ASIS Europe 2021 will offer multiple tracks of valuable learning opportunities as well as networking and connection sessions.
With 50+ sessions planned, featuring more than 60 expert speakers in several formats, as well as 8 hours of dedicated networking time, ASIS Europe 2021 is the unmissable gathering for security professionals.
Want to know more about what to expect from the online days? Click here.
Joanna Konings, a senior economist working on international trade issues at ING Bank, will open the event with an overview of the post-COVID economic outlook, Europe’s role in the global recovery and political and geopolitical considerations around the recovery.
Speakers:
Joanna Konings, Senior Economist International Trade, ING Research
You know the structure of building a good security program, right? In broad strokes, the first step is understanding risks. The second step is identifying vulnerabilities. Next, you identify the gaps between your current position and your desired position. But then what? What do you do to go from risk mitigation to resilience? Or, even better, from Resilience to Antifragility? Antifragility is the state of growing stronger as a result of volatility, shock, stressors, noise, attacks and failures. How do we build programs which get stronger through experiencing stress? We will discuss the common stressors of a security program, lessons learned from the pandemic’s real-life “stress test”, good program design practices, and the required outlook and attitude for developing and maintaining an antifragile business enabling security program.
Expert presentation & video Q&A
Speaker: J. Nicole McDargh, Regional Director Physical Security, Health, Safety And Building And Office Services, Richemont
Attacking supply chains in order for criminals to operate their business has grown into a global enterprise scenario with double digit profit margins with acceptable risks. Supply chain disruption throughout the COVID crisis has created new attack methods and new targets. As such supply chain interruptions are likely to increase causing your company financial and or reputational harm. In this presentation we think as a criminal using normal management practises (cost reduction, flexibility, and you name all buzz words) as a way of inspiration to build up a successful "criminal" enterprise. As a takeaway we want you to look at your supply chain from a different angle and review if some easy and or cheap adjustments can reduce your companies risk.
Expert presentation & video Q&A
Speaker: Björn Hartong, CPP, Senior Risk Engineer Marine & Security, Zurich Insurance
Open to all!
Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions.
- 2020 - the year of the virtual crisis room (Matthias Helfricht, F24)
- Artificial Intelligence solving everyday problems (Katerina Ryan, Cathexis Europe)
- Business travel, essential only or road map back to normal? (Saul Shanagher, beTravelwise)
- Moving to mobile access control - best practices (Paolo Castiglioni, HID Global)
- Cloud Deployment and Cloud VMS Demo (David Barr, Eale Eye Networks)
OpenBlue Location Manager: Social Distance Monitoring and Contact Tracing, Intelligent Laboratories, Space and Workflow Advisor (ger mc nmara and luis Soares, JCI)
OpenBlue Secure Solutions that power your Security Operations Center to protect your enterprise (Fintan Ronan and leon Van gendt, JCI)
- Tales of Two years - based on data b Safeture.
Will workplace security invade your home office?/Will your health be an attribute for access control?
Axel Petri’s team is responsible for all issues relating to Group-wide security strategy at Deutsche Telekom and have already undertaken a restructuring based on Agile methodology. This initiative was not taken because it happens to be "hip" at the moment or to copy what frontrunners like Spotify have been doing. The organisation was restructured for a specific purpose – for greater ownership of every employee and to open up pathways for new impetus and ideas. A hierarchical structure that was rigidly divided into departments has been dismantled, tailormade agile working introduced with positive results. As a result, the team has become more flexible and efficient in its work. Plus, staff are much better able to contribute their skills, experience, know-how and interests to areas and projects that were previously off-limits, simply for structural reasons. Join this session to understand the journey and how it might work for your own security organisation.
Expert presentation & video Q&A
Speaker: Axel Petri, Deputy Chief Security Officer, Deutsche Telekom
Topic discussion groups where delegates select their discussion topic
Help shape the programme! What do YOU want to discuss?
In this simple app we’re sourcing ideas and votes for the most relevant topics: https://vevox.app/m#/138586576
You can post one or more topics, and like those already on the list to give them more chance of being selected.
This forum is open until Tuesday 9 February.
An opportunity to recap on security industry trends, major shifts and common pain points. A walk through insights validated through a broad customer survey marking current and future security requirements and visions. Whether digital transformation can overcome common challenges - So how do you go about starting your digital transformation given everything else that you’ve got going on? What are the different approaches to digital transformation in Security Operations Centers – risk intelligence analysis, simplified monitoring experiences, outsourcing and “SOC as a Service”, and broader SaaS solutions.
Speakers:
Eamonn Hughes, VP & GM Digital Solutions, EMEA&LA, Johnson Controls
Fintan Ronan, Director R&D OpenBlue Secure, Johnson Controls
Leon Van Gendt, Senior Product Manager OpenBlue Secure, Johnson Controls
The presentation aims to share insights on the Organization Resilience Management System (ORMS) within the UN system. Providing a perspective and an understanding of the challenges within an international organisation, more so the implementation of business continuity in a non-financial or manufacturing processes working environment. The presentation will provide a view of the general assembly resolution on Organization Resilience and how this is being analysed in light of the COVID crisis. The speaker will share examples comparing the private and the public sector in implementing BC strategy, in particular between telecom companies and his most recent experience in a specialized agency in Vienna and discuss field and headquarter differences when preparing resilience and business continuity plans. The session would address the mission essential function (MEF) specialized agency perspective which is similar to government agencies approach to resilience. It would provide personal insight in the challenges facing during the deployment of BC and resilience culture within an international organisation, and what the pandemic response has taught us.
Expert presentation & video Q&A
Speaker: Luca Tenzi, Organisational Resilience Management Consultant, International Organisation
Open to all!
Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions.
- 2020 - the year of the virtual crisis room (Matthias Helfricht, F24)
- Artificial Intelligence solving everyday problems (Katerina Ryan, Cathexis Europe)
- Business travel, essential only or road map back to normal? (Saul Shanagher, beTravelwise)
- Moving to mobile access control - best practices (Paolo Castiglioni, HID Global)
- Cloud Deployment and Cloud VMS Demo (David Barr, Eale Eye Networks)
OpenBlue Location Manager: Social Distance Monitoring and Contact Tracing, Intelligent Laboratories, Space and Workflow Advisor (ger mc nmara and luis Soares, JCI)
OpenBlue Secure Solutions that power your Security Operations Center to protect your enterprise (Fintan Ronan and leon Van gendt, JCI)
- Tales of Two years - based on data b Safeture.
Will workplace security invade your home office?/Will your health be an attribute for access control?
The COVID crisis halted most travel and dramatically changed work routines around the globe. As the world transitions out of the health crisis, how do you ensure your Executives are protected throughout uncertain times? Executives that require protection services are not always members of the C-Suite and in most cases, are more visible and accessible than the CEO. Promptly recognising this industry nuance will afford practitioners the ability to extend the life cycle of Close Protection Programmes. Developing a business model framework for the Close Protection Programme that is strategically aligned with the business will position security managers as thought partners and strategic leaders within the organisation rather than a tactical department.
Expert presentation & video Q&A
Speaker: Benjamin Coleman, Global Security Executive Services Manager, Facebook
Discussions in small groups on selected topics.
What do YOU want to discuss?
In this simple app we’re sourcing ideas and votes for the most relevant topics: https://vevox.app/m#/138586576
You can post one or more topics, and like those already on the list to give them more chance of being selected.
This forum is open until Tuesday 9 February.
Speed dating meetings with random allocation
Eagle Eye Networks, the global leader in smart cloud video security, shares the trends that will have the biggest impact on video surveillance, security, and use of analytics to drive business intelligence and improvement in 2021: Customers are asking for cloud; Advanced analytics will transform video surveillance systems into even more valuable business solutions; Compliance requirements are constantly evolving; IT departments are engaging with, and in many cases owning video surveillance; and, Customers are expecting systems to be open and connected.
Expert presentation & video Q&A
Speaker: Rishi Lodhia, Managing Director Eagle Eye Networks
There is light at the end of the tunnel as Covid-19 Vaccinations begin to be rolled out slowly across the globe.
However, vaccines alone are not a silver bullet and should complement other tools available, not replace them.
Organisations need to consider a holistic vaccination strategy and focus on strengthening current Covid-19 treatments to keep their people safe and to allow business to continue. Is your organisation prepared? The two big game changers predicted to expedite the resumption to full operations and business travel are the COVID passport, such as AOKpass and massive rapid testing.
Also, how as an organisation can you prepare for the disinformation regarding COVID vaccines and its implemenation?
Join Dr Rodrigo Rodriguez-Fernandez, Medical Director, NCD and Wellness programme and Charline Gelin, Director Security Solutions at International SOS as they share their advice in helping your organisation sustain it’s operations beyond COVID-19.
Speakers:
Dr Rodrigo Rodriguez-Fernandez, Medical Director, NCD and Wellness, International SOS
Charline Gelin, Director Security Solutions, International SOS
Open to all!
Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions.
- 2020 - the year of the virtual crisis room (Matthias Helfricht, F24)
- Artificial Intelligence solving everyday problems (Katerina Ryan, Cathexis Europe)
- Business travel, essential only or road map back to normal? (Saul Shanagher, beTravelwise)
- Moving to mobile access control - best practices (Paolo Castiglioni, HID Global)
- Cloud Deployment and Cloud VMS Demo (David Barr, Eale Eye Networks)
OpenBlue Location Manager: Social Distance Monitoring and Contact Tracing, Intelligent Laboratories, Space and Workflow Advisor (ger mc nmara and luis Soares, JCI)
OpenBlue Secure Solutions that power your Security Operations Center to protect your enterprise (Fintan Ronan and leon Van gendt, JCI)
- Tales of Two years - based on data b Safeture.
