Critical Learning for Security Professionals

ASIS Europe 2023 offers multiple tracks of valuable learning opportunities as well as networking and connection sessions – onsite and online. Our programme format is focused on discussion, debate, collaborative learning, and lots of networking time.

Programme Highlights

DigitalEurope_picktopolish-63

Opening Keynote

Cecilia Bonefeld-Dahl, Director General of DIGITALEUROPE will open the conference on 22 March.

_PGP7254 Europol Catherine de Bolle resized

Keynote 23 March

Catherine de Bolle, Executive Director

of Europol, will cover today’s hybrid threats, the new and diversified skillset required to adequately respond to them, and the opportunities of public-private partnerships.

Mastercard

1 year after: what have we learnt from the Russia/Ukraine Crisis?

Sonia Neffati, Regional Chief Security Officer, Europe, Mastercard

and Raphael Marquegnies, Regional Security Officer, Security Operations Europe, Mastercard

egis

Using security incidents to help you build a sustainable security approach

Isabelle Claes, CPP, Security & Crisis Manager, Egis Group

and Aurélien Lambert, Chief Security Officer, Egis Group

ArcelorMittal

Promoting Security Culture – A Case Study from a leading Steel & Mining company

Lee Pokorski, Head Group Risk and Security, ArcelorMittal

and Ankur Mathur, Group Security Supervisor, ArcelorMittal

Tuesday 21 March 2023

Wednesday 22 March 2023

08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
08:15
08:45
09:15
09:45
10:15
10:45
11:15
11:45
12:15
12:45
13:15
13:45
14:15
14:45
15:15
15:45
16:15
16:45
17:15
17:45
18:15
Leadership Track 1
Leadership Track 1
Leadership Track 1
Women in Security Breakfast
08:15 - 08:55
Women in Security Breakfast

Opening Session + Keynote : DIGITAL EUROPE
09:00 - 10:00
Opening Session + Keynote : DIGITAL EUROPE

Keynote speaker:
Cecilia Bonefeld-Dahl, Director General of DIGITALEUROPE

Networking Break
10:00 - 10:45
Networking Break

Cyber Security Essentials for Physical Security & Business Managers: Key Questions to Ask
10:45 - 11:30
Cyber Security Essentials for Physical Security & Business Managers: Key Questions to Ask

Cyber-attacks happen to the best. Organisations no longer just ‘throw the cyber challenge over the wall’, so the IT and/or IT Security department can deal with it. Physical Security professionals need to understand how they can optimally contribute, particularly in context of physically protecting on-premises IT equipment, and in relation to IoT devices. Other business managers must be able to assist in assessing Cyber Risk in terms of reputational, financial and operational impacts.

In this session, the Facilitator will be demystifying aspects such as:
• the discrepancy between Cyber and Information Security
• why Cloud is not the ‘be all and end all’
• the changing nature of Cyber Insurance
• how to handle bedazzling Cyber ‘lingo’ including ISO 27001

Speakers:
Rinske Geerlings, Managing Director, Business As Usual
PROF.MR.DR.IR. SICCO SANTEMA, Professor of Networked Innovation, University of Technology, Delft (the Netherlands)

When Security Becomes Enterprise Risk Management Reality
11:35 - 12:20
When Security Becomes Enterprise Risk Management Reality

CSOs and physical security professionals are looking more and more at how to get security and their function recognized at a C-Suite ERM level. Wanting to move from being seen as a cost or minimum requirement, to becoming a risk management function integral to the business.

A path to this is through understanding company structures, Annual Reports, Risk Registers, regulatory ERM requirements, benchmarking, and what a company does and does not commit to with regard to security as an ERM Principal Risk Mitigation Measure.

Through the reality of a high-profile civil lawsuit against a Fortune 100 company in which the presenter went from defending corporates in ERM cases to prosecuting as the Expert Witness, this path will be revealed.

Speaker: Andy Williams, Director, Crilly Consulting Ltd

Networking Lunch
12:20 - 13:30
Networking Lunch

Cyber-Physical Security During Geopolitical Conflict
13:30 - 14:15
Cyber-Physical Security During Geopolitical Conflict

Events in the physical world can have a crippling impact on IT and critical infrastructure systems – and attacks on systems outside your control can have implications for your enterprise. Join cyber & dark web SME Nate Green for an interactive session focused on lessons learned from case studies in cyber-physical convergence, including a focus on the enterprise security impact of geopolitical conflicts and events.

Speaker: Nathan Green, Senior SME, Cyber Risk, Dataminr

Are we Protecting the Right Things?
14:20 - 15:05
Are we Protecting the Right Things?

In general, asset protection describes measures designed to ensure safeguarding of people, assets and information for any non-market related threats. In our attempt to implement those measures we are focusing on obvious threats missing the ones which are falling in between physical and information security controls. In this session discussion will be about those threats and what does it take to address them properly.

Speaker: Aleksandar Jakovljevic, Director, Head of Physical Security, Telenor ASA

Networking Break
15:05 - 15:50
Networking Break

Presenting Intelligence to Senior Business Leaders
15:50 - 16:35
Presenting Intelligence to Senior Business Leaders

Geopolitical risks and high-magnitude global security risks are of increasing importance to non-security stakeholders and Corporate security teams face particular challenges amid wider economic headwinds of budget cuts at a time when they can add real value to senior decision-making – how they can use intelligence to demonstrate business value beyond protection and crisis management ?

This session will look at:

- the opportunities and risks for security leaders in adding value to the enterprise in a briefing on issues of wider strategic significance to boards
- Lessons learned from the security and intelligence leaders that are successfully engaging senior non-security stakeholders
- Opportunities for CSOs to position security as a strategic business enabler as well as an operational one

Speaker: Henry Wilkinson, Chief Intelligence Officer, Dragonfly

Red Teaming: The Key to Effective Security
16:40 - 17:25
Red Teaming: The Key to Effective Security

The failure to predict is a failure to protect. Simulation of aggressors' modus operandi through proper Red Teaming pushes the limits of what security operations think is possible and illuminates vulnerabilities. Red Teams create security innovation and truly proactive security operations. Designing and maintaining an effective Red Teaming program is the must-have component of any security operation, regardless of size and risk profile. This session will provide a detailed overview of an advanced red teaming program, application, and red teams' impact via case studies, standard processes, methods, team composition, and methodology to execute and manage effective red teams and red teaming programs.

Speaker: Michael Rozin, President, Rozin Security Consulting LLC

Refresh & Reconnect
17:25 - 18:00
Refresh & Reconnect

Leadership Track 2
Leadership Track 2
Leadership Track 2
Networking Break
10:00 - 10:45
Networking Break

Rethinking Resilience in the Permacrisis Era
10:45 - 11:30
Rethinking Resilience in the Permacrisis Era

A constant crisis mode seems to be the New Normal: Political conflicts, supply chain disruptions, climate change risk and economic crises are now challenging businesses in addition to ever-growing threats like cyber-attacks. Is your organization prepared for this change in paradigm?

In the past, when crises were rare events, we usually had at least some time to learn and prepare for the next crisis – but now that we are facing crises more frequently and even simultaneously how does it impact your approach to crisis preparedness?

Are high-risk areas really identified and minimized with justifiable financial or procedural effort? Are we building luxury continuity measures because we are totally shocked by these constant crises, or should we work together in a more coordinated way in the areas of risk, crisis and BCM and thus achieve better results for the company?

At the end of the day, one thing is very clear: the more resilient your organization is, the better your chances of surviving and succeeding in these disruptive times. Let’s discuss what this means for you and how to ensure that resilience is a competitive advantage for your organization.

Speaker: Markus Epner, Head of Academy, F24 AG

Using security incidents to help you build a sustainable security approach
11:35 - 12:20
Using security incidents to help you build a sustainable security approach

Security professionals unfortunately experience that it very often takes an incident (sometimes several) to be able to move security forward in an organization. The incident allows us to identify weaknesses that were overlooked, to reveal the practices that are not aligned with the company policies, etc.

Improving security, re-aligning with policies and best practices, is critical after an incident. However, it sometimes takes a huge effort and isn’t always fully successful.

What could an organization do to ensure the appropriate level of protection is implemented and to prevent other incidents from happening?

Based on real-life cases, this interactive session will focus on sharing practical experiences on how to concretely improve the security approach within an organisation after an incident.

Speakers:
Isabelle Claes, CPP, Security & Crisis Manager, Egis Group
Aurelien Lambert, Chief Security Officer, Egis Group

Networking Lunch
12:20 - 13:30
Networking Lunch

Networking Lunch
12:20 - 13:30
Networking Lunch

The New Era of Supply Chain Resilience – Anticipating Key Drivers and Developments
13:30 - 14:15
The New Era of Supply Chain Resilience – Anticipating Key Drivers and Developments

Supply chain risk management and resilience must be key focus areas for all businesses as it has become increasingly important. Rising supply chain complexity brings with it more potential failure points and consequently higher levels of risk. Dropping economies, surging energy prices, severe material shortages, and returning COVID-19 outbreaks compounded risk to cause major supply chain disruptions over the past twelve months across the globe. To achieve resilient supply chains, this session will highlight clear win-win scenarios from a business risk management perspective, it provides industry insights to existing challenges and future key drivers. It will provide practical guidance to strategically identify, measure, and manage key supply chain risks and processes, improve resilience, and add value to your business.

Speaker: Alexander Zippel, Senior Global Security & BCM Operations Manager, DHL Supply Chain

Ukraine – Local Insights and Updates
14:20 - 15:05
Ukraine – Local Insights and Updates

This session content will be defined nearer to the event based on developments in the months ahead.

Session leader: Mykola Mikheiev, ASIS Ukraine Chapter Chair

Networking Break
15:05 - 15:50
Networking Break

1 Year After: What Have we Learnt from the Russia/Ukraine Crisis?
15:50 - 16:35
1 Year After: What Have we Learnt from the Russia/Ukraine Crisis?

Russia’s invasion of Ukraine has plunged Ukraine into its deepest crisis in the past century. Mastercard’s people and business have been directly impacted by this conflict, and our global team stepped up to protect and support our staff and their families.

Since the start of the invasion, our teams continue to support our people and focus on the safety and well-being of our employees and their families.

Three years of managing the COVID-19 pandemic followed by the Russia/Ukraine war has proven that companies must be equipped to face unprecedent crises to be able to survive. When adapting ourselves to this new reality, agility and preparedness must be deeply integrated in any company’s DNA.

Speakers:
Sonia Neffati, Regional Chief Security Officer, Europe, Mastercard
Raphael Marquegnies, Regional Security Officer, Security Operations Europe, Mastercard

The Spooks are Back in Town: The Return of Espionage and Sabotage as Corporate Crisis Drivers in the Slipstream of the Ukraine Conflict
16:40 - 17:25
The Spooks are Back in Town: The Return of Espionage and Sabotage as Corporate Crisis Drivers in the Slipstream of the Ukraine Conflict

Looking well beyond the September 2022 Nord Stream gas pipeline attacks, this presentation will focus on how a series of corporate crises caused by espionage and sabotage operations in Europe in Q3 and Q4 of 2022 all believed tied to the Ukraine conflict have brought about a profound new understanding of the requirements for corporate crisis preparedness in these areas.

The presentation will examine these threats' impacts on risk appreciation, crisis preparedness and crisis management, with learnings derived from different - mostly hidden - recent crises in Europe offering the audience key insights on addressing them. This will cover both internal and external security and crisis control do's and don'ts, including interaction with national security agencies.

Speaker: Glenn Schoen, CEO, [email protected] B.V.

Refresh & Reconnect
17:25 - 18:00
Refresh & Reconnect

Leadership Track 3
Leadership Track 3
Leadership Track 3
Networking Break
10:00 - 10:45
Networking Break

Workshop: Geopolitical tensions – business & security consequences
10:45 - 12:20
Workshop: Geopolitical tensions – business & security consequences

More information soon

Networking Lunch
12:20 - 13:30
Networking Lunch

Workshop: Guarding Procurement – Collective Solutions to an Industry Challenge
13:30 - 15:05
Workshop: Guarding Procurement – Collective Solutions to an Industry Challenge

This interactive workshop will address the challenges of sourcing, selecting and contracting guarding services. It will explore perspectives from both the buyers’ and providers’ perspective, promote discussion and gather insights from the audience on how to address shared challenges.

Speakers have been invited, more information to follow soon.

Networking Break
15:05 - 15:50
Networking Break

Workshop: Security Dilemmas
15:50 - 17:25
Workshop: Security Dilemmas

Bestseller, Danish MOFA, Control Risks, Maersk Oil, European Central Bank and EY I will share some of the takeaways from very different organisations and circumstances. From 3 of these organisations, I will share real life situations with the participants, and they will in each case discuss in groups how they would react to those situations. After each, I will share what actually happened and what could be learned from the outcome.

Speaker: Bruno Kalhoj, Security Director, EY

Refresh & Reconnect
17:25 - 18:00
Refresh & Reconnect

Innovation Track
Innovation Track
Innovation Track
Innovation Session
09:00 - 09:20
Innovation Session

Innovation Session
09:25 - 09:45
Innovation Session

Ukraine - Public War, Private Intelligence: How organizations are informed and protected by open-source intelligence (OSINT)
09:50 - 10:10
Ukraine - Public War, Private Intelligence: How organizations are informed and protected by open-source intelligence (OSINT)

To excel in intelligence analysis, organizations must ensure that their outputs are timely, accurate, and relevant. The Ukraine conflict has shown the vital imperative of delivering the best possible information to protect lives in Ukraine, as well as to enable decision-makers to make the right strategic decisions. The conflict has also presented new challenges in the harvesting and analysis of open-source data. Issues include the quantity and diversity of different media, the degrees of misinformation, disinformation, and operational security, and the human dimension of an industrial state-on-state war.

