top of page

Reference Material 

Bomb Threat Management

A bomb threat is an effective means of disrupting business. The problems are intensified when the incident involves an actual explosive or incendiary device. Although there is no foolproof means of securing a premises against a bomb threat (or bomb attack), a good security plan, correctly executed, will enable a business to deal with an incident properly.

Crisis Management Operations

In the past there has often been a reluctance to accept that an emergency can happen. Some Management have made tentative plans. In recent years pressures have increased from interested bodies and now management is more inclined to draft contingency plans and provide the equipment and materials to carry them out. 

Access Controls in Industries

Access Control challenges for Security professionals –
•Change in security concept world over after WTC, USA incident on 11 Sept. 2001.
•Escalation in suicide attacks by terrorists. 
•Dimension of Security drastically changed. 
after attack on Indian Parliament on 13 Dec. 2001.

For copy of this PowerPoint Presentation, write to us at -sbtyagi1958@gmail.com

Security of cash in transit

Cash-in-transit (CIT) or Cash / valuables-in-transit (CVIT) are terms used to refer to the physical transfer of banknotes, coins and items of value from one location to another.


Traditionally, both terms refer to transfer of cash and valuables between cash centres and bank branches, ATM points, large retailers and other premises holding large amounts of cash.

Central Monitoring Station

Alarm monitoring & response is complex and tedious function of security management. It also means that systems need to be constantly upgraded and procedures checked. There is also need to constantly audit the efficacy of the system and the integrity of the data. Since all these activities occupy lot of attention and priorities of the organizations, some of the forward looking Managements started off-loading these activities to third-parties – specialist in the field. 

Maximize Security with Existing Infrastructure

The environment, in which the Security operates, has changed beyond recognition. The ease of travel, more open borders and digital technologies have globalized criminality, making it far harder to contain and prosecute. Terrorism, of course, is notoriously borderless. But globalization has also massively expanded opportunities for organized crime. And technology, by spawning new kinds of crime while facilitating the traditional variety, is helping lawbreakers become ever bolder and more difficult to track down

Is your soft luggage safe at airport?

CCTV in Retail Security

Naturally, security and safety, crime prevention and investigation remain critical issues underpinning the design, specification and operation of CCTV systems in shopping centers, and the appropriate selection, training and development of the individual CCTV operator is a prerequisite to maximizing the effective use of the whole installation.

Bomb Threat SOP 

Naturally, security and safety, crime prevention and investigation remain critical issues underpinning the design, specification and operation of CCTV systems in shopping centers, and the appropriate selection, training and development of the individual CCTV operator is a prerequisite to maximizing the effective use of the whole installation.

Crime Investigation 

Crime Investigation is the hard work by the true professionals who work meticulously and methodically to solve the mystery behind the crime – motive, the modusoperendai and men involved in crime! Crime Investigation opens the door to crime labs, police archives and courtrooms, providing a behind-the-scenes look at criminal investigations and probing unexplained mysteries. 

For copy of this PowerPoint Presentation, write to us at -sbtyagi1958@gmail.com

Background Screening

No one has to tell a security professional about the growing importance of background screening. More and more organizations  now perform some kind of criminal background check on potential new hires, and more and more companies are checking employment history, education, driving records, credit history, sex offender registries, restricted parties lists and more. Clearly the drive to background screening is prompted by the desire for a safer workplace.

Computer Security

No question on the importance of the computer in the business world of today, and its increasing significance in the future! Yet, it creates a great potential for danger. No element of business, including catastrophic fire and ravages of non-computerized internal theft presents a greater potential to wipe out an entire business so quickly and so effectively. The dangers to a computer center or those which can be created by it encompasses virtually the entire operation of business it serves.

Energy Security & Security of oil / gas assets

Country’s energy security is directly related to security of its Oil, Gas and Pipeline assets. Security provides oil and gas companies the freedom to find, develop and manage assets and to deliver supplies without interference.

While ensuring availability of energy sources becomes prime concern of the Nation, securing its Oil, Gas and Pipeline assets become prime responsibility of all stake-holders. 

So You Think Your Luggage is Safe?

Do let us know the subject on which you want more reading material or presentation. We will be only too happy to send them to you by mail. Use the folloeing space and click the 'Send' button. 

Your details were sent successfully!

bottom of page