Will workplace security invade your home office?/Will your health be an attribute for access control?
Join us for an overview of trends and macro changes that put new requirements on employee safety and the employers responsibility:
• ”OoO”: What happens when Out of Office becomes the new normal for an increasing mobile or remote workforce?
• From guidelines to requirements. How changes in the employer’s responsibility affect you.
• Machines as employees, how robotization is now affecting the workforce.
• From Push messaging to Pull messaging – what happens to employee awareness when the messaging is constantly distorted?
Speaker:
Magnus Hultman, CEO, Safeture
Covid-19 has changed the way we do business, and criminals have quickly adapted to the new reality. Keren Elazari, TED speaker, security analyst and friendly hacker speaks with us about cyber security in times of crisis: lessons learned from the past year as well as trends & predictions and to build resilience, and what future-forward organizations are doing right now to stay ahead of current challenges.
Speaker: Keren Elazari, CISSP, Cyber Security Analyst, Author & Researcher
David Cox, Director of Mastercard’s European Cyber Resilience Centre will explore what today’s globally connected companies are facing in the cyber threat arena and important steps in staying resilient. Highlights will include:
- Cyber crime and the cyber criminal – understanding the profile of attacks and attackers
- Top cyber threats including the evolution of Ransomware
- Third Party Risk Management – Black Swan Event or daily dilemma?
- The role of Mastercard’s European Cyber Resilience Centre in addressing the global threat landscape
- How collaboration and communication is key to a “Security in Unity” strategy
Expert presentation & video Q&A
Speaker:
David Cox, Director, European Cyber Resilience Centre, Mastercard
In this talk, the EU Agency for Cybersecurity (ENISA) will discuss the main findings from its seminal work on mapping the Artificial Intelligence (AI) Threat Landscape. By following a lifecycle view of the AI ecosystem, ENISA worked on identifying relevant assets and following a methodological approach the Agency highlighted threats to said assets and their potential impacts. The report aims to set the baseline on AI cybersecurity paving the path to a better understanding of the AI threat landscape as well as opening the discussion on how to effectively and efficiently address them.
Expert presentation & video Q&A
Speaker: Dr. Apolstolos Malatras, Team Leader, Knowledge and Information Team, European Union Agency for Network & Information Security
Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions.
TOPICS:
- 2021 Crisis Preparedness: The changing face and demands of Emergency Communications during the pandemic (John Davison, F24)
- How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience (George Hughes, Dataminr)
-
Security at Philips was fragmented and seen as a cost center. Seven members of the ExCo had a responsibility for a security department. Our job was to consolidate these activities into one group security function with a ExCo member as the owner and show the benefits.
Next to the possible cost savings of the consolidation of functions, i.e. removal of double roles, we had to show an additional benefit; how we will become a business enabler.
Our pathway to success is to insert ourselves into business processes. Be part of strategic discussion with M&A to avoid cost after integration, contribute to the perfect delivery with supply chain security, make sure our field service engineers can execute on maintenance contracts, etc.
Speaker: Machiel Toe Water, Security & Real Estate Leader for Domestic Appliances, Philips
By invitation only.
Open to all! Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions. TOPICS: - 2021 Crisis Preparedness: The changing face and demands of Emergency Communications during the pandemic (John Davison, F24) - How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience (George Hughes, Dataminr) -
Open to all! Register for the Basic Online Pass (free) or the Premium Online Pass (as of 115 EUR) here
Adoption of mobile services, biometry and cloud solutions, are driving interface standardisation, promising a rich tapestry of interchangeable functionality. Popular trends are a present-day reality, constantly transforming our businesses. But how can you respond to these changing demands from business and what are the actual implications for physical security?
In order to address the dynamic nature of business, and ever-changing threat landscape, we need a way to simulate, verify and validate potential security solutions. This requires a foundation that promotes intelligent analysis and facilitates rapid adaption.
By applying a digital twin, you create a virtual representation of your security, providing instantaneous answers to real world questions. The application of modern-day techniques elevates your security to the next level, ensuring real added business value.
LEARNING OBJECTIVES
Objective 1. Understanding dynamic business needs - Participants will comprehend the inevitable changes in business and the need, as security, to adapt in order to remain relevant in the market.
Objective 2. Apply an agile approach to security - Participants will understand how to apply an adaptive, iterative approach to security. They will receive step-by-step plan as to how this can be achieved and the type of challenges that can be addressed using this approach.
Objective 3. Demonstrate the need for a virtual model - Participants will receive an explanation of how a virtual model, digital twin, can be applied to their specific physical security organisation and can be used to facilitate security professionals when creating or changing security policies.
Speakers:
Jeroen Harmsen, CPP, Global/Enterprise Business Development for the BU Security Management at Nedap
Linda Hwoson, R&D: Future Security Solutions, Nedap
Hendrik Koopmans, Business Designer, Nedap
This presentation will offer a compact update on key terrorism-related concerns in large parts of Europe for the remainder of 2021. It will draw on both government and private sector insights, including newly developing trends and worries related to new players and issues like vaccination and travel services resumption just as the cyber-physical interplay among various extremist groups and their activities tightens.
Expert presentation & video Q&A
Speaker: Glenn Schoen, CEO, [email protected]
Security practitioners, like you, deal with risks on a daily basis. They are assumed to be familiar with the concept of risk. So far, however, little is known about the psychological processes of individual security professionals. How do they perceive probabilities and assess uncertainties? Which aspects of security risk are considered valuable? What is the role of individual security expertise on risk assessments? During the past years, I have conducted several empirical scientific studies in the field of individual decision-making concerning security risks. The results show that security professionals are vulnerable to decision making biases. These phenomena can strongly influence their professional judgment and with that, risk assessments and risk mitigation in organisations. During this session, you are confronted with a few ‘mind experiments’ which can make you aware of your own assessment biases. You are also kindly invited to participate in an online scientific survey. The results of this survey will be analysed in advance and presented during this session. To the survey
Expert presentation & video Q&A
Speaker: Johan de Wit, PhD Researcher & Technical Officer Enterprise Security, Delft Technical University & Siemens Smart Infrastructure
DIscussions in small groups on the topics raised by the presentations of the day
The topic of artificial intelligence has become increasingly popular. Nearly every company offers solutions that include AI. And that also creates a lot of myths and unrealistic expectations. We are going to look at what AI means for video surveillance systems, discuss the benefits and solutions as well as the challenges that come with it.
Speaker: Katerina Ryan, Business Development Europe, Cathexis
What would you do if you were a hospital amidst a mass-casualty incident and had to get as many physicians as possible into your filling surgery rooms immediately? What if you were the security officer in a large financial institution and are dealing with a robbery or a bomb threat. How do you coordinate and communicate with your crisis team and emergency responders at the same time? In this talk we will take a deeper look into how two very different organisations are tackling their challenges with alerting and crisis management.
Speaker: Eske Ofner, Head of Sales, F24 AG
Many large or multinational companies now use electronic systems for physical access control. Typically, these systems collate lots of data and provide a wide range of functionality. Which means they can do far more than open and close doors – they can add value to your business in a variety of ways.
For our annual benchmark research, this was the question we explored: “How can access control add value to your business?”
We interviewed 40 multinational companies about their experience, implementations and processes in relation to access control. The results give an overview on how access control systems are being used; how they’re optimising company-wide processes; and where there are opportunities to gain more value from them. In particular, we focused on how the data collected by access control systems can be used to better effect.
During this session, I’ll explain our benchmark process and provide some highlights from the conclusions.
Speaker: Timon Padberg, Account Manager, Nedap Security Management
Digital transformation is rapidly picking up pace as security teams continuously bring more processes online. We collect more data than ever, but we struggle to use it effectively, which results in missed threats or root causes. Thankfully, recent advances in Natural Language Processing (NLP), a subfield of Artificial Intelligence, offer solutions to these problems. In this session, we will discuss how NLP can help you collect, classify, and extract meaningful data from language inputs to protect what matters in your business.
Speaker: Will Anderson, CEO, Resolver
On-demand Bonus Session:
Cyber security – A shared responsibility
Jeroen van Os, Sales Country Manager The Netherlands at nedap, shares his experiences about the potential cyber risks to physical access management systems. He sees a worrying pattern arising when speaking to stakeholders and organizations.
With damages costing hundreds of billions of Euros around the globe annually, environmental risks are rightly in the spotlight. How well do you understand this risk and how it relates to the role of the security leader?
This session will start by providing an expert, global overview of the type of risk, key locations impacted, potential damage, and organisational perceptions and preparations for these risks.
We’ll then dig in to the implications for today’s and tomorrow’s security teams, with virtual roundtable discussions that allow all participants to exchange and benchmark their knowledge and preparedness.
This is a landmark session for security professionals in 2021 – join us on 23 March at ASIS Europe online.
Moderated by James Morris, Head of Security Services, EMEA, Corporate Protection Services, Aon
Presentation by Michael Szoenyi, Flood Resilience Program Lead, Zurich Insurance Company
Following the first part of the session - working group discussions.
With damages costing hundreds of billions of Euros around the globe annually, environmental risks are rightly in the spotlight. How well do you understand this risk and how it relates to the role of the security leader?
