SlideShare une entreprise Scribd logo
1  sur  32
ORGANIZATIONAL SECURITY
CULTURE:
A New Business Paradigm
Joel Jesus M. Supan
Philippines
This Presentation and Organizational Security Culture
Development Program was created and developed by
Joel Jesus M. Supan.
All rights reserved, this is protected by the Philippine
Law on Intellectual Property. No part of this presentation
shall be reproduced in any form or by any means,
electronic, mechanical, photocopying, recording or
otherwise, without the written permission of the author
and creator.
Philippine Copyright©2019
WARNING
DESIRED OUTCOME
For the audience to be familiar with
the Concept of Organizational
Security Culture as a new Business
Paradigm,
what it is,
its rationale
and how to achieve it.
TOPIC OUTLINE
1. Security Awareness Test
2. Organizational Security Culture Defined
3. Security Fundamentals (B2B) - Rationale for
Organizational Security Culture
4. How to achieve Organizational Security Culture
ORGANIZATIONAL
SECURITY CULTURE
is an established system of
values, beliefs and ethics of
an organization that is based
on the fundamental principles
security.
INDICATORS OF ORGANIZATIONAL
SECURITY CULTURE
1. Employees have collectively internalized
Security;
2. They manifest understanding of security in
words and in deeds;
3. They actively contribute ideas to develop
security measures;
4. No loss has been incurred due to employee
ignorance and negligence.
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
R - Resource
T - Time
$ - Goal
The basic objective
of any business is to
have money.
The basic mission of
any business is
make money.
Security
Fundamentals
No. 1
Source: “The Art and Science of Security, 2012.
Every company
resource is essential
to achieve business
objectives.
Security
Fundamentals
No. 2
Functional Relationships of Resources
Source: “The Art and Science of Security, 2012.
Resources are
the “Objects of
Security”
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Security
Fundamentals
No. 2
Functional Relationships
of Resources
Source: “The Art and Science of Security, 2012.
Resources are the
“Objects of Security”
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
The Company’s
Resources are like
cards in a deck.
It can not operate with
one resource missing
The enemies of
security are
hazards, threats,
risks, disruptions,
mishaps,
emergencies,
crisis, disasters
and loss.
Hazard to Loss Progression Model
Security
Fundamentals
No. 3
Source: “The Art and Science of Security, 2012.
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Security
Fundamental
No. 4
Mishaps and
disruptions are
caused by the
confluence of a
hazard, its object and
the opportunity for
both to meet at a
specific time, place,
and conditions.
Threat Differentiation Model
Source: “The Art and Science of Security, 2012.
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Security
Fundamentals
No. 5
Security is a
predictable
environment to
ensure the attainment
of Organizational
(Business)
Objectives.
Security Definition Framework
Source: “The Art and Science of Security, 2012.
$
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Security
Fundamentals
No. 6
The Principles of
Security are
indispensable bases
for the creation of
Business Security
Plans and Programs
Basic Principles of Security
Source: “The Art and Science of Security, 2012.
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Security
Fundamentals
No. 7
The Aspects of
Security are the
measures by which
Security can be
achieved
Aspects Security
Source: “The Art and Science of Security, 2012.
1. Personnel Security
2. Operations Security
3. Information Security
4. Environment Security
5. Reputation Security
6. Physical Security
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Security
Fundamentals
No. 8
Security Integration
and Convergence are
programs by which all
the Aspects of
Security are put
together to
complement and
supplement each
other.
Stonewall Security Model
for Security Integration
Source: “The Art and Science of Security, 2012.
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Security
Fundamentals
No. 9
Security has a
never-ending
Functional Cycle
of Prevention,
Response,
and Investigation
Operational Objectives of Security
Source: “The Art and Science of Security, 2012.
Security Fundamentals (B2B)
Rationale for Organizational Security Culture
Organizational Security Culture
