22.12.2012 Views

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Education sessions: 2000 Series<br />

MONDAY, sEPTEMbEr 19 • 1:45 pm –3:00 pm<br />

2210 Getting Executive buy-in<br />

for Corporate security, business<br />

Continuity, and Crisis Management<br />

■ Intermediate<br />

This session provides practical guidelines for<br />

working with senior executives to obtain support<br />

for corporate security, business continuity, and<br />

crisis preparedness. learn successful strategies<br />

for obtaining full senior-level support, how to<br />

communicate when high-consequence warning<br />

signs are being ignored, and how to provide your<br />

executive sponsor with <strong>the</strong> tools needed to keep<br />

<strong>the</strong> leadership team involved in prevention and<br />

preparedness efforts over time.<br />

Bruce T. Bly<strong>the</strong>, CEO, Crisis Management International, Inc.<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Crisis Management and Business<br />

Continuity Council<br />

2211 beyond statistics: What<br />

Crimes are Faith-based Organizations<br />

really Facing in <strong>the</strong> U.s.?<br />

■ Intermediate<br />

Statistics can often be misleading, and even <strong>the</strong><br />

Justice department’s crime statistics are not<br />

totally accurate, especially when it comes to<br />

analyzing crimes against religious organizations.<br />

In this panel discussion, security professionals<br />

from different faiths will look deeper into <strong>the</strong><br />

problem that houses of worship in <strong>the</strong> united<br />

States are facing and why <strong>the</strong> numbers do not<br />

accurately portray <strong>the</strong> whole picture.<br />

Jeffrey Hawkins, Manager, Security Management<br />

Education Outreach, American Military University; Nawar<br />

Shora, CEO, Shams Training & Development; Chris Delia,<br />

Director of Security, Anti-Defamation League; Jeffrey<br />

Berrett, Director of Protective Operations, Church of Jesus<br />

Christ of Latter-day Saints<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Cultural Properties Council<br />

2212 Premises Liability: A Trial<br />

Lawyer’s Hints for <strong>the</strong> security<br />

Professional<br />

▲ Advanced<br />

This session examines what types of premises<br />

are subject to negligent security cases, what<br />

kind of injuries give rise to <strong>the</strong>se cases, <strong>the</strong> duty<br />

of <strong>the</strong> commercial property owner, how to assess<br />

<strong>the</strong> crime situation, common security measures<br />

discussed in <strong>the</strong>se cases, and proper use of<br />

marketing materials.<br />

Michael Haggard, Esq., The Haggard Law Firm<br />

2213 Cyber Jihad: Use of <strong>the</strong> Virtual<br />

World<br />

■ Intermediate<br />

The Internet is <strong>the</strong> platform of choice for cyber<br />

jihadis to recruit and communicate sensitive<br />

information. Osama Bin laden indicated long<br />

ago that 90% of <strong>the</strong> battle is information. This<br />

session takes you through <strong>the</strong> actual sites<br />

analyzed and <strong>the</strong>ir use of <strong>the</strong> cloud, and <strong>the</strong>ir<br />

publishing techniques and tools for information<br />

dissemination that goes viral. Review <strong>the</strong>ir<br />

expertise in awareness and training while using<br />

our tools and techniques against us. In addition,<br />

examine how cyber jihadis use <strong>the</strong> Internet in <strong>the</strong><br />

radicalization process, in asymmetrical warfare,<br />

and how huMInT and OSInT can be used to<br />

counter <strong>the</strong>ir activities.<br />

Jeffrey Bardin, Chief Security Strategist, Treadstone 71<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Global Terrorism, Political<br />

Instability, and International Crime Council<br />

2214 Five Common Mistakes<br />

interviewers Make/Five successful<br />

strategies<br />

■ Intermediate<br />

The process of sitting down across from a<br />

suspect employee and asking questions to obtain<br />

evidence or an admission of guilt is not something<br />

that comes naturally to most people. despite<br />

training, <strong>the</strong>re are common mistakes made by<br />

inexperienced interviewers which can create<br />

barriers to communication, and ultimately a lack<br />

of cooperation and information. learn valuable<br />

tips for performing a personal assessment of<br />

interview habits, as well as several best practices<br />

to use when in <strong>the</strong> room.<br />

Randy Tennison, CPP, Financial Analyst, Internal<br />

Investigations, Walt Disney Parks and Resorts<br />

2215 should You Have Known:<br />

Lessons Learned From a Multiple<br />

Homicide in <strong>the</strong> Workplace<br />

▲ Advanced<br />

Many cases of workplace homicide perpetrated<br />

by an employee show that <strong>the</strong>re were numerous<br />

‘warning signs’ which first-line supervisors failed<br />

to ei<strong>the</strong>r recognize or respond to. In such cases<br />

it can be argued that, had such recognition and<br />

response taken place, <strong>the</strong> ultimate outcome of<br />

violence might have been prevented. This session<br />

draws upon practical lessons learned from a<br />

recent internal investigation of a multiple<br />

workplace homicide. learn how to identify risk<br />

factors and explore <strong>the</strong>ir impact on <strong>the</strong> evolving<br />

case; develop response options; identify internal/<br />

external resources; and identify obstacles that<br />

restrain supervisors from responding proactively.<br />

John Lane, Vice President, Crisis and Resilience Consulting,<br />

Control Risks<br />

28 Asis 2011 <strong>Anticipate</strong> <strong>the</strong> <strong>unexpected</strong>. The security tools, techniques, and talent for tomorrow.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!