This session will start by providing an expert, global overview of the type of risk, key locations impacted, potential damage, and organisational perceptions and preparations for these risks.
We’ll then dig in to the implications for today’s and tomorrow’s security teams, with virtual roundtable discussions that allow all participants to exchange and benchmark their knowledge and preparedness.
Moderated by James Morris, Head of Security Services, EMEA, Corporate Protection Services, Aon
Presentation by Michael Szoenyi, Flood Resilience Program Lead, Zurich Insurance Company
In a metrics-focused and data-driven business environment, a business case is a crucial tool to justify budget and capital expenditures. But where to start? Identifying data sources, evaluating the quantitative and qualitative costs and benefits, and outlining risks to various courses of action can be overwhelming.
This workshop will walk you through the process with a series of exercises to help you develop your security business case. You’ll learn what to include, where to find your data, how to evaluate alternatives, and ultimately make your case to management.
Learning outcomes: Participants will be able to
- List the elements included in a business case
- Ask appropriate questions
- Evaluate data sources
- Make data-driven recommendations to the organization
Speakers and instructors: Lynn de Vries, CPP, PCI, COO, DutchRisk, and Stéphanie Bergouignan, CEO, UNIPROTECT
Workshop continued.
In a metrics-focused and data-driven business environment, a business case is a crucial tool to justify budget and capital expenditures. But where to start? Identifying data sources, evaluating the quantitative and qualitative costs and benefits, and outlining risks to various courses of action can be overwhelming.
This workshop will walk you through the process with a series of exercises to help you develop your security business case. You’ll learn what to include, where to find your data, how to evaluate alternatives, and ultimately make your case to management.
Learning outcomes: Participants will be able to
- List the elements included in a business case
- Ask appropriate questions
- Evaluate data sources
- Make data-driven recommendations to the organization
Speakers and instructors: Lynn de Vries, CPP, PCI, COO, DutchRisk, and Stéphanie Bergouignan, CEO, UNIPROTECT
Join us for a fun networking session: the ASIS Europe Pub Quiz!
Our Quiz Master and ASIS Immediate Past President Godfried Hendriks will challenge participants grouped in teams for one hour of fun and interaction!
May the best team win!
Explore Levi’s retail operations best practices, with insights from both local (in the Russia/CIS region) and international experience. Highlights will include:
- “Know your customer” approach
- Personnel issues and activity
- Loss prevention approach in stores
- Personal data protection considerations with today’s technology
- Brand protection strategy and activity
- Contemporary trends in retail security
Speaker: Michael Cheremisinov, Regional Security & LP Manager, Russia. CIS, Turkey, Levi Strauss & Co
Preparing to return to the physical workplace means adapting to new requirements, implementing new procedures and leveraging technology to alleviate anxiety for staff.
Join us to hear Dave Boshell, Global Security Manager for Indeed.com talk about how he is preparing its facilities to welcome staff back safely. A main discussion topic will focus on how mobile physical access control technology is overcoming a complex set of security challenges for the technology giant . Dave Boshell will be joined by Robbie Devlin, Key Account Manager from HID Global who will also highlight best practice advice in building a business case to integrate mobile access control into an organisation.
Speakers:
Dave Boshell, Physical Security Manager, Indeed
Robbie Devlin, Key Account Manager, Physical Access Control Solutions, HID Global
Jim Burton, Pre-Sales Consultant, Physical Access Control Solutions, HID Global
Since a few years now, how to be a responsible, sustainable and ethical brand has become more and more integral to the ways companies define their strategy. This trend has been reinforced by the COVID pandemic and the general call to ‘Build Back Better’.
Launched in 2015, the UN Sustainable Development Goals provide a framework to understand the breadth and scope of what “sustainable businesses” are. As these requirements become central to corporate strategy, security leaders and their teams will have to understand how security and sustainability can reinforce each and how they can leverage the security function as a key business enabler in the context of the UN SDGs.
At Radisson, one of the world’s leading hotel groups, this has already taken shape. Next to “Think Planet” – minimizing the environmental footprint– the group’s award winning Responsible Business program focuses on: “Think People” –always caring for employees and guests, and Think Community – community engagement and business ethics.
In her role as Global Senior Vice President Sustainability, Security and Corporate Communications at Radisson Hotel Group, Inge Huijbrechts has both security and sustainability in her portfolio and is uniquely positioned to deliver this forward thinking session.
Expert presentation and live Q&A session
Speaker: Inge Huijbrechts, Global Senior Vice President Sustainability, Security and Corporate Communications, Radisson Hotel Group
The Francis Crick Institute is a biomedical research institute dedicated to understanding the fundamental biology underlying human health and disease. This panel discussion session will draw in on the Institute’s response to the pandemic within the context of its vaccination centre and covid testing pipeline.
We will also focus on preparedness for future pandemics and challenges faced by the healthcare industry.
The session will be facilitated by Leo Kelly, Risk and Resilience Manager and his colleagues at the Crick: Keeley Watson, Vaccination Logistics Manager, Charlie Swanton and Rupert Beale, both of whom are Scientific Group Leaders.
How to enhance situational awareness to optimize risk management and reduce vulnerabilities? The ongoing convergence of Video surveillance and Access Control powered by Artificial Intelligence brings a promising answer to this as well as many other challenges faced everyday by security practitioners. From assisted to autonomous intelligence, AI-enabled integrated security technologies unleash new opportunities to anticipate potential security breaches and enhance security operations, such as person re-identification, dynamic people counting, object classification and smarter access control.
Speaker: Stuart Bettle, Product Marketing Manager EMEA, Security Products - Johnson Controls
IN PARALLEL:
Table Talk - - 2021 Business Continuity Institute Emergency Communications Report: Key findings and takeaways. (Peter Beswick & Arnaud Sraka, F24)
- Table Talk - Travel Risks - Reality Check (Saul Shanager & Jutine Oliver, beTravelwise)
- Table Talk - How can video management system help to increase efficiency in the organisation? (Katerina Ryan, Cathexis)
- Table Talk - How can autonomous drones help strengthen security over sensitive sites? (Xavier Desseaux and Daphné de Kerangal, Azur Drones)
“Is my organisation prepared to address multiple security crises?” – corporate security professionals must ask themselves this question as they navigate a year with more global uncertainty than ever. Forrester Consulting conducted a study commissioned by Dataminr to survey over 400 leaders responsible for risk, security and corporate compliance, and found the majority fundamentally misunderstand real-time information, and are getting worse outcomes as a result. This session will cover discuss the research findings, including:
- How to assess the maturity of your security department
- The risk of silos during a crisis response
- The role of real-time information in high-performing enterprises
Speaker: Al Bowman, Head or Corporate Risk, Dataminr
Business continuity is a key focus in the world of global security professionals. And the pandemic has made this situation even more complex. But it’s not just health
concerns that can threaten your business. Disaster can strike at any time and can include a wide range of issues such as environmental risks, production problems and accidents. All of which can have devastating consequences on your turnover, profit and reputation, not to mention your employees’ wellbeing.
What many people don’t realise, is that access control can be a powerful tool to support business continuity. The value of a good physical access control system stretches far beyond opening and closing doors. It can help to protect your business and its continuity in a variety of ways.
Speaker: Jeroen van Os, Country Manager The Netherlands, nedap
In parallel:
- Table talk - How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience (George Hugues, Dataminr)
- Table talk HID Global
- Table talk - Converging Video, Access Control and AI: exceptional solutions for extraordinary times (Horst Waldbauer, Security Product Manager, Continental Europe, Johnson Controls)
- Table Talk Making vehicle access COVID-proof for staff, contractors and visitors (Evelien O’Sullivan - Krabben and Ido Wentink, Proposition Managers, Nedap)
The unique capabilities of Ultra-Wide Band (UWB) technology promise to make it an essential technology in seamless access control and location-based services. Access control systems that leverage the power of UWB technology will monitor the user's approach, seamlessly verify security credentials, and allow access to secured areas, thus enabling a completely frictionless, yet secure entry and exit experience.
Discover how UWB works and more about the merits of this emerging security technology with Jaroslav Barton, Product Marketing Director – HID Global, Physical Access Control Solutions
IN PARALLEL:
- Table talk - What are the major advantages of cloud vs on-premise systems ? (Christopher Tengstrand, Eagle Eye Networks)
- Table talk Resolver
- Table talk - Workplace Safety when Work is No Longer a Place (Jens Nasstrom, Content Director and Head of Risk Intelligence and Christian Truedsson, Client Relationship Manager,
Safeture)
There are no more excuses to delay digital transformation. And this should also be good news for the community of security professionals. Nick Kós, Chief Executive Officer, PwC CEE explains why, talking about the future of work with insights from the PwC's 24th Annual CEO Survey and the PwC Digital Trust Insights Survey.
Keynote speaker:
Nick Kós, Chief Executive Officer, PwC CEE
Our panel of security leaders from major organisations will be discussing:
- How are teams coping after a year of continuous crisis, and how has leadership changed
Why diversity has real business value and helps address risk
- Skills gaps and shortages
- The future of security teams, sources of learning and inspiration
This session will be broadcast live with the opportunity for audience Q&A.
