Free Essay

Chief of Security in Class

In: Business and Management

Submitted By maithily05
Words 745
Pages 3
Senior member of the security team: Keith Kristy

How large is Ryerson in geographical, terms of student?

- 38 000 undergraduate
- 1700 support staff
- 780 faculty
- intermingle streets

• Crew security reports to the security manager
• 168 Occupational health and safety ‘
• Brand new position: IT , own firewall and backbone to protect confidential information
• Everyone reports to the assistant director manager
• Everyone reports to the VP of finance: this is what it comes down to

What is the purpose of having a security department:

- formulate risk management
- protection of people, property and information

What is the purpose of the heads of the different heads:

- The whole cycle has evolved
- Harassment and violence free
- Manage the people, place and money, timing for work (for having managers and supervisors)

How do you determine the amount of employees should be deployed

- deployed during the bussiest time
- they have a formula (square footage formula) bases the amount of security that is required
- have to look at budgets also affect how to deploy employees

What kind of reports are done on the daily

- they write about 5000 repors / year
- ORCA report writing system
- What ever happens there always has to be a report that is written
- Daily briefs for any inncidents, basically gives a synopsus on what they did

Formal reports that get sent to external agencies
- PCR (provision of care reports) medical reports

Nature and frequency of emergency received by your men
- They talk and text
- Have a fixed meeting
- Talk on the phone

How is your performance reviewed
- get evaluated once an year
- reviewing how you did on your objectives, meet , exceed (why you didn’t)
- set new objectives for the following year

What would be the consequence if this didn’t run
- the university wouldn’t run
- basic faculty

Consequences for doing your job
- someone were to die
- forget to do a duty that no one would notice

Task, duties and responsibilities

- Issues on high importance and high frequency: medical (350 medical emergency on campus last year) – heart attaches
- Slip and falls of homeless
- 550 drug incidents (faculty included)
- identifying trends
- dealing with theft
- library theft is a big problem
- assault robbery, stalking and violence (creates a ripple effect for the individual, community and ryerson as a whole)
- Well being check (students overdrawn from dugs/ alcohol)

Does location modify the information mentioned above
- yes
- Rural areas versus urban areas
- Ryerson in the core of downtown
- You need to do your research based on the community that you live in

What is your role in the creation of rules and regulation?

- writes all the polices for all the division
- updating procedures must take place

Role of security for new buildings

- they jump into it once the university buys the land
- starts with the security management system
- where to put cameras and security system (they are a part of building the place itself)
- CPTED: crime protection through environmental design

What is the budgeting process

- goes through the ORACLE

Hiring process:

- who creates the job description: they do it themselves
- in terms of hiring: they contact the contract company (interview different contract provides to see what they can provide)
- years are negotiated based on the quality of services (certain level of training)
- typically comes through the crew specials
- they get a 30 day trail

How do you ensure employment diversity:

- they tell contract service providers in sending crews from diverse groups

In terms of training and development :

- sometimes they use specialist from the outside
- also trains officers and outside people just for general safety

What is your role in termination
- because they are in contract, there contract gets removed
- don’t really terminate
- sever situations there is termination
- they look at if its their fault in the first place (it is a three step termination process)

Works on a 12 hour rotating schedule
- 60 hours one week and 24 the next

How do you know confidentiality is left
- confidentiality form is signed
- Reports are designed through ORCA

How do you ensure the safety of officers when their out on the field
- education
- providng them with the right equipment
- communication

Ryerson was at the forefront of a case that went national:
- hate crime case (unsolvable case)

Equipment:

- Dress code: dressy pants. semi formal or formal if you need to go for a meeting some of them have uniforms
, black police boots
- if your riding on the bike you wear the shorts
- duty belts
- uniform shirts, vest with trauma plate
- rain gear, medical gear

How do you schedule yourself…...

Similar Documents

Premium Essay

It Security

...Computer security and Network Security is the means by which business and governments are protecting against computer intrusions and attack to prevent loss of data, information and provided services. Everything is now on computers, peoples whole lives are documented on computers. Big business and the government rely on technologies that use computers, whether it is used for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred and used it needs to be secured. A bank is open to the public; you would not have this bank unsecured would you? There would be security guards, cameras, and a vault. The same mentality to secure your data should be implied if you have a network that is connected to the Internet. You should have software, hardware, and/or personnel monitoring your networks operations and security. All computers and systems that connect to the internet or networks run off software of some type. People called hackers or crackers, manipulate programs, create worms, and viruses to make systems do thing there not supposed to, access places they aren’t allowed, and shutdown or hinder a system from working properly (Dasgupta). Then there are attacks, phishing attacks which come in the form of email that try to lead you to fraudulent sites, Denial-of-service attacks overload servers causing no one to get on or shuts them down. Then there are SQL injection attacks which are used in security......

