Click here to be added to the mailing list for ASIS Europe 2019.

Critical Learning for Security Professionals

ASIS Europe 2018 will offer multiple tracks of valuable learning opportunities including keynotes, masterclasses, executive sessions, technology & solutions, training, and a career centre, alongside the exhibition.

 

Access key

Conference delegates only

Classroom Training and Council Programme only

Show pass – open to all participants

Wednesday, 18 April 2018

From 1 pm to 8 pm: Registration open
From 1 pm to 8 pm: Registration open
From 1 pm to 8 pm: Registration open
Welcome Party - Powered by NEDAP - Rotterdam Hall, Postillion Convention Center WTC Rotterdam
18:00 - 20:00
Welcome Party - Powered by NEDAP - Rotterdam Hall, Postillion Convention Center WTC Rotterdam
18:00 - 20:00

Kick off the event in style with an informal evening in the unique Rotterdam Hall of the Postillion Convention Center WTC Rotterdam. Enjoy a great evening full of entertainment and networking possibilities. Drinks and finger food will be served.

Thursday, 19 April 2018

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
Conference track 1
Conference track 1
Conference track 1
Opening Plenary & Keynote: The future of Digital – where the next 10 years of AI and IoT will bring us
09:00 - 10:00
Opening Plenary & Keynote: The future of Digital – where the next 10 years of AI and IoT will bring us
09:00 - 10:00

Tom Raftery will set the scene for the conference with expert insight into the organisational impacts of big data, automation and artificial intelligence. What will this mean for the organisations and jobs of the future? How quickly will these changes take place? What are the benefits for business and other organisations? This session will look at the perspectives of businesses, consumers, shareholders and communities – setting the parameters within which security professionals and particularly security leaders need to operate.

Speaker: Tom Raftery, Global VP, Futurist, and Internet of Things Evangelist, SAP

A Cyber-Physical Future – Security Implications
10:40 - 11:10
A Cyber-Physical Future – Security Implications

Renowned technology trend expert Scott Klososky will challenge established thinking by outlining new security concerns created by the technology innovations shaping business and our world.

Speaker: Scott Klososky, Founding Partner, Future Point of View

Security Leaders Panel Debate: Risk and Responsibility
11:15 - 12:15
Security Leaders Panel Debate: Risk and Responsibility
11:15 - 12:15

A panel of CSOs and Security Leaders from key sectors will interpret the keynote address, focusing on the risk outlook for security practitioners.

Topics the panel will explore include:
• What questions do we need to consider already now, at the early stages of Big Data and AI implementation?
• How can we assign and maintain responsibility through the next phase of technological evolution?
• How do the differences between perceived and real risks impact the role of the security leader?
• Where are the major gaps in current operating models and methodologies?
• How can ESRM (Enterprise Security Risk Management) principles help organisations?
• What are the key messages for security leaders to convey to top management?

This Panel will be chaired by Prof. Martin Gill.

Speakers: Carl Erickson, CPP, CISO, Philips Lighting, NL, Martin Gill, Director, Perpetuity Research, UK, Axel Petri, Senior Vice President Group Security Governance, Deutsche Telekom, DE, Mike Howard, Chief Security Officer, Microsoft, US and Sarah Armstrong-Smith, Head Continuity & Resilience, Fujitsu, UK

Cyber Threat Landscape
13:30 - 14:15
Cyber Threat Landscape
13:30 - 14:15

Cyber security has become one of the major challenges that organisations face today. According to the 21st PwC CEO Survey, 33% of CEOs are extremely concerned about cyber threats. Matthijs van der Wel will provide a high level overview of various threat actors and how their objectives and operations impact your cyber risk profile. He will also discuss various practical models that your organization can adopt today.

Speaker: Matthijs van der Wel, Director Forensic Technology Solutions, PwC, NL

Virtual Security Operation Center Transformation: How to Utilize the Cloud, Big Data and Machine Learning
14:20 - 15:05
Virtual Security Operation Center Transformation: How to Utilize the Cloud, Big Data and Machine Learning
14:20 - 15:05

This session will explore the transformation of Microsoft’s global security operations centers to a virtualized security operations center.

This transformation utilized both cloud and the mobility of devices. We will share our own journey, highlighting changes to our people, processes and technologies. The discussion will touch on how we changed our operating model to a fusion center that co-locates intelligence and operations.

We will demonstrate how we use the cloud for signal mitigation, bringing life safety events to the forefront, as well as highlighting the power of cloud computing and machine learning to build effective budgets and operational plans.

You will see how we are visually displaying data's patterns, trends, correlations and predictive analytics to provide situational awareness. Participants will learn how data can challenge conventional thinking, drive business decisions and ultimately demonstrate the value of its security organization.

Speaker: Michael Foynes, Senior Director of Global Operations, Global Security, Microsoft

Masterclass 1: How Digital Asset Valuation Impacts Risk Assessments
15:50 - 17:25
Masterclass 1: How Digital Asset Valuation Impacts Risk Assessments
15:50 - 17:25

Organisations are rapidly generating and developing abilities to handle, analyse, and make sense of vast amounts of data – levels that would have been unimaginable even a few years ago. Additionally, data that did not exist before is now available and data that was trivial before, can suddenly become both valuable and sensitive. The objective of this Masterclass is to address how the increasing value of data and digital assets impacts risk assessments and the asset protection approach in organisations which have historically, had more of an emphasis on protecting human or physical assets. We will explore structures and processes, highlighting where new thinking is required and where tried and tested security risk management is still crucial. This deep-dive session will include several concise presentations and group dialogue on the topics:
• Key shifts in the threat landscape, using common definitions to put the change drivers in context
• Approaches for valuing a range of digital assets such as customer data, intellectual property and process data, plus assessing non-financial values such as reputational risk in case of customer data loss, employee data exposure etc.
• Structural and process changes
• Perception challenges with leadership and employees
• Staying focused and “away from the noise” in order to implement effective measures

Speakers: Carl Erickson, CPP, CISO, Philips Lighting, NL, Gal Messinger, Head of Global Security, Philips Lighting, NL, Eduard Emde, CPP, ASIS Europe 2018 Conference Chair, Head of the Health, Safety and Security Section, ESA (European Space Agency), NL

President's Reception - Harbour Club Rotterdam
20:00 - 22:00
President's Reception - Harbour Club Rotterdam
20:00 - 22:00

