! Submission deadline is 31 October 2022!
The core event content focuses on relating security and risk topics to business/organisational impacts and the business objectives/ROI of investments in security programmes.
Presentations and Workshops will address key trends and issues facing professionals in the region dealing with physical, human, and cyber security, business continuity, risk, compliance, investigations, crisis management, safety and disaster response.
ASIS seeks subject matter experts who can address the content described above in new, original, and forward-thinking ways.
Sessions should be presented in a manner that appeals to – and challenges – established and aspiring security leaders who deal with a complex mix of physical security, cybersecurity and business management/leadership issues.
Four types of session are open for submission, note the differences in duration, format and focus:
Explanation, analysis, lessons learned and implications for the future from a security or crisis incident …
Purpose: Explanation, analysis, lessons learned and implications for the future from a security or crisis incident (of any nature: physical, cyber, insider threat, travel etc.)
Format: 20-25 minute presentation + Q&A/discussion (45 Minutes total). ASIS can support speakers who wish to include interactive elements like live polling during sessions.
Speaker Profile: must be an inhouse security practitioner (CSO, Security/Risk/Crisis Manager), from the organisation who faced the incident. If you are a provider of security technology or services who wishes to share a case study, see our Opportunities for Industry Suppliers below.
Slots available: 5-6 sessions
Illustrate and explain an evolving risk, emerging trend or new methodology which will have significant business and/or security risk impacts in …
Purpose: Illustrate and explain an evolving risk, emerging trend or new methodology which will have significant business and/or security risk impacts in the next 1 to 3 years
Format: 20-25 minute presentation + Q&A/discussion (45 Minutes total). ASIS can support speakers who wish to include interactive elements like live polling during sessions.
Speaker Profile: must be a subject matter expert who can present appropriate research, analysis or other evidence of the “game changing” nature of the issue, and be able to address questions from/facilitate dialogue with the audience
Slots available: 5-6 sessions
Collaborative learning on a challenge facing established and aspiring security leaders requiring interaction with non-security colleagues in a business setting where there are competing priorities …
Purpose: Collaborative learning (peer to peer exchange amongst delegates) on a challenge facing established and aspiring security leaders requiring interaction with non-security colleagues in a business setting where there are competing priorities (e.g. with Safety, Finance, HR, IT, Operations, Logistics, Communications etc.)
Format: 90-minute workshop with small roundtable discussion and/or group exercises e.g. scenarios to work through. May include scene-setting presentation(s) during the workshop but presentation time should be maximum 30mins across the session. ASIS’ experienced event staff will provide dedicated support to facilitators to help structure and deliver workshops in the most engaging way for participants.
Facilitator/Speaker Profile: must have direct experience of the challenge and be able to frame the issues for effective peer to peer dialogue. It is recommended that 2 or 3 co-facilitators/speakers work together to present different perspectives and engage the audience throughout the 90-minute session. Including a facilitator/speaker who is a non-security professional is strongly recommended.
Slots available: 2-3 sessions
Collaborative learning on a complex risk facing established and aspiring security leaders from which the community can benefit from “crowdsourced” insights …
Purpose: Collaborative learning (peer to peer exchange amongst delegates) on a complex risk facing established and aspiring security leaders from which the community can benefit from “crowdsourced” insights – sharing perspectives, potential consequences, and mitigation techniques.
Format: 90-minute workshop with small roundtable discussion and/or group exercises e.g. scenarios to work through. May include scene-setting presentation(s) during the workshop but presentation time should be maximum 30mins across the session. ASIS’ experienced event staff will provide dedicated support to facilitators to help structure and deliver workshops in the most engaging way for participants.
Facilitator/Speaker Profile: must have direct experience of the challenge and be able to frame the issues for effective peer to peer dialogue. It is recommended that 2 or 3 co-facilitators/speakers work together to present different perspectives and engage the audience throughout the 90-minute session.
Slots available: 2-3 sessions
If you are a provider of security technology or services looking for speaking opportunities, please contact Michiel Gen at [email protected] to discuss Content Sponsorships and possibilities to speak in the Innovation Track (in combination with an exhibit package).
Content and speaker profile(s) must be appropriate for the session format selected. If Speakers will be expected to work with the ASIS Europe organising team and the appointed moderator / chair of their session (if applicable) before and during the event to ensure relevance and interactivity with the audience.
The presenter agrees to allow ASIS International to record audio and video footage, and/or transcribe the presentation. In granting permission, you (and your co-speakers) agree to share copyrights with ASIS International and give us a non-exclusive, worldwide, royalty free, non-transferable right to copy, reproduce, and distribute all or parts of the presentation in a multimedia format in perpetuity. In granting permission, you are not relinquishing your copyright to this material. All rights to publish your presentation in any other fashion and to publish related works are retained by the authors.