Words: 1949 - Pages: 8

Premium Essay

Chief Justice

...The 17th and current Chief Justice of the United States is John G. Roberts, Jr. He was born in Buffalo, New York, January 27, 1955. He married Jane Marie Sullivan in 1996; they have two adopted children- Josephine and John. He attended Harvard College in 1976, where he received an A.B. and also attended Harvard Law School in 1979, and received a J.D. He served as a law clerk for Henry J. Friendly of the United States Court of Appeals for the Second Circuit from 1979–1980 and as a law clerk for then-Associate Justice William H. Rehnquist of the Supreme Court of the United States during the 1980 Term. He was Special Assistant to the Attorney General, U.S. Department of Justice from 1981–1982, Associate Counsel to President Ronald Reagan, White House Counsel’s Office from 1982–1986, and Principal Deputy Solicitor General, U.S. Department of Justice from 1989–1993. From 1986–1989 and 1993–2003, he practiced law in Washington, D.C. He was appointed to the United States Court of Appeals for the District of Columbia Circuit in 2003. President George W. Bush nominated him as Chief Justice of the United States, and he took his seat on September 29, 2005. The Chief Justice of the United States represents the head of the United States Federal Court system, which comprised the judicial branch of the federal government of the United States. The Chief Justice of the United States is the chief judge of the Supreme Court of the United States. The Chief Justice is the highest judicial......

Words: 798 - Pages: 4

Free Essay

Chief Executive Officer (Ceo

...The chief executive officer (CEO) provides direction and leadership for the organization’s mission and vision, represents and speaks for the organization and its work, and manages day-to-day operations to achieve the strategic direction set by the Board. As we already know the CEO is responsible for both internal and external relationships, including creating a positive work culture and philosophy; maximizing the use of available personnel and resources; and establishing, maintaining, and updating as appropriate office procedures that include such matters as staff incentives and grievances. I as a CEO will work with the Board to chart the future direction of the organization and I know to achieve the goals of the organization, Supervisor and evaluate staff should try to: 1- Provide visionary leadership to the organization and translate that vision into action; 2- Oversee day-to-day operations and ensure that our organization maintains its status as a well-managed, highly respected organization; 3- Maintain a complete understanding of the organization’s financial position, and ensure physical responsibility and security; 4- Maintain funding streams and identify 5- Ensure appropriate staffing consistent with organizational needs; 6- Update and maintain the Personnel Policy & Procedure Manual as needed; 7- Develop and maintain appropriate job descriptions for all staff; 8- Recruit, select, orient, and provide training for new staff and continuing training for all......

Words: 279 - Pages: 2

Free Essay

Chief Mr.

...garnering support across the Secretariat during the implementation of the proposed initiatives. I am particularly grateful to the Permanent Representatives and their colleagues in the Member States’ missions to the United Nations (UN) for their availability to exchange views and provide useful advice and several useful suggestions that are reflected in the report’s proposals. The willingness of groups of Member States to interact with the CMT was a source of constant encouragement in our tasks. The members of the Advisory Committee for Administrative and Budgetary Questions (ACABQ) and its Chairman deserve special consideration as they found time to interact with the team despite their hectic and busy schedules. I am also grateful to the Chief of Staff of the President of the General Assembly for his support and guidance. I have learnt from this experience and enjoyed the fruitful cooperation and support extended by all colleagues. I would like to particularly thank Ms. Angela Kane (for having loaned the services of Mr. Johannes Huisman and later the assistance provided to the team by Ms. Nicola Koch), Ms. Carman Lapointe (for having loaned the services of Mr. Yee Woo Guo), Mr. B. Lynn Pascoe (for having seconded Mr. Steven Siqueira), Mr.Sha Zukang (for having loaned the services of Ms.Madhushree Chatterjee), Mr.Kiyotaka Akasaka (for having seconded Ms. Janet Wieser) and to Mr.Hervé Ladsous (for having provided the team with its one and only Team Assistant, Ms. Rosanna......

Words: 35902 - Pages: 144

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy &......