Hosted by the President of ASIS International and sponsored by Johnson Controls, this is the perfect opportunity to meet and network with fellow industry professionals in the informal and trendy settings of the Harbour Club Rotterdam. Tickets are required for this function. Address: Harbour Club Rotterdam - Kievitslaan 25 - 3016 CG Rotterdam Directions: From the WTC take Tram 8 direction Spartastraat and stop at Kievitslaan

Conference track 2
Conference track 2
Conference track 2
Case Study - Snowden’s Critical Pathway: From Intelligence Contractor to Unleashing an Avalanche of Media Leaks
13:30 - 14:15
Case Study - Snowden’s Critical Pathway: From Intelligence Contractor to Unleashing an Avalanche of Media Leaks
13:30 - 14:15

What happens when individuals decide to take confidential data from an organization into the public? What is behind their motivation and what processes do they go through before this decisive moment? This is not a sudden act, and organizational context can either accelerate or prevent critical leaks from taking place.
From the specialised viewpoint of a Clinical Psychologist, this presentation will take you along Snowden’s critical pathway, from his early career up to his current life in Russia. We will look back at personal, organisational and societal factors and discuss the two opposing societal views of him being a whistle blower or a malicious insider.

Speaker: Elsine van Os, CEO and Founder, Signpost Six

Insider Threat Interactive Session – Chasing Shadows or Targeted Defence?
14:20 - 15:05
Insider Threat Interactive Session – Chasing Shadows or Targeted Defence?
14:20 - 15:05

Widely considered the source of highly damaging attacks but where is the threat most likely to come from (disgruntled employee, rogue executive, radicalised employee, 3rd party supplier…)? Do organisations have specific plans for mitigation? For response? Are accidental or malicious insiders the greater threat? What happens to prevention strategies post GDPR?
Using live polls and voting through the event mobile app, we will enhance your peer to peer learning experience – join us to share and create new insights on the spot, in the room.

Facilitators:

Michael Gips, CAE, Chief Global Knowledge & Learning Officer, ASIS International
Elsine van Os, CEO and Founder, Signpost Six

Innovative security in the era of drones and robotics
15:50 - 16:10
Innovative security in the era of drones and robotics

In an innovative company using drones, robotics and other cutting edge technologies and concepts, security and loss prevention must align itself and use innovation to provide the level of service needed. The presentation will include examples of those logistics technologies.

Speaker: Gilad-Solnik, Director Security & Loss Prevention, EMEA Global Security, Amazon, LU

Soft Target Protection: Best Practices from Cultural Properties
16:15 - 16:35
Soft Target Protection: Best Practices from Cultural Properties

Cultural Properties share many characteristics with other public places of assembly, such as event locations, retail outlets and sports stadia. Risks including crime and new terrorism threaten the security of highly valuable works of art, and the safety of staff and visitors. This presentation will examine new terrorism attack methods, the characteristics of their attack sites, and why the terrorist picks certain sites. We will look at how soft targets can be protected by applying the principles of Situational Crime Prevention, a process for protecting cultural properties against terrorist attacks and other forms of crime.

Speaker: Dr. Declan Garrett, Head of Security, Louvre Abu Dhabi, UAE

Insurance As Part of the Risk Management Strategy -Not as Dull as it Sounds
16:40 - 17:00
Insurance As Part of the Risk Management Strategy -Not as Dull as it Sounds

Insurance is a key element of a holistic risk management strategy, but very few people know its value or its true importance. In fact, its a subject that holds little interest to most. But annual worldwide losses attributable to cyber-crime alone are set to quadruple to more than US$2.1 trillion by 2019, and yet 60 percent of Fortune 500 companies currently lack any insurance against cyber incidents. This session will practically discuss the importance of insurance while focusing on the importance of understanding the subject to security professionals who want to talk risk management strategies to their business leaders.

Speaker: James Morris, Regional Security Manager, EMEA, Corporate Protection Services, Aon UK

Emerging Drone Risks: A Case Study on Drone Swarms
17:05 - 17:25
Emerging Drone Risks: A Case Study on Drone Swarms

Unmanned Aerial Vehicles (UAVs), commonly referred to as ‘drones’, have received significant attention in recent years. The emergence of affordable and readily available UAVs is a boon given their many positive applications. However, the risk of UAVs for malicious purposes has also grown, not least in Iraq and Syria, where the Islamic State group has deployed UAVs to launch attacks. A notable development occurred in Syria in January 2018 when a swarm of 10 UAVs launched a co-ordinated attack on a Russian airbase. Despite the apparent failure of this attack, it is a signpost for what will become possible as new developments such as pre-programmed flight capabilities and developments in artificial intelligence could be used to enhance UAV attacks. UAV-borne threats are likely to pose challenges to the built environment and to business operations in the coming years. This talk will discuss how UAV threats to property and infrastructure might develop in the coming years.

Speaker: Richard Bond, Senior Consultant, Arup

Conference Training track
Conference Training track
Conference Training track
Fundamentals of Cyber-Physical Security
10:30 - 12:30
Fundamentals of Cyber-Physical Security
10:30 - 12:30
Conference Training Module 1

This training will demonstrate the value of an ESRM strategy and multi-disciplinary teams. It will recommend the use of common security risk reporting processes and information sharing so that security practitioners will be able to prioritize the threats and respond more effectively. It will help the fractioned gain a high level strategic understanding of risk and also how to implement technical solutions. It will provide evidence that organizations which adopt such a unified approach identify the risks and are more resilient than those which operate in silos. It will examine a variety of risk tools and demonstrate the value of leveraging technology to assist the process of mitigating complex converged cyber physical risk. Hence it will give the practitioner the confidence to discuss security risk at board level and assure them that the necessary technical controls are in place to identify and mitigate it.