Panellists:
Letitia Emeana, CPP, PSP, Group Security Capability Manager, Unilever
Gavin Henderson, Vice President & CSO for Mastercard International Markets, Mastercard
Inge Huijbrechts, Global Senior Vice President Sustainability, Security and Corporate Communications, Radisson Hotel Group
Bruno Kalhoj, Senior Security Advisor, European Central Bank
Solvay has built an enterprise wide security risk management programme and advanced its security to mature level in a 3-year time window. This live interview session will describe the journey Solvay has taken, and provide key insights into critical success factors as well as detractors and obstacles observed along the way. In addition, we will focus on the essential organisational conditions for successfully implementing an Enterprise Security Risk Management Philosophy.
Speaker:
Werner Cooreman, CPP, PSP, Senior Vice President – Group Security Director, Solvay Group
Interviewer:
Radek Havlis, CPP, Chief Security Officer CEE and Central Asia, PricewaterhouseCoopers
How has the pandemic affected your business and your professional standing ? Through the SSR Personnel Insights programme we look at how the physical and virtual worlds have sharpened and concentrated 5 years of change into the last 12 months. We release the results of the 2021 European salary survey supported by ASIS International.
Speaker: Peter French, CPP, CEO, SSR Personnel
In his presentation, Adrien will address the main topics Travel Security Managers will have to deal with this year: Travel Resumption, the new Security Governance and the release of ISO 31 030 on Travel Security. Then he will answer the participants’ questions in a lively interview with Godfried Hendriks.
Speaker: Adrien Frossard, Global Head of Travel Security for the AXA Group.
In a metrics-focused and data-driven business environment, a business case is a crucial tool to justify budget and capital expenditures. But where to start? Identifying data sources, evaluating the quantitative and qualitative costs and benefits, and outlining risks to various courses of action can be overwhelming.
This workshop will walk you through the process with a series of exercises to help you develop your security business case. You’ll learn what to include, where to find your data, how to evaluate alternatives, and ultimately make your case to management.
Learning outcomes: Participants will be able to
- List the elements included in a business case
- Ask appropriate questions
- Evaluate data sources
- Make data-driven recommendations to the organization
Speakers and instructors: Lynn de Vries, CPP, PCI, COO, DutchRisk, and Stéphanie Bergouignan, CEO, UNIPROTECT
IN PARALLEL:
- Classic vs. Digital Crisis Management: Opportunities and challenges in the crisis response team`s work and what it means for the transition of a cloud-based solution. - by Reto Caderas, Head of Sales at F24 Switzerland and Tony Tran, Sales Manager at F24 Nordics
-How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience - by Dataminr
- Will your health become an attribute for physical access control? by Nedap
- Future Proof Your Security System with HID Signo™ Access Control Readers - by Jim Burton, Pre-sales Consultant (UK/I), Physical Access Control Solutions, HID Global
Given the stringent levels of security and identity checks that travellers have to pass in order to take their seat on a plane, you'd be forgiven for thinking that it was a pretty safe space. Think again. Recent reports and court cases show that sexual harassment and assaults can and do take place during flights a lot more frequently than you may think. In this session, Dr Sophie Harwood will give an outline of the current situation and an overview of some recent cases, some practical advice on how to mitigate the risks of encountering it, suggestions on what to do if it happens to you or someone you know, and what airlines and airports could be doing to help put a stop it.
Speaker:
Dr Sophie Harwood, Women Travel Advisor, beTravelwise
Corporate Security standard practice of managing employee data across national borders must be changed to be compliant with the new data protection laws globally.
Speaker:
Andreas Rodman, Co-Founder and Chief Innovation Officer, Safeture
Autonomous drones offers many benefits for the security and safety of critical sites: mobility, higher responsiveness, superior visual capabilities, thermal imaging, as well as protection of people. But how to integrate them into a security system? What are the constraints for the site? This session will explore the requirements for deploying autonomous drones and the installation process, as well as use cases.
Speakers:
Daphné de Kerangal, International Sales Manager, Azur Drones
Xavier Desseaux, International Sales Manager, Azur Drones
As we enter out of lockdown in most countries in Europe, job opportunities are increasing across a number of larger businesses. Due to an increasing number of candidates available on the market, roles are more competitive now to secure than ever.
This presentation will offer advice and tips from experienced internal recruiters at Amazon on how to structure your CV and application, and how to prepare for final interviews and scenario based questions.
Speakers:
Rachel O’Shea, Internal recruiter, EMEA Security and Loss Prevention, Amazon
Samuel Putley, Internal recruiter, EMEA Security and Loss Prevention, Amazon
IN PARALLEL (15:05 - 15:50)
- Table Talk - OpenBlue Location Manager: Social Distance Monitoring and Contact Tracing, Intelligent Laboratories, Space and Workflow Advisor
- Table talk - Eagle Eye Networks
- Table Talk - International SOS
- Table talk - Workplace Safety when work is no longer a place
- Table Talk -How can autonomous drones help strengthen security over sensitive sites?
Building owners need to safely bring people back to work while addressing new challenges. Occupants want to know that a space is not just safer but also healthier.
Implementing new policies and practices is the first challenge. The second is sustaining compliance. Using integrated security systems in new ways to create a safer and healthier environment can help prevent, identify, analyze and report non-compliances and incidents alike.
We will explore different ways this can be achieved to understand why specific methods matter, potential deployments for each and recommendations for consideration.
Speaker: Sheeladitya Karma, Honeywell
IN PARALLEL
- Speak to experienced recruiters on how to interview in the security industry - by Rachel O’Shea, Internal recruiter (EMEA Security and Loss Prevention) and Samuel Putley, Internal recruiter (EMEA Security and Loss Prevention), Amazon
- Table Talk - beTravelwise
- Everything you always wanted to know about video management but were afraid to ask - by Dominique Debusschere, Business Development, Cathexis.
- Table Talk - Honeywell
Theo Veltman, Innovation Rainmaker at the municipality of Amsterdam, will set the scene for the conference by sharing where Amsterdam’s is in implementing its Smart City strategy, and how this leads onwards to Amsterdam, a smart society. Combining insight from both technical and human perspectives, Theo will cover:
• Quality of life issues addressed by smart approaches
• Where the city is in its strategy implementation
• What is coming next
• How the roles of citizens, public and private companies, and government interact with one another
• Key technology concerns
All Leadership and Professional pass holders for Thursday are invited to join us for this essential session, helping to put the rest of the event in context. Purchase your pass now
Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, will introduce:
• what does a resilient city vision look like
• how Rotterdam is implementing Resilient City methodology
• what are the related technologies
• how this is changing day to day and business life in the city
• what is expected in the next 3 years.
Only available for leadership pass holders – register now
This panel will examine the keynote’s smart city and resilient city visions from the perspective of security leaders:
• where does the role of security fit in the Smart and Resilient city visions?
• Are there areas where visions, objectives and priorities might converge or diverge?
• What are the specific aspects of concern from a security perspective?
• How will security leaders and their teams need to adapt as our cities evolve?
The panel will be moderated by 2019 ASIS International President Christina Duffey, CPP, and include expert viewpoints from Theo Veltman, Rainmaker Innovation, Innovation Program Manager, CTO, City of Amsterdam, Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, and Volker Wagner, Vice President Security, BASF Group.
Only available for leadership pass holders – register now
Cyber security has become one of the major challenges that organisations face today. According to the 21st PwC CEO Survey, 33% of CEOs are extremely concerned about cyber threats. Matthijs van der Wel will provide a high level overview of various threat actors and how their objectives and operations impact your cyber risk profile. He will also discuss various practical models that your organization can adopt today.
Speaker: Matthijs van der Wel, Director Forensic Technology Solutions, PwC, NL
In a VUCA (Volatile, Uncertain, Complex, Ambiguous) environment, traditional roles are changing and new skills are needed. Technical ability is important but soft - people skills even more so in a diverse and fast changing context if we need to innovate and lead successfully. This can be a particular challenge for security leaders who have transitioned to management roles in a business setting following careers and leadership development in Military or Law Enforcement where command and communication structures were very different to today’s business cultures.
Following an introduction from the CSO’s perspective by Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, the session will be led by Balvinder Singh Powar, Associate Professor at IE Business School and Partner/Director at BOOSTER Space Industries & AERDRON.
Join us for an active and engaging practical session.
Only available for leadership pass holders – register now
innogy Group Security has successfully managed the integration and convergence of Cyber and Physical Security, enabling a 360-degree view and boosting impact which is clearly recognized by top management.
Digitization and the associated tightening of legal requirements make Cyber Security a critical success factor. By systematically assessing the Cyber Security Risk and the degree of maturity of existing controls, we are able to identify and prioritize the implementation of additional, necessary security measures. Allocation of Cyber Security outside IT ensures transparency, good governance and successful “operating at eye level” with CIO. The integration and convergence of Cyber and Physical Security enables a 360-degree view and boosts impact which is clearly recognized by top management. Top management commitment results from good governance, transparency, measurable and tangible impact as well as management language and education instead of technical terminology.
Speaker: Peter Olijslager, Head of Security Retail / Deputy CSO Group Security, innogy SE, DE
Only available for leadership pass holders – register now
An exceptional panel with direct insight from leading CSOs on how they build and lead teams up to the toughest security challenges. This session will cover:
• Skillsets: choosing specialists and generalists
• Talent Attraction: hiring new and established professionals
• Retention and Development: ongoing training, driving the security culture
• Engagement: empowerment, cross function exposure and experience
• Performance Management: define how to measure success
• Insider Threat: pre and in-employment screening, collaboration with HR
Panelists will include Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, Gavin Henderson, Vice President Regional Security Europe & Eurasia , Mastercard, and Nick Lovrien, CPP, Chief Global Security Officer, Facebook Inc.