This presentation will consider the lessons learned so far from this conflict, and the challenges of open-source intelligence analysis, through the perspectives of timeliness, accuracy, and relevance of information. Using recent examples, the presentation will demonstrate the additional challenges that this conflict raises in managing information from data sources to clients.

Speaker: Chris Clough, Senior Intelligence Analyst, Crisis24

The Cassandra Effect: Ensuring forecasting techniques add value to intelligence analysis
10:45 - 11:05
The Cassandra Effect: Ensuring forecasting techniques add value to intelligence analysis

In this session, Andrew Devereux, Risk Intelligence Manager at Healix, will discuss how forward looking analytical techniques are an essential component of the analyst’s toolset, enabling better decision making at the tactical, operational and strategic levels. Andrew will discuss the distinctions between indicators and scenarios, and cover a range of the most commonly used analytical techniques that can help identify driving forces of risk and imagining how these might play out.

Speaker: Andrew Devereux, Risk Intelligence Manager, Healix

Reserved for Nimo Drone Security
11:10 - 11:30
Reserved for Nimo Drone Security

Crucial Trends to Build Organisational Resilience in 2023
11:35 - 11:55
Crucial Trends to Build Organisational Resilience in 2023

Organisational resilience remains a strategic imperative, growing in importance as businesses face threats from cybercrime, climate change, severe weather and political instabilities. CSOs must not only protect their employees but also position the organisation itself to remain resilient. Learn real-world advice, first-hand insights on the challenges we face and share strategies on how we can overcome them.

Discussion topics include:
• Best practices and lessons learned in developing a robust and reliable resilience plan
• New perspectives of organisational resilience and business continuity in a hybrid working environment
• The complex process of enhancing/connecting digital and physical security and safety throughout your business

Speaker: Tracy Reinhold, CSO, Everbridge

Getting in Front of Threats & Risks: Augmented Analytics as a Force Multiplier
12:00 - 12:20
Getting in Front of Threats & Risks: Augmented Analytics as a Force Multiplier

This session is going to cover the topic of augmented analytics; specifically how it is changing how security, risk and intelligence professionals navigate the geopolitical threat and risk environment. Instead of living in a world where leaders must react in real-time to the disruption around them, augmented analytics empowers more proactive, effective decision-making thanks to in-depth analysis, layered data sets, real-time information, and forecasts of future risks. By combining the expertise of world class analysts with the power of artificial intelligence and open-source intelligence, users are able to uncover insights on a scale and depth never before seen possible, revealing knowledge they might not see otherwise.

This session will bring augmented analytics to life by providing case studies of how security and intelligence professionals have used augmented analytics to make smarter, more efficient decisions that enable their organizations to get ahead of disruption.

Speaker: Allison Wood, Global Head of Intelligence, Seerist

Reserved for F24
13:30 - 13:50
Reserved for F24

Protective Intelligence
13:55 - 14:15
Protective Intelligence

In this era of information explosion following the massive increase in social media, it's becoming clearer that covering only geopolitical security threats is not enough for the protection of business interests. Protective Intelligence is a client-centered form of online intelligence that uses robust OSINT methodologies to find physical, cyber, and reputational threats in the clear, deep and dark web, by analyzing vast amounts of data and highlighting key points that are relevant to the asset in question (person, brand or physical location).

In this presentation, we will discuss the importance of Protective Intelligence solution, from information collection, to analysis, and to the production of relevant reports. Specifically, the presentation will look at key methodologies of intelligence, passive and active intelligence, finding and analyzing highly target-specific threats, and which reports to prepare to best present the findings. We will also explain some key examples to illustrate the focus and capabilities of this cutting-edge intelligence approach.

Speaker: Ori Mor, MAX Security

Innovation Session
14:20 - 14:40
Innovation Session

Modern Surveillance Technology Workshop
14:20 - 15:05
Modern Surveillance Technology Workshop

An interesting and informative session, looking at modern surveillance technology, how it is applied and deployed and how it works. The session will feature a review of the most modern types of surveillance technology that utilise the Internet and cellular networks to transmit video and audio information. We will demonstrate several types of surveillance device and show them working in real world scenarios. Including Wi-Fi and Cellular store and forward systems, sophisticated burst transmission radio bugs, solid-state recording devices and sensitive microphones embedded into everyday items.

The audience will be able to view the devices, see them working and have time for questions and answers during the presentation.

Speaker: Jason Dibley, Technical Director, QCC Global Ltd

Innovation Session
15:50 - 16:10
Innovation Session

When Ransomware Meets Internet of Things
15:50 - 16:10
When Ransomware Meets Internet of Things

Ransomware is one of the biggest cybersecurity threat. More than 80% of cyber incidents have financial motivation. In this session we will discuss the next-generation ransomware that can leverage exposed IoT vulnerable devices, such as an IP video camera, access controller, or network-attached storage (NAS) device, as the initial access point to the network. It then holds OT devices hostage, thus adding another layer of extortion to an attack campaign. This new attack vector that is predicted to be the next step in ransomware evolution, will impact all IoT (including IoMT), IT, and OT devices, causing physical disruption of business operations.

Speaker: Elisa Costante, VP of Threat Research, Forescout

Security Culture
16:15 - 16:35
Security Culture

Speaker: Jelle Wieringa, Security Awareness Advocate for EMEA, KnowBe4

Applying Geospatial Intelligence for Site Security – From Global to Local to Tactical
16:40 - 17:00
Applying Geospatial Intelligence for Site Security – From Global to Local to Tactical

Join subject matter and industry experts from Esri as they explain how to integrate critical data and information feeds with Geographical Information System technology to support site security, employee/citizen safety, threat analysis, investigations, event management, and tactical response. Learn how mapping applications, data, and tradecraft come together to help users mitigate, respond to, and recover from crime, threats, and hazards from local to global levels in a secure and interoperable environment.

Whether protecting your personnel, one facility or a global network of physical assets – discover why location intelligence is the proven platform that can unify this complex mission.

Speakers:

Carl Walter, Global Director - Homeland and Corporate Security Solutions, Esri
Kevin Armstrong, GSI Solutions Engineer, Esri

Your responsibility to keep your security systems cyber resilient: need for frequent pentesting
17:05 - 17:25
Your responsibility to keep your security systems cyber resilient: need for frequent pentesting

Speaker to be confirmed

19:00
20:00
21:00
22:00
Security Leaders Networking Dinner
19:30 - 22:00
Security Leaders Networking Dinner

Formerly called President’s Reception.

Tickets are required for this function (included in Leadership All Access ticket).

Thursday 23 March 2023

08:15
08:45
09:15
09:45
10:15
10:45
11:15
11:45
12:15
12:45
13:15
13:45
14:15
14:45
15:15
15:45
16:15
Leadership Track 1
Leadership Track 1
Leadership Track 1
Member Townhall - open to all members
08:15 - 08:55
Member Townhall - open to all members

Opening Keynote 2 - EUROPOL
09:00 - 09:45
Opening Keynote 2 - EUROPOL

The Executive Director of Europol, Catherine De Bolle, will cover today’s hybrid threats, the new and diversified skillset required to adequately respond to them, and the opportunities of public-private partnerships.

Responding to Complex Crises – the importance of a blended approach in differing operational contexts
09:50 - 10:35
Responding to Complex Crises – the importance of a blended approach in differing operational contexts

In this session we will discuss how operational, logistical, security and medical services have needed to work together in response to some of the most complex and demanding crises in the 21st century, Yemen, Afghanistan and Ukraine. Dr Finn Morgan (Healix Group Medical Director) and David Geddes (Director of Security) will outline the challenges involved and the considerations and recommendations for delivering a multi-disciplinary approach.

Speaker: Dr Finn Morgan, Group Medical Director, Healix

Networking Break - sponsored by AlertEnterprise
10:35 - 11:20
Networking Break - sponsored by AlertEnterprise

Human & Machine: What role does AI play for tactical intel in response operations?
11:20 - 12:05
Human & Machine: What role does AI play for tactical intel in response operations?

Speakers:

Matteo Grella, Head of Research & Artificial Intelligence, EXOP, IT, Crisis24
Julian Hafensteiner, Head of Operations, Crisis24 DACH

Complications of Corporate Evacuations
12:10 - 12:55
Complications of Corporate Evacuations

Evacuation is a term that harbours fear and dread with the thought about what and how and even where to go. Shaun will discuss the complications of corporate evacuations from hazardous environments and will analyse some of the ideas based on real life incidents as to how to assist to make first of all the difficult decision to go and then how to go as quickly and as safely as possible.

Speaker: Shaun Boulter, Global Head Operations & Security – Corporate Mobility , AXA Partners UK

Networking Lunch
12:55 - 14:00
Networking Lunch

Leadership session - more information soon
14:00 - 14:45
Leadership session - more information soon

Closing Session - Led by ASIS NextGen
14:50 - 15:35
Closing Session - Led by ASIS NextGen

More information soon

Farewell Drink
15:35 - 16:15
Farewell Drink

Leadership Track 2
Leadership Track 2
Leadership Track 2
Transforming Corporate Security at Porsche: Leveraging the Dynamics of Global Change
09:50 - 10:35
Transforming Corporate Security at Porsche: Leveraging the Dynamics of Global Change

In this session you will not only understand the challenges faced by a Corporate Security department within a recently listed automotive company, but how it successfully transforms its security portfolio, processes, and resources in order to navigate and leverage the dynamics of global change. An unprecedented shift in geopolitics poses fresh challenges for global players, requiring further integration of corporate security into managerial decision-making processes.

Additionally, the ongoing convergence of technological and security disciplines demand the adoption of a holistic approach regarding the integration of security in business processes and technology across value chains and product lifestyle.

Lastly, society’s commitment for increasing sustainability requires companies to reassess their path to providing growth opportunities within a security context.

Speaker: Florian Haacke M.sc, CSO/ Head of Corporate Security, Porsche AG

Networking Break - sponsored by AlertEnterprise
10:35 - 11:20
Networking Break - sponsored by AlertEnterprise

Effectively Addressing Insider Risk – An Interactive Workshop
11:20 - 12:55
Effectively Addressing Insider Risk – An Interactive Workshop

Most security experts (CISO/CSO’s) see insider threats as one of the most important threats they face today and the coming years. A 2021 survey by Egress shows that 94% of all organisations have experienced an insider act in the past 12 months. And the number of incidents is rising. Recent research suggests that insider incidents have increased by 47% over the past two years. While the threat is crystal clear, many organisations still struggle to effectively address this threat. Our workshop gives our audience just that: an effective, proven and practical way to address insider risk for their organisations.

Speakers:
Dennis Bijker, Director, Signpost Six
Lucile Renhas, Insider Risk Consultant, Signpost Six
Peter Valent, Manager IP Protection & Compliance, NXP Semiconductors
Tom Burin, Group Security - Threat Intelligence Manager, Solvay

Networking Lunch
12:55 - 14:00
Networking Lunch

ESRM in practice
14:00 - 14:45
ESRM in practice

More information soon

Farewell Drink
15:35 - 16:15
Farewell Drink

Leadership Track 3
Leadership Track 3
Leadership Track 3
Promoting Security Culture - a Case Study from a Leading Steel & Mining Company
09:50 - 10:35
Promoting Security Culture - a Case Study from a Leading Steel & Mining Company

The abstract explains how within steel and mining industry, security culture is adopted within the business processes, while managing security risks, segregated over diverse geographies with varying risk perceptions. We will talk about physical security and the challenges faced within the company, and how through the application of simple, flexible, and agile security practices, we protect our people, assets and intellectual property. Additionally, the session will share measures to promote continuous improvement of the security practices and business processes for better turn-around time and more efficiency.

Speakers:
Ankur Mathur, Group Security Supervisor, ArcelorMittal
Lee Pokorski, Head Group Risk and Security, ArcelorMittal

Networking Break - sponsored by AlertEnterprise
10:35 - 11:20
Networking Break - sponsored by AlertEnterprise

Workshop: Security Career Pathways – Recruiting, Developing and Retaining Talent
11:20 - 12:55
Workshop: Security Career Pathways – Recruiting, Developing and Retaining Talent

This interactive workshop will draw from the personal experience of panellists plus the collective insight of the audience to discuss the future of security career paths. It will cover:

What skills, training and qualifications are needed?
What is needed to help security teams attract and retain the best talent?
How can DE&I initiatives reshape the profession and create more effective teams?

A panel from ASIS Board Leadership, NextGen and Women In Security communities will lead the session.

Networking Lunch
12:55 - 14:00
Networking Lunch

Farewell Drink
15:35 - 16:15
Farewell Drink

Innovation Track
Innovation Track
Innovation Track
Innovation Session
09:00 - 09:20
Innovation Session

Resilience Reimagined – not if but when.
09:25 - 09:45
Resilience Reimagined – not if but when.

How many of us working in incident and crisis management look at or even consider our risk register when we are invoking or escalating our response? How many of us look at the Business Impact Analysis done during the Business Continuity Lifecyle to inform the escalation and decision-making process? Ben would argue very few if any. This presentation will look into how we can look at resilience from a different perspective. Much of the thinking around resilience that we observe is preparing for an event based on ’if’ something were to happen - will we have the plans and capability in place to respond and recover, what Ben will talk about is how we change the perception to this event ’will’ happen and therefore does that change my approach to resilience.

Furthermore, Ben will discuss how far does security go to inform resilience planning and importantly support the management of an incident.

Join Ben for this very interactive session bringing together the audience’s views and using those views to help break down silos and reimagine resilience from not if but when.