Trainers:
Volker Wagner, Vice President Security, BASF Group, DE
James Willison, Founder, Unified Security Ltd, UK

Travel Risk Management - How to set up a Travel Risk Management Programme
13:00 - 15:00
Travel Risk Management - How to set up a Travel Risk Management Programme
13:00 - 15:00
Conference Training Module 2

Staff travelling abroad must be, and feel, as safe and secure as is reasonably possible. When staff travel abroad the organisation needs to understand the risks and be in a position to plan and react promptly, taking whatever action is opportune. A TRM policy should be an integral part of the management process of any organisation whether it is small, medium or large. Safety and security for staff abroad means peace of mind for management at home

Module 1: The case for Travel Risk Management: Compliance, Due Diligence and Risk Appetite
Module 2: Getting organised (how to develop and manage TRM operations.)
Module 3: In the field: Risk Perception, Context and Assessment - how to interpret intelligence, stay or evacuate in emergency.
Module 4: Corporate, Social, Responsibility CSR and institutional alignment/recognition.
Module 5: Round Table Q & A

Trainers: Roger Warwick, CPP, CEO, Pyramid Temi Group, IT, Daniela Valenti, Global Project Manager, Pyramid Temi Group, IT and Andy Williams, CPP, Senior Partner / VP Business Development & Quality Assurance, Temi Group / Safe Hotels Alliance

Crisis Management Training: Managing Data Extortion Crises
15:30 - 17:30
Crisis Management Training: Managing Data Extortion Crises
15:30 - 17:30
Conference Training Module 3

One of the favourite modi operandi of cyber criminals is to steal data to extort their victims. This does not only occur by making systems unavailable through ransomware, but also by stealing sensitive data and using it to extort the organisation. This extortion involves the threat of releasing the data to the public or using it for additional criminal use.
Being threatened by such an exposure can cause a major crisis for organizations, whether small or large. Although the origin is a cyber crime, the crisis itself is fundamentally a matter of reputation.
This training explains how to prepare a crisis plan for data extortion. Part of the training is participating in a crisis exercise titled: ‘sensitive customer data stolen'.

Trainers: Theo Stevens, CPP, Senior Security Officer, NN Group Corporate Security & Investigations, NL and Erik de Vries, CPP, Owner, DutchRisk, NL

Classroom Training
Not included in conference registration
Classroom Training
Classroom Training
Fundamentals of Cyber-Physical Security
10:30 - 12:30
Fundamentals of Cyber-Physical Security
10:30 - 12:30
Classroom Training Module 1

This training will demonstrate the value of an ESRM strategy and multi-disciplinary teams. It will recommend the use of common security risk reporting processes and information sharing so that security practitioners will be able to prioritize the threats and respond more effectively. It will help the fractioned gain a high level strategic understanding of risk and also how to implement technical solutions. It will provide evidence that organizations which adopt such a unified approach identify the risks and are more resilient than those which operate in silos. It will examine a variety of risk tools and demonstrate the value of leveraging technology to assist the process of mitigating complex converged cyber physical risk. Hence it will give the practitioner the confidence to discuss security risk at board level and assure them that the necessary technical controls are in place to identify and mitigate it.

Trainer: Volker Wagner, Vice President Security, BASF Group, DE

Travel Risk Management
13:00 - 15:00
Travel Risk Management
13:00 - 15:00
Classroom Training Module 2

More and more experts are travelling for their companies or organizations but the situation can change very fast. Travel Risk Management is becoming a real topic for employers in the framework of Duty of Care. This session will help you to understand the importance of Duty of Care. The workshop will focus on concrete situations and will help you to know which measures should be implemented to protect your workforce. We will then review real case studies to determine what lessons can be learnt from past events. After this session, you will able to identify and mitigate risks for your business travellers. Trainers:
Mike van Drongelen, CPP, PCI, PSP, Physical Security Advisor, SWIFT Global Corporate Security
Aurore Chatard, Regional Security Manager Central Europe, International SOSW and Control Risks

Crisis Management Training: Preparing for Data Extortion Crises
15:30 - 17:30
Crisis Management Training: Preparing for Data Extortion Crises
15:30 - 17:30
Classroom Training Module 3

One of the favourite modi operandi of cyber criminals is to steal data to extort their victims. This does not only occur by making systems unavailable through ransomware, but also by stealing sensitive data and using it to extort the organisation. This extortion involves the threat of releasing the data to the public or using it for additional criminal use.
Being threatened by such an exposure can cause a major crisis for organizations, whether small or large. Although the origin is a cyber crime, the crisis itself is fundamentally a matter of reputation.
This training explains how to prepare a crisis plan for data extortion. Part of the training is participating in a crisis exercise titled: ‘sensitive customer data stolen'.

Trainers: Bianca Zonne, PCI, Security Manager, TomTom and Lynn de Vries, CPP, Partner, DutchRisk, NL

Technology & Solutions Track
Technology & Solutions Track
Technology & Solutions Track
Are the Most ‘At-Risk’ Failed by Equality in Travel Risk Management Programmes?
10:40 - 11:00
Are the Most ‘At-Risk’ Failed by Equality in Travel Risk Management Programmes?

When addressing personnel risk, travel policies and procedures are generally based on home-country legislation, attitudes and cultures rather than those at the destination, with all travellers being assumed equal. Often this is based on the least ‘at-risk’ population (middle aged, straight male) so the procedures, risk assessment, education, training and support can fail the most ‘at-risk’ (for a particular destination e.g. homosexuality punishable by death). This can be further complicated by not being able to make assumptions (e.g. gender, sexuality) of an employee, making it difficult to provide advice or training they might need. Is it time to change the benchmark profile?

Speaker: Saul Shanagher, Director, beTravelwise

Inside Knowledge - Hotel Safety and Security
11:05 - 11:25
Inside Knowledge - Hotel Safety and Security

Travel security risk management and duty of care due diligence is becoming a leading priority for corporations sending business travellers around the world. While corporate security can risk rate countries, cities and destinations with reasonable confidence, knowing how to risk rate a particular hotel, or hotel brand is not always so clear. This presentation will provide inside knowledge on what to look for when conducting a hotel security assessment, key questions to ask the hotelier, and how to be better informed when making the right choice of hotel for the business traveller.

Speaker: Andy Williams, CPP, Senior Partner / VP Business Development & Quality Assurance, Temi Group / Safe Hotels Alliance

Introducing Global Physical Access Control at Swiss Re: Challenges and Learnings
11:30 - 11:50
Introducing Global Physical Access Control at Swiss Re: Challenges and Learnings

Introducing Global Physical Access Control at Swiss Re: Challenges and Learnings This presentation shows the steps to selecting a physical access control system, and its practical implementation. What are the reasons to move to a new physical access control system (PACS)? What are the requirements of the new system? Does it use cards, mobile devices or biometrics? And how should the project be organised? We'll highlight the challenges faced and lessons learned in this global project.

Speaker: Christoph Teuber, Head of Group Security, Swiss Re

Is bug sweeping dead? The future is a suite of 24/7 detection and protection measures
11:55 - 12:15
Is bug sweeping dead? The future is a suite of 24/7 detection and protection measures

The traditional approach if a business believes their information is compromised is for a sweep team to search for the presence of bugging devices. Governments and businesses regularly use Technical Surveillance Countermeasures to defend against illicit microphones, cameras, and so on.

