women in security - the conference exchange€¦ · •networking •brand success. rose miller,...

30
Key Success Factors for Women In Security Session 3302 September 13, 2016

Upload: others

Post on 25-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Key Success Factors for Women In Security

Session 3302September 13, 2016

Page 2: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Key Factors

•Strategy

•Certification

•Networking

•Brand

Success

Page 3: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Rose Miller, CPP, CHPAStaff Consultant

Columbus, OHRisk & Vulnerability Assessments

Security Master Planning

Security Program Development

SRMC, LLC

Columbus, OH

35 years/8 in private sector

Army Military Police Officer for 27 years

Board Certified (ASIS International)

Certified Protection Professional

Board Certified (IAHSS International)

Certified Healthcare Protection

Administrator

Joined SRMC, LLC January 2016

Page 4: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Ann Trinca, Esq.

CPP, PSP, PCISr. VP, SecTek, Inc.

Reston, VA

Corporate Compliance;

Professional Development

Training; Business Development

SecTek, Inc.

Guard Services / National

ASIS Professional Certification Board

ASIS Board Certifications:

• Certified Protection Professional (CPP)

• Professional Certified Investigator (PCI)

• Physical Security Professional (PSP)

ASIS WIS Council

• Chair, Certification Committee

• Chair, Strategic Alliance

VA DCJS, Private Security Services

Advisory Board

Joined SecTek in 1999; principal

George Washington U Law; UC Davis

Page 5: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Worldwide

Soft Target Site Assessments

Red Teaming, Exercise Planner

DoD Graduate School Professor

Academic Author

30 Years – 21 military, 9 private contractor

Military Installation Commander

Directed Security for Air Force 1, POTUS

Dept of Defense Grad School Professor

Counterterrorism and Security

Soft Target Hardening Expert/Practitioner

ASIS Book of the Year, 2015

Just returned from 2 years in Middle East

WIS liaison for Doha chapter; ASIS Middle

East speaker in Dubai

Dr. Jennifer HestermanColonel, USAF (retired)

Independent Contractor

Charleston, SC

Page 6: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Gail Essen, CPP, PSPEnterprise Integrated Security

Golden Valley, MN

Security Plans

Risk, Threat, Site Assessments

Strategic Execution

Business Valuation

Honeywell

Americas West

25 Years / Last 10 in Enterprise Security

Owned WBE, MBE, DBE Business

Board Certified (ASIS International)

2017-2019: ASIS Board of Directors

2015-2016:Chair ASIS WIS Council

2013-2016:Chair ASIS Certification

Committee (MN)

2016: Adjunct Instructor–CPP Review

Course

CVI (Chemical-Terrorism Vulnerability

Information)

Joined Honeywell June 2015

Page 7: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Rose Miller, CPP, CHPAStaff Consultant

Columbus, OHRisk & Vulnerability Assessments

Security Master Planning

Security Program Development

SRMC, LLC

Columbus, OH

Strategy

Page 8: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Strategy – Plan of Action

Think Long Term

Describe the end state

Be flexible – living plan

Make it detailed

Be bold

Focus is your unlimited potential

Page 9: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Link to Corporate Strategy

Identify your role, department’s role

Align – eliminate silos

Look for mutual benefit

Get a place at the table

Find a champion

Page 10: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Put it into action

Create a timeline

Identify short term objectives

Plan to overcome obstacles

Determine requirements and resources

Communicate your plan

Show the value proposition

Be your own cheerleader

Avoid naysayers

Page 11: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Corporate Compliance;

Professional Development

Training; Business Development

SecTek, Inc.

Guard Services / National

Certification

Ann Trinca, Esq.

CPP, PSP, PCISr. VP, SecTek, Inc.

Reston, VA

Page 12: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

CertificationsWhy Certification Matters: 3 Levels

Individual

Organization

Industry Consider the meaning of “profession / professional”

i.e. doctors, lawyers, accountants, nurses, security

Common denominators:

Common body of knowledge

Rigorous exam

Continuing education requirements

Code of ethics

Professional organization

Page 13: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Certifications

The Message of Certification:

Mastery of technical concepts

Relevant experience

Commitment to ethical standards

Commitment to continuing education and training

**Ability to add value to operations**

The Benefits of Certification:

Visibility in organization / industry

Expanded network

Marketing

Financial

Page 14: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Certifications: 2016 ASIS Compensation Survey