Development
Is done by
incorporating the
Basic Security
Concepts in all the
Aspects of Business
Administration and
Operation
Organizational Security
Culture
Security Domains are
perceived to be
different turfs.
All Security Domains
require the
applications of the
same Security Aspects
Constraints in
Developing
Organizational Security
Culture
Confusion in Security Domains
Source: YourTemplateFinder
VIP
Security
IT
Security
National
Security
Industrial
Security
Corporate
Security
Home
SecurityInsurance
Business
Continuity
ERT
Food
Security
Human
Security
SAFETY
Organizational Security Culture
Development
Organizations,
regardless of their
sizes, have the same
objectives and the
resources to achieve
such. Therefore,
the principles and
measures by which
we protect their
resources are the
same.
Organizational
Comparative Matrix
of Objectives,
Leadership and
Resources
Organizational Security Culture
Development
The mindset of the old
convention is
predisposed to the use of
force and fortification for
security
Constraints in
Developing
Organizational Security
Culture
Tyranny of “For Compliance”
Organizational Security Culture
Development
Step 1
Adopt an
Organizational
Security Philosophy
that is based on the
Principles and Aspect
of Security and their
integration
Stonewall Security Model
for Security Integration
Source: “The Art and Science of Security, 2012.
Organizational Security Culture
Development
Create and adopt a
Security Policy
Statement and
Regulation with the
corresponding
rationale,
objectives,
dissemination
procedures,
physical support
and tools for
enforcement
Aspects Security
Source: “The Art and Science of Security, 2012.
OPERATION
SECURITY
Ensures that all
Policies,
Systems,
Procedures
Rules and
Regulations
are followed
and enforced
Step 2
Organizational Security Culture
Development
Business Organization as a Vehicle to
its Objective
Organizational Security Culture
Development
Source: “The Art and Science of Security, 2012.
Include Security
Duties and
Responsibilities in
the Individual
Employee’s
Key Result Areas
and Productivity
Indicators
Aspects Security
Source: “The Art and Science of Security, 2012.
PERSONNEL SECURITY
Ensures that all
Employees are
capable, reliable,
trustworthy, loyal,
healthy and happy.
Step 3
ELEMENTS
1. Personal History
2. Due Diligence
3. Education & Training
4. Supervision
5. Evaluation
6. Debriefing
Organizational Security Culture
Development
Aspects Security
Source: “The Art and Science of Security, 2012.
PERSONNEL SECURITY
Ensures that all
Employees are
capable, reliable,
trustworthy, loyal,
healthy and happy.
ELEMENTS
1. Personal History
2. Due Diligence
3. Education & Training
4. Supervision
5. Evaluation
6. Debriefing
Organizational Security Culture
Development
Educate all
employees on the
Fundamentals of
Security upon
hiring.
Security is not
covered in an
academic
undertaking.
Step 4
Provide a monitoring
system for employee
conduct by enjoining
everyone to
contribute to the
protection of
company resources.
Source: “The Art and Science of Security, 2012
Step 5
Organizational Security Culture
Development
$
ORGANIZATIONAL SECURITY CULTURE:
A New Business Paradigm
Security
ensures the attainment of Organizational Objectives.
Security is the bridge to every
dream… to every goal.
TAKE AWAY
Securology: the study of being free from care.
Se cura (Latin): without care, free from care Logia
(Greek): study of
Note: “Securology” has been submitted to Lexington
Dictionary for inclusion into the English Language by
this author.
TAKE AWAY
Have a nice ay and a
fruitful convention
THANK YOU.
JOEL JESUS M. SUPAN
Author
FIELD OF EXPERTISE
Organizational Security Education
&Training
Security Services Management
Security Business Intelligence
Corporate Security Management
Corporate Intelligence and Investigation
Risk Management
Crisis Management
Business Continuity
34 Years of Security Practice
Past Chairman- CHED TC BSISM
BSP Certified Security Subject Matter Expert
Member - PNP SOSIA Advisory Council
Graduate - PMA CLASS 1981
Officer - American Society for Ind’l Security
Author - The Art and Science of Security
Inventor - Pepperella
STONEWALL SECURITY
CONCEPTS AND CONSULTING
SERVICES
63 Magnolia Street
Roxas Dist., Quezon City
Telephone Number 371-4864
Cell Phone No: 09178892154
Email Address: stonewall.sec81@yahoo.com
Website: www.stone-security.com