However, this is becoming ineffective because:

1. Mass adoption of consumer technology is driving development, radio spectrum congestion and technology ubiquity. The job of the sweep team is too complex, slow and inconclusive to be used alone.

2. Sweeping delivers short duration assurance. Technologies now exist offering a wider set of approaches to be used to provide protection against bugging threats.

These include automated spectrum monitoring, leave-behind systems and ‘TSCM-lite’ kits for local capability.

Speaker: Dominic Turl, Head of Technical Services, Esoteric, UK

Risk Mitigation and the Importance of "How"
13:30 - 13:50
Risk Mitigation and the Importance of "How"

Everybody loves a "who done it" detective story. But when it comes to risk mitigation, while the who is important -- as are the what, when, where and why – nothing helps to implement measures to mitigate a threat better than understanding the how. This session will discuss the tradecraft used in two industrial espionage cases (Medrobotics and Deloitte) and illustrate how these cases emphasize the need for a holistic, ESRM approach to protecting proprietary information that straddles traditional corporate security boundaries.

Speaker: Scott Stewart, Vice President of Tactical Analysis, Stratfor

Crisis Communications in Action: Terrorist Attack Case Studies
13:55 - 14:15
Crisis Communications in Action: Terrorist Attack Case Studies

F24 explores the experiences of three companies with similar business and communication challenges following the London Bridge attacks in June 2017:

• What were the challenges that each company faced?
• How were they able to overcome these issues?
• What lessons were learned?
• How has this experience enabled them to change their security and resilience planning?


Speaker: John Davison, Managing Director for F-24 UK Limited

The Future Impact of AI on Cyber-Crime
14:20 - 14:40
The Future Impact of AI on Cyber-Crime

This session is designed to help security professionals learn about: • The current and future cyber-threat landscape
• Leveraging machine learning and AI algorithms to defend against never-seen-before cyber-threats
• How new technologies enable you to pre-empt emerging threats and reduce incident response time
• Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
• Real-world examples of subtle, unknown threats that routinely bypass traditional controls

Speaker: Ennio Di Rosa, Senior Cyber Security Manager, Darktrace

Artificial Intelligence for Secure Access Control
14:45 - 15:05
Artificial Intelligence for Secure Access Control

Managing the access from an unsecure zone to a secure zone in a building is becoming more and more challenging. Different types of flows must be handled, such as people with reduced mobility, people with extreme corpulence, people with hand-luggage and material. An optimal compromise has to be found between security and speed of passage. In our presentation, we will show how artificial intelligence can solve this issue, and how it has been implemented in existing projects.
Speaker: Fabrice Moscheni, Managing Director, FASTCOM Technology SA

Smart Buildings: Fundamentals for Security Professionals
15:50 - 16:35
Smart Buildings: Fundamentals for Security Professionals
15:50 - 16:35

This session is designed to help security professionals quickly get to grips with what smart buildings are, and what they mean for a security risk management. We will examine:
• the business opportunities enabled by this technology, e.g. sustainability, energy savings, a tailored experience.
• How smart buildings can help to mitigate traditional risks (e.g. access control, tracking etc).
• New and emerging risks that come with the technology e.g. cyber, insider threat, vendor risk, GDPR compliance)
• How the emerging risks can be mitigated
The session will be structured into several short segments to facilitate dialogue amongst the attendees.

Speaker: John Flanderhijn, Sr. Director Marketing Strategy & Business Development, Johnson Controls

Information overload: Security Awareness in the Digital Era
16:40 - 17:00
Information overload: Security Awareness in the Digital Era

Everyone has 2 minutes, but nobody will give you 20 minutes or more. Especially not when the matter is complex or difficult, and its personal importance is not instantly apparent. Information overload, time constraints, and lack of user orientation are factors that lead to bottlenecks in the effective transfer of knowledge – for security, data protection and compliance issues in particular.

Today, users decide which information they want to consume when, where and how – with just one click. For this reason, persons responsible for security must make a great effort to stay up to date in the communications rat race and gain user acceptance for their messages and content. Detlev Weise outlines the rules of the new communication game in the era of digital transformation: Which channels must I use to address my in-house target groups? How do I get people to pay attention to my issues? And: How should knowledge transfer be designed and structured in order to trigger the desired employee behaviour?

Speaker: Detlev Weise, CEO, exploqii

GDPR and Cyber Threats: Getting your Video Surveillance operation prepared for May 25th.
17:05 - 17:25
GDPR and Cyber Threats: Getting your Video Surveillance operation prepared for May 25th.

GDPR (General Data Protection Regulation) and Cyber Threats are very topical this year and closely related to each other. Video Surveillance of public areas has been pointed out as high risk data to the rights and freedom of individuals under GDPR. As such, organizations need to have a documented assessment of their operations as well as the measures that they have taken to protect Data Subjects captured data. With the new regulation becoming enforceable on May 25th 2018, we will go over considerations in terms of the review process, relationship with their suppliers as well as technological choices so that organizations can be best prepared ahead of the D-date.

Speaker: Jean-Philippe Deby, Head of Building Industrial Market Segment, Genetec

Career Centre
Career Centre
Career Centre
How to Build a Winning Resume
10:30 - 11:15
How to Build a Winning Resume
10:30 - 11:15

A resume, along with your social media profile is part of your personal brand and getting this right can be the first step in finding a new position. We will look at ways of optimising this.

Speakers: Mike Hurst, Director, HJA, UK and Graham Bassett, Managing Director, GBRUK Ltd, UK

IFPO Certification Event
11:20 - 12:30
IFPO Certification Event
11:20 - 12:30

IFPO Europe is facilitating training and certification needs of protection officers and security supervisors/managers from both the commercial and proprietary sectors. During this presentation, IFPO Europe will present the benefits of the CPO and CSSM certification.

Sandi Davies, Executive Director of the International Foundation of Protection Officers will host a certification ceremony for 30 brand new certified CPO´s.

Speaker: : Sandi Davies, Executive Director, International Foundation for Protection Officers, US

Diversity, Inclusion and Career Development at Amazon
13:30 - 14:15
Diversity, Inclusion and Career Development at Amazon
13:30 - 14:15

The presentation focuses on the importance Amazon places on Diversity and Inclusion. It also describes the coaching and development Amazon provides to its Loss Prevention team and the approach taken to support career aspirations, how Amazon mentors and grows the talent in the teams. With a personal example, the presentation explains how to manage your own development, areas to focus on and the challenges that can be overcome.

