Pedro "Pete" Quinones-Tavarez is a 21 year veteran of the US Marine Corps and a 23 year vet of the Central Intelligence Agency. In this video clip, Pete introduces himself as part of the SMI security team.
Visit Security Management International all over the web:
Security Management International (SMI): [ Ссылка ]
SMI on Facebook: [ Ссылка ]
SMI on Twitter: [ Ссылка ]
SMI's Blog: [ Ссылка ]
SMI on LinkedIn: [ Ссылка ]
Our Other YouTube Videos:
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
Critical aspect of a security program
Perhaps the most critical aspect of a security program is with the understanding of the persons or organizations being protected, its services, and the location(s) of the assets involved. With a clear view of the setting, the steps necessary to secure those items become clear and the resulting solutions are appropriate to the scenario. Our initial step in the development of a security program is to conduct preliminary performance testing to gain critical knowledge regarding the ongoing operations. This testing, sometimes referred to as assessment, will outline the vital operational areas and current performance levels associated with each. For example, a contract guard force often appears to be "effective" as they have pressed uniforms and greet guests cordially. However, upon close inspection of their policies and investigation of their capabilities, it becomes clear that in the event of a crisis, the effectiveness is limited at best.
Approach to security
Our comprehensive approach to security is first to conduct a threat analysis followed by a vulnerability assessment of the assets to be protected, whether those assets are political leaders, businessmen, office buildings, industrial factories, computers, electronic data, shipments, or other valuable resources. Once a thorough assessment has been completed, and the material risks and threats are identified, we determine the best approach to eliminating, thwarting or offsetting the vulnerabilities, and recommend appropriate security systems, protocols and countermeasures to be implemented. Our solutions take into account all applicable cultural, financial, operational, and technical limitations. We provide executive summaries, detailed analyses and reports, formal recommendations, implementation plans, and cost estimates. We also offer, where appropriate, turn-key systems, installation, testing, training, operational assistance, maintenance, and other support services.
Belief about security
We believe that security, to be most effective, must not only prevent potential vulnerabilities, but also discourage and defeat would-be aggressors, whether they are unauthorized insiders or disgruntled employees, known competitors or opponents, unknown outsiders, criminals, malicious vandals, terrorists, political activists, or others. SMI's ability to perform such security support functions is based in large part on the international technical and operational experience acquired in combating terrorists, narco-traffickers, insurgents, intelligence organizations and criminals. Our principles and associates are former officers of national intelligence organizations, military special operations forces, national law enforcement agencies and corporate security directorates. They are well conditioned to implement the preventive and preemptive techniques necessary to reduce the vulnerability of persons, property and organizations.
Ещё видео!