security and threat awareness training

Upload: jose-sanchez

Post on 03-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Security and Threat Awareness Training

    1/28

    C-TPAT TRAININGThis is a sample PowerPoint on Security and general Threat Awareness.

    All images and clip art were taken from open sources. We suggest youconsider using images of your employees within your faculty. This PowerPoint

    is meant to be a guide and should be tailored and edited to suit your needs. It

    is also suggested that you use your own slide background and colors scheme.

  • 8/12/2019 Security and Threat Awareness Training

    2/28

    Security Training and ThreatAwareness Program

    forAll Employees

  • 8/12/2019 Security and Threat Awareness Training

    3/28

    We have recently joined with U.S. Customs and BorderProtection to help secure the international supply

    chain. As a member of the Customs-Trade Partnership

    Against Terrorism(C-TPAT) program, we havecommitted ourselves to new and improved securityprocedures throughout our operations. These new

    procedures are designed to enhance the security of ourfacilities, people, cargo shipping, cargo receiving and

    cargo tracking processes. Our goal is to prevent cargoloss and cargo tampering including the introduction ofillegal merchandise such as drugs and weapons of

    mass destruction into our cargo boxes and containers.As a part of our commitment to supply chain security,

    we now require all of our employees to seriouslyconsider supply chain security as a significant risk to

    our business.

  • 8/12/2019 Security and Threat Awareness Training

    4/28

    Suspicious Persons

    Suspicions Activities

    Suspicious Objects orPackages

    Employee Identification

    Visitor Controls

    Computer Security

    Document Security

    Topics

  • 8/12/2019 Security and Threat Awareness Training

    5/28

    Suspicious Persons

    LOOK FOR..

    Any person without

    an employee

    badge, visitor badgeor uniform.

    These are stock photos, take and use actual photos of

    your employees walking down a hallway. Or use

    images from a surveillance camera

  • 8/12/2019 Security and Threat Awareness Training

    6/28

    Suspicious Persons

    Determine if the person is anemployee or a visitor

    If an employee, remind them

    always to display their ID

    badge and uniform.

    If a visitor, escort them to thereception area or to the

    person with whom they are

    visiting.

    Report the incident to your

    immediate supervisor.

    and ACT

  • 8/12/2019 Security and Threat Awareness Training

    7/28

    LOOK FOR.. Any person in

    unauthorized/restricted areas

    Suspicious Persons

  • 8/12/2019 Security and Threat Awareness Training

    8/28

    AND ACT.. Get them out of the area If a visitor, escort them to the

    reception area.

    Report the incident to yourimmediate supervisor

    Suspicious Persons

  • 8/12/2019 Security and Threat Awareness Training

    9/28

    Look for .

    Any person:

    wearing an overcoat on a95 degree day, or any kindof inappropriate clothing

    waiting or loitering in an

    area or hallway asking for an unknown

    department, person oremployee

    Suspicious Persons

    Cam 7 1:17:23AM 8 02 06

  • 8/12/2019 Security and Threat Awareness Training

    10/28

    LOOK FOR.

    Any person:

    who seems not to belong

    in the area going door to door, office

    to office

    entering a private officeunescorted

    selling items

    who seems lost

    Suspicious Persons

    Cam 7 1:17:23AM 8 02 06

  • 8/12/2019 Security and Threat Awareness Training

    11/28

    LOOK FOR .. Any person:

    Tampering with somebodysdesk,boxes, personal items, equipment,vehicles, cameras, lights

    running, especially if carryingsomething

    hiding behind doors, fences,

    desks,

    Suspicious Persons

    Cam 7 1:17:23AM 8 02 06

  • 8/12/2019 Security and Threat Awareness Training

    12/28

    AND ACT

    Immediately report the

    incident to yourimmediate supervisor

    Suspicious Persons

  • 8/12/2019 Security and Threat Awareness Training

    13/28

    LOOK FOR Objects obstructing access points

    Disconnected or obstructedcameras

    Broken locks or access controlsystems

    Unexplained clutter or debris

    Objects thrown from a vehicle,especially while traveling at a

    high speed.

  • 8/12/2019 Security and Threat Awareness Training

    14/28

    ACT

    Immediatelyreport anysuspicious activity to

    your supervisor.

