Krista Monnin, Procter & Gamble

Slides:



Advertisements
Similar presentations
PHYSICAL SECURITY SURVEY AND ASSESSMENT
Advertisements

Choice Theory Development of Choice Theory Concepts of Rational Choice
Things to think about: What kind of crime has been committed? Who is the victim? Who is the perpetrator? What is the motive? What happens to them all?
Classical theory n Beccaria: On crime and Punishment (1764) n Justice was chaotic, corrupt; governments were monarchies (divine right of kings) n Essay.
Planning and Strategic Management
Police Technology Chapter Twelve
Career Goal Setting By Leah Thomas. What is a goal?  A goal is a purpose toward which an effort is focused.
Introduction to Network Defense
Protecting the Public Purse Fraud Briefing 2013 Hertfordshire County Council.
Dr. Rado Kotorov Technical Director Strategic Product Mgt. BI Applications For Crime Intelligence : Data Mining & Predictive Modeling.
Crime Analysis with Crime Mapping Chapter 10: Identifying Useful and Meaningful Patterns Prepared by: Dr. Rachel Boba (August 2008)
Information Security Issues at Casinos and eGaming
Conostix S.A. Sensible defence.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
PATTERNS OF CONCERN: AWARENESS AND ACCEPTANCE Webinar Series 8 of 8 BROUGHT TO YOU BY THE ASSOCIATION OF WALDORF SCHOOLS OF NORTH AMERICA.
Role for Electric Sector in Critical Infrastructure Protection R&D Presented to NERC CIPC Washington D.C. June 9, 2005 Bill Muston Public Release.
HATE CRIMES: Investigative Review Chief Thomas Kilcullen SUNY Geneseo Police Department.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
International Stakeholder Management IMPACT Corporate Training.
Lachlan, Steven, Genevieve. Crimes (Sentencing Procedure) Act 1999, Section 3A  To ensure that the offender is adequately punished for the crime.  To.
Benefit Cost Analysis for Flood Hazard Mitigation: The Federal Emergency Management Agency (FEMA) Method (selected excerpts from FEMA EMI Training Course)
WOMEN, CHILDREN, AND PUBLIC HEALTH MPH 600 INTRODUCTION TO PUBLIC HEALTH W. TWEEL, MD, MPH.
Community Safety and Disability Anne Lawtey Community Safety Partnership Manager.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Mina Maged Brands - An identifiable product augmented & the buyer perceives unique, added values. -Nescafe & Misr cafe -Brand personality = Design, colour,
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
What is Emergency ?. A serious situation or occurrence that happens unexpectedly and demands immediate action.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Hamid Jahankhani Chapter 21 - Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the.
Chapter Four: Choice Theory: Because They Want To.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Unit 4 Dr. Marie Mele. Topics to Discuss Ability of people to make rational choices How people weigh the risks and rewards of engaging in crime How the.
Keynote 9: Cyber Security in Emerging C4I Systems: Deployment and Implementation Perspectives By Eric J. Eifert, Sr. VP of DarkMatter’s Managed Security.
Application of Criminological Theory to Terrorism Prevention Detective Eric Paull Planning Research and Development Akron, OH Police Department.
Strategy and Budget Presentation: Strategy The agency’s strategic plan is guided by the following objectives: To conduct an effective and efficient.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Security Methods and Practice CET4884
CJS 240 Week 2 CheckPoint Delinquency Deterrence Response Write a 300- to 350-word response explaining how the threat of punishment either does or does.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
General information Targeted topics
Chris Corker Corporate Fraud Members Training June 2017
Disaster and Emergency Management
Post Survey Protocol Kenny williamson keith Harbuck keith & holmes llc
Conservation and Efficiency
Balanced Scorecard - Introduction
Prevention Analysis Security Services.
Crime Prevention Through Environmental Design
Ethics in Crisis Management
Chapter 13 Case Management
ORIENTATION.
Choice Theory Chapter 4 SOC 112.
Socially sensitive research
Sexual Assault Employee Training.
Corrections.
Organizational Commitment
Rational Choice Theory
Could Better Questions Lead to More Wallet Share
Role for Electric Sector in Critical Infrastructure Protection R&D
Sentencing and Punishment
Enzymes - Attempt 3 (your target + 1 up and down)
NEW PROJECT REQUEST Project: {Name} 27 March 2017.
A means to an end: criminal analysis and organised crime policy
The Antimalware component: Bitdefender Gravity Zone
Strategic threat assessment
Chapter 7 Process Management.
Prevention, Intelligence
INDUSTRIAL REVOLUTION VOCABULARY
Utilizing Analytics to mitigate
The Store Starts Here: Increasing Awareness of Events and Customer Perceptions in Parking Lots.
Presentation transcript:

