RMA logo

 
  
www.rmasecurity.com    |    
(919) 834-8584

News

 

06/17/2015

ASIS International Chapter 119 4th Annual Training Conference

 

05/29/2015

NCMS Society Holds Quarterly Business Meeting at Cisco Systems

 

05/19/2015

RMA Receives Award for Steady Growth and Profitability

 

05/17/2015

Travis Hall attends Samsung Techwin A&E Summit

 

05/12/2015

RMA Welcomes Nia Singletary

 

04/20/2015

RMA Welcomes Two Interns

 

04/16/2015

Kevin McQuade Attended ISC West

 

03/16/2015

RMA Attends the Raleigh Chamber of Commerce Woman's Leadership Conference

 

03/02/2015

RMA Exhibits at the IACLEA Southeast Regional Conference & the 15th Annual SCCLEA Linda B. Floyd Safety Conference hosted by Furman University

 

02/27/2015

RMA Awarded DHSS - State Laboratory of Public Health Security Assessment Project

 

02/24/2015

RMA Awarded South Carolina Federal Credit Union Security Assessment Project

 

02/12/2015

RMA teams with Perkins &Will to Provide a Security Assessment of Piedmont Electrical Membership Corporation

 

02/09/2015

Jerry Blanchard Attends Mercury Security Technology Summit

 

02/02/2015

Chris Peterson and Mike Epperly are Keynote speakers at the NCACLEA 2015 Winter Conference

 

01/30/2015

Mike Epperly Attends Association of Title IX Administrator Investigator Training

 

01/28/2015

Rusty Gilmore Speaks at the ASIS Monthly Meeting

 

Like us on Facebook View our profile on LinkedIn Follow 

us on Twitter
Volume 7, Issue 2: July 2015
Information from RMA
safety-securityA Company Model for Developing Policies and Procedures

Christine L. Peterson, CPP, ISP 

 

While attending the NCMS Carolinas Chapter meeting at Cisco Systems recently, I saw a presentation by Mark Whitteker, MSIA, CISSP, ISP. Mark comes out of the IT security world, so most of his presentation focused on IT security. He also presented a segment on Building a Comprehensive Security Architecture Framework that might benefit all of us. What Mark shared with the group is a pragmatic approach to creating and updating policies and procedures that could be used by any organization. When implemented, this process creates a customizable framework that will allow organizations the stability to prosper.

 

Read More...
criminal search results mapData Security: Where there is data, there should be policy

Rusty Gilmore, CISSP, CISM

 

The recent report by the Wall Street Journal about the Morgan Stanley breach scares me as an employee. Reportedly Galen Marsh, a financial adviser for Morgan Stanley, was fired for allegedly stealing account information from about 350,000 wealth management clients and posting some of it online. The part that concerns me are the reports that federal law enforcement officials are focusing their probe on the possibility that Marsh's computer was hacked. It seems that in this day of BYOD - Bring Your Own Device - and the use of laptops and mobile devices by employees, it is time for there to be a clear understanding about the company's responsibilities and the individual employee's responsibilities.

 

Read More...

New Training Classes

 

PPSB approved training for private investigators and security professionals

 

Wednesday, August 12, 2015
 

Benefits of Computer Forensics (2 hours)
 

Background Investigation and Media Searches (2 hours)
 

Use of Forensic DNA in Private Investigations II (2 hours)

Thursday, August 13, 2015

 

Handling Conflict and Confrontation (2 hours)
 

Introduction to Explosives and IED Technology (2 hours)
 

Legal Issues for Private Investigators III (2 hours)

 

How many hours? 6 hours of CEU per day


What time? 9:00AM - 3:30PM


Where? RMA Office 4000 Westchase Blvd, Suite 350, Raleigh, NC 27607 (near the North Carolina Fairgrounds)


Cost? $165 each day which includes lunch and all required certificates. Register for two days for $300.

 

How to register? Call the RMA office at 1-800-775-8584 and press "0"

Copyright 2014 Risk Management Associates, Inc. - All Rights Reserved