Critical Learning for Security Professionals

ASIS Europe 2018 will offer multiple tracks of valuable learning opportunities including keynotes, masterclasses, executive sessions, technology & solutions, training, and a career centre, alongside the exhibition.

 

Access key

 Conference delegates only  

Classroom Training and Council Programme only

Show pass – open to all participants

Wednesday, 18 April 2018

18:00
19:00
20:00
18:00
19:00
20:00
From 1 pm to 8 pm: Registration open
From 1 pm to 8 pm: Registration open
From 1 pm to 8 pm: Registration open
Wednesday, 18 April 2018
From 1 pm to 8 pm: Registration open

Thursday, 19 April 2018

Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
Conference track 1
Conference track 1
Conference track 1
Opening Plenary and Keynote
09:00 - 10:00
Opening Plenary and Keynote

A renowned business leader will set the scene for the conference with expert insight into the organisational impacts of big data, automation and artificial intelligence. What will this mean for the organisations and jobs of the future? How quickly will these changes take place? What are the benefits for business and other organisations?
This session will look at the perspectives of businesses, consumers, shareholders and communities – setting the parameters within which security professionals and particularly security leaders need to operate.

Speaker: Tom Raftery

Security Leaders Panel Debate: Risk and Responsibility
10:40 - 12:15
Security Leaders Panel Debate: Risk and Responsibility

A panel of CSOs and Security Leaders from key sectors will interpret the keynote address, focusing on the risk outlook for security practitioners.

Topics the panel will explore include:
• What questions do we need to consider already now, at the early stages of Big Data and AI implementation?
• How can we assign and maintain responsibility through the next phase of technological evolution?
• How do the differences between perceived and real risks impact the role of the security leader?
• Where are the major gaps in current operating models and methodologies?
• How can ESRM (Enterprise Security Risk Management) principles help organisations?
• What are the key messages for security leaders to convey to top management?

This Panel will be chaired by Prof. Martin Gill.

Speakers: Carl Erickson, CPP, Martin Gill, Axel Petri and Mike Howard

Cyberthreat Outlook
13:30 - 14:15
Cyberthreat Outlook

Virtual Security Operation Center Transformation: How to Utilize the Cloud, Big Data and Machine Learning
14:20 - 15:05
Virtual Security Operation Center Transformation: How to Utilize the Cloud, Big Data and Machine Learning

This session will explore the transformation of Microsoft’s global security operations centers to a virtualized security operations center.

This transformation utilized both cloud and the mobility of devices. We will share our own journey, highlighting changes to our people, processes and technologies. The discussion will touch on how we changed our operating model to a fusion center that co-locates intelligence and operations.

We will demonstrate how we use the cloud for signal mitigation, bringing life safety events to the forefront, as well as highlighting the power of cloud computing and machine learning to build effective budgets and operational plans.

You will see how we are visually displaying data's patterns, trends, correlations and predictive analytics to provide situational awareness. Participants will learn how data can challenge conventional thinking, drive business decisions and ultimately demonstrate the value of its security organization.

Speaker: Michael Foynes

Masterclass 1: How Digital Asset Valuation Impacts Risk Assessments
15:50 - 17:25
Masterclass 1: How Digital Asset Valuation Impacts Risk Assessments

Organisations are rapidly generating and developing abilities to handle, analyse, and make sense of vast amounts of data – levels that would have been unimaginable even a few years ago. Additionally, data that did not exist before is now available and data that was trivial before, can suddenly become both valuable and sensitive. The objective of this Masterclass is to address how the increasing value of data and digital assets impacts risk assessments and the asset protection approach in organisations which have historically, had more of an emphasis on protecting human or physical assets. We will explore structures and processes, highlighting where new thinking is required and where tried and tested security risk management is still crucial. This deep-dive session will include several concise presentations and group dialogue on the topics:
• Key shifts in the threat landscape, using common definitions to put the change drivers in context
• Approaches for valuing a range of digital assets such as customer data, intellectual property and process data, plus assessing non-financial values such as reputational risk in case of customer data loss, employee data exposure etc.
• Structural and process changes
• Perception challenges with leadership and employees
• Staying focused and “away from the noise” in order to implement effective measures

Speakers: Carl Erickson, CPP, Gal Messinger, Eduard Emde CPP

President's Reception - Outside venue
20:00 - 22:00
President's Reception - Outside venue

