Critical Learning for Security Professionals

ASIS Europe 2023 will offer multiple tracks of valuable learning opportunities as well as networking and connection sessions – onsite and online.

Our programme format will be focused on discussion, debate, collaborative learning, and lots of networking time.

The programme will feature two main themes – The Evolving Risk Landscape and Security as Part of the Business. The two Leadership Tracks will feature Case-Study Clinics, Game Changers, and Interactive Workshops and Debates, whereas the Innovation Track sessions will showcase innovative solutions and new technology.

 

While the programme is in preparation, please find the 2023 preliminary schedule below so you can see what to expect. You can also see our past 2022 Programme for reference.

Preliminary 2023 Schedule

Table Color Code:

   

Two online event days will complement the event and take place on 2 March and 27 April. More information will follow.

Sunday 22 May 2022 – Onsite

Monday 23 May 2022 – Onsite

Exhibition open all day.
Exhibition open all day.
Exhibition open all day.
Women in Security breakfast (open to all)
08:15 - 08:55
Women in Security breakfast (open to all)

The WiS breakfast session is an opportunity to help people network, it’s an informal session we hope will be fun, encourage discussion and creativity.

Opening Session - Keynote: War Economy
09:00 - 09:45
Opening Session - Keynote: War Economy

War economy - devastated from covid, it looks like the revival of the post covid economy will not be via green economy but by a war economy.

Can the West destroy Russia economically? Can the West now use its economy as a destructive force and weapon to crumble an empire without a single shot at their territory? How can digitalization help? Are we moving into a New Republic of the Internet where there are no more borders and no more nations? How will the new world order change businesses and our way of life? Which dreams have collapsed and which new hope can we adhere to?

Tomáš Sedláček offers a fresh, philosophical approach to the economy of good and evil, with critical insights on the societal and business impacts we may see in the years ahead.

Speaker: Tomáš Sedláček, Author of Economics of Good and Evil, Philosopher of Economics

Dialogue with Ukraine Members
09:45 - 10:30
Dialogue with Ukraine Members

An interactive panel discussion directly following the keynote. It will include insights from our ASIS community on the ground in Ukraine and experience sharing amongst attendees in Prague.

Facilitated by Eduard Emde, CPP, Head of Health, Safety & Security Section, ESA European Space Agency & ASIS Europe 2022 Conference Chair and Radek Havlis, CPP, ASIS Conference Vice Chair and Member of the European Board of Directors

Speaker info to follow

Networking Break
10:30 - 11:15
Networking Break

Leadership Track 1: The Evolving Risk Landscape
Leadership Track 1: The Evolving Risk Landscape
Leadership Track 1: The Evolving Risk Landscape
Geopolitical uncertainty – the business consequences
11:15 - 12:30
Geopolitical uncertainty – the business consequences
11:15 - 12:30

How do shifts in the power balance and unstable relationships between states impact businesses operating around the world? What do you need to be aware of and watch out for in your organisation? An expert presentation by Jens Paulus and Nana Kalandarishvili will be followed by roundtable peer to peer discussions facilitated by Torsten Wolf on the most likely scenarios that will unfold, what specific business risks they may bring about, and what is the role of security in risk mitigation efforts.

Facilitator : Torsten Wolf , Head of Group Security Operations, Zurich Insurance Company

Speakers: Nana Kalandarishvili , Manager, PWC
and Jens Paulus, Partner, PWC

Networking Lunch
12:30 - 14:00
Networking Lunch
12:30 - 14:00

AI and Security: debunking myths and understanding risks
14:00 - 15:15
AI and Security: debunking myths and understanding risks
14:00 - 15:15

How do algorithms actually work and why don’t they always behave the way they were intended? What does this mean for a future increasingly influenced by and even reliant on AI?

Matteo Grella will first take you through the fundamentals of understanding AI in non-technical language.

We’ll then use an AI risk monitoring use case to explore key questions of trust, liability, and the role of the security professional in an interactive debate facilitated by Radek Havlis.

Facilitator: Radek Havlis, CPP, ASIS Europe 2022 Conference Vice Chair and Member of the European Board of Directors
Speaker: Matteo Grella , Head of Research & Artificial Intelligence, Crisis24

Networking Break
15:15 - 15:45
Networking Break
15:15 - 15:45

Travel Risk - Changes in the Landscape
15:45 - 17:00
Travel Risk - Changes in the Landscape
15:45 - 17:00

Business travel may never be the same again. For organisations with staff around the globe, what are the impacts of new standards? How does the geopolitical arena influence travel risk? What do increased expectations on duty of care and inclusive company cultures mean for those entrusted with keeping business travellers safe?

Facilitator: Eduard Emde, CPP, Head of Health, Safety & Security Section, ESA European Space Agency & ASIS Europe 2022 Conference Chair

Speaker:
- Shaun Boulter, Global Head Operations & Security – Corporate Mobility, AXA Partners UK

Refresh & Reconnect
17:00 - 17:30
Refresh & Reconnect
17:00 - 17:30

Leadership Track 2: Security as Part of the Business
Leadership Track 2: Security as Part of the Business
Leadership Track 2: Security as Part of the Business
From the boxing ring to the tango floor – stop fighting and start partnering with HR
11:15 - 12:30
From the boxing ring to the tango floor – stop fighting and start partnering with HR
11:15 - 12:30

For many companies, the workplace has undergone radical and likely permanent change. With remote working and increased flexibility the norm, how do security and HR overcome competing priorities to find the right balance between security, privacy and company culture? How do security teams rate in terms of diversity and inclusion? What are the key skills gaps and how can they be addressed?

After a frank exchange of perspectives on how security view HR and vice versa by Hilti colleagues Eva Mueller and Nicolas Haas, you will work with your peers through a scenario based exercise dealing with the security challenges which arise when companies are under pressure to recruit and onboard employees remotely.

Facilitator: Eva Mueller, Global HR Business Partner, Hilti Corporation

Speaker: Nicolas Haas, Global Head Cyber Risks, Control and Assurance at Hilti Corporation

Same Crisis, Different Priorities: Collaborating with Risk and Compliance
14:00 - 15:15
Same Crisis, Different Priorities: Collaborating with Risk and Compliance
14:00 - 15:15

During a time of crisis, prioritisation is key and the speed of leadership decisions is crucial. How do your priorities as a Security leader compare to those of your Chief Risk and Compliance Officer? How do you balance duty of care, legal requirements, company ethics, and security risk management reality in crisis planning and preparedness?

Join us to explore how security and compliance may pursue different approaches but need to come together on two fictitious but realistic crisis scenarios:

- An internal fraud investigation which leads to a run-in with local law enforcement

- A ransomware attack with a dilemma in choosing quicker data recovery or the risk of payments to a sanctioned state

This will be a highly interactive session with tabletop exercises and expert guidance.

Facilitator: Michel de Jong, CPP, Head of Global Security, COFRA Holding.
Speakers: Markus Epner, Head of Academy, F24 AG, and Ing. Lucie Andreisová, Ph.D., CE Head of Compliance and Ethics, Tesco Stores Czech

Networking Break
15:15 - 15:45
Networking Break
15:15 - 15:45

Aspiring Leaders Workshop
15:45 - 17:00
Aspiring Leaders Workshop
15:45 - 17:00

*Open to all participants onsite* How do we get the best of out of the next generation of security leaders? What are the career insights that can help them develop? What do young security professionals bring that is unique and perhaps undervalued? And, what do they need and expect to help them thrive in the work environment?

Join roundtable peer-to-peer discussions that help us support the career development of aspiring security leaders. Add your ideas and voice to ASIS’ efforts to secure the future of the profession.

Facilitator: Erwin van de Weerd, Area Physical Security Manager BeNeLux at SAP & Vice-Chair ASIS Global Young Professionals Community
Speakers:
Ben Suurd , Regional Head of Security EU/AME Region, Reckitt
Mariana Duarte , Smart Buildings and Digital Solutions Manager – Europe, Johnson Controls
Peter French , Chief Executive, SSR® Personnel
Simon Rüegger , Head of Security Switzerland and Austria at EY & ASIS Switzerland Young Professional Officer

Refresh & Reconnect
17:00 - 17:30
Refresh & Reconnect
17:00 - 17:30

Innovation Track
Innovation Track
Innovation Track
Smart Buildings: Impacts on Security Megatrends Over the Next Decade.
11:15 - 11:35
Smart Buildings: Impacts on Security Megatrends Over the Next Decade.
11:15 - 11:35

This session will focus on the functional shift from buildings being considered solely as fixed assets to becoming active players in companies´ efforts to tackle the challenges of the next decade such as the growing cyber risks for Buildings, the new security cloud-based models, and the need to include health and sustainability at the core of Security.
Speaker: Mariana Duarte , Smart Buildings and Digital Solutions Manager – Europe, Johnson Controls

Taking a peek at a future-proof world of access control
11:40 - 12:00
Taking a peek at a future-proof world of access control
11:40 - 12:00

If we asked you to guess how many organizations believed their current access control system is future-proof, what would be your guess? And if we took it one step further and asked you to imagine what the perfect future proof access control system could look like, would you be able to help design one? Well, these are two of many questions we posed to enterprise companies around the world, using a 3rd party market research firm. Some of the results will be shared by Frank ter Kuile of Nedap Security Management at ASIS Prague 2022. You’ll then get peek into the future of access control, and what these results implicate for the state of the security industry, with our guest speaker Lee Odess.

Speakers: Lee Odess, , Keynote Public Speaker and Author of "The 6 Phase Changes Shaping Access Control”
Frank ter Kuile, , Head of Marketing, Nedap Security Management

NextGen Security Operations: A Roadmap for the Future
12:05 - 12:25
NextGen Security Operations: A Roadmap for the Future
12:05 - 12:25

The question for security leaders is no longer if their company will be affected by a crisis, but when—no matter the size, industry or location. Crises don’t discriminate.

COVID-19 taught us that today’s security professionals are moving from being crisis managers to crisis leaders. This means you must leverage complimentary tools, develop relevant skill sets in your people, and build processes that are future-proofed for an evolving threat landscape.

In this session, we will explore the themes shaping the future of security: cyber-physical risks, security models and frameworks, and how to build resilience in the face of new and unexpected challenges.

Speaker: Chris Brozenick, Senior Director of Product Marketing, Dataminr

Ultima Ratio Smartphone? – GYOD versus BYOD!
14:00 - 14:20
Ultima Ratio Smartphone? – GYOD versus BYOD!
14:00 - 14:20

Security sensitive employers still allow their staff not only to bring private (BYOD) Smartphones but also they let them use private phones for security related services such as Access, ID Services and Authentication. Let us remember that Smartphones, even iPhones, may be infected and corrupt. Secure ID alternative is the SmartCard, i.e. equipped with highly encrypted DESFire EVx transponder. They may be considered as really secure but comfort and process intelligence and functionality is missing. An answer could be: Let us give every staff member a Smartphone, owned by the organization, not by the individual. Of course not allowing to use them privately, to give them back before leaving work. For this kind of procedure, Smartphone lockers have been invented. Is this really state of art? What, if a smart security device would exist, which is owned and operated by the organization, without private functions and truly secure? That´s why you need to learn a new acronym: GYOD – which stands for Get Your Operated Device. Uncompromised security, combined with privacy, Digital Proof of Work and Comfort is the goal. Does such a new device category, an “Interactive Smart Badge” make sense? What should it look like and how could it be integrated into corporate security infrastructure. Frieder Hansen from Infrafon looks forward to discuss pros and cons of access devices from SmartCard over Smart Badge to SmartPhone.

Speaker: Frieder Hansen , founder and owner of Infrafon GmbH

Resilience Fusion Center: Buzzword or the next TOM (target operating model) for Corporate Security
14:25 - 14:45
Resilience Fusion Center: Buzzword or the next TOM (target operating model) for Corporate Security
14:25 - 14:45

Sharpening and shifting organisational focus to resilience are foundational steps to building strength for the long term. Given the variety of threats today's business leaders face, it's important to design a built-for-purpose, crisis-agnostic program with the flexibility to adapt to whatever comes next. Positioning and socialising organisational resilience into a company’s cultural DNA and as an umbrella (capability) over core competencies and across technology, operations, data, workforce and financial domains require a central hub function, i.e., a Resilience Fusion Center. Are (Corporate) Security professionals ready and positioned (enough) to contribute to or steer such a Resilience Fusion Center (function/ position)?

Speakers: Jens Greiner, Director, PwC Germany and Daniel Krause, Senior Manager, PwC Germany

Hybrid Working and its Effect on Business Continunity.
14:50 - 15:10
Hybrid Working and its Effect on Business Continunity.
14:50 - 15:10

Embracing hybrid ways of working and recovering is not just convenient, but sensible too. The global COVID-19 pandemic has had a dramatic and permanent effect on how we work, but it’s merely accelerated a trend that’s been underway for several years, as organizations progressively move to a ‘hybrid’ way of working and recovering: at home, a local office and occasionally at corporate HQ. Join us to get a better understanding of how these trends will affect your teams and company moving forward from a continuity perspective.

Speaker: Karel Pelan , Country Manager, IWG

Networking Break
15:15 - 15:45
Networking Break
15:15 - 15:45

Changing the Game: Physical Security Transformed
15:45 - 16:05
Changing the Game: Physical Security Transformed
15:45 - 16:05

What is the next big step forward in securing high-risk environments? What breakthrough is now possible thanks to data optimisation and artificial intelligence?