Speaker: Ben White, Principal consultant, 4C Strategies

Setting expectations for your relationship with physical access management
09:50 - 10:10
Setting expectations for your relationship with physical access management

As technology progresses user expectations grow. Increased performance, new features and great experiences are minimum requirements. Physical access control systems can play a pivotal role in creating the modern, connected-and-secure work-place, combining technologies that can both restrict or enable our physical experience based on who, when, or where we are. The expectations are great, so what prevents many users from achieving what should be possible? This presentation discusses three key elements of physical access management that are the catalyst for creating a connected, data-driven platform to enhance the work-place experience for all users. Thinking of physical access control only in terms of technology misses the essential components of people and policy.

Speaker: Daryn Flynn, Client Account Manager, Nedap Security Management

Why Digital Transformation and Security Are the Only Ways Forward
10:15 - 10:35
Why Digital Transformation and Security Are the Only Ways Forward

Fact is, those who digitally transformed not only survived the crisis but thrived. For the rest, it's the only way forward. As cyber and physical worlds blend, there is no transformation without converged security. Learn how connecting security across IT, HR, and OT systems accelerates your digital transformation for the new era of work.

Speaker: Shane Butler, Vice president of sales Europe, AlertEnterprise

Travel Risk Management V2.0
11:20 - 11:40
Travel Risk Management V2.0

Having travel security for your C-suite executives is almost a foregone conclusion in today's world. The challenge is how your Enterprise Security Risk Management (ESRM) structure can best support you travelling execs in a constructive manner. Executive Protection and Secure Transporation should not be a hindrance or an inconvenience, but rather facilitate easier travel, optimize productivity and support the success of your executives. ISO 31030 guidelines encourage closer attention to travel risk management but how do you optimize the benefit from EP to get buy-in from the board and c-suites, creating an environment where travel security support is welcomed and becomes a benefit center as opposed to a cost center. Let's discuss how to best accomplish this together.

Speaker: Mac Segal, Founder & CEO, AHNA Group

Why should your employees share their location?
11:45 - 12:05
Why should your employees share their location?

Maintaining location data is critical in safeguarding your workforce and providing them with contextual information. However, today's employees are keenly aware of their location privacy rights, which can present a challenge for any HR-, risk-, travel- or security manager.

Speakers:
Auguste Faerch, Content Marketing Manager, Safeture
Jens Guldbrand, Product Specialist, Safeture

From Risk to Resilience: How are Business Ethics influencing your decision making?
12:10 - 12:30
From Risk to Resilience: How are Business Ethics influencing your decision making?

Every day, companies face risk. From physical or cyber threats to brand protection and corporate social responsibility - are you confident your technology partner can support you in meeting your security ambitions and alleviating those threats? Or could they add to your security concerns? What topics are important to you and the industry, and are driving your corporate security agenda?

Speakers:
Theresa Stenebring, Global Account Manager, Axis Communications
Steven Kenny, Global Sales Engineer, Cybersecurity, Axis Communications

The digital Security Manager - How to use data and dashboards in the Corporate Security world
12:35 - 12:55
The digital Security Manager - How to use data and dashboards in the Corporate Security world

The digital age is a fact. Digital transformation already turns into the new stage of a digital evolution. The support of artificial intelligence, robotic automation and new ways of living and working impact the security management arena.

But how do security services add value to the businesses and the organizations they are embedded with? How do they communicate and share information to stakeholders? And what about dashboards that speak “executive language” and provide smart overviews for the top management levels?
The requirements for security will be more and more to “think in data first”. Security leaders and managers become digital leaders, and the education and development of security professionals shift into the digital landscape.

Speakers:
Arndt Engelmann, Partner, PwC Germany
Gunar Korm, Senior Manager, PwC Germany

Reserved for Dragonfly
14:00 - 14:20
Reserved for Dragonfly

New best friends
14:25 - 14:45
New best friends

How a closer relationship between financial institutions, corporate security and emergency services is already helping to build resilience and where the relationship might move in the future.

Speaker: Michael Roberts, Chief Physical Security , AXA Partners

2022 Online Days Programme

Thursday 28 April 2022 - Online

15:00
15:30
16:00
Opening & Expert session
Opening & Expert session
Opening & Expert session
Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis
15:00 - 15:55
Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis

With the Ukraine conflict having quickly overshadowed the pandemic recovery in continental caliber crises, security and crisis management professionals across Europe are experiencing trying times. While operational and logistical crisis risks are getting the lion's share of attention these days, reputational risk remains one of those mainstays that can impact an organization as hard as any, including in the context of the Ukraine crisis.

ASIS European Board members Erik de Vries and Glenn Schoen will be presenting an interactive crisis game at the ASIS European Conference in Prague in May. This 28 April online session in the run-up to that event serves as a primer for that game, offering context on how the conflict in Ukraine is causing reputational risk to emerge in ways old and new.

Speakers:
Erik de Vries , CPP PSP, Director, DutchRisk
Glenn Schoen , CEO, [email protected] BV

In this online session the presenters will:
> Share their thoughts on the Ukraine and potential reputational risks for your organization
> Outline security's role in addressing these
> Present select Lessons Learned

16:00
16:10
16:20
16:30
16:40
Innovation Track 1
Innovation Track 1
Innovation Track 1
4 Essentials Which Need To Be Considered When Facing A Cyber Attack
16:20 - 16:40
4 Essentials Which Need To Be Considered When Facing A Cyber Attack

2022 is set to become the year of cyber insecurity. With the ongoing digitalisation of business processes and value chains, companies are becoming progressively dependent on their information and communicaiton infrastructure. This is not new, but the news alerts on successful cyber attacks are more regular than ever.
According to the BCI Resilience Report 2021, 61% of organizations reported up to five cyber-attacks in the past year. Therefore, it is no longer a case of whether a cyber-attack will hit your company, but when. Get prepared and learn four essentials how to act in case of a cyber-attack.

Speaker: Mrs Christine Forstmann, Sales and Key Account Manager, F24 AG

Opening Session incl. Expert presentations & interview based on audience questions
15:00 - 15:55
Opening Session incl. Expert presentations & interview based on audience questions

Innovation Track 2
Innovation Track 2
Innovation Track 2
Smart Buildings: Impacts on Security Megatrends Over the Next Decade
16:00 - 16:20
Smart Buildings: Impacts on Security Megatrends Over the Next Decade

This session will focus on the functional shift from buildings being considered solely as fixed assets to becoming active players in companies´ efforts to tackle the challenges of the next decade such as the growing cyber risks for Buildings, the new security cloud-based models, and the need to include health and sustainability at the core of Security.
Speaker: Mariana Duarte , Smart Buildings and Digital Solutions Manager – Europe, Johnson Controls

The future of corporate security – the trends that won’t go away
16:20 - 16:40
The future of corporate security – the trends that won’t go away

While there is a constantly shifting and unpredictable global security environment, the way in which corporate security is managed seems to be evolving in a more predictable way. Convergence between traditionally separate disciplines has started to create very complex and increasingly senior security positions where business acumen is just as important as technical know-how.
Alongside this, AI based products are changing the skills needed in traditional security roles and there is an increasing interconnectivity between security and financial risk management. By analysing these trends, security and risk managers can better position themselves to be the leaders of tomorrow.

Speaker: Michael Roberts, , Chief Physical Security, AXA Partners

Innovation Track 3
Innovation Track 3
Innovation Track 3
Duty of Care in Armed Conflict: Lessons Learned from Ukraine
16:00 - 16:20
Duty of Care in Armed Conflict: Lessons Learned from Ukraine

What does Duty of Care look like when war breaks out? How far can you go to support your people and what are the practical challenges that you will need to overcome? A team from Crisis24 was first deployed to Kyiv in January 2022 to help companies with personnel and operations in Ukraine. They remain in the region working out of the surrounding countries as well as at the borders of, and inside Ukraine itself. In this session they will be sharing some of the challenges and lessons learned from the ongoing situation, which remain relevant to this and other global conflict zones.

Speaker: Graeme Hudson , Associate Director, All Hazards Response, Crisis24

The resurrection of Geopolitics - new challenges or opportunities for Corporate Security
16:20 - 16:40
The resurrection of Geopolitics - new challenges or opportunities for Corporate Security

Developments in recent years have shown that we are witnessing the resurrection of Geopolitics. Experts argue that questions of world order and global governance are again increasingly replaced with ones of territory and military power. While the resurrection of Geopolitics changes the landscape by exposing new security threats, and challenges, it also creates new opportunities by giving the possibility of predicting certain developments. However, a main question for (corporate) security professionals remains for the moment: Is Corporate Security really ready and well positioned for Geopolitics?

Speakers: Nana Kalandarishvili , Manager, PWC
and Jens Paulus, Partner, PWC

16:40
16:50
17:00
Table Talks
Table Talks
Table Talks
1. Resilience Fusion Center: Buzzword or the next TOM (target operating model) for Corporate Security?
16:40 - 17:00
1. Resilience Fusion Center: Buzzword or the next TOM (target operating model) for Corporate Security?

Discussion facilitated by Jens Greiner, Director, PwC Germany and Daniel Krause, Senior Manager, PwC Germany

2. Shelter in place versus Evacuation
16:40 - 17:00
2. Shelter in place versus Evacuation

Discussion facilitated by Graeme Hudson, Associate Director, All Hazards Response, Crisis24

3. The Smart Buildings and the digital transformation of physical security operations
16:40 - 17:00
3. The Smart Buildings and the digital transformation of physical security operations

The Smart Buildings will play an active role in addressing Security Megatrends in the next decade. This table talk will focus more specifically on their impact on the following Megatrends: Artificial Intelligence / Cybersecurity / Increased Interoperability. The discussion will deep dive into digital transformation challenges raised by table talk participants and how to manage them.
Discussion facilitated by Peter Stiphout, Business Development Digital Integrations Continental Europe, Building Technologies & Solutions, Johnson Controls

Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis
15:00 - 15:55
Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis

With the Ukraine conflict having quickly overshadowed the pandemic recovery in continental caliber crises, security and crisis management professionals across Europe are experiencing trying times. While operational and logistical crisis risks are getting the lion's share of attention these days, reputational risk remains one of those mainstays that can impact an organization as hard as any, including in the context of the Ukraine crisis.

ASIS European Board members Erik de Vries and Glenn Schoen will be presenting an interactive crisis game at the ASIS European Conference in Prague in May. This 28 April online session in the run-up to that event serves as a primer for that game, offering context on how the conflict in Ukraine is causing reputational risk to emerge in ways old and new.

Speakers:
Erik de Vries , CPP PSP, Director, DutchRisk
Glenn Schoen , CEO, [email protected] BV

In this online session the presenters will:
> Share their thoughts on the Ukraine and potential reputational risks for your organization
> Outline security's role in addressing these
> Present select Lessons Learned

Thursday 12 May 2022 - Online

15:00
15:30
16:00
Expert session
Expert session
Expert session
Overcoming Polarisation and Maintaining Healthy Dialogue
15:00 - 15:55
Overcoming Polarisation and Maintaining Healthy Dialogue

Addressing a variety of political, societal and environmental topics where collaboration and finding consensus will be vital for the future of Europe and the wider world is a challenge due to increasingly polarised viewpoints.
This online session will explore:
• What happens to organisational effectiveness when polarisation stops important discussions from taking place, or at least makes them difficult to have in a constructive way?
• What are the cognitive processes behind this, and how can you spot when this is happening?
• What role can security leaders play in creating a culture that facilitates inclusive discussion?
• How can you be a role model, encouraging diversity of thought and healthy debate?

An expert presentation from Balvinder Singh Powar , associate professor at the IE Business School will be followed by live Q&A. Balvinder’s expertise includes creative and strategic input, business development and senior management, team leadership, relationship management and business mediation.

Facilitator: Godfried Hendriks, CPP , 2020 ASIS President

16:00
16:10
16:20
16:30
16:40
Innovation Track 1
Innovation Track 1
Innovation Track 1
Buildings of the Future: a people centric approach to healthier facilities
16:00 - 16:20
Buildings of the Future: a people centric approach to healthier facilities

Buildings are at the point of no return to the pre-pandemic way of operating as they need to become healthier, safer and more secure, people-centric and sustainable. The critical elements of creating healthier and more sustainable buildings are: IAQ, Lighting, UVC, Monitoring – AI & Analytics, Energy Efficiency & Sustainability.
The session will explore how to create healthier facilities providing a safer and more inviting return for the workforce by using new technologies and harnessing the power of IoT and data. Turning buildings into healthier and safer facilities also means to make them more profitable and sustainable assets, able to drive greater performance.

Speaker: Adhishesh Sood, Healthy Buildings Strategic Alliances Leader, Honeywell Building Technologies

Managing Risk and Improving Resilience in a Volatile World
16:20 - 16:40
Managing Risk and Improving Resilience in a Volatile World

The world in which businesses operate is getting more complex, unpredictable, and volatile. Meanwhile, PwC reports that 95% of business leaders say their crisis management capabilities need improvement.

During a crisis, your response is only as good as the information you use to inform your decision-making and risk workflows. So, risk leaders wanting to reduce the impact of a crisis should attend this session as we answer:

- What can businesses do to minimise disruption and keep their people and assets safe?
- What impact can a proactive, coordinated response have on operational effectiveness?
- How can leaders increase the ROI of their security investments, providing faster time to value?

