22.12.2012 Views

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

MONDAY, sEPTEMbEr 19 • 11:00 am–12:00 noon<br />

2111 seek and Ye shall be sued:<br />

Using social Networking sites<br />

to Manage risk Without risking<br />

Litigation<br />

▲ Advanced<br />

The social networking revolution has changed<br />

<strong>the</strong> modern workplace and <strong>the</strong> way our employees<br />

and customers communicate. Sites such as<br />

Facebook, MySpace, Twitter, and linkedIn contain<br />

a wealth of personal information. Is it lawful for<br />

employers to use this information for business<br />

purposes? This fascinating and fast-paced<br />

session demonstrates how <strong>the</strong>se sites function<br />

and reveals some of <strong>the</strong> amazing data <strong>the</strong>y<br />

contain. learn how to safely and legally use <strong>the</strong>se<br />

resources without exposing yourself or your<br />

organization to unnecessary and costly litigation.<br />

James Burke, Partner, Wilson Elser, Moskowitz, Edelman<br />

and Dicker; Elizabeth Ho Sing, Wilson Elser, LLP; Eugene<br />

Ferraro, CPP, PCI, CEO/Founder, Business Controls, Inc.<br />

2112 The Quantum Leap in security<br />

Lighting: LED and induction Lighting<br />

■ Intermediate<br />

compare traditional lighting systems with <strong>the</strong> next<br />

generation of security lighting: led and induction<br />

lighting. analysis of energy consumption, return<br />

on investment, quality and quantity of lighting,<br />

light trespass, and pollution considerations are<br />

covered. leed and GReen point considerations<br />

are provided. case studies demonstrate proper<br />

applications of this revolution of lighting<br />

technology and its impact on <strong>the</strong> security world.<br />

Randy Atlas, Ph.D., CPP, AIA, Vice President, Atlas Safety<br />

& Security Design, Inc.<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Security Architecture and<br />

Engineering Council<br />

2113 Therefore Go: security<br />

Considerations for short-Term<br />

Mission Teams<br />

● Fundamental<br />

every year thousands of people travel overseas<br />

to participate in short-term, faith-based relief<br />

projects. These initiatives vary widely in scope<br />

and can include everything from building and<br />

educational projects to disaster relief and medical<br />

assistance. This presentation provides a 10-step<br />

process for security planning in support of <strong>the</strong>se<br />

mission trips.<br />

Scott Watson, CPP, Principal Consultant/CEO, S.A. Watson<br />

and Associates, LLC<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Cultural Properties Council<br />

MONDAY<br />

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced<br />

2114 Creating and implementing<br />

an internal standardized Training<br />

Program for Your security Organization<br />

■ Intermediate<br />

With <strong>the</strong> complexities of operating a fully<br />

functional security organization, <strong>the</strong> creation,<br />

implementation, and operation of a dedicated<br />

training program is essential. Without a<br />

standardized training curriculum, organizations<br />

risk inconsistent results, less than optimal<br />

productivity, decreased morale, potential lawsuits,<br />

and more. This session presents a comprehensive<br />

training model. learn how to create, implement,<br />

and track a training plan which supports <strong>the</strong> goals<br />

and objectives of your business mission. explore<br />

various learning styles, enterprise-wide systems,<br />

and <strong>the</strong> benefits of a feedback component. If<br />

your organization lacks a fundamental training<br />

curriculum, operates an outdated training system,<br />

or considers training an outsourcing issue, this<br />

session is for you.<br />

Jeffrey P. Grossmann, Esq., Assistant Professor/Director<br />

Homeland and Corporate Security Program, St. John’s<br />

University<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Academic Programs and Training<br />

Council<br />

2115 business Case for security:<br />

Creative Ways to show security’s<br />

Proposition and Profitability<br />

■ Intermediate<br />

as organizational security budgets continue<br />

to erode, it is essential for security leaders to<br />

have and apply business acumen to program<br />

management. This session provides security<br />

managers with insights and strategies for<br />

developing <strong>the</strong>ir business case when building<br />

security program budgets and presenting <strong>the</strong>m<br />

to c-suite leadership. essential financial concepts,<br />

along with <strong>the</strong> development of metrics, will be<br />

discussed. In addition, examples where Security<br />

was seen as “heroic” for changing delivery<br />

models will be given. Presenters bring extensive<br />

real-world security management and consulting<br />

experience to this timely topic.<br />

Elliot Boxerbaum, CPP, President/CEO, Security Risk<br />

Management Consultants, Inc.; Bonnie Michelman, CPP,<br />

Director of Police, Security and Outside Services,<br />

Massachusetts General Hospital<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Healthcare Council<br />

September 19–22, 2011 | Orange County Convention Center | Orlando, Florida | www.asis2011.org 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!