02 August 2010

Great Time at the NRF LP SHOW

By the way I did have a great time at the NRF LP 2010 Show. I know this post is a little late, but I have been very busy on follow-up.

 I am very sorry to see Rhett Asher leave the NRF, but I understand change, just ask my wife.  I feel it was the best NRF LP event ever and it is going to be difficult for the NRF to fill Rhett's shoes.

Superior topics:

  • E-Commerce Fraud
  • Retail Special Event Security
  • Positioning the LP Department for the Economic Comeback
  • Return Fraud Update and New Ideas
  • Inspect what you Expect 
  • ORC Updates
  • Putting "Prevention" back into LP
And the round table discussions were excellent, I wish I got to them all.  

And don't forget the Networking Reception at the "Hard Rock" in Atlanta sponsored by SIRAS.  It was a great event.  I had a great time and met some good new friends as well as some professionals I have been lucky enough to know for the last 20 or 30 years.

Thanks' again NRF and good luck Rhett.


Does Your Organization Have A Robust Integrated Security Architecture Strategy?

Many organizations have ad hoc security measures in place or have implemented security procedures and technology as needed without a system wide review of what is necessary from all departments. Unplanned security architecture can leave holes in the environment that are not readily apparent or security spending can be on the wrong technologies without a full understanding of where the risk truly lies in the architecture. A robust integrated security architecture strategy is an end-to-end analysis of potential risk based on client business requirements.

Our Solution—Business Focus Beyond the Technical Domain

Your overall security and loss prevention is the focus of implementing good solutions over time.  A forward looking, detailed security architecture strategy can help you fix your current weaknesses, and anticipate or predict future risk and implement mitigation solutions. A solution will be developed that is specific to the available resources and maps closely to the business goals of the organization. Risk mitigating measures are developed with security technologies that fit the corporate framework.
To learn more send an email to James.McDonald@PST-Mail.com or call me at (877) 214-2900.

30 July 2010

Transforming Employee Motivation To Steal Into Motivation To Perform

New White-Paper  "As the world economy continues its weak recovery, internal shrink and fraud continues to plaque both retailers and restaurants as the biggest source of loss for these organizations.  Learn more about the Expectancy Theory by clinking on the image below:






To learn more go to http://www.reteltechnologies.com 

26 July 2010

CONSULTANCY SERVICES mean achieving real business results that allow you to transform andnot just maintain your security and operations.

We offer superior consulting services to assist Fortune 500 and other enterprise clients in providing safe and secure environments for their people, property and other assets. Our expertise is in the areas of Physical Security, Risk Management, Loss Prevention and Compliance.  We actively seek and apply the best possible solutions and methodologies today, making sure to holistically factor in people, processes and business issues.

RISK = (THREATS X VULNERABILITIES / COUNTERMEASURES) x Assets    


Our services are designed to protect clients “Brand” and pinpoint fraud & loss prediction and prevention program strengths and weaknesses, cure or reduce operational deficiencies and at the same time maximize existing resources. We do not provide any security services nor sell security products and is therefore unbiased and objective when assessing critical requirements and recommendations on behalf of their clients. We provide impartial balanced thought and advice helping our clients make the right solution decision. With a diverse background our team can deliver a comprehensive range of security, fraud deterrence, loss prevention, operational risk management consulting services to multi-sector clients.

Our aim is to exceed the client's expectations on each and every project, no matter how large or small the objectives. The primary purpose of all of our assessments is vulnerability identification or threat (exposure) determination and to make the task of analysis of the existing risk more manageable by establishing a base from which to proceed. We believe in the premise that vulnerability threats that occur, whether the source is fraud based, physical security, logical security or a general liability issue, are not random occurrences, they occur when the conditions are right for them to occur.

Our assessments attack the root causes and enablers of these vulnerabilities. Our thesis is that improving organizational policies and procedures to eliminate threats, improve awareness that protect assets, minimize exposure and reduce losses is the single best defense. Then we follow up with the latest technology countermeasures that reinforce your policies and procedures to act as an overwhelming deterrence and insure compliance and evolve as changes require over time.

Physical Security Project Management (PSPM)

To assist the client in selection, review, purchase of security, loss prevention, risk management or business intelligence equipment and/or security programs in bringing their security program into acceptable security standards and practices. Many companies do not have the time or expertise to review the inclusive security management plan and are lax in maintaining security standards which could result in theft, vandalism, fraud, loss of brand recognition, loss of service, business continuity or general liability.



My Solution

We are able to provide project management on your security, loss or risk vulnerabilities and liabilities that have been identified by our assessment (s). We work with your company to determine the most cost effective way to mitigate the concerns. We will team with vendors to determine which product is the most effective and efficient and obtain price quotes. Working with you, equipment or solutions can be purchased, installed and proper training provided. Follow-up and on-site inspections will be provided by MassBiz LLC; afterward the solution will be documented and verified by us.

Our Project Management Areas of responsibility include:

• Product search for the right equipment to resolve your problem
• Determine with client which vendor is most cost effective and efficient
• Ensure equipment is installed to specifications of purchaser
• Ensure proper training is provided to end user of equipment
• Follow-up to ensure equipment is working properly and adjust accordingly if necessary

How My Process Works

Our Physical Security Consultants will work with the client to establish what particular project management services will be provided. The consultant will explore the most efficient and cost effective measure to mitigate the security concern. We will work with the client purchasing department to determine which vendor should be selected varying on many factors. Follow-up will be provided by on-site inspections by us to ensure the correct product was purchased and installed.  Training by the vendor will be documented and verified by the MassBiz LLC consultant.

Physical Security Talking Points and Fraud

When discussing physical security, there are several important talking points to consider. Here are some key points to include: Risk Assessm...