Speaker: Chris Brozenick, Senior Director of Product Marketing, Dataminr

Opening Session incl. Expert presentations & interview based on audience questions
15:00 - 15:55
Opening Session incl. Expert presentations & interview based on audience questions

Innovation Track 2
Innovation Track 2
Innovation Track 2
TSCM Update & The Importance of TSCM Post Pandemic
16:00 - 16:20
TSCM Update & The Importance of TSCM Post Pandemic

The aim of the presentation is to inform and educate security professionals of the new surveillance threats that have emerged over the last couple of years. Looking at new advances in eavesdropping technology. Also to highlight the security risks that continued during the COVID pandemic. Many companies security posture changed and many offices were left empty for long periods of time. Providing an opportunity for technical attacks.

This presentation looks at some of the security risks associated with working from home and the need for an increased TSCM and Cyber Security requirements and technical vigilance when offices return to normal working.

Speaker: Jason Dibley, Director, QCC Global Ltd

How can we lead resilience in crisis situations? The risk mitigation through innovative tools and human adaptability on change
16:20 - 16:40
How can we lead resilience in crisis situations? The risk mitigation through innovative tools and human adaptability on change

During a pandemic situation or any other unexpected crisis with steep evolution, the availability of human resources and continuous adaptability to rapid changes can determine the effectiveness of security incident management. Acknowledge – validate – solve or escalate to closure are the most common steps of a security standard operating procedure in alarm incident management. Early adoption of new tools, sharing of data and ensuring full knowledge of all aspects of a situation as it evolves should be considered key elements of security monitoring. Should these elements be independent or dependent on educated and qualified human resources?

Speaker: Florin Marica , Managing Director, Ultravision Consult

Innovation Track 3
Innovation Track 3
Innovation Track 3
The Importance of Building Resilient Businesses in a Covid-19 World - Digital Transformation in the New Normal
16:00 - 16:20
The Importance of Building Resilient Businesses in a Covid-19 World - Digital Transformation in the New Normal

As organizations adjust to new hybrid and remote work environments following covid-19, the parameters of their delivery mechanisms, and what it means to be resilient, are changing. It’s the unbreakable connection between resilience and technology, and its power in allowing organizations to respond, adapt and expand safely and securely. What does operational resilience really look like, and how can we continue to adjust from a digital, physical and IT perspective while remaining relevant and successful?

The current IT Operations landscape is constantly evolving and the challenges and threats are increasing at the same if not at a higher rate. Digital Operations play a key role in establishing organizational resilience and thus, establishing agile and resilient processes is a top priority.

Speaker: Owen Miles, Field CTO CEM, Everbridge

Leveraging intelligence to keep board-level attention following Ukraine
16:20 - 16:40
Leveraging intelligence to keep board-level attention following Ukraine

The Russian invasion of Ukraine marked the second time since Covid-19 that corporate leadership has turned to intelligence and security teams to solve unprecedented problems. The conflict has settled, but the knock-on risks are now only beginning to play out. A key challenge will be retaining board-level attention on the latter. This session will investigate lessons learned from the Ukraine crisis and help us benchmark how organisations are managing the ongoing fallout. We will also explore how this is an opportunity to turn intelligence into board-level success.

Speakers: Hugo Crossthwaite, Intelligence Operations Manager, Dragonfly, and Thomas Murphy, Strategic Intelligence Manager, Dragonfly

16:40
16:50
17:00
Table Talks
Table Talks
Table Talks
Home working technical Surveillance threats
16:40 - 17:00
Home working technical Surveillance threats

Facilitator: Daniel Tippen, Project Manager, QCC Global Ltd.

How is your business adopting enterprise Resilience?
16:40 - 17:00
How is your business adopting enterprise Resilience?

Facilitator: Owen Miles, Field CTO CEM, Everbridge

How far do you provide your own Duty of care for your travelling staff or do you outsource?
16:40 - 17:00
How far do you provide your own Duty of care for your travelling staff or do you outsource?

Has your organisation adopted the work from anywhere/work from home model and if so is this now your new norm or are you still adjusting? If adjusting what are the pain points is it dealing with new demands from the new style of employee, managerial control of workers, performance benefits/issues?

Facilitator: Shaun Boulter, Global Head Operations & Security – Corporate Mobility, AXA Partners

Is it even possible to be prepared for a scenario as complex as a cyber crisis?
16:40 - 17:00
Is it even possible to be prepared for a scenario as complex as a cyber crisis?

Today, digital assets have become indispensable. The entire world is becoming more digitalized - sharing and storing information has never been easier before. In response to this rapid connectivity, cyber threats are also rising to a new level of frequency, sophistication and complexity.

In this Table Talk, Stefanie Hach, F24 Head of Sales & Marketing for F24 Luxembourg, will talk about the challenges companies face in preparing for and responding to a cyber attack, the dilemma of communicating during such an event, and what can be done to meet the challenges.

Facilitator: Stefanie Hach, Head of Sales & Marketing Lux, F24

Overcoming Polarisation and Maintaining Healthy Dialogue
15:00 - 15:55
Overcoming Polarisation and Maintaining Healthy Dialogue

Addressing a variety of political, societal and environmental topics where collaboration and finding consensus will be vital for the future of Europe and the wider world is a challenge due to increasingly polarised viewpoints.
This online session will explore:
• What happens to organisational effectiveness when polarisation stops important discussions from taking place, or at least makes them difficult to have in a constructive way?
• What are the cognitive processes behind this, and how can you spot when this is happening?
• What role can security leaders play in creating a culture that facilitates inclusive discussion?
• How can you be a role model, encouraging diversity of thought and healthy debate?

An expert presentation from Balvinder Singh Powar , associate professor at the IE Business School will be followed by live Q&A. Balvinder’s expertise includes creative and strategic input, business development and senior management, team leadership, relationship management and business mediation.

Track 1

The evolving

risk landscape

  • geopolitical tension
  • societal unrest
  • technology and the rise of AI
  • new considerations on travel risk

Track 2

Security as part of the business

  • what the post COP26 economy means for security teams
  • internal collaboration with Risk Management
  • Compliance and HR
  • how to function effectively in remote work environments
  • engaging the next generation of security talent
  • how ESRM is being implemented

Track 3

Innovation

  • the latest research and developments in security tools, technology, and service solutions

ONLINE DAY 2 - Available on demand (except networking sessions)

12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
Stage 1
Stage 1
Stage 1
Ice Breaker - Speed Dating session
12:30 - 12:55
Ice Breaker - Speed Dating session

Keynote Interview - Live Conversation with a Friendly Hacker
13:00 - 13:35
Keynote Interview - Live Conversation with a Friendly Hacker

Covid-19 has changed the way we do business, and criminals have quickly adapted to the new reality. Keren Elazari, TED speaker, security analyst and friendly hacker speaks with us about cyber security in times of crisis: lessons learned from the past year as well as trends & predictions and to build resilience, and what future-forward organizations are doing right now to stay ahead of current challenges.

Speaker: Keren Elazari, CISSP, Cyber Security Analyst, Author & Researcher

Evolving Cyber Threats & Essential Mitigation Strategies
13:40 - 14:25
Evolving Cyber Threats & Essential Mitigation Strategies

David Cox, Director of Mastercard’s European Cyber Resilience Centre will explore what today’s globally connected companies are facing in the cyber threat arena and important steps in staying resilient. Highlights will include:
- Cyber crime and the cyber criminal – understanding the profile of attacks and attackers - Top cyber threats including the evolution of Ransomware
- Third Party Risk Management – Black Swan Event or daily dilemma?
- The role of Mastercard’s European Cyber Resilience Centre in addressing the global threat landscape
- How collaboration and communication is key to a “Security in Unity” strategy

Expert presentation & video Q&A

Speaker:
David Cox, Director, European Cyber Resilience Centre, Mastercard

ENISA efforts on Artificial Intelligence Cybersecurity
14:30 - 15:15
ENISA efforts on Artificial Intelligence Cybersecurity

In this talk, the EU Agency for Cybersecurity (ENISA) will discuss the main findings from its seminal work on mapping the Artificial Intelligence (AI) Threat Landscape. By following a lifecycle view of the AI ecosystem, ENISA worked on identifying relevant assets and following a methodological approach the Agency highlighted threats to said assets and their potential impacts. The report aims to set the baseline on AI cybersecurity paving the path to a better understanding of the AI threat landscape as well as opening the discussion on how to effectively and efficiently address them.

Expert presentation & video Q&A

Speaker: Dr. Apolstolos Malatras, Team Leader, Knowledge and Information Team, European Union Agency for Network & Information Security

Table Talks
15:15 - 16:00
Table Talks

Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions.

TOPICS:
- 2021 Crisis Preparedness: The changing face and demands of Emergency Communications during the pandemic (John Davison, F24)
- How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience (George Hughes, Dataminr) -

Consolidating all Security Activities to Create a New, Business Enabling Security Department
15:45 - 16:30
Consolidating all Security Activities to Create a New, Business Enabling Security Department

Security at Philips was fragmented and seen as a cost center. Seven members of the ExCo had a responsibility for a security department. Our job was to consolidate these activities into one group security function with a ExCo member as the owner and show the benefits.

Next to the possible cost savings of the consolidation of functions, i.e. removal of double roles, we had to show an additional benefit; how we will become a business enabler.

Our pathway to success is to insert ourselves into business processes. Be part of strategic discussion with M&A to avoid cost after integration, contribute to the perfect delivery with supply chain security, make sure our field service engineers can execute on maintenance contracts, etc.

Speaker: Machiel Toe Water, Security & Real Estate Leader for Domestic Appliances, Philips

CSO Center Exclusive Discussion
16:35 - 17:00
CSO Center Exclusive Discussion

By invitation only.

Table Talks
17:00 - 17:45
Table Talks

Table Talks
17:00 - 17:45
Table Talks

Open to all! Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions. TOPICS: - 2021 Crisis Preparedness: The changing face and demands of Emergency Communications during the pandemic (John Davison, F24) - How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience (George Hughes, Dataminr) -

ASIS Women in Security - Networking and Discussion
17:15 - 18:00
ASIS Women in Security - Networking and Discussion

Open to all! Register for the Basic Online Pass (free) or the Premium Online Pass (as of 115 EUR) here

Stage 2
Stage 2
Stage 2
Digital Twin: A New Approach for Business Driven, Agile Security
13:40 - 14:25
Digital Twin: A New Approach for Business Driven, Agile Security

Adoption of mobile services, biometry and cloud solutions, are driving interface standardisation, promising a rich tapestry of interchangeable functionality. Popular trends are a present-day reality, constantly transforming our businesses. But how can you respond to these changing demands from business and what are the actual implications for physical security?
In order to address the dynamic nature of business, and ever-changing threat landscape, we need a way to simulate, verify and validate potential security solutions. This requires a foundation that promotes intelligent analysis and facilitates rapid adaption.
By applying a digital twin, you create a virtual representation of your security, providing instantaneous answers to real world questions. The application of modern-day techniques elevates your security to the next level, ensuring real added business value.

LEARNING OBJECTIVES
Objective 1. Understanding dynamic business needs - Participants will comprehend the inevitable changes in business and the need, as security, to adapt in order to remain relevant in the market.
Objective 2. Apply an agile approach to security - Participants will understand how to apply an adaptive, iterative approach to security. They will receive step-by-step plan as to how this can be achieved and the type of challenges that can be addressed using this approach.
Objective 3. Demonstrate the need for a virtual model - Participants will receive an explanation of how a virtual model, digital twin, can be applied to their specific physical security organisation and can be used to facilitate security professionals when creating or changing security policies.

Speakers:
Jeroen Harmsen, CPP, Global/Enterprise Business Development for the BU Security Management at Nedap
Linda Hwoson, R&D: Future Security Solutions, Nedap
Hendrik Koopmans, Business Designer, Nedap

The Virtual & The Violent: Thoughts on the Terrorist Threat in Europe 2021
14:30 - 15:15
The Virtual & The Violent: Thoughts on the Terrorist Threat in Europe 2021

This presentation will offer a compact update on key terrorism-related concerns in large parts of Europe for the remainder of 2021. It will draw on both government and private sector insights, including newly developing trends and worries related to new players and issues like vaccination and travel services resumption just as the cyber-physical interplay among various extremist groups and their activities tightens.

Expert presentation & video Q&A

Speaker: Glenn Schoen, CEO, [email protected]

Table Talks
15:15 - 16:00
Table Talks

Dealing with Risks and Uncertainty: Are Security Professionals Human after all?
15:45 - 16:30
Dealing with Risks and Uncertainty: Are Security Professionals Human after all?

Security practitioners, like you, deal with risks on a daily basis. They are assumed to be familiar with the concept of risk. So far, however, little is known about the psychological processes of individual security professionals. How do they perceive probabilities and assess uncertainties? Which aspects of security risk are considered valuable? What is the role of individual security expertise on risk assessments? During the past years, I have conducted several empirical scientific studies in the field of individual decision-making concerning security risks. The results show that security professionals are vulnerable to decision making biases. These phenomena can strongly influence their professional judgment and with that, risk assessments and risk mitigation in organisations. During this session, you are confronted with a few ‘mind experiments’ which can make you aware of your own assessment biases. You are also kindly invited to participate in an online scientific survey. The results of this survey will be analysed in advance and presented during this session. To the survey

Expert presentation & video Q&A

Speaker: Johan de Wit, PhD Researcher & Technical Officer Enterprise Security, Delft Technical University & Siemens Smart Infrastructure

Interactive Peer-to-Peer Discussions
16:35 - 17:00
Interactive Peer-to-Peer Discussions

DIscussions in small groups on the topics raised by the presentations of the day

Table Talks
17:00 - 17:45
Table Talks

Networking Session - Speed Dating
17:15 - 18:00
Networking Session - Speed Dating

Innovation stage
Innovation stage
Innovation stage
Everyday Use of Artificial Intelligence in Video Surveillance Systems. Myth or Reality.
13:40 - 14:00
Everyday Use of Artificial Intelligence in Video Surveillance Systems. Myth or Reality.