Our presentation will examine a novel approach to optimising security performance currently experimented in European data centres. We will share lessons and insights on going beyond compliance, on eliminating critical fail factors, on developing new ways to achieve and measure security. In a setting where failure is not an option, security just got smarter

Speaker: Peter McGowan, Global Account Director, ICTS Europe

The Good Security Leader from the Human Factor Perspective
16:10 - 16:30
The Good Security Leader from the Human Factor Perspective
16:10 - 16:30

This presentation addresses the various drivers of employee cybersecurity awareness and show the success factors leading to a successful training or to a successful phishing simulation. In addition, myths and false promises of the security industry will be dispelled. Furthermore, we will show which trainings should be taught, what an awareness program should look like and which training recommendations are mentioned in the NIST Security Framework. Last but not least, we will discuss which key metrics should be used to measure employees awareness and which mistakes can be avoided.

Speaker: Palo Stacho, Head of Operations, LUCY Security AG

Protecting Assets in an Age of Hybrid Threats
16:35 - 16:55
Protecting Assets in an Age of Hybrid Threats
16:35 - 16:55

The threat landscape for executives, VIPs and staff around the globe is hybrid: gates and guards, bits and bytes. COVID forced security teams to “reset” their approach and absorb digital risk protection supporting physical security when physical protection isn't an option. Executives and VIPs are more digitally active and expected to have an opinion on polarising global events, too; from Hero to Zero in seconds. Security teams must be constantly aware of this. However, too often, there are unmanageable amounts of digital exhaust and noise. We should focus on certain assets, build threat models around them, prove they work, setup for scalability and move on to wider ambitions.

Speaker: Herro Zoutendijk , Regional Director EMEA, Constella Intelligence

Refresh & Reconnect
17:00 - 17:30
Refresh & Reconnect
17:00 - 17:30

Security Leaders Networking Dinner - Sponsored by JCI
19:30 - 22:00
Security Leaders Networking Dinner - Sponsored by JCI

Formerly called President’s Reception.

Sponsored by JCI, this is the perfect opportunity to meet and network with fellow industry professionals in the prestigious settings of the renaissance style Martinic Palace, in the Prague Castle area.

Tickets are required for this function (included in Leadership All Access ticket).

Tuesday 24 May 2022 – Onsite

Exhibition open all day.
Exhibition open all day.
Exhibition open all day.
ASIS Europe Morning Run (open to all)
06:15 - 07:30
ASIS Europe Morning Run (open to all)
06:15 - 07:30

Stay fit and network at the same time!

A tradition since many years, join fellow security professionals and industry partners for a run. The route will take us along the ramparts of the Vyšehrad Castle with views on the Vltava (Moldau) river.

Distances are about 5k and 10k.

Meeting point: 06.10 AM in front of the Holiday Inn Prague Congress Centre (adjacent to the Prague Congress Centre).

Don’t be late, we will leave at 06:15 AM sharp.

ASIS member Town Hall (open to all ASIS members)
08:15 - 08:55
ASIS member Town Hall (open to all ASIS members)

Leadership Track 1: The Evolving Risk Landscape
Leadership Track 1: The Evolving Risk Landscape
Leadership Track 1: The Evolving Risk Landscape
Societal change and unrest – external and internal risk considerations
09:00 - 10:30
Societal change and unrest – external and internal risk considerations

What are the online and real-life risks created by today’s polarised societies? What can populism, activism, fake news or conspiracies on social media mean for your organisation’s risk outlook? What are the implications in the workplace?

Facilitator: Godfried Hendriks, CPP , 2020 ASIS President

Speaker: Orhan Topcu, Senior Regional Security Manager - Germany-Switzerland, Austria, Northwest Europe - Turkey, Microsoft

Networking break
10:30 - 11:00
Networking break

Ransomware and Cyber-Physical Security Strategy
11:00 - 12:30
Ransomware and Cyber-Physical Security Strategy

Explore the critical overlaps between cyber and physical risks. An overview of business use cases and recent ransomware incidents will be presented by cyber expert Nathan Green, and then the related challenges for physical security leaders will be brought to life by Letitia Emeana in roundtable peer to peer exercises. If you're concerned by knowledge or process gaps in your mitigation strategies, don’t miss this opportunity to discuss how integrated cyber-physical business systems are impacting the role of physical security professionals.

Facilitator: Letitia Emeana, CPP, PSP, Group Security Capability Manager, Unilever

Speaker: Nathan Green, Senior SME, Cyber Risk, Dataminr

Networking Lunch
12:30 - 13:45
Networking Lunch

Crisis Response in Reputational Crises - Workshop
13:45 - 15:15
Crisis Response in Reputational Crises - Workshop

Our number one priority is protecting our organisation’s brand. At the same time fake news is increasingly becoming a major threat. How do you respond to fake news from a crisis management perspective?

If fake news threatens your organisation or even jeopardises its continuity, the crisis management team needs to respond swiftly, but wisely. One of the factors to consider is a security response, whether cyber or physical. What would your input be from an Enterprise Security Risk Management (ESRM) perspective if the board requires it?

In this interactive ‘bring it to the boardroom’ crisis management training you will get busy! The training combines theory with a scenario to get you developing solution-oriented response elements on the spot. The quickly developing scenario challenges participants to come up with ESRM-based response suggestions. And you need to explain (and defend) your suggested crisis response to a panel of seasoned senior practitioners (the board) in an elevator pitch manner.

Because of the format, the takeaways of this interactive training are instant. Building on the success at previous events, the training format is repeated, but the scenario is new and will confront you with new dilemmas based on actual cases. Nothing faked!

Facilitators: Erik De Vries, CPP, PSP Director, DutchRisk and Glenn Schoen CEO, Boardroom@Crisis BV



Closing Session
15:15 - 15:45
Closing Session

Details to come

Farewell Drink
15:45 - 16:15
Farewell Drink

Leadership Track 2: Security as Part of the Business
Leadership Track 2: Security as Part of the Business
Leadership Track 2: Security as Part of the Business
ESRM in Action
09:00 - 10:30
ESRM in Action

The key principles behind Enterprise Security Risk Management are well known and accepted – but how are companies actually implementing the model? How does it support risk based approaches to security strategy? How do you use ESRM to improve the positioning and understanding of the security function? How does it help in measuring the effectiveness of security strategies and incident response?

Security leaders from diverse sectors – telecoms, chemicals, and sport - will share their experience of addressing security risk within the context of business strategy. Join us for a lively mix of case study insights and peer to peer dialogue.

Join this session for a mix of case study insights from security leaders in major enterprises, and peer to peer dialogue.

Facilitator: Axel Petri, Deputy Chief Security Officer, Deutsche Telekom
Speakers:
-Werner Cooreman ‎, Senior Vice President – Group Security Director, Solvay Group
- Hendrik Grosse-Lefert‎, Head of Department Services & Security Chief Security Officer & Integrity Officer, Deutscher Fussball-Bund e.V.

Networking Break
10:30 - 11:00
Networking Break

Corporate Sustainability Objectives – From Impacts to Opportunities for Security
11:00 - 12:30
Corporate Sustainability Objectives – From Impacts to Opportunities for Security

With action plans to limit climate change at the top of regulatory agendas, sustainability and circularity can no longer be standalone CSR initiatives, they must be embedded in business plans. Mitigation and adaptation are essential - both to stay resilient and to meet customer expectations.

How does security become part of the sustainability strategy and what does this mean for your security outlook and operations? Combining short, focused case studies with extensive discussion and interaction, this session will give you vital insights on one of today's critical business challenges.

Facilitators: Inge Huijbrechts, Global Senior Vice President Sustainability, Security and Corporate Communications, Radisson Hotel Group and James Morris, CPP, Head of Security Services, EMEA, Corporate Protection Services, Aon.

CSO Lunch & Learn (upon invitation only)
12:30 - 13:45
CSO Lunch & Learn (upon invitation only)

7 Powerful Perspectives for 2022 and Beyond
13:45 - 15:15
7 Powerful Perspectives for 2022 and Beyond

Seven speakers, will have 10 minutes each to raise awareness of a perspective they believe needs more attention – that may be an issue facing security professionals, a risk that is going unnoticed, an opportunity that the community should embrace, or a life-changing lesson learned.

Join this lively conclusion to our parallel sessions.

Innovation Track
Innovation Track
Innovation Track
Pegasus mobile phone spy software attack. What you need to know
09:00 - 09:20
Pegasus mobile phone spy software attack. What you need to know

The aim of the presentation is to inform and educate security professionals of the surveillance threat by the Pegasus mobile phone spying software and its discovery and evolution over the last 3 years. From first discovery to the fascinating story, of how this software attack was used in one of the worlds most high profile divorce cases. What the software does how it gets on the victims phone and who may be at risk.

Speaker: Jason Dibley, Director, QCC Global Ltd

How digital transformation brings security closer to business
09:25 - 09:45
How digital transformation brings security closer to business

We believe that digital technologies enables a new way of working to meet changing business and market requirements. Digital transformation, in contrast to digitization and digitalization, goes beyond traditional roles like security, research, sales, or production. Because, digital transformation begins with your understanding of, and how you engage with, the business. Building a 21st-century security approach on lists, excel, or paper drawings just isn’t sustainable. Instead, thinking, planning and creating digitally, sets you up to be agile, flexible and ready to grow. Together. Side by side with the business.

Speaker: Jeroen Harmsen, CPP, PSP, , Teamlead Global Business Development, Nedap

How to start leveraging AI Video Analytics for and beyond security
09:50 - 10:10
How to start leveraging AI Video Analytics for and beyond security

A new generation of smart cameras that can be flexibly equipped with Al video analytic applications are changing the way video analytics can be deployed into new and existing camera installations. Running directly on powerful cameras, these AI analytics solve traditional security applications - intrusion detection or perimeter detection - as well as specialized needs for many verticals, such as crowd control in stadiums, heatmapping in retail or worker safety in manufacturing. Leveraging these new possibilities, however, poses challenges to the traditional security organization and requires new skillsets as well as increased cross-functional collaboration. This presentation will look at how security professionals can start harnessing these innovative solutions to add value to their organization beyond security.

Speaker: Jose Carlos Faria Agrela , Senior Sales Executive EMEA, Azena

Leveraging intelligence to keep board-level attention following Ukraine
10:15 - 10:35
Leveraging intelligence to keep board-level attention following Ukraine

The Russian invasion of Ukraine marked the second time since Covid-19 that corporate leadership has turned to intelligence and security teams to solve unprecedented problems. The conflict has settled, but the knock-on risks are now only beginning to play out. A key challenge will be retaining board-level attention on the latter. This session will investigate lessons learned from the Ukraine crisis and help us benchmark how organisations are managing the ongoing fallout. We will also explore how this is an opportunity to turn intelligence into board-level success.

Speaker: Hugo Crossthwaite, Intelligence Operations Manager, Dragonfly

Networking Break
10:30 - 11:00
Networking Break

How Crisis Leadership Precedes Crisis Management and Why is it Important for You
11:00 - 11:20
How Crisis Leadership Precedes Crisis Management and Why is it Important for You

Effective crisis management is the need of the hour. When it comes to handling a crisis, being prepared with best laid plans is essential. Crisis Leadership takes a step further and goes beyond emergency response to crisis anticipation and preparedness.
Organisations that can look at the worst-case scenarios and adapt their structures to support effective command and control, supported by tools and sound principles will benefit from swift decision-making at the various stages of crisis management to ensure minimal damages.

Learn why Crisis Leadership is crucial for modern business and how organisations can adapt operational structures and implement proven strategies.

Speaker: Markus Epner, Head of Academy, F24 AG

Duty of care versus Travel Risk Management! Is safe legal and is legal safe?
11:25 - 11:45
Duty of care versus Travel Risk Management! Is safe legal and is legal safe?

A lot of risk managers in the corporate travel security community use "duty of care" and "travel risk management" interchangeably, but the two even though heavily connected have very different meanings.

We will take a look at the moral and legal obligations of both. Also how the new working environments such as work from home and work from anywhere is creating confusion and mayhem in te4h boundaries of what an organisation is liable for.

Speaker: Shaun Boulter, Global Head Operations & Security – Corporate Mobility , AXA Partners UK

How Effective Intelligence Professionals Can Redefine an Organisation’s Success
11:50 - 12:10
How Effective Intelligence Professionals Can Redefine an Organisation’s Success

Critical to managing and mitigating risk is having accurate, timely risk intelligence. Yet the abundance of information, misinformation, and noise muddies the waters and determining exactly which information to react to makes effective decision-making increasingly difficult. These challenges are driving increased investment in intelligence professionals to help businesses anticipate changes and disruptions in their operating environments. A successful intelligence programme will intimately understand the organisation's operating environment, business model, and global footprint to ensure nearly all risks and consequences are considered. The session discusses best practices to consider when implementing an intelligence programme to maximize its effectiveness. Additionally, we will review how intelligence professionals can reduce uncertainty and improve resilience in an ever-changing risk landscape.

Speaker: Ben Thorne , Manager, Intelligence, Crisis24

Multisite Building Management Challenges - Sustainability and Digitalization
12:15 - 12:35
Multisite Building Management Challenges - Sustainability and Digitalization

Multisite buildings face the same challenges as larger buildings often, without the same resources. However many of the same building system advances that help make large facilities healthier, more sustainable and profitable are now available for small and medium buildings. Join this session where we will cover new and coming regulations on corporate sustainability including greenhouse gas emissions and energy efficiency and how you can use new technology to enable your multisite building portfolio.

