Critical Learning for Security Professionals

ASIS Europe 2019 offered multiple tracks of valuable learning opportunities.

The Call for Presentations for ASIS Europe 2020 is now open. The deadline for submitting is Monday 23 September 2019.

 

Sign up here to receive updates about the event programme.

 

 

Access key

Wednesday, 27 March 2019

18:00
19:00
20:00
18:00
19:00
20:00
From 1 pm to 8 pm: Registration open
From 1 pm to 8 pm: Registration open
From 1 pm to 8 pm: Registration open
Welcome Party - Powered by NEDAP - Rotterdam Hall, Postillion Convention Center WTC Rotterdam
18:00 - 20:00
Welcome Party - Powered by NEDAP - Rotterdam Hall, Postillion Convention Center WTC Rotterdam

Kick off the event in style with an informal evening in the unique Rotterdam Hall of the Postillion Convention Center WTC Rotterdam. Enjoy a great evening full of entertainment and networking possibilities. Drinks and finger food will be served.

Thursday, 28 March 2019

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
Leadership Track 1
Leadership Track 1
Leadership Track 1
Welcome coffee
08:30 - 09:00
Welcome coffee

Opening Plenary Session and Keynote 1: Amsterdam: From Smart City to Smart Society
09:00 - 10:00
Opening Plenary Session and Keynote 1: Amsterdam: From Smart City to Smart Society

Theo Veltman, Innovation Rainmaker at the municipality of Amsterdam, will set the scene for the conference by sharing where Amsterdam’s is in implementing its Smart City strategy, and how this leads onwards to Amsterdam, a smart society. Combining insight from both technical and human perspectives, Theo will cover:
• Quality of life issues addressed by smart approaches
• Where the city is in its strategy implementation
• What is coming next
• How the roles of citizens, public and private companies, and government interact with one another
• Key technology concerns

All Leadership and Professional pass holders for Thursday are invited to join us for this essential session, helping to put the rest of the event in context. Purchase your pass now

Keynote 2: Rotterdam's Resilient City Vision
10:40 - 11:25
Keynote 2: Rotterdam's Resilient City Vision

Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, will introduce:
• what does a resilient city vision look like
• how Rotterdam is implementing Resilient City methodology
• what are the related technologies
• how this is changing day to day and business life in the city
• what is expected in the next 3 years.

Only available for leadership pass holders – register now

Securing the Cities of the Future - Panel Debate
11:30 - 12:15
Securing the Cities of the Future - Panel Debate

This panel will examine the keynote’s smart city and resilient city visions from the perspective of security leaders:
• where does the role of security fit in the Smart and Resilient city visions?
• Are there areas where visions, objectives and priorities might converge or diverge?
• What are the specific aspects of concern from a security perspective?
• How will security leaders and their teams need to adapt as our cities evolve?

The panel will be moderated by 2019 ASIS International President Christina Duffey, CPP, and include expert viewpoints from Theo Veltman, Rainmaker Innovation, Innovation Program Manager, CTO, City of Amsterdam, Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, and Volker Wagner, Vice President Security, BASF Group.

Only available for leadership pass holders – register now

Cyber Threat Landscape
13:30 - 14:15
Cyber Threat Landscape

Cyber security has become one of the major challenges that organisations face today. According to the 21st PwC CEO Survey, 33% of CEOs are extremely concerned about cyber threats. Matthijs van der Wel will provide a high level overview of various threat actors and how their objectives and operations impact your cyber risk profile. He will also discuss various practical models that your organization can adopt today.

Speaker: Matthijs van der Wel, Director Forensic Technology Solutions, PwC, NL

Soft Skills for Tough People – Creating an Innovation Culture
13:30 - 14:15
Soft Skills for Tough People – Creating an Innovation Culture

In a VUCA (Volatile, Uncertain, Complex, Ambiguous) environment, traditional roles are changing and new skills are needed. Technical ability is important but soft - people skills even more so in a diverse and fast changing context if we need to innovate and lead successfully. This can be a particular challenge for security leaders who have transitioned to management roles in a business setting following careers and leadership development in Military or Law Enforcement where command and communication structures were very different to today’s business cultures.

Following an introduction from the CSO’s perspective by Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, the session will be led by Balvinder Singh Powar, Associate Professor at IE Business School and Partner/Director at BOOSTER Space Industries & AERDRON.

Join us for an active and engaging practical session.

Only available for leadership pass holders – register now

Successful transformation to a cyber-physical corporate security organisation
14:20 - 15:05
Successful transformation to a cyber-physical corporate security organisation

innogy Group Security has successfully managed the integration and convergence of Cyber and Physical Security, enabling a 360-degree view and boosting impact which is clearly recognized by top management.

Digitization and the associated tightening of legal requirements make Cyber Security a critical success factor. By systematically assessing the Cyber Security Risk and the degree of maturity of existing controls, we are able to identify and prioritize the implementation of additional, necessary security measures. Allocation of Cyber Security outside IT ensures transparency, good governance and successful “operating at eye level” with CIO. The integration and convergence of Cyber and Physical Security enables a 360-degree view and boosts impact which is clearly recognized by top management. Top management commitment results from good governance, transparency, measurable and tangible impact as well as management language and education instead of technical terminology.

Speaker: Peter Olijslager, Head of Security Retail / Deputy CSO Group Security, innogy SE, DE

Only available for leadership pass holders – register now

Building A Brilliant Team
15:50 - 16:35
Building A Brilliant Team

An exceptional panel with direct insight from leading CSOs on how they build and lead teams up to the toughest security challenges. This session will cover:
• Skillsets: choosing specialists and generalists
• Talent Attraction: hiring new and established professionals
• Retention and Development: ongoing training, driving the security culture
• Engagement: empowerment, cross function exposure and experience
• Performance Management: define how to measure success
• Insider Threat: pre and in-employment screening, collaboration with HR

Panelists will include Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, Gavin Henderson, Vice President Regional Security Europe & Eurasia , Mastercard, and Nick Lovrien, CPP, Chief Global Security Officer, Facebook Inc.

Moderator: Eva Mueller, Senior HR Business Partner, EU Corp OPS, Amazon, LU

Only available for leadership pass holders – register now

Hot Debate: Consultants - Valued Partner or Necessary Evil?
16:40 - 17:25
Hot Debate: Consultants - Valued Partner or Necessary Evil?