Words: 1066 - Pages: 5

Premium Essay

Security

...intends to deliver an outstanding experience to the customers and to the employees. The retail world is one of the most competitive industries. It has transformed greatly over the last few decades. It has changed from family-owned, to big box stores. Amazon poses a huge threat to the retail industry. This is because more consumers are avoiding the shopping carts; and choosing to have purchases delivered to their front door. This industry trend has been growing because of the internet. Because of technology, retail companies have to respond to a growing on-line presence. At the end of 2013 Target suffered a drastic security breach. Target was accused of failing to maintain reasonable security which caused customers cards to be breached. Target was sued and had to pay millions of dollars in fines. Target has since drastically enhanced their data security measures. Introduction Industry Analysis: Strategies and the Role of Information Technologies Target Retail Corporation “The practice of selling finished products finds its roots in ancient civilizations. Over time, trade and commerce would become the most prominent driving force for the expansion of the human populace around the world. It was in North America that the first retail stores began to appear. These general stores, established in the eighteenth century, offered consumers a wide range of products and goods. Not long after these smaller stores emerged, larger, “department” stores evolved,......

Words: 5422 - Pages: 22

Premium Essay

Chief Accountant

...Objective With 4 years' experience in accounting and finance across multiple sectors, I am now looking to expand my career and apply my skills and expertise in an external audit role. Work Experience Palma Consulting ------------------------------------------------- Chief Accountant Apr 2014 – present * Responsible for all financial and accounting transactions and Reporting * Responsible for all banks transactions and relations * Responsible for all relations with government agencies (Sales Tax Department, Income Tax Department and Social Security Department) * Producing various management reports for the Consulting and Procurement departments, and to the CFO * Developed and documented accounting policies for the firm * Currently handling the introduction of an HR payroll system and the replacement of the Accounting system MEPS (MasterCard) ------------------------------------------------- Accounting Officer Mar 2013 – Mar 2014 * Reconciled and maintained over 20 bank accounts * Responsible for monthly closings and assisting with monthly and yearly financial statements * Responsible for monthly payroll systems * Reconciling and maintaining employees’ accounts and transaction follow up with HR ------------------------------------------------- Bell Amman (Luminos Group) Accountant ...

Words: 416 - Pages: 2

Premium Essay

The Rookie Chief Information Security Officer

...WEEK 10 TERM PAPER “The Rookie Chief Information Security Officer” Terri Cooks Professor Parker SEC 402 June 15, 2014 Part 1: Organization Chart When looking at the many different roles within the management of any organization’s security program there are some titles that stand out. One would be the CISO. The CISO is the executive whose responsibility is to maintain entire security backbone, both physical and digital. In an article written for the Sans Institute by Matthew Cho, “CISO Roles and Responsibilities: According to the latest information, almost sixty percent of the organizations in the United States acknowledge the existence of a CISO dedicated entirely to security (Ware). Responsibilities for these individuals include ensuring proper protection for all physical and technical aspects of the organization. Technical aspects ranging from securing communications, applications, and business systems to performing risk assessments of IT assets exposed to outsiders on the Internet. Physical aspects including non-electronic factors such as physical site access as well as drafting policies and procedures for secure daily operations. Along with overseeing the organization’s physical and technical security implementation, CISOs are also responsible for security management activities. These activities may include training others for security awareness, purchasing security products, planning for and managing disaster recovery, developing secure business and......

Words: 4742 - Pages: 19

Free Essay

Chief Seattle

...Chief Seattle’s speech to Isaac Stevens explores many facets of figurative language and wisdom that come together in a beautiful, yet sorrowful, statement of the emotions of an entire people. The most prominent tool employed by Seattle is pathos, particularly drawing pity from the listener by expounding upon the centuries of woe experienced by the native Americans. Halfway through the oration, Seattle shifts the focus towards the dead, and uses references to his race’s ancestry as a method of emphasizing the impact of everyone’s life and history on the future. The appeal to emotion in the oration begins almost immediately. Seattle appeals that “Yonder sky has wept tears of compassion on my people for centuries.” This statement digs deep into the hardships that th Native Americans faced upon the white man’s continuum of manifest destiny. Personification is also heavily employed to touch the listener’s hearts; phrases such as “weeping clouds” and describing his people as “scattering trees of a storm-swept plain” emphasize the suppression of his people, ravaged and demoralized by the intrusive Americans. Creating even more empathy for his cause, Seattle tells us of the times of glory experienced by the native Americans, which starkly contrast the woeful situation of modern-day native Americans. Seattle uses spiritual parallels of two different Gods to show how the white man has justified their actions through a system designed to justify their actions. The listener can......