Speakers: Eva Mueller, Senior HR Business Partner, EU Corp OPS, Amazon, Jo Day, Regional Loss Prevention Manager, Amazon, UK

The Benefits of Certification
14:20 - 15:05
The Benefits of Certification
14:20 - 15:05

ASIS security certifications set the standard for professional excellence. Recognized worldwide, the CPP, PCI, and PSP credentials provide objective proof of professional knowledge and experience. Get an update of the most recent developments regarding the (concept) ESMP (Emerging Security Management Professional) certification of ASIS. Learn from experienced trainings and HQ staff why ASIS certifications are the top choice for security professionals, how you can distinguish yourself in the labour market and how the IFPO certification programs, such as CPO, can be a great stepping stone towards ASIS security certification.

Speakers:
Gayle Rosnick, Certification Director, ASIS International, US
Sandi Davies, Executive Director, International Foundation for Protection Officers, US
Erik de Vries, CPP, Owner, DutchRisk, NL

ASIS/SSR European Salary Survey
15:50 - 16:35
ASIS/SSR European Salary Survey
15:50 - 16:35

ASIS and SSR have teamed up for the 2018 SSR & Executive Profiles salary survey which reviews more than 4,000 security professionals across the finance sector, manufacturing, extractives, FMCG and logistics. The results will be presented here. Gain competitive insights on your position in the labour market and how your sector is performing.

Speaker: Peter French, CPP, CEO, SSR Personnel

Roundtable discussion: Transitioning from the Military and Law Enforcement
16:40 - 17:30
Roundtable discussion: Transitioning from the Military and Law Enforcement
16:40 - 17:30

Please join us for a roundtable session on how to best transition from a successful law enforcement or military career. Discuss with experienced security experts how to bolster your cv, prepare for a job interview or develop further your career.

Speaker:

Nicolas Le Saux, CPP, CEO, ATAO SAS & UNIPROTECT, FR
Juliet McKane, Senior Manager, World Wide Safety and Security, Dassault Systemes UK Limited, UK

ASIS Cultural Properties Council Seminar
ASIS Cultural Properties Council Seminar
ASIS Cultural Properties Council Seminar
ASIS Cultural Properties Council Seminar
Opening Session
10:30 - 10:50
Opening Session

Introduction and format of the event, housekeeping, Health & Safety, programme

Speaker: Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy

Outlining the threats that exist across the cultural sectors and anticipated going forward
10:55 - 11:25
Outlining the threats that exist across the cultural sectors and anticipated going forward
Private security personnel: the most important aspect of security but what are we doing to develop them?
11:30 - 12:00
Private security personnel: the most important aspect of security but what are we doing to develop them?

Private security continues to grow, outnumbering public policing. Underlying drivers include government austerity measures leading to more reliance on the private sector, outsourcing, crime and the fear of crime. Unfortunately, the sector is often unable to attract the best candidates since it is rarely viewed as a viable career option. Internationally, private security has been subject to increasing regulation for the purpose of raising standards and, in turn, public confidence. However, the sector needs to invest in its people and it lacks the key elements of a structured career path, and there have been few endeavors to establish the foundations of one to support the professionalism of private security. This presentation focuses on the importance of developing people and draws on research that took place over four years that identified the elements required to develop the foundations of a structured career path.

Speaker: Dr. Declan Garrett, Head of Security, Louvre Abu Dhabi, UAE

Keynote: Developing Cultural Property Standards and Guidelines
12:05 - 12:25
Keynote: Developing Cultural Property Standards and Guidelines

The ASIS International Cultural Properties collaborates with various cultural property subject matter experts to create security guidelines and best practices for museums, libraries, houses of worship, and other historic and world heritage sites. This session will explore the current standards and guidelines work that the council is doing.

Speaker: Robert Carotenuto, CPP, PSP, PCI, Associate Vice President for Security, The New York Botanical Garden

Using Physical and Technical Measures to Protect Cultural and Heritage Venues
13:25 - 14:10
Using Physical and Technical Measures to Protect Cultural and Heritage Venues
13:25 - 14:10

To create a robust protection programme venues have to adopt a multilayered approach that incorporates a number of security measures that are interwoven and create security in depth. This presentation will discuss the concept of ‘security in depth’ and how the physical and technical security measures play an active part, alongside and in support of the human protective element. Best practices and applications will be discussed to enable delegates to better understand the part that these measures play in protecting our Cultural and Heritage sites.

Speaker: Andy Davis, CPP, Managing Director, Trident Manor Limited

The Use of Behavioural Analysis in Protecting Cultural and Historic Venues
14:15 - 15:00
The Use of Behavioural Analysis in Protecting Cultural and Historic Venues
14:15 - 15:00

Cultural and historical venues by their nature are open and welcoming locations. Because of this, striking a balance between open public access and appropriate security measures is very important to ensure visitors are not intimidated and the welcoming approach is maintained. The provision of specialised training of staff and volunteers is an important way of achieving this objective. One critical aspect within that training process is increasing the levels of situational awareness amongst all staff and using an effective behavioural analysis approach to identify and act upon suspicious activities and actions.

This presentation will demonstrate the importance of situational awareness and how to recognize and act upon non-verbal interpretations to assess whether what is being seen or observed is one of normality or a potential precursor to an aberrant act.

Outcomes: At the end of the presentation delegates will:

• Understand the importance of situational awareness in identifying and protecting assets.
• Be able to evaluate activities and non-verbal actions of third parties.
• Be able to understand whether the analysis of behavioural activities would be beneficial to their organisation.
• Be better able to implement a behavioural analysis approach into their security program.

Speaker: Douglas Beaver, CPP, Executive Director of Protective Services, National Museum of Women in the Arts, Washington, DC

Archaeological Site Security Case Study: Clunia, Huerta De Rey Spain
15:30 - 16:15
Archaeological Site Security Case Study: Clunia, Huerta De Rey Spain
15:30 - 16:15

The Cultural Properties Council sought to answer this question: what is the best way to develop a security plan to protect archaeological sites? Council members proposed exploring the Clunia archaeological site in Huerta de Rey to create a case study to be published in a future English-Spanish language CRISP Report. With the support of the ASIS Foundation, the Council’s research included a site survey and risk assessment that focused on exploring the site's culture and its vulnerability to looting and natural or manmade hazards. The survey considered the local legal requirements, available resources, and concerns and how they would affect the security plan.