Following up on the Building a Brilliant Team panel, we examine another critical and often controversial area in enterprise security – the role of Consultants. This panel will contrast viewpoints from leading CSOs and Consultants and will cover:
• Owning and understanding the business case for using Consultants
• Sourcing, recruiting, and expectation setting
• Contracting models and win-win scenarios
• Performance Management: define how to measure success
• Insider Threat/Third party risk: pre and in-employment screening, collaboration with HR

Speakers:
Karolien Verbeiren, Director Key Accounts European and Global, Securitas, BE
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy, BE

Only available for leadership pass holders – register now

Refresh & Reconnect
17:30 - 18:00
Refresh & Reconnect

Relax, recharge your batteries and enjoy a drink in the exhibition after a busy first event day. Available for all participants.

President's Reception
20:00 - 22:00
President's Reception

Dinner with a river view! Hosted by the President of ASIS International and sponsored by Johnson Controls, this is the perfect opportunity to meet and network with fellow industry professionals in the unique settings of the Wereldmuseum. Tickets are required for this function. Address: Wereldmuseum, Willemskade 25, 3016 DM Rotterdam Directions with Public Transportation: From the WTC Beursplein, take Metro D or E direction De Akkers and stop at Leuvenhaven Or, from Kruisplein, take Tram 7 direction Willemsplein and stop at Westplein CLosest Parking: Erasmus Brug Parking

Leadership Track 2
Leadership Track 2
Leadership Track 2
Using Drones at Volkswagen : Opportunities and Risks
13:30 - 14:15
Using Drones at Volkswagen : Opportunities and Risks

The proliferation of commercially available drones in recent years has created a new vector of attack. From industrial espionage to physical security and security issues, drones provide a convenient, cost-effective tool for a range of malicious intentions.
In this presentation, Sina Schemel, asset protection, Group Security Volkswagen AG and Volkswagen Chief Security Officer, Michael Schmidt will demonstrate the advantages and risks that drones bring to industrial companies and show a possible approach to mitigating these risks.

Only available for leadership pass holders – register now

Geopolitical Competition for AI Dominance
14:20 - 15:05
Geopolitical Competition for AI Dominance

Technology has always played an integral role in strategic competition, and today’s global battle for AI dominance is both headline grabbing and significant. China, the United States, and the European Union each approach AI development, deployment and regulation differently, and each have their own inherent strengths and weaknesses.
Rodger Baker, Stratfor's Senior Vice President of Strategic Analysis, will outline who is in the lead and what factors are contributing to the divergence in development.
In addition, with applications ranging across the civilian and military spectrum, Mr. Baker will assess the impact the AI race may have on international business operations as organizations maneouver the precarious path of resurgent big power competition.

Only available for leadership pass holders – register now

Financial Measures of Security Risk
15:50 - 16:35
Financial Measures of Security Risk

Financially measuring annual security risk value, helps security and risk professionals to communicate the security risks the organization is facing, and can support an ESRM approach.

Starting by presenting a framework for measurement, you will see an example of a risk workshop using the framework, and how a risk workshop is facilitated. The session will conclude with real-life examples and known challenges from a global high technology manufacturing corporation.

Speaker: Perttu Sarkkinen, Security Manager, Wärtsilä Finland Oy, FI

Only available for leadership pass holders – register now

Scoring Corporate Response to a Crisis
16:40 - 17:25
Scoring Corporate Response to a Crisis

Scoring a crisis management response is an ideal way to assist a company's future processes by identifying areas of weakness or non-conformity in an event. This information should support future learning. But is it possible to score a crisis response and if so, how do you do it?

The presentation will discuss the journey taken on this particular problem and share the outcomes of the project.
Speaker: James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK

Only available for leadership pass holders – register now

Leadership Training Track
Leadership Training Track
Leadership Training Track
Chem-Bio Terrorism Training for Security Professionals
10:40 - 12:15
Chem-Bio Terrorism Training for Security Professionals

Few topics in the domain of terrorism have been obfuscated with mystery and misinformation as the subject of chemical and biological terrorism.
In this 90 minute workshop, S2 Institute consultant Craig Gundry explores the threat of chemical and biological terrorism as it specifically applies to security professionals including an examination of previous attacks, diverse facility attack scenarios, and practical measures for preventing and responding to chemical and biological attacks in a workplace environment.
Speaker: Craig Gundry, PSP, Lead Instructor, Anti-Terrorism Programs, S2 Safety & Intelligence Institute, US

Only available for leadership pass holders – register now

Travel Risk Training - Specific Risks for Women and Minorities
13:30 - 15:05
Travel Risk Training - Specific Risks for Women and Minorities

Are you aware of the risks you face as a traveller? This interactive workshop will ask you to step into a different traveller profile and consider whether the risks you face have changed and what information and help you might now need?

In groups representing different traveller profiles this workshop will ask the participants to prepare for a journey, with their current employer in mind, that takes in: day to day inclusivity at work, perceived versus real travel risk, how best to communicate, educate and train diverse travelling employees, what resources and help is available and who has responsibility or can help?

The workshop will explain some of the key drivers for diverse travel risk and use examples to demonstrate when things have gone wrong and what best practice looks like. At the end of the workshop the participants should be able to review their own travel risk training and education programs to ensure it is supporting their diverse travelling population.

Leads:
Sam Roper, Security Advisor, beTravelwise
Saul Shanagher, Director, beTravelwise

Only available for leadership pass holders – register now

Training : Reputation Risks from Fake News – Crisis Management Response
15:50 - 17:30
Training : Reputation Risks from Fake News – Crisis Management Response

Fake news is all around us. How to respond to it in an attempt to prevent fake news from becoming a crisis for your organization?

If fake news threatens your organization or even jeopardizes its continuity, the crisis management team needs to respond swiftly, but wisely. One of the factors to consider is a security response, whether cyber or physical. What would your input be from an Enterprise Security Risk Management (ESRM) perspective if the board requires it?

In this practical and interactive crisis management training you will get busy! We will combine theory, scenario and ‘bring it to the board room’ presentation elements. The quickly developing scenario challenges the participants to come up with ESRM-based response suggestions. You will need to explain (and defend) your suggested crisis response to the board in an elevator pitch manner.

ASIS Crisis Management & Business Continuity Council members and trainers act as board member assessing and challenging your suggested crisis response. So, the takeaways of this interactive training are instant!

The Crisis Management & Business Continuity Council of ASIS International supports this Leadership Training session.

Trainers:
Theo Stevens CPP, Security Director CBRE GWS
Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S

Only available for leadership pass holders – register now

Professional Track
For Professional Pass and Leadership Pass
Professional Track
Professional Track
What you need to know about ESRM
10:40 - 11:25
What you need to know about ESRM

Enterprise Security Risk Management (ESRM) is a security management approach that links security activities to an enterprise's mission and business goals through risk management methods. Learn the basics of the ESRM life cycle and understand how to begin implementing an ESRM program in any organization. Discuss the progress made in in embedding ESRM into ASIS education, certifications, standards, and communications.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment

Available for leadership pass and professional pass holders – register now

Social Media Crisis Management
11:30 - 12:15
Social Media Crisis Management

Several brands have been affected by the growing use of social media by customers, employees, vendors, cyber criminals and competitors, causing serious damage to image, and reputation of the company and its brand.