Words: 406 - Pages: 2

Premium Essay

Security

...the CSO or Chief Security Officer. The CSO reports to the Board of Directors directly, hence cannot be influenced by the CEO or the CFO. According to the guideline by ASIS, this is the best model for a position that is as critical as the Chief Security Officer. Our CSO has been trying to add security to the culture of the company, and so far, it has been working. Being that the department is very new (about 1 year old), the security policies are now part of the human resources new hire packet. During their orientation, every new employee has to listen in on about 30 minutes of presentation that is security related, in addition to the normal company and culture orientation. The policies and procedures are now also embedded in the company intranet, and everyone has to sign a letter that says they read everything about the company’s security policies and procedures. This part also complies with the ASIS CSO guideline of bringing security into the company culture. According to the guideline, there is physical security that is handled by the CSO through his Facilities Director, as well as information security that is handled by the Information Security Director. They both report to the CSO (although the facilities director also reports to the Vice President of Human Resources). The company also has a Legal General Council, but this position reports directly to the CEO. The CSO regularly liaises with the General Council on all legal matters relating to the security department....

Words: 561 - Pages: 3

Premium Essay

Chief

...| | | In section 7, look at individual recovery plans for each of these technologies. Roles and responsibilities Think about who will do what during an emergency. Fill in the table below with information relevant to your organisation. The size of your organisation may not warrant the number of roles, in which case you may wish to combine some responsibilities. During an emergency these are the roles and responsibilities. Role | Who | Responsibilities | Business Continuity Manager (BCM) | Name of position(eg HR manager) /backup postion | Contacting the Chief Review Officer at first knowledge of an emergencyArranging the initial meeting of the Emergency Decision Group (BCM, CRO and Technology Advisor) to: * activate the Business Continuity Plan * undertake emergency tasks * Confirm critical business functions and business recovery locationReinstating services at the [ORGANISATION NAME] | Chief Review Officer (CRO) | Name of position/ backup postion | Contacting the BCM at first knowledge of an emergencyRatifying the decisions of the Emergency Decision GroupLeading the [ORGANISATION NAME] Management teamCommunicating to the organisation (including the board) | Business Recovery Office Manager | Name of position /backup postion | Co-ordinate the setting-up of the business recovery office along with the managers. | Technology Advisor | Name of position /backup postion | Co-ordinate the managment of ICT BCP | Communication Contact Role | Name of......

Words: 4637 - Pages: 19

Premium Essay

Security

...Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own......

Words: 93588 - Pages: 375

Free Essay

Security

...few of these security issues and discuss ways to prevent attacks from occurring. Users pose the largest security threat to a pc. Users go out on the internet, haphazardly clicking away on links that could open their pc for an attack. Malware, phishing scams, bot herding, viruses, and worms are just a few of the ways that your pc can be attacked. First and foremost is the user needs to understand that they must use caution when accessing the network. Follow sensible rules such as, don’t open email from strangers, don’t click on strange links, and don’t walk away from the pc without logging out. Never give out passwords, and change passwords often. Every 30-90 days is good and make sure you create strong passwords. As a rule of thumb, only give users access to the specific files and folders that they need. Use common sense when you are on the network and you can prevent malicious attack on your pc and protect sensitive information. Another way to protect your pc from malicious attack is by utilizing patches and hotfixes to the operating system software. Regular updates to the OS ensure that your device has some protection from worms or other malicious code that can damage the pc. Use firewalls on the network. Antivirus software needs to be installed also to protect the pc and it is imperative that you ensure that the program is updated regularly (Brandt, 2009). It is very important to schedule regular scans of the pc to check for viruses or other security......

Words: 693 - Pages: 3

Premium Essay

Security

...above to submit your assignment. Term Paper: Chief Security Officer Due Week 10 and worth 200 points You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for......

Words: 317 - Pages: 2

Premium Essay

You Have Been Hired as the Chief Security Officer for a Local University. for This Role You Will Be Responsible for Establishing and Maintaining an Enterprise Wide Information Security Program to Ensure That All

...You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for computer forensics technology that can be used by the University. Identify the types and determine the costs of......

Words: 432 - Pages: 2

lot de 65 brins de plantes aquarium + 1 lot gratuit | A Pequena Sereia DUBLADO E LEGENDADO ONLINE | Cobina Wright Sr.