Conference track 2
Conference track 2
Conference track 2
Case Study - Snowden’s Critical Pathway: From Intelligence Contractor to Unleashing an Avalanche of Media Leaks
13:30 - 14:15
Case Study - Snowden’s Critical Pathway: From Intelligence Contractor to Unleashing an Avalanche of Media Leaks

What happens when individuals decide to take confidential data from an organization into the public? What is behind their motivation and what processes do they go through before this decisive moment? This is not a sudden act, and organizational context can either accelerate or prevent critical leaks from taking place.
From the specialised viewpoint of a Clinical Psychologist, this presentation will take you along Snowden’s critical pathway, from his early career up to his current life in Russia. We will look back at personal, organisational and societal factors and discuss the two opposing societal views of him being a whistle blower or a malicious insider.

Speaker: Elsine van Os

Insider Threat Interactive Session – Chasing Shadows or Targeted Defence?
14:20 - 15:05
Insider Threat Interactive Session – Chasing Shadows or Targeted Defence?

Widely considered the source of highly damaging attacks but where is the threat most likely to come from (disgruntled employee, rogue executive, radicalised employee, 3rd party supplier…)? Do organisations have specific plans for mitigation? For response? Are accidental or malicious insiders the greater threat? What happens to prevention strategies post GDPR?
Using live polls and voting through the event mobile app, we will enhance your peer to peer learning experience – join us to share and create new insights on the spot, in the room.

Late breaking topic to be announced in March
15:50 - 16:10
Late breaking topic to be announced in March

Soft Target Protection: Best Practices from Cultural Properties
16:15 - 16:35
Soft Target Protection: Best Practices from Cultural Properties

Cultural Properties share many characteristics with other public places of assembly, such as event locations, retail outlets and sports stadia. Risks including crime and new terrorism threaten the security of highly valuable works of art, and the safety of staff and visitors. This presentation will examine new terrorism attack methods, the characteristics of their attack sites, and why the terrorist picks certain sites. We will look at how soft targets can be protected by applying the principles of Situational Crime Prevention, a process for protecting cultural properties against terrorist attacks and other forms of crime.

Speaker: Dr. Declan Garrett

Late breaking topic to be announced in March
16:40 - 17:00
Late breaking topic to be announced in March

Late breaking topic to be announced in March
17:05 - 17:25
Late breaking topic to be announced in March

Conference Training track
Conference Training track
Conference Training track
Fundamentals of Cyber-Physical Security
10:30 - 12:30
Fundamentals of Cyber-Physical Security
Conference Training Module 1

This training will demonstrate the value of an ESRM strategy and multi-disciplinary teams. It will recommend the use of common security risk reporting processes and information sharing so that security practitioners will be able to prioritize the threats and respond more effectively. It will help the fractioned gain a high level strategic understanding of risk and also how to implement technical solutions. It will provide evidence that organizations which adopt such a unified approach identify the risks and are more resilient than those which operate in silos. It will examine a variety of risk tools and demonstrate the value of leveraging technology to assist the process of mitigating complex converged cyber physical risk. Hence it will give the practitioner the confidence to discuss security risk at board level and assure them that the necessary technical controls are in place to identify and mitigate it.

Trainer: Volker Wagner

Travel Risk Management - How to set up a Travel Risk Management Programme
13:00 - 15:00
Travel Risk Management - How to set up a Travel Risk Management Programme
Conference Training Module 2

Staff travelling abroad must be, and feel, as safe and secure as is reasonably possible. When staff travel abroad the organisation needs to understand the risks and be in a position to plan and react promptly, taking whatever action is opportune. A TRM policy should be an integral part of the management process of any organisation whether it is small, medium or large. Safety and security for staff abroad means peace of mind for management at home

Module 1: The case for Travel Risk Management: Compliance, Due Diligence and Risk Appetite
Module 2: Getting organised (how to develop and manage TRM operations.)
Module 3: In the field: Risk Perception, Context and Assessment - how to interpret intelligence, stay or evacuate in emergency.
Module 4: Corporate, Social, Responsibility CSR and institutional alignment/recognition.
Module 5: Round Table Q & A