Contenu connexe

Tendances

Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?PECB
 
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...Bachir Benyammi
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certificationtschraider
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
Cobit 4.1 Highlights
Cobit 4.1 HighlightsCobit 4.1 Highlights
Cobit 4.1 Highlightsgeoffharmer
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 

Tendances (20)

Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?
 
DFIR
DFIRDFIR
DFIR
 
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
Organigramme de la mise en œuvre du SMSI et processus de certification ISO 27...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Cobit 4.1 Highlights
Cobit 4.1 HighlightsCobit 4.1 Highlights
Cobit 4.1 Highlights
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 

Similaire à Organizational Security Culture : A New Business Paradigm by JMSupan 2019

Stepping Up to Operational Safety Excellence
Stepping Up to Operational Safety ExcellenceStepping Up to Operational Safety Excellence
Stepping Up to Operational Safety ExcellenceLarry McCraw
 
BUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdfBUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdfAmb Steve Mbugua
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...Dejan Jeremic
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0theonassiokas
 
Safety Slide Show
Safety Slide ShowSafety Slide Show
Safety Slide Showjmishlove
 
Practical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforcePractical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforceKeyaan Williams
 
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...Australian Institute of Health & Safety
 
www.occupationalhazards.com May 2005 Occupational Hazards 43.docx
www.occupationalhazards.com May 2005  Occupational Hazards 43.docxwww.occupationalhazards.com May 2005  Occupational Hazards 43.docx
www.occupationalhazards.com May 2005 Occupational Hazards 43.docxericbrooks84875
 
AMSJ-GSI-Summer Feature
AMSJ-GSI-Summer FeatureAMSJ-GSI-Summer Feature
AMSJ-GSI-Summer FeatureAndrei Stewart
 
Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014Daniel McGarvey
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxBachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxwilcockiris
 
Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...OHS Leaders Summit
 
presentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptxpresentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptxbhaskarbhalerao
 
To be or not to be: A systematic review and critique of safety leadership res...
To be or not to be: A systematic review and critique of safety leadership res...To be or not to be: A systematic review and critique of safety leadership res...
To be or not to be: A systematic review and critique of safety leadership res...Australian Institute of Health & Safety
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insightsciso_insights
 
Safety culture definition and enhancement process- CANSO
Safety culture definition and enhancement process- CANSOSafety culture definition and enhancement process- CANSO
Safety culture definition and enhancement process- CANSODigitalPower
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTIJNSA Journal
 

Similaire à Organizational Security Culture : A New Business Paradigm by JMSupan 2019 (20)

Stepping Up to Operational Safety Excellence
Stepping Up to Operational Safety ExcellenceStepping Up to Operational Safety Excellence
Stepping Up to Operational Safety Excellence
 
BUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdfBUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdf
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0
 
Safety Slide Show
Safety Slide ShowSafety Slide Show
Safety Slide Show
 
Practical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforcePractical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated Workforce
 
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
Workshop 1: Safety Leadership in action: The role of safety leadership in cre...
 
www.occupationalhazards.com May 2005 Occupational Hazards 43.docx
www.occupationalhazards.com May 2005  Occupational Hazards 43.docxwww.occupationalhazards.com May 2005  Occupational Hazards 43.docx
www.occupationalhazards.com May 2005 Occupational Hazards 43.docx
 
AMSJ-GSI-Summer Feature
AMSJ-GSI-Summer FeatureAMSJ-GSI-Summer Feature
AMSJ-GSI-Summer Feature
 
Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
ASIS Chapter 206 Meeting-Safety Vs Security
ASIS Chapter 206 Meeting-Safety Vs SecurityASIS Chapter 206 Meeting-Safety Vs Security
ASIS Chapter 206 Meeting-Safety Vs Security
 
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxBachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
 
Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...
 
presentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptxpresentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptx
 
To be or not to be: A systematic review and critique of safety leadership res...
To be or not to be: A systematic review and critique of safety leadership res...To be or not to be: A systematic review and critique of safety leadership res...
To be or not to be: A systematic review and critique of safety leadership res...
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
 