Speaker: Ricardo Sanz Marcos, Partner and Manager, ProArPa, Assets and Heritage Security Consultancy

Panel Discussion
16:20 - 17:10
Panel Discussion
16:20 - 17:10
Closing Plenary and Conference Wrap-Up
17:15 - 17:30
Closing Plenary and Conference Wrap-Up

Thursday, 19 April 2018

Friday, 20 April 2018

Download
Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
Conference track 1
Conference track 1
Conference track 1
Jihadi Terrorism Trends in Europe: A Look Ahead
09:10 - 09:55
Jihadi Terrorism Trends in Europe: A Look Ahead
09:10 - 09:55

This dynamic presentation will focus on the evolving Jihadi terrorist threat in Europe, look ahead at likely challenges this spring, summer and fall, and stress improving resilience through recent lessons learned.

This includes gaining insight on situations ASIS members are likely to have to deal with over 2018 like the June-July World Cup football tournament in Russia; the threat around various upcoming elections; and far-right and far-left extremist reactions to terrorist activity.

Also covered will be recent changes in terrorist tactics and emerging best practices in managing acute threats for staff in office environments.

Speaker: Glenn Schoen,CEO, [email protected]

Public Spaces: Today's Front Line Against Extremist Violence
10:00 - 10:45
Public Spaces: Today's Front Line Against Extremist Violence
10:00 - 10:45

Urban security precincts, designed expressly to control access and facilitate surveillance, can help to protect public places from vehicle attacks like those perpetrated in New York, Boston, Brussels, Paris, London, and Barcelona.

We can apply access controls and enhanced vigilance to large areas, including parks, promenades, malls, streets, museums, government quarters and more. Architects and urban designers are helping to design enclaves and precincts, with new variations on old methods, and using new technologies that help to detect contraband and anomalies. Security must be extended to entire urban areas.

Speaker: Thomas Vonier, CPP, President, The American Institute of Architects, FR

Masterclass 2: GDPR and its Impacts on Enterprise Security
11:30 - 13:05
Masterclass 2: GDPR and its Impacts on Enterprise Security
11:30 - 13:05

The EU’s new General Data Protection Regulation will come into force in May 2018 – is your organisation ready? Have you mapped the impacts on your security processes?
This deep-dive session will first outline the regulation and its major impacts from the perspective of a privacy expert. We will then examine key security impacts for different industries. Expect specific focus on topics such as investigations and data collected by security cameras.
Session to be chaired by Axel Petri, Senior Vice President Group Security Governance, Deutsche Telekom.

Speakers: Axel Petri, Senior Vice President Group Security Governance, Deutsche Telekom, DE, Christoph Rojahn, Director, Forensic Services, PricewaterhouseCoopers, CEE/CIS

Interactive Session: Skillsets of the Security Team Now and in the Near Future
14:15 - 15:00
Interactive Session: Skillsets of the Security Team Now and in the Near Future
14:15 - 15:00

Having heard how an increasingly diffuse risk outlook impacts the role and expectations on the security team, how can you set up your organisation effectively? What are the skillsets needed now, what will be new, and what will become redundant?
Will you be adding robots and drones to your security team?
What are the options for different sizes and types of organisations? What will be in-house and what will be outsourced?
Using live polls and voting through the event mobile app, we will enhance your peer to peer learning experience – join us to share and create new insights on the spot, in the room. A panel of security leaders and young professionals will stimulate the exchange with their viewpoints. The session will be chaired by Florian Haacke, CSO / Head of Group Security, Innogy.

Speakers: Stuart Eustace, CPP, Global Lead Risk, Security & Crisis Management, pladis, UK, Michael Gips, Chief Global Knowledge & Learning Officer, ASIS International, US, Florian Haacke, Head of Group Security, Innogy, DE, Ben Suurd‎, CPP, Regional Head of Security Europe / AMESA, Reckitt Benckiser, NL

Closing Plenary and Conference Wrap-Up
15:00 - 15:30
Closing Plenary and Conference Wrap-Up

President's Reception
20:00 - 22:00
President's Reception
20:00 - 22:00

Conference track 2
Conference track 2
Conference track 2
ESRM: A Management Philosophy
09:10 - 09:55
ESRM: A Management Philosophy
09:10 - 09:55

Being adaptive to new types of risk is at the core of ESRM - the practice of managing a security program through the use of risk principles. It’s a philosophy of management that can be applied to any area of security and any task that is performed by security, such as physical, cyber, information, and investigations.
A member of the ASIS International ESRM Commission will demonstrate the value of ESRM in addressing emerging risks created by the blurring of boundaries between the physical and cyber worlds.

Speaker: John Petruzzi, CPP, VP of integrated Security SOlutions, G4S Americas

Adapting and Improving: Understanding and Measuring Business Resilience
10:00 - 10:20
Adapting and Improving: Understanding and Measuring Business Resilience

ESRM in Focus: A three-part double session framing the need for ESRM approaches and how to implement them.
Part 3. Adapting and Improving:
Partitioning human, physical and IT security is artificial in modern enterprise operating in a multi-layered risk environment. Business resilience as an umbrella concept introduces a more effective approach to organisational security. It urges to combine different areas of security into an integrated process. Instead of preparing for specific threats, we should train core aspects of organisation to be so flexible and adaptable that it can survive any disruption. This presentation provides a framework, which helps to evaluate level of resilience in organisation, as well as discusses how companies can improve their business resilience.

Speaker: Laura Poderys, Business Continuity Manager, Group Physical Security, Danske Bank

Discussion: ESRM in your organisation
10:25 - 10:45
Discussion: ESRM in your organisation
Blockchain for future security
11:30 - 12:15
Blockchain for future security
11:30 - 12:15

The distributed and cryptographic nature of the blockchain technology is, leveraging itself as a key component of future “secure-graph” where physical and cyber world augmented into one, which will be the new operating domain for future security professionals. Blockchain as a technological term might be one of the most complex concepts in the tech buzz world of words, however when the real potential is unchained, implementation areas of the technology in the security industry and eventually in our daily life, is immersive and so disruptive to an extend that we all not only need to consider to adopt but forced to live with it.

In this presentation, blockchain and some relevant technical solutions and terms will be presented in the simplest way to be correctly resonated in security world and jargon.