Moderator: Eva Mueller, Senior HR Business Partner, EU Corp OPS, Amazon, LU
Only available for leadership pass holders – register now
Following up on the Building a Brilliant Team panel, we examine another critical and often controversial area in enterprise security – the role of Consultants. This panel will contrast viewpoints from leading CSOs and Consultants and will cover:
• Owning and understanding the business case for using Consultants
• Sourcing, recruiting, and expectation setting
• Contracting models and win-win scenarios
• Performance Management: define how to measure success
• Insider Threat/Third party risk: pre and in-employment screening, collaboration with HR
Speakers:
Karolien Verbeiren, Director Key Accounts European and Global, Securitas, BE
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy, BE
Only available for leadership pass holders – register now
Relax, recharge your batteries and enjoy a drink in the exhibition after a busy first event day. Available for all participants.
Dinner with a river view! Hosted by the President of ASIS International and sponsored by Johnson Controls, this is the perfect opportunity to meet and network with fellow industry professionals in the unique settings of the Wereldmuseum. Tickets are required for this function. Address: Wereldmuseum, Willemskade 25, 3016 DM Rotterdam Directions with Public Transportation: From the WTC Beursplein, take Metro D or E direction De Akkers and stop at Leuvenhaven Or, from Kruisplein, take Tram 7 direction Willemsplein and stop at Westplein CLosest Parking: Erasmus Brug Parking
The proliferation of commercially available drones in recent years has created a new vector of attack. From industrial espionage to physical security and security issues, drones provide a convenient, cost-effective tool for a range of malicious intentions.
In this presentation, Sina Schemel, asset protection, Group Security Volkswagen AG and Volkswagen Chief Security Officer, Michael Schmidt will demonstrate the advantages and risks that drones bring to industrial companies and show a possible approach to mitigating these risks.
Only available for leadership pass holders – register now
Technology has always played an integral role in strategic competition, and today’s global battle for AI dominance is both headline grabbing and significant. China, the United States, and the European Union each approach AI development, deployment and regulation differently, and each have their own inherent strengths and weaknesses.
Rodger Baker, Stratfor's Senior Vice President of Strategic Analysis, will outline who is in the lead and what factors are contributing to the divergence in development.
In addition, with applications ranging across the civilian and military spectrum, Mr. Baker will assess the impact the AI race may have on international business operations as organizations maneouver the precarious path of resurgent big power competition.
Only available for leadership pass holders – register now
Financially measuring annual security risk value, helps security and risk professionals to communicate the security risks the organization is facing, and can support an ESRM approach.
Starting by presenting a framework for measurement, you will see an example of a risk workshop using the framework, and how a risk workshop is facilitated. The session will conclude with real-life examples and known challenges from a global high technology manufacturing corporation.
Speaker: Perttu Sarkkinen, Security Manager, Wärtsilä Finland Oy, FI
Only available for leadership pass holders – register now
Scoring a crisis management response is an ideal way to assist a company's future processes by identifying areas of weakness or non-conformity in an event. This information should support future learning. But is it possible to score a crisis response and if so, how do you do it?
The presentation will discuss the journey taken on this particular problem and share the outcomes of the project.
Speaker: James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK
Only available for leadership pass holders – register now
Few topics in the domain of terrorism have been obfuscated with mystery and misinformation as the subject of chemical and biological terrorism.
In this 90 minute workshop, S2 Institute consultant Craig Gundry explores the threat of chemical and biological terrorism as it specifically applies to security professionals including an examination of previous attacks, diverse facility attack scenarios, and practical measures for preventing and responding to chemical and biological attacks in a workplace environment.
Speaker: Craig Gundry, PSP, Lead Instructor, Anti-Terrorism Programs, S2 Safety & Intelligence Institute, US
Only available for leadership pass holders – register now
Are you aware of the risks you face as a traveller? This interactive workshop will ask you to step into a different traveller profile and consider whether the risks you face have changed and what information and help you might now need?
In groups representing different traveller profiles this workshop will ask the participants to prepare for a journey, with their current employer in mind, that takes in: day to day inclusivity at work, perceived versus real travel risk, how best to communicate, educate and train diverse travelling employees, what resources and help is available and who has responsibility or can help?
The workshop will explain some of the key drivers for diverse travel risk and use examples to demonstrate when things have gone wrong and what best practice looks like. At the end of the workshop the participants should be able to review their own travel risk training and education programs to ensure it is supporting their diverse travelling population.
Leads:
Sam Roper, Security Advisor, beTravelwise
Saul Shanagher, Director, beTravelwise
Only available for leadership pass holders – register now
Fake news is all around us. How to respond to it in an attempt to prevent fake news from becoming a crisis for your organization?
If fake news threatens your organization or even jeopardizes its continuity, the crisis management team needs to respond swiftly, but wisely. One of the factors to consider is a security response, whether cyber or physical. What would your input be from an Enterprise Security Risk Management (ESRM) perspective if the board requires it?
In this practical and interactive crisis management training you will get busy! We will combine theory, scenario and ‘bring it to the board room’ presentation elements. The quickly developing scenario challenges the participants to come up with ESRM-based response suggestions. You will need to explain (and defend) your suggested crisis response to the board in an elevator pitch manner.
ASIS Crisis Management & Business Continuity Council members and trainers act as board member assessing and challenging your suggested crisis response. So, the takeaways of this interactive training are instant!
The Crisis Management & Business Continuity Council of ASIS International supports this Leadership Training session.
Trainers:
Theo Stevens CPP, Security Director CBRE GWS
Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S
Only available for leadership pass holders – register now
Enterprise Security Risk Management (ESRM) is a security management approach that links security activities to an enterprise's mission and business goals through risk management methods. Learn the basics of the ESRM life cycle and understand how to begin implementing an ESRM program in any organization. Discuss the progress made in in embedding ESRM into ASIS education, certifications, standards, and communications.
This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.
Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment
Available for leadership pass and professional pass holders – register now
Several brands have been affected by the growing use of social media by customers, employees, vendors, cyber criminals and competitors, causing serious damage to image, and reputation of the company and its brand.
The purpose of this presentation is to help security professionals understand how to deal with social media related crisis. Actual case studies have been used to train professionals to spot trouble and prepare for it before it strikes.
Speaker: Pramod Bhatt, Senior Director, Security and Intelligence, Sanofi, IN
Available for leadership pass and professional pass holders – register now
Although mobile devices like smartphones, tablets and laptops have become standard tools in today’s world, the rapidly changing technology and the increasing complexity of technical issues has made it easier for smart hackers to manipulate your devices.
For example - did you know that your phone can be hacked through your car’s pairing device?
This and several other topics will be discussed during the presentation. Attending will give you an advantage over your peers and will not make only your mobile communication safer, but also help you advise your company and family.
Speakers:
Werner Preining, CPP, Responsible for European OPR, Interpool Security, AT
Ronald Lander, CPP, Chief Specialist, Ultrasafe Security Solutions, US
Available for leadership pass and professional pass holders – register now
Terrorist attacks have resulted in tremendous amounts of income loss, not only due to physical damage at the attack site, but also as a result of the perceived threat by potential travellers of future terrorist attacks in the region. As the effectiveness of security is measured when an offence takes place, and either the offence is stopped by security measures, or succeeds due to security vulnerabilities, it is a great challenge to measure return on investment in security measures prior to an attack taking place.
This presentation addresses several aspects relating to business perceptions of risk and security. It presents not only preferences as to security, but also risk perceptions and if these preferences and perceptions differ based on current home country.
Speaker: Ivor Terret, General Manager, Enablement Advisors
Available for leadership pass and professional pass holders – register now
Ideally, preferably before a building is developed on the drawing table but also with a renovation/refurbishment, the importance of security should be addressed by all parties (architect, client, interior designer, construction firm, insurer et cetera).
However, working in cultural buildings, private homes, or historic corporate headquarters brings additional challenges as existing structures cannot be adapted to optimise modern security thinking and measures.
In these cases, we need alternative approaches so that security can still be effectively designed, and in some cases, be integrated in an existing building without any visitor being aware of the existence of the security measures.
This presentation will explain how to perform a specific risk assessment from which to derive protection concepts against identified risks. A systematic protection scheme can then define and document the necessary structural protection measures as well as the organisational safeguards.
Speaker: Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy
Available for leadership pass and professional pass holders – register now
Cultural and historical venues by their nature are open and welcoming locations. Because of this, striking a balance between open public access and appropriate security measures is very important to ensure visitors are not intimidated and the welcoming approach is maintained. The provision of specialized training of staff and volunteers is an important way of achieving this objective. Although predictive profiling has traditionally been a human based methodology, leaps in technology have resulted in the development of predictive threat tools such as streaming data infrastructure, patented profiling technology and self-learning analytics — to create new solutions that complement the means to identify potential threats. The purpose of this presentation is to explore the use of predictive profiling as a tool to prevent or mitigate a threat before it evolves into an attack or criminal event.
Speaker: Doug Beaver, CPP, Executive Director of Protective Services, National Museum of Women in the Arts, Washington, DC
Available for leadership pass and professional pass holders – register now
There is no better way to spread a message than making it easy and straightforward.
Resilience and every discipline connected to it are everyone’s business in an organization. By definition, resilience is not an exclusive property of a few technicians sitting in a closed room, but – just like lymph or blood – it runs through any level and department. Everyone in the same organization must speak and practice resilience fluently.
For this to happen, and for everyone to be involved and committed, it cannot be complicated, and it cannot be a labyrinth of technical buzzwords. Resilience has to be universal.