Trainers: Roger Warwick, CPP, Daniela Valenti and Andy Williams, CPP

Crisis Management - We got your data; pay now and we’ll release it! Managing Data Extortion Crises
15:30 - 17:30
Crisis Management - We got your data; pay now and we’ll release it! Managing Data Extortion Crises
Conference Training Module 3

One of the favourite modi operandi of cyber criminals is to steal data to extort their victims. This does not only occur by making systems unavailable through ransomware, but also by stealing sensitive data and using it to extort the organisation. This extortion involves the threat of releasing the data to the public or using it for additional criminal use.
Being threatened by such an exposure can cause a major crisis for organizations, whether small or large. Although the origin is a cyber crime, the crisis itself is fundamentally a matter of reputation.
This training explains how to prepare a crisis plan for data extortion. Part of the training is participating in a crisis exercise titled: ‘sensitive customer data stolen'.

Trainers: Theo Stevens and Erik de Vries, CPP

Classroom Training
Not included in conference registration
Classroom Training
Classroom Training
Fundamentals of Cyber-Physical Security
10:30 - 12:30
Fundamentals of Cyber-Physical Security
Classroom Training Module 1

Travel Risk Management
13:00 - 15:00
Travel Risk Management
Classroom Training Module 2

Crisis Management - We Got Your Data; Pay Now and We Will Release it! Preparing for Data Extortion Crises
15:30 - 17:30
Crisis Management - We Got Your Data; Pay Now and We Will Release it! Preparing for Data Extortion Crises
Classroom Training Module 3

One of the favourite modi operandi of cyber criminals is to steal data to extort their victims. This does not only occur by making systems unavailable through ransomware, but also by stealing sensitive data and using it to extort the organisation. This extortion involves the threat of releasing the data to the public or using it for additional criminal use.
Being threatened by such an exposure can cause a major crisis for organizations, whether small or large. Although the origin is a cyber crime, the crisis itself is fundamentally a matter of reputation.
This training explains how to prepare a crisis plan for data extortion. Part of the training is participating in a crisis exercise titled: ‘sensitive customer data stolen'.

Trainers: Bianca Zonne, PCI and Lynn de Vries, CPP

Technology & Solutions Track
Technology & Solutions Track
Technology & Solutions Track
Are the Most ‘At-Risk’ Failed by Equality in Travel Risk Management Programmes?
10:40 - 11:00
Are the Most ‘At-Risk’ Failed by Equality in Travel Risk Management Programmes?

When addressing personnel risk, travel policies and procedures are generally based on home-country legislation, attitudes and cultures rather than those at the destination, with all travellers being assumed equal. Often this is based on the least ‘at-risk’ population (middle aged, straight male) so the procedures, risk assessment, education, training and support can fail the most ‘at-risk’ (for a particular destination e.g. homosexuality punishable by death). This can be further complicated by not being able to make assumptions (e.g. gender, sexuality) of an employee, making it difficult to provide advice or training they might need. Is it time to change the benchmark profile?

Speaker: Saul Shanagher

Inside Knowledge - Hotel Safety and Security
11:05 - 11:25
Inside Knowledge - Hotel Safety and Security

Travel security risk management and duty of care due diligence is becoming a leading priority for corporations sending business travellers around the world. While corporate security can risk rate countries, cities and destinations with reasonable confidence, knowing how to risk rate a particular hotel, or hotel brand is not always so clear. This presentation will provide inside knowledge on what to look for when conducting a hotel security assessment, key questions to ask the hotelier, and how to be better informed when making the right choice of hotel for the business traveller.

Speaker: Andy Williams, CPP

Introducing Global Physical Access Control at Swiss Re: Challenges and Learnings
11:30 - 11:50
Introducing Global Physical Access Control at Swiss Re: Challenges and Learnings

Introducing Global Physical Access Control at Swiss Re: Challenges and Learnings This presentation shows the steps to selecting a physical access control system, and its practical implementation. What are the reasons to move to a new physical access control system (PACS)? What are the requirements of the new system? Does it use cards, mobile devices or biometrics? And how should the project be organised? We'll highlight the challenges faced and lessons learned in this global project.