Speakers: Rafael Barbudo Martinez, Sr Business Development Manager South Europe, Honeywell Building Management solutions HBS, and Arjun Nandanuri, Business Development Manager, Honeywell Building Solutions

Building Enterprise Resilience in a Hybrid World - Managing Evolving Risks: Prepare, Respond, Recover & Thrive
13:45 - 14:05
Building Enterprise Resilience in a Hybrid World - Managing Evolving Risks: Prepare, Respond, Recover & Thrive

Many trends have been evolving during the global pandemic: Automation, end-to-end digitisation, ecommerce, smart technology, outsourcing and working from home all accelerating on the adoption curve, whereas other trends we are seeing are regressing, such as capital expenditure, global supply chains, offshoring and in-person services or interactions. We are also seeing people increasing their focus on issues of health, safety, environment, sustainability and governance. These changing trends and behaviours are introducing new risk paradigms to manage and ensure enterprise resilience, readying any organisation for their next threat or global shock. But what does operational resilience really look like, and how can we continue to adjust from a digital, physical and IT perspective while remaining relevant and successful?

Speaker: Owen Miles, Field CTO CEM, Everbridge

You don't need to panic, but you do need to be prepared!
14:10 - 14:30
You don't need to panic, but you do need to be prepared!

Physical security incidents are associated with a strong emotional impact. Affected by these emotions, decision-makers can make wrong choices with effects on business continuity and efficiency. Through these decisions, time, people, various assets, inventory, and money are resources that will be impacted from optimally serving the business. Is it possible to avoid these unwanted effects? Can we step aside and overcome human emotions? Adaptability, speed of reaction and the need for compliance through application are desirable characteristics of a risk management system. To what extent can we rely on an integrated digital solution to achieve these goals?

Speaker: Florin Marica , Managing Director, Ultravision Consult

2022 Online Days Programme

Thursday 28 April 2022 - Online

Opening & Expert session
Opening & Expert session
Opening & Expert session
Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis
15:00 - 15:55
Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis

With the Ukraine conflict having quickly overshadowed the pandemic recovery in continental caliber crises, security and crisis management professionals across Europe are experiencing trying times. While operational and logistical crisis risks are getting the lion's share of attention these days, reputational risk remains one of those mainstays that can impact an organization as hard as any, including in the context of the Ukraine crisis.

ASIS European Board members Erik de Vries and Glenn Schoen will be presenting an interactive crisis game at the ASIS European Conference in Prague in May. This 28 April online session in the run-up to that event serves as a primer for that game, offering context on how the conflict in Ukraine is causing reputational risk to emerge in ways old and new.

Speakers:
Erik de Vries , CPP PSP, Director, DutchRisk
Glenn Schoen , CEO, Boardroom@Crisis BV

In this online session the presenters will:
> Share their thoughts on the Ukraine and potential reputational risks for your organization
> Outline security's role in addressing these
> Present select Lessons Learned

Innovation Track 1
Innovation Track 1
Innovation Track 1
4 Essentials Which Need To Be Considered When Facing A Cyber Attack
16:20 - 16:40
4 Essentials Which Need To Be Considered When Facing A Cyber Attack

2022 is set to become the year of cyber insecurity. With the ongoing digitalisation of business processes and value chains, companies are becoming progressively dependent on their information and communicaiton infrastructure. This is not new, but the news alerts on successful cyber attacks are more regular than ever.
According to the BCI Resilience Report 2021, 61% of organizations reported up to five cyber-attacks in the past year. Therefore, it is no longer a case of whether a cyber-attack will hit your company, but when. Get prepared and learn four essentials how to act in case of a cyber-attack.

Speaker: Mrs Christine Forstmann, Sales and Key Account Manager, F24 AG

Opening Session incl. Expert presentations & interview based on audience questions
15:00 - 15:55
Opening Session incl. Expert presentations & interview based on audience questions
15:00 - 15:55

Innovation Track 2
Innovation Track 2
Innovation Track 2
Smart Buildings: Impacts on Security Megatrends Over the Next Decade
16:00 - 16:20
Smart Buildings: Impacts on Security Megatrends Over the Next Decade

This session will focus on the functional shift from buildings being considered solely as fixed assets to becoming active players in companies´ efforts to tackle the challenges of the next decade such as the growing cyber risks for Buildings, the new security cloud-based models, and the need to include health and sustainability at the core of Security.
Speaker: Mariana Duarte , Smart Buildings and Digital Solutions Manager – Europe, Johnson Controls

The future of corporate security – the trends that won’t go away
16:20 - 16:40
The future of corporate security – the trends that won’t go away

While there is a constantly shifting and unpredictable global security environment, the way in which corporate security is managed seems to be evolving in a more predictable way. Convergence between traditionally separate disciplines has started to create very complex and increasingly senior security positions where business acumen is just as important as technical know-how.
Alongside this, AI based products are changing the skills needed in traditional security roles and there is an increasing interconnectivity between security and financial risk management. By analysing these trends, security and risk managers can better position themselves to be the leaders of tomorrow.

Speaker: Michael Roberts, , Chief Physical Security, AXA Partners

Innovation Track 3
Innovation Track 3
Innovation Track 3
Duty of Care in Armed Conflict: Lessons Learned from Ukraine
16:00 - 16:20
Duty of Care in Armed Conflict: Lessons Learned from Ukraine

What does Duty of Care look like when war breaks out? How far can you go to support your people and what are the practical challenges that you will need to overcome? A team from Crisis24 was first deployed to Kyiv in January 2022 to help companies with personnel and operations in Ukraine. They remain in the region working out of the surrounding countries as well as at the borders of, and inside Ukraine itself. In this session they will be sharing some of the challenges and lessons learned from the ongoing situation, which remain relevant to this and other global conflict zones.

Speaker: Graeme Hudson , Associate Director, All Hazards Response, Crisis24

The resurrection of Geopolitics - new challenges or opportunities for Corporate Security
16:20 - 16:40
The resurrection of Geopolitics - new challenges or opportunities for Corporate Security

Developments in recent years have shown that we are witnessing the resurrection of Geopolitics. Experts argue that questions of world order and global governance are again increasingly replaced with ones of territory and military power. While the resurrection of Geopolitics changes the landscape by exposing new security threats, and challenges, it also creates new opportunities by giving the possibility of predicting certain developments. However, a main question for (corporate) security professionals remains for the moment: Is Corporate Security really ready and well positioned for Geopolitics?

Speakers: Nana Kalandarishvili , Manager, PWC
and Jens Paulus, Partner, PWC

Table Talks
Table Talks
Table Talks
1. Resilience Fusion Center: Buzzword or the next TOM (target operating model) for Corporate Security?
16:40 - 17:00
1. Resilience Fusion Center: Buzzword or the next TOM (target operating model) for Corporate Security?

Discussion facilitated by Jens Greiner, Director, PwC Germany and Daniel Krause, Senior Manager, PwC Germany

2. Shelter in place versus Evacuation
16:40 - 17:00
2. Shelter in place versus Evacuation

Discussion facilitated by Graeme Hudson, Associate Director, All Hazards Response, Crisis24

3. The Smart Buildings and the digital transformation of physical security operations
16:40 - 17:00
3. The Smart Buildings and the digital transformation of physical security operations

The Smart Buildings will play an active role in addressing Security Megatrends in the next decade. This table talk will focus more specifically on their impact on the following Megatrends: Artificial Intelligence / Cybersecurity / Increased Interoperability. The discussion will deep dive into digital transformation challenges raised by table talk participants and how to manage them.
Discussion facilitated by Peter Stiphout, Business Development Digital Integrations Continental Europe, Building Technologies & Solutions, Johnson Controls

Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis
15:00 - 15:55
Opening - Crisis Management and Reputational Risk: Thoughts on the Ukraine Crisis
15:00 - 15:55

With the Ukraine conflict having quickly overshadowed the pandemic recovery in continental caliber crises, security and crisis management professionals across Europe are experiencing trying times. While operational and logistical crisis risks are getting the lion's share of attention these days, reputational risk remains one of those mainstays that can impact an organization as hard as any, including in the context of the Ukraine crisis.

ASIS European Board members Erik de Vries and Glenn Schoen will be presenting an interactive crisis game at the ASIS European Conference in Prague in May. This 28 April online session in the run-up to that event serves as a primer for that game, offering context on how the conflict in Ukraine is causing reputational risk to emerge in ways old and new.

Speakers:
Erik de Vries , CPP PSP, Director, DutchRisk
Glenn Schoen , CEO, Boardroom@Crisis BV

In this online session the presenters will:
> Share their thoughts on the Ukraine and potential reputational risks for your organization
> Outline security's role in addressing these
> Present select Lessons Learned

Thursday 12 May 2022 - Online

Expert session
Expert session
Expert session
Overcoming Polarisation and Maintaining Healthy Dialogue
15:00 - 15:55
Overcoming Polarisation and Maintaining Healthy Dialogue

Addressing a variety of political, societal and environmental topics where collaboration and finding consensus will be vital for the future of Europe and the wider world is a challenge due to increasingly polarised viewpoints.
This online session will explore:
• What happens to organisational effectiveness when polarisation stops important discussions from taking place, or at least makes them difficult to have in a constructive way?
• What are the cognitive processes behind this, and how can you spot when this is happening?
• What role can security leaders play in creating a culture that facilitates inclusive discussion?
• How can you be a role model, encouraging diversity of thought and healthy debate?

An expert presentation from Balvinder Singh Powar , associate professor at the IE Business School will be followed by live Q&A. Balvinder’s expertise includes creative and strategic input, business development and senior management, team leadership, relationship management and business mediation.

Facilitator: Godfried Hendriks, CPP , 2020 ASIS President

Innovation Track 1
Innovation Track 1
Innovation Track 1
Buildings of the Future: a people centric approach to healthier facilities
16:00 - 16:20
Buildings of the Future: a people centric approach to healthier facilities

Buildings are at the point of no return to the pre-pandemic way of operating as they need to become healthier, safer and more secure, people-centric and sustainable. The critical elements of creating healthier and more sustainable buildings are: IAQ, Lighting, UVC, Monitoring – AI & Analytics, Energy Efficiency & Sustainability.
The session will explore how to create healthier facilities providing a safer and more inviting return for the workforce by using new technologies and harnessing the power of IoT and data. Turning buildings into healthier and safer facilities also means to make them more profitable and sustainable assets, able to drive greater performance.

Speaker: Adhishesh Sood, Healthy Buildings Strategic Alliances Leader, Honeywell Building Technologies

Managing Risk and Improving Resilience in a Volatile World
16:20 - 16:40
Managing Risk and Improving Resilience in a Volatile World

The world in which businesses operate is getting more complex, unpredictable, and volatile. Meanwhile, PwC reports that 95% of business leaders say their crisis management capabilities need improvement.

During a crisis, your response is only as good as the information you use to inform your decision-making and risk workflows. So, risk leaders wanting to reduce the impact of a crisis should attend this session as we answer:

- What can businesses do to minimise disruption and keep their people and assets safe?
- What impact can a proactive, coordinated response have on operational effectiveness?
- How can leaders increase the ROI of their security investments, providing faster time to value?

Speaker: Chris Brozenick, Senior Director of Product Marketing, Dataminr

Opening Session incl. Expert presentations & interview based on audience questions
15:00 - 15:55
Opening Session incl. Expert presentations & interview based on audience questions
15:00 - 15:55

Innovation Track 2
Innovation Track 2
Innovation Track 2
TSCM Update & The Importance of TSCM Post Pandemic
16:00 - 16:20
TSCM Update & The Importance of TSCM Post Pandemic

The aim of the presentation is to inform and educate security professionals of the new surveillance threats that have emerged over the last couple of years. Looking at new advances in eavesdropping technology. Also to highlight the security risks that continued during the COVID pandemic. Many companies security posture changed and many offices were left empty for long periods of time. Providing an opportunity for technical attacks.

This presentation looks at some of the security risks associated with working from home and the need for an increased TSCM and Cyber Security requirements and technical vigilance when offices return to normal working.

Speaker: Jason Dibley, Director, QCC Global Ltd

How can we lead resilience in crisis situations? The risk mitigation through innovative tools and human adaptability on change
16:20 - 16:40
How can we lead resilience in crisis situations? The risk mitigation through innovative tools and human adaptability on change

During a pandemic situation or any other unexpected crisis with steep evolution, the availability of human resources and continuous adaptability to rapid changes can determine the effectiveness of security incident management. Acknowledge – validate – solve or escalate to closure are the most common steps of a security standard operating procedure in alarm incident management. Early adoption of new tools, sharing of data and ensuring full knowledge of all aspects of a situation as it evolves should be considered key elements of security monitoring. Should these elements be independent or dependent on educated and qualified human resources?

Speaker: Florin Marica , Managing Director, Ultravision Consult

Innovation Track 3
Innovation Track 3
Innovation Track 3
The Importance of Building Resilient Businesses in a Covid-19 World - Digital Transformation in the New Normal
16:00 - 16:20
The Importance of Building Resilient Businesses in a Covid-19 World - Digital Transformation in the New Normal

As organizations adjust to new hybrid and remote work environments following covid-19, the parameters of their delivery mechanisms, and what it means to be resilient, are changing. It’s the unbreakable connection between resilience and technology, and its power in allowing organizations to respond, adapt and expand safely and securely. What does operational resilience really look like, and how can we continue to adjust from a digital, physical and IT perspective while remaining relevant and successful?

The current IT Operations landscape is constantly evolving and the challenges and threats are increasing at the same if not at a higher rate. Digital Operations play a key role in establishing organizational resilience and thus, establishing agile and resilient processes is a top priority.

Speaker: Owen Miles, Field CTO CEM, Everbridge

Leveraging intelligence to keep board-level attention following Ukraine
16:20 - 16:40
Leveraging intelligence to keep board-level attention following Ukraine

The Russian invasion of Ukraine marked the second time since Covid-19 that corporate leadership has turned to intelligence and security teams to solve unprecedented problems. The conflict has settled, but the knock-on risks are now only beginning to play out. A key challenge will be retaining board-level attention on the latter. This session will investigate lessons learned from the Ukraine crisis and help us benchmark how organisations are managing the ongoing fallout. We will also explore how this is an opportunity to turn intelligence into board-level success.