The purpose of this presentation is to help security professionals understand how to deal with social media related crisis. Actual case studies have been used to train professionals to spot trouble and prepare for it before it strikes.

Speaker: Pramod Bhatt, Senior Director, Security and Intelligence, Sanofi, IN

Available for leadership pass and professional pass holders – register now

Protecting Mobile Devices from Current Threats - Content developed by the ASIS IT Security Council
13:30 - 14:15
Protecting Mobile Devices from Current Threats - Content developed by the ASIS IT Security Council

Although mobile devices like smartphones, tablets and laptops have become standard tools in today’s world, the rapidly changing technology and the increasing complexity of technical issues has made it easier for smart hackers to manipulate your devices.

For example - did you know that your phone can be hacked through your car’s pairing device?

This and several other topics will be discussed during the presentation. Attending will give you an advantage over your peers and will not make only your mobile communication safer, but also help you advise your company and family.

Speakers:
Werner Preining, CPP, Responsible for European OPR, Interpool Security, AT
Ronald Lander, CPP, Chief Specialist, Ultrasafe Security Solutions, US

Available for leadership pass and professional pass holders – register now

Perception of Terrorist Risk Versus Actual Risk from Terrorism - Influence on the Measurement of Security's ROI
14:20 - 15:05
Perception of Terrorist Risk Versus Actual Risk from Terrorism - Influence on the Measurement of Security's ROI

Terrorist attacks have resulted in tremendous amounts of income loss, not only due to physical damage at the attack site, but also as a result of the perceived threat by potential travellers of future terrorist attacks in the region. As the effectiveness of security is measured when an offence takes place, and either the offence is stopped by security measures, or succeeds due to security vulnerabilities, it is a great challenge to measure return on investment in security measures prior to an attack taking place.

This presentation addresses several aspects relating to business perceptions of risk and security. It presents not only preferences as to security, but also risk perceptions and if these preferences and perceptions differ based on current home country.

Speaker: Ivor Terret, General Manager, Enablement Advisors

Available for leadership pass and professional pass holders – register now

Retro-Fitting Modern Security into Older Buildings
15:50 - 16:35
Retro-Fitting Modern Security into Older Buildings

Ideally, preferably before a building is developed on the drawing table but also with a renovation/refurbishment, the importance of security should be addressed by all parties (architect, client, interior designer, construction firm, insurer et cetera).

However, working in cultural buildings, private homes, or historic corporate headquarters brings additional challenges as existing structures cannot be adapted to optimise modern security thinking and measures.

In these cases, we need alternative approaches so that security can still be effectively designed, and in some cases, be integrated in an existing building without any visitor being aware of the existence of the security measures.

This presentation will explain how to perform a specific risk assessment from which to derive protection concepts against identified risks. A systematic protection scheme can then define and document the necessary structural protection measures as well as the organisational safeguards.

Speaker: Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy

Available for leadership pass and professional pass holders – register now

New Trends in Behavioural Profiling
16:40 - 17:25
New Trends in Behavioural Profiling

Cultural and historical venues by their nature are open and welcoming locations. Because of this, striking a balance between open public access and appropriate security measures is very important to ensure visitors are not intimidated and the welcoming approach is maintained. The provision of specialized training of staff and volunteers is an important way of achieving this objective. Although predictive profiling has traditionally been a human based methodology, leaps in technology have resulted in the development of predictive threat tools such as streaming data infrastructure, patented profiling technology and self-learning analytics — to create new solutions that complement the means to identify potential threats. The purpose of this presentation is to explore the use of predictive profiling as a tool to prevent or mitigate a threat before it evolves into an attack or criminal event.

Speaker: Doug Beaver, CPP, Executive Director of Protective Services, National Museum of Women in the Arts, Washington, DC

Available for leadership pass and professional pass holders – register now

Innovation Track
Innovation Track
Innovation Track
Resilience: Keep it Simple, or Die Trying
09:00 - 09:20
Resilience: Keep it Simple, or Die Trying

There is no better way to spread a message than making it easy and straightforward.

Resilience and every discipline connected to it are everyone’s business in an organization. By definition, resilience is not an exclusive property of a few technicians sitting in a closed room, but – just like lymph or blood – it runs through any level and department. Everyone in the same organization must speak and practice resilience fluently.

For this to happen, and for everyone to be involved and committed, it cannot be complicated, and it cannot be a labyrinth of technical buzzwords. Resilience has to be universal.

Speakers:
Alberto Mattia, Chief Executive Officer, Panta Ray
Paola Scotto di Frega, Head of Consulting, Panta Ray

Technical Espionage Case Studies and Countermeasures
10:40 - 11:00
Technical Espionage Case Studies and Countermeasures

Real world cases of technical espionage, with video, live audio feeds and photos of the attacks will be presented by Jason Dibley, Technical Director at QCC Global. Jason will examine the mechanics of these different espionage events, how not all state sponsored attacks are highly technical and highly funded, and at the countermeasures that may have detected or prevented these attacks.

Speaker: Jason Dibley, Technical Director, QCC Global Ltd

Artificial Intelligence and Automation in Mobility Risk Management
11:05 - 11:25
Artificial Intelligence and Automation in Mobility Risk Management

A terrorist attack takes place in central London, in proximity of your staff - what is your main concern?

Artificial Intelligence is a key driver behind todays’ mobility risk management. New technologies provide answers to our most imminent questions during a crisis: Are my employees affected? Who needs help?

The presentation shows the benefits and limits of AI in mobility risk management. It explains how technology can enable corporates to drastically speed up and scale the alerting process, from incident detection and matching travelers’ location data, up to the final call that tells you who needs help.

Speaker: Matteo Grella, Head of Research & Artificial Intelligence, EXOP

Research revealed on access control challenges for multinationals
11:30 - 11:50
Research revealed on access control challenges for multinationals

In today’s increasingly global environment it’s essential to unify your security internationally. But it can be extremely complex and demanding – especially as our world is changing more quickly every day. To identify existing and future bottlenecks and challenges for multinationals, Nedap has conducted benchmark research and stays in continuous dialogue with clients. Join this session to discover key findings relevant to your organisation.

