Security Design

Security Systems Commissioning Project for the City of Raleigh

Protus3 News, Security Product Evaluations, Security System Testing and Commissioning

RMA has been awarded the security systems commissioning of the City of Raleigh Critical Public Safety Facility. In this project, RMA will be working directly for RMF Engineering. Risk Management Associates will oversee and participate in the start-up of all security electronic equipment. We will verify and inspect all associated security equipment located in each security room. This will also …

Jerry Blanchard

Jerry Blanchard Presents at ProNet “Security on the Move”

Protus3 News, Security Program Development, Training

ProNet Systems hosted security professionals at a complimentary educational seminar on Tuesday, December 3, 2013, at the Capital City Club in Raleigh, NC. This seminar, titled “Security on the Move” included technology updates and presentations related to remote monitoring of CCTV, access control, and related services either on-site or through the use of hand-held devices. As a member of the …

Research Triangle Park

RMA Completes Security Assessment of RTP

Protus3 News, Security Assessment, Security Program Development, Security Survey, Security Threat Assessment

Risk Management Associates, Inc. has completed a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation decided to conduct a security assessment to provide stakeholders with the current security …

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Corporate Compliance, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

Christine Peterson

RMA Presents BYOD Policies at RTP CFO Forum

Protus3 News, Security Program Development, Training

Chris Peterson and presented BYOD (Bring Your Own Device): Issues and Implications for Companies at the September RTP CFO Forum. The program discussed security issues and considerations for companies when employees connect personal devices to the company network. What issues need to be considered to accommodate lawsuits, audits, and records requests? How can companies prepare for lost or stolen …

Security Design

Zoetis GSOC Needs Assessment Project Awarded

Protus3 News, Security Planning, Security Program Development

Risk Management Associates, Inc. has been requested by Zoetis to develop a Needs Assessment for a Global Security Operations Center. The assessment will define the mission, goals and objectives of the GSOC. Additionally, this assessment will include defining the support requirements of the GSOC that include personnel, technology and operations. Once the Needs Assessment is complete, Zoetis will be able …

Jerry Blanchard

Jerry Blanchard Attends Paradigm 2013

Protus3 News, Security Product Evaluations, Training

Jerry Blanchard was invited to attend Paradigm 2013, a specifier technology symposium held by Lenel. Paradigm, Lenel’s annual consultant symposium, is a unique experience that is educational, interactive, and fun! Through presentations, demonstrations, and hands-on training sessions consultants become familiar with Lenel’s latest technologies and learn what’s coming next. In addition, roundtable discussions will provide an opportunity to offer feedback …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Corporate Compliance, Theft, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …

ASIS Chapter 119 logo

ASIS International – Chapter 119 Second Annual Training Conference

Protus3 News, Training

ASIS International – Chapter 119 held its second annual training conference on July 30, 2013, at the PNC Arena in Raleigh, NC. Kevin McQuade from RMA assisted Dave Kaczmarek, Anita Jelley, and Ken Kendra, Training Conference Coordinator, with acquiring guest speakers and local vendors to participate. There were approximately 36 attendees and eleven booths from vendors. Nathan Schroeder CEO of …

InfraGard logo

NC companies’ Secrets at Risk, Cyber Terrorism Experts Say

Protus3 Computer Forensics, Electronic Data Recovery, Fraud, News, Theft

In this day and age, sometimes it is difficult to discern truth from fiction. Greg Baker is an expert in the area of cyber terrorism and a leader in developing public/private relationships that work. In the later years of his career with the FBI, he was the face of InfraGard North Carolina. InfraGard is an information sharing and analysis effort …