Krista Monnin, Procter & Gamble Innovation Lab 3.0 Add Tom to section and Stacie Introduction by: Krista Monnin, Procter & Gamble

Innovation lab 3.0 Dr. Read Hayes- UF, LPRC Tom Meehan, Bloomingdale’s Add Tom to section and Stacie Dr. Read Hayes- UF, LPRC Tom Meehan, Bloomingdale’s Stacie Bearden, The Home Depot Garret King- P1/CCI

Innovation lab 3.0 Sponsored by:

LPRC Uses a Highly Unique Innovation Lab to develop and test selling and protective tactics and technologies

Motivated offenders, desirable targets, and vulnerable places lead to crime and loss LPRC R&D Priorities

LPRC’s model to reduce crime and loss is to detect, define, deter and detain offenders LPRC R&D Priorities

LPRC’s model to reduce crime and loss is to detect, define, deter and detain offenders LPRC R&D Priorities

We do this by shaping the social and built environment… in order to affect offenders and vulnerability LPRC R&D Priorities Local Level

Place managers or leaders are the key LPRC R&D Priorities Place managers or leaders are the key Corporate Level Local Level

The LPRC model is to support key leader awareness AND action LPRC R&D Priorities Local Level Corporate Level

Enhance Situational Awareness LPRC R&D Priorities Corporate Level Local Level

LPRC R&D Priorities Enhance Action Effectiveness Corporate Level Local Level

Enhance Situational Awareness LPRC R&D Priorities Enhance Situational Awareness Corporate Level Local Level Enhance Action Effectiveness

Our objective is to reduce crime attempts

We do that by deterring offenders

We also do that by incapacitating offenders

The LPRC awareness and action model makes these 2 things happen

Incapacitate Offender/Crew/ Infrastructure Action Awareness Incapacitate Offender/Crew/ Infrastructure Prevention/Protection Planning and Deployment LPRC R&D Factors Threat/Crime/ Pattern Deterrence

Threat/Crime/ Pattern Detection Threat/Crime/ Pattern Definition Awareness LPRC R&D Factors

Incapacitate Offender/Crew/Infrastructure Threat/Crime/Pattern Investigation Action Threat/Crime/Pattern Documentation Incapacitate Offender/Crew/Infrastructure Prevention/Protection Planning and Deployment LPRC R&D Factors Threat/Crime/Pattern Deterrence

Action Threat/Crime/Pattern Threat/Crime/Pattern Investigation Detection Action Threat/Crime/Pattern Documentation Threat/Crime/Pattern Definition Awareness Incapacitate Offender/Crew/Infrastructure Prevention/Protection Planning and Deployment LPRC R&D Factors Threat/Crime/Pattern Deterrence

Incapacitate Offender/Crew/Infrastructure Prevention/Protection Action Incapacitate Offender/Crew/Infrastructure Prevention/Protection Planning and Deployment Awareness LPRC R&D Factors Threat/Crime/Pattern Deterrence

Threat/Crime/Pattern Detection Investigation Action Threat/Crime/Pattern Definition Threat/Crime/Pattern Documentation Incapacitate Offender/Crew/Infrastructure Awareness Threat/Crime/Pattern Deterrence LPRC R&D Factors Prevention/Protection Planning and Deployment

LPRC is working to enhance situational awareness for local and corporate leaders

Situational awareness provides the leader insight into and from all 5 zones

This helps leaders detect, define, and affect incoming threats

Situational awareness for local leaders includes:

Situational Awareness Model Threats Detect

Situational Awareness Model Threats Events Detect

Situational Awareness Model Threats Events Patterns Detect

Situational Awareness Model Threats Events Patterns Detect Define

Situational Awareness Model Threats Events Patterns Detect Define

Situational Awareness Model Threats Events Patterns Detect Define

Situational crime and loss control for local leaders includes:

Situational Crime Prevention Model Increase Perceived Effort Increase Perceived Risk Reduce Perceived Benefit

Situational Crime Prevention Model Increase Perceived Effort Increase Perceived Risk Reduce Perceived Benefit

Situational Crime Prevention Model Notice the Cue “See it” Recognize Cue “Get it” Respect the Cue “Fear it” Increase Perceived Effort Increase Perceived Risk Reduce Perceived Benefit