SlideShare una empresa de Scribd logo
1 de 8
Rick Nelson, CPP
Board Certified in Security Management
Corporate Security &
Operations Executive
Copyright 2010 Richard D. Nelson
Areas of Expertise
Facilities
Management
Human
Resources
Corporate
Policies
Training
Collaboration
Safety &
Security
Specialties
Copyright 2010 Richard D. Nelson
Professional Background –
Public Service
 Certified Police Officer
Field Training Officer
Evidence Technician
Property Control Officer
Alternate Shift
Commander
Copyright 2010 Richard D. Nelson
Professional Background –
Private Sector
 Rick Nelson
 Vice President – Security &
Operations –
ITE Distributing, Inc.
 Subject Matter Expert:
 Employment Law
 Corporate Policy
 Life Safety Systems
 Increased Efficiency
 Increased Client Satisfaction
 Increased Top Line Revenues
 Cost Containment
Copyright 2010 Richard D. Nelson
Rick Nelson Bio
 After graduating from Aurora University with a degree in Criminal Justice, Rick
attended the Cook County Sheriff’s Police Academy, graduating at the head
of the class of nearly 100 officers. During his career in law enforcement,
Nelson worked in a variety of positions at several municipal police
departments in the western suburbs. During his career, he served as a crime
scene technician, a field training officer, armorer, firearms training officer and
alternate watch commander.
 Leaving public service, Nelson accepted a position with a national distributor
of office products based in Chicago where he oversaw all operations and
administrative functions including safety, security, HR and finance.
 Since 2008, Rick has been providing security consulting services to a variety
of industries focusing on workplace violence prevention strategies through
facility security, employment policies and conflict avoidance.
 Rick is a member of the American Society of Industrial Security professionals,
and the F.B.I’s Critical Infrastructure Protection program and has lectured at a
variety of events in the security industry and non-profit sector.
Copyright 2010 Richard D. Nelson
Certified Protection Professional
CPP®
Throughout the world, the Certified Protection Professional (CPP®)
designation is acknowledged as the security profession's highest
recognition of practitioners.
It is evidence that an individual is "Board Certified in Security
Management." The CPP® is awarded based upon experience,
education, and of an examination that provides an objective
measure of an individual's broad-based knowledge and competency
in security management. Ongoing professional development is
required in order to maintain the credential.
The CPP® is administered by ASIS International, the preeminent
international organization for security professionals, with more than
35,000 members worldwide.
Copyright 2010 Richard D. Nelson
Speaking Engagements
 Featured Panelist, The New Normal
– Transforming your Career –
Chicago Non-Profit Networking
Group
 HR’s Emerging Role in Preventing
Workplace Violence – DuPage
Society of Human Resources
Management
 Workplace Violence –
Understanding the Violent Mind –
American Society of Industrial
Security (ASIS) International,
Chicago West Suburban
Presentations
Copyright 2010 Richard D. Nelson
Contact Information
Rick Nelson
Rnelson881@att.net
(630) 805-1094

Más contenido relacionado

La actualidad más candente

Naesys at secure it conference 2017
Naesys at secure it conference 2017Naesys at secure it conference 2017
Naesys at secure it conference 2017Naesys_Ndspl
 
Human resources, protecting confidentiality
Human resources, protecting confidentialityHuman resources, protecting confidentiality
Human resources, protecting confidentialityRobert Kling
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochureAndy Kim
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"OCTF Industry Engagement
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsMarce Torres
 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhirjanetlouis
 
ASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness StandardASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness StandardEmblez Longoria
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyAndris Soroka
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsINKPPT
 
Hacker Academy UK Booklet
Hacker Academy UK BookletHacker Academy UK Booklet
Hacker Academy UK BookletHacker Academy
 

La actualidad más candente (15)

Naesys at secure it conference 2017
Naesys at secure it conference 2017Naesys at secure it conference 2017
Naesys at secure it conference 2017
 
Human resources, protecting confidentiality
Human resources, protecting confidentialityHuman resources, protecting confidentiality
Human resources, protecting confidentiality
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
HNBA
HNBAHNBA
HNBA
 
Wilson Consulting Group
Wilson Consulting GroupWilson Consulting Group
Wilson Consulting Group
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"
 