Speakers:
Alberto Mattia, Chief Executive Officer, Panta Ray
Paola Scotto di Frega, Head of Consulting, Panta Ray
Real world cases of technical espionage, with video, live audio feeds and photos of the attacks will be presented by Jason Dibley, Technical Director at QCC Global. Jason will examine the mechanics of these different espionage events, how not all state sponsored attacks are highly technical and highly funded, and at the countermeasures that may have detected or prevented these attacks.
Speaker: Jason Dibley, Technical Director, QCC Global Ltd
A terrorist attack takes place in central London, in proximity of your staff - what is your main concern?
Artificial Intelligence is a key driver behind todays’ mobility risk management. New technologies provide answers to our most imminent questions during a crisis: Are my employees affected? Who needs help?
The presentation shows the benefits and limits of AI in mobility risk management. It explains how technology can enable corporates to drastically speed up and scale the alerting process, from incident detection and matching travelers’ location data, up to the final call that tells you who needs help.
Speaker: Matteo Grella, Head of Research & Artificial Intelligence, EXOP
In today’s increasingly global environment it’s essential to unify your security internationally. But it can be extremely complex and demanding – especially as our world is changing more quickly every day.
To identify existing and future bottlenecks and challenges for multinationals, Nedap has conducted benchmark research and stays in continuous dialogue with clients. Join this session to discover key findings relevant to your organisation.
Speakers:
Timon Padberg, Sales Manager Global Clients, Nedap
Martin Wijlens, Sales Manager Global Clients, Nedap
Under the GDPR, data controllers are required to notify their supervisory authority when a personal data breach occurs, unless it is unlikely to result in risks to the rights and freedoms of individuals. The notification needs to be done without undue delay, no later than 72 hours after the controller has become aware of the breach (with some exceptions). It is crucial for organizations to understand their obligations and the details of this tight timeline as well as the risk-based triggers, and what they entail. In this session, we’ll review the personal data breach rules under the GDPR and provide tips to help you map out a 72-hour personal data breach action plan.
• Understand the implications of the GDPR for controllers and processors
• Map out a GDPR-ready 72-hour personal data breach action plan
• Outline the details of this tight timeline as well as the risk-based triggers and what they entail
• Implement efficient and effective data handling practices in the face of new GDPR requirements
Speaker: David Sinclair, CIPP/E, Privacy Consultant at OneTrust
As advances in technology continue to increase the amount of data in the world and companies send more people to conduct business in remote locations, there is a growing expectation for organisations to gain information faster about incidents and threats that could impact them. The increased speed of information sharing means that a security team’s traditional challenges during a crisis, such as lack of time and difficulty determining what information is relevant, are compounded. Used correctly, however, this vast volume of data can be a significant enabler for security teams. Dataminr will examine effective crisis response in the modern world. Within the first 30 minutes, a security manager must make crucial decisions quickly to protect the company and its people. Real-time, publicly available data, like social media, blogs, and the dark web, is essential for early event awareness, improved visibility, and more confident decision making.
Speaker: Tim Willis, EMEA Director Corporate Security Sales, Dataminr
According to Forrester companies are investing significant resources in sophisticated controls to protect their employees, brand and assets from critical events.
These disruptive incidents (ranging from cyberattacks to terrorist activity) increasingly lead to business impacts such as operational losses, brand damage, and concerns for employee health and safety.
Despite the investments being made, companies struggle to optimize their critical event management (CEM) operations, slowing down response time and creating potentially life-threatening confusion.
In this session we will look at how a unified approach to critical event management meets the demands for rapid response and speedy incident remediation.
Speaker: John van Laerhoven, Managing Director Benelux, Respond, An Everbridge Company
For the last decade we have been investing in the same security controls over and over again: access control, video surveillance and intrusion detection. Enhancements have been made in each of those domains, but the weaknesses that existed 10 years ago are still weaknesses today. We’ll discuss a fundamental flaw in how we approach physical security, look at what we can learn from the cyber security space where a similar mistake was made but addressed, and propose an alternative approach to move to better and smarter physical security.
Speaker: Bart Vansevenant, Co-founder, Ticto
If you’re only using your access control system to lock and unlock doors, you’re underutilizing your system! As everything from people, lights to locks become connected, there are new opportunities to interact with and better understand your people and your building through a single pane of glass. This talk course is designed to shed light on how, by connecting these components to your access control system, you can drive operational efficiency and cut overall costs and make more informed decisions.
Speaker: Jean-Philippe Deby, Business Development Director – Europe, Genetec
Big Data, Machine Learning, Artificial Intelligence and Augmented Reality.. The list of “Silver Bullet Buzzwords” that we’re told will revolutionise the security industry is long. But what do security professionals actually need, what can we expect from new technology and where does the human being fit in all this?
Mads will give a talk in non-technical language about what these new technologies are about and share his research on what security professional say they need, how technology can help and where it might fall short compared to the human being.
Speaker: Mads Paerregaard, Founder & CEO, Human Risks
In today’s hyper distracted world, attention is limited. If we want to successfully raise awareness, change behaviour and influence culture, we need to engage with our audience first. Unfortunately, security awareness programs often fail right there, at that first hurdle.
This presentation will reveal some of the latest tools and techniques that savvy marketers have been using for years, capturing our attention, orienting our behaviour and moving us into taking certain actions. Join us and learn what makes us ‘click’, and how to leverage psychology to achieve positive change in your organization.
Speaker: Heimo Grasser, CPP, Awareness Strategist, SAME Solutions
The latest digital evolutions of technologies for security systems and building management have enabled full smart building functions like for the Brattorkaia Building.
All Building Technologies like cameras and card readers have now moved to IP and enabled full integrations with building management including latest wireless and IoT communications. Smart building functions for building owners, occupants and facility managers to improve the building productivity are now embedded and are the major progress of last decades as they really HELP building stakeholders. The Brattorkaia Powerhouse Building Norway is showing how the JCI integration of IP systems lead the way to safer, more secure, more productive and more sustainable buildings.
Speaker: Yann Mahieu, Director Key Account Solutions, Johnson Controls, CH
The digitalization of the industry has led to a rapid increase in data. Data can have an immediate value, such as an alarm can reduce or eliminate the severity of an incident. Once acted upon, we stop attributing value to the data and treat it as a cost to manage. In this session, we’ll discuss how to turn your data in to intelligence through AI and advanced analytics. Intelligence which improves the safety of people, assets and societies.
Speaker: Viking Johansson, Director of Product Management, Intelligent Products, Securitas AB
Organized by Lynn de Vries, CPP, PCI, COO, DutchRisk Join us for this unique opportunity to network with women in security from all over the globe.
Are you ready to take the next step on your career ladder? ASIS offers four certification programs, which are designed for security managers who want to prove that they have the security knowledge and skills to bring to their organizations. The Certified Protection Professional (CPP) is designed for those who manage all aspects of an organization’s security functions, the Professional Certified Investigator (PCI) is for those who conduct security-related investigations, the Physical Security Professional (PSP) is for those who manage physical security operations, and the Associate Protection Professional (APP) is ASIS’s newest certification program and is meant to validate your understanding of the fundamentals of security management. Come to this session to learn what the exams test, the eligibility requirements, studying tips, and more!
Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International
ASIS and SSR have teamed up for the 2018 SSR & Executive Profiles salary survey which reviews more than 4,000 security professionals across the finance sector, manufacturing, extractives, FMCG and logistics. The results will be presented here. Gain competitive insights on your position in the labour market and how your sector is performing.
Speaker: Peter French, CPP, CEO, SSR Personnel, UK
Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.
Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK
Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.
Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK
Job burnout, or work-related stress, is an ever-present risk for busy security manager. While almost none of the alpha types in our industry are willing to admit it, many of us have worked the crazy hours that lead up to burnout – and more than a few of us have discovered the negative consequences of work-related stress too late. In this interactive session, we take a look at what causes burnout, and what security personnel and management can do to prevent it.
Speaker: Mac Segal, Vice President of Business Development & Security Consulting, EMEA, AS Solution
ESRM = Managing the enterprise’s security risks through the use of fundamental risk principles. So, what do the skills, qualification, experience and knowledge sets needed to achieve this look like? The clues are in the name - the requirements of the modern security professional are a mixed cocktail: a base of physical security or cyber-security; a measure of project management; a sprinkling of business management; a pinch of investigation; a dose of negotiation skills; a smidgen of strategy all topped off with a generous portion of communication powers. So how do you mix this cocktail?
This presentation will provide guidance for those in the profession on how to achieve the heterogeneous mix of skills and qualifications required for the future.
Speakers:
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs, UK
Mike O'Neil, CPP, PSP, Managing Director, Optimal Risk Group - Resilience, Risk, and Security advisors, UK
By personal invitation only.
Relax, recharge your batteries and enjoy a drink in the exhibition after a busy first event day. Available for all participants.
Facebook's core values of being bold, focusing on impact, moving fast, being open, and building social value allow Facebook to deliver on its mission to give people the power to build community and bring the world closer together.
To foster innovation and collaboration, an open plan office space and a welcoming environment for frequent meetings with external visitors are essential to enable the business.
Nick will use this as an example to illustrate:
• Progressive approaches to creating a safe and secure workplace
• How the company evaluates its risk appetite, and the role of security function in this dialogue
• How governance structures are evolving, with a focus on security as the business enabler and ESRM concepts
Speaker: Nick Lovrien, CPP, Chief Global Security Officer, Facebook, US
Only available for leadership pass holders – register now
Learn how security leaders can successfully engage business leaders in the security risk decision process.