Speakers:
Timon Padberg, Sales Manager Global Clients, Nedap
Martin Wijlens, Sales Manager Global Clients, Nedap

Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan
11:55 - 12:15
Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan

Under the GDPR, data controllers are required to notify their supervisory authority when a personal data breach occurs, unless it is unlikely to result in risks to the rights and freedoms of individuals. The notification needs to be done without undue delay, no later than 72 hours after the controller has become aware of the breach (with some exceptions). It is crucial for organizations to understand their obligations and the details of this tight timeline as well as the risk-based triggers, and what they entail. In this session, we’ll review the personal data breach rules under the GDPR and provide tips to help you map out a 72-hour personal data breach action plan.

• Understand the implications of the GDPR for controllers and processors
• Map out a GDPR-ready 72-hour personal data breach action plan
• Outline the details of this tight timeline as well as the risk-based triggers and what they entail
• Implement efficient and effective data handling practices in the face of new GDPR requirements

Speaker: David Sinclair, CIPP/E, Privacy Consultant at OneTrust

Mitigate Crises with Faster Decision Making
13:30 - 13:50
Mitigate Crises with Faster Decision Making

As advances in technology continue to increase the amount of data in the world and companies send more people to conduct business in remote locations, there is a growing expectation for organisations to gain information faster about incidents and threats that could impact them. The increased speed of information sharing means that a security team’s traditional challenges during a crisis, such as lack of time and difficulty determining what information is relevant, are compounded. Used correctly, however, this vast volume of data can be a significant enabler for security teams. Dataminr will examine effective crisis response in the modern world. Within the first 30 minutes, a security manager must make crucial decisions quickly to protect the company and its people. Real-time, publicly available data, like social media, blogs, and the dark web, is essential for early event awareness, improved visibility, and more confident decision making.

Speaker: Tim Willis, EMEA Director Corporate Security Sales, Dataminr

Why a Unified Approach to Critical Event Management Improves Operational Resilience
13:55 - 14:15
Why a Unified Approach to Critical Event Management Improves Operational Resilience

According to Forrester companies are investing significant resources in sophisticated controls to protect their employees, brand and assets from critical events. These disruptive incidents (ranging from cyberattacks to terrorist activity) increasingly lead to business impacts such as operational losses, brand damage, and concerns for employee health and safety.

Despite the investments being made, companies struggle to optimize their critical event management (CEM) operations, slowing down response time and creating potentially life-threatening confusion.

In this session we will look at how a unified approach to critical event management meets the demands for rapid response and speedy incident remediation.

Speaker: John van Laerhoven, Managing Director Benelux, Respond, An Everbridge Company

The weakest link in today’s physical security … and no, it’s not people
14:20 - 14:40
The weakest link in today’s physical security … and no, it’s not people

For the last decade we have been investing in the same security controls over and over again: access control, video surveillance and intrusion detection. Enhancements have been made in each of those domains, but the weaknesses that existed 10 years ago are still weaknesses today. We’ll discuss a fundamental flaw in how we approach physical security, look at what we can learn from the cyber security space where a similar mistake was made but addressed, and propose an alternative approach to move to better and smarter physical security.

Speaker: Bart Vansevenant, Co-founder, Ticto

Your building is talking. Are you listening?
14:45 - 15:05
Your building is talking. Are you listening?

If you’re only using your access control system to lock and unlock doors, you’re underutilizing your system! As everything from people, lights to locks become connected, there are new opportunities to interact with and better understand your people and your building through a single pane of glass. This talk course is designed to shed light on how, by connecting these components to your access control system, you can drive operational efficiency and cut overall costs and make more informed decisions.

Speaker: Jean-Philippe Deby, Business Development Director – Europe, Genetec

The Promises of New Technology – What do we actually need, how will it help us and what are the limitations?
15:50 - 16:10
The Promises of New Technology – What do we actually need, how will it help us and what are the limitations?

Big Data, Machine Learning, Artificial Intelligence and Augmented Reality.. The list of “Silver Bullet Buzzwords” that we’re told will revolutionise the security industry is long. But what do security professionals actually need, what can we expect from new technology and where does the human being fit in all this? Mads will give a talk in non-technical language about what these new technologies are about and share his research on what security professional say they need, how technology can help and where it might fall short compared to the human being.

Speaker: Mads Paerregaard, Founder & CEO, Human Risks

What Security Should Steal From Marketing
16:15 - 16:35
What Security Should Steal From Marketing

In today’s hyper distracted world, attention is limited. If we want to successfully raise awareness, change behaviour and influence culture, we need to engage with our audience first. Unfortunately, security awareness programs often fail right there, at that first hurdle.

This presentation will reveal some of the latest tools and techniques that savvy marketers have been using for years, capturing our attention, orienting our behaviour and moving us into taking certain actions. Join us and learn what makes us ‘click’, and how to leverage psychology to achieve positive change in your organization.

Speaker: Heimo Grasser, CPP, Awareness Strategist, SAME Solutions

Case Study: Digitalization of Systems Brings Smarter Buildings
16:40 - 17:00
Case Study: Digitalization of Systems Brings Smarter Buildings

The latest digital evolutions of technologies for security systems and building management have enabled full smart building functions like for the Brattorkaia Building.

All Building Technologies like cameras and card readers have now moved to IP and enabled full integrations with building management including latest wireless and IoT communications. Smart building functions for building owners, occupants and facility managers to improve the building productivity are now embedded and are the major progress of last decades as they really HELP building stakeholders. The Brattorkaia Powerhouse Building Norway is showing how the JCI integration of IP systems lead the way to safer, more secure, more productive and more sustainable buildings.

Speaker: Yann Mahieu, Director Key Account Solutions, Johnson Controls, CH

Data-driven crime prevention using AI
17:05 - 17:25
Data-driven crime prevention using AI

The digitalization of the industry has led to a rapid increase in data. Data can have an immediate value, such as an alarm can reduce or eliminate the severity of an incident. Once acted upon, we stop attributing value to the data and treat it as a cost to manage. In this session, we’ll discuss how to turn your data in to intelligence through AI and advanced analytics. Intelligence which improves the safety of people, assets and societies.

Speaker: Viking Johansson, Director of Product Management, Intelligent Products, Securitas AB

Career Centre Track
Career Centre Track
Career Centre Track
Women in Security Breakfast
08:00 - 09:00
Women in Security Breakfast

Organized by Lynn de Vries, CPP, PCI, COO, DutchRisk Join us for this unique opportunity to network with women in security from all over the globe.