  • 8/12/2019 Security and Threat Awareness Training

    15/28

    LOOK FOR.

    Unexplained objects or packages that look

    strange or do not belong to the area

    Strange markings on boxes (unknown code,

    color) or strange characteristics (weight,

    number, odd shape) Strange leaking substance (powder, liquid,

    etc)

    Suspicious objects in the middle of an area

    (e.g., hallway, lobby, etc.)

    Suspicious Objects

    or Packages

  • 8/12/2019 Security and Threat Awareness Training

    16/28

    Suspicious Objects

    or Packages

  • 8/12/2019 Security and Threat Awareness Training

    17/28

    AND ACT

    Immediatelyreport anysuspicious packages or

    objects to yoursupervisor, security,local police, 911 and/orFBI.

    Suspicious Objects

    or Packages

  • 8/12/2019 Security and Threat Awareness Training

    18/28

    Handle with care

    Dont shake or bump.

    Isolate and look for

    indicators (shape, color,

    smell).

    Dont open, smell, lick or

    taste.

    Treat it as suspect!Report immediately.

    1

    2

    3

    4

    Suspicious Objects

    or Packages

    AND ACT.

  • 8/12/2019 Security and Threat Awareness Training

    19/28

    While on company property

    Your companyidentification badge must

    be properly displayed andworn at all times.

    Your company uniform (ifapplicable) must be worn at

    all times. Properly secure and protect

    your ID badge, uniform,keys and access control

    card, etc.

    Employee Identification

    Your Responsibilities

  • 8/12/2019 Security and Threat Awareness Training

    20/28

    Visitor Pre-meetingRequirements

    Inform your visitor of thecompanys visitor policies

    including photoidentification, check in withreceptionist prior to theirvisit.

    Visitor EntranceRequirements

    Ensure that your visitor haslogged in and has beenissued a visitor badge

  • 8/12/2019 Security and Threat Awareness Training

    21/28

    Visitor Escort Requirements

    You must escort your visitorsat ALLtimes

    Do not leave your visitorunattended

    Visitor Exit Requirements

    Ensure that your visitor haslogged out and has returnedthe visitor badge to theguard or receptionist

  • 8/12/2019 Security and Threat Awareness Training

    22/28

    Visitor Entrance

    Visitor Exit

    Notifyhosting

    employee

    Documentarrival on

    Visitor Log

    Collect

    visitor

    badge

    Document

    departure

    on Visitor

    Log

    Issuevisitor

    badge

    Checkphoto

    identification

    Use colors and shapes of

    you choosing.

  • 8/12/2019 Security and Threat Awareness Training

    23/28

    Do not share access to yourcomputer with strangers

    Log-off when you leave your

    computer

    Passwords should be changedevery 60 to 90 days

    Do not share your passwordwith anyone

    Do not write down yourpassword.

    Computer Security

  • 8/12/2019 Security and Threat Awareness Training

    24/28

    Use hard-to-guess passwords

    Do not use the same password inmore than one place

    A password should have a mix ofletters, numbers and symbols

    I Love to be SecureiL2bs@

    Always on time to work!AoT2wx

    My Password is Very SecureMyP1VS#

    Yo Quiero Taco Bellyqtb!10

    Selecting a Password

  • 8/12/2019 Security and Threat Awareness Training

    25/28

    Do not use company e-mail forprivate business activities,amusement or entertainment.

    Do not send e-mail containing racist,sexist, threatening or otherobjectionable language.

    Do not join mailing lists.

    Do not open unknown orunexpected e-mailattachments.

    Electronic Mail Restrictions

    Lets review

  • 8/12/2019 Security and Threat Awareness Training

    26/28

    Suspicious persons

    Suspicious activity

    Suspicious objects or packages

    Employee identification

    Visitor controls

    Computer security

    Document security

    Information technology security

    Lets review

  • 8/12/2019 Security and Threat Awareness Training

    27/28

    Security is not out

    of reach if youpractice it every

    day.

  • 8/12/2019 Security and Threat Awareness Training

    28/28

    QUESTIONS?Refer to Customs & Border Protection Website:

    http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/

    or www cbp gov