Speakers: Hugo Crossthwaite, Intelligence Operations Manager, Dragonfly, and Thomas Murphy, Strategic Intelligence Manager, Dragonfly

Table Talks
Table Talks
Table Talks
Home working technical Surveillance threats
16:40 - 17:00
Home working technical Surveillance threats
16:40 - 17:00

Facilitator: Daniel Tippen, Project Manager, QCC Global Ltd.

How is your business adopting enterprise Resilience?
16:40 - 17:00
How is your business adopting enterprise Resilience?
16:40 - 17:00

Facilitator: Owen Miles, Field CTO CEM, Everbridge

How far do you provide your own Duty of care for your travelling staff or do you outsource?
16:40 - 17:00
How far do you provide your own Duty of care for your travelling staff or do you outsource?
16:40 - 17:00

Has your organisation adopted the work from anywhere/work from home model and if so is this now your new norm or are you still adjusting? If adjusting what are the pain points is it dealing with new demands from the new style of employee, managerial control of workers, performance benefits/issues?

Facilitator: Shaun Boulter, Global Head Operations & Security – Corporate Mobility, AXA Partners

Is it even possible to be prepared for a scenario as complex as a cyber crisis?
16:40 - 17:00
Is it even possible to be prepared for a scenario as complex as a cyber crisis?
16:40 - 17:00

Today, digital assets have become indispensable. The entire world is becoming more digitalized - sharing and storing information has never been easier before. In response to this rapid connectivity, cyber threats are also rising to a new level of frequency, sophistication and complexity.

In this Table Talk, Stefanie Hach, F24 Head of Sales & Marketing for F24 Luxembourg, will talk about the challenges companies face in preparing for and responding to a cyber attack, the dilemma of communicating during such an event, and what can be done to meet the challenges.

Facilitator: Stefanie Hach, Head of Sales & Marketing Lux, F24

Overcoming Polarisation and Maintaining Healthy Dialogue
15:00 - 15:55
Overcoming Polarisation and Maintaining Healthy Dialogue
15:00 - 15:55

Addressing a variety of political, societal and environmental topics where collaboration and finding consensus will be vital for the future of Europe and the wider world is a challenge due to increasingly polarised viewpoints.
This online session will explore:
• What happens to organisational effectiveness when polarisation stops important discussions from taking place, or at least makes them difficult to have in a constructive way?
• What are the cognitive processes behind this, and how can you spot when this is happening?
• What role can security leaders play in creating a culture that facilitates inclusive discussion?
• How can you be a role model, encouraging diversity of thought and healthy debate?

An expert presentation from Balvinder Singh Powar , associate professor at the IE Business School will be followed by live Q&A. Balvinder’s expertise includes creative and strategic input, business development and senior management, team leadership, relationship management and business mediation.

Track 1

The evolving

risk landscape

  • geopolitical tension
  • societal unrest
  • technology and the rise of AI
  • new considerations on travel risk

Track 2

Security as part of the business

  • what the post COP26 economy means for security teams
  • internal collaboration with Risk Management
  • Compliance and HR
  • how to function effectively in remote work environments
  • engaging the next generation of security talent
  • how ESRM is being implemented

Track 3

Innovation

  • the latest research and developments in security tools, technology, and service solutions

ONLINE DAY 2 - Available on demand (except networking sessions)

Stage 1
Stage 1
Stage 1
Ice Breaker - Speed Dating session
12:30 - 12:55
Ice Breaker - Speed Dating session

Keynote Interview - Live Conversation with a Friendly Hacker
13:00 - 13:35
Keynote Interview - Live Conversation with a Friendly Hacker
13:00 - 13:35

Covid-19 has changed the way we do business, and criminals have quickly adapted to the new reality. Keren Elazari, TED speaker, security analyst and friendly hacker speaks with us about cyber security in times of crisis: lessons learned from the past year as well as trends & predictions and to build resilience, and what future-forward organizations are doing right now to stay ahead of current challenges.

Speaker: Keren Elazari, CISSP, Cyber Security Analyst, Author & Researcher

Evolving Cyber Threats & Essential Mitigation Strategies
13:40 - 14:25
Evolving Cyber Threats & Essential Mitigation Strategies
13:40 - 14:25

David Cox, Director of Mastercard’s European Cyber Resilience Centre will explore what today’s globally connected companies are facing in the cyber threat arena and important steps in staying resilient. Highlights will include:
- Cyber crime and the cyber criminal – understanding the profile of attacks and attackers - Top cyber threats including the evolution of Ransomware
- Third Party Risk Management – Black Swan Event or daily dilemma?
- The role of Mastercard’s European Cyber Resilience Centre in addressing the global threat landscape
- How collaboration and communication is key to a “Security in Unity” strategy

Expert presentation & video Q&A

Speaker:
David Cox, Director, European Cyber Resilience Centre, Mastercard

ENISA efforts on Artificial Intelligence Cybersecurity
14:30 - 15:15
ENISA efforts on Artificial Intelligence Cybersecurity
14:30 - 15:15

In this talk, the EU Agency for Cybersecurity (ENISA) will discuss the main findings from its seminal work on mapping the Artificial Intelligence (AI) Threat Landscape. By following a lifecycle view of the AI ecosystem, ENISA worked on identifying relevant assets and following a methodological approach the Agency highlighted threats to said assets and their potential impacts. The report aims to set the baseline on AI cybersecurity paving the path to a better understanding of the AI threat landscape as well as opening the discussion on how to effectively and efficiently address them.

Expert presentation & video Q&A

Speaker: Dr. Apolstolos Malatras, Team Leader, Knowledge and Information Team, European Union Agency for Network & Information Security

Table Talks
15:15 - 16:00
Table Talks
15:15 - 16:00

Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions.

TOPICS:
- 2021 Crisis Preparedness: The changing face and demands of Emergency Communications during the pandemic (John Davison, F24)
- How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience (George Hughes, Dataminr) -

Consolidating all Security Activities to Create a New, Business Enabling Security Department
15:45 - 16:30
Consolidating all Security Activities to Create a New, Business Enabling Security Department
15:45 - 16:30

Security at Philips was fragmented and seen as a cost center. Seven members of the ExCo had a responsibility for a security department. Our job was to consolidate these activities into one group security function with a ExCo member as the owner and show the benefits.

Next to the possible cost savings of the consolidation of functions, i.e. removal of double roles, we had to show an additional benefit; how we will become a business enabler.

Our pathway to success is to insert ourselves into business processes. Be part of strategic discussion with M&A to avoid cost after integration, contribute to the perfect delivery with supply chain security, make sure our field service engineers can execute on maintenance contracts, etc.

Speaker: Machiel Toe Water, Security & Real Estate Leader for Domestic Appliances, Philips

CSO Center Exclusive Discussion
16:35 - 17:00
CSO Center Exclusive Discussion

By invitation only.

Table Talks
17:00 - 17:45
Table Talks
17:00 - 17:45

Table Talks
17:00 - 17:45
Table Talks
17:00 - 17:45

Open to all! Join roundtable discussion with innovative technology and solutions providers, watch case studies or product demos and ask all your questions. TOPICS: - 2021 Crisis Preparedness: The changing face and demands of Emergency Communications during the pandemic (John Davison, F24) - How to Unlock the Power of Real-time Information for Structured Response, Speed, and Enhanced Business Resilience (George Hughes, Dataminr) -

ASIS Women in Security - Networking and Discussion
17:15 - 18:00
ASIS Women in Security - Networking and Discussion
17:15 - 18:00

Open to all! Register for the Basic Online Pass (free) or the Premium Online Pass (as of 115 EUR) here

Stage 2
Stage 2
Stage 2
Digital Twin: A New Approach for Business Driven, Agile Security
13:40 - 14:25
Digital Twin: A New Approach for Business Driven, Agile Security
13:40 - 14:25

Adoption of mobile services, biometry and cloud solutions, are driving interface standardisation, promising a rich tapestry of interchangeable functionality. Popular trends are a present-day reality, constantly transforming our businesses. But how can you respond to these changing demands from business and what are the actual implications for physical security?
In order to address the dynamic nature of business, and ever-changing threat landscape, we need a way to simulate, verify and validate potential security solutions. This requires a foundation that promotes intelligent analysis and facilitates rapid adaption.
By applying a digital twin, you create a virtual representation of your security, providing instantaneous answers to real world questions. The application of modern-day techniques elevates your security to the next level, ensuring real added business value.

LEARNING OBJECTIVES
Objective 1. Understanding dynamic business needs - Participants will comprehend the inevitable changes in business and the need, as security, to adapt in order to remain relevant in the market.
Objective 2. Apply an agile approach to security - Participants will understand how to apply an adaptive, iterative approach to security. They will receive step-by-step plan as to how this can be achieved and the type of challenges that can be addressed using this approach.
Objective 3. Demonstrate the need for a virtual model - Participants will receive an explanation of how a virtual model, digital twin, can be applied to their specific physical security organisation and can be used to facilitate security professionals when creating or changing security policies.

Speakers:
Jeroen Harmsen, CPP, Global/Enterprise Business Development for the BU Security Management at Nedap
Linda Hwoson, R&D: Future Security Solutions, Nedap
Hendrik Koopmans, Business Designer, Nedap

The Virtual & The Violent: Thoughts on the Terrorist Threat in Europe 2021
14:30 - 15:15
The Virtual & The Violent: Thoughts on the Terrorist Threat in Europe 2021
14:30 - 15:15

This presentation will offer a compact update on key terrorism-related concerns in large parts of Europe for the remainder of 2021. It will draw on both government and private sector insights, including newly developing trends and worries related to new players and issues like vaccination and travel services resumption just as the cyber-physical interplay among various extremist groups and their activities tightens.

Expert presentation & video Q&A

Speaker: Glenn Schoen, CEO, Boardroom@crisis

Table Talks
15:15 - 16:00
Table Talks
15:15 - 16:00

Dealing with Risks and Uncertainty: Are Security Professionals Human after all?
15:45 - 16:30
Dealing with Risks and Uncertainty: Are Security Professionals Human after all?
15:45 - 16:30

Security practitioners, like you, deal with risks on a daily basis. They are assumed to be familiar with the concept of risk. So far, however, little is known about the psychological processes of individual security professionals. How do they perceive probabilities and assess uncertainties? Which aspects of security risk are considered valuable? What is the role of individual security expertise on risk assessments? During the past years, I have conducted several empirical scientific studies in the field of individual decision-making concerning security risks. The results show that security professionals are vulnerable to decision making biases. These phenomena can strongly influence their professional judgment and with that, risk assessments and risk mitigation in organisations. During this session, you are confronted with a few ‘mind experiments’ which can make you aware of your own assessment biases. You are also kindly invited to participate in an online scientific survey. The results of this survey will be analysed in advance and presented during this session. To the survey

Expert presentation & video Q&A

Speaker: Johan de Wit, PhD Researcher & Technical Officer Enterprise Security, Delft Technical University & Siemens Smart Infrastructure

Interactive Peer-to-Peer Discussions
16:35 - 17:00
Interactive Peer-to-Peer Discussions

DIscussions in small groups on the topics raised by the presentations of the day

Table Talks
17:00 - 17:45
Table Talks
17:00 - 17:45

Networking Session - Speed Dating
17:15 - 18:00
Networking Session - Speed Dating
17:15 - 18:00

Innovation stage
Innovation stage
Innovation stage
Everyday Use of Artificial Intelligence in Video Surveillance Systems. Myth or Reality.
13:40 - 14:00
Everyday Use of Artificial Intelligence in Video Surveillance Systems. Myth or Reality.

The topic of artificial intelligence has become increasingly popular. Nearly every company offers solutions that include AI. And that also creates a lot of myths and unrealistic expectations. We are going to look at what AI means for video surveillance systems, discuss the benefits and solutions as well as the challenges that come with it.

Speaker: Katerina Ryan, Business Development Europe, Cathexis

How to Manage Crisis Situations Professionally – Two Best-Practice Examples in the Health & Finance Industry
14:05 - 14:25
How to Manage Crisis Situations Professionally – Two Best-Practice Examples in the Health & Finance Industry

What would you do if you were a hospital amidst a mass-casualty incident and had to get as many physicians as possible into your filling surgery rooms immediately? What if you were the security officer in a large financial institution and are dealing with a robbery or a bomb threat. How do you coordinate and communicate with your crisis team and emergency responders at the same time? In this talk we will take a deeper look into how two very different organisations are tackling their challenges with alerting and crisis management.

Speaker: Eske Ofner, Head of Sales, F24 AG

Thought Leader Presentations
14:35 - 15:00
Thought Leader Presentations

Table Talks
15:15 - 15:40
Table Talks

Nedap Benchmark Research, 2020/2021: How can Access Control Add Value to Your Business?
15:45 - 16:05
Nedap Benchmark Research, 2020/2021: How can Access Control Add Value to Your Business?

Many large or multinational companies now use electronic systems for physical access control. Typically, these systems collate lots of data and provide a wide range of functionality. Which means they can do far more than open and close doors – they can add value to your business in a variety of ways.

For our annual benchmark research, this was the question we explored: “How can access control add value to your business?”

We interviewed 40 multinational companies about their experience, implementations and processes in relation to access control. The results give an overview on how access control systems are being used; how they’re optimising company-wide processes; and where there are opportunities to gain more value from them. In particular, we focused on how the data collected by access control systems can be used to better effect.

During this session, I’ll explain our benchmark process and provide some highlights from the conclusions.