Safety culture definition and enhancement process- CANSO
Safety culture definition and enhancement process- CANSOSafety culture definition and enhancement process- CANSO
Safety culture definition and enhancement process- CANSO
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 

Dernier

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance managementVaishnaviGunji
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 

Dernier (20)

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 

Organizational Security Culture : A New Business Paradigm by JMSupan 2019

  • 1. ORGANIZATIONAL SECURITY CULTURE: A New Business Paradigm Joel Jesus M. Supan Philippines
  • 2. This Presentation and Organizational Security Culture Development Program was created and developed by Joel Jesus M. Supan. All rights reserved, this is protected by the Philippine Law on Intellectual Property. No part of this presentation shall be reproduced in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the written permission of the author and creator. Philippine Copyright©2019 WARNING
  • 3. DESIRED OUTCOME For the audience to be familiar with the Concept of Organizational Security Culture as a new Business Paradigm, what it is, its rationale and how to achieve it.
  • 4. TOPIC OUTLINE 1. Security Awareness Test 2. Organizational Security Culture Defined 3. Security Fundamentals (B2B) - Rationale for Organizational Security Culture 4. How to achieve Organizational Security Culture
  • 5. ORGANIZATIONAL SECURITY CULTURE is an established system of values, beliefs and ethics of an organization that is based on the fundamental principles security.
  • 6. INDICATORS OF ORGANIZATIONAL SECURITY CULTURE 1. Employees have collectively internalized Security; 2. They manifest understanding of security in words and in deeds; 3. They actively contribute ideas to develop security measures; 4. No loss has been incurred due to employee ignorance and negligence.
  • 7. Security Fundamentals (B2B) Rationale for Organizational Security Culture R - Resource T - Time $ - Goal The basic objective of any business is to have money. The basic mission of any business is make money. Security Fundamentals No. 1 Source: “The Art and Science of Security, 2012.
  • 8. Every company resource is essential to achieve business objectives. Security Fundamentals No. 2 Functional Relationships of Resources Source: “The Art and Science of Security, 2012. Resources are the “Objects of Security” Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 9. Security Fundamentals No. 2 Functional Relationships of Resources Source: “The Art and Science of Security, 2012. Resources are the “Objects of Security” Security Fundamentals (B2B) Rationale for Organizational Security Culture The Company’s Resources are like cards in a deck. It can not operate with one resource missing
  • 10. The enemies of security are hazards, threats, risks, disruptions, mishaps, emergencies, crisis, disasters and loss. Hazard to Loss Progression Model Security Fundamentals No. 3 Source: “The Art and Science of Security, 2012. Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 11. Security Fundamental No. 4 Mishaps and disruptions are caused by the confluence of a hazard, its object and the opportunity for both to meet at a specific time, place, and conditions. Threat Differentiation Model Source: “The Art and Science of Security, 2012. Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 12. Security Fundamentals No. 5 Security is a predictable environment to ensure the attainment of Organizational (Business) Objectives. Security Definition Framework Source: “The Art and Science of Security, 2012. $ Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 13. Security Fundamentals No. 6 The Principles of Security are indispensable bases for the creation of Business Security Plans and Programs Basic Principles of Security Source: “The Art and Science of Security, 2012. Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 14. Security Fundamentals No. 7 The Aspects of Security are the measures by which Security can be achieved Aspects Security Source: “The Art and Science of Security, 2012. 1. Personnel Security 2. Operations Security 3. Information Security 4. Environment Security 5. Reputation Security 6. Physical Security Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 15. Security Fundamentals No. 8 Security Integration and Convergence are programs by which all the Aspects of Security are put together to complement and supplement each other. Stonewall Security Model for Security Integration Source: “The Art and Science of Security, 2012. Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 16. Security Fundamentals No. 9 Security has a never-ending Functional Cycle of Prevention, Response, and Investigation Operational Objectives of Security Source: “The Art and Science of Security, 2012. Security Fundamentals (B2B) Rationale for Organizational Security Culture