Speaker: Christoph Teuber

Session Title - TBC
11:55 - 12:15
Session Title - TBC

Risk Mitigation and the Importance of "How"
13:30 - 13:50
Risk Mitigation and the Importance of "How"

Everybody loves a "who done it" detective story. But when it comes to risk mitigation, while the who is important -- as are the what, when, where and why – nothing helps to implement measures to mitigate a threat better than understanding the how. This session will discuss the tradecraft used in two industrial espionage cases (Medrobotics and Deloitte) and illustrate how these cases emphasize the need for a holistic, ESRM approach to protecting proprietary information that straddles traditional corporate security boundaries.

Speaker: Scott Stewart

Session Title - TBC
13:55 - 14:15
Session Title - TBC

The Shift to Self-Learning, Self-Defending Networks
14:20 - 14:40
The Shift to Self-Learning, Self-Defending Networks

This session is designed to help security professionals learn about: • The current and future cyber-threat landscape
• Leveraging machine learning and AI algorithms to defend against never-seen-before cyber-threats
• How new technologies enable you to pre-empt emerging threats and reduce incident response time
• Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
• Real-world examples of subtle, unknown threats that routinely bypass traditional controls

Speaker: Steve Soar

Artificial Intelligence for Secure Access Control
14:45 - 15:05
Artificial Intelligence for Secure Access Control

Managing the access from an unsecure zone to a secure zone in a building is becoming more and more challenging. Different types of flows must be handled, such as people with reduced mobility, people with extreme corpulence, people with hand-luggage and material. An optimal compromise has to be found between security and speed of passage. In our presentation, we will show how artificial intelligence can solve this issue, and how it has been implemented in existing projects.
Speaker: Fabrice Moscheni

Smart Buildings: Fundamentals for Security Professionals
15:50 - 16:35
Smart Buildings: Fundamentals for Security Professionals

This session is designed to help security professionals quickly get to grips with what smart buildings are, and what they mean for a security risk management. We will examine:
• the business opportunities enabled by this technology, e.g. sustainability, energy savings, a tailored experience.
• How smart buildings can help to mitigate traditional risks (e.g. access control, tracking etc).
• New and emerging risks that come with the technology e.g. cyber, insider threat, vendor risk, GDPR compliance)
• How the emerging risks can be mitigated
The session will be structured into several short segments to facilitate dialogue amongst the attendees.

Speaker: John Flanderhijn

Session Title - TBC
16:40 - 17:00
Session Title - TBC

Session Title - TBC
17:05 - 17:25
Session Title - TBC

Career Centre
Career Centre
Career Centre
How to Build a Winning Resume
10:40 - 12:15
How to Build a Winning Resume

A resume, along with your social media profile is part of your personal brand and getting this right can be the first step in finding a new position. We will look at ways of optimising this.

Speakers: Mike Hurst and Graham Bassett

Diversity and Career Development at Amazon
12:30 - 14:15
Diversity and Career Development at Amazon

More information to come soon.

Speakers: Eva Mueller, Jo Day and Laetitia Emeana, PSP

The Benefits of Certification
14:20 - 15:05
The Benefits of Certification

ASIS security certifications set the standard for professional excellence. Recognised worldwide, the CPP, PCI, and PSP credentials provide objective proof of professional knowledge and experience. Learn from experienced trainings and HQ staff why ASIS certifications are the top choice for security professionals and how you can distinguish yourself in the labour market.

Speaker: Erik de Vries, CPP

ASIS/SSR European Salary Survey
15:50 - 16:35
ASIS/SSR European Salary Survey

More information to come soon.

Speaker: Peter French, CPP

Roundtable discussion: Transitioning from the Military and Law Enforcement
16:40 - 17:30
Roundtable discussion: Transitioning from the Military and Law Enforcement

More information to come soon.

Speaker: Nicolas Le Saux, CPP

ASIS Cultural Properties Council Programme
ASIS Cultural Properties Council Programme
ASIS Cultural Properties Council Programme
ASIS Cultural Properties Council Programme
ASIS Cultural Properties Council Programme
10:30 - 16:15
ASIS Cultural Properties Council Programme

The ASIS Cultural Properties Council, a working arm within ASIS International, is comprised of highly skilled security professionals responsible for protecting cultural properties and heritage venues. The council is charged with developing international best practices in the protection of museums, art galleries, places of worship and other cultural venues and events.

