The Taylor Group was founded in 1987 and has grown to offer 50 certification programs and 24/7 global threat monitoring services internationally. It provides public safety training, criminal forensics courses, and threat monitoring services to industries such as schools, retail, entertainment, and healthcare. The company aims to help clients enhance security and protect personnel and assets from evolving global threats. It is led by President Robert E. Taylor, Sr. and also includes Anthony Taylor as COO and Robert Taylor Jr. as EVP.
Using ISO 31000 as a strategic tool for National Planning and GovernancePECB
This webinar was poised to assist in drafting a sustainable National Risk framework to guide and aid in decision making for governance and management practices.
Main points that have been covered are:
• Risk Awareness and Risk cultured society
• Modern Operational Practices and Risk
• Trend in Risk Management for Governance and Management
• Failure of strategies with risk in focus
Presenter:
Mr. Oluwagbenga Bamgbose is a Certified Lead Project Manager and Certified PECB Trainer. He is certified in various field including ISO 27001, ISO 20000 ISO 31000 Risk Manager, ISO 22301 and ISO 21500.
Link of the recorded session published on YouTube: https://youtu.be/GLuqtiOIQos
Using ISO 31000 as a strategic tool for National Planning and GovernancePECB
This webinar was poised to assist in drafting a sustainable National Risk framework to guide and aid in decision making for governance and management practices.
Main points that have been covered are:
• Risk Awareness and Risk cultured society
• Modern Operational Practices and Risk
• Trend in Risk Management for Governance and Management
• Failure of strategies with risk in focus
Presenter:
Mr. Oluwagbenga Bamgbose is a Certified Lead Project Manager and Certified PECB Trainer. He is certified in various field including ISO 27001, ISO 20000 ISO 31000 Risk Manager, ISO 22301 and ISO 21500.
Link of the recorded session published on YouTube: https://youtu.be/GLuqtiOIQos
User Experience Design I - Guitar Trading Post WebsiteShawn Murphy
Developed a website for guitar/bass enthusiasts allowing them to trade musical equipment locally. The process included product visions statements, user research (interviews, surveys), development of user personas, story mapping, information architecture (card sorting, sitemap, and wireframes) and branding.
My "graphic CV" is a .pdf document that contains some basic resume-like biographical information, but also highlights some speaking engagements, etc aligning with the work I do in the behavioral threat assessment and management space.
Build an Information Security StrategyAndrew Byers
Organizations are struggling to keep up with today’s evolving threat landscape.
From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks.
Every organization needs some kind of information security program to protect their systems and assets.
Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
WHY IS THIS IT RISK ASSESSMENT WORKSHOP IMPORTANT?
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
User Experience Design I - Guitar Trading Post WebsiteShawn Murphy
Developed a website for guitar/bass enthusiasts allowing them to trade musical equipment locally. The process included product visions statements, user research (interviews, surveys), development of user personas, story mapping, information architecture (card sorting, sitemap, and wireframes) and branding.
My "graphic CV" is a .pdf document that contains some basic resume-like biographical information, but also highlights some speaking engagements, etc aligning with the work I do in the behavioral threat assessment and management space.
Build an Information Security StrategyAndrew Byers
Organizations are struggling to keep up with today’s evolving threat landscape.
From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks.
Every organization needs some kind of information security program to protect their systems and assets.
Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
WHY IS THIS IT RISK ASSESSMENT WORKSHOP IMPORTANT?
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
Your Challenge
Organizations are struggling to keep up with today’s evolving threat landscape.
From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks.
Every organization needs some kind of information security program to protect their systems and assets.
Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.
Our Advice
Critical Insight
Performing an accurate assessment of your current security operations and maturity levels can be extremely hard when you don’t know what to assess or how to assess it.
Alignment can be a difficult area for security to get right when it’s trying to balance both regular IT and the business.
Communication is needed between the business leaders, IT leaders, and the security team for an effective security strategy to be in place.
Impact and Result
Info-Tech has analyzed and integrated regulatory and industry best practice frameworks, combining COBIT 5, PCI DSS, ISO 27000, NIST SP800-53, and SANS to ensure an exhaustive approach to security.
Through this process, a comprehensive current state assessment, gap analysis, and initiative generation ensures that nothing is left off the table.
