Security: Some Assembly Required


Presented by: Dana Turner

Add CD-ROM to Cart:

(Product will be shipped via USPS)


It’s your lucky day! Your institution has appointed you to the Security Manager’s position. If only there was a template that you could use to develop and maintain an appropriate security function. Bad news: your institution doesn’t have one. Good news: such a template is included in this presentation. You’ll learn about techniques that will help you make the transition into the security function -- and receive a practical, prioritized list of things that must be done and the rationale for doing them. This presentation focuses upon the considerations to examine and the tasks that must be completed if the Security Manager is to create and manage a basic, effective and appropriate Security Program. How you “market” yourself and the security function will determine your effectiveness – and the security function traditionally doesn’t “market” itself well.

Security is always about policies, procedures, practices – and politics. If the new Security Manager inherited the institution’s Security Program from a predecessor, it’s likely that the new Security Manager will want to recommend changes to the institution’s policies, procedures and practices. It’s natural that the Security Manager will want to personalize the Security Program. Other business unit managers may resist some of the proposed changes to the security environment, however. The Security Manager must plan for some resistance and make certain that the needs of every business unit are also considered and -- wherever possible -- accommodated. If the new Security Manager is developing the institution’s first-ever Security Program, the information delivered during this presentation may save him/her considerable time, energy and other resources.

Many security-related tasks are often considered foreign and offensive, simply because safety and security considerations have not been adequately assessed within every business unit. Developing organization allies is an essential part of any Security Manager’s success. Convincing the Board of Directors, Human Resources, Retail Operations and Audit of the benefits of a robust security function may make the difference between the institution’s success and ultimate failure. The presentation’s progressive “checklist” format identifies critical decision-making points; suggests issues to address quickly; provides guidelines for establishing a security work plan; and prepares the Security Manager to adapt this format successfully for the entire institution.

Presentation Topics
  • Introduction
  • Initial Tasks
  • Agree Upon Your Position Description, Authority, Duties & Responsibilities
  • Become Insured
  • Request A Security Audit
  • Develop Secrecy Alliances
  • Meet With Business Unit Managers
  • Review Documents
  • Conduct A Risk Assessment
  • Conduct A Facility Review
  • Assess Training Resources
  • Review Your Progress
  • Prepare A Status Report For The Board Of Directors
  • The Next 90 Days
  • What Is The Board Of Director's Challenge?
  • Security Officer Position Description
Presentation Objectives
This presentation is designed to help you:
  • Identify and describe the primary functions for which the security function may be held responsible -- and the political environment components that logically affect the institution-wide Security Program
  • Assess the institution's current functional partnerships included in the security environment -- and to help you suggest potential changes to it
  • Design or recommend appropriate changes to the institution's policies, procedures, practices and politics involving security-related issues
  • Identify and describe appropriate sources of information and support for the professional development of the Security Manager and other security-related personnel
  • Train or recommend training for the Board of Directors and senior management personnel about the responsibilities of the Security Manager relating to the development, implementation of an effective institution-wide Security Program
Presentation Audience
  • Security Officers
  • Human Resources Managers
  • Auditors
  • Board of Directors
  • Legal Counsels
  • Training Managers
  • Compliance Officers
About the Speaker: Dana Turner is a security practitioner based in Pipe Creek, Texas. Dana has served as a law enforcement officer in several capacities -- including the investigation of business and banking crimes -- and he is celebrating his 37th entertaining year of crime. As a speaker and conference facilitator, Dana has delivered thousands of platform, telephone and Internet presentations. He has designed and participated in continuing education programs offered by state and national banking and credit union associations, state and federal examining and law enforcement agencies -- and state and national security, audit and human resources organizations.

As street cop and as an investigator, Dana has conducted thousands of interviews and interrogations. As a police academy instructor, he has also taught investigation, interviewing and interrogation skills to police recruits and park rangers. As a writer, Dana has written many manuals and books -- and numerous newspaper, trade publication and magazine articles published and distributed both nationally and internationally. Dana is the author of the "Conducting Investigations Manual", a component of the Financial Institution Security Library. He also serves as one of the moderators in's Security Forum.

(requires Windows Media Player and IE).

CD-ROM includes:
  • Complete presentation (including slides and audio)
  • Written Materials
  • Follow-up Q & A
You have the right under this license agreement for this CD-ROM to use this presentation on a single-workstation. Use on a network is in violation of the copyright agreements. CD may be used by multiple users at a given institution but may not be placed on a network or in any other multi-user environment.

This program was recorded in its entirety in July 2013. The CD-ROM includes program slides, materials (if available) and follow-up Q & A document.

Add to Cart:

  • Model: cd_security0713
  • Manufactured by: Glia Group, Inc.

This product was added to our catalog on Monday 13 May, 2013.

Copyright © 2022