMiriam Robeson
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterNathanBaughman3
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfHenry Tapper
 
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best FilmmakerDid Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best Filmmakerstajohn447
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdfDerekIwanaka1
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceDragon Dream Bar
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanasabutalha2013
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckHajeJanKamps
 

Recently uploaded (20)

Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdf
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics Update
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team Presentations
 
Vendors of country report usefull datass
Vendors of country report usefull datassVendors of country report usefull datass
Vendors of country report usefull datass
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybrid
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdf
 
The Leading Cyber Security Entrepreneur of India in 2024.pdf
The Leading Cyber Security Entrepreneur of India in 2024.pdfThe Leading Cyber Security Entrepreneur of India in 2024.pdf
The Leading Cyber Security Entrepreneur of India in 2024.pdf
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best FilmmakerDid Paul Haggis Ever Win an Oscar for Best Filmmaker
Did Paul Haggis Ever Win an Oscar for Best Filmmaker
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 

Security Training and Threat Awareness by Pedraza

  • 1. C-TPAT TRAINING This is a sample PowerPoint on Security and general Threat Awareness. All images and clip art were taken from open sources. We suggest you consider using images of your employees within your faculty. This PowerPoint is meant to be a guide and should be tailored and edited to suit your needs. It is also suggested that you use your own slide background and colors scheme.
  • 2. Security Training and Threat Awareness Program for All Employees
  • 3. We have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.
  • 4. Topics Suspicious Persons Suspicions Activities Suspicious Objects or Packages Employee Identification Visitor Controls Computer Security Document Security
  • 5. Suspicious Persons LOOK FOR….. • Any person without an employee badge, visitor badge or uniform. • These are stock photos, take and use actual photos of your employees walking down a hallway. Or use images from a surveillance camera
  • 6. Suspicious Persons …and ACT • Determine if the person is an employee or a visitor – If an employee, remind them always to display their ID badge and uniform. – If a visitor, escort them to the reception area or to the person with whom they are visiting. – Report the incident to your immediate supervisor.
  • 7. Suspicious Persons LOOK FOR…..  Any person in unauthorized/restricted areas
  • 8. Suspicious Persons AND ACT…..  Get them out of the area  If a visitor, escort them to the reception area.  Report the incident to your immediate supervisor
  • 9. Suspicious Persons Cam 7 1:17:23AM 8/02/06 Look for ….  Any person:  wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing  waiting or loitering in an area or hallway  asking for an unknown department, person or employee
  • 10. Suspicious Persons LOOK FOR….  Any person:  who seems not to belong in the area  going door to door, office to office  entering a private office unescorted  selling items  who seems lost Cam 7 1:17:23AM 8/02/06
  • 11. Suspicious Persons LOOK FOR …..  Any person:  Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights…  running, especially if carrying something  hiding behind doors, fences, desks, … Cam 7 1:17:23AM 8/02/06
  • 12. Suspicious Persons AND ACT………  Immediately report the incident to your immediate supervisor
  • 13. LOOK FOR …  Objects obstructing access points  Disconnected or obstructed cameras  Broken locks or access control systems  Unexplained clutter or debris  Objects thrown from a vehicle, especially while traveling at a high speed.
  • 14. ACT …  Immediately report any suspicious activity to your supervisor.
  • 15. Suspicious Objects or Packages LOOK FOR…. • Unexplained objects or packages that look strange or do not belong to the area • Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) • Strange leaking substance (powder, liquid, etc…) • Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)
  • 17. Suspicious Objects or Packages AND ACT………  Immediately report any suspicious packages or objects to your supervisor, security, local police, 911 and/or FBI.
  • 19. Employee Identification  Your Responsibilities While on company property  Your company identification badge must be properly displayed and worn at all times.  Your company uniform (if applicable) must be worn at all times.  Properly secure and protect your ID badge, uniform, keys and access control card, etc.
  • 20.   Visitor Pre-meeting Requirements  Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements  Ensure that your visitor has logged in and has been issued a visitor badge
  • 21.   Visitor Escort Requirements  You must escort your visitors at ALL times  Do not leave your visitor unattended Visitor Exit Requirements  Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist
  • 22. Visitor Entrance Notify hosting employee Document arrival on Visitor Log Check photo identification Issue visitor badge Visitor Exit Collect visitor badge Document departure on Visitor Log Use colors and shapes of you choosing.
  • 23. Computer Security  Do not share access to your computer with strangers  Log-off when you leave your computer  Passwords should be changed every 60 to 90 days  Do not share your password with anyone  Do not write down your password.
  • 24. Selecting a Password  Use hard-to-guess passwords  Do not use the same password in more than one place  A password should have a mix of letters, numbers and symbols  I Love to be Secure iL2bs@  Always on time to work ! AoT2wx  My Password is Very Secure MyP1VS#  Yo Quiero Taco Bell yqtb!10
  • 25. Electronic Mail Restrictions • Do not use company e-mail for private business activities, amusement or entertainment. • Do not send e-mail containing racist, sexist, threatening or other objectionable language. • Do not join mailing lists. • Do not open unknown or unexpected e-mail attachments.
  • 26. Let’s review… Suspicious persons Suspicious activity Suspicious objects or packages Employee identification Visitor controls Computer security Document security Information technology security
  • 27. Security is not out of reach if you practice it every day.
  • 28. QUESTIONS? Refer to Customs & Border Protection Website: http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/ or www.cbp.gov

Editor's Notes

  1. In the event you identify an employee or visitor that is not wearing an identification badge or uniform: If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situation If its a visitor, escort them to the reception area or to the person with whom they are visiting.
  2. If you identify an individual in an area he/she is prohibited from entering,
  3. If its an employee, approach them and ask them if they need assistance or contact management If it’s a visitor, escort them to the reception area or security guard Report suspicious activity to your immediate supervisor.
  4. Look for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here.
  5. Look for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost.
  6. Immediately report suspicious activity to your immediate supervisor.
  7. Security personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges. All visitors must be escorted and visibly display their visitor badge.