Page 15: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Certifications Certification Choice: Industry has many options

Better known: ASIS: CPP Certified Protection Professional

ASIS: PSP Physical Security Professional

ASIS: PCI Profession Certified Investigator

ISC2: CISSP Certified Information Systems Security Professional

ACFE: CFE Certified Fraud Examiner

SIA: CSPM Certified Security Project Manager

Specialty Certifications:

ICA: ICACP ICA Certified CPTED Practitioner

IAEM: CEM Certified Emergency Manager

IAHSS: CHPA Certified Healthcare Protection Administrator

IFPO: CPO Certified Protection Officer

IFCPP: CIPM Certified Institutional Protection Manager

Page 16: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Certifications

Certification Choice: Considerations

Personal / Career Vision Advancement within existing field? Attempting new or related field?

Does certification align with current/future career vision?

Experience / Education Requirements

Recognition / reputation of certification and certifying

organization

Commitment level

Page 17: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Certifications

Certification Success Strategies

Establish roadmap / think project management: What domains?

When to study: Be realistic and accept you must give up something, but only temporarily

How to study: Select study resources and methods that align with the way you learn i.e. individual versus group study, on-line versus in-person review classes

Recognize, then attack weaknesses

Keep steady momentum in effort

Maintain winning mindset

Certification may take more than one attempt; that’s fine

Page 18: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Dr. Jennifer HestermanColonel, USAF (retired)

Independent Contractor

Charleston, SC

Worldwide

Soft Target Site Assessments

Red Teaming, Exercise Planner

DoD Graduate School Professor

Academic Author

Networking

Page 19: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Networking

Definition: “The exchange of information or services among individuals, groups, or institutions; specifically the cultivation of productive relationships for employment or business” (Webster’s)

Forming relationships – why?

Professional: Current or future business opportunities

Mentoring: Receiving/giving guidance and support

Personal: Security can be a lonely business!

Page 20: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Networking

Networking Strategy: How?

Every interaction is an opportunity

Find someone walking the same path, join forces

Seek those who’ve already attained your goals

Think people, not positions

Page 21: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Networking

Networking Strategy: How?

Build/cultivate relationships

Can start small – with family and friends!

Ask for introductions

If you want to connect with someone, find a way to help!

When you ask questions, listen: learn how to dialogue

Be sincere, NO manipulation: small industry, word travels fast!

Leverage technology: texting, email, social media, phone apps

Beware of toxic connections, cut anchors fast

If you want to connect with someone, find a way to help that person. ...

•Be intriguing. ...

•Think people, not positions. ...

•Give before you ask.

Page 22: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Gail Essen, CPP, PSPEnterprise Integrated Security

Golden Valley, MN

Security Plans

Risk, Threat, Site Assessments

Strategic Execution

Business Valuation

Honeywell

Americas West

BrandCopyright©2016 Gail M Essen

Page 23: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Brand

“A brand is a set of marketing and communication methods

that help to distinguish a company from competitors and create a lasting impression in the minds of customers.” Wikipedia

Distinguish: “Make oneself worthyof respect by one’s behaviour or achievements” Oxford Dictionary

Copyright©2016 Gail M Essen

Page 24: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Bold Respect AttireNever

Give UpDeliver

Copyright©2016 Gail M Essen

Page 25: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

BOLD

•Market Yourself•LinkedIn Profile

• Professional Photo

•Volunteer• WIS Council Mentoring

• ASIS Chapter events

I am BOLDCopyright©2016 Gail M Essen

Page 26: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

RESPECT

Yourself & Other Women

Why do women disrespect other women?

Copyright©2016 Gail M Essen

Page 27: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Attire

• The curse of Business Casual

• Your dress affects your mental game

• Your dress affects how you are perceived

Copyright©2016 Gail M Essen

Page 28: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Never Give Up

• Keep an “Accomplishments” log

• Have a support system

• Don’t complain to someone who can’t do anything

• Document

Copyright©2016 Gail M Essen

Page 29: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Deliver

• Your word is your Bond

• Consider the time and effort needed before accepting new commitments

• Respond with, “ Let me have a week to consider that”

Copyright©2016 Gail M Essen

Page 30: Women In Security - the Conference Exchange€¦ · •Networking •Brand Success. Rose Miller, CPP, CHPA Staff Consultant Columbus, OH Risk & Vulnerability Assessments Security

Copyright©2016 Gail M Essen