The ASIS Cultural Properties Council will convene an inaugural full-day programme within the ASIS Europe 2018 event venue on Thursday 19 April.
This highly anticipated event will feature expert speakers from around the world and will include educational sessions focused on art crime, safeguarding historical artefacts, duty of care, and securing houses of worship. Included in the Cultural Properties Council event pass is a free Show Pass which grants access to the exhibition, end-of-day networking drinks, Technology & Solutions Track and the ASIS Career Center.

Thursday, 19 April 2018
ASIS Cultural Properties Council Programme

Friday, 20 April 2018

Filter even type:
Showing All
Conference Session
Networking Events
Show Pass
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
Conference track 1
Conference track 1
Conference track 1
Member's Forum
08:15 - 09:00
Member's Forum

Member's Forum
08:15 - 09:00
Member's Forum

Jihadi Terrorism Trends in Europe: A Look Ahead
09:10 - 09:55
Jihadi Terrorism Trends in Europe: A Look Ahead

This dynamic presentation will focus on the evolving Jihadi terrorist threat in Europe, look ahead at likely challenges this spring, summer and fall, and stress improving resilience through recent lessons learned.

This includes gaining insight on situations ASIS members are likely to have to deal with over 2018 like the June-July World Cup football tournament in Russia; the threat around various upcoming elections; and far-right and far-left extremist reactions to terrorist activity.

Also covered will be recent changes in terrorist tactics and emerging best practices in managing acute threats for staff in office environments.

Speaker: Glenn Schoen

Public Spaces: Today's Front Line Against Extremist Violence
10:00 - 10:45
Public Spaces: Today's Front Line Against Extremist Violence

Urban security precincts, designed expressly to control access and facilitate surveillance, can help to protect public places from vehicle attacks like those perpetrated in New York, Boston, Brussels, Paris, London, and Barcelona.

We can apply access controls and enhanced vigilance to large areas, including parks, promenades, malls, streets, museums, government quarters and more. Architects and urban designers are helping to design enclaves and precincts, with new variations on old methods, and using new technologies that help to detect contraband and anomalies. Security must be extended to entire urban areas.

Speaker: Thomas Vonier, CPP

Masterclass 2: GDPR and its Impacts on Enterprise Security
11:30 - 13:05
Masterclass 2: GDPR and its Impacts on Enterprise Security

The EU’s new General Data Protection Regulation will come into force in May 2018 – is your organisation ready? Have you mapped the impacts on your security processes?
This deep-dive session will first outline the regulation and its major impacts from the perspective of a privacy expert. We will then examine key security impacts for different industries. Expect specific focus on topics such as investigations and data collected by security cameras.
Session to be chaired by Axel Petri, Senior Vice President Group Security Governance, Deutsche Telekom.

Speakers: Axel Petri, Christoph Rojahn

Interactive Session: Skillsets of the Security Team Now and in the Near Future
14:15 - 15:00
Interactive Session: Skillsets of the Security Team Now and in the Near Future

Having heard how an increasingly diffuse risk outlook impacts the role and expectations on the security team, how can you set up your organisation effectively? What are the skillsets needed now, what will be new, and what will become redundant?
Will you be adding robots and drones to your security team?
What are the options for different sizes and types of organisations? What will be in-house and what will be outsourced?
Using live polls and voting through the event mobile app, we will enhance your peer to peer learning experience – join us to share and create new insights on the spot, in the room. A panel of security leaders and young professionals will stimulate the exchange with their viewpoints. The session will be chaired by Florian Haacke, CSO / Head of Group Security, Innogy.

Speakers: Stuart Eustace, Florian Haacke, Ben Suurd‎

Closing Plenary and Conference Wrap-Up
15:00 - 15:30
Closing Plenary and Conference Wrap-Up

President's Reception
20:00 - 22:00
President's Reception

Conference track 2
Conference track 2
Conference track 2
ESRM 1: A Cyber-Physical Future – Security Implications
09:10 - 09:55
ESRM 1: A Cyber-Physical Future – Security Implications

ESRM in Focus: A four-part double session framing the need for ESRM approaches and how to implement them.
Part 1. A Cyber-Physical Future – Security Implications:
Renowned technology trend expert Scott Klososky will challenge established thinking by outlining new security concerns created by the technology innovations shaping business and our world.