Chief Security Officer
Chief Security OfficerChief Security Officer
Chief Security Officer
 
ICON RiskSec Toronto 2017
ICON RiskSec Toronto 2017ICON RiskSec Toronto 2017
ICON RiskSec Toronto 2017
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhir
 
ASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness StandardASIS International Collaborating on Security Awareness Standard
ASIS International Collaborating on Security Awareness Standard
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Hacker Academy UK Booklet
Hacker Academy UK BookletHacker Academy UK Booklet
Hacker Academy UK Booklet
 

Destacado

Computing curriculum design workshop
Computing curriculum design workshopComputing curriculum design workshop
Computing curriculum design workshopMiles Berry
 
Synch AND Swim - Blending Synch and Asynch Learning Environments
Synch AND Swim - Blending Synch and Asynch Learning EnvironmentsSynch AND Swim - Blending Synch and Asynch Learning Environments
Synch AND Swim - Blending Synch and Asynch Learning EnvironmentsMichael Coghlan
 
Roehampton computing workshop 3
Roehampton computing workshop 3Roehampton computing workshop 3
Roehampton computing workshop 3Miles Berry
 
Designing for the Web
Designing for the WebDesigning for the Web
Designing for the WebMiles Berry
 
Corporate Security Training: Forensics & Investigation Management - Oct 08th ...
Corporate Security Training: Forensics & Investigation Management - Oct 08th ...Corporate Security Training: Forensics & Investigation Management - Oct 08th ...
Corporate Security Training: Forensics & Investigation Management - Oct 08th ...John B. BABADARA
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 

Destacado (9)

Computing curriculum design workshop
Computing curriculum design workshopComputing curriculum design workshop
Computing curriculum design workshop
 
Synch AND Swim - Blending Synch and Asynch Learning Environments
Synch AND Swim - Blending Synch and Asynch Learning EnvironmentsSynch AND Swim - Blending Synch and Asynch Learning Environments
Synch AND Swim - Blending Synch and Asynch Learning Environments
 
Roehampton computing workshop 3
Roehampton computing workshop 3Roehampton computing workshop 3
Roehampton computing workshop 3
 
Designing for the Web
Designing for the WebDesigning for the Web
Designing for the Web
 
Corporate Security Training: Forensics & Investigation Management - Oct 08th ...
Corporate Security Training: Forensics & Investigation Management - Oct 08th ...Corporate Security Training: Forensics & Investigation Management - Oct 08th ...
Corporate Security Training: Forensics & Investigation Management - Oct 08th ...
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 

Similar a Rick nelson executive bio 2010 ppt

05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
 
William S Masters R2012
William S Masters R2012William S Masters R2012
William S Masters R2012Wsmasters
 
HRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionHRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionRnelson881_2
 
johnmullerresume2015
johnmullerresume2015johnmullerresume2015
johnmullerresume2015John Muller
 
A Look at NACD's Virtual Learning Resources
A Look at NACD's Virtual Learning ResourcesA Look at NACD's Virtual Learning Resources
A Look at NACD's Virtual Learning ResourcesRobert Heist | Attorney
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Shannon Gregg, MBA
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
2014 Certification Applicant Handbook
2014 Certification Applicant Handbook2014 Certification Applicant Handbook
2014 Certification Applicant HandbookPeggy OConnor
 
Corporate presentation
Corporate presentationCorporate presentation
Corporate presentationAlok Sharma
 
BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business SecurityBOLD Business
 
DAPS Company Profile
DAPS Company ProfileDAPS Company Profile
DAPS Company ProfileDAPS Business
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Falgun Rathod
 

Similar a Rick nelson executive bio 2010 ppt (20)

05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
 
William S Masters R2012
William S Masters R2012William S Masters R2012
William S Masters R2012
 
HRs emerging role in workplace violence prevention
HRs emerging role in workplace violence preventionHRs emerging role in workplace violence prevention
HRs emerging role in workplace violence prevention
 
johnmullerresume2015
johnmullerresume2015johnmullerresume2015
johnmullerresume2015
 