  • 17. Organizational Security Culture Development Is done by incorporating the Basic Security Concepts in all the Aspects of Business Administration and Operation Organizational Security Culture
  • 18. Security Domains are perceived to be different turfs. All Security Domains require the applications of the same Security Aspects Constraints in Developing Organizational Security Culture Confusion in Security Domains Source: YourTemplateFinder VIP Security IT Security National Security Industrial Security Corporate Security Home SecurityInsurance Business Continuity ERT Food Security Human Security SAFETY Organizational Security Culture Development
  • 19. Organizations, regardless of their sizes, have the same objectives and the resources to achieve such. Therefore, the principles and measures by which we protect their resources are the same. Organizational Comparative Matrix of Objectives, Leadership and Resources Organizational Security Culture Development
  • 20. The mindset of the old convention is predisposed to the use of force and fortification for security Constraints in Developing Organizational Security Culture Tyranny of “For Compliance” Organizational Security Culture Development
  • 21. Step 1 Adopt an Organizational Security Philosophy that is based on the Principles and Aspect of Security and their integration Stonewall Security Model for Security Integration Source: “The Art and Science of Security, 2012. Organizational Security Culture Development
  • 22. Create and adopt a Security Policy Statement and Regulation with the corresponding rationale, objectives, dissemination procedures, physical support and tools for enforcement Aspects Security Source: “The Art and Science of Security, 2012. OPERATION SECURITY Ensures that all Policies, Systems, Procedures Rules and Regulations are followed and enforced Step 2 Organizational Security Culture Development
  • 23. Business Organization as a Vehicle to its Objective Organizational Security Culture Development Source: “The Art and Science of Security, 2012.
  • 24. Include Security Duties and Responsibilities in the Individual Employee’s Key Result Areas and Productivity Indicators Aspects Security Source: “The Art and Science of Security, 2012. PERSONNEL SECURITY Ensures that all Employees are capable, reliable, trustworthy, loyal, healthy and happy. Step 3 ELEMENTS 1. Personal History 2. Due Diligence 3. Education & Training 4. Supervision 5. Evaluation 6. Debriefing Organizational Security Culture Development
  • 25. Aspects Security Source: “The Art and Science of Security, 2012. PERSONNEL SECURITY Ensures that all Employees are capable, reliable, trustworthy, loyal, healthy and happy. ELEMENTS 1. Personal History 2. Due Diligence 3. Education & Training 4. Supervision 5. Evaluation 6. Debriefing Organizational Security Culture Development Educate all employees on the Fundamentals of Security upon hiring. Security is not covered in an academic undertaking. Step 4
  • 26. Provide a monitoring system for employee conduct by enjoining everyone to contribute to the protection of company resources. Source: “The Art and Science of Security, 2012 Step 5 Organizational Security Culture Development
  • 27. $ ORGANIZATIONAL SECURITY CULTURE: A New Business Paradigm Security ensures the attainment of Organizational Objectives.
  • 28. Security is the bridge to every dream… to every goal. TAKE AWAY
  • 29. Securology: the study of being free from care. Se cura (Latin): without care, free from care Logia (Greek): study of Note: “Securology” has been submitted to Lexington Dictionary for inclusion into the English Language by this author. TAKE AWAY
  • 30. Have a nice ay and a fruitful convention THANK YOU.
  • 31. JOEL JESUS M. SUPAN Author FIELD OF EXPERTISE Organizational Security Education &Training Security Services Management Security Business Intelligence Corporate Security Management Corporate Intelligence and Investigation Risk Management Crisis Management Business Continuity 34 Years of Security Practice Past Chairman- CHED TC BSISM BSP Certified Security Subject Matter Expert Member - PNP SOSIA Advisory Council Graduate - PMA CLASS 1981 Officer - American Society for Ind’l Security Author - The Art and Science of Security Inventor - Pepperella
  • 32. STONEWALL SECURITY CONCEPTS AND CONSULTING SERVICES 63 Magnolia Street Roxas Dist., Quezon City Telephone Number 371-4864 Cell Phone No: 09178892154 Email Address: stonewall.sec81@yahoo.com Website: www.stone-security.com