FINAL EXAM QUESTIONS
1. Describe what you will do to prepare for this meeting.
To prepare for the meeting I would begin by identifying the problem of the client, which in this case would be Delta Airlines. The problem being that the airline is facing security issues due to terrorism, and that is in turn impacting the amount of revenue they earn. I would then identify the internal and external factors, which include: terrorism, political factors, and the technology working without significant issues. The next step would be identifying the client’s needs, which appear to be increasing profits and maintaining security. The last independent step I would make is take that information and align Securco’s security screening product to fill each of the client’s needs.
As for steps that require other team members, I would host a meeting between the two partners and myself reviewing the information that was gathered by myself in earlier steps. I would then request that the partners worked together to attain clear and concise details as to how the screening product fulfilled the client’s needs, as well as it’s features and benefits. In order to maintain control, I would ensure that each of the three team members understood what their roles are, and that they were confident in playing said roles (I am the facilitator and they are resources). In regard to the other company (PPI), I doubt I would address them during the presentation but ensure a respectful disposition. To conclude,
The client is an expert about himself or herself. Furthermore, it is of critical importance that the
How should you introduce an administration of a PAI to a client? How do you do so to ensure the client is most likely to respond to items and produce a valid administration profile? (~1-2 paragraphs, 4 points)
1. When clients are referred to your organization, what process or procedure is followed to assess your client (such as psychological, social, medical, et cetera)?
I would supervise and describe different security risks to the client, whilst encouraging them to take notes as to what these are
Client Background – Your client background and objectives for this project. Please complete each section. Please feel free to send any summaries and/or policies you feel may be beneficial to the providers.
2) Do I understand exactly what the problem is and how it influences the client?
Effective communication, putting it all together from start to finish, for each stage we are taking steps to make sure all attention is on the client. Once all information is given, it is time to tell the story on how we view it and start with the ending.
4. Assess the relevant areas competence-and of missing knowledge, skills, experience, or expertise-in regard to the relevant aspects of the situation.
Different client problems appear for different reasons and there are various theories used to identify the client’s problems. No one is exempt from problems, this much is a given. Problems are a part of the everyday life,
1. Understand the product that you are working with prior contacting the consultant company to set a clear objectives and expectations for the outcome expected at the end of the project.
What team structures, functions, goals, obstacles, and communication will be used in the selected process
Discuss the essential activities involved in the initial planning of an audit. How do these all specifically to the Smackey Dog Food client?
Delta Airlines is the largest airline carrier on the Atlantic Coast. In terms of scheduled passengers carried they were world’s largest airline with 277.6 billion in 2013. Also the second largest
For us as security managers to begin to dissect the threat we must go back to the Risk and threat assessment as stated in (Risk and Security management 2008) the threat assessment specifically defines the scope, nature and impacts of risk the company may face during the life span of the operation. It should be written in the context of both the risk environment and the company’s risk tolerences, as these will define what risks are considered noteworthy and which fall within acceptable ranges for a project or organization. The Security Director should not assume that the initial threat assessment will be read in conjunction with the intelligence review. Therefore the key elements from the intelligence review should be included (if) to clarify the environment in which the organization will operate. The threat assessment can be conducted in isolation of a site visit, although specific risks associated with the project will be difficult to ascertain without firsthand knowledge through an actual visit. Secondary threat assessment may be done concurrently with, or as part of the security survey to provide the final specifics for the organization itself, as opposed to the more overarching initial assessment.
Customer needs- Customers sometimes need expert advice on which security system will be best suited for their company.