Speaker: Timon Padberg, Account Manager, Nedap Security Management

Connect the Dots – An Intro to Natural Language Processing for Security
16:10 - 16:30
Connect the Dots – An Intro to Natural Language Processing for Security

Digital transformation is rapidly picking up pace as security teams continuously bring more processes online. We collect more data than ever, but we struggle to use it effectively, which results in missed threats or root causes. Thankfully, recent advances in Natural Language Processing (NLP), a subfield of Artificial Intelligence, offer solutions to these problems. In this session, we will discuss how NLP can help you collect, classify, and extract meaningful data from language inputs to protect what matters in your business.

Speaker: Will Anderson, CEO, Resolver

Thought Leader Presentations
16:35 - 16:55
Thought Leader Presentations

Table Talks
17:00 - 17:45
Table Talks
17:00 - 17:45

Networking Session - Interactive Discussions
17:15 - 18:00
Networking Session - Interactive Discussions
17:15 - 18:00

ONLINE DAY 2 - Available on demand (except networking sessions)
Time displays in Central European Time.
On-demand content will also be available throughout the event series. The content library will be updated with new recordings in the days following each online event.

On-demand Bonus Session:

Cyber security – A shared responsibility

Jeroen van Os, Sales Country Manager The Netherlands at nedap, shares his experiences about the potential cyber risks to physical access management systems. He sees a worrying pattern arising when speaking to stakeholders and organizations.

Thursday, 28 March 2019

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
Leadership Track 1
Leadership Track 1
Leadership Track 1
Welcome coffee
08:30 - 09:00
Welcome coffee

Opening Plenary Session and Keynote 1: Amsterdam: From Smart City to Smart Society
09:00 - 10:00
Opening Plenary Session and Keynote 1: Amsterdam: From Smart City to Smart Society
09:00 - 10:00

Theo Veltman, Innovation Rainmaker at the municipality of Amsterdam, will set the scene for the conference by sharing where Amsterdam’s is in implementing its Smart City strategy, and how this leads onwards to Amsterdam, a smart society. Combining insight from both technical and human perspectives, Theo will cover:
• Quality of life issues addressed by smart approaches
• Where the city is in its strategy implementation
• What is coming next
• How the roles of citizens, public and private companies, and government interact with one another
• Key technology concerns

All Leadership and Professional pass holders for Thursday are invited to join us for this essential session, helping to put the rest of the event in context. Purchase your pass now

Keynote 2: Rotterdam's Resilient City Vision
10:40 - 11:25
Keynote 2: Rotterdam's Resilient City Vision
10:40 - 11:25

Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, will introduce:
• what does a resilient city vision look like
• how Rotterdam is implementing Resilient City methodology
• what are the related technologies
• how this is changing day to day and business life in the city
• what is expected in the next 3 years.

Only available for leadership pass holders – register now

Securing the Cities of the Future - Panel Debate
11:30 - 12:15
Securing the Cities of the Future - Panel Debate
11:30 - 12:15

This panel will examine the keynote’s smart city and resilient city visions from the perspective of security leaders:
• where does the role of security fit in the Smart and Resilient city visions?
• Are there areas where visions, objectives and priorities might converge or diverge?
• What are the specific aspects of concern from a security perspective?
• How will security leaders and their teams need to adapt as our cities evolve?

The panel will be moderated by 2019 ASIS International President Christina Duffey, CPP, and include expert viewpoints from Theo Veltman, Rainmaker Innovation, Innovation Program Manager, CTO, City of Amsterdam, Arnoud Molenaar, Chief Resilience Officer, City of Rotterdam, and Volker Wagner, Vice President Security, BASF Group.

Only available for leadership pass holders – register now

Cyber Threat Landscape
13:30 - 14:15
Cyber Threat Landscape
13:30 - 14:15

Cyber security has become one of the major challenges that organisations face today. According to the 21st PwC CEO Survey, 33% of CEOs are extremely concerned about cyber threats. Matthijs van der Wel will provide a high level overview of various threat actors and how their objectives and operations impact your cyber risk profile. He will also discuss various practical models that your organization can adopt today.

Speaker: Matthijs van der Wel, Director Forensic Technology Solutions, PwC, NL

Soft Skills for Tough People – Creating an Innovation Culture
13:30 - 14:15
Soft Skills for Tough People – Creating an Innovation Culture
13:30 - 14:15

In a VUCA (Volatile, Uncertain, Complex, Ambiguous) environment, traditional roles are changing and new skills are needed. Technical ability is important but soft - people skills even more so in a diverse and fast changing context if we need to innovate and lead successfully. This can be a particular challenge for security leaders who have transitioned to management roles in a business setting following careers and leadership development in Military or Law Enforcement where command and communication structures were very different to today’s business cultures.

Following an introduction from the CSO’s perspective by Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, the session will be led by Balvinder Singh Powar, Associate Professor at IE Business School and Partner/Director at BOOSTER Space Industries & AERDRON.

Join us for an active and engaging practical session.

Only available for leadership pass holders – register now

Successful transformation to a cyber-physical corporate security organisation
14:20 - 15:05
Successful transformation to a cyber-physical corporate security organisation
14:20 - 15:05

innogy Group Security has successfully managed the integration and convergence of Cyber and Physical Security, enabling a 360-degree view and boosting impact which is clearly recognized by top management.

Digitization and the associated tightening of legal requirements make Cyber Security a critical success factor. By systematically assessing the Cyber Security Risk and the degree of maturity of existing controls, we are able to identify and prioritize the implementation of additional, necessary security measures. Allocation of Cyber Security outside IT ensures transparency, good governance and successful “operating at eye level” with CIO. The integration and convergence of Cyber and Physical Security enables a 360-degree view and boosts impact which is clearly recognized by top management. Top management commitment results from good governance, transparency, measurable and tangible impact as well as management language and education instead of technical terminology.

Speaker: Peter Olijslager, Head of Security Retail / Deputy CSO Group Security, innogy SE, DE

Only available for leadership pass holders – register now

Building A Brilliant Team
15:50 - 16:35
Building A Brilliant Team
15:50 - 16:35

An exceptional panel with direct insight from leading CSOs on how they build and lead teams up to the toughest security challenges. This session will cover:
• Skillsets: choosing specialists and generalists
• Talent Attraction: hiring new and established professionals
• Retention and Development: ongoing training, driving the security culture
• Engagement: empowerment, cross function exposure and experience
• Performance Management: define how to measure success
• Insider Threat: pre and in-employment screening, collaboration with HR

Panelists will include Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, Gavin Henderson, Vice President Regional Security Europe & Eurasia , Mastercard, and Nick Lovrien, CPP, Chief Global Security Officer, Facebook Inc.

Moderator: Eva Mueller, Senior HR Business Partner, EU Corp OPS, Amazon, LU

Only available for leadership pass holders – register now

Hot Debate: Consultants - Valued Partner or Necessary Evil?
16:40 - 17:25
Hot Debate: Consultants - Valued Partner or Necessary Evil?
16:40 - 17:25

Following up on the Building a Brilliant Team panel, we examine another critical and often controversial area in enterprise security – the role of Consultants. This panel will contrast viewpoints from leading CSOs and Consultants and will cover:
• Owning and understanding the business case for using Consultants
• Sourcing, recruiting, and expectation setting
• Contracting models and win-win scenarios
• Performance Management: define how to measure success
• Insider Threat/Third party risk: pre and in-employment screening, collaboration with HR

Speakers:
Karolien Verbeiren, Director Key Accounts European and Global, Securitas, BE
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy, BE

Only available for leadership pass holders – register now

Refresh & Reconnect
17:30 - 18:00
Refresh & Reconnect

Relax, recharge your batteries and enjoy a drink in the exhibition after a busy first event day. Available for all participants.

President's Reception
20:00 - 22:00
President's Reception
20:00 - 22:00

Dinner with a river view! Hosted by the President of ASIS International and sponsored by Johnson Controls, this is the perfect opportunity to meet and network with fellow industry professionals in the unique settings of the Wereldmuseum. Tickets are required for this function. Address: Wereldmuseum, Willemskade 25, 3016 DM Rotterdam Directions with Public Transportation: From the WTC Beursplein, take Metro D or E direction De Akkers and stop at Leuvenhaven Or, from Kruisplein, take Tram 7 direction Willemsplein and stop at Westplein CLosest Parking: Erasmus Brug Parking

Leadership Track 2
Leadership Track 2
Leadership Track 2
Using Drones at Volkswagen : Opportunities and Risks
13:30 - 14:15
Using Drones at Volkswagen : Opportunities and Risks
13:30 - 14:15

The proliferation of commercially available drones in recent years has created a new vector of attack. From industrial espionage to physical security and security issues, drones provide a convenient, cost-effective tool for a range of malicious intentions.
In this presentation, Sina Schemel, asset protection, Group Security Volkswagen AG and Volkswagen Chief Security Officer, Michael Schmidt will demonstrate the advantages and risks that drones bring to industrial companies and show a possible approach to mitigating these risks.

Only available for leadership pass holders – register now

Geopolitical Competition for AI Dominance
14:20 - 15:05
Geopolitical Competition for AI Dominance
14:20 - 15:05

Technology has always played an integral role in strategic competition, and today’s global battle for AI dominance is both headline grabbing and significant. China, the United States, and the European Union each approach AI development, deployment and regulation differently, and each have their own inherent strengths and weaknesses.
Rodger Baker, Stratfor's Senior Vice President of Strategic Analysis, will outline who is in the lead and what factors are contributing to the divergence in development.
In addition, with applications ranging across the civilian and military spectrum, Mr. Baker will assess the impact the AI race may have on international business operations as organizations maneouver the precarious path of resurgent big power competition.

Only available for leadership pass holders – register now

Financial Measures of Security Risk
15:50 - 16:35
Financial Measures of Security Risk
15:50 - 16:35

Financially measuring annual security risk value, helps security and risk professionals to communicate the security risks the organization is facing, and can support an ESRM approach.

Starting by presenting a framework for measurement, you will see an example of a risk workshop using the framework, and how a risk workshop is facilitated. The session will conclude with real-life examples and known challenges from a global high technology manufacturing corporation.

Speaker: Perttu Sarkkinen, Security Manager, Wärtsilä Finland Oy, FI

Only available for leadership pass holders – register now

Scoring Corporate Response to a Crisis
16:40 - 17:25
Scoring Corporate Response to a Crisis
16:40 - 17:25

Scoring a crisis management response is an ideal way to assist a company's future processes by identifying areas of weakness or non-conformity in an event. This information should support future learning. But is it possible to score a crisis response and if so, how do you do it?

The presentation will discuss the journey taken on this particular problem and share the outcomes of the project.
Speaker: James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK

Only available for leadership pass holders – register now

Leadership Training Track
Leadership Training Track
Leadership Training Track
Chem-Bio Terrorism Training for Security Professionals
10:40 - 12:15
Chem-Bio Terrorism Training for Security Professionals
10:40 - 12:15

Few topics in the domain of terrorism have been obfuscated with mystery and misinformation as the subject of chemical and biological terrorism.
In this 90 minute workshop, S2 Institute consultant Craig Gundry explores the threat of chemical and biological terrorism as it specifically applies to security professionals including an examination of previous attacks, diverse facility attack scenarios, and practical measures for preventing and responding to chemical and biological attacks in a workplace environment.
Speaker: Craig Gundry, PSP, Lead Instructor, Anti-Terrorism Programs, S2 Safety & Intelligence Institute, US

Only available for leadership pass holders – register now

Travel Risk Training - Specific Risks for Women and Minorities
13:30 - 15:05
Travel Risk Training - Specific Risks for Women and Minorities
13:30 - 15:05

Are you aware of the risks you face as a traveller? This interactive workshop will ask you to step into a different traveller profile and consider whether the risks you face have changed and what information and help you might now need?

In groups representing different traveller profiles this workshop will ask the participants to prepare for a journey, with their current employer in mind, that takes in: day to day inclusivity at work, perceived versus real travel risk, how best to communicate, educate and train diverse travelling employees, what resources and help is available and who has responsibility or can help?

The workshop will explain some of the key drivers for diverse travel risk and use examples to demonstrate when things have gone wrong and what best practice looks like. At the end of the workshop the participants should be able to review their own travel risk training and education programs to ensure it is supporting their diverse travelling population.

Leads:
Sam Roper, Security Advisor, beTravelwise
Saul Shanagher, Director, beTravelwise

Only available for leadership pass holders – register now

Training : Reputation Risks from Fake News – Crisis Management Response
15:50 - 17:30
Training : Reputation Risks from Fake News – Crisis Management Response
15:50 - 17:30

Fake news is all around us. How to respond to it in an attempt to prevent fake news from becoming a crisis for your organization?

If fake news threatens your organization or even jeopardizes its continuity, the crisis management team needs to respond swiftly, but wisely. One of the factors to consider is a security response, whether cyber or physical. What would your input be from an Enterprise Security Risk Management (ESRM) perspective if the board requires it?

In this practical and interactive crisis management training you will get busy! We will combine theory, scenario and ‘bring it to the board room’ presentation elements. The quickly developing scenario challenges the participants to come up with ESRM-based response suggestions. You will need to explain (and defend) your suggested crisis response to the board in an elevator pitch manner.

ASIS Crisis Management & Business Continuity Council members and trainers act as board member assessing and challenging your suggested crisis response. So, the takeaways of this interactive training are instant!

The Crisis Management & Business Continuity Council of ASIS International supports this Leadership Training session.

Trainers:
Theo Stevens CPP, Security Director CBRE GWS
Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S

Only available for leadership pass holders – register now

Professional Track
For Professional Pass and Leadership Pass
Professional Track
Professional Track
What you need to know about ESRM
10:40 - 11:25
What you need to know about ESRM
10:40 - 11:25

Enterprise Security Risk Management (ESRM) is a security management approach that links security activities to an enterprise's mission and business goals through risk management methods. Learn the basics of the ESRM life cycle and understand how to begin implementing an ESRM program in any organization. Discuss the progress made in in embedding ESRM into ASIS education, certifications, standards, and communications.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment

Available for leadership pass and professional pass holders – register now

Social Media Crisis Management
11:30 - 12:15
Social Media Crisis Management
11:30 - 12:15

Several brands have been affected by the growing use of social media by customers, employees, vendors, cyber criminals and competitors, causing serious damage to image, and reputation of the company and its brand.