The topic of artificial intelligence has become increasingly popular. Nearly every company offers solutions that include AI. And that also creates a lot of myths and unrealistic expectations. We are going to look at what AI means for video surveillance systems, discuss the benefits and solutions as well as the challenges that come with it.

Speaker: Katerina Ryan, Business Development Europe, Cathexis

How to Manage Crisis Situations Professionally – Two Best-Practice Examples in the Health & Finance Industry
14:05 - 14:25
How to Manage Crisis Situations Professionally – Two Best-Practice Examples in the Health & Finance Industry

What would you do if you were a hospital amidst a mass-casualty incident and had to get as many physicians as possible into your filling surgery rooms immediately? What if you were the security officer in a large financial institution and are dealing with a robbery or a bomb threat. How do you coordinate and communicate with your crisis team and emergency responders at the same time? In this talk we will take a deeper look into how two very different organisations are tackling their challenges with alerting and crisis management.

Speaker: Eske Ofner, Head of Sales, F24 AG

Thought Leader Presentations
14:35 - 15:00
Thought Leader Presentations

Table Talks
15:15 - 15:40
Table Talks

Nedap Benchmark Research, 2020/2021: How can Access Control Add Value to Your Business?
15:45 - 16:05
Nedap Benchmark Research, 2020/2021: How can Access Control Add Value to Your Business?

Many large or multinational companies now use electronic systems for physical access control. Typically, these systems collate lots of data and provide a wide range of functionality. Which means they can do far more than open and close doors – they can add value to your business in a variety of ways.

For our annual benchmark research, this was the question we explored: “How can access control add value to your business?”

We interviewed 40 multinational companies about their experience, implementations and processes in relation to access control. The results give an overview on how access control systems are being used; how they’re optimising company-wide processes; and where there are opportunities to gain more value from them. In particular, we focused on how the data collected by access control systems can be used to better effect.

During this session, I’ll explain our benchmark process and provide some highlights from the conclusions.

Speaker: Timon Padberg, Account Manager, Nedap Security Management

Connect the Dots – An Intro to Natural Language Processing for Security
16:10 - 16:30
Connect the Dots – An Intro to Natural Language Processing for Security

Digital transformation is rapidly picking up pace as security teams continuously bring more processes online. We collect more data than ever, but we struggle to use it effectively, which results in missed threats or root causes. Thankfully, recent advances in Natural Language Processing (NLP), a subfield of Artificial Intelligence, offer solutions to these problems. In this session, we will discuss how NLP can help you collect, classify, and extract meaningful data from language inputs to protect what matters in your business.

Speaker: Will Anderson, CEO, Resolver

Thought Leader Presentations
16:35 - 16:55
Thought Leader Presentations

Table Talks
17:00 - 17:45
Table Talks

Networking Session - Interactive Discussions
17:15 - 18:00
Networking Session - Interactive Discussions

ONLINE DAY 2 - Available on demand (except networking sessions)
Time displays in Central European Time.
On-demand content will also be available throughout the event series. The content library will be updated with new recordings in the days following each online event.

On-demand Bonus Session:

Cyber security – A shared responsibility

Jeroen van Os, Sales Country Manager The Netherlands at nedap, shares his experiences about the potential cyber risks to physical access management systems. He sees a worrying pattern arising when speaking to stakeholders and organizations.

Thursday, 28 March 2019

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
Leadership Track 1
Leadership Track 1
Leadership Track 1
Welcome coffee
08:30 - 09:00
Welcome coffee

Opening Plenary Session and Keynote 1: Amsterdam: From Smart City to Smart Society
09:00 - 10:00
Opening Plenary Session and Keynote 1: Amsterdam: From Smart City to Smart Society

Theo Veltman, Innovation Rainmaker at the municipality of Amsterdam, will set the scene for the conference by sharing where Amsterdam’s is in implementing its Smart City strategy, and how this leads onwards to Amsterdam, a smart society. Combining insight from both technical and human perspectives, Theo will cover:
• Quality of life issues addressed by smart approaches
• Where the city is in its strategy implementation
• What is coming next
• How the roles of citizens, public and private companies, and government interact with one another
• Key technology concerns

All Leadership and Professional pass holders for Thursday are invited to join us for this essential session, helping to put the rest of the event in context. Purchase your pass now

Keynote 2: Rotterdam's Resilient City Vision
10:40 - 11:25
Keynote 2: Rotterdam's Resilient City Vision

Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, will introduce:
• what does a resilient city vision look like
• how Rotterdam is implementing Resilient City methodology
• what are the related technologies
• how this is changing day to day and business life in the city
• what is expected in the next 3 years.

Only available for leadership pass holders – register now

Securing the Cities of the Future - Panel Debate
11:30 - 12:15
Securing the Cities of the Future - Panel Debate

This panel will examine the keynote’s smart city and resilient city visions from the perspective of security leaders:
• where does the role of security fit in the Smart and Resilient city visions?
• Are there areas where visions, objectives and priorities might converge or diverge?
• What are the specific aspects of concern from a security perspective?
• How will security leaders and their teams need to adapt as our cities evolve?

The panel will be moderated by 2019 ASIS International President Christina Duffey, CPP, and include expert viewpoints from Theo Veltman, Rainmaker Innovation, Innovation Program Manager, CTO, City of Amsterdam, Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, and Volker Wagner, Vice President Security, BASF Group.

Only available for leadership pass holders – register now

Cyber Threat Landscape
13:30 - 14:15
Cyber Threat Landscape

Cyber security has become one of the major challenges that organisations face today. According to the 21st PwC CEO Survey, 33% of CEOs are extremely concerned about cyber threats. Matthijs van der Wel will provide a high level overview of various threat actors and how their objectives and operations impact your cyber risk profile. He will also discuss various practical models that your organization can adopt today.

Speaker: Matthijs van der Wel, Director Forensic Technology Solutions, PwC, NL

Soft Skills for Tough People – Creating an Innovation Culture
13:30 - 14:15
Soft Skills for Tough People – Creating an Innovation Culture

In a VUCA (Volatile, Uncertain, Complex, Ambiguous) environment, traditional roles are changing and new skills are needed. Technical ability is important but soft - people skills even more so in a diverse and fast changing context if we need to innovate and lead successfully. This can be a particular challenge for security leaders who have transitioned to management roles in a business setting following careers and leadership development in Military or Law Enforcement where command and communication structures were very different to today’s business cultures.

Following an introduction from the CSO’s perspective by Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, the session will be led by Balvinder Singh Powar, Associate Professor at IE Business School and Partner/Director at BOOSTER Space Industries & AERDRON.

Join us for an active and engaging practical session.

Only available for leadership pass holders – register now

Successful transformation to a cyber-physical corporate security organisation
14:20 - 15:05
Successful transformation to a cyber-physical corporate security organisation

innogy Group Security has successfully managed the integration and convergence of Cyber and Physical Security, enabling a 360-degree view and boosting impact which is clearly recognized by top management.

Digitization and the associated tightening of legal requirements make Cyber Security a critical success factor. By systematically assessing the Cyber Security Risk and the degree of maturity of existing controls, we are able to identify and prioritize the implementation of additional, necessary security measures. Allocation of Cyber Security outside IT ensures transparency, good governance and successful “operating at eye level” with CIO. The integration and convergence of Cyber and Physical Security enables a 360-degree view and boosts impact which is clearly recognized by top management. Top management commitment results from good governance, transparency, measurable and tangible impact as well as management language and education instead of technical terminology.

Speaker: Peter Olijslager, Head of Security Retail / Deputy CSO Group Security, innogy SE, DE

Only available for leadership pass holders – register now

Building A Brilliant Team
15:50 - 16:35
Building A Brilliant Team

An exceptional panel with direct insight from leading CSOs on how they build and lead teams up to the toughest security challenges. This session will cover:
• Skillsets: choosing specialists and generalists
• Talent Attraction: hiring new and established professionals
• Retention and Development: ongoing training, driving the security culture
• Engagement: empowerment, cross function exposure and experience
• Performance Management: define how to measure success
• Insider Threat: pre and in-employment screening, collaboration with HR

Panelists will include Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, Gavin Henderson, Vice President Regional Security Europe & Eurasia , Mastercard, and Nick Lovrien, CPP, Chief Global Security Officer, Facebook Inc.

Moderator: Eva Mueller, Senior HR Business Partner, EU Corp OPS, Amazon, LU

Only available for leadership pass holders – register now

Hot Debate: Consultants - Valued Partner or Necessary Evil?
16:40 - 17:25
Hot Debate: Consultants - Valued Partner or Necessary Evil?

Following up on the Building a Brilliant Team panel, we examine another critical and often controversial area in enterprise security – the role of Consultants. This panel will contrast viewpoints from leading CSOs and Consultants and will cover:
• Owning and understanding the business case for using Consultants
• Sourcing, recruiting, and expectation setting
• Contracting models and win-win scenarios
• Performance Management: define how to measure success
• Insider Threat/Third party risk: pre and in-employment screening, collaboration with HR

Speakers:
Karolien Verbeiren, Director Key Accounts European and Global, Securitas, BE
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy, BE

Only available for leadership pass holders – register now

Refresh & Reconnect
17:30 - 18:00
Refresh & Reconnect

Relax, recharge your batteries and enjoy a drink in the exhibition after a busy first event day. Available for all participants.

President's Reception
20:00 - 22:00
President's Reception

Dinner with a river view! Hosted by the President of ASIS International and sponsored by Johnson Controls, this is the perfect opportunity to meet and network with fellow industry professionals in the unique settings of the Wereldmuseum. Tickets are required for this function. Address: Wereldmuseum, Willemskade 25, 3016 DM Rotterdam Directions with Public Transportation: From the WTC Beursplein, take Metro D or E direction De Akkers and stop at Leuvenhaven Or, from Kruisplein, take Tram 7 direction Willemsplein and stop at Westplein CLosest Parking: Erasmus Brug Parking

Leadership Track 2
Leadership Track 2
Leadership Track 2
Using Drones at Volkswagen : Opportunities and Risks
13:30 - 14:15
Using Drones at Volkswagen : Opportunities and Risks

The proliferation of commercially available drones in recent years has created a new vector of attack. From industrial espionage to physical security and security issues, drones provide a convenient, cost-effective tool for a range of malicious intentions.
In this presentation, Sina Schemel, asset protection, Group Security Volkswagen AG and Volkswagen Chief Security Officer, Michael Schmidt will demonstrate the advantages and risks that drones bring to industrial companies and show a possible approach to mitigating these risks.

Only available for leadership pass holders – register now

Geopolitical Competition for AI Dominance
14:20 - 15:05
Geopolitical Competition for AI Dominance

Technology has always played an integral role in strategic competition, and today’s global battle for AI dominance is both headline grabbing and significant. China, the United States, and the European Union each approach AI development, deployment and regulation differently, and each have their own inherent strengths and weaknesses.
Rodger Baker, Stratfor's Senior Vice President of Strategic Analysis, will outline who is in the lead and what factors are contributing to the divergence in development.
In addition, with applications ranging across the civilian and military spectrum, Mr. Baker will assess the impact the AI race may have on international business operations as organizations maneouver the precarious path of resurgent big power competition.

Only available for leadership pass holders – register now

Financial Measures of Security Risk
15:50 - 16:35
Financial Measures of Security Risk

Financially measuring annual security risk value, helps security and risk professionals to communicate the security risks the organization is facing, and can support an ESRM approach.

Starting by presenting a framework for measurement, you will see an example of a risk workshop using the framework, and how a risk workshop is facilitated. The session will conclude with real-life examples and known challenges from a global high technology manufacturing corporation.

Speaker: Perttu Sarkkinen, Security Manager, Wärtsilä Finland Oy, FI

Only available for leadership pass holders – register now

Scoring Corporate Response to a Crisis
16:40 - 17:25
Scoring Corporate Response to a Crisis

Scoring a crisis management response is an ideal way to assist a company's future processes by identifying areas of weakness or non-conformity in an event. This information should support future learning. But is it possible to score a crisis response and if so, how do you do it?

The presentation will discuss the journey taken on this particular problem and share the outcomes of the project.
Speaker: James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK

Only available for leadership pass holders – register now

Leadership Training Track
Leadership Training Track
Leadership Training Track
Chem-Bio Terrorism Training for Security Professionals
10:40 - 12:15
Chem-Bio Terrorism Training for Security Professionals

Few topics in the domain of terrorism have been obfuscated with mystery and misinformation as the subject of chemical and biological terrorism.
In this 90 minute workshop, S2 Institute consultant Craig Gundry explores the threat of chemical and biological terrorism as it specifically applies to security professionals including an examination of previous attacks, diverse facility attack scenarios, and practical measures for preventing and responding to chemical and biological attacks in a workplace environment.
Speaker: Craig Gundry, PSP, Lead Instructor, Anti-Terrorism Programs, S2 Safety & Intelligence Institute, US

Only available for leadership pass holders – register now

Travel Risk Training - Specific Risks for Women and Minorities
13:30 - 15:05
Travel Risk Training - Specific Risks for Women and Minorities

Are you aware of the risks you face as a traveller? This interactive workshop will ask you to step into a different traveller profile and consider whether the risks you face have changed and what information and help you might now need?

In groups representing different traveller profiles this workshop will ask the participants to prepare for a journey, with their current employer in mind, that takes in: day to day inclusivity at work, perceived versus real travel risk, how best to communicate, educate and train diverse travelling employees, what resources and help is available and who has responsibility or can help?