This project will elevate the perception of the security team from being a hindrance to the organization to an enabler.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
2. THE TAYLOR GROUP
The Taylor Group was created in 1987 in
the Metropolitan Washington, DC area,
and since then, its operations have grown
to become internationally acclaimed in
the executive security and public safety
industry. Through its cadre of skilled and
professional personnel, our company
offers 50 certification and instructor
training programs, and 24/365 global
threat monitoring services.
We invite you to check out all of the
programs offered which range from
criminal and forensic education and
sector-specific threat monitoring to
tactical vehicle intervention – a vast array
of services for aspiring and experienced
public safety professionals.
Thank you for taking the time to visit and
we hope to be of assistance to your
organization in the very near future.
Please contact us if you have any
questions about our services or programs.
- Robert E. Taylor, Sr., President
Letter from the
President
2
“Staying ahead of evolving threats in the
global landscape”
- Robert Taylor Sr., President and CEO
3. THE TAYLOR GROUP
Protect Personnel & Physical
Assets With Threat Monitoring
from a Worldwide Security
Leader
The Taylor Group specializes in delivering
a client specific threat monitoring service
that would equip industry and institutions
with critical information on a regular and
consistent basis to significantly enhance
their ability to fulfill their "duty of care"
responsibility to staff and support
personnel as well as to protect their
physical assets.
Moreover, our service monitors every
significant threat possibility gathered
from open and closed communication
sources to social media to Internet
chatter, to ensure that our clients are
always aware of any relevant threats as
they are made so that they can take
appropriate non-intrusive
countermeasures to strengthen their
existing security infrastructure.
As part of a modern advanced threat
protection strategy, “Targeted Profiles”
deliver a flexible, more synthesized
architecture to target specific threats,
occurrences, and indicators of patterns,
behaviors or compromises to personnel or
physical assets. The result is a faster and
more accurate identification, analysis and
measured response to progressive threats
and attacks.
Our Intel and Operations Centers operate
24 hours a day, 365 days a year. With
access to our World Wide Network, we
effectively track incidents, study and
manufacture actionable information and
upcoming events that could be used to
strategize future countermeasures and
operations.
Industries currently served
• School Districts (Public, Parochial,
Judeo-Christian)
• Retail Conglomerates’
• Entertainment Venues
• Private Healthcare Systems
• Public Safety / Law Enforcement
Threat Monitoring
3
4. THE TAYLOR GROUP
The Taylor Group has developed the
Instructor Certification Training
Programs to ensure the uniformity and
consistent delivery of training. Through
this program, students will develop the
skills and ability to certify operators. This
network of certified instructors assures
that an agency or organization meets the
standards of instruction set by the
industry.
• Aerosol Chemical Munitions
• Collapsible Baton
• Diminished Light Tactics
• Defensive Tactics
• Dynamic Crisis Rescues
• Pursuit Driving / EVOC
• Tactical Vehicle Intervention
• Tactical Carbine
• Tactical Sub-Gun
• Tactical Shotgun
• Vehicle Disablement Devices
An Instructor Trainer is an individual
who has been qualified by The Taylor
Group's Certification Program for
Instructor Trainers that authorizes them
to train and certify other instructors and
operators.
• Instructor Trainers must meet the
following qualifications:
• Approved by an accredited training
sponsor AND
• Two-years’ experience as a law
enforcement trainer or general
instructor
Instructor Trainer
Certification
4
5. THE TAYLOR GROUP
These programs provide public safety and
security officers with the opportunity to
develop a solid foundation in tactical
training and expertise. Officers who
successfully complete these programs
will acquire the skills and principles
necessary to enhance their personal
safety and professional development thus
enabling them to become more proficient
and effective as tactical/protection
officers.
• Tactical Operation (Basic SWAT)
• Tactical Operation (Advanced SWAT)
• Covert Protection Operations
• Dynamic High Risk Vehicle Stop Tactics
High Risk & Tactical
5
• Active Shooter (Patrol Officer
Response)
• Tactical Carbine
• Tactical Sub Gun
• Tactical Shotgun
6. THE TAYLOR GROUP
Our programs are designed to meet the
educational needs of those seeking to
enter the field of criminal / forensic
investigation, as well as providing
professional development for current
investigators who desire to improve their
knowledge and to review the latest
techniques and technological advances in
investigative methodology.
