Presented by: Dieter Giblin | Sharon Shaw

Slides:



Advertisements
Similar presentations
“The Niagara Framework, Not Just for HVAC Anymore” August 2007 Scott Muench – Director Corporate Sales Bryant Butler – M2M Sales Development © 2007 Tridium,
Advertisements

MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Regulatory Compliant Performance Improvement for Pharmaceutical Plants AIChE New Jersey Section 01/13/2004 Murugan Govindasamy Pfizer Inc.
IBM SPSS Solutions A SELECT INTERNATIONAL COMPANY.
Security Controls – What Works
Jeffery J. Gust IOWA INDUSTRIAL ENERGY GROUP FALL CONFERENCE Tuesday, October 14, 2014 MidAmerican Energy Company.
Company Program. Disaster Recovery A Disaster Recovery Plan is a plan for business continuity in the event of a disaster that destroys part or all of.
Who We Are We enable our customers to gain unprecedented insights to optimize their customer, channel partner, vendor and employee relationships. TheMindSuite.
Consultancy.
Top 10 Factors in Selecting an Asset Disposition Partner To Maximize Your Investment Recovery Presented by: Tom Burton and Brian E. Thompson Liquidity.
A Secure Frontline September 25, 2003
James Brehm Senior Strategist Compass Intelligence.
National Rural Transit Assistance Program. Learning Objectives Safety Safety Security Security Emergency Preparedness Emergency Preparedness.
Cape Fear Valley Medical Center. The Healthcare Landscape Graybar understands the challenges in operating health care facilities today. You need to deliver.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Why and How to Manage your infrastructure lifecycle? David Baudrez Vertical.
World Intellectual Property Organization DCPPS 1 presented by Mr. Vladimir Yossifov WIPO NATIONAL WORKSHOP ON INNOVATION SUPPORT SERVICES AND THEIR MANAGEMENT.
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
PARTNERING for your INTERESTS Companies invest in security to protect their people, property and information. In doing so, they are also protecting the.
Solutions for the crisis Charisma Business Suite.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Supervisor services. Project manager Technological group Chief supervisor Supervisors facilities HSE Quality engineer HSE engineer Administrative support.
For More Best A+ Tutorials CMGT 442 Entire Course (UOP Course) CMGT 442 Week 1 DQ 1 (UOP Course)  CMGT 442 Week 1 DQ 1 (UOP Course)
Strategic and Business Planning for Ensuring of Cooperatives Sustainability Dr. Hakkı Çetin TARIS Union of Olive and Olive Oil Agricultural Sale Cooperatives.
J. R. S. Group Limited was incorporated in the Republic of Kenya on the 1 st day of October 2001 under certificate of incorporation number C with.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
Non-Confidential Copyright © 2006 CyberRAVE LLC. All Rights Reserved. CyberRAVE January 24, 2006 Strategic Approach to Developing Corporate Data Insurance.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Business Intelligence Energy, Resources and Utilities.
LCPS Department of Safety & Security
Selling a Product or Service
THINK DIFFERENT. THINK SUCCESS.
Making Marketing Content – A Workshop For Security Professionals
Physical Security Governance Model
From Sales Rockstar to Superstar
Selling a Product or Service
Using The Balance Scorecard
Transaction Processing Systems
Introduction to Marketing Research
Fraud Risk Management at Digital Insurance Market
Global Business Today 7e
Information Security: Risk Management or Business Enablement?
Factors to Consider While Picking The Right Location for Your Commercial Property.
I have many checklists: how do I get started with cyber security?
District Improvement Plan June 26, 2017
Why it means so much for business
Enron Energy Services Energy Management Outsourcing Overview
Hospitality Consultancy & Management Food & Beverage Consultancy
Structure Account Analysis Own Position Business Development
Environmental Safety Basic Emergency Response 5
Environmental Safety Basic Emergency Response
Business Continuity Plan
Cybersecurity ATD technical
Insert date.
OnPage Channel Partner Program
Introduction to: National Response Plan (NRP)
Janet LeBlanc Director, Canada Post
Environmental Safety Basic Emergency Response
Maintaining order and safety in a city is no small task
National Cancer Center
Business Continuity Program Overview
COMPANY NAME Business Continuity Plan Date Presented by.
MAZARS’ CONSULTING PRACTICE
Developing the power sector in Federal Nepal Main lessons from international experience Kathmandu, November 06, 2018.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Environmental Safety Basic Emergency Response
Environmental Safety Basic Emergency Response
Presentation transcript:

New to Security? 10 Things Every Sales Professional Should Know Before Making Sales Calls Presented by: Dieter Giblin | Sharon Shaw On behalf of the PSA Sales & Marketing Committee

Introduction Who is PSA Security Network? Benefits: The world’s largest electronic security cooperative Chances are, your company is an owner! www.psasecurity.com Benefits: National Deployment Program Competitive Bid Program Competitive Pricing on Leading Equipment Committee Engagement | Networking | Education https://www.psasecurity.com/education/committees/sales-and- marketing

Vertical Market Analysis

Who is the customer??? Physical Security: Property, People, Processes Cyber Security/IT: Network, Bandwidth, Technology Management Facilities/Operations: Mechanical, Business operations, Efficiency C-Suite: Key Performance Indicators, Budget, Return on Investment, Protecting the Brand

What is the goal of the security operation? Deter – (Fencing, overt video surveillance, guard patrols, lighting, access control) Detect – and identify (Intrusion systems, video analytics) Delay (Layered security design, CPTED) Respond – and apprehend (Dispatch, Voice-down) Recover – (Report, analyze and adapt) Prevent – (Prepare, Conduct Risk Assessments, Situational Awareness)

Where does security fit into a prospective customer’s budget? Bottom. Depends on the Market Financial: PCI Compliance Gaming: 25 CFR 542 Healthcare: HIPAA, Pharmaceutical Manufacturing: TAPA, FSMA Utilities: CFATS, NERC-CIP Incident Reactions

Who makes the final decision over technology? Functionality, Design Expectations: Physical Security Controlling Access Monitoring Activity Recording History Reporting for Compliance Cyber Security Compliance & Technology Performance: IT Communication protocols Hardening requirements and capabilities Redundancy/Disaster Recovery Business Optimization & Efficiency: Facilities & Operations Convenience vs. Safety & Security Ongoing Maintenance Affordability & Cost-Effectiveness & KPIs: C-Suite Maximize the bottom line Improve key metrics Align security goals with organizational goals

What makes your company the best fit for that project and how do you convince your prospect? Which vertical markets does your company currently specialize in? How would you profile your ideal customer? Which customers are most lucrative and have the healthiest relationships today? What products and services are you providing to you “best customers” today? How can you repeat and/or expand upon your current footprint?

Questions??? Sharon Shaw, sshaw@techsystemsinc.com, 720-212-9844 Dieter Giblin, dgiblin@istechs.net, 808-294-1032