The purpose of this presentation is to help security professionals understand how to deal with social media related crisis. Actual case studies have been used to train professionals to spot trouble and prepare for it before it strikes.

Speaker: Pramod Bhatt, Senior Director, Security and Intelligence, Sanofi, IN

Available for leadership pass and professional pass holders – register now

Protecting Mobile Devices from Current Threats - Content developed by the ASIS IT Security Council
13:30 - 14:15
Protecting Mobile Devices from Current Threats - Content developed by the ASIS IT Security Council
13:30 - 14:15

Although mobile devices like smartphones, tablets and laptops have become standard tools in today’s world, the rapidly changing technology and the increasing complexity of technical issues has made it easier for smart hackers to manipulate your devices.

For example - did you know that your phone can be hacked through your car’s pairing device?

This and several other topics will be discussed during the presentation. Attending will give you an advantage over your peers and will not make only your mobile communication safer, but also help you advise your company and family.

Speakers:
Werner Preining, CPP, Responsible for European OPR, Interpool Security, AT
Ronald Lander, CPP, Chief Specialist, Ultrasafe Security Solutions, US

Available for leadership pass and professional pass holders – register now

Perception of Terrorist Risk Versus Actual Risk from Terrorism - Influence on the Measurement of Security's ROI
14:20 - 15:05
Perception of Terrorist Risk Versus Actual Risk from Terrorism - Influence on the Measurement of Security's ROI
14:20 - 15:05

Terrorist attacks have resulted in tremendous amounts of income loss, not only due to physical damage at the attack site, but also as a result of the perceived threat by potential travellers of future terrorist attacks in the region. As the effectiveness of security is measured when an offence takes place, and either the offence is stopped by security measures, or succeeds due to security vulnerabilities, it is a great challenge to measure return on investment in security measures prior to an attack taking place.

This presentation addresses several aspects relating to business perceptions of risk and security. It presents not only preferences as to security, but also risk perceptions and if these preferences and perceptions differ based on current home country.

Speaker: Ivor Terret, General Manager, Enablement Advisors

Available for leadership pass and professional pass holders – register now

Retro-Fitting Modern Security into Older Buildings
15:50 - 16:35
Retro-Fitting Modern Security into Older Buildings
15:50 - 16:35

Ideally, preferably before a building is developed on the drawing table but also with a renovation/refurbishment, the importance of security should be addressed by all parties (architect, client, interior designer, construction firm, insurer et cetera).

However, working in cultural buildings, private homes, or historic corporate headquarters brings additional challenges as existing structures cannot be adapted to optimise modern security thinking and measures.

In these cases, we need alternative approaches so that security can still be effectively designed, and in some cases, be integrated in an existing building without any visitor being aware of the existence of the security measures.

This presentation will explain how to perform a specific risk assessment from which to derive protection concepts against identified risks. A systematic protection scheme can then define and document the necessary structural protection measures as well as the organisational safeguards.

Speaker: Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy

Available for leadership pass and professional pass holders – register now

New Trends in Behavioural Profiling
16:40 - 17:25
New Trends in Behavioural Profiling
16:40 - 17:25

Cultural and historical venues by their nature are open and welcoming locations. Because of this, striking a balance between open public access and appropriate security measures is very important to ensure visitors are not intimidated and the welcoming approach is maintained. The provision of specialized training of staff and volunteers is an important way of achieving this objective. Although predictive profiling has traditionally been a human based methodology, leaps in technology have resulted in the development of predictive threat tools such as streaming data infrastructure, patented profiling technology and self-learning analytics — to create new solutions that complement the means to identify potential threats. The purpose of this presentation is to explore the use of predictive profiling as a tool to prevent or mitigate a threat before it evolves into an attack or criminal event.

Speaker: Doug Beaver, CPP, Executive Director of Protective Services, National Museum of Women in the Arts, Washington, DC

Available for leadership pass and professional pass holders – register now

Innovation Track
Innovation Track
Innovation Track
Resilience: Keep it Simple, or Die Trying
09:00 - 09:20
Resilience: Keep it Simple, or Die Trying

There is no better way to spread a message than making it easy and straightforward.

Resilience and every discipline connected to it are everyone’s business in an organization. By definition, resilience is not an exclusive property of a few technicians sitting in a closed room, but – just like lymph or blood – it runs through any level and department. Everyone in the same organization must speak and practice resilience fluently.

For this to happen, and for everyone to be involved and committed, it cannot be complicated, and it cannot be a labyrinth of technical buzzwords. Resilience has to be universal.

Speakers:
Alberto Mattia, Chief Executive Officer, Panta Ray
Paola Scotto di Frega, Head of Consulting, Panta Ray

Technical Espionage Case Studies and Countermeasures
10:40 - 11:00
Technical Espionage Case Studies and Countermeasures

Real world cases of technical espionage, with video, live audio feeds and photos of the attacks will be presented by Jason Dibley, Technical Director at QCC Global. Jason will examine the mechanics of these different espionage events, how not all state sponsored attacks are highly technical and highly funded, and at the countermeasures that may have detected or prevented these attacks.

Speaker: Jason Dibley, Technical Director, QCC Global Ltd

Artificial Intelligence and Automation in Mobility Risk Management
11:05 - 11:25
Artificial Intelligence and Automation in Mobility Risk Management

A terrorist attack takes place in central London, in proximity of your staff - what is your main concern?

Artificial Intelligence is a key driver behind todays’ mobility risk management. New technologies provide answers to our most imminent questions during a crisis: Are my employees affected? Who needs help?

The presentation shows the benefits and limits of AI in mobility risk management. It explains how technology can enable corporates to drastically speed up and scale the alerting process, from incident detection and matching travelers’ location data, up to the final call that tells you who needs help.

Speaker: Matteo Grella, Head of Research & Artificial Intelligence, EXOP

Research revealed on access control challenges for multinationals
11:30 - 11:50
Research revealed on access control challenges for multinationals

In today’s increasingly global environment it’s essential to unify your security internationally. But it can be extremely complex and demanding – especially as our world is changing more quickly every day. To identify existing and future bottlenecks and challenges for multinationals, Nedap has conducted benchmark research and stays in continuous dialogue with clients. Join this session to discover key findings relevant to your organisation.

Speakers:
Timon Padberg, Sales Manager Global Clients, Nedap
Martin Wijlens, Sales Manager Global Clients, Nedap

Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan
11:55 - 12:15
Developing a GDPR-Ready Incident & Breach 72-Hour Action Plan

Under the GDPR, data controllers are required to notify their supervisory authority when a personal data breach occurs, unless it is unlikely to result in risks to the rights and freedoms of individuals. The notification needs to be done without undue delay, no later than 72 hours after the controller has become aware of the breach (with some exceptions). It is crucial for organizations to understand their obligations and the details of this tight timeline as well as the risk-based triggers, and what they entail. In this session, we’ll review the personal data breach rules under the GDPR and provide tips to help you map out a 72-hour personal data breach action plan.

• Understand the implications of the GDPR for controllers and processors
• Map out a GDPR-ready 72-hour personal data breach action plan
• Outline the details of this tight timeline as well as the risk-based triggers and what they entail
• Implement efficient and effective data handling practices in the face of new GDPR requirements

Speaker: David Sinclair, CIPP/E, Privacy Consultant at OneTrust

Mitigate Crises with Faster Decision Making
13:30 - 13:50
Mitigate Crises with Faster Decision Making

As advances in technology continue to increase the amount of data in the world and companies send more people to conduct business in remote locations, there is a growing expectation for organisations to gain information faster about incidents and threats that could impact them. The increased speed of information sharing means that a security team’s traditional challenges during a crisis, such as lack of time and difficulty determining what information is relevant, are compounded. Used correctly, however, this vast volume of data can be a significant enabler for security teams. Dataminr will examine effective crisis response in the modern world. Within the first 30 minutes, a security manager must make crucial decisions quickly to protect the company and its people. Real-time, publicly available data, like social media, blogs, and the dark web, is essential for early event awareness, improved visibility, and more confident decision making.

Speaker: Tim Willis, EMEA Director Corporate Security Sales, Dataminr

Why a Unified Approach to Critical Event Management Improves Operational Resilience
13:55 - 14:15
Why a Unified Approach to Critical Event Management Improves Operational Resilience

According to Forrester companies are investing significant resources in sophisticated controls to protect their employees, brand and assets from critical events. These disruptive incidents (ranging from cyberattacks to terrorist activity) increasingly lead to business impacts such as operational losses, brand damage, and concerns for employee health and safety.

Despite the investments being made, companies struggle to optimize their critical event management (CEM) operations, slowing down response time and creating potentially life-threatening confusion.

In this session we will look at how a unified approach to critical event management meets the demands for rapid response and speedy incident remediation.

Speaker: John van Laerhoven, Managing Director Benelux, Respond, An Everbridge Company

The weakest link in today’s physical security … and no, it’s not people
14:20 - 14:40
The weakest link in today’s physical security … and no, it’s not people

For the last decade we have been investing in the same security controls over and over again: access control, video surveillance and intrusion detection. Enhancements have been made in each of those domains, but the weaknesses that existed 10 years ago are still weaknesses today. We’ll discuss a fundamental flaw in how we approach physical security, look at what we can learn from the cyber security space where a similar mistake was made but addressed, and propose an alternative approach to move to better and smarter physical security.

Speaker: Bart Vansevenant, Co-founder, Ticto

Your building is talking. Are you listening?
14:45 - 15:05
Your building is talking. Are you listening?

If you’re only using your access control system to lock and unlock doors, you’re underutilizing your system! As everything from people, lights to locks become connected, there are new opportunities to interact with and better understand your people and your building through a single pane of glass. This talk course is designed to shed light on how, by connecting these components to your access control system, you can drive operational efficiency and cut overall costs and make more informed decisions.

Speaker: Jean-Philippe Deby, Business Development Director – Europe, Genetec

The Promises of New Technology – What do we actually need, how will it help us and what are the limitations?
15:50 - 16:10
The Promises of New Technology – What do we actually need, how will it help us and what are the limitations?

Big Data, Machine Learning, Artificial Intelligence and Augmented Reality.. The list of “Silver Bullet Buzzwords” that we’re told will revolutionise the security industry is long. But what do security professionals actually need, what can we expect from new technology and where does the human being fit in all this? Mads will give a talk in non-technical language about what these new technologies are about and share his research on what security professional say they need, how technology can help and where it might fall short compared to the human being.

Speaker: Mads Paerregaard, Founder & CEO, Human Risks

What Security Should Steal From Marketing
16:15 - 16:35
What Security Should Steal From Marketing

In today’s hyper distracted world, attention is limited. If we want to successfully raise awareness, change behaviour and influence culture, we need to engage with our audience first. Unfortunately, security awareness programs often fail right there, at that first hurdle.

This presentation will reveal some of the latest tools and techniques that savvy marketers have been using for years, capturing our attention, orienting our behaviour and moving us into taking certain actions. Join us and learn what makes us ‘click’, and how to leverage psychology to achieve positive change in your organization.

Speaker: Heimo Grasser, CPP, Awareness Strategist, SAME Solutions

Case Study: Digitalization of Systems Brings Smarter Buildings
16:40 - 17:00
Case Study: Digitalization of Systems Brings Smarter Buildings

The latest digital evolutions of technologies for security systems and building management have enabled full smart building functions like for the Brattorkaia Building.

All Building Technologies like cameras and card readers have now moved to IP and enabled full integrations with building management including latest wireless and IoT communications. Smart building functions for building owners, occupants and facility managers to improve the building productivity are now embedded and are the major progress of last decades as they really HELP building stakeholders. The Brattorkaia Powerhouse Building Norway is showing how the JCI integration of IP systems lead the way to safer, more secure, more productive and more sustainable buildings.

Speaker: Yann Mahieu, Director Key Account Solutions, Johnson Controls, CH

Data-driven crime prevention using AI
17:05 - 17:25
Data-driven crime prevention using AI

The digitalization of the industry has led to a rapid increase in data. Data can have an immediate value, such as an alarm can reduce or eliminate the severity of an incident. Once acted upon, we stop attributing value to the data and treat it as a cost to manage. In this session, we’ll discuss how to turn your data in to intelligence through AI and advanced analytics. Intelligence which improves the safety of people, assets and societies.

Speaker: Viking Johansson, Director of Product Management, Intelligent Products, Securitas AB

Career Centre Track
Career Centre Track
Career Centre Track
Women in Security Breakfast
08:00 - 09:00
Women in Security Breakfast
08:00 - 09:00

Organized by Lynn de Vries, CPP, PCI, COO, DutchRisk Join us for this unique opportunity to network with women in security from all over the globe.

The competitive advantage of holding a professional certification
10:40 - 11:25
The competitive advantage of holding a professional certification
10:40 - 11:25

Are you ready to take the next step on your career ladder? ASIS offers four certification programs, which are designed for security managers who want to prove that they have the security knowledge and skills to bring to their organizations. The Certified Protection Professional (CPP) is designed for those who manage all aspects of an organization’s security functions, the Professional Certified Investigator (PCI) is for those who conduct security-related investigations, the Physical Security Professional (PSP) is for those who manage physical security operations, and the Associate Protection Professional (APP) is ASIS’s newest certification program and is meant to validate your understanding of the fundamentals of security management. Come to this session to learn what the exams test, the eligibility requirements, studying tips, and more!

Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International

European Salary Survey
11:30 - 12:15
European Salary Survey
11:30 - 12:15

ASIS and SSR have teamed up for the 2018 SSR & Executive Profiles salary survey which reviews more than 4,000 security professionals across the finance sector, manufacturing, extractives, FMCG and logistics. The results will be presented here. Gain competitive insights on your position in the labour market and how your sector is performing.

Speaker: Peter French, CPP, CEO, SSR Personnel, UK

Career Development Workshop Part 1
13:30 - 14:15
Career Development Workshop Part 1
13:30 - 14:15

Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.

Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK

Career Development Workshop Part 2
14:20 - 15:05
Career Development Workshop Part 2
14:20 - 15:05

Between them, Graham Bassett and Mike Hurst, CPP, have well over 50 years of security recruitment experience. In this interactive, hands-on workshop they will be helping you develop the skills and knowledge to enable you to prepare a compelling and relevant resume, hone your personal brand (inc. social media), prepare for an interview and develop interview techniques.

Speaker:
Graham Bassett, Managing Director, GBRUK Ltd, UK
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment, UK

Burnout: When bad things happen to good security professionals
15:50 - 16:35
Burnout: When bad things happen to good security professionals
15:50 - 16:35

Job burnout, or work-related stress, is an ever-present risk for busy security manager. While almost none of the alpha types in our industry are willing to admit it, many of us have worked the crazy hours that lead up to burnout – and more than a few of us have discovered the negative consequences of work-related stress too late. In this interactive session, we take a look at what causes burnout, and what security personnel and management can do to prevent it.

Speaker: Mac Segal, Vice President of Business Development & Security Consulting, EMEA, AS Solution

The ESRM Skills Cocktail
16:40 - 17:25
The ESRM Skills Cocktail
16:40 - 17:25

ESRM = Managing the enterprise’s security risks through the use of fundamental risk principles. So, what do the skills, qualification, experience and knowledge sets needed to achieve this look like? The clues are in the name - the requirements of the modern security professional are a mixed cocktail: a base of physical security or cyber-security; a measure of project management; a sprinkling of business management; a pinch of investigation; a dose of negotiation skills; a smidgen of strategy all topped off with a generous portion of communication powers. So how do you mix this cocktail?

This presentation will provide guidance for those in the profession on how to achieve the heterogeneous mix of skills and qualifications required for the future.

Speakers:
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs, UK
Mike O'Neil, CPP, PSP, Managing Director, Optimal Risk Group - Resilience, Risk, and Security advisors, UK

Thursday, 28 March 2019

Friday, 29 March 2019

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
Leadership Track 1
Leadership Track 1
Leadership Track 1
Welcome Coffee
08:15 - 09:10
Welcome Coffee
08:15 - 09:10

Securing an Innovation Culture at Facebook, Inc
09:10 - 09:55
Securing an Innovation Culture at Facebook, Inc
09:10 - 09:55

Facebook's core values of being bold, focusing on impact, moving fast, being open, and building social value allow Facebook to deliver on its mission to give people the power to build community and bring the world closer together.

To foster innovation and collaboration, an open plan office space and a welcoming environment for frequent meetings with external visitors are essential to enable the business.

Nick will use this as an example to illustrate:
• Progressive approaches to creating a safe and secure workplace
• How the company evaluates its risk appetite, and the role of security function in this dialogue
• How governance structures are evolving, with a focus on security as the business enabler and ESRM concepts

Speaker: Nick Lovrien, CPP, Chief Global Security Officer, Facebook, US

Only available for leadership pass holders – register now

Engaging Business Executives in ESRM
10:00 - 10:45
Engaging Business Executives in ESRM
10:00 - 10:45

Learn how security leaders can successfully engage business leaders in the security risk decision process.

We will cover the role of the security and business leaders in ESRM, and business-based risk mitigation program development.

This session is intended as preparation for the “Bring it to the Board Room” training session following the coffee break.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
Volker Wagner, Vice President Security, BASF Group
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
More speakers to be confirmed

Only available for leadership pass holders – register now

Soft targets - Using lessons learned from high profile incidents to improve prevention and protection through public private partnership
11:30 - 12:15
Soft targets - Using lessons learned from high profile incidents to improve prevention and protection through public private partnership
11:30 - 12:15

This presentation will use real case studies to highlight the key role partnerships play and how they are helping to shape improvements in the security of soft targets.

Learning from experience is a crucial opportunity that should not be overlooked. Sharing those learnings with others should also be viewed as an opportunity.

Recent attacks in Paris, Brussels and Bamako all provided us with unique experiences and in each case the value of public-private and private - private partnerships played a crucial role in our crisis management.

Since the attacks, Radisson Hotel Group has increased its contributions to collaborative efforts around the world including the Global Counter Terrorism Forum initiative on soft target protection, the EU action plan for protection of public places and European hotel industry trade association projects to increase awareness, preparedness and resilience in the European hotel, restaurant and catering industries.

Speaker: Geert Coremans, CPP, Director of Global Safety and Security, Radisson Hotel Group Corporate Support Office, BE

Only available for leadership pass holders – register now

Brexit – Business Continuity Perspectives
12:20 - 13:05
Brexit – Business Continuity Perspectives
12:20 - 13:05

The ASIS Europe 2019 venue and dates were confirmed long before Article 50 was signed, so it is by coincidence the event concludes on the date planned as “Brexit Day”. This session has been scheduled to address the latest developments and update attendees on how businesses are assessing the situation and preparing contingency plans (or not). With expert insight from BCI surveys, we will explore how management and business continuity planning may impact the security and risk outlook for businesses.

Speaker: Rachael Elliott, Leader Thought Leadership Team, Business Continuity Institute, UK

Only available for leadership pass holders – register now

Closing plenary Session: Digital Transformation: cut through the hype and get started (securely)
14:15 - 15:30
Closing plenary Session: Digital Transformation: cut through the hype and get started (securely)
14:15 - 15:30

All leadership and professional pass holders for Friday are invited to join us for this concluding session. Purchase your pass now

Digital transformation is today’s hottest business topic. Companies of all sizes across many sectors are seeking ways to leverage new technology. So how do security practitioners get involved without drowning in buzzword soup? And how do you support innovation whilst also supporting good security practice?

Digital transformation requires us to look at business models, roles, and tools, in different ways. Some companies are focused on efficiency or incremental process gains, whilst others are completely re-inventing their business models and creating new ways to engage with customers.

Often, debate on digital transformation is polarised between utopian visions of a world full of convenient, personalised services and dystopian visions of mass unemployment, catastrophic cyberattacks and malicious AI. So, this session has been designed by ASIS to get a grip on core issues facing security professionals and identify key opportunities to advance, and key areas of concern.

Practically speaking, already many systems that traditionally had their primary function as security can now be leveraged for different purposes. For example; IP cameras generate business insights in retail, or traffic management in a smart city; risk assessment data can be packaged and re-sold as intelligence; access control provides insights for building management etc.
So how do we capitalise on digital opportunities? And how do we do it safely, securely and profitably?

After a short scene-setting presentation by Michael Gips, CPP, Chief Global Knowledge Officer, ASIS International, we will use live-polling and the expert facilitation skills of Prof. Martin Gill, Managing Director, Perpetuity Research to guide us through an interactive discussion and lively ideas exchange.

If you’re advanced on your digital journey, please join us to share and benchmark – and if you’re setting out, this is a great opportunity to learn from firsthand experience.

Farewell Drink
15:30 - 16:00
Farewell Drink

President's Reception
20:00 - 22:00
President's Reception
20:00 - 22:00

Leadership Track 2
Leadership Track 2
Leadership Track 2
Industrial Control Systems - Threats, Vulnerabilities, Risk and Resilience
10:00 - 10:45
Industrial Control Systems - Threats, Vulnerabilities, Risk and Resilience
10:00 - 10:45

Recent incidents provide disturbing evidence of the stark vulnerabilities of Industrial Control Systems (ICS) to natural, human-factor accidental, and malicious threats.

This presentation includes numerous current, high-profile examples of ICS threats, vulnerabilities, and the severe consequences of such incidents. The presentation will help you learn and understand:
• What ICS includes;
• Where ICS can be found;
• Potential threats and vulnerabilities to and from ICS;
• Why ICS assets are critical to enterprise, business, operations, and mission objectives;
• How to take a proactive, protective systematic management approach to identify and protect the enterprise.

This presentation provides a wake-up call to everyone who manages or is responsible for critical ICS assets and their architectures, systems, facilities and infrastructure due diligence.

Speaker: Michael Bilney, Global Senior Principal – Asset Risk and Resilience, Cardno

Only available for leadership pass holders – register now

GDPR One Year On – Vetting and Other Security Challenges
11:30 - 12:15
GDPR One Year On – Vetting and Other Security Challenges
11:30 - 12:15

GDPR will have been in force for almost a year by the time ASIS Europe 2019 takes place. This session will take a look back at relevant case studies, analyse incidents and address myths around this complex legislation. Ady van Nieuwenhuizen, expert privacy lawyer will guide the discussion with insights from security leaders to frame key issues. We will highlight and address several key challenges for security practitioners.

Know Who You Hire – the Challenge of Vetting Just Gets Harder
Presented by Gilad Solnik, CPP, PSP, Director, Security and Loss Prevention, EMEA, Global Security Operations (GSO), Amazon

Ensuring the safety and security of your employees, company information, and business operations is essential for any modern business. Therefore, knowing who you’re hiring into your organisation is essential. Pre-employment screening measures are aimed at ensuring a safe and secure work environment while setting a foundation for good personnel security (Cpni.gov.uk, 2015). This discussion reviews the how privacy and data protection initiatives and the GDPR has introduced new challenges and restrictions on vetting and pre-employment background checks, and will provide an exchange of potential practical solutions.



Storing CCTV Footage Securely – Reassessing the Criticality of Servers
Presented by Henk Marsman, Lead Product Manager Identity and Access Management, Rabobank, NL

Since the adoption of GDPR CCTV data has become distinctly privacy sensitive. Subsequently, the criticality of systems storing CCTV data was revised (and increased), and access control measures need to be adapted accordingly. This impacted the governance of access to these systems, the periodical reviews on access, and the actual control measures in place for these systems. This discussion will cover key questions security professionals should address when considering access to such systems post GDPR.

Only available for leadership pass holders – register now

How devices bring customer and employee access together
12:20 - 13:05
How devices bring customer and employee access together
12:20 - 13:05

Managing identies and access for employees has significant different characteristics than that of customers. In many organizations these two are separately handled. With the rise of connected devices, ranging from small to large in size, it becomes less obvious to separate management of these two populations. Or in other words, there are new ways to combine the management of identities and access of employees and customers.

This presentation will cover the similarities and differences between identity and access management (IAM) of employees and customers. We will then discuss the impact of connected devices for the user and for IAM solutions.

Speaker: Henk Marsman, Lead Product Manager Identity And Access Management, Rabobank, NL

Only available for leadership pass holders – register now

President's Reception
20:00 - 22:00
President's Reception
20:00 - 22:00

Leadership Training Track
Leadership Training Track
Leadership Training Track
Cyber – Physical Threat Response Training
09:10 - 10:45
Cyber – Physical Threat Response Training
09:10 - 10:45

This scenario-based 90-minute workshop will take you through a Red Teaming exercise focused on identifying adversaries’ methods of operation to target the logical, physical and human gate of the organization. Red teaming, as part of a proactive security cycle, is an effective operational intelligence tool. It also helps to create awareness and need for the implementation of a program with counter measures. By discussing the necessary awareness and necessary response to cyber, physical and human related threats the workshop introduces the participants to a method of response preventing unnecessary victims. Awareness is the key word. At the end of this session participants will understand the potential “external” and “internal” threat, why it appears, and what counter measures are effective.

Speaker: Berndt Rif, CPP, PCI, Chief Security Officer, Ministry of Health, Welfare and Sport, NL

Only available for leadership pass holders – register now

Bring it to the Board Room – ESRM Presentation Training
11:30 - 13:05
Bring it to the Board Room – ESRM Presentation Training
11:30 - 13:05

This session will take the form of a role-play training exercise where participants will be assigned into teams to address one of 5 security risk concerns from company executives.

Note – this exercise is in how to present the solution, not in judging the solution itself. Teams will be given a template PPT to create an executive presentation to propose a program based on the risk concern of a “company executive”. ESRM experts will engage teams in conversations about the approaches to executive presentations.

Teams will present their proposals to the “Executive Council” and will receive feedback on their presentation and engagement.

Important: participants should attend the prior “Engaging Business Executives in ESRM” session as preparation for the exercise.

This session will be led by Rachelle Loyear, Director of Program Management for Integrated Security Solutions, G4S.

Speakers:
James Willison, Founder, Unified Security Ltd
Mike Hurst, CPP, Director, HJA Fire & Security Recruitment
Volker Wagner, Vice President Security, BASF Group
Mike Gips, CPP, Chief Global Knowledge & Learning Officer, ASIS International
Gavin-Henderson, Vice President regional Security Europe & Eurasia , Mastercard
Bruce Braes, CPP, Principal Consultant Enterprise Security & Resilience Solutions, Jacobs
Mark Schreiber, Principal Consultant , Safeguards Consulting, Inc., US

Only available for leadership pass holders – register now

President's Reception
20:00 - 22:00
President's Reception
20:00 - 22:00

Professional Track
For Leadership and Professional Pass
Professional Track
Professional Track
Info-centric Crisis Management, a new way of Crisis Management Thinking
09:10 - 09:30
Info-centric Crisis Management, a new way of Crisis Management Thinking

Info-centric Crisis-management is a new way of thinking within one of the biggest corporate banks in the Netherlands. This ‘idea’ is about creating a new system for Crisis-management where we combine internal and external data sources to act in an early stage when a possible crisis is in sight. This system combines data with roles and responsibilities for those who have to act during a crisis. The system provides an automated choice for a certain scenario. The main goal is to act faster, and creating a Common Operational Picture (COP) and possibly to act before a crisis is hits.