• Basic & Advanced Crime Scene
Investigation
• Basic & Advanced Blood-Spatter
Analysis
• Computer Forensics
• Criminal Investigative Analysis &
Profiling
• Death Scene & Cold Case Investigation
• Prescriptive Interview & Interrogation
• Property & Evidence Management
• Search & Seizure
• Sexual Assault & Rape Typologies
Criminal & Forensics
6
7. THE TAYLOR GROUP
Robert E. Taylor, Sr
Robert E. Taylor, Sr. is President, Chief
Executive Officer and Chairman of the
Board for The Taylor Group, Inc. He has
over 40 years of exemplary public service
with the Federal government until his
retirement in March 2002.
As a career Senior Executive and Director
of the Office of the Clerk of the United
States Merit Systems Protection Board
(MSPB), Robert Sr. served as senior
advisor to the agency Chairman on
adjudicatory policies, practices and
procedures. Upon conclusion of his
outstanding Federal service career, Robert
Sr. was presented with the agency’s
highest award – The Theodore Roosevelt
Award – “For lasting contributions as
Clerk of the Board.”
Prior to his service with MSPB, Robert Sr.
served as Executive Officer and Chief of
Staff to the Deputy under Secretary for
Strategic Petroleum Reserve, U.S.
Department of Energy. As senior advisor
to the Deputy Under Secretary, Robert
provided counsel and advice on
management policy and strategy generally
of a critical or controversial nature.
Robert’s experience also includes
administrative and managerial
responsibilities as Assistant to the
Associate Bureau Director, Program
Office for Community Health Centers, and
Associate Director for Program
Management, Division of Monitoring and
Analysis, US Department of Health and
Human Services, and Chief, Section of
Ownership Reports, US Securities and
Exchange Commission. He is a graduate of
the Federal Executive Institute.
Anthony (Tony) R. Taylor
Anthony (Tony) R. Taylor is the Chief
Operating Officer for The Taylor Group
and is a member of the Board of Directors.
Tony has more than 20 years of varied
corporate experience and expertise
including executive leadership, operations
and information technology. His
background includes: operations
leadership, management of technical
support teams, tactical and business
analysis, project management, systems
and application development and
implementation, information security and
security technology, and business
development.
Executive Profiles
7
8. THE TAYLOR GROUP
Anthony (Tony) R. Taylor, con’t
His vision, knowledge and expertise in
core business process, performance and
redesign combined with his technological
savvy have been instrumental in the
development of a “model office”
environment for one of the largest health
carriers in the mid-Atlantic region.
Mr. Taylor has achieved exciting company
results through innovation and building
successful alliances with key business
partners and vendors, offering a rare
blend of technical, operational, analytical,
and creative strengths. He has been
recognized for his many successes,
leading the development of technological
solutions directly increasing efficiency,
customer satisfaction, while ensuring data
integrity and information security. He
has assisted with the implementation of
various system access security protocols,
role based access and ensuring regulatory
compliance.
Robert E. Taylor, Jr
Robert E. Taylor, Jr. is Executive Vice
President and Founder of The Taylor
Group, Inc. He is a proven 32-year
protection and safety professional.
In addition to a decorated 20-year law
enforcement career, Robert’s solid team-
building and international business skills
were most evident when he formed The
Taylor Group in 1987. He single-handedly
assembled an industry-recognized
training cadre and developed its
operational profile and marketing
campaign from the ground up.
As Head Trainer, Robert is a well-known
curriculum developer and instructor in
the areas of executive security, protection
and management. His strong
communications skills support his ability
to implement complex events to include
strategic safety plans for VIP’s in large
capacity venues.
Through his leadership, The Taylor Group
has serviced the training needs of
thousands of public safety and military
professionals from more than 1,600
agencies and private organizations on
four continents.
Executive Profiles
8
9. THE TAYLOR GROUP
Mailing Address:
The Taylor Group, Incorporated
3540 Crain Highway
Suite 343
Bowie, Maryland 20716-1303
United States
Office: +1-844-808-4909
Fax: +1-877-290-5694
www.taylorgroup.net
facebook: /the-taylor-group
twitter: @taylorgroupusa
youtube: /taylorgroupusa
linkedin: /taylorgroupusa
Robert Taylor, Sr., President
robsr@taylorgroup.net
Anthony Taylor, Chief Operating Officer
tonyt@taylorgroup.net
Robert Taylor, Jr., Exec. Vice President
robertjr@taylorgroup.net
Justin Taylor, Social Media Manager
justin@taylorgroup.net
9