The workshop will explain some of the key drivers for diverse travel risk and use examples to demonstrate when things have gone wrong and what best practice looks like. At the end of the workshop the participants should be able to review their own travel risk training and education programs to ensure it is supporting their diverse travelling population.

Leads:
Sam Roper, Security Advisor, beTravelwise
Saul Shanagher, Director, beTravelwise

Only available for leadership pass holders – register now

Training : Reputation Risks from Fake News – Crisis Management Response
15:50 - 17:30
Training : Reputation Risks from Fake News – Crisis Management Response

Fake news is all around us. How to respond to it in an attempt to prevent fake news from becoming a crisis for your organization?

If fake news threatens your organization or even jeopardizes its continuity, the crisis management team needs to respond swiftly, but wisely. One of the factors to consider is a security response, whether cyber or physical. What would your input be from an Enterprise Security Risk Management (ESRM) perspective if the board requires it?

In this practical and interactive crisis management training you will get busy! We will combine theory, scenario and ‘bring it to the board room’ presentation elements. The quickly developing scenario challenges the participants to come up with ESRM-based response suggestions. You will need to explain (and defend) your suggested crisis response to the board in an elevator pitch manner.

ASIS Crisis Management & Business Continuity Council members and trainers act as board member assessing and challenging your suggested crisis response. So, the takeaways of this interactive training are instant!

The Crisis Management & Business Continuity Council of ASIS International supports this Leadership Training session.

Trainers:
Theo Stevens CPP, Security Director CBRE GWS
Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S

Only available for leadership pass holders – register now

Professional Track
For Professional Pass and Leadership Pass
Professional Track
Professional Track
What you need to know about ESRM
10:40 - 11:25
What you need to know about ESRM

Enterprise Security Risk Management (ESRM) is a security management approach that links security activities to an enterprise's mission and business goals through risk management methods. Learn the basics of the ESRM life cycle and understand how to begin implementing an ESRM program in any organization. Discuss the progress made in in embedding ESRM into ASIS education, certifications, standards, and communications.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment

Available for leadership pass and professional pass holders – register now

Social Media Crisis Management
11:30 - 12:15
Social Media Crisis Management

Several brands have been affected by the growing use of social media by customers, employees, vendors, cyber criminals and competitors, causing serious damage to image, and reputation of the company and its brand.

The purpose of this presentation is to help security professionals understand how to deal with social media related crisis. Actual case studies have been used to train professionals to spot trouble and prepare for it before it strikes.

Speaker: Pramod Bhatt, Senior Director, Security and Intelligence, Sanofi, IN

Available for leadership pass and professional pass holders – register now

Protecting Mobile Devices from Current Threats - Content developed by the ASIS IT Security Council
13:30 - 14:15
Protecting Mobile Devices from Current Threats - Content developed by the ASIS IT Security Council

Although mobile devices like smartphones, tablets and laptops have become standard tools in today’s world, the rapidly changing technology and the increasing complexity of technical issues has made it easier for smart hackers to manipulate your devices.

For example - did you know that your phone can be hacked through your car’s pairing device?

This and several other topics will be discussed during the presentation. Attending will give you an advantage over your peers and will not make only your mobile communication safer, but also help you advise your company and family.

Speakers:
Werner Preining, CPP, Responsible for European OPR, Interpool Security, AT
Ronald Lander, CPP, Chief Specialist, Ultrasafe Security Solutions, US

Available for leadership pass and professional pass holders – register now

Perception of Terrorist Risk Versus Actual Risk from Terrorism - Influence on the Measurement of Security's ROI
14:20 - 15:05
Perception of Terrorist Risk Versus Actual Risk from Terrorism - Influence on the Measurement of Security's ROI

Terrorist attacks have resulted in tremendous amounts of income loss, not only due to physical damage at the attack site, but also as a result of the perceived threat by potential travellers of future terrorist attacks in the region. As the effectiveness of security is measured when an offence takes place, and either the offence is stopped by security measures, or succeeds due to security vulnerabilities, it is a great challenge to measure return on investment in security measures prior to an attack taking place.

This presentation addresses several aspects relating to business perceptions of risk and security. It presents not only preferences as to security, but also risk perceptions and if these preferences and perceptions differ based on current home country.

Speaker: Ivor Terret, General Manager, Enablement Advisors

Available for leadership pass and professional pass holders – register now

Retro-Fitting Modern Security into Older Buildings
15:50 - 16:35
Retro-Fitting Modern Security into Older Buildings

Ideally, preferably before a building is developed on the drawing table but also with a renovation/refurbishment, the importance of security should be addressed by all parties (architect, client, interior designer, construction firm, insurer et cetera).

However, working in cultural buildings, private homes, or historic corporate headquarters brings additional challenges as existing structures cannot be adapted to optimise modern security thinking and measures.

In these cases, we need alternative approaches so that security can still be effectively designed, and in some cases, be integrated in an existing building without any visitor being aware of the existence of the security measures.

This presentation will explain how to perform a specific risk assessment from which to derive protection concepts against identified risks. A systematic protection scheme can then define and document the necessary structural protection measures as well as the organisational safeguards.

Speaker: Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy

Available for leadership pass and professional pass holders – register now

New Trends in Behavioural Profiling
16:40 - 17:25
New Trends in Behavioural Profiling

Cultural and historical venues by their nature are open and welcoming locations. Because of this, striking a balance between open public access and appropriate security measures is very important to ensure visitors are not intimidated and the welcoming approach is maintained. The provision of specialized training of staff and volunteers is an important way of achieving this objective. Although predictive profiling has traditionally been a human based methodology, leaps in technology have resulted in the development of predictive threat tools such as streaming data infrastructure, patented profiling technology and self-learning analytics — to create new solutions that complement the means to identify potential threats. The purpose of this presentation is to explore the use of predictive profiling as a tool to prevent or mitigate a threat before it evolves into an attack or criminal event.

Speaker: Doug Beaver, CPP, Executive Director of Protective Services, National Museum of Women in the Arts, Washington, DC

Available for leadership pass and professional pass holders – register now

Innovation Track
Innovation Track
Innovation Track
Resilience: Keep it Simple, or Die Trying
09:00 - 09:20
Resilience: Keep it Simple, or Die Trying

There is no better way to spread a message than making it easy and straightforward.

Resilience and every discipline connected to it are everyone’s business in an organization. By definition, resilience is not an exclusive property of a few technicians sitting in a closed room, but – just like lymph or blood – it runs through any level and department. Everyone in the same organization must speak and practice resilience fluently.

For this to happen, and for everyone to be involved and committed, it cannot be complicated, and it cannot be a labyrinth of technical buzzwords. Resilience has to be universal.

Speakers:
Alberto Mattia, Chief Executive Officer, Panta Ray
Paola Scotto di Frega, Head of Consulting, Panta Ray

Technical Espionage Case Studies and Countermeasures
10:40 - 11:00
Technical Espionage Case Studies and Countermeasures

Real world cases of technical espionage, with video, live audio feeds and photos of the attacks will be presented by Jason Dibley, Technical Director at QCC Global. Jason will examine the mechanics of these different espionage events, how not all state sponsored attacks are highly technical and highly funded, and at the countermeasures that may have detected or prevented these attacks.

Speaker: Jason Dibley, Technical Director, QCC Global Ltd

Artificial Intelligence and Automation in Mobility Risk Management
11:05 - 11:25
Artificial Intelligence and Automation in Mobility Risk Management

A terrorist attack takes place in central London, in proximity of your staff - what is your main concern?

Artificial Intelligence is a key driver behind todays’ mobility risk management. New technologies provide answers to our most imminent questions during a crisis: Are my employees affected? Who needs help?

The presentation shows the benefits and limits of AI in mobility risk management. It explains how technology can enable corporates to drastically speed up and scale the alerting process, from incident detection and matching travelers’ location data, up to the final call that tells you who needs help.

Speaker: Matteo Grella, Head of Research & Artificial Intelligence, EXOP

Research revealed on access control challenges for multinationals
11:30 - 11:50
Research revealed on access control challenges for multinationals

In today’s increasingly global environment it’s essential to unify your security internationally. But it can be extremely complex and demanding – especially as our world is changing more quickly every day. To identify existing and future bottlenecks and challenges for multinationals, Nedap has conducted benchmark research and stays in continuous dialogue with clients. Join this session to discover key findings relevant to your organisation.

Speakers:
Timon Padberg, Sales Manager Global Clients, Nedap
Martin Wijlens, Sales Manager Global Clients, Nedap

Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan
11:55 - 12:15
Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan

Under the GDPR, data controllers are required to notify their supervisory authority when a personal data breach occurs, unless it is unlikely to result in risks to the rights and freedoms of individuals. The notification needs to be done without undue delay, no later than 72 hours after the controller has become aware of the breach (with some exceptions). It is crucial for organizations to understand their obligations and the details of this tight timeline as well as the risk-based triggers, and what they entail. In this session, we’ll review the personal data breach rules under the GDPR and provide tips to help you map out a 72-hour personal data breach action plan.

• Understand the implications of the GDPR for controllers and processors
• Map out a GDPR-ready 72-hour personal data breach action plan
• Outline the details of this tight timeline as well as the risk-based triggers and what they entail
• Implement efficient and effective data handling practices in the face of new GDPR requirements

Speaker: David Sinclair, CIPP/E, Privacy Consultant at OneTrust

Mitigate Crises with Faster Decision Making
13:30 - 13:50
Mitigate Crises with Faster Decision Making

As advances in technology continue to increase the amount of data in the world and companies send more people to conduct business in remote locations, there is a growing expectation for organisations to gain information faster about incidents and threats that could impact them. The increased speed of information sharing means that a security team’s traditional challenges during a crisis, such as lack of time and difficulty determining what information is relevant, are compounded. Used correctly, however, this vast volume of data can be a significant enabler for security teams. Dataminr will examine effective crisis response in the modern world. Within the first 30 minutes, a security manager must make crucial decisions quickly to protect the company and its people. Real-time, publicly available data, like social media, blogs, and the dark web, is essential for early event awareness, improved visibility, and more confident decision making.

Speaker: Tim Willis, EMEA Director Corporate Security Sales, Dataminr

Why a Unified Approach to Critical Event Management Improves Operational Resilience
13:55 - 14:15
Why a Unified Approach to Critical Event Management Improves Operational Resilience

According to Forrester companies are investing significant resources in sophisticated controls to protect their employees, brand and assets from critical events. These disruptive incidents (ranging from cyberattacks to terrorist activity) increasingly lead to business impacts such as operational losses, brand damage, and concerns for employee health and safety.

Despite the investments being made, companies struggle to optimize their critical event management (CEM) operations, slowing down response time and creating potentially life-threatening confusion.

In this session we will look at how a unified approach to critical event management meets the demands for rapid response and speedy incident remediation.

Speaker: John van Laerhoven, Managing Director Benelux, Respond, An Everbridge Company

The weakest link in today’s physical security … and no, it’s not people
14:20 - 14:40
The weakest link in today’s physical security … and no, it’s not people

For the last decade we have been investing in the same security controls over and over again: access control, video surveillance and intrusion detection. Enhancements have been made in each of those domains, but the weaknesses that existed 10 years ago are still weaknesses today. We’ll discuss a fundamental flaw in how we approach physical security, look at what we can learn from the cyber security space where a similar mistake was made but addressed, and propose an alternative approach to move to better and smarter physical security.

Speaker: Bart Vansevenant, Co-founder, Ticto

Your building is talking. Are you listening?
14:45 - 15:05
Your building is talking. Are you listening?

If you’re only using your access control system to lock and unlock doors, you’re underutilizing your system! As everything from people, lights to locks become connected, there are new opportunities to interact with and better understand your people and your building through a single pane of glass. This talk course is designed to shed light on how, by connecting these components to your access control system, you can drive operational efficiency and cut overall costs and make more informed decisions.

Speaker: Jean-Philippe Deby, Business Development Director – Europe, Genetec

The Promises of New Technology – What do we actually need, how will it help us and what are the limitations?
15:50 - 16:10
The Promises of New Technology – What do we actually need, how will it help us and what are the limitations?

Big Data, Machine Learning, Artificial Intelligence and Augmented Reality.. The list of “Silver Bullet Buzzwords” that we’re told will revolutionise the security industry is long. But what do security professionals actually need, what can we expect from new technology and where does the human being fit in all this? Mads will give a talk in non-technical language about what these new technologies are about and share his research on what security professional say they need, how technology can help and where it might fall short compared to the human being.

Speaker: Mads Paerregaard, Founder & CEO, Human Risks

What Security Should Steal From Marketing
16:15 - 16:35
What Security Should Steal From Marketing

In today’s hyper distracted world, attention is limited. If we want to successfully raise awareness, change behaviour and influence culture, we need to engage with our audience first. Unfortunately, security awareness programs often fail right there, at that first hurdle.

This presentation will reveal some of the latest tools and techniques that savvy marketers have been using for years, capturing our attention, orienting our behaviour and moving us into taking certain actions. Join us and learn what makes us ‘click’, and how to leverage psychology to achieve positive change in your organization.

Speaker: Heimo Grasser, CPP, Awareness Strategist, SAME Solutions

Case Study: Digitalization of Systems Brings Smarter Buildings
16:40 - 17:00
Case Study: Digitalization of Systems Brings Smarter Buildings

The latest digital evolutions of technologies for security systems and building management have enabled full smart building functions like for the Brattorkaia Building.

All Building Technologies like cameras and card readers have now moved to IP and enabled full integrations with building management including latest wireless and IoT communications. Smart building functions for building owners, occupants and facility managers to improve the building productivity are now embedded and are the major progress of last decades as they really HELP building stakeholders. The Brattorkaia Powerhouse Building Norway is showing how the JCI integration of IP systems lead the way to safer, more secure, more productive and more sustainable buildings.