DYN Nov-Dec 2016
DYN Nov-Dec 2016DYN Nov-Dec 2016
DYN Nov-Dec 2016
 
TG Brochure
TG BrochureTG Brochure
TG Brochure
 
Pln9 presentation
Pln9 presentationPln9 presentation
Pln9 presentation
 
Pln9 presentation
Pln9 presentationPln9 presentation
Pln9 presentation
 
A Look at NACD's Virtual Learning Resources
A Look at NACD's Virtual Learning ResourcesA Look at NACD's Virtual Learning Resources
A Look at NACD's Virtual Learning Resources
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Roger Clowater Resume
Roger Clowater ResumeRoger Clowater Resume
Roger Clowater Resume
 
Praetorian Services Group Security Services
Praetorian Services Group Security ServicesPraetorian Services Group Security Services
Praetorian Services Group Security Services
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
2014 Certification Applicant Handbook
2014 Certification Applicant Handbook2014 Certification Applicant Handbook
2014 Certification Applicant Handbook
 
Corporate presentation
Corporate presentationCorporate presentation
Corporate presentation
 
BOLD Business Security
BOLD Business SecurityBOLD Business Security
BOLD Business Security
 
DAPS Company Profile
DAPS Company ProfileDAPS Company Profile
DAPS Company Profile
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
 
pln9 presentation mall
pln9 presentation mallpln9 presentation mall
pln9 presentation mall
 

Último

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Último (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Rick nelson executive bio 2010 ppt

  • 1. Rick Nelson, CPP Board Certified in Security Management Corporate Security & Operations Executive
  • 2. Copyright 2010 Richard D. Nelson Areas of Expertise Facilities Management Human Resources Corporate Policies Training Collaboration Safety & Security Specialties
  • 3. Copyright 2010 Richard D. Nelson Professional Background – Public Service  Certified Police Officer Field Training Officer Evidence Technician Property Control Officer Alternate Shift Commander
  • 4. Copyright 2010 Richard D. Nelson Professional Background – Private Sector  Rick Nelson  Vice President – Security & Operations – ITE Distributing, Inc.  Subject Matter Expert:  Employment Law  Corporate Policy  Life Safety Systems  Increased Efficiency  Increased Client Satisfaction  Increased Top Line Revenues  Cost Containment
  • 5. Copyright 2010 Richard D. Nelson Rick Nelson Bio  After graduating from Aurora University with a degree in Criminal Justice, Rick attended the Cook County Sheriff’s Police Academy, graduating at the head of the class of nearly 100 officers. During his career in law enforcement, Nelson worked in a variety of positions at several municipal police departments in the western suburbs. During his career, he served as a crime scene technician, a field training officer, armorer, firearms training officer and alternate watch commander.  Leaving public service, Nelson accepted a position with a national distributor of office products based in Chicago where he oversaw all operations and administrative functions including safety, security, HR and finance.  Since 2008, Rick has been providing security consulting services to a variety of industries focusing on workplace violence prevention strategies through facility security, employment policies and conflict avoidance.  Rick is a member of the American Society of Industrial Security professionals, and the F.B.I’s Critical Infrastructure Protection program and has lectured at a variety of events in the security industry and non-profit sector.
  • 6. Copyright 2010 Richard D. Nelson Certified Protection Professional CPP® Throughout the world, the Certified Protection Professional (CPP®) designation is acknowledged as the security profession's highest recognition of practitioners. It is evidence that an individual is "Board Certified in Security Management." The CPP® is awarded based upon experience, education, and of an examination that provides an objective measure of an individual's broad-based knowledge and competency in security management. Ongoing professional development is required in order to maintain the credential. The CPP® is administered by ASIS International, the preeminent international organization for security professionals, with more than 35,000 members worldwide.
  • 7. Copyright 2010 Richard D. Nelson Speaking Engagements  Featured Panelist, The New Normal – Transforming your Career – Chicago Non-Profit Networking Group  HR’s Emerging Role in Preventing Workplace Violence – DuPage Society of Human Resources Management  Workplace Violence – Understanding the Violent Mind – American Society of Industrial Security (ASIS) International, Chicago West Suburban Presentations
  • 8. Copyright 2010 Richard D. Nelson Contact Information Rick Nelson Rnelson881@att.net (630) 805-1094