Speaker: Orhan Topcu, Senior regional security manager MEA, Microsoft, TR

Big Data Breadcrumb Trails – How IoT Sensor Data Creates New Risks
12:20 - 13:05
Big Data Breadcrumb Trails – How IoT Sensor Data Creates New Risks
12:20 - 13:05

Sensors on IoT devices collect vast amounts of data, that when analysed may reveal patterns that inadvertently expose your organisation to new risks. This will often include data collected by your smartphone or connected car. A recent example of this was widely covered in the media when data collected by fitness tracking app Strava revealed the location and outline of military bases and the routines of personnel stationed there. Peter Zmiyarch, Assistant Head Operations Security at the Organisation for the Prohibition of Chemical Weapons (OPCW) will analyse this case and use additional examples from his own daily practice to address deficiencies in how organisations and their staff are equipped to handle these new risks.

Speaker: Pete Zmiyarch, Assistant Head Operations Security, Organisation for the Prohibition of Chemical Weapons (OPCW)

President's Reception
20:00 - 22:00
President's Reception
20:00 - 22:00

Conference training track
Conference training track
Conference training track
Cyber Crime Simulation Game
09:00 - 11:00
Cyber Crime Simulation Game
09:00 - 11:00
Conference Training Module 4

Includes a quick overview on ISO 27001

This interactive simulation game allows you to play a role and understand stakeholder needs from all perspectives, in an actual Cyber Incident. Players in the game include, a range of stakeholders including customers, senior management, regulators, technical experts and the media. During the game we will simulate the key objectives of each stakeholder group, their information needs, the pre-disaster provisions they could have put in place as well as instant action plans that they could develop. We will simulate the interaction between the stakeholders by means of this interactive game.
Participants receive a game ‘kit’ as part of their participation, which includes a range of topical challenges to address within the 2--hour game format.

Speaker: Rinske Geerlings, Managing Director, Business As Usual, AU

Soft Targets and Terrorism Risk Management
11:20 - 13:20
Soft Targets and Terrorism Risk Management
11:20 - 13:20

In this special two-hour program, anti-terrorism consultant Craig Gundry explores the unique challenges of protecting soft target facilities against mass violence and specialized approaches for managing terrorism-related risk. Some of the topics surveyed in this seminar include strategic risk management concepts, protective counterintelligence, physical security strategies appropriate in diverse soft target environments, integration of physical security and emergency preparations, infrastructure design, and emergency response planning.

Speaker: Craig Gundry, PSP, Lead Instructor, Anti-Terrorism Programs, S2 Safety & Intelligence Institute

President's Reception
20:00 - 22:00
President's Reception
20:00 - 22:00

Classroom Training track
Not included in conference registration
Classroom Training track
Classroom Training track
Game of Threats – A cyber threat simulation
09:00 - 11:00
Game of Threats – A cyber threat simulation
09:00 - 11:00
Classroom Training Module 4

Game of Threats is a digital game that is designed to create cybersecurity awareness. During this game two teams play against each other. One team will try to defend itself against the cyberattacks the other team, the threat actors, will deliver.

The game environment creates a realistic experience where both sides are required to make quick decisions with minimal information at hand. After the game we evaluate, together with the teams, the decisions that were made in order to learn and get insight into the consequences of these decisions.

Game of Threats is all about critical decision-making and it enables players to get insight into the complexity of cybersecurity and the steps that need to be taken to better secure their organisation against attacks.

Game of Threats gives insight into:
• The complexity of cybersecurity,
• What a cyberattack is,
• The ability of your organisation to react to a cyberattack,
• What strategic choices should be considered to organise your cybersecurity infrastructure.

Speakers:
Matthijs van der Wel, Director Forensic Technology Solutions, PwC Nederland
Koen ten Holter, Manager Cybersecurity, PwC Nederland

Soft Targets - Reducing Soft Target Risks through Staff Awareness Programs
11:20 - 13:20
Soft Targets - Reducing Soft Target Risks through Staff Awareness Programs
11:20 - 13:20
Classroom Training Module 5

In his book, The Gift of Fear, author and security expert Gavin de Becker writes that each of us has instincts that allow us to predict violent behavior. In the USA, people are told, “If you see something, say something.” In the UK, people are told, “See it, say it sort it.” But how can you train your staff to go beyond these words and trust their instincts to identify suspicious behavior and persons? Many soft targets such as houses of worship and entertainment venues do not have trained security officers trained to identify potential adversaries. This workshop will give you methods to engage your staff in training that will raise their security awareness and reduce your organization’s risk.

Speakers: Ibrahim Bulut, Senior Security Consultant, ALLSECCON Security Consultancy, BE

Technology & Solutions Track
Technology & Solutions Track
Technology & Solutions Track
ASIS Women in Security Breakfast
08:10 - 09:00
ASIS Women in Security Breakfast
08:10 - 09:00

Physical Prevention of Industrial Espionage by Eavesdropping
09:10 - 09:30
Physical Prevention of Industrial Espionage by Eavesdropping

Jason Dibley Technical Director at QCC Global gives an informal and interesting presentation examining how neglect of the physical security of a site, leads directly to industrial espionage and information theft. Using real world cases studies, video and photos of live eavesdropping attacks Jason also looks at the consequences of these different scenarios and how TSCM and other security measures could have prevented these situations occurring.

Speaker: Jason Dibley, Technical Director, QCC Global, UK

Physical Infrastructure protection: the 'human approach'
09:35 - 09:55
Physical Infrastructure protection: the 'human approach'

Pitagone will present the 'human approach' to physical infrastructure protection using examples from three case studies:

• At the Parliament of the Federation Wallonia-Brussels, Pitagone has put together a secure entry process for people, mail and vehicles, taking into account all possible scenarios of terror attack.
• At the OECD in Paris and Brussels-South Airport , Pitagone has tested all systems and trained security staff.
• For the Belgian National Football Team, Pitagone has facilitated the presence of highly trained Security supervisors to allows for good management of the teams, better performance and increases ROI

Speaker: Marc Weissberg, Founder and CEO, PITAGONE SA, BE

Surveillance Systems Network Integrity in a Cyber World
10:25 - 10:45
Surveillance Systems Network Integrity in a Cyber World

The migration of CCTV from analogue to IP platform has enabled many improvements and continued innovations in the surveillance space. Some of these include greater flexibility, scalability, integration and of course the evolvement of high definition multi megapixel cameras. However IP itself can present new challenges and threats to the integrity of a surveillance system in the area of network security. Is my CCTV system really ‘closed’? Here IndigoVision will examine how cyber-attacks are changing the way we need to think in deploying IP surveillance systems, where and what the threats are and the unique technology for surveillance systems they have developed to combat such threats.