The competitive advantage of holding a professional certification
10:40 - 11:25
The competitive advantage of holding a professional certification

Are you ready to take the next step on your career ladder? ASIS offers four certification programs, which are designed for security managers who want to prove that they have the security knowledge and skills to bring to their organizations. The Certified Protection Professional (CPP) is designed for those who manage all aspects of an organization’s security functions, the Professional Certified Investigator (PCI) is for those who conduct security-related investigations, the Physical Security Professional (PSP) is for those who manage physical security operations, and the Associate Protection Professional (APP) is ASIS’s newest certification program and is meant to validate your understanding of the fundamentals of security management. Come to this session to learn what the exams test, the eligibility requirements, studying tips, and more!

Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International

European Salary Survey
11:30 - 12:15
European Salary Survey

ASIS and SSR have teamed up for the 2018 SSR & Executive Profiles salary survey which reviews more than 4,000 security professionals across the finance sector, manufacturing, extractives, FMCG and logistics. The results will be presented here. Gain competitive insights on your position in the labour market and how your sector is performing.

Speaker: Peter French, CPP, CEO, SSR Personnel, UK

Career Development Workshop Part 1
13:30 - 14:15
Career Development Workshop Part 1

Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.

Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK

Career Development Workshop Part 2
14:20 - 15:05
Career Development Workshop Part 2

Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.

Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK

Burnout: When bad things happen to good security professionals
15:50 - 16:35
Burnout: When bad things happen to good security professionals

Job burnout, or work-related stress, is an ever-present risk for busy security manager. While almost none of the alpha types in our industry are willing to admit it, many of us have worked the crazy hours that lead up to burnout – and more than a few of us have discovered the negative consequences of work-related stress too late. In this interactive session, we take a look at what causes burnout, and what security personnel and management can do to prevent it.

Speaker: Mac Segal, Vice President of Business Development & Security Consulting, EMEA, AS Solution

The ESRM Skills Cocktail
16:40 - 17:25
The ESRM Skills Cocktail

ESRM = Managing the enterprise’s security risks through the use of fundamental risk principles. So, what do the skills, qualification, experience and knowledge sets needed to achieve this look like? The clues are in the name - the requirements of the modern security professional are a mixed cocktail: a base of physical security or cyber-security; a measure of project management; a sprinkling of business management; a pinch of investigation; a dose of negotiation skills; a smidgen of strategy all topped off with a generous portion of communication powers. So how do you mix this cocktail?

This presentation will provide guidance for those in the profession on how to achieve the heterogeneous mix of skills and qualifications required for the future.

Speakers:
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs, UK
Mike O'Neil, CPP, PSP, Managing Director, Optimal Risk Group - Resilience, Risk, and Security advisors, UK

Thursday, 28 March 2019

Friday, 29 March 2019

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
Leadership Track 1
Leadership Track 1
Leadership Track 1
Welcome Coffee
08:15 - 09:10
Welcome Coffee

Securing an Innovation Culture at Facebook, Inc
09:10 - 09:55
Securing an Innovation Culture at Facebook, Inc

Facebook's core values of being bold, focusing on impact, moving fast, being open, and building social value allow Facebook to deliver on its mission to give people the power to build community and bring the world closer together.

To foster innovation and collaboration, an open plan office space and a welcoming environment for frequent meetings with external visitors are essential to enable the business.

Nick will use this as an example to illustrate:
• Progressive approaches to creating a safe and secure workplace
• How the company evaluates its risk appetite, and the role of security function in this dialogue
• How governance structures are evolving, with a focus on security as the business enabler and ESRM concepts

Speaker: Nick Lovrien, CPP, Chief Global Security Officer, Facebook, US

Only available for leadership pass holders – register now

Engaging Business Executives in ESRM
10:00 - 10:45
Engaging Business Executives in ESRM

Learn how security leaders can successfully engage business leaders in the security risk decision process.

We will cover the role of the security and business leaders in ESRM, and business-based risk mitigation program development.

This session is intended as preparation for the “Bring it to the Board Room” training session following the coffee break.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
Volker Wagner, Vice President Security, BASF Group
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
More speakers to be confirmed

Only available for leadership pass holders – register now

Soft targets - Using lessons learned from high profile incidents to improve prevention and protection through public private partnership
11:30 - 12:15
Soft targets - Using lessons learned from high profile incidents to improve prevention and protection through public private partnership

This presentation will use real case studies to highlight the key role partnerships play and how they are helping to shape improvements in the security of soft targets.

Learning from experience is a crucial opportunity that should not be overlooked. Sharing those learnings with others should also be viewed as an opportunity.

Recent attacks in Paris, Brussels and Bamako all provided us with unique experiences and in each case the value of public-private and private - private partnerships played a crucial role in our crisis management.

Since the attacks, Radisson Hotel Group has increased its contributions to collaborative efforts around the world including the Global Counter Terrorism Forum initiative on soft target protection, the EU action plan for protection of public places and European hotel industry trade association projects to increase awareness, preparedness and resilience in the European hotel, restaurant and catering industries.

Speaker: Geert Coremans, CPP, Director of Global Safety and Security, Radisson Hotel Group Corporate Support Office, BE

Only available for leadership pass holders – register now

Brexit – Business Continuity Perspectives
12:20 - 13:05
Brexit – Business Continuity Perspectives

The ASIS Europe 2019 venue and dates were confirmed long before Article 50 was signed, so it is by coincidence the event concludes on the date planned as “Brexit Day”. This session has been scheduled to address the latest developments and update attendees on how businesses are assessing the situation and preparing contingency plans (or not). With expert insight from BCI surveys, we will explore how management and business continuity planning may impact the security and risk outlook for businesses.

Speaker: Rachael Elliott, Leader Thought Leadership Team, Business Continuity Institute, UK

Only available for leadership pass holders – register now

Closing plenary Session: Digital Transformation: cut through the hype and get started (securely)
14:15 - 15:30
Closing plenary Session: Digital Transformation: cut through the hype and get started (securely)

All leadership and professional pass holders for Friday are invited to join us for this concluding session. Purchase your pass now

Digital transformation is today’s hottest business topic. Companies of all sizes across many sectors are seeking ways to leverage new technology. So how do security practitioners get involved without drowning in buzzword soup? And how do you support innovation whilst also supporting good security practice?

Digital transformation requires us to look at business models, roles, and tools, in different ways. Some companies are focused on efficiency or incremental process gains, whilst others are completely re-inventing their business models and creating new ways to engage with customers.

Often, debate on digital transformation is polarised between utopian visions of a world full of convenient, personalised services and dystopian visions of mass unemployment, catastrophic cyberattacks and malicious AI. So, this session has been designed by ASIS to get a grip on core issues facing security professionals and identify key opportunities to advance, and key areas of concern.