Speaker: Scott Klososky

ESRM 2: A Management Philosophy
10:00 - 10:45
ESRM 2: A Management Philosophy

ESRM in Focus: A four-part double session framing the need for ESRM approaches and how to implement them.
Part 2. ESRM – A Management Philosophy:
Being adaptive to new types of risk is at the core of ESRM - the practice of managing a security program through the use of risk principles. It’s a philosophy of management that can be applied to any area of security and any task that is performed by security, such as physical, cyber, information, and investigations.
A member of the ASIS International ESRM Commission will demonstrate the value of ESRM in addressing emerging risks created by the blurring of boundaries between the physical and cyber worlds.

Speaker: John Petruzzi, CPP

ESRM CASE STUDY: From Vision to Reality - Developing and Embedding a Cross-Functional Strategy
11:30 - 11:50
ESRM CASE STUDY: From Vision to Reality - Developing and Embedding a Cross-Functional Strategy

ESRM in Focus: A four-part double session framing the need for ESRM approaches and how to implement them.
Part 3. ESRM Case Study:
Security and resilience risk management has historically been managed in isolation with varying levels of maturity, no overarching enterprise risk management approach and numerous single points of dependency. With the implementation of a holistic strategy, built on existing standards, there is an opportunity to build on existing foundations and make significant steps along the maturity scale ensuring organisations can Identify, Protect, Detect, Respond and Recover effectively from possible harmful events. Customers, Regulators and Governments increasingly pressurise organisations to make step changes in how they manage resilience risks. This example strategic approach will be presented in an interactive and engaging style.

Speaker: Barrie Millett

Adapting and Improving: Understanding and Measuring Business Resilience
11:55 - 12:15
Adapting and Improving: Understanding and Measuring Business Resilience

ESRM in Focus: A four-part double session framing the need for ESRM approaches and how to implement them.
Part 4. Adapting and Improving:
Partitioning human, physical and IT security is artificial in modern enterprise operating in a multi-layered risk environment. Business resilience as an umbrella concept introduces a more effective approach to organisational security. It urges to combine different areas of security into an integrated process. Instead of preparing for specific threats, we should train core aspects of organisation to be so flexible and adaptable that it can survive any disruption. This presentation provides a framework, which helps to evaluate level of resilience in organisation, as well as discusses how companies can improve their business resilience.

Speaker: Laura Poderys

Late breaking topic to be announced in March
12:20 - 12:40
Late breaking topic to be announced in March

Late breaking topic to be announced in March
12:45 - 13:05
Late breaking topic to be announced in March

President's Reception
20:00 - 22:00
President's Reception

Conference training track
Conference training track
Conference training track
Cyber Crime Simulation Game
09:00 - 11:00
Cyber Crime Simulation Game
Conference Training Module 4

This interactive simulation game allows you to play a role and understand stakeholder needs from all perspectives, in an actual Cyber Incident. Players in the game include, a range of stakeholders including customers, senior management, regulators, technical experts and the media. During the game we will simulate the key objectives of each stakeholder group, their information needs, the pre-disaster provisions they could have put in place as well as instant action plans that they could develop. We will simulate the interaction between the stakeholders by means of this interactive game.
Participants receive a game ‘kit’ as part of their participation, which includes a range of topical challenges to address within the 2--hour game format.

Speaker: Rinske Geerlings

Soft Targets and Terrorism Risk Management
11:20 - 13:20
Soft Targets and Terrorism Risk Management

In this special two-hour program, anti-terrorism consultant Craig Gundry explores the unique challenges of protecting soft target facilities against mass violence and specialized approaches for managing terrorism-related risk. Some of the topics surveyed in this seminar include strategic risk management concepts, protective counterintelligence, physical security strategies appropriate in diverse soft target environments, integration of physical security and emergency preparations, infrastructure design, and emergency response planning.

Speaker: Craig Gundry, PSP

President's Reception
20:00 - 22:00
President's Reception

Classroom Training track
Not included in conference registration
Classroom Training track
Classroom Training track
Cybersecurity Workshop
09:00 - 11:00
Cybersecurity Workshop
Classroom Training Module 4

Soft Targets - Reducing Soft Target Risks through Staff Awareness Programs
11:20 - 13:20
Soft Targets - Reducing Soft Target Risks through Staff Awareness Programs
Classroom Training Module 5

In his book, The Gift of Fear, author and security expert Gavin de Becker writes that each of us has instincts that allow us to predict violent behavior. In the USA, people are told, “If you see something, say something.” In the UK, people are told, “See it, say it sort it.” But how can you train your staff to go beyond these words and trust their instincts to identify suspicious behavior and persons? Many soft targets such as houses of worship and entertainment venues do not have trained security officers trained to identify potential adversaries. This workshop will give you methods to engage your staff in training that will raise their security awareness and reduce your organization’s risk.