We will cover the role of the security and business leaders in ESRM, and business-based risk mitigation program development.
This session is intended as preparation for the “Bring it to the Board Room” training session following the coffee break.
This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.
Speakers:
Volker Wagner, Vice President Security, BASF Group
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
More speakers to be confirmed
Only available for leadership pass holders – register now
This presentation will use real case studies to highlight the key role partnerships play and how they are helping to shape improvements in the security of soft targets.
Learning from experience is a crucial opportunity that should not be overlooked. Sharing those learnings with others should also be viewed as an opportunity.
Recent attacks in Paris, Brussels and Bamako all provided us with unique experiences and in each case the value of public-private and private - private partnerships played a crucial role in our crisis management.
Since the attacks, Radisson Hotel Group has increased its contributions to collaborative efforts around the world including the Global Counter Terrorism Forum initiative on soft target protection, the EU action plan for protection of public places and European hotel industry trade association projects to increase awareness, preparedness and resilience in the European hotel, restaurant and catering industries.
Speaker: Geert Coremans, CPP, Director of Global Safety and Security, Radisson Hotel Group Corporate Support Office, BE
Only available for leadership pass holders – register now
The ASIS Europe 2019 venue and dates were confirmed long before Article 50 was signed, so it is by coincidence the event concludes on the date planned as “Brexit Day”. This session has been scheduled to address the latest developments and update attendees on how businesses are assessing the situation and preparing contingency plans (or not). With expert insight from BCI surveys, we will explore how management and business continuity planning may impact the security and risk outlook for businesses.
Speaker: Rachael Elliott, Leader Thought Leadership Team, Business Continuity Institute, UK
Only available for leadership pass holders – register now
All leadership and professional pass holders for Friday are invited to join us for this concluding session. Purchase your pass now
Digital transformation is today’s hottest business topic. Companies of all sizes across many sectors are seeking ways to leverage new technology. So how do security practitioners get involved without drowning in buzzword soup? And how do you support innovation whilst also supporting good security practice?
Digital transformation requires us to look at business models, roles, and tools, in different ways. Some companies are focused on efficiency or incremental process gains, whilst others are completely re-inventing their business models and creating new ways to engage with customers.
Often, debate on digital transformation is polarised between utopian visions of a world full of convenient, personalised services and dystopian visions of mass unemployment, catastrophic cyberattacks and malicious AI. So, this session has been designed by ASIS to get a grip on core issues facing security professionals and identify key opportunities to advance, and key areas of concern.
Practically speaking, already many systems that traditionally had their primary function as security can now be leveraged for different purposes. For example; IP cameras generate business insights in retail, or traffic management in a smart city; risk assessment data can be packaged and re-sold as intelligence; access control provides insights for building management etc.
So how do we capitalise on digital opportunities? And how do we do it safely, securely and profitably?
After a short scene-setting presentation by Michael Gips, CPP, Chief Global Knowledge Officer, ASIS International, we will use live-polling and the expert facilitation skills of Prof. Martin Gill, Managing Director, Perpetuity Research to guide us through an interactive discussion and lively ideas exchange.
If you’re advanced on your digital journey, please join us to share and benchmark – and if you’re setting out, this is a great opportunity to learn from firsthand experience.
Recent incidents provide disturbing evidence of the stark vulnerabilities of Industrial Control Systems (ICS) to natural, human-factor accidental, and malicious threats.
This presentation includes numerous current, high-profile examples of ICS threats, vulnerabilities, and the severe consequences of such incidents. The presentation will help you learn and understand:
• What ICS includes;
• Where ICS can be found;
• Potential threats and vulnerabilities to and from ICS;
• Why ICS assets are critical to enterprise, business, operations, and mission objectives;
• How to take a proactive, protective systematic management approach to identify and protect the enterprise.
This presentation provides a wake-up call to everyone who manages or is responsible for critical ICS assets and their architectures, systems, facilities and infrastructure due diligence.
Speaker: Michael Bilney, Global Senior Principal – Asset Risk and Resilience, Cardno
Only available for leadership pass holders – register now
GDPR will have been in force for almost a year by the time ASIS Europe 2019 takes place. This session will take a look back at relevant case studies, analyse incidents and address myths around this complex legislation. Ady van Nieuwenhuizen, expert privacy lawyer will guide the discussion with insights from security leaders to frame key issues. We will highlight and address several key challenges for security practitioners.
Know Who You Hire – the Challenge of Vetting Just Gets Harder
Presented by Gilad Solnik, CPP, PSP, Director, Security and Loss Prevention, EMEA, Global Security Operations (GSO), Amazon
Ensuring the safety and security of your employees, company information, and business operations is essential for any modern business. Therefore, knowing who you’re hiring into your organisation is essential. Pre-employment screening measures are aimed at ensuring a safe and secure work environment while setting a foundation for good personnel security (Cpni.gov.uk, 2015). This discussion reviews the how privacy and data protection initiatives and the GDPR has introduced new challenges and restrictions on vetting and pre-employment background checks, and will provide an exchange of potential practical solutions.
Storing CCTV Footage Securely – Reassessing the Criticality of Servers
Presented by Henk Marsman, Lead Product Manager Identity and Access Management, Rabobank, NL
Since the adoption of GDPR CCTV data has become distinctly privacy sensitive. Subsequently, the criticality of systems storing CCTV data was revised (and increased), and access control measures need to be adapted accordingly. This impacted the governance of access to these systems, the periodical reviews on access, and the actual control measures in place for these systems.
This discussion will cover key questions security professionals should address when considering access to such systems post GDPR.
Only available for leadership pass holders – register now
Managing identies and access for employees has significant different characteristics than that of customers. In many organizations these two are separately handled. With the rise of connected devices, ranging from small to large in size, it becomes less obvious to separate management of these two populations. Or in other words, there are new ways to combine the management of identities and access of employees and customers.
This presentation will cover the similarities and differences between identity and access management (IAM) of employees and customers. We will then discuss the impact of connected devices for the user and for IAM solutions.
Speaker: Henk Marsman, Lead Product Manager Identity And Access Management, Rabobank, NL
Only available for leadership pass holders – register now
This scenario-based 90-minute workshop will take you through a Red Teaming exercise focused on identifying adversaries’ methods of operation to target the logical, physical and human gate of the organization. Red teaming, as part of a proactive security cycle, is an effective operational intelligence tool. It also helps to create awareness and need for the implementation of a program with counter measures. By discussing the necessary awareness and necessary response to cyber, physical and human related threats the workshop introduces the participants to a method of response preventing unnecessary victims. Awareness is the key word. At the end of this session participants will understand the potential “external” and “internal” threat, why it appears, and what counter measures are effective.
Speaker: Berndt Rif, CPP, PCI, Chief Security Officer, Ministry of Health, Welfare and Sport, NL
Only available for leadership pass holders – register now
This session will take the form of a role-play training exercise where participants will be assigned into teams to address one of 5 security risk concerns from company executives.
Note – this exercise is in how to present the solution, not in judging the solution itself. Teams will be given a template PPT to create an executive presentation to propose a program based on the risk concern of a “company executive”.
ESRM experts will engage teams in conversations about the approaches to executive presentations.
Teams will present their proposals to the “Executive Council” and will receive feedback on their presentation and engagement.
Important: participants should attend the prior “Engaging Business Executives in ESRM” session as preparation for the exercise.
This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.
Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment
Volker Wagner, Vice President Security, BASF Group
Mike Gips, CPP, Chief Global Knowledge & Learning Officer, ASIS International
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs
Mark Schreiber, Principal Consultant , Safeguards Consulting, Inc., US
Only available for leadership pass holders – register now
Info-centric Crisis-management is a new way of thinking within one of the biggest corporate banks in the Netherlands. This ‘idea’ is about creating a new system for Crisis-management where we combine internal and external data sources to act in an early stage when a possible crisis is in sight. This system combines data with roles and responsibilities for those who have to act during a crisis. The system provides an automated choice for a certain scenario. The main goal is to act faster, and creating a Common Operational Picture (COP) and possibly to act before a crisis is hits.
Speaker: Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL
Only available for professional and leadership pass holders – register now
A clear understanding of security risk allows suitable control measures to be selected. This presentation will use several case studies to show how to blend physical, technical and procedural controls to safeguard the built environment and its assets.
The presentation will also highlight the risks of taking the “tick box approach” to security design.
Speaker: Christopher Aldous, CPP, PSP, Director, Design Security Ltd, and Board Director, ASIS International UK Chapter, UK
Only available for professional and leadership pass holders – register now
Learn about a new, practical and easy to understand maturity model that can be implemented in hours rather than days.
What is your current security capability? How do you compare yourself against industry benchmarks? And where do you need to focus your efforts?
Maturity models aim to answer those questions and more, but unfortunately, most of them require expensive consultancy to implement and are often far too academic.
A more practical approach is clearly needed. This presentation is going to give you a maturity model that can be easily implemented in hours rather than days. A clear and visual way to easily understand the maturity of all areas of your security organization. You can now derive a clear roadmap that tells a compelling story and will help you obtain the necessary leadership buy in and additional resources for your program.
Speaker: Heimo Grasser, CPP, Senior Security Manager MEA, Medtronic, UAE
Only available for professional and leadership pass holders – register now
The talk will focus on ENISA's efforts to promote IoT cybersecurity by proposing baseline IoT security measures complemented with sectorial vertical studies that look into IoT security in particular sectors, e.g. Industry 4.0, automotive.