Practically speaking, already many systems that traditionally had their primary function as security can now be leveraged for different purposes. For example; IP cameras generate business insights in retail, or traffic management in a smart city; risk assessment data can be packaged and re-sold as intelligence; access control provides insights for building management etc.
So how do we capitalise on digital opportunities? And how do we do it safely, securely and profitably?

After a short scene-setting presentation by Michael Gips, CPP, Chief Global Knowledge Officer, ASIS International, we will use live-polling and the expert facilitation skills of Prof. Martin Gill, Managing Director, Perpetuity Research to guide us through an interactive discussion and lively ideas exchange.

If you’re advanced on your digital journey, please join us to share and benchmark – and if you’re setting out, this is a great opportunity to learn from firsthand experience.

Farewell Drink
15:30 - 16:00
Farewell Drink

President's Reception
20:00 - 22:00
President's Reception

Leadership Track 2
Leadership Track 2
Leadership Track 2
Industrial Control Systems - Threats, Vulnerabilities, Risk and Resilience
10:00 - 10:45
Industrial Control Systems - Threats, Vulnerabilities, Risk and Resilience

Recent incidents provide disturbing evidence of the stark vulnerabilities of Industrial Control Systems (ICS) to natural, human-factor accidental, and malicious threats.

This presentation includes numerous current, high-profile examples of ICS threats, vulnerabilities, and the severe consequences of such incidents. The presentation will help you learn and understand:
• What ICS includes;
• Where ICS can be found;
• Potential threats and vulnerabilities to and from ICS;
• Why ICS assets are critical to enterprise, business, operations, and mission objectives;
• How to take a proactive, protective systematic management approach to identify and protect the enterprise.

This presentation provides a wake-up call to everyone who manages or is responsible for critical ICS assets and their architectures, systems, facilities and infrastructure due diligence.

Speaker: Michael Bilney, Global Senior Principal – Asset Risk and Resilience, Cardno

Only available for leadership pass holders – register now

GDPR One Year On – Vetting and Other Security Challenges
11:30 - 12:15
GDPR One Year On – Vetting and Other Security Challenges

GDPR will have been in force for almost a year by the time ASIS Europe 2019 takes place. This session will take a look back at relevant case studies, analyse incidents and address myths around this complex legislation. Ady van Nieuwenhuizen, expert privacy lawyer will guide the discussion with insights from security leaders to frame key issues. We will highlight and address several key challenges for security practitioners.

Know Who You Hire – the Challenge of Vetting Just Gets Harder
Presented by Gilad Solnik, CPP, PSP, Director, Security and Loss Prevention, EMEA, Global Security Operations (GSO), Amazon

Ensuring the safety and security of your employees, company information, and business operations is essential for any modern business. Therefore, knowing who you’re hiring into your organisation is essential. Pre-employment screening measures are aimed at ensuring a safe and secure work environment while setting a foundation for good personnel security (Cpni.gov.uk, 2015). This discussion reviews the how privacy and data protection initiatives and the GDPR has introduced new challenges and restrictions on vetting and pre-employment background checks, and will provide an exchange of potential practical solutions.



Storing CCTV Footage Securely – Reassessing the Criticality of Servers
Presented by Henk Marsman, Lead Product Manager Identity and Access Management, Rabobank, NL

Since the adoption of GDPR CCTV data has become distinctly privacy sensitive. Subsequently, the criticality of systems storing CCTV data was revised (and increased), and access control measures need to be adapted accordingly. This impacted the governance of access to these systems, the periodical reviews on access, and the actual control measures in place for these systems. This discussion will cover key questions security professionals should address when considering access to such systems post GDPR.

Only available for leadership pass holders – register now

How devices bring customer and employee access together
12:20 - 13:05
How devices bring customer and employee access together

Managing identies and access for employees has significant different characteristics than that of customers. In many organizations these two are separately handled. With the rise of connected devices, ranging from small to large in size, it becomes less obvious to separate management of these two populations. Or in other words, there are new ways to combine the management of identities and access of employees and customers.

This presentation will cover the similarities and differences between identity and access management (IAM) of employees and customers. We will then discuss the impact of connected devices for the user and for IAM solutions.

Speaker: Henk Marsman, Lead Product Manager Identity And Access Management, Rabobank, NL

Only available for leadership pass holders – register now

President's Reception
20:00 - 22:00
President's Reception

Leadership Training Track
Leadership Training Track
Leadership Training Track
Cyber – Physical Threat Response Training
09:10 - 10:45
Cyber – Physical Threat Response Training

This scenario-based 90-minute workshop will take you through a Red Teaming exercise focused on identifying adversaries’ methods of operation to target the logical, physical and human gate of the organization. Red teaming, as part of a proactive security cycle, is an effective operational intelligence tool. It also helps to create awareness and need for the implementation of a program with counter measures. By discussing the necessary awareness and necessary response to cyber, physical and human related threats the workshop introduces the participants to a method of response preventing unnecessary victims. Awareness is the key word. At the end of this session participants will understand the potential “external” and “internal” threat, why it appears, and what counter measures are effective.

Speaker: Berndt Rif, CPP, PCI, Chief Security Officer, Ministry of Health, Welfare and Sport, NL

Only available for leadership pass holders – register now

Bring it to the Board Room – ESRM Presentation Training
11:30 - 13:05
Bring it to the Board Room – ESRM Presentation Training

This session will take the form of a role-play training exercise where participants will be assigned into teams to address one of 5 security risk concerns from company executives.

Note – this exercise is in how to present the solution, not in judging the solution itself. Teams will be given a template PPT to create an executive presentation to propose a program based on the risk concern of a “company executive”. ESRM experts will engage teams in conversations about the approaches to executive presentations.

Teams will present their proposals to the “Executive Council” and will receive feedback on their presentation and engagement.

Important: participants should attend the prior “Engaging Business Executives in ESRM” session as preparation for the exercise.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment
Volker Wagner, Vice President Security, BASF Group
Mike Gips, CPP, Chief Global Knowledge & Learning Officer, ASIS International
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs
Mark Schreiber, Principal Consultant , Safeguards Consulting, Inc., US

Only available for leadership pass holders – register now

President's Reception
20:00 - 22:00
President's Reception

Professional Track
For Leadership and Professional Pass
Professional Track
Professional Track
Info-centric Crisis Management, a new way of Crisis Management Thinking
09:10 - 09:30
Info-centric Crisis Management, a new way of Crisis Management Thinking

Info-centric Crisis-management is a new way of thinking within one of the biggest corporate banks in the Netherlands. This ‘idea’ is about creating a new system for Crisis-management where we combine internal and external data sources to act in an early stage when a possible crisis is in sight. This system combines data with roles and responsibilities for those who have to act during a crisis. The system provides an automated choice for a certain scenario. The main goal is to act faster, and creating a Common Operational Picture (COP) and possibly to act before a crisis is hits.

