Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
MONDAY, sEPTEMbEr 19 • 1:45 pm –3:00 pm<br />
2205 separating Fact From Fiction:<br />
The Food safety Modernization Act<br />
of 2011<br />
■ Intermediate<br />
This session examines <strong>the</strong> new regulation’s<br />
impact on regulated facilities and <strong>the</strong>ir security<br />
practitioners to clarify misconceptions. It covers<br />
both <strong>the</strong> scientific and traditional security<br />
requirements associated with <strong>the</strong> regulatory<br />
concepts of food safety versus food defense, and<br />
<strong>the</strong> required skills and competencies of outside<br />
security consultants. attendance is a must for<br />
regulated food security managers whose<br />
organizations may not have <strong>the</strong> same resources<br />
of a larger organization to implement <strong>the</strong> new<br />
requirements.<br />
Brian Stegmann, Senior Engineering & Food Safety<br />
Manager, Corn Products International; Mat<strong>the</strong>w Ryan,<br />
Director Corporate Security, The Hershey Company; Frank<br />
Pisciotta, President, Business Protection Specialists, Inc.<br />
Sponsored by <strong>the</strong> <strong>ASIS</strong> Agriculture and Food Security<br />
Council<br />
2206 iT security Council series: Who<br />
Are You, and Why should i Trust You?<br />
Current Trends in identity and Access<br />
Management<br />
■ Intermediate<br />
logging onto an enterprise network or a cloudbased<br />
application needs to be as secure as<br />
entering a physical facility, yet today’s security<br />
professionals often find <strong>the</strong>mselves hard-pressed<br />
to protect both physical and logical assets and<br />
comply with stringent government mandates.<br />
learn about <strong>the</strong> current best practices to control<br />
identity and manage access to corporate assets<br />
by trusted parties. Gain a solid understanding<br />
of <strong>the</strong> technologies, standards, regulations,<br />
business challenges, and <strong>the</strong> questions to ask<br />
related to identity and access management.<br />
discuss new and emerging trends.<br />
Gary Klinefelter, Principal, Creative Innovation Strategies;<br />
Don Fergus, Vice President/CSO, Intekras, Inc.; Sal<br />
D’Agostino, CEO, IDmachines, LLC; Jose Hernandez,<br />
Director Information Security, Fluor Corporation<br />
Sponsored by <strong>the</strong> <strong>ASIS</strong> Information Technology Security<br />
Council<br />
MONDAY<br />
LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced<br />
2207 The Process of investigation<br />
and <strong>the</strong> Fundamentals of Fact-Finding<br />
■ Intermediate<br />
Proper and ethical investigations are complex<br />
undertakings, fraught with potential for legal<br />
liability. When done properly and ethically, <strong>the</strong>y<br />
combine an intricate mixture of skill, experience,<br />
and luck. This session introduces you to <strong>the</strong><br />
Process of Investigation® and <strong>the</strong> fundamentals of<br />
fact-finding. Review how to safely and legally<br />
conduct investigations while obtaining <strong>the</strong> best<br />
return on investment of time and resources.<br />
Review <strong>the</strong> eight methods of investigation, <strong>the</strong><br />
secrets of modern case management, evidence<br />
analysis, and <strong>the</strong> practical aspects of effective<br />
report writing.<br />
Eugene Ferraro, CPP, PCI, CEO/Founder, Business<br />
Controls, Inc.<br />
2208 What’s New on <strong>the</strong> Floor?<br />
● Fundamental<br />
Make <strong>the</strong> most efficient use of your time by<br />
learning where new and innovative products<br />
can be found on <strong>the</strong> exhibit floor spanning over<br />
230,000 square feet! The session highlights<br />
both physical and information technology<br />
security products.<br />
Howard Belfor, CPP, President, Belfor & Associates, LLC;<br />
Ronald Lander, CPP, Chief Specialist, Ultrasafe Security<br />
Solutions<br />
Sponsored by <strong>the</strong> <strong>ASIS</strong> Physical Security Council and<br />
Information Technology Security Council<br />
2209 What it Takes to be a security<br />
Executive Today<br />
▲ Advanced<br />
developing world-class risk mitigation for your<br />
organization is key to succeeding as a security<br />
executive today. hear from two senior leaders<br />
as <strong>the</strong>y discuss aligning security and crossfunctional<br />
risk mitigation with operational<br />
strategies, effectively communicating <strong>the</strong><br />
value proposition to <strong>the</strong> c-Suite and diverse<br />
stakeholders, and ensuring that programs both<br />
align with <strong>the</strong> core strategic plan and protect<br />
<strong>the</strong> brand. learn how mentoring/job shadowing<br />
can help your future leaders engage, grow within<br />
<strong>the</strong>ir role, identify best practices, and provide<br />
lasting depth/breadth in your organization.<br />
Michael Howard, General Manager, Chief Security Officer<br />
Microsoft Global Security, Microsoft Corporation; Francis<br />
D’Addario, CPP, CFE, Emeritus Faculty, Strategic Influence<br />
and Innovation, Security Executive Council (SEC)<br />
September 19–22, 2011 | Orange County Convention Center | Orlando, Florida | www.asis2011.org 27