Essay Undergraduate 1,286 words Human Written

Speech Preparation for Security Professionals

Last reviewed: ~6 min read Technology › Security
80% visible
Read full paper →
Paper Overview

Preparing for a Speech before a Security Professional Introduction ASIS International consists of worldwide conglomeration of experts in safety and security matters who all have the responsibility to ensure that any resource under their jurisdiction is safeguarded, be it human beings, facilities as well as sets of data. ASIS International came into existence...

Writing Guide
How to Write an Amazing Persuasive Speech

Introduction Everybody at some point or another has to do a little persuading.  Maybe it’s at your job, as you try to convince your boss that you deserve a raise.  Maybe it’s at school, because giving speeches is part of passing your communications course.  Maybe it’s in...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 1,286 words · 80% shown · Sign up to read all

Preparing for a Speech before a Security Professional
Introduction
ASIS International consists of worldwide conglomeration of experts in safety and security matters who all have the responsibility to ensure that any resource under their jurisdiction is safeguarded, be it human beings, facilities as well as sets of data. ASIS International came into existence in 1955 and all the stakeholders are proficient to serve in all types of industries ranging from state-controlled enterprises, individually owned enterprises as well as enterprises of different scopes. ASIS takes into account the importance of workplace diversity and globalization.
This is seen in the occupants of different positions such as junior administrators, Chief Security Officer, Chief Executive Officer, retirees in the security sector, security experts offering professional advice as well as anyone who is on the road to career change who are all diversified. Annually, ASIS International is involved in hosting the 4-day ASIS International Seminar and Exhibits in various nations. The main purpose of this forum is to display the newest ideas on amenities, computer systems terrain, functional and human resources found in diverse sectors like the computer programming, Information Technology and sectors in the safety and protection fields (ASIS International, n.d.).
Functional Issues and Resolutions
With the increase of computer networks attacks like APTs and cyber spying as well as innovative networks like Internet of Things (IoT), an evolving uncharted territory in which intangible innovations of the human mind are stolen for money has taken over the initial trends of attacks on computer networking systems. Institutions can only curb these attacks by employing strategic tactics in safeguarding Information Technology. Like what we will see later on in this presentation, implementing straightforward guidelines in handling security as well as executing safety measures from experts will go a long way in curbing the attacks. For starters, it is imperative to utilize ISO standards that are renowned worldwide. These include the ISO 27000 as well as the Control Objectives for Information and Related Technologies (CoBit). Carry out a threat assessment by following the mentioned frameworks to establish the level of effectiveness in your enterprise’s safety models in comparison to those found in the worldwide frameworks (Tillyard, 2018).
Enterprises which conform to the existing legal frameworks like: NIST, PCL, GLBA, FISSMA, HITECH and GDPR in addition to benchmarked ways of doing things have to contend with the resulting consequences and the immense effect felt in the particular sector or where the enterprise is physically located. Conforming to the existing frameworks just for the sake of it has its boiling point. This is opposed to enterprises which assimilate the existing frameworks with their own general safety guidelines which makes the complying aspect to be less tedious. Diverse guidelines in safety matters will take into account all essential aspects of conformity. The guidelines constituted to manage your enterprise’s security ought to have more weight than the ones found in the legal conformance guidelines which tend to outline only the basic standards.
Thus, when your enterprise is unable to comply or there is improper execution of security guidelines, this means that your Information Technology frameworks are at a great risk of being attacked. All this can be counteracted simply by incorporating the existing frameworks with your own guidelines for managing safety in the enterprise. The side effects of conforming to the existing frameworks will be felt once you take into consideration the asset and financial cost implications these frameworks will have on your safety guidelines (Tillyard, 2018).
Grouping the safety threats which are continually on the rise can be time consuming. Generally, time wasting occurs when carrying out loads of sequential activities to establish how important and valid the threats are, which in most cases leads to omission of certain heavyweight threats. Instead of all this, the specialists will be better off handling the refined types of threats which can only be curbed by people and taking the lead on rooting out possible threats so as to close the gap in the steps involved in managing a threat (Tillyard, 2018).
The gradual surmounting issue brought about by an outburst in networking tools and resources overrides the initial conforming frameworks that security systems were used to. Therefore, the only way to defend the current plethora of devices which connect and communicate to the IT networks is by ensuring that the safety recruits are proficient and have the expertise in safety frameworks. Embracing and executing suitable legitimate models is as important as modifying your safety docket. This can only be safeguarded by assessing your enterprise’s threats as well as changing over from one system to the other gradually (Tillyard, 2018).
Specialized Duties of Security Executives
Security administrators are mandated with ensuring that evaluation, resolving as well as handling successful safety details in the enterprise is carried out. They do this by being the front-runners of creating successful models such as:
- Examining loss, incidences of loss as well as doing a background on seasonal routines as well as appraisals.
- They play the role of Human Resource managers as well. From employing personnel to doing job orientations, facilitating what is expected from the employees as well as ensuring that the employees follow the established regulations.
- Security administrators are the facilitators of the organization’s public relations. They set departmental goals, they develop the standard operating procedures, and they are the overall accounting managers as well as marketing ambassadors.
- Last but not least, they bear the burden of safeguarding the organizational objectives. This is done by creating awareness on security’ best practices like conducting practical exercises, enlightening others through printed materials and signage. (Tipton & Nozaki, 2007).
Critical Expertise for Security Executive
In addition to the above skills, security personnel have to be stern and thorough to oversee the execution of security frameworks, otherwise the enterprise can encounter extensive loss as a result of loopholes that were overlooked. Moreover, executives with impeccable intercommunication abilities tend to create a conducive environment for teamwork. Other than being equipped with firearms, the bulk of a security executive’s responsibilities are administrative. This requires proficiency in communication abilities due to the extensive nature of dealing with secretive data in addition to managing the mechanical and communication equipment. (Tipton & Nozaki, 2007).
Relevance of In-house and Outer Interrelations
Studies indicate that the level of attachment between the safety experts and security systems will determine how effective the frameworks are. This attachment creates diverse links which facilitate effective methods of handling security. This attachment is drawn from involving inhouse interested parties who work in other departments within your enterprise as well as policy makers within your enterprise. On the outside, these attachments are formed by sharing and exchanging resources as well as ideas with executives of diverse sectors. Networking between private and state-owned industries guarantees the ability to maintain crucial functions of a business during and after possible threats occur. It facilitates prompt support from private entities during a crisis, thus leading to successful threat management. (Hu, Hart, & Cooke, 2007).
Remarks
I take this opportunity to thank you for your active involvement during this presentation. Your insightful contributions made as we grapple with the numerous security concerns as well as ways to resolve those issues is highly appreciated. We have noted down all considerations which the ISIS International will execute promptly. The floor is now open for any queries.











References
ASIS International. (n.d.). About ASIS. Retrieved February 20, 2019, from https://www.asisonline.org/footer-pages/about-asis/
Hu, Q., Hart, P., & Cooke, D. (2007). The role of external and internal influences on information systems security–a neo-institutional perspective. The Journal of Strategic Information Systems, 16(2), 153-172.
Tillyard, J. (2018, March 21). The Top 5 Challenges Faced by Security Operations Centers. Retrieved February 20, 2019, from https://www.dflabs.com/blog/the-top-5-challenges-faced-by-security-operations-centers/
Tipton, H. F., & Nozaki, M. K. (2007). Information security management handbook. CRC press.


 

258 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
1 source cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Speech Preparation For Security Professionals" (2019, February 23) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/speech-preparation-security-professionals-essay-2173301

Always verify citation format against your institution's current style guide.

80% of this paper shown 258 words remaining