Speakers: Ibrahim Bulut and Andy Davis

Technology & Solutions Track
Technology & Solutions Track
Technology & Solutions Track
Physical Prevention of Industrial Espionage by Eavesdropping
09:10 - 09:30
Physical Prevention of Industrial Espionage by Eavesdropping

Jason Dibley Technical Director at QCC Global gives an informal and interesting presentation examining how neglect of the physical security of a site, leads directly to industrial espionage and information theft. Using real world cases studies, video and photos of live eavesdropping attacks Jason also looks at the consequences of these different scenarios and how TSCM and other security measures could have prevented these situations occurring.

Speaker: Jason Dibley

Session Title - TBC
09:35 - 09:55
Session Title - TBC

Session Title - TBC
10:00 - 10:20
Session Title - TBC

Session Title - TBC
10:25 - 10:45
Session Title - TBC

Predictive Intelligence: Enhancing Resilience - Adding Value
11:30 - 11:50
Predictive Intelligence: Enhancing Resilience - Adding Value

In this session, delegates will learn how predictive intelligence analysis is essential to an effective resilience strategy for global organisations. Using case studies drawn from our multinational client base, our speaker will illustrate how a number of leading brands have successfully incorporated predictive intelligence to support key strategic processes. Examples will cover the application of predictive intelligence into decision-making across physical security, new market entry, reputational and political risk and resilience programmes. Case studies are supported by the methodological framework Falanx Assynt has repeatedly proven over the past 15 years. Delegates will leave with a clear understanding of how and where they can add value to their organisations and enhance resilience through predictive intelligence.

Speaker: James Brandon

Session Title - TBC
11:55 - 12:15
Session Title - TBC

Social Media-a Force Multiplier for Corporate Security
12:20 - 12:40
Social Media-a Force Multiplier for Corporate Security

With the adage that the only thing we can be certain of is uncertainty seemingly never truer, security teams increasingly need to harness new technologies and develop new skill sets to safeguard assets. While we understandably focus on securing the vast amounts of data produced by our organisations, we overlook the security potential of the vast pool of open source information similarly created on social media channels. Dataminr will look at how leveraging social media effectively can be a force multiplier, allowing small teams to efficiently leverage a global network of information sources numbering in the hundreds of millions.

Robotics in Corporate Security - Does the Technology Live Up to the Hype?
12:45 - 13:05
Robotics in Corporate Security - Does the Technology Live Up to the Hype?

In recent years, we’ve seen the introduction of robotics in corporate security; platforms equipped with a wide arrow of sensors, that are able to navigate through a semistructured environment, and notice and inform on anything unusual. How can we expect this task pallet to expand? And to what extent can robotics be expected to influence (i.e. physically interact or manipulate) the human-build environment, instead of mere navigation? Lessons learned from the nuclear domain, where complex manipulation tasks have performed by means of robotic technology for decades, will be presented, and the opportunities and challenges of robotics in corporate security will be discussed.

Speaker: Jeroen Wildenbeest

Career Centre
Career Centre
Career Centre
Career Centre Session
09:10 - 09:30
Career Centre Session

Career Centre Session
09:35 - 09:55
Career Centre Session

The Young Professional's USP
10:00 - 10:45
The Young Professional's USP

Join this session to exchange with currently active Young Professionals from different European countries and those supporting the initiative. Several YPLs will share their views on what YPs have got to offer for businesses and the security industry in the fast changing world today and why it is important to engage with the topic. Also learn about local chapter experiences, differences across countries and what it takes to get people engaged. Use this opportunity to meet and greet active members of the Young Professionals Council.

Career Centre Session
11:30 - 12:15
Career Centre Session

Preparing for a Job Interview
12:20 - 13:05
Preparing for a Job Interview
 

A resume, along with your social media profile is part of your personal brand and getting this right can be the first step in finding a new position. We will look at ways of optimising this.

Speakers: Mike Hurst and Graham Bassett

Friday, 20 April 2018