Speaker: Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL

Only available for professional and leadership pass holders – register now

Built Environment Security as a Business Enabler
09:35 - 09:55
Built Environment Security as a Business Enabler

A clear understanding of security risk allows suitable control measures to be selected. This presentation will use several case studies to show how to blend physical, technical and procedural controls to safeguard the built environment and its assets. The presentation will also highlight the risks of taking the “tick box approach” to security design.

Speaker: Christopher Aldous, CPP, PSP, Director, Design Security Ltd, and Board Director, ASIS International UK Chapter, UK

Only available for professional and leadership pass holders – register now

A clearer roadmap to your security organization’s maturity
10:00 - 10:45
A clearer roadmap to your security organization’s maturity
10:00 - 10:45

Learn about a new, practical and easy to understand maturity model that can be implemented in hours rather than days.

What is your current security capability? How do you compare yourself against industry benchmarks? And where do you need to focus your efforts?

Maturity models aim to answer those questions and more, but unfortunately, most of them require expensive consultancy to implement and are often far too academic.

A more practical approach is clearly needed. This presentation is going to give you a maturity model that can be easily implemented in hours rather than days. A clear and visual way to easily understand the maturity of all areas of your security organization. You can now derive a clear roadmap that tells a compelling story and will help you obtain the necessary leadership buy in and additional resources for your program.

Speaker: Heimo Grasser, CPP, Senior Security Manager MEA, Medtronic, UAE

Only available for professional and leadership pass holders – register now

Putting the S into IoT: ENISA's efforts on IoT cyber security
11:30 - 12:15
Putting the S into IoT: ENISA's efforts on IoT cyber security
11:30 - 12:15

The talk will focus on ENISA's efforts to promote IoT cybersecurity by proposing baseline IoT security measures complemented with sectorial vertical studies that look into IoT security in particular sectors, e.g. Industry 4.0, automotive.

ENISA has been working with stakeholders across the board to address the many challenges of IoT security. ENISA advocates for a risk-based and context-based approach that looks into the particularities of sectorial IoT deployments and proposes specific security measures to address relevant risks. In parallel, understanding the ecosystem nature of IoT and the interdependencies, baseline IoT security recommendations have been proposed by ENISA to facilitate security interoperability in a horizontal manner. The talk will discuss related efforts and activities of ENISA and ways the community can engage with the Agency to further improve IoT cybersecurity.

Speaker: Apostolos Malatras, Expert in Network and Information Security, European Network and Information Security Agency, GR

Only available for professional and leadership pass holders – register now

Terrorism in Europe 2019
12:20 - 12:40
Terrorism in Europe 2019

This condensed, fast-paced briefing offers a future-oriented look on terrorism trends in Europe for the coming year, and Jihadi extremist activity in particular. Anchored in an analysis of the latest developments in Q4 2018 and Q1 2019, the presentation will use several perspectives to outline key concerns for the remainder of 2019. This will include consideration of the likely effects of several general elections, international events, upcoming terrorism trials, select migration developments, and Brexit on the terrorist threat in a range of European countries. The update will conclude with an update on newly evolving CT best practices among security departments of large corporations.

Speaker: Glenn Schoen, CEO, Boardroom@Crisis, NL

Only available for professional and leadership pass holders – register now

ISO 31030 Guidance for Managing Travel Risk
12:45 - 13:05
ISO 31030 Guidance for Managing Travel Risk

For organisations whose employees undertake regular travel, Duty of Care is an important concern. In addition, multiple regulators oblige organisations to ensure reasonable travel security for employees. Travel Risk Management (TRM) assesses risk and provides security to staff. However there are no rules, or internationally recognised Codes of Practice, that indicate what should actually be done in order to be compliant.

ISO (International Organisation for Standardisation) has begun developing a standard which will resolve doubts and provide guidance, ISO 31030. ASIS is playing an active role in this.

Learn about work in progress and how you can have your say to ensure that the voice of the Security Profession is heard and acted upon.

Coordinating speaker: Roger Warwick, CPP. CEO of Pyramid Temi Group (Travel Risk Management), Member of ISO 31030 technical committee, Member of ASIS Commission on Standards & Guidelines

Speaker: Werner Cooreman, CPP PSP, CSO Solvay Group, Vice-Chair of ASIS Commission on Standards & Guidelines, ASIS Liaison to ISO 31030 technical comittee

Innovation Track
Innovation Track
Innovation Track
Sharing is caring: Duty of Care and the Sharing Economy
09:10 - 09:30
Sharing is caring: Duty of Care and the Sharing Economy

The travel sharing economy, which comprises services such as ride-sharing and house-sharing, has quite literally taken off around the world. Ease of accessibility and use while mobile means non-traditional ground transport and accommodation services are increasingly being used by business travellers. Despite the popularity, only 14 % of organisations surveyed by Ipsos MORI and International SOS* have integrated this in their travel policy. Have you? Join this innovation track to understand the benefits, risks and legal considerations of incorporating share economy services into your business travel policies and how best to do so within a travel risk management framework.

* Business resilience. Trends Watch 2019; Ipsos MORI & International SOS; October 2018.

In October 2018, Ipsos MORI conducted a global survey targeted to those who organise, influence, or are responsible for, their organisation’s travel and risk mitigation policies. These survey findings represent responses from 640 people, across all types of organisations which have had previous contact relating to business travel health and security with International SOS, in 82 countries.

Speaker: Xavier Carn, Vice-President Security EMEA and Medaire, International SOS & Control Risks

Insurance and security: finding common ground in a volatile security risk environment
09:35 - 09:55
Insurance and security: finding common ground in a volatile security risk environment

How close cooperation between corporate insurance and corporate security departments will make the management of security risks more effective and efficient.

There is common agreement among security and insurance professionals that security incidents are increasingly complex and global. Traditional insurance vehicles help indemnify the damage from such incidents. But to be able to successfully manage the velocity of security incidents anywhere around the world, companies require a level of expertise at immediate global readiness that companies realistically can’t maintain in-house.

The insurance industry has responded to this need for 'anywhere and anytime' immediate expert support, with a new insurance concept: Insurance as a Service. This new trend implies that security professionals and insurance professionals with their expertise and products are playing both an increasingly crucial role in ensuring the success in security incident response and related insurances.

In this inter-active workshop attendees will develop insight in the interplay between insurance and security and will walk away with practical tips on what to discuss with insurance professionals when purchasing insurance as a service.

Speakers:
Stefan Sievers, Head of Business Development Special Risks Europe, Hiscox
Jeroen Meijer, Senior Partner, Control Risks Group

True or False in the Age of Fake News
10:00 - 10:20
True or False in the Age of Fake News

What happens when we as individuals can not trust media in the same way we used to? Misleading media information during the attacks on Westgate Mall in Kenya, Drottninggatan in Stockholm and the Armed Conflict in Donbass Ukraine led to severe consequences. Social media as well as the increased commercialization and politization of traditional media present challenges to individuals and organizations. But this also present opportunities for actors in the security sphere and elsewhere.

Speaker: Johan Tinnerholm, COO, Global Warning System

How Access Control is impacted by cloud, mobile and GDPR
10:25 - 10:45
How Access Control is impacted by cloud, mobile and GDPR

Many of the changes the IT industry currently is undergoing are also deeply affecting the Access Control industry. These overall trends towards integrating mobile devices for daily use and the support of cloud infrastructure are changing the way how Access control is used and operated. This is also bringing new challenges for system supplier as well as customers when it comes to Cyber Security and GDPR compliance. More than ever solutions require to be designed for this environment and users have to be aware of their advantages but also exposures when it comes to managing their security, organization and personnel

Speaker: Thomas Herling, Senior Vice President Global Business Owner Electronic Access and Data, Dormakaba

Cyber Security Maturity Assessment
11:30 - 11:50
Cyber Security Maturity Assessment

Increasing complexity and continuous change of IT environments challenge organizations to gain transparency on their cyber security. The Cyber Security Maturity Assessment supports with a unique method to measure the maturity and effectiveness of cyber security measures and results are documented using the Cyber Security Maturity Cockpit. In addition it provides an overview of the cost-value ratio of identified measures based on ISO/IEC 27001. By creating transparency the Cyber Security Maturity Assessment enables decision-makers to take the right decisions for optimal use of human and monetary resources and to strengthen the cyber security resilience of the organization following a holistic approach.

CSMA enables organizations to answer questions like:
- What do we in relation to cyber security?
- How good are we with what we are doing?
- What does it cost?

Speaker: Christoph Hagenbuch, Cyber Security Manager, innogy SE

How to Secure an Open Campus
11:55 - 12:15
How to Secure an Open Campus

Many enterprises have large corporate campuses where hundreds or thousands of employees work at various sites around the world. These sites are complex environments, characterized as open and minimally staffed by security resources. Given this, they are notoriously difficult to protect and vulnerable to active assailant and terrorist threats as evidenced by the recent attack on YouTube’s corporate headquarters in San Francisco, CA. Our universities around the world share similar attributes and have been investing in cutting-edge technology to help protect their staff and students. Attend this session to learn about their transformative advancements and fulfill your duty of care to your employees.

Speaker: Les Allan, Director of SafeGuarding & Logistics Services, Heriot-Watt University

Vendor Partnering. The A to Z of Developing Great Relationships
12:20 - 12:40
Vendor Partnering. The A to Z of Developing Great Relationships

Everyone wants great vendor relationships based on long-term productive partnering, mutual business goals, and trust. Easy to say but how easy to achieve? Going from A-Z, including embedded vendor staff to complete outsourcing the presentation will highlight how its done and what makes lasting relationships more than just saying win-win.

Speaker: Andy Williams, CPP, VP Business Development, Safe Hotels Alliance

Video Surveillance in Marine Environments
12:45 - 13:05
Video Surveillance in Marine Environments

The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We will analyse VS for ships and explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use, and what features a camera station must have to be installed on a ship and so on.

Speaker: Alessandro Franchini, Marketing & Communication Manager, Videotec

Career Centre Track
Career Centre Track
Career Centre Track
Town Hall (for ASIS Members)
08:15 - 09:00
Town Hall (for ASIS Members)
08:15 - 09:00

Diversity and Inclusion – A Competitive Edge for the Security Profession
10:00 - 10:45
Diversity and Inclusion – A Competitive Edge for the Security Profession
10:00 - 10:45

Diversity is a prominent challenge facing businesses today. Diversity has to be part of a company’s DNA – and it has to work as part of a company’s overall desire to hire the best possible people. Research shows that diversity makes workplaces more effective and efficient, plus a diverse workplace also promotes a company’s ability to adapt to any situation. In the panel, experienced security professionals from different countries and backgrounds will share their challenges and success stories. Furthermore, they will discuss diversity perspectives, experiences and skill sets that seem to be invaluable to the success of talent and to support modern business leaders.

Moderator: Alexander Zippel, CPP, Corporate Security, Deutsche Post DHL Group

Panellists include Christina Duffey, CPP, 2019 ASIS International President, Senior Vice President and Regional Director, SOS Security, Letitia Emeana, CPP, PSP, EMEA Snr Security Manager, Tesla, Bruno Kalhoj, Head of Division, Safety and Security, European Central Bank, and Rens van Groenedaal, Pre-Master student Governance, Radboud University Nijmegen, NL

The growth of young professionals into the security industry (a live case study)
11:30 - 12:15
The growth of young professionals into the security industry (a live case study)
11:30 - 12:15

Are we guilty of cloning security specialists? Young professionals entering the security industry may increasingly be the answer to changing the face of the sector.

The operational cog which turns the mechanism of the security industry is routinely led by the 'Grey, Pale and Male' from society. With the guidance of experienced security professionals, ASIS strives to bring through young professionals to the fore of the sector, which is spearheaded by James Morris in the UK. No less does David Clark, UK Chair of ASIS, hold this belief. He argues that we should not 'clone' our predecessors, but rather we should nurture younger professionals into a 'security culture'. Indeed, just as security is modernising and evolving into new frontiers such as cybersecurity and artificial intelligence, so too should the personnel who are increasingly managing it.

Speakers:
David Clark, CPP, PCI, PSP, Head of Security, Francis Crick Institute, UK
Leo Kelly, Security and Risk Management Analyst, Francis Crick Institute, UK
James Morris, CPP, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK

The New APP Certification
12:20 - 12:40
The New APP Certification
 

Learn about ASIS’s newest certification program: the Associate Protection Professional (APP). The APP has been developed for security management professionals who are just starting their security career. To be eligible to sit for the APP exam you need 1-4 years of experience (depending on your educational history). During this session, the ASIS Certification Director will be there to answer your questions about this exciting new program.

Speakers:
Lynn de Vries, CPP, PCI, COO, DutchRisk
Gayle Rosnick, Director, Certification, ASIS International

Effective Management for Security Professionals Program
12:45 - 13:05
Effective Management for Security Professionals Program
 

Security professionals must have strong interpersonal skills, including negotiation, leadership, and team-building strengths, to successfully collaborate and engage employees in a security risk management strategy against all security threats. In response to these new demands, IE Business School has created this Program in partnership with ASIS International, through which you will be able to (among other learnings):

• Enhance business acumen and effectiveness
• Develop a strategic understanding, anticipatory and critical thinking.
• Become effective leaders and better decision-makers
• Develop communication and negotiation skills for persuasive influencing.

Speaker: Almudena Diaz Vidal, Associate Director Executive Education, IE Business School

Friday, 29 March 2019