Speaker: Yann Mahieu, Director Key Account Solutions, Johnson Controls, CH

Data-driven crime prevention using AI
17:05 - 17:25
Data-driven crime prevention using AI

The digitalization of the industry has led to a rapid increase in data. Data can have an immediate value, such as an alarm can reduce or eliminate the severity of an incident. Once acted upon, we stop attributing value to the data and treat it as a cost to manage. In this session, we’ll discuss how to turn your data in to intelligence through AI and advanced analytics. Intelligence which improves the safety of people, assets and societies.

Speaker: Viking Johansson, Director of Product Management, Intelligent Products, Securitas AB

Career Centre Track
Career Centre Track
Career Centre Track
Women in Security Breakfast
08:00 - 09:00
Women in Security Breakfast

Organized by Lynn de Vries, CPP, PCI, COO, DutchRisk Join us for this unique opportunity to network with women in security from all over the globe.

The competitive advantage of holding a professional certification
10:40 - 11:25
The competitive advantage of holding a professional certification

Are you ready to take the next step on your career ladder? ASIS offers four certification programs, which are designed for security managers who want to prove that they have the security knowledge and skills to bring to their organizations. The Certified Protection Professional (CPP) is designed for those who manage all aspects of an organization’s security functions, the Professional Certified Investigator (PCI) is for those who conduct security-related investigations, the Physical Security Professional (PSP) is for those who manage physical security operations, and the Associate Protection Professional (APP) is ASIS’s newest certification program and is meant to validate your understanding of the fundamentals of security management. Come to this session to learn what the exams test, the eligibility requirements, studying tips, and more!

Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International

European Salary Survey
11:30 - 12:15
European Salary Survey

ASIS and SSR have teamed up for the 2018 SSR & Executive Profiles salary survey which reviews more than 4,000 security professionals across the finance sector, manufacturing, extractives, FMCG and logistics. The results will be presented here. Gain competitive insights on your position in the labour market and how your sector is performing.

Speaker: Peter French, CPP, CEO, SSR Personnel, UK

Career Development Workshop Part 1
13:30 - 14:15
Career Development Workshop Part 1

Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.

Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK

Career Development Workshop Part 2
14:20 - 15:05
Career Development Workshop Part 2

Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.

Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK

Burnout: When bad things happen to good security professionals
15:50 - 16:35
Burnout: When bad things happen to good security professionals

Job burnout, or work-related stress, is an ever-present risk for busy security manager. While almost none of the alpha types in our industry are willing to admit it, many of us have worked the crazy hours that lead up to burnout – and more than a few of us have discovered the negative consequences of work-related stress too late. In this interactive session, we take a look at what causes burnout, and what security personnel and management can do to prevent it.

Speaker: Mac Segal, Vice President of Business Development & Security Consulting, EMEA, AS Solution

The ESRM Skills Cocktail
16:40 - 17:25
The ESRM Skills Cocktail

ESRM = Managing the enterprise’s security risks through the use of fundamental risk principles. So, what do the skills, qualification, experience and knowledge sets needed to achieve this look like? The clues are in the name - the requirements of the modern security professional are a mixed cocktail: a base of physical security or cyber-security; a measure of project management; a sprinkling of business management; a pinch of investigation; a dose of negotiation skills; a smidgen of strategy all topped off with a generous portion of communication powers. So how do you mix this cocktail?

This presentation will provide guidance for those in the profession on how to achieve the heterogeneous mix of skills and qualifications required for the future.

Speakers:
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs, UK
Mike O'Neil, CPP, PSP, Managing Director, Optimal Risk Group - Resilience, Risk, and Security advisors, UK

Thursday, 28 March 2019

Friday, 29 March 2019

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
Leadership Track 1
Leadership Track 1
Leadership Track 1
Welcome Coffee
08:15 - 09:10
Welcome Coffee

Securing an Innovation Culture at Facebook, Inc
09:10 - 09:55
Securing an Innovation Culture at Facebook, Inc

Facebook's core values of being bold, focusing on impact, moving fast, being open, and building social value allow Facebook to deliver on its mission to give people the power to build community and bring the world closer together.

To foster innovation and collaboration, an open plan office space and a welcoming environment for frequent meetings with external visitors are essential to enable the business.

Nick will use this as an example to illustrate:
• Progressive approaches to creating a safe and secure workplace
• How the company evaluates its risk appetite, and the role of security function in this dialogue
• How governance structures are evolving, with a focus on security as the business enabler and ESRM concepts

Speaker: Nick Lovrien, CPP, Chief Global Security Officer, Facebook, US

Only available for leadership pass holders – register now

Engaging Business Executives in ESRM
10:00 - 10:45
Engaging Business Executives in ESRM

Learn how security leaders can successfully engage business leaders in the security risk decision process.

We will cover the role of the security and business leaders in ESRM, and business-based risk mitigation program development.

This session is intended as preparation for the “Bring it to the Board Room” training session following the coffee break.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
Volker Wagner, Vice President Security, BASF Group
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
More speakers to be confirmed

Only available for leadership pass holders – register now

Soft targets - Using lessons learned from high profile incidents to improve prevention and protection through public private partnership
11:30 - 12:15
Soft targets - Using lessons learned from high profile incidents to improve prevention and protection through public private partnership

This presentation will use real case studies to highlight the key role partnerships play and how they are helping to shape improvements in the security of soft targets.

Learning from experience is a crucial opportunity that should not be overlooked. Sharing those learnings with others should also be viewed as an opportunity.

Recent attacks in Paris, Brussels and Bamako all provided us with unique experiences and in each case the value of public-private and private - private partnerships played a crucial role in our crisis management.

Since the attacks, Radisson Hotel Group has increased its contributions to collaborative efforts around the world including the Global Counter Terrorism Forum initiative on soft target protection, the EU action plan for protection of public places and European hotel industry trade association projects to increase awareness, preparedness and resilience in the European hotel, restaurant and catering industries.

Speaker: Geert Coremans, CPP, Director of Global Safety and Security, Radisson Hotel Group Corporate Support Office, BE

Only available for leadership pass holders – register now

Brexit – Business Continuity Perspectives
12:20 - 13:05
Brexit – Business Continuity Perspectives

The ASIS Europe 2019 venue and dates were confirmed long before Article 50 was signed, so it is by coincidence the event concludes on the date planned as “Brexit Day”. This session has been scheduled to address the latest developments and update attendees on how businesses are assessing the situation and preparing contingency plans (or not). With expert insight from BCI surveys, we will explore how management and business continuity planning may impact the security and risk outlook for businesses.

Speaker: Rachael Elliott, Leader Thought Leadership Team, Business Continuity Institute, UK

Only available for leadership pass holders – register now

Closing plenary Session: Digital Transformation: cut through the hype and get started (securely)
14:15 - 15:30
Closing plenary Session: Digital Transformation: cut through the hype and get started (securely)

All leadership and professional pass holders for Friday are invited to join us for this concluding session. Purchase your pass now

Digital transformation is today’s hottest business topic. Companies of all sizes across many sectors are seeking ways to leverage new technology. So how do security practitioners get involved without drowning in buzzword soup? And how do you support innovation whilst also supporting good security practice?

Digital transformation requires us to look at business models, roles, and tools, in different ways. Some companies are focused on efficiency or incremental process gains, whilst others are completely re-inventing their business models and creating new ways to engage with customers.

Often, debate on digital transformation is polarised between utopian visions of a world full of convenient, personalised services and dystopian visions of mass unemployment, catastrophic cyberattacks and malicious AI. So, this session has been designed by ASIS to get a grip on core issues facing security professionals and identify key opportunities to advance, and key areas of concern.

Practically speaking, already many systems that traditionally had their primary function as security can now be leveraged for different purposes. For example; IP cameras generate business insights in retail, or traffic management in a smart city; risk assessment data can be packaged and re-sold as intelligence; access control provides insights for building management etc.
So how do we capitalise on digital opportunities? And how do we do it safely, securely and profitably?

After a short scene-setting presentation by Michael Gips, CPP, Chief Global Knowledge Officer, ASIS International, we will use live-polling and the expert facilitation skills of Prof. Martin Gill, Managing Director, Perpetuity Research to guide us through an interactive discussion and lively ideas exchange.

If you’re advanced on your digital journey, please join us to share and benchmark – and if you’re setting out, this is a great opportunity to learn from firsthand experience.

Farewell Drink
15:30 - 16:00
Farewell Drink

President's Reception
20:00 - 22:00
President's Reception

Leadership Track 2
Leadership Track 2
Leadership Track 2
Industrial Control Systems - Threats, Vulnerabilities, Risk and Resilience
10:00 - 10:45
Industrial Control Systems - Threats, Vulnerabilities, Risk and Resilience

Recent incidents provide disturbing evidence of the stark vulnerabilities of Industrial Control Systems (ICS) to natural, human-factor accidental, and malicious threats.

This presentation includes numerous current, high-profile examples of ICS threats, vulnerabilities, and the severe consequences of such incidents. The presentation will help you learn and understand:
• What ICS includes;
• Where ICS can be found;
• Potential threats and vulnerabilities to and from ICS;
• Why ICS assets are critical to enterprise, business, operations, and mission objectives;
• How to take a proactive, protective systematic management approach to identify and protect the enterprise.

This presentation provides a wake-up call to everyone who manages or is responsible for critical ICS assets and their architectures, systems, facilities and infrastructure due diligence.

Speaker: Michael Bilney, Global Senior Principal – Asset Risk and Resilience, Cardno

Only available for leadership pass holders – register now

GDPR One Year On – Vetting and Other Security Challenges
11:30 - 12:15
GDPR One Year On – Vetting and Other Security Challenges

GDPR will have been in force for almost a year by the time ASIS Europe 2019 takes place. This session will take a look back at relevant case studies, analyse incidents and address myths around this complex legislation. Ady van Nieuwenhuizen, expert privacy lawyer will guide the discussion with insights from security leaders to frame key issues. We will highlight and address several key challenges for security practitioners.

Know Who You Hire – the Challenge of Vetting Just Gets Harder
Presented by Gilad Solnik, CPP, PSP, Director, Security and Loss Prevention, EMEA, Global Security Operations (GSO), Amazon

Ensuring the safety and security of your employees, company information, and business operations is essential for any modern business. Therefore, knowing who you’re hiring into your organisation is essential. Pre-employment screening measures are aimed at ensuring a safe and secure work environment while setting a foundation for good personnel security (Cpni.gov.uk, 2015). This discussion reviews the how privacy and data protection initiatives and the GDPR has introduced new challenges and restrictions on vetting and pre-employment background checks, and will provide an exchange of potential practical solutions.



Storing CCTV Footage Securely – Reassessing the Criticality of Servers
Presented by Henk Marsman, Lead Product Manager Identity and Access Management, Rabobank, NL

Since the adoption of GDPR CCTV data has become distinctly privacy sensitive. Subsequently, the criticality of systems storing CCTV data was revised (and increased), and access control measures need to be adapted accordingly. This impacted the governance of access to these systems, the periodical reviews on access, and the actual control measures in place for these systems. This discussion will cover key questions security professionals should address when considering access to such systems post GDPR.

Only available for leadership pass holders – register now

How devices bring customer and employee access together
12:20 - 13:05
How devices bring customer and employee access together

Managing identies and access for employees has significant different characteristics than that of customers. In many organizations these two are separately handled. With the rise of connected devices, ranging from small to large in size, it becomes less obvious to separate management of these two populations. Or in other words, there are new ways to combine the management of identities and access of employees and customers.

This presentation will cover the similarities and differences between identity and access management (IAM) of employees and customers. We will then discuss the impact of connected devices for the user and for IAM solutions.

Speaker: Henk Marsman, Lead Product Manager Identity And Access Management, Rabobank, NL

Only available for leadership pass holders – register now

President's Reception
20:00 - 22:00
President's Reception

Leadership Training Track
Leadership Training Track
Leadership Training Track
Cyber – Physical Threat Response Training
09:10 - 10:45
Cyber – Physical Threat Response Training

This scenario-based 90-minute workshop will take you through a Red Teaming exercise focused on identifying adversaries’ methods of operation to target the logical, physical and human gate of the organization. Red teaming, as part of a proactive security cycle, is an effective operational intelligence tool. It also helps to create awareness and need for the implementation of a program with counter measures. By discussing the necessary awareness and necessary response to cyber, physical and human related threats the workshop introduces the participants to a method of response preventing unnecessary victims. Awareness is the key word. At the end of this session participants will understand the potential “external” and “internal” threat, why it appears, and what counter measures are effective.

Speaker: Berndt Rif, CPP, PCI, Chief Security Officer, Ministry of Health, Welfare and Sport, NL

Only available for leadership pass holders – register now

Bring it to the Board Room – ESRM Presentation Training
11:30 - 13:05
Bring it to the Board Room – ESRM Presentation Training

This session will take the form of a role-play training exercise where participants will be assigned into teams to address one of 5 security risk concerns from company executives.

Note – this exercise is in how to present the solution, not in judging the solution itself. Teams will be given a template PPT to create an executive presentation to propose a program based on the risk concern of a “company executive”. ESRM experts will engage teams in conversations about the approaches to executive presentations.

Teams will present their proposals to the “Executive Council” and will receive feedback on their presentation and engagement.

