22.12.2012 Views

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MONDAY, sEPTEMbEr 19 • 1:45 pm –3:00 pm<br />

2205 separating Fact From Fiction:<br />

The Food safety Modernization Act<br />

of 2011<br />

■ Intermediate<br />

This session examines <strong>the</strong> new regulation’s<br />

impact on regulated facilities and <strong>the</strong>ir security<br />

practitioners to clarify misconceptions. It covers<br />

both <strong>the</strong> scientific and traditional security<br />

requirements associated with <strong>the</strong> regulatory<br />

concepts of food safety versus food defense, and<br />

<strong>the</strong> required skills and competencies of outside<br />

security consultants. attendance is a must for<br />

regulated food security managers whose<br />

organizations may not have <strong>the</strong> same resources<br />

of a larger organization to implement <strong>the</strong> new<br />

requirements.<br />

Brian Stegmann, Senior Engineering & Food Safety<br />

Manager, Corn Products International; Mat<strong>the</strong>w Ryan,<br />

Director Corporate Security, The Hershey Company; Frank<br />

Pisciotta, President, Business Protection Specialists, Inc.<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Agriculture and Food Security<br />

Council<br />

2206 iT security Council series: Who<br />

Are You, and Why should i Trust You?<br />

Current Trends in identity and Access<br />

Management<br />

■ Intermediate<br />

logging onto an enterprise network or a cloudbased<br />

application needs to be as secure as<br />

entering a physical facility, yet today’s security<br />

professionals often find <strong>the</strong>mselves hard-pressed<br />

to protect both physical and logical assets and<br />

comply with stringent government mandates.<br />

learn about <strong>the</strong> current best practices to control<br />

identity and manage access to corporate assets<br />

by trusted parties. Gain a solid understanding<br />

of <strong>the</strong> technologies, standards, regulations,<br />

business challenges, and <strong>the</strong> questions to ask<br />

related to identity and access management.<br />

discuss new and emerging trends.<br />

Gary Klinefelter, Principal, Creative Innovation Strategies;<br />

Don Fergus, Vice President/CSO, Intekras, Inc.; Sal<br />

D’Agostino, CEO, IDmachines, LLC; Jose Hernandez,<br />

Director Information Security, Fluor Corporation<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Information Technology Security<br />

Council<br />

MONDAY<br />

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced<br />

2207 The Process of investigation<br />

and <strong>the</strong> Fundamentals of Fact-Finding<br />

■ Intermediate<br />

Proper and ethical investigations are complex<br />

undertakings, fraught with potential for legal<br />

liability. When done properly and ethically, <strong>the</strong>y<br />

combine an intricate mixture of skill, experience,<br />

and luck. This session introduces you to <strong>the</strong><br />

Process of Investigation® and <strong>the</strong> fundamentals of<br />

fact-finding. Review how to safely and legally<br />

conduct investigations while obtaining <strong>the</strong> best<br />

return on investment of time and resources.<br />

Review <strong>the</strong> eight methods of investigation, <strong>the</strong><br />

secrets of modern case management, evidence<br />

analysis, and <strong>the</strong> practical aspects of effective<br />

report writing.<br />

Eugene Ferraro, CPP, PCI, CEO/Founder, Business<br />

Controls, Inc.<br />

2208 What’s New on <strong>the</strong> Floor?<br />

● Fundamental<br />

Make <strong>the</strong> most efficient use of your time by<br />

learning where new and innovative products<br />

can be found on <strong>the</strong> exhibit floor spanning over<br />

230,000 square feet! The session highlights<br />

both physical and information technology<br />

security products.<br />

Howard Belfor, CPP, President, Belfor & Associates, LLC;<br />

Ronald Lander, CPP, Chief Specialist, Ultrasafe Security<br />

Solutions<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Physical Security Council and<br />

Information Technology Security Council<br />

2209 What it Takes to be a security<br />

Executive Today<br />

▲ Advanced<br />

developing world-class risk mitigation for your<br />

organization is key to succeeding as a security<br />

executive today. hear from two senior leaders<br />

as <strong>the</strong>y discuss aligning security and crossfunctional<br />

risk mitigation with operational<br />

strategies, effectively communicating <strong>the</strong><br />

value proposition to <strong>the</strong> c-Suite and diverse<br />

stakeholders, and ensuring that programs both<br />

align with <strong>the</strong> core strategic plan and protect<br />

<strong>the</strong> brand. learn how mentoring/job shadowing<br />

can help your future leaders engage, grow within<br />

<strong>the</strong>ir role, identify best practices, and provide<br />

lasting depth/breadth in your organization.<br />

Michael Howard, General Manager, Chief Security Officer<br />

Microsoft Global Security, Microsoft Corporation; Francis<br />

D’Addario, CPP, CFE, Emeritus Faculty, Strategic Influence<br />

and Innovation, Security Executive Council (SEC)<br />

September 19–22, 2011 | Orange County Convention Center | Orlando, Florida | www.asis2011.org 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!