ENISA has been working with stakeholders across the board to address the many challenges of IoT security. ENISA advocates for a risk-based and context-based approach that looks into the particularities of sectorial IoT deployments and proposes specific security measures to address relevant risks. In parallel, understanding the ecosystem nature of IoT and the interdependencies, baseline IoT security recommendations have been proposed by ENISA to facilitate security interoperability in a horizontal manner. The talk will discuss related efforts and activities of ENISA and ways the community can engage with the Agency to further improve IoT cybersecurity.
Speaker: Apostolos Malatras, Expert in Network and Information Security, European Network and Information Security Agency, GR
Only available for professional and leadership pass holders – register now
This condensed, fast-paced briefing offers a future-oriented look on terrorism trends in Europe for the coming year, and Jihadi extremist activity in particular. Anchored in an analysis of the latest developments in Q4 2018 and Q1 2019, the presentation will use several perspectives to outline key concerns for the remainder of 2019. This will include consideration of the likely effects of several general elections, international events, upcoming terrorism trials, select migration developments, and Brexit on the terrorist threat in a range of European countries. The update will conclude with an update on newly evolving CT best practices among security departments of large corporations.
Speaker: Glenn Schoen, CEO, [email protected], NL
Only available for professional and leadership pass holders – register now
For organisations whose employees undertake regular travel, Duty of Care is an important concern. In addition, multiple regulators oblige organisations to ensure reasonable travel security for employees. Travel Risk Management (TRM) assesses risk and provides security to staff. However there are no rules, or internationally recognised Codes of Practice, that indicate what should actually be done in order to be compliant.
ISO (International Organisation for Standardisation) has begun developing a standard which will resolve doubts and provide guidance, ISO 31030. ASIS is playing an active role in this.
Learn about work in progress and how you can have your say to ensure that the voice of the Security Profession is heard and acted upon.
Coordinating speaker: Roger Warwick, CPP. CEO of Pyramid Temi Group (Travel Risk Management), Member of ISO 31030 technical committee, Member of ASIS Commission on Standards & Guidelines
Speaker: Werner Cooreman, CPP PSP, CSO Solvay Group, Vice-Chair of ASIS Commission on Standards & Guidelines, ASIS Liaison to ISO 31030 technical comittee
The travel sharing economy, which comprises services such as ride-sharing and house-sharing, has quite literally taken off around the world. Ease of accessibility and use while mobile means non-traditional ground transport and accommodation services are increasingly being used by business travellers. Despite the popularity, only 14 % of organisations surveyed by Ipsos MORI and International SOS* have integrated this in their travel policy. Have you? Join this innovation track to understand the benefits, risks and legal considerations of incorporating share economy services into your business travel policies and how best to do so within a travel risk management framework.
* Business resilience. Trends Watch 2019; Ipsos MORI & International SOS; October 2018.
In October 2018, Ipsos MORI conducted a global survey targeted to those who organise, influence, or are responsible for, their organisation’s travel and risk mitigation policies. These survey findings represent responses from 640 people, across all types of organisations which have had previous contact relating to business travel health and security with International SOS, in 82 countries.
Speaker: Xavier Carn, Vice-President Security EMEA and Medaire, International SOS & Control Risks
How close cooperation between corporate insurance and corporate security departments will make the management of security risks more effective and efficient.
There is common agreement among security and insurance professionals that security incidents are increasingly complex and global. Traditional insurance vehicles help indemnify the damage from such incidents. But to be able to successfully manage the velocity of security incidents anywhere around the world, companies require a level of expertise at immediate global readiness that companies realistically can’t maintain in-house.
The insurance industry has responded to this need for 'anywhere and anytime' immediate expert support, with a new insurance concept: Insurance as a Service. This new trend implies that security professionals and insurance professionals with their expertise and products are playing both an increasingly crucial role in ensuring the success in security incident response and related insurances.
In this inter-active workshop attendees will develop insight in the interplay between insurance and security and will walk away with practical tips on what to discuss with insurance professionals when purchasing insurance as a service.
Speakers:
Stefan Sievers, Head of Business Development Special Risks Europe, Hiscox
Jeroen Meijer, Senior Partner, Control Risks Group
What happens when we as individuals can not trust media in the same way we used to? Misleading media information during the attacks on Westgate Mall in Kenya, Drottninggatan in Stockholm and the Armed Conflict in Donbass Ukraine led to severe consequences. Social media as well as the increased commercialization and politization of traditional media present challenges to individuals and organizations. But this also present opportunities for actors in the security sphere and elsewhere.
Speaker: Johan Tinnerholm, COO, Global Warning System
Many of the changes the IT industry currently is undergoing are also deeply affecting the Access Control industry. These overall trends towards integrating mobile devices for daily use and the support of cloud infrastructure are changing the way how Access control is used and operated. This is also bringing new challenges for system supplier as well as customers when it comes to Cyber Security and GDPR compliance. More than ever solutions require to be designed for this environment and users have to be aware of their advantages but also exposures when it comes to managing their security, organization and personnel
Speaker: Thomas Herling, Senior Vice President Global Business Owner Electronic Access and Data, Dormakaba
Increasing complexity and continuous change of IT environments challenge organizations to gain transparency on their cyber security. The Cyber Security Maturity Assessment supports with a unique method to measure the maturity and effectiveness of cyber security measures and results are documented using the Cyber Security Maturity Cockpit. In addition it provides an overview of the cost-value ratio of identified measures based on ISO/IEC 27001. By creating transparency the Cyber Security Maturity Assessment enables decision-makers to take the right decisions for optimal use of human and monetary resources and to strengthen the cyber security resilience of the organization following a holistic approach.
CSMA enables organizations to answer questions like:
- What do we in relation to cyber security?
- How good are we with what we are doing?
- What does it cost?
Speaker: Christoph Hagenbuch, Cyber Security Manager, innogy SE
Many enterprises have large corporate campuses where hundreds or thousands of employees work at various sites around the world. These sites are complex environments, characterized as open and minimally staffed by security resources. Given this, they are notoriously difficult to protect and vulnerable to active assailant and terrorist threats as evidenced by the recent attack on YouTube’s corporate headquarters in San Francisco, CA. Our universities around the world share similar attributes and have been investing in cutting-edge technology to help protect their staff and students. Attend this session to learn about their transformative advancements and fulfill your duty of care to your employees.
Speaker: Les Allan, Director of SafeGuarding & Logistics Services, Heriot-Watt University
Everyone wants great vendor relationships based on long-term productive partnering, mutual business goals, and trust. Easy to say but how easy to achieve? Going from A-Z, including embedded vendor staff to complete outsourcing the presentation will highlight how its done and what makes lasting relationships more than just saying win-win.
Speaker: Andy Williams, CPP, VP Business Development, Safe Hotels Alliance
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc.
We will analyse VS for ships and explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use, and what features a camera station must have to be installed on a ship and so on.
Speaker: Alessandro Franchini, Marketing & Communication Manager, Videotec
Diversity is a prominent challenge facing businesses today. Diversity has to be part of a company’s DNA – and it has to work as part of a company’s overall desire to hire the best possible people. Research shows that diversity makes workplaces more effective and efficient, plus a diverse workplace also promotes a company’s ability to adapt to any situation. In the panel, experienced security professionals from different countries and backgrounds will share their challenges and success stories. Furthermore, they will discuss diversity perspectives, experiences and skill sets that seem to be invaluable to the success of talent and to support modern business leaders.
Moderator: Alexander Zippel, CPP, Corporate Security, Deutsche Post DHL Group
Panellists include Christina Duffey, CPP, 2019 ASIS International President, Senior Vice President and Regional Director, SOS Security, Letitia Emeana, CPP, PSP, EMEA Snr Security Manager, Tesla, Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, and Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL
Are we guilty of cloning security specialists? Young professionals entering the security industry may increasingly be the answer to changing the face of the sector.
The operational cog which turns the mechanism of the security industry is routinely led by the 'Grey, Pale and Male' from society. With the guidance of experienced security professionals, ASIS strives to bring through young professionals to the fore of the sector, which is spearheaded by James Morris in the UK. No less does David Clark, UK Chair of ASIS, hold this belief. He argues that we should not 'clone' our predecessors, but rather we should nurture younger professionals into a 'security culture'. Indeed, just as security is modernising and evolving into new frontiers such as cybersecurity and artificial intelligence, so too should the personnel who are increasingly managing it.
Speakers:
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Leo Kelly, Security and Risk Management Analyst, Francis Crick Institute, UK
James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK
Learn about ASIS’s newest certification program: the Associate Protection Professional (APP). The APP has been developed for security management professionals who are just starting their security career. To be eligible to sit for the APP exam you need 1-4 years of experience (depending on your educational history). During this session, the ASIS Certification Director will be there to answer your questions about this exciting new program.
Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International
Security professionals must have strong interpersonal skills, including negotiation, leadership, and team-building strengths, to successfully collaborate and engage employees in a security risk management strategy against all security threats.
In response to these new demands, IE Business School has created this Program in partnership with ASIS International, through which you will be able to (among other learnings):
• Enhance business acumen and effectiveness
• Develop a strategic understanding, anticipatory and critical thinking.
• Become effective leaders and better decision-makers
• Develop communication and negotiation skills for persuasive influencing.
Speaker: Almudena Diaz Vidal, Associate Director Executive Education, IE Business School