Speaker: Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL

Only available for professional and leadership pass holders – register now

Built Environment Security as a Business Enabler
09:35 - 09:55
Built Environment Security as a Business Enabler

A clear understanding of security risk allows suitable control measures to be selected. This presentation will use several case studies to show how to blend physical, technical and procedural controls to safeguard the built environment and its assets. The presentation will also highlight the risks of taking the “tick box approach” to security design.

Speaker: Christopher Aldous, CPP, PSP, Director, Design Security Ltd, and Board Director, ASIS International UK Chapter, UK

Only available for professional and leadership pass holders – register now

A clearer roadmap to your security organization’s maturity
10:00 - 10:45
A clearer roadmap to your security organization’s maturity

Learn about a new, practical and easy to understand maturity model that can be implemented in hours rather than days.

What is your current security capability? How do you compare yourself against industry benchmarks? And where do you need to focus your efforts?

Maturity models aim to answer those questions and more, but unfortunately, most of them require expensive consultancy to implement and are often far too academic.

A more practical approach is clearly needed. This presentation is going to give you a maturity model that can be easily implemented in hours rather than days. A clear and visual way to easily understand the maturity of all areas of your security organization. You can now derive a clear roadmap that tells a compelling story and will help you obtain the necessary leadership buy in and additional resources for your program.

Speaker: Heimo Grasser, CPP, Senior Security Manager MEA, Medtronic, UAE

Only available for professional and leadership pass holders – register now

Putting the S into IoT: ENISA's efforts on IoT cyber security
11:30 - 12:15
Putting the S into IoT: ENISA's efforts on IoT cyber security

The talk will focus on ENISA's efforts to promote IoT cybersecurity by proposing baseline IoT security measures complemented with sectorial vertical studies that look into IoT security in particular sectors, e.g. Industry 4.0, automotive.

ENISA has been working with stakeholders across the board to address the many challenges of IoT security. ENISA advocates for a risk-based and context-based approach that looks into the particularities of sectorial IoT deployments and proposes specific security measures to address relevant risks. In parallel, understanding the ecosystem nature of IoT and the interdependencies, baseline IoT security recommendations have been proposed by ENISA to facilitate security interoperability in a horizontal manner. The talk will discuss related efforts and activities of ENISA and ways the community can engage with the Agency to further improve IoT cybersecurity.

Speaker: Apostolos Malatras, Expert in Network and Information Security, European Network and Information Security Agency, GR

Only available for professional and leadership pass holders – register now

Terrorism in Europe 2019
12:20 - 12:40
Terrorism in Europe 2019

This condensed, fast-paced briefing offers a future-oriented look on terrorism trends in Europe for the coming year, and Jihadi extremist activity in particular. Anchored in an analysis of the latest developments in Q4 2018 and Q1 2019, the presentation will use several perspectives to outline key concerns for the remainder of 2019. This will include consideration of the likely effects of several general elections, international events, upcoming terrorism trials, select migration developments, and Brexit on the terrorist threat in a range of European countries. The update will conclude with an update on newly evolving CT best practices among security departments of large corporations.

Speaker: Glenn Schoen, CEO, Boardroom@Crisis, NL

Only available for professional and leadership pass holders – register now

ISO 31030 Guidance for Managing Travel Risk
12:45 - 13:05
ISO 31030 Guidance for Managing Travel Risk

For organisations whose employees undertake regular travel, Duty of Care is an important concern. In addition, multiple regulators oblige organisations to ensure reasonable travel security for employees. Travel Risk Management (TRM) assesses risk and provides security to staff. However there are no rules, or internationally recognised Codes of Practice, that indicate what should actually be done in order to be compliant.

ISO (International Organisation for Standardisation) has begun developing a standard which will resolve doubts and provide guidance, ISO 31030. ASIS is playing an active role in this.

Learn about work in progress and how you can have your say to ensure that the voice of the Security Profession is heard and acted upon.

Coordinating speaker: Roger Warwick, CPP. CEO of Pyramid Temi Group (Travel Risk Management), Member of ISO 31030 technical committee, Member of ASIS Commission on Standards & Guidelines

Speaker: Werner Cooreman, CPP PSP, CSO Solvay Group, Vice-Chair of ASIS Commission on Standards & Guidelines, ASIS Liaison to ISO 31030 technical comittee

Innovation Track
Innovation Track
Innovation Track
Sharing is caring: Duty of Care and the Sharing Economy
09:10 - 09:30
Sharing is caring: Duty of Care and the Sharing Economy

The travel sharing economy, which comprises services such as ride-sharing and house-sharing, has quite literally taken off around the world. Ease of accessibility and use while mobile means non-traditional ground transport and accommodation services are increasingly being used by business travellers. Despite the popularity, only 14 % of organisations surveyed by Ipsos MORI and International SOS* have integrated this in their travel policy. Have you? Join this innovation track to understand the benefits, risks and legal considerations of incorporating share economy services into your business travel policies and how best to do so within a travel risk management framework.

* Business resilience. Trends Watch 2019; Ipsos MORI & International SOS; October 2018.

In October 2018, Ipsos MORI conducted a global survey targeted to those who organise, influence, or are responsible for, their organisation’s travel and risk mitigation policies. These survey findings represent responses from 640 people, across all types of organisations which have had previous contact relating to business travel health and security with International SOS, in 82 countries.

Speaker: Xavier Carn, Vice-President Security EMEA and Medaire, International SOS & Control Risks

Insurance and security: finding common ground in a volatile security risk environment
09:35 - 09:55
Insurance and security: finding common ground in a volatile security risk environment

How close cooperation between corporate insurance and corporate security departments will make the management of security risks more effective and efficient.

There is common agreement among security and insurance professionals that security incidents are increasingly complex and global. Traditional insurance vehicles help indemnify the damage from such incidents. But to be able to successfully manage the velocity of security incidents anywhere around the world, companies require a level of expertise at immediate global readiness that companies realistically can’t maintain in-house.

The insurance industry has responded to this need for 'anywhere and anytime' immediate expert support, with a new insurance concept: Insurance as a Service. This new trend implies that security professionals and insurance professionals with their expertise and products are playing both an increasingly crucial role in ensuring the success in security incident response and related insurances.

In this inter-active workshop attendees will develop insight in the interplay between insurance and security and will walk away with practical tips on what to discuss with insurance professionals when purchasing insurance as a service.