Speaker: Jurgen Klijn, Senior Sales Director EMEA North, IndigoVision, NL

Predictive Intelligence: Enhancing Resilience - Adding Value
11:30 - 11:50
Predictive Intelligence: Enhancing Resilience - Adding Value

In this session, delegates will learn how predictive intelligence analysis is essential to an effective resilience strategy for global organisations. Using case studies drawn from our multinational client base, our speaker will illustrate how a number of leading brands have successfully incorporated predictive intelligence to support key strategic processes. Examples will cover the application of predictive intelligence into decision-making across physical security, new market entry, reputational and political risk and resilience programmes. Case studies are supported by the methodological framework Falanx Assynt has repeatedly proven over the past 15 years. Delegates will leave with a clear understanding of how and where they can add value to their organisations and enhance resilience through predictive intelligence.

Speaker: James Brandon, Director Geopolitical Intelligence, Falanx Assynt

Connected Storage: the forgotten risk of IoT
11:55 - 12:15
Connected Storage: the forgotten risk of IoT

The line between physical and cyber security is becoming increasingly blurred. Nowhere is this more true than the Internet of Things, where enormous amounts of sensitive data is being exchanged and unwittingly leaked each day. When we talk about the security risks of IoT, we think of smart devices, driverless cars and PLCs. We don’t often think about Connected Storage. Nowadays businesses cannot succeed unless they are able to share information widely and rapidly, so it is no surprise that these types of devices - cloud storage, personal NAS drives, databases - are proliferating. But this constant flow of information introduces numerous risks, both virtual and physical. CybelAngel cyber risk analyst Pierre Falconetti talks about the growing number of data leaks which are taking place on Connected Storage.

Speaker: Pierre Falconetti, Cyber-risk analyst, CybelAngel, FR

Social Media-a Force Multiplier for Corporate Security
12:20 - 12:40
Social Media-a Force Multiplier for Corporate Security

With the adage that the only thing we can be certain of is uncertainty seemingly never truer, security teams increasingly need to harness new technologies and develop new skill sets to safeguard assets. While we understandably focus on securing the vast amounts of data produced by our organisations, we overlook the security potential of the vast pool of open source information similarly created on social media channels. Dataminr will look at how leveraging social media effectively can be a force multiplier, allowing small teams to efficiently leverage a global network of information sources numbering in the hundreds of millions.

Speaker: Tim Willis, Director, EMEA Corporate Security, Dataminr, UK

Robotics in Corporate Security - Does the Technology Live Up to the Hype?
12:45 - 13:05
Robotics in Corporate Security - Does the Technology Live Up to the Hype?

In recent years, we’ve seen the introduction of robotics in corporate security; platforms equipped with a wide arrow of sensors, that are able to navigate through a semistructured environment, and notice and inform on anything unusual. How can we expect this task pallet to expand? And to what extent can robotics be expected to influence (i.e. physically interact or manipulate) the human-build environment, instead of mere navigation? Lessons learned from the nuclear domain, where complex manipulation tasks have performed by means of robotic technology for decades, will be presented, and the opportunities and challenges of robotics in corporate security will be discussed.

Speaker: Jeroen Wildenbeest, CTO, DigiNova

Career Centre
Career Centre
Career Centre
ASIS Members Forum
08:15 - 09:00
ASIS Members Forum
08:15 - 09:00

Security as a business enabler
09:35 - 09:55
Security as a business enabler

Security professionals need to be part of or have direct access to the C-Suite within their organizations. To reach this, their knowledge must extend beyond the security function. They should have adequate business acumen to listen to and understand the organization’s overall needs, where the business is and where it is going, as well as being able to make their own needs understood in a convincing and salient manner. To be able to communicate in this way, a certain degree of business knowledge is required, something that many security professionals are usually not familiar with.

Speakers:
Juan Muñoz CPP, Chair, ASIS Spain Chapter, ES
Marisol Zorrilla, Executive Programs Coordinator, IE Business School - Madrid, ES

Security profession game changer – The Ne(x)t Generation
10:00 - 10:45
Security profession game changer – The Ne(x)t Generation
10:00 - 10:45

Upcoming years will be seen as a challenging transition period, as the ne(x)t generation of digital natives is entering the security workforce, which can potentially boost the profession to the next level and open up new opportunities of business enabling.

The panel will discuss different perspectives on the characteristics and perceptions of digital natives, their impact to the security profession and how to ensure security jobs continue to generate a pipeline of future talent. Discuss with experienced security professionals from different European countries about values and challenges YPs from the ne(x)t generation offer to forward thinking companies and the security profession overall.

Speakers:
Alexander Zippel, CPP, Corporate Security, Deutsche Post DHL Group, DE
James Morris, CPP, Regional Security Manager EMEA, Aon, UK
Aurore Chatard, Regional Security Manager – Central Europe, International SOS, CH
Daniella de Nijs, Student, Safety & Security Studies, Inholland Rotterdam, NL

The Benefits of Certification
11:30 - 12:15
The Benefits of Certification
11:30 - 12:15

ASIS security certifications set the standard for professional excellence. Recognized worldwide, the CPP, PCI, and PSP credentials provide objective proof of professional knowledge and experience. Get an update of the most recent developments regarding the (concept) ESMP (Emerging Security Management Professional) certification of ASIS. Learn from experienced trainings and HQ staff why ASIS certifications are the top choice for security professionals, how you can distinguish yourself in the labor market and how the IFPO certification programs, such as CPO, can be a great stepping stone towards ASIS security certification.

Speakers:
Gayle Rosnick, Director, Certification, ASIS International, US
Erik de Vries CPP, Director, DutchRisk & Senior Regional Vice President ASIS Europe, NL

Preparing for a Job Interview
12:20 - 13:05
Preparing for a Job Interview
12:20 - 13:05
 

A resume, along with your social media profile is part of your personal brand and getting this right can be the first step in finding a new position. We will look at ways of optimising this.

Speakers: Mike Hurst, Director, HJA, UK and Graham Bassett, Managing Director, GBRUK Ltd, UK

Friday, 20 April 2018