Important: participants should attend the prior “Engaging Business Executives in ESRM” session as preparation for the exercise.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment
Volker Wagner, Vice President Security, BASF Group
Mike Gips, CPP, Chief Global Knowledge & Learning Officer, ASIS International
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs
Mark Schreiber, Principal Consultant , Safeguards Consulting, Inc., US

Only available for leadership pass holders – register now

President's Reception
20:00 - 22:00
President's Reception

Professional Track
For Leadership and Professional Pass
Professional Track
Professional Track
Info-centric Crisis Management, a new way of Crisis Management Thinking
09:10 - 09:30
Info-centric Crisis Management, a new way of Crisis Management Thinking

Info-centric Crisis-management is a new way of thinking within one of the biggest corporate banks in the Netherlands. This ‘idea’ is about creating a new system for Crisis-management where we combine internal and external data sources to act in an early stage when a possible crisis is in sight. This system combines data with roles and responsibilities for those who have to act during a crisis. The system provides an automated choice for a certain scenario. The main goal is to act faster, and creating a Common Operational Picture (COP) and possibly to act before a crisis is hits.

Speaker: Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL

Only available for professional and leadership pass holders – register now

Built Environment Security as a Business Enabler
09:35 - 09:55
Built Environment Security as a Business Enabler

A clear understanding of security risk allows suitable control measures to be selected. This presentation will use several case studies to show how to blend physical, technical and procedural controls to safeguard the built environment and its assets. The presentation will also highlight the risks of taking the “tick box approach” to security design.

Speaker: Christopher Aldous, CPP, PSP, Director, Design Security Ltd, and Board Director, ASIS International UK Chapter, UK

Only available for professional and leadership pass holders – register now

A clearer roadmap to your security organization’s maturity
10:00 - 10:45
A clearer roadmap to your security organization’s maturity

Learn about a new, practical and easy to understand maturity model that can be implemented in hours rather than days.

What is your current security capability? How do you compare yourself against industry benchmarks? And where do you need to focus your efforts?

Maturity models aim to answer those questions and more, but unfortunately, most of them require expensive consultancy to implement and are often far too academic.

A more practical approach is clearly needed. This presentation is going to give you a maturity model that can be easily implemented in hours rather than days. A clear and visual way to easily understand the maturity of all areas of your security organization. You can now derive a clear roadmap that tells a compelling story and will help you obtain the necessary leadership buy in and additional resources for your program.

Speaker: Heimo Grasser, CPP, Senior Security Manager MEA, Medtronic, UAE

Only available for professional and leadership pass holders – register now

Putting the S into IoT: ENISA's efforts on IoT cyber security
11:30 - 12:15
Putting the S into IoT: ENISA's efforts on IoT cyber security

The talk will focus on ENISA's efforts to promote IoT cybersecurity by proposing baseline IoT security measures complemented with sectorial vertical studies that look into IoT security in particular sectors, e.g. Industry 4.0, automotive.

ENISA has been working with stakeholders across the board to address the many challenges of IoT security. ENISA advocates for a risk-based and context-based approach that looks into the particularities of sectorial IoT deployments and proposes specific security measures to address relevant risks. In parallel, understanding the ecosystem nature of IoT and the interdependencies, baseline IoT security recommendations have been proposed by ENISA to facilitate security interoperability in a horizontal manner. The talk will discuss related efforts and activities of ENISA and ways the community can engage with the Agency to further improve IoT cybersecurity.

Speaker: Apostolos Malatras, Expert in Network and Information Security, European Network and Information Security Agency, GR

Only available for professional and leadership pass holders – register now

Terrorism in Europe 2019
12:20 - 12:40
Terrorism in Europe 2019

This condensed, fast-paced briefing offers a future-oriented look on terrorism trends in Europe for the coming year, and Jihadi extremist activity in particular. Anchored in an analysis of the latest developments in Q4 2018 and Q1 2019, the presentation will use several perspectives to outline key concerns for the remainder of 2019. This will include consideration of the likely effects of several general elections, international events, upcoming terrorism trials, select migration developments, and Brexit on the terrorist threat in a range of European countries. The update will conclude with an update on newly evolving CT best practices among security departments of large corporations.

Speaker: Glenn Schoen, CEO, [email protected], NL

Only available for professional and leadership pass holders – register now

ISO 31030 Guidance for Managing Travel Risk
12:45 - 13:05
ISO 31030 Guidance for Managing Travel Risk

For organisations whose employees undertake regular travel, Duty of Care is an important concern. In addition, multiple regulators oblige organisations to ensure reasonable travel security for employees. Travel Risk Management (TRM) assesses risk and provides security to staff. However there are no rules, or internationally recognised Codes of Practice, that indicate what should actually be done in order to be compliant.

ISO (International Organisation for Standardisation) has begun developing a standard which will resolve doubts and provide guidance, ISO 31030. ASIS is playing an active role in this.

Learn about work in progress and how you can have your say to ensure that the voice of the Security Profession is heard and acted upon.

Coordinating speaker: Roger Warwick, CPP. CEO of Pyramid Temi Group (Travel Risk Management), Member of ISO 31030 technical committee, Member of ASIS Commission on Standards & Guidelines

Speaker: Werner Cooreman, CPP PSP, CSO Solvay Group, Vice-Chair of ASIS Commission on Standards & Guidelines, ASIS Liaison to ISO 31030 technical comittee

Innovation Track
Innovation Track
Innovation Track
Sharing is caring: Duty of Care and the Sharing Economy
09:10 - 09:30
Sharing is caring: Duty of Care and the Sharing Economy

The travel sharing economy, which comprises services such as ride-sharing and house-sharing, has quite literally taken off around the world. Ease of accessibility and use while mobile means non-traditional ground transport and accommodation services are increasingly being used by business travellers. Despite the popularity, only 14 % of organisations surveyed by Ipsos MORI and International SOS* have integrated this in their travel policy. Have you? Join this innovation track to understand the benefits, risks and legal considerations of incorporating share economy services into your business travel policies and how best to do so within a travel risk management framework.

* Business resilience. Trends Watch 2019; Ipsos MORI & International SOS; October 2018.

In October 2018, Ipsos MORI conducted a global survey targeted to those who organise, influence, or are responsible for, their organisation’s travel and risk mitigation policies. These survey findings represent responses from 640 people, across all types of organisations which have had previous contact relating to business travel health and security with International SOS, in 82 countries.

Speaker: Xavier Carn, Vice-President Security EMEA and Medaire, International SOS & Control Risks

Insurance and security: finding common ground in a volatile security risk environment
09:35 - 09:55
Insurance and security: finding common ground in a volatile security risk environment

How close cooperation between corporate insurance and corporate security departments will make the management of security risks more effective and efficient.

There is common agreement among security and insurance professionals that security incidents are increasingly complex and global. Traditional insurance vehicles help indemnify the damage from such incidents. But to be able to successfully manage the velocity of security incidents anywhere around the world, companies require a level of expertise at immediate global readiness that companies realistically can’t maintain in-house.

The insurance industry has responded to this need for 'anywhere and anytime' immediate expert support, with a new insurance concept: Insurance as a Service. This new trend implies that security professionals and insurance professionals with their expertise and products are playing both an increasingly crucial role in ensuring the success in security incident response and related insurances.

In this inter-active workshop attendees will develop insight in the interplay between insurance and security and will walk away with practical tips on what to discuss with insurance professionals when purchasing insurance as a service.

Speakers:
Stefan Sievers, Head of Business Development Special Risks Europe, Hiscox
Jeroen Meijer, Senior Partner, Control Risks Group

True or False in the Age of Fake News
10:00 - 10:20
True or False in the Age of Fake News

What happens when we as individuals can not trust media in the same way we used to? Misleading media information during the attacks on Westgate Mall in Kenya, Drottninggatan in Stockholm and the Armed Conflict in Donbass Ukraine led to severe consequences. Social media as well as the increased commercialization and politization of traditional media present challenges to individuals and organizations. But this also present opportunities for actors in the security sphere and elsewhere.

Speaker: Johan Tinnerholm, COO, Global Warning System

How Access Control is impacted by cloud, mobile and GDPR
10:25 - 10:45
How Access Control is impacted by cloud, mobile and GDPR

Many of the changes the IT industry currently is undergoing are also deeply affecting the Access Control industry. These overall trends towards integrating mobile devices for daily use and the support of cloud infrastructure are changing the way how Access control is used and operated. This is also bringing new challenges for system supplier as well as customers when it comes to Cyber Security and GDPR compliance. More than ever solutions require to be designed for this environment and users have to be aware of their advantages but also exposures when it comes to managing their security, organization and personnel

Speaker: Thomas Herling, Senior Vice President Global Business Owner Electronic Access and Data, Dormakaba

Cyber Security Maturity Assessment
11:30 - 11:50
Cyber Security Maturity Assessment

Increasing complexity and continuous change of IT environments challenge organizations to gain transparency on their cyber security. The Cyber Security Maturity Assessment supports with a unique method to measure the maturity and effectiveness of cyber security measures and results are documented using the Cyber Security Maturity Cockpit. In addition it provides an overview of the cost-value ratio of identified measures based on ISO/IEC 27001. By creating transparency the Cyber Security Maturity Assessment enables decision-makers to take the right decisions for optimal use of human and monetary resources and to strengthen the cyber security resilience of the organization following a holistic approach.

CSMA enables organizations to answer questions like:
- What do we in relation to cyber security?
- How good are we with what we are doing?
- What does it cost?

Speaker: Christoph Hagenbuch, Cyber Security Manager, innogy SE

How to Secure an Open Campus
11:55 - 12:15
How to Secure an Open Campus

Many enterprises have large corporate campuses where hundreds or thousands of employees work at various sites around the world. These sites are complex environments, characterized as open and minimally staffed by security resources. Given this, they are notoriously difficult to protect and vulnerable to active assailant and terrorist threats as evidenced by the recent attack on YouTube’s corporate headquarters in San Francisco, CA. Our universities around the world share similar attributes and have been investing in cutting-edge technology to help protect their staff and students. Attend this session to learn about their transformative advancements and fulfill your duty of care to your employees.

Speaker: Les Allan, Director of SafeGuarding & Logistics Services, Heriot-Watt University

Vendor Partnering. The A to Z of Developing Great Relationships
12:20 - 12:40
Vendor Partnering. The A to Z of Developing Great Relationships

Everyone wants great vendor relationships based on long-term productive partnering, mutual business goals, and trust. Easy to say but how easy to achieve? Going from A-Z, including embedded vendor staff to complete outsourcing the presentation will highlight how its done and what makes lasting relationships more than just saying win-win.

Speaker: Andy Williams, CPP, VP Business Development, Safe Hotels Alliance

Video Surveillance in Marine Environments
12:45 - 13:05
Video Surveillance in Marine Environments

The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We will analyse VS for ships and explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use, and what features a camera station must have to be installed on a ship and so on.

Speaker: Alessandro Franchini, Marketing & Communication Manager, Videotec

Career Centre Track
Career Centre Track
Career Centre Track
Town Hall (for ASIS Members)
08:15 - 09:00
Town Hall (for ASIS Members)

Diversity and Inclusion – A Competitive Edge for the Security Profession
10:00 - 10:45
Diversity and Inclusion – A Competitive Edge for the Security Profession

Diversity is a prominent challenge facing businesses today. Diversity has to be part of a company’s DNA – and it has to work as part of a company’s overall desire to hire the best possible people. Research shows that diversity makes workplaces more effective and efficient, plus a diverse workplace also promotes a company’s ability to adapt to any situation. In the panel, experienced security professionals from different countries and backgrounds will share their challenges and success stories. Furthermore, they will discuss diversity perspectives, experiences and skill sets that seem to be invaluable to the success of talent and to support modern business leaders.

Moderator: Alexander Zippel, CPP, Corporate Security, Deutsche Post DHL Group

Panellists include Christina Duffey, CPP, 2019 ASIS International President, Senior Vice President and Regional Director, SOS Security, Letitia Emeana, CPP, PSP, EMEA Snr Security Manager, Tesla, Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, and Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL

The growth of young professionals into the security industry (a live case study)
11:30 - 12:15
The growth of young professionals into the security industry (a live case study)

Are we guilty of cloning security specialists? Young professionals entering the security industry may increasingly be the answer to changing the face of the sector.

The operational cog which turns the mechanism of the security industry is routinely led by the 'Grey, Pale and Male' from society. With the guidance of experienced security professionals, ASIS strives to bring through young professionals to the fore of the sector, which is spearheaded by James Morris in the UK. No less does David Clark, UK Chair of ASIS, hold this belief. He argues that we should not 'clone' our predecessors, but rather we should nurture younger professionals into a 'security culture'. Indeed, just as security is modernising and evolving into new frontiers such as cybersecurity and artificial intelligence, so too should the personnel who are increasingly managing it.

Speakers:
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Leo Kelly, Security and Risk Management Analyst, Francis Crick Institute, UK
James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK

The New APP Certification
12:20 - 12:40
The New APP Certification
 

Learn about ASIS’s newest certification program: the Associate Protection Professional (APP). The APP has been developed for security management professionals who are just starting their security career. To be eligible to sit for the APP exam you need 1-4 years of experience (depending on your educational history). During this session, the ASIS Certification Director will be there to answer your questions about this exciting new program.

Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International

Effective Management for Security Professionals Program
12:45 - 13:05
Effective Management for Security Professionals Program
 

Security professionals must have strong interpersonal skills, including negotiation, leadership, and team-building strengths, to successfully collaborate and engage employees in a security risk management strategy against all security threats. In response to these new demands, IE Business School has created this Program in partnership with ASIS International, through which you will be able to (among other learnings):

• Enhance business acumen and effectiveness
• Develop a strategic understanding, anticipatory and critical thinking.
• Become effective leaders and better decision-makers
• Develop communication and negotiation skills for persuasive influencing.

Speaker: Almudena Diaz Vidal, Associate Director Executive Education, IE Business School

Friday, 29 March 2019