Speakers:
Stefan Sievers, Head of Business Development Special Risks Europe, Hiscox
Jeroen Meijer, Senior Partner, Control Risks Group

True or False in the Age of Fake News
10:00 - 10:20
True or False in the Age of Fake News

What happens when we as individuals can not trust media in the same way we used to? Misleading media information during the attacks on Westgate Mall in Kenya, Drottninggatan in Stockholm and the Armed Conflict in Donbass Ukraine led to severe consequences. Social media as well as the increased commercialization and politization of traditional media present challenges to individuals and organizations. But this also present opportunities for actors in the security sphere and elsewhere.

Speaker: Johan Tinnerholm, COO, Global Warning System

How Access Control is impacted by cloud, mobile and GDPR
10:25 - 10:45
How Access Control is impacted by cloud, mobile and GDPR

Many of the changes the IT industry currently is undergoing are also deeply affecting the Access Control industry. These overall trends towards integrating mobile devices for daily use and the support of cloud infrastructure are changing the way how Access control is used and operated. This is also bringing new challenges for system supplier as well as customers when it comes to Cyber Security and GDPR compliance. More than ever solutions require to be designed for this environment and users have to be aware of their advantages but also exposures when it comes to managing their security, organization and personnel

Speaker: Thomas Herling, Senior Vice President Global Business Owner Electronic Access and Data, Dormakaba

Cyber Security Maturity Assessment
11:30 - 11:50
Cyber Security Maturity Assessment

Increasing complexity and continuous change of IT environments challenge organizations to gain transparency on their cyber security. The Cyber Security Maturity Assessment supports with a unique method to measure the maturity and effectiveness of cyber security measures and results are documented using the Cyber Security Maturity Cockpit. In addition it provides an overview of the cost-value ratio of identified measures based on ISO/IEC 27001. By creating transparency the Cyber Security Maturity Assessment enables decision-makers to take the right decisions for optimal use of human and monetary resources and to strengthen the cyber security resilience of the organization following a holistic approach.

CSMA enables organizations to answer questions like:
- What do we in relation to cyber security?
- How good are we with what we are doing?
- What does it cost?

Speaker: Christoph Hagenbuch, Cyber Security Manager, innogy SE

How to Secure an Open Campus
11:55 - 12:15
How to Secure an Open Campus

Many enterprises have large corporate campuses where hundreds or thousands of employees work at various sites around the world. These sites are complex environments, characterized as open and minimally staffed by security resources. Given this, they are notoriously difficult to protect and vulnerable to active assailant and terrorist threats as evidenced by the recent attack on YouTube’s corporate headquarters in San Francisco, CA. Our universities around the world share similar attributes and have been investing in cutting-edge technology to help protect their staff and students. Attend this session to learn about their transformative advancements and fulfill your duty of care to your employees.

Speaker: Les Allan, Director of SafeGuarding & Logistics Services, Heriot-Watt University

Vendor Partnering. The A to Z of Developing Great Relationships
12:20 - 12:40
Vendor Partnering. The A to Z of Developing Great Relationships

Everyone wants great vendor relationships based on long-term productive partnering, mutual business goals, and trust. Easy to say but how easy to achieve? Going from A-Z, including embedded vendor staff to complete outsourcing the presentation will highlight how its done and what makes lasting relationships more than just saying win-win.

Speaker: Andy Williams, CPP, VP Business Development, Safe Hotels Alliance

Video Surveillance in Marine Environments
12:45 - 13:05
Video Surveillance in Marine Environments

The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We will analyse VS for ships and explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use, and what features a camera station must have to be installed on a ship and so on.

Speaker: Alessandro Franchini, Marketing & Communication Manager, Videotec

Career Centre Track
Career Centre Track
Career Centre Track
Town Hall (for ASIS Members)
08:15 - 09:00
Town Hall (for ASIS Members)

Diversity and Inclusion – A Competitive Edge for the Security Profession
10:00 - 10:45
Diversity and Inclusion – A Competitive Edge for the Security Profession

Diversity is a prominent challenge facing businesses today. Diversity has to be part of a company’s DNA – and it has to work as part of a company’s overall desire to hire the best possible people. Research shows that diversity makes workplaces more effective and efficient, plus a diverse workplace also promotes a company’s ability to adapt to any situation. In the panel, experienced security professionals from different countries and backgrounds will share their challenges and success stories. Furthermore, they will discuss diversity perspectives, experiences and skill sets that seem to be invaluable to the success of talent and to support modern business leaders.

Moderator: Alexander Zippel, CPP, Corporate Security, Deutsche Post DHL Group

Panellists include Christina Duffey, CPP, 2019 ASIS International President, Senior Vice President and Regional Director, SOS Security, Letitia Emeana, CPP, PSP, EMEA Snr Security Manager, Tesla, Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, and Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL

The growth of young professionals into the security industry (a live case study)
11:30 - 12:15
The growth of young professionals into the security industry (a live case study)

Are we guilty of cloning security specialists? Young professionals entering the security industry may increasingly be the answer to changing the face of the sector.

The operational cog which turns the mechanism of the security industry is routinely led by the 'Grey, Pale and Male' from society. With the guidance of experienced security professionals, ASIS strives to bring through young professionals to the fore of the sector, which is spearheaded by James Morris in the UK. No less does David Clark, UK Chair of ASIS, hold this belief. He argues that we should not 'clone' our predecessors, but rather we should nurture younger professionals into a 'security culture'. Indeed, just as security is modernising and evolving into new frontiers such as cybersecurity and artificial intelligence, so too should the personnel who are increasingly managing it.

Speakers:
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Leo Kelly, Security and Risk Management Analyst, Francis Crick Institute, UK
James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK

The New APP Certification
12:20 - 12:40
The New APP Certification
 

Learn about ASIS’s newest certification program: the Associate Protection Professional (APP). The APP has been developed for security management professionals who are just starting their security career. To be eligible to sit for the APP exam you need 1-4 years of experience (depending on your educational history). During this session, the ASIS Certification Director will be there to answer your questions about this exciting new program.

Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International

Effective Management for Security Professionals Program
12:45 - 13:05
Effective Management for Security Professionals Program
 

Security professionals must have strong interpersonal skills, including negotiation, leadership, and team-building strengths, to successfully collaborate and engage employees in a security risk management strategy against all security threats. In response to these new demands, IE Business School has created this Program in partnership with ASIS International, through which you will be able to (among other learnings):

• Enhance business acumen and effectiveness
• Develop a strategic understanding, anticipatory and critical thinking.
• Become effective leaders and better decision-makers
• Develop communication and negotiation skills for persuasive influencing.

Speaker: Almudena Diaz Vidal, Associate Director Executive